Implementing which of the following will BEST help ensure that systems comply with an established baseline before deployment?
A. Continuous monitoring and alerting.
B. Access controls and active logging.
C. Configuration management.
D. Vulnerability scanning.
A. Continuous monitoring and alerting.
B. Access controls and active logging.
C. Configuration management.
D. Vulnerability scanning.