A Guide to understanding configuration management in trusted systems