North Carolina – Configuration Management Policy 3.4 3.4.1 Configuration Management
This is a sample configuration management policy from the State of North Carolina that outlines the standards used for configuration management compliance.
This is a sample configuration management policy from the State of North Carolina that outlines the standards used for configuration management compliance.
This blog post highlights the best practices in change management.
This blog post details how security focused configuration management is an active component of security.
This is a security hardening guide for Red Hat Enterprise Linux 8, developed by Red Hat, Inc.
This SANS whitepaper covers how to implement and re-implement change policies.
This guide provides an overview of configuration baselines as it pertains to configuration management in systems engineering.
This is a blog that covers change management and configuration management and their revolutionizing cybersecurity.
IT change management describes the practices designed to ensure successful prioritizing, approval, scheduling, and execution of changes to IT systems.
This site provides examples of templates that can be used throughout change management process such as change management template, change proposal template, change management communications plan template, etc.
This article describes how security configuration management works, the benefits of security configuration management, and how to choose a security configuration management tool.