https://www.smartsheet.com/free-change-management-templates
This site provides examples of templates that can be used throughout change management process such as change management template, change proposal template, change management communications plan template, etc.
https://conf.splunk.com/files/2017/slides/using-splunk-to-assess-and-implement-critical-security-control-3-secure-configurations-for-hardware-and-software.pdf
This is a presentation from a Splunk Conference on how to use splunk to assess and implement critical security control #3 which is secure configurations for hardware and software.
The University of Texas at Austin Information Security Office – System Hardening Guides
3.4 3.4.6 Configuration Management
https://security.utexas.edu/admin
This link provides various system hardening guides used by the University of Texas at Austin.
https://security.berkeley.edu/secure-device-configuration-guideline
This is UC Berkley’s secure device configuration guideline with adherence to their security policy mandate. This is an example of a how to assess a secure configuration.
https://www.cisa.gov/sites/default/files/c3vp/crr_resources_guides/CRR_Resource_Guide-AM.pdf
This guide was created to assist individuals responsible for designing, managing, or deploying cybersecurity resilience controls, including executives who establish policies and priorities for asset management, managers and planners who are responsible for converting executive decisions into plans, and operations staff who implement the plans and participate in the implementation of organizational assets.
https://www.cisa.gov/sites/default/files/c3vp/crr_resources_guides/CRR_Resource_Guide-CCM.pdf
This guidance from US-CERT is intended for organizations seeking help in establishing a configuration and change management process and for organizations seeking to improve their existing configuration and change management process.
https://www.cisa.gov/sites/default/files/c3vp/crr_resources_guides/CRR_Resource_Guide-RM.pdf
This guide was created to assist individuals responsible for managing risk management programs for IT operations, including executives who establish policies and priorities for risk management, managers and planners who are responsible for converting executive decisions into action plans, and operations staff who implement those operational risk management plans.
https://www.vmware.com/topics/network-infrastructure-security
Network Infrastructure Security, typically applied to enterprise IT environments, is a process of protecting the underlying networking infrastructure by installing preventative measures to deny unauthorized access, modification, deletion, and theft of resources and data.
https://www.youtube.com/watch?v=PlKsAZrwcD8
This is a video from Simplilearn that covers ITIL Change Management process.
https://www.youtube.com/watch?v=QNRjjkzvWK0
This is a video from CIS that covers secure configurations for hardware and software.