Configuration management is a process of requesting, tracking, and approving all changes to a system. It not only involves the identification, control, and auditing of all changes made to a system, it also pertains to all hardware, software, network, and any other changes that pertain to security.
Provide an example of a situation where change control was not followed that resulted with a disastrous result. (This may or may not be real)
Then identify the necessary steps that should have been included as part of the change control process.