Information System Security Best Practices for UOCAVA-Supporting Systems
Andrew R. Regenscheid, Geoff Beier, Santosh Chokhani, Paul Hoffman, Jim Knoke, Scott Shorter
IT systems used to support UOCAVA voting face a variety of threats. If IT systems are not selected, configured and managed using security practices commensurate with the importance of the services they provide and the sensitivity of the data they handle, a security compromise could carry consequences for the integrity of the election and the confidentiality of sensitive voter information. Failure to adequately address threats to these systems could prevent voters from casting ballots, expose individuals to identity fraud, or even compromise the results of an election. This document offers procedural and technical guidance, along with references to additional resources, to assist jurisdictions with the secure deployment of these systems.
, Beier, G.
, Chokhani, S.
, Hoffman, P.
, Knoke, J.
and Shorter, S.
Information System Security Best Practices for UOCAVA-Supporting Systems, NIST Interagency/Internal Report (NISTIR), National Institute of Standards and Technology, Gaithersburg, MD, [online], https://doi.org/10.6028/NIST.IR.7682
(Accessed September 28, 2021)