Hi all, here's our article on a high level overview of how proper configuration management relates to IT security: https://www.jasonclause.com/configuration-management-cybersecurity/ -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.stevens.edu/pipermail/cs615asa/attachments/20200412/f376e046/attachment.html>