Information Systems Security Baseline Configurations Verification and Evaluation