sting such as pen-testing and vulnerability scanning to identify directories, programs, and interfaces that grant direct access to executables.Implementation: Implement host integrity monitoring to detect any unwanted altering of configuration files.Implementation: Ensure that files that are not required to execute, such as configuration files, are not over-privileged, i.e. not allowed to execute.