Importance of Configuration and Change Management to Security