A list of hardware and software configuration settings are maintained
|
|
|
|
|
|
Security settings on hardware and software assets are established for like devices, with unnecessary software, login ids, and services disabled
|
|
|
|
|
|
Only authorized and tested changes are made to the production environment
|
|
|
|
|
|