Once upon a time, one week before the release meeting: "Oh, no! We need the FCA/PCA Report to pass the release checklist!"
...Today...
Let's take a closer look at how Configuration Management and Cyber Security
processes are related and blossom together. For example, detecting
vulnerabilities based on a sBoM or integrating specific tools and tracking
the results of their execution.