Key Concepts 7.3 Perform configuration management Flashcards
Domain 7 (6 cards)
Involves the identification, control, and maintenance of the various
components and settings of an organization’s IT environment. Is essential for maintaining a secure and compliant infrastructure, and for minimizing the
risk of vulnerabilities and misconfigurations.
Configuration management
Establishing and maintaining an accurate inventory of all hardware, software,
and network components
Inventory (key activities related to configuration management)
Defining and enforcing secure configuration baselines and
standards for all components. Deployment automation can ensure consistent implementation
of configuration baselines.
Baselines and standards(key activities related to configuration management)
Implementing change control processes to ensure that all configuration
changes are properly authorized, tested, and documented.
Change management (key activities related to configuration management)
Conducting regular configuration audits and assessments to
identify and remediate any deviations or vulnerabilities.
Assessment and audit (key activities related to configuration management)
Vulnerability scans and assessments can inform a need for
updates to configuration, such as patching. Integrating configuration management with
vulnerability management and other security processes is important to security.
Vulnerability management (key activities related to configuration management)