Configuration management in information security
Modern IT landscapes require the coordinated interaction of IT resources, network infrastructures, hardware and software applications and various types of services. The key to high-performance and secure operation lies in the proper configuration of all systems, components and applications involved. The new control 8.9 in information security, "Configuration management" from the updated version ...