SunflowerCISSP Community-crafted CISSP™ mastery
Configuration Management -

Configuration Management

Views: 0
Votes: 1 (Avg 5.0)
Management of security features and assurances through control of changes made to hardware, software, firmware, documentation, test, test fixtures, and test documentation throughout the life cycle of an information system. The process of logging, auditing, and monitoring activities related to security controls and security mechanisms over time. This data is then used to identify agents of change, whether objects, subjects, programs, communication pathways, or even the network itself. The use of procedures appropriate for controlling changes to a system’s hardware, software, or firmware structure to ensure that such changes will not lead to a weakness or fault in the system.
Average rating: 5.0 (1 reviews)
Sign in to manage your flashcard decks and leave a comment.

Discussion (0)

No comments yet. Be the first to share your experience with this term.