Which of the following is the MOST effective control to maintain the integrity of system configuration files?
A . Implementing automated vulnerability scanning
B . Restricting access to configuration documentation
C . Recording changes to configuration files
D . Monitoring against the configuration standard
Answer: D