Tag Archives: IT vulnerabilities

Configuration Management: IT Hygiene Reorganized


Configuration Management

The IT security landscape is in flux and, subsequently, it affects how IT security experts function. Keeping data of companies safe is an increasingly uphill task given the growing number and intensity of threats. Configuration Management is an option that has been ignored for long due to its laborious nature. But, in the future, companies may no longer have this choice.

What is it?

Configuration Management (CM) is a systems engineering process for establishing and maintaining consistency of a product’s performance, functional and physical attributes with its requirements, design and operational information throughout its life1. In software engineering, software CM tracks and controls changes in software and included revision control. Continue reading Configuration Management: IT Hygiene Reorganized