Sprinto – Vulnerability to Vigilance: The importance of Security Configuration Management
3.4 3.4.2 Configuration Management
https://sprinto.com/blog/security-configuration-management/
This article describes how security configuration management works, the benefits of security configuration management, and how to choose a security configuration management tool.
https://hr.berkeley.edu/sites/default/files/change_management_toolkit.pdf
This document provides tips, tools, and techniques for leading a successful change initiative
https://security.berkeley.edu/secure-device-configuration-guideline
This is UC Berkeley's secure device configuration guideline with adherence to their security policy mandate. This is an example of a how to assess a secure configuration.
https://www.cisa.gov/sites/default/files/c3vp/crr_resources_guides/CRR_Resource_Guide-RM.pdf
This guide was created to assist individuals responsible for managing risk management programs for IT operations, including executives who establish policies and priorities for risk management, managers and planners who are responsible for converting executive decisions into action plans, and operations staff who implement those operational risk management plans.
Wright Brained – CMMC Practice 3.4.7 – Ports, Protocols, Programs Functions, and Services
3.4 3.4.7 Configuration Management
https://wrightbrainedsecurity.com/cmmc-practice-3-4-7-ports-protocols-programs-functions-and-services/
Most companies don’t struggle with implementing this practice—they struggle with the documentation. When it’s time to show evidence, things can get messy. You need to define exactly what’s “essential” and “nonessential” and provide proof that you’ve applied these definitions consistently across your systems.
https://www.youtube.com/watch?v=PlKsAZrwcD8
This is a video from Simplilearn that covers ITIL Change Management process.
YouTube – CMMC 2.0 Control CM L2-3.4.5 – Define, document, approve, and enforce physical and logical access
3.4 3.4.3 3.4.4 3.4.5 Configuration Management
https://www.youtube.com/watch?v=a0_CLki_X5g
This video explains CMMC Control CM.L2‑3.4.5, which requires organizations to define, document, approve, and enforce physical and logical access restrictions related to changes in organizational systems.
https://www.youtube.com/watch?v=QNRjjkzvWK0
This is a video from CIS that covers secure configurations for hardware and software.