Define, develop, and validate baseline security configurations for operating systems, applications, and networking and telecommunications equipment, including policy assessment and compliance tools, network security appliances, and host-based security systems (VMS report review and co-ordination)