SANS Institute - Critical Security Control: 3 | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
Establish, implement, and actively manage (track, report on, correct) the security configuration of laptops, servers, and workstations using a rigorous configuration management and change control process in order to prevent attackers from exploiting vulnerable services and settings.