Virtually
Every enterprise use SCM for Compliance
How SCM is used? Security configuration management (SCM) is a "must-have" solution for hardening IT systems and network devices (routers, switches, and other network components) and for demonstrating compliance with regulatory standards. Virtually every enterprise and government used security configuration management (SCM) whether perform manually or use the system tool as part of a defense-in-depth strategy and as a means of verifying compliance with regulatory standards.
From an IT security perspective, hardening computer systems is a fundamental step toward securing the network, from assess to understanding vulnerability and exploitable weaknesses, missing security controls, recommendation to hardened configurations.
From an IT operations perspective, failing to comply with industry and/or government regulations can result not only in security breaches but also in costly fines for noncompliance. Security configuration management (SCM) gives organisations a clear path to achieving regulatory compliance and makes it easy to demonstrate compliance through a variety of prebuilt reports and templates.