Security & NM are symbioticEdit
Security needs configuration managementEdit
Because configuration management offers a straightforward and relatively inexpensive way to protect against many security threats
For information assurance, configuration management can be defined as the management of security features and assurances through control of changes made to hardware, software, firmware, documentation, test, test fixtures, and test documentation throughout the life cycle of an information system. CM for information assurance, sometimes referred to Secure Configuration Management, relies upon performance, functional, and physical attributes of IT platforms and products and their environments to determine the appropriate security features and assurances that are used to measure a system configuration state.
Network management needs security
In network, management security management is the set of functions that protects telecommunications networks and systems from unauthorized access by persons, acts, or influences and that includes many sub-functions, such as creating, deleting, and controlling security services and mechanisms; distributing security-relevant information; reporting security-relevant events; controlling the distribution of cryptographic keying material; and authorizing subscriber access, rights, and privileges.
Privacy: Traffic stats reveal:
Authentication: Configure devices => control how/if they work.