When securing organization’s interconnected IT infrastructure, there is a lot of rules and configuration parameters to set by security teams, and these configurations are often done manually. The security features obviously increases as time goes by, and become quickly unmanageable. Moreover, a security policy to implement isn't that complex and long if it was writen out in [...]