Configuration Management controls what?

A.
Auditing of changes to the Trusted Computing Base
B.
Control of changes to the Trusted Computing Base
C.
Changes in the configuration access to the Trusted Computing Base
D.
Auditing and controlling any changes to the Trusted Computing Base
Explanation:
“Official Definition of Configuration Management
Identifying, controlling, accounting for and auditing changes made to the baseline TCB, which
includes changes to hardware, software, and firmware.
A System that will control changes and test documentation through the operational life cycle of a
system.” Pg 698 Shon Harris: All-in-One CISSP Certification
“[B3] The security administrator role is clearly defined, and the system must be able to recover
from failures without its security level being compromised.” Pg. 226 Shon Harris CISSP All-In-One
Exam Guide