Follow strict configuration management, building a secure
image that is used to build all new systems that are deployed
in the enterprise. Any existing system that becomes
compromised should be re-imaged with the secure build.
Regular updates or exceptions to this image should be
integrated into the organization’s change management
processes. Images should be created for workstations,
servers, and other system types used by the organization.