Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).
NIST Authors in Bold
|Author(s):||Stephen D. Quinn; Karen A. Scarfone; Murugiah P. Souppaya;|
|Title:||National Checklist Program for IT Products Guidelines for Checklist Users and Developers|
|Published:||September 30, 2009|
|Abstract:||[Superseded by SP 800-70 Rev. 2 (February 2011): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907732] A security configuration checklist is a series of instructions for configuring a product to a particular operational environment. Checklists can comprise templates or automated scripts, patches or patch descriptions, XML files, and other procedures. Checklists are intended to be tailored by each organization to meet its particular security and operational requirements. The use of well-written, standardized checklists can markedly reduce the vulnerability exposure of IT products. This publication gives an overview of the NIST National Checklist Program, explains how to retrieve checklists from the NIST National Checklist Repository, and provides general information about threat discussions and baseline technical security practices for associated operational environments. [Supersedes SP 800-70 (May 2005): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150235]|
|Citation:||Special Publication (NIST SP) - 800-70 Rev 1|
|Keywords:||Checklist, National Checklist Program, security checklist, security configuration, security configuration checklist|