As a result of the technology configuration audit, some issues around technology configuration items and technology assets,
and possibly the associated environment or database, may be highlighted. Unregistered and unauthorized technology
configuration items and assets discovered during the configuration audits should be investigated. Discrepancies identified
must be investigated on reliability, by checking a sufficient number of technology configuration items. If the
discrepancies are sufficiently accurate, the Configuration Management Database should be updated after discussing with
relevant stakeholders.
Configuration Manager along with Configuration Management Auditor must identify corrective actions and assign it to
relevant resources within the project team for resolution. All exceptions should be logged and reported.
|