![]() ![]() This vulnerability could be exploited to spread computer worms, install ransomware or another type of malware.Īutomation is valuable for another reason, it greatly improves the efficiency and makes configuration management of large systems manageable.Ĭonfiguration management applies to a variety of systems, but most often, you’ll be concerned with these: Without automation, a single engineer forgetting to update a piece of software can leave a system with an outdated version of the software that has a known vulnerability listed on CVE. This is why teams use different tools like Puppet, Ansible, Terraform and other configuration management tools.īy using automation, it's easier to build in checks and redundancies, improving the potential for omissions due to human error and the accuracy for keeping assets in the desired state. ![]() Most configuration management involves a high degree of automation to achieve these goals. It's sometimes referred to as IT automation. Configuration management (CM) is a systems engineering process for establishing and maintaining consistency of a product's performance, functional, and physical attributes with its requirements, design, and operational information throughout its life.Ĭonfiguration management is a form of IT service management (ITSM) as defined by ITIL that ensures the configuration of system resources, computer systems, servers and other assets are known, good and trusted. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |