Configuration management objectives when continuous motemplate outlining the security controls for federal information systems

Recommended Security Controls For Federal Information Systems