SlideShare a Scribd company logo
1 of 2
Download to read offline
Identify the three major types of controls that organizations can use to protect their information
resources ?
Solution
1. At secure organizations, information security is supported by senior management. Support
includes making resources and budget available for information security, as well as clear
statements by senior management that information security is a priority for the organization.
Since senior managers establish priorities and set the tone for an organization, it is difficult to be
a secure organization without their clear and consistent support. As a result of the recent spate of
high-profile security breaches, most senior managers now understand the importance of
information security and will support information security efforts.
2. Secure organizations regularly identify and document how sensitive data --customer and/or
proprietary -- flows in, through and out of the organization. This enables an organization to focus
its time, effort and money on protecting its sensitive data. Conversely, it's difficult for an
organization to protect what it doesn't know about, and organizations struggle to protect their
data if they don't perform this exercise
3. Secure organizations create and maintain a formal, documented inventory of all systems that
process, transmit or store sensitive data -- including the operating system, if it's physical or
virtualized, and what major applications have been installed. Without such an inventory, an
organization can't fully understand what systems it must protect. Having such an inventory
allows an organization to quickly determine whether a particular security vulnerability is relevant
to the organization's systems.
4. Secure organizations segment sensitive systems from non-sensitive systems through jump
servers, firewall rules, router ACLs or switch VLANs. This minimizes the attack surface for an
organization's sensitive systems and allows access to the systems to be tightly controlled and
logged.
5. Secure organizations have a strong change-control process that is rigorously enforced.
Changes, including emergency changes, are fully documented then formally reviewed and
approved. Unapproved changes can lead to security vulnerabilities that nobody knows about
until there's a breach.
6. Secure organizations have a strong configuration management process. Sensitive systems are
hardened and built only with necessary functionality via an automated build process or a
managed configuration software tool such as Puppet or Chef. After the initial build,
configuration software tools, which regularly check the configuration of systems, are used to
ensure systems stay hardened or strong change control is used to maintain system configuration
and prevent server creep.

More Related Content

Similar to Identify the three major types of controls that organizations can us.pdf

Homework AssignmentShort Answer Responses.1. Describe the fiv.docx
Homework AssignmentShort Answer Responses.1.  Describe the fiv.docxHomework AssignmentShort Answer Responses.1.  Describe the fiv.docx
Homework AssignmentShort Answer Responses.1. Describe the fiv.docx
adampcarr67227
 
unveiling-the-true-potential-of-identity-strengthening-security-through-compl...
unveiling-the-true-potential-of-identity-strengthening-security-through-compl...unveiling-the-true-potential-of-identity-strengthening-security-through-compl...
unveiling-the-true-potential-of-identity-strengthening-security-through-compl...
Harshada Mulay
 
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docxExcel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
gitagrimston
 
RISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docx
RISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docxRISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docx
RISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docx
joellemurphey
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessment
jenito21
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdf
alokkesh
 
Guide for Applying The Risk Management Framework to Federal Information Systems
Guide for Applying The Risk Management Framework to Federal Information SystemsGuide for Applying The Risk Management Framework to Federal Information Systems
Guide for Applying The Risk Management Framework to Federal Information Systems
Guillermo Remache
 

Similar to Identify the three major types of controls that organizations can us.pdf (20)

Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security Teams
 
Homework AssignmentShort Answer Responses.1. Describe the fiv.docx
Homework AssignmentShort Answer Responses.1.  Describe the fiv.docxHomework AssignmentShort Answer Responses.1.  Describe the fiv.docx
Homework AssignmentShort Answer Responses.1. Describe the fiv.docx
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
 
Ch06 Policy
Ch06 PolicyCh06 Policy
Ch06 Policy
 
COMPUTER SYSTEM SECURITY.docx
COMPUTER SYSTEM SECURITY.docxCOMPUTER SYSTEM SECURITY.docx
COMPUTER SYSTEM SECURITY.docx
 
DR PANKAJ SIR (1).pptx
DR PANKAJ SIR (1).pptxDR PANKAJ SIR (1).pptx
DR PANKAJ SIR (1).pptx
 
