Step 4: Enforcing secure configuration baselines through automated testing and remediation