Determine that the current configuration of the CIs match the designed configuration of the CIs. Identify any deviations of the configuration that should be flagged.
Make sure that a copy of a software CI is in a secure library.
©Copyright IBM Corp. 2005, 2008. All Rights Reserved.