Importance of Access Control System for Your Organization Security
Importance of Access Control System for Your Organization SecurityImportance of Access Control System for Your Organization Security
Importance of Access Control System for Your Organization Security
 
Security Ch-1.pptx
Security Ch-1.pptxSecurity Ch-1.pptx
Security Ch-1.pptx
 
unveiling-the-true-potential-of-identity-strengthening-security-through-compl...
unveiling-the-true-potential-of-identity-strengthening-security-through-compl...unveiling-the-true-potential-of-identity-strengthening-security-through-compl...
unveiling-the-true-potential-of-identity-strengthening-security-through-compl...
 
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docxExcel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
insider threat research
insider threat researchinsider threat research
insider threat research
 
Information security - 360 Degree Approach
Information security - 360 Degree ApproachInformation security - 360 Degree Approach
Information security - 360 Degree Approach
 
Bit defender ebook_secmonitor_print
Bit defender ebook_secmonitor_printBit defender ebook_secmonitor_print
Bit defender ebook_secmonitor_print
 
RISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docx
RISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docxRISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docx
RISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docx
 
R.a 1
R.a 1R.a 1
R.a 1
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessment
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdf
 
Guide for Applying The Risk Management Framework to Federal Information Systems
Guide for Applying The Risk Management Framework to Federal Information SystemsGuide for Applying The Risk Management Framework to Federal Information Systems
Guide for Applying The Risk Management Framework to Federal Information Systems
 
A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015
 

More from fasttrackscardecors

Missy Crane opened a public relations firm called Goth on August 1, 2.pdf
Missy Crane opened a public relations firm called Goth on August 1, 2.pdfMissy Crane opened a public relations firm called Goth on August 1, 2.pdf
Missy Crane opened a public relations firm called Goth on August 1, 2.pdf
fasttrackscardecors
 
Justify that the following circuit represents the functionality of a .pdf
Justify that the following circuit represents the functionality of a .pdfJustify that the following circuit represents the functionality of a .pdf
Justify that the following circuit represents the functionality of a .pdf
fasttrackscardecors
 
I have C++ question that I do not know how to do, Can you teach me t.pdf
I have C++ question that I do not know how to do, Can you teach me t.pdfI have C++ question that I do not know how to do, Can you teach me t.pdf
I have C++ question that I do not know how to do, Can you teach me t.pdf
fasttrackscardecors
 
I need proper and details explanation for this case study Financial .pdf
I need proper and details explanation for this case study Financial .pdfI need proper and details explanation for this case study Financial .pdf
I need proper and details explanation for this case study Financial .pdf
fasttrackscardecors
 
How is Vietas contribution to mathematics distinctly modern in spi.pdf
How is Vietas contribution to mathematics distinctly modern in spi.pdfHow is Vietas contribution to mathematics distinctly modern in spi.pdf
How is Vietas contribution to mathematics distinctly modern in spi.pdf
fasttrackscardecors
 
Fungal associations with plants Examine a type of fungal association .pdf
Fungal associations with plants Examine a type of fungal association .pdfFungal associations with plants Examine a type of fungal association .pdf
Fungal associations with plants Examine a type of fungal association .pdf
fasttrackscardecors
 
For each problem in this homework, your assignment is to determine .pdf
For each problem in this homework, your assignment is to determine .pdfFor each problem in this homework, your assignment is to determine .pdf
For each problem in this homework, your assignment is to determine .pdf
fasttrackscardecors
 
For each story problem, identofy the opertaion and the interpretatio.pdf
For each story problem, identofy the opertaion and the interpretatio.pdfFor each story problem, identofy the opertaion and the interpretatio.pdf
For each story problem, identofy the opertaion and the interpretatio.pdf
fasttrackscardecors
 
Describe the flow of oxygenated blood from the placenta to the fe.pdf
Describe the flow of oxygenated blood from the placenta to the fe.pdfDescribe the flow of oxygenated blood from the placenta to the fe.pdf
Describe the flow of oxygenated blood from the placenta to the fe.pdf
fasttrackscardecors
 
