Guidelines for secure change and software installation on operating systems:nn- Trained admins update operational software with management authorizationn- Have approved usable code installed, after extensive testingn- Rollback strategy defined beforehandn- Audit log maintained for updatesn- Outdated software is archived with required info and supporting softwaren- Consider business requirements and security before upgrading to new release or applying software patchesn- Monitor and control software and packages supplied from external sourcesn- Maintain vendor-provided software at supported levelsn- Strict rules on types of software users can installn- Grant privileges based on user roles