In the context of vulnerability management reporting, what is the primary role of configuration management?
To maintain an ongoing record of system configurations and changes for assessing potential risks
To document the decisions of the governance board regarding data handling
To routinely delete unused files and applications to prevent security breaches
To frequently reset system configurations to their default settings to minimize vulnerabilities