Reach – Security-Focused Configuration Management: Getting Beyond the Checkbox 3.13 3.13.5 3.4 3.4.2 Configuration Management csc11 csc12 csc9 System and Communications Protection
This blog post details how security focused configuration management is an active component of security.
