An IS auditor reviewing a recently implemented virtual environment notices discrepancies among similar machine setups. Which of the following should the auditor recommend to minimize configuration risks?
A. Implement network best practice recommendations
B. Perform architectural vulnerability analysis to compare current system attributes to a reference
C. Perform hypervisor software updates with available patches to minimize security weakness
D. Implement templates to manage rapid deployment of virtual machines
A. Implement network best practice recommendations
B. Perform architectural vulnerability analysis to compare current system attributes to a reference
C. Perform hypervisor software updates with available patches to minimize security weakness
D. Implement templates to manage rapid deployment of virtual machines