Early identification and mitigation of security vulnerabilities. Reuse of security strategies and tools. Identify system configuration issues.
Explanation:
Security policy provides the foundational management layer between enterprise applications and the underlying infrastructure – firewalls, network devices, public, private or hybrid clouds, and containers. Unifying security policy allows you to automate network changes while maintaining security
Early identification and mitigation of security vulnerabilities. Reuse of security strategies and tools. Identify system configuration issues iiv-ocjf-inb