Securely manage enterprise assets and software. Example implementations include managing
configuration through version-controlled Infrastructure-as-Code (IaC) and accessing administrative
interfaces over secure network protocols, such as Secure Shell (SSH) and Hypertext Transfer
Protocol Secure (HTTPS). Do not use insecure management protocols, such as Telnet (Teletype
Network) and HTTP, unless operationally essential.
The organization secures enterprise assets and software by utilizing Infrastructure-as-Code (IaC) for consistent configuration management
Organization employs secure network protocols like SSH and HTTPS for administrative access, and avoids insecure management protocols and augmenting them with additional security when necessary