This is a potential security issue, you are being redirected to https://csrc.nist.gov.
You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.
Date Published: February 2018
Supersedes:
SP 800-70 Rev. 3 (12/08/2016)
A security configuration checklist is a document that contains instructions or procedures for configuring an information technology (IT) product to an operational environment, for verifying that the product has been configured properly, and/or for identifying unauthorized changes to the product. Using these checklists can minimize the attack surface, reduce vulnerabilities, lessen the impact of successful attacks, and identify changes that might otherwise go undetected. To facilitate development of checklists and to make checklists more organized and usable, NIST established the National Checklist Program (NCP). This publication explains how to use the NCP to find and retrieve checklists, and it also describes the policies, procedures, and general requirements for participation in the NCP.
A security configuration checklist is a document that contains instructions or procedures for configuring an information technology (IT) product to an operational environment, for verifying that the product has been configured properly, and/or for identifying unauthorized changes to the product. Using these checklists can minimize the attack surface, reduce vulnerabilities, lessen the impact of successful attacks, and identify changes that might otherwise go undetected. To facilitate development of checklists and to make checklists more organized and usable, NIST established the National Checklist Program (NCP). This publication explains how to use the NCP to find and retrieve checklists, and it also describes the policies, procedures, and general requirements for participation in the NCP.
Audit and Accountability; Configuration Management; System and Communications Protection
Publication:
https://doi.org/10.6028/NIST.SP.800-70r4
Download URL
Supplemental Material:
National Checklist Program
Related NIST Publications:
Document History:
02/15/18: SP 800-70 Rev. 4 (Final)
audit & accountability, configuration management, security automation, vulnerability management
Technologies Laws and RegulationsCyber Security R&D Act, Federal Information Security Modernization Act, OMB Circular A-130