Take the following actions in response to unauthorized changes to configuration settings: actions.
Responses to unauthorized changes to configuration settings include alerting designated organizational personnel, restoring established configuration settings, or—in extreme cases—halting affected system processing.
actions are taken in response to unauthorized changes to configuration settings.
No cross-framework mappings available