Configuration Management - University of Cincinnati

Configuration Management Importance: Attackers look for systems with vulnerable default settings Attackers make changes once a system is exploited Security Configuration Management (SCM) can → identify misconfigurations making the system vulnerable → identify “unusual” changes to the system SCM is used to meet CIS, NIST hardening standards ................
................