Security Configuration Management – core processes

The Security Configuration Management service is responsible for:

  • Developing the security baselines for all of the technologies that exist on the network
  • Distributing the baselines to the applicable stakeholders
  • Scanning and reporting for controls that are non-compliant to organizational standards
  • Assisting is a risk in any exception request reviews

Get Practical Cyber Intelligence now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.