This is a dedicated watch page for a single video.
A company is experiencing frequent data breaches due to insufficient configuration management in their IT environment. Which of the following actions should an information security manager prioritize to address this issue?