Souppaya, M.
, Wack, J.
and Kent, K.
(2005),
Security configuration checklists program for IT products ::guidance for checklists users and developers, , National Institute of Standards and Technology, Gaithersburg, MD, [online], https://doi.org/10.6028/NIST.SP.800-70
(Accessed December 14, 2024)