ABSTRACT

Configuration management (CM) supports consistency, completeness, and rigor in implementing security. It also provides a mechanism for determining the current security posture of the organization with regard to technologies being utilized, processes and practices being performed, and a means for evaluating the impact of change on the security stance of the organization. If a new technology is being considered for implementation, an analysis can determine the effects from multiple standpoints:

• Costs to purchase, install, maintain, and monitor • Positive or negative interactions with existing technologies or architectures • Performance • Level of protection • Ease of use • Management practices that must be modified to implement the technology • Human resources who must be trained on the correct use of the new technology, as a

user or as a provider

CM functions serve as a vital base for controlling the present-and for charting the future for an organization in meeting its goals. But looking at CM from a procedural level exclusively might result in the omission of significant processes that could enhance the information security stance of an organization and support mission success.