Establish, implement, and actively manage (track, report on, correct) the
security configuration of laptops, servers, and workstations using a rigorous
configuration management and change control process in order to prevent
attackers from exploiting vulnerable services and settings.