Mechanisms exist to validate configurations through integrity checking of software and firmware.
Does the organization validate configurations through integrity checking of software and firmware?