https://www.tenable.com/blog/auditing-microsoft-security-compliance-toolkit-baselines
This blog covers the Microsoft Security Compliance toolkit as a tool to audit security baselines. This toolkit is set of tools produced by Microsoft so organizations can apply Microsoft-recommended security configurations to their environment.
https://www.ncsc.gov.uk/collection/10-steps
This article helps identify key controls that should be considered when establishing a secure configuration.
NIST SP 800-128 Guide for Security-Focused Configuration Management of Information Systems
3.4 3.4.1 Configuration Management
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-128.pdf
This NIST Special Publication covers general guidelines for ensuring that security considerations are integrated into the configuration management process.
https://it.nc.gov/documents/statewide-policies/scio-configuration-management/download?attachment
This is a sample configuration management policy from the State of North Carolina that outlines the standards used for configuration management compliance.
https://www.sans.org/white-papers/35762/
This SANS whitepaper focuses on monitoring windows and linux baselines.
https://www.cisa.gov/sites/default/files/c3vp/crr_resources_guides/CRR_Resource_Guide-AM.pdf
This guide was created to assist individuals responsible for designing, managing, or deploying cybersecurity resilience controls, including executives who establish policies and priorities for asset management, managers and planners who are responsible for converting executive decisions into plans, and operations staff who implement the plans and participate in the implementation of organizational assets.
https://www.cisa.gov/sites/default/files/c3vp/crr_resources_guides/CRR_Resource_Guide-CCM.pdf
This guidance from US-CERT is intended for organizations seeking help in establishing a configuration and change management process and for organizations seeking to improve their existing configuration and change management process.
https://www.cisa.gov/sites/default/files/c3vp/crr_resources_guides/CRR_Resource_Guide-RM.pdf
This guide was created to assist individuals responsible for managing risk management programs for IT operations, including executives who establish policies and priorities for risk management, managers and planners who are responsible for converting executive decisions into action plans, and operations staff who implement those operational risk management plans.