Abstract: This paper will explore the overall concept of security configuration management, its implementation and integration with the change management process. Furthermore, the paper explains the security configuration management life cycle and why it matters. The paper provides an approach to detect and mitigate future risks if proper methods and tools are used. Furthermore, this paper proposes an approach to utilize existing inventories to detect unauthorized changes captured by security configuration management monitoring tools.
Keywords: Baseline, SCM, Security Configuration Management, NIST, CIS.
Title: Security Configuration Management Process, Implementation and Integration
Author: Ziad Alomair, Mohammed Alfraih
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals