Annex A 8.9 - Configuration Management

Configurations, including security configurations, of hardware, software, services, and networks shall be established, documented, implemented, monitored, and reviewed.

Last updated