NIST SP 800-53: CM-7 Least Functionality 3.4 3.4.7 3.4.8
NIST resource that defines requirements for configuring information systems to provide only essential capabilities such as restricting / blacklisting software.
NIST resource that defines requirements for configuring information systems to provide only essential capabilities such as restricting / blacklisting software.
This is a sample configuration management policy from the State of North Carolina that outlines the standards used for configuration management compliance.
This blog post highlights the best practices in change management.
This blog post details how security focused configuration management is an active component of security.
This is a security hardening guide for Red Hat Enterprise Linux 8, developed by Red Hat, Inc.
This SANS whitepaper covers how to implement and re-implement change policies.
This guide provides an overview of configuration baselines as it pertains to configuration management in systems engineering.
This is a blog that covers change management and configuration management and their revolutionizing cybersecurity.
IT change management describes the practices designed to ensure successful prioritizing, approval, scheduling, and execution of changes to IT systems.
This site provides examples of templates that can be used throughout change management process such as change management template, change proposal template, change management communications plan template, etc.