Based on the results of a recent audit, a company rolled out a standard computer image in an
effort to provide consistent security configurations across all computers. Which of the following
controls provides the GREATEST level of certainty that unauthorized changes are not occurring?
A.
Schedule weekly vulnerability assessments
B.
Implement continuous log monitoring
C.
Scan computers weekly against the baseline
D.
Require monthly reports showing compliance with configuration and updates