“It would therefore be desirable to provide systems and methods to automatically facilitate implementation of a secure configuration management strategy in a way that results in an accurate and ...