A company has discovered several critical vulnerabilities in its server infrastructure. The security team decides to follow best practices for configuration management to address these vulnerabilities. Which action aligns best with configuration management principles?
Auditing systems periodically for security compliance
Creating an incident response plan
Implementing secure baseline configurations for all servers
Updating software to the latest versions periodically