[フレーム]
You are viewing this page in an unauthorized frame window.

This is a potential security issue, you are being redirected to https://csrc.nist.gov.

You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

    Publications

ITL Bulletin

Using Security Configuration Checklists and the National Checklist Program

Documentation Topics

Date Published: May 2011

Author(s)

Shirley Radack (NIST)

Abstract

This bulletin summarizes the information presented in NIST Special Publication (SP) 800-70 Rev. 2, National Checklist Program for IT Products—Guidelines for Checklist Users and Developers: Recommendations of the National Institute of Standards and Technology. The publication was written by Stephen D. Quinn and Murugiah Souppaya of the National Institute of Standards and Technology (NIST), and by Melanie Cook and Karen Scarfone of G2, Inc. It helps both users and developers of security configuration checklists, and includes general information about threats and fundamental technical security practices for operational environments. The bulletin discusses the contents of the publication, including the selection, evaluation, testing and application of checklists to IT products by users. The bulletin also summarizes information for checklist developers about the policies, procedures, and general requirements for participation in the NIST National Checklist Program (NCP). References are provided to sources of information on NIST’s activities to support both checklist users and developers.
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-70 Rev. 2, National Checklist Program for IT Products—Guidelines for Checklist Users and Developers: Recommendations of the National Institute of Standards and Technology. The publication was written by Stephen... See full abstract
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-70 Rev. 2, National Checklist Program for IT Products—Guidelines for Checklist Users and Developers: Recommendations of the National Institute of Standards and Technology. The publication was written by Stephen D. Quinn and Murugiah Souppaya of the National Institute of Standards and Technology (NIST), and by Melanie Cook and Karen Scarfone of G2, Inc. It helps both users and developers of security configuration checklists, and includes general information about threats and fundamental technical security practices for operational environments. The bulletin discusses the contents of the publication, including the selection, evaluation, testing and application of checklists to IT products by users. The bulletin also summarizes information for checklist developers about the policies, procedures, and general requirements for participation in the NIST National Checklist Program (NCP). References are provided to sources of information on NIST’s activities to support both checklist users and developers.
Hide full abstract

Keywords

checklists; National Checklist Program; cyber security; Federal Information Processing Standards; Federal Information Security Management Act; FISMA; information security; information systems; information technology (IT); National Checklist Program; National Checklist Repository; NIST Special Publications; product vendors; risk management; security configurations; security controls; security plans; security policy; security requirements; security risks; threats; vulnerabilities
Control Families

None selected

Documentation

Publication:
Download (pdf)

Supplemental Material:
None available

Related NIST Publications:
SP 800-70 Rev. 4
SP 800-179 Rev. 1 (Draft)
SP 800-179
SP 800-179 (Draft)

Document History:
05/25/11: ITL Bulletin (Final)

Topics

Security and Privacy

acquisition, security automation

Laws and Regulations

OMB Circular A-130

AltStyle によって変換されたページ (->オリジナル) /