SEARCH RESULTS


US-CERT – Asset Management Resource Guide     3.4 3.4.1 3.4.3 3.4.4 3.4.5 Configuration Management

https://www.cisa.gov/sites/default/files/c3vp/crr_resources_guides/CRR_Resource_Guide-AM.pdf

This guide was created to assist individuals responsible for designing, managing, or deploying cybersecurity resilience controls, including executives who establish policies and priorities for asset management, managers and planners who are responsible for converting executive decisions into plans, and operations staff who implement the plans and participate in the implementation of organizational assets.

US-CERT – Risk Management Resource Guide     3.4 3.4.1 3.4.3 3.4.4 3.4.5 Configuration Management

https://www.cisa.gov/sites/default/files/c3vp/crr_resources_guides/CRR_Resource_Guide-RM.pdf

This guide was created to assist individuals responsible for managing risk management programs for IT operations, including executives who establish policies and priorities for risk management, managers and planners who are responsible for converting executive decisions into action plans, and operations staff who implement those operational risk management plans.

vmware – What is Network Infrastructure Security?     3.13 3.13.5 3.4 3.4.2 Configuration Management csc11 csc12 csc9 System and Communications Protection

https://www.vmware.com/topics/glossary/content/network-infrastructure-security.html

Network Infrastructure Security, typically applied to enterprise IT environments, is a process of protecting the underlying networking infrastructure by installing preventative measures to deny unauthorized access, modification, deletion, and theft of resources and data.