https://www.cisecurity.org/cis-benchmarks
The CIS Benchmarks are prescriptive configuration recommendations for more than 25+ vendor product families. They represent the consensus-based effort of cybersecurity experts globally to help you protect your systems against threats more confidently.
https://www.tripwire.com/state-of-security/security-configuration-management
This article details the basics of security configuration management, and considerations for effective security configuration management.
Microsoft – Fundamentals of Security for Configuration Manager
3.4 3.4.2 Configuration Management
https://learn.microsoft.com/en-us/intune/configmgr/core/understand/fundamentals-of-security
This article summarizes the fundamental security components of a Windows Configuration Manager environment.
https://www.reach.security/blog/security-focused-configuration-management-getting-beyond-the-checkbox
This blog post details how security focused configuration management is an active component of security.
https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/8/pdf/security_hardening/red_hat_enterprise_linux-8-security_hardening-en-us.pdf
This is a security hardening guide for Red Hat Enterprise Linux 8, developed by Red Hat, Inc.
Sprinto – Vulnerability to Vigilance: The importance of Security Configuration Management
3.4 3.4.2 Configuration Management
https://sprinto.com/blog/security-configuration-management/
This article describes how security configuration management works, the benefits of security configuration management, and how to choose a security configuration management tool.
https://security.berkeley.edu/secure-device-configuration-guideline
This is UC Berkeley's secure device configuration guideline with adherence to their security policy mandate. This is an example of a how to assess a secure configuration.
https://www.youtube.com/watch?v=QNRjjkzvWK0
This is a video from CIS that covers secure configurations for hardware and software.