I would like you to show me how configuration and vulnerability management are connected / dependent on each other. and How Configuration management can help in vulnerability management in achieving goals. Would appreciate early response. Thank you.
Configuration management is related to you know which assets you have and how they are configured, while vulnerability management is related to the identification and handling of misconfigurations and threats that can exploit current configurations.
Both configuration and vulnerability management are connected by the fact that by means of configuration management you can:
identify the impact of identified vulnerabilities (e.g., how many devices are vulnerable, which sets of configurations should be analyzed/changed.
prioritize which vulnerabilities to look for first (they would be related to the most critical configurations you have)
This article will provide you a further explanation about vulnerability management: