We have defined all system configuration parameters. For each parameter, we have defined its security and auditability requirements and whether it is used only during initialization or can be changed while the system is running.
We have documented how to set each value and have provided guidance for setting it correctly.