Which of the following activities is usually part of the configuration management process, but is also extremely helpful in countering potential attacks? (D4.2L4.2.3)