Mechanisms exist to configure systems utilized in high-risk areas with more restrictive baseline configurations.
Does the organization configure systems utilized in high-risk areas with more restrictive baseline configurations?