administrators configure a single system with desired settings, capture it as an image, and then deploy the image to other systems. This ensures all of the systems are deployed in a similar secure state.
- Chapter 5 Protecting Security of Assets
- from CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Edition
- Publisher: Sybex
- Released: September 2015
Define the imaging process.
Share this highlighthttp://www.safaribooksonline.com/a/cissp-isc2-certified/10970936/