Consider the following interrupting system. The active-edge inputs o.pdf
Consider the following interrupting system. The active-edge inputs o.pdfConsider the following interrupting system. The active-edge inputs o.pdf
Consider the following interrupting system. The active-edge inputs o.pdf
fasttrackscardecors
 
Case History- An 11-month old Boy whos blue and short of breathC.pdf
Case History- An 11-month old Boy whos blue and short of breathC.pdfCase History- An 11-month old Boy whos blue and short of breathC.pdf
Case History- An 11-month old Boy whos blue and short of breathC.pdf
fasttrackscardecors
 

More from fasttrackscardecors (20)

On a Sunday in April, dog bite victims arrive at Carver Memorial Hos.pdf
On a Sunday in April, dog bite victims arrive at Carver Memorial Hos.pdfOn a Sunday in April, dog bite victims arrive at Carver Memorial Hos.pdf
On a Sunday in April, dog bite victims arrive at Carver Memorial Hos.pdf
 
Molecules like glucose usually need a special transporter protein to.pdf
Molecules like glucose usually need a special transporter protein to.pdfMolecules like glucose usually need a special transporter protein to.pdf
Molecules like glucose usually need a special transporter protein to.pdf
 
Missy Crane opened a public relations firm called Goth on August 1, 2.pdf
Missy Crane opened a public relations firm called Goth on August 1, 2.pdfMissy Crane opened a public relations firm called Goth on August 1, 2.pdf
Missy Crane opened a public relations firm called Goth on August 1, 2.pdf
 
Justify that the following circuit represents the functionality of a .pdf
Justify that the following circuit represents the functionality of a .pdfJustify that the following circuit represents the functionality of a .pdf
Justify that the following circuit represents the functionality of a .pdf
 
Inventor classwhat is the purpose of using assemply constraints.pdf
Inventor classwhat is the purpose of using assemply constraints.pdfInventor classwhat is the purpose of using assemply constraints.pdf
Inventor classwhat is the purpose of using assemply constraints.pdf
 
IncompressibilityI cant understand some parts in a book.The .pdf
IncompressibilityI cant understand some parts in a book.The .pdfIncompressibilityI cant understand some parts in a book.The .pdf
IncompressibilityI cant understand some parts in a book.The .pdf
 
If you were to illuminate an Elodea leaf with light at 550 nm, would.pdf
If you were to illuminate an Elodea leaf with light at 550 nm, would.pdfIf you were to illuminate an Elodea leaf with light at 550 nm, would.pdf
If you were to illuminate an Elodea leaf with light at 550 nm, would.pdf
 
I have C++ question that I do not know how to do, Can you teach me t.pdf
I have C++ question that I do not know how to do, Can you teach me t.pdfI have C++ question that I do not know how to do, Can you teach me t.pdf
I have C++ question that I do not know how to do, Can you teach me t.pdf
 
I need proper and details explanation for this case study Financial .pdf
I need proper and details explanation for this case study Financial .pdfI need proper and details explanation for this case study Financial .pdf
I need proper and details explanation for this case study Financial .pdf
 
How is Vietas contribution to mathematics distinctly modern in spi.pdf
How is Vietas contribution to mathematics distinctly modern in spi.pdfHow is Vietas contribution to mathematics distinctly modern in spi.pdf
How is Vietas contribution to mathematics distinctly modern in spi.pdf
 
Fungal associations with plants Examine a type of fungal association .pdf
Fungal associations with plants Examine a type of fungal association .pdfFungal associations with plants Examine a type of fungal association .pdf
Fungal associations with plants Examine a type of fungal association .pdf
 
For each problem in this homework, your assignment is to determine .pdf
For each problem in this homework, your assignment is to determine .pdfFor each problem in this homework, your assignment is to determine .pdf
For each problem in this homework, your assignment is to determine .pdf
 
