Mechanisms exist to detect and respond to unauthorized configuration changes as cybersecurity incidents.
Does the organization detect and respond to unauthorized configuration changes as cybersecurity incidents?