University of California Berkeley – Change Management Toolkit 3.4 3.4.3 3.4.4 3.4.5 Configuration Management
This document provides tips, tools, and techniques for leading a successful change initiative
This document provides tips, tools, and techniques for leading a successful change initiative
This is UC Berkeley's secure device configuration guideline with adherence to their security policy mandate. This is an example of a how to assess a secure configuration.
This guide was created to assist individuals responsible for designing, managing, or deploying cybersecurity resilience controls, including executives who establish policies and priorities for asset management, managers and planners who are responsible for converting executive decisions into plans, and operations staff who implement the plans and participate in the implementation of organizational assets.
This guidance from US-CERT is intended for organizations seeking help in establishing a configuration and change management process and for organizations seeking to improve their existing configuration and change management process.
This guide was created to assist individuals responsible for managing risk management programs for IT operations, including executives who establish policies and priorities for risk management, managers and planners who are responsible for converting executive decisions into action plans, and operations staff who implement those operational risk management plans.
Network Infrastructure Security, typically applied to enterprise IT environments, is a process of protecting the underlying networking infrastructure by installing preventative measures to deny unauthorized access, modification, deletion, and theft of resources and data.
This is a video from Simplilearn that covers ITIL Change Management process.
This is a video from CIS that covers secure configurations for hardware and software.