For each story problem, identofy the opertaion and the interpretatio.pdf
For each story problem, identofy the opertaion and the interpretatio.pdfFor each story problem, identofy the opertaion and the interpretatio.pdf
For each story problem, identofy the opertaion and the interpretatio.pdf
 
Explain a. casting b. overloading c. sentinel d. echoSolution.pdf
Explain a. casting b. overloading c. sentinel d. echoSolution.pdfExplain a. casting b. overloading c. sentinel d. echoSolution.pdf
Explain a. casting b. overloading c. sentinel d. echoSolution.pdf
 
Find all the square roots of the complex number 14i. Write the squar.pdf
Find all the square roots of the complex number 14i. Write the squar.pdfFind all the square roots of the complex number 14i. Write the squar.pdf
Find all the square roots of the complex number 14i. Write the squar.pdf
 
Describe the flow of oxygenated blood from the placenta to the fe.pdf
Describe the flow of oxygenated blood from the placenta to the fe.pdfDescribe the flow of oxygenated blood from the placenta to the fe.pdf
Describe the flow of oxygenated blood from the placenta to the fe.pdf
 
describe two different forms of bindingSolutionTwo forms Co.pdf
describe two different forms of bindingSolutionTwo forms Co.pdfdescribe two different forms of bindingSolutionTwo forms Co.pdf
describe two different forms of bindingSolutionTwo forms Co.pdf
 
Connect onnect mheducation.co.pdf
Connect onnect mheducation.co.pdfConnect onnect mheducation.co.pdf
Connect onnect mheducation.co.pdf
 
Consider the following interrupting system. The active-edge inputs o.pdf
Consider the following interrupting system. The active-edge inputs o.pdfConsider the following interrupting system. The active-edge inputs o.pdf
Consider the following interrupting system. The active-edge inputs o.pdf
 
Case History- An 11-month old Boy whos blue and short of breathC.pdf
Case History- An 11-month old Boy whos blue and short of breathC.pdfCase History- An 11-month old Boy whos blue and short of breathC.pdf
Case History- An 11-month old Boy whos blue and short of breathC.pdf
 

Recently uploaded

Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
EADTU
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 

Recently uploaded (20)

Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 

Identify the three major types of controls that organizations can us.pdf

  • 1. Identify the three major types of controls that organizations can use to protect their information resources ? Solution 1. At secure organizations, information security is supported by senior management. Support includes making resources and budget available for information security, as well as clear statements by senior management that information security is a priority for the organization. Since senior managers establish priorities and set the tone for an organization, it is difficult to be a secure organization without their clear and consistent support. As a result of the recent spate of high-profile security breaches, most senior managers now understand the importance of information security and will support information security efforts. 2. Secure organizations regularly identify and document how sensitive data --customer and/or proprietary -- flows in, through and out of the organization. This enables an organization to focus its time, effort and money on protecting its sensitive data. Conversely, it's difficult for an organization to protect what it doesn't know about, and organizations struggle to protect their data if they don't perform this exercise 3. Secure organizations create and maintain a formal, documented inventory of all systems that process, transmit or store sensitive data -- including the operating system, if it's physical or virtualized, and what major applications have been installed. Without such an inventory, an organization can't fully understand what systems it must protect. Having such an inventory allows an organization to quickly determine whether a particular security vulnerability is relevant to the organization's systems. 4. Secure organizations segment sensitive systems from non-sensitive systems through jump servers, firewall rules, router ACLs or switch VLANs. This minimizes the attack surface for an organization's sensitive systems and allows access to the systems to be tightly controlled and logged. 5. Secure organizations have a strong change-control process that is rigorously enforced. Changes, including emergency changes, are fully documented then formally reviewed and approved. Unapproved changes can lead to security vulnerabilities that nobody knows about until there's a breach. 6. Secure organizations have a strong configuration management process. Sensitive systems are hardened and built only with necessary functionality via an automated build process or a managed configuration software tool such as Puppet or Chef. After the initial build, configuration software tools, which regularly check the configuration of systems, are used to
  • 2. ensure systems stay hardened or strong change control is used to maintain system configuration and prevent server creep.