Master of Project Academy – ITIL Change Management Process: Models You Need to Know
3.4 3.4.3 3.4.4 3.4.5 Configuration Management
https://blog.masterofproject.com/change-management-process-itil/
This blog reviews the ITIL change management process and covers various models and workflows that are part of this process.
Microsoft – Fundamentals of Security for Configuration Manager
3.4 3.4.2 Configuration Management
https://learn.microsoft.com/en-us/intune/configmgr/core/understand/fundamentals-of-security
This article summarizes the fundamental security components of a Windows Configuration Manager environment.
Microsoft – Windows 10 Version 1903: Prevent Software Installation by Users
3.4 3.4.9 Configuration Management
https://learn.microsoft.com/en-us/archive/technet-wiki/53218.windows-10-version-1903-prevent-software-installation-by-users
This article from Microsoft, describes how administrators can configure Windows 10 to prevent users from installing software.
https://www.microsoft.com/en-us/download/details.aspx?id=55319
This set of tools allows enterprise security administrators to download, analyze, test, edit and store Microsoft-recommended security configuration baselines for Windows and other Microsoft products, while comparing them against other security configurations.
https://isoo.blogs.archives.gov/category/marking-examples/
This blog provides examples of correctly marking Controlled Unclassified Information (CUI) and forms for purchase.
https://ncp.nist.gov/repository
The National Checklist Program (NCP), defined by the NIST SP 800-70, is the U.S. government repository of publicly available security checklists (or benchmarks) that provide detailed low level guidance on setting the security configuration of operating systems and applications.
https://www.ncsc.gov.uk/collection/10-steps
This article helps identify key controls that should be considered when establishing a secure configuration.
netwrix – How Insecure and Vulnerable Open Ports Pose Serious Security Risks
3.4 3.4.7 Configuration Management
https://netwrix.com/en/resources/blog/open-ports-vulnerability-list//
This article from netwrix outlines the most vulnerable ports and critical security strategies for protecting against them.
https://netwrix.com/en/resources/blog/baseline-configuration/
This article discusses reasons for configuration drift and how to avoid it through proper configuration management and change control.
NIST SP 800-128: Guide for Security-Focused Configuration Management of Information Systems
3.4 3.4.1 Configuration Management
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-128.pdf
This NIST Special Publication covers general guidelines for ensuring that security considerations are integrated into the configuration management process.