LEADER 03611nam 2200517 450 001 9910703173103321 005 20230308084520.0 035 $a(CKB)2430000000036096 035 $a(NjHacI)992430000000036096 035 $a(OCoLC)712601577 035 $a(EXLCZ)992430000000036096 100 $a20230308d2005 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity configuration checklists program for IT products $eguidance for checklists users and developers (NIST special publication 800-70) /$fMurugiah Souppaya, John P. Wack, Karen Kent 210 1$aGaithersburg, Md. :$cU.S. Dept. of Commerce,$d2005. 215 $a1 online resource (1 volume (various pagings)) $cillustrations (some color) 225 1 $aNIST special publication 300 $aTitle from PDF title screen (NIST, viewed Mar. 24, 2011). 300 $a"May 2005." 300 $a"Sponsored by the Department of Homeland Security"--cover. 320 $aIncludes bibliographical references. 330 $aAbstract: The National Institute of Standards and Technology (NIST) has produced Security Configuration Checklists Program for IT Products: Guidance for Checklist Users and Developers to facilitate the development and dissemination of security configuration checklists so that organizations and individual users can better secure their IT products. A security configuration checklist (sometimes called a lockdown or hardening guide or benchmark) is in its simplest form a series of instructions for configuring a product to a particular security level (or baseline). It could also include templates or automated scripts and other procedures. Typically, checklists are created by IT vendors for their own products; however, checklists are also created by other organizations such as consortia, academia, and government agencies. The use of well-written, standardized checklists can markedly reduce the vulnerability exposure of IT products. Checklists may be particularly helpful to small organizations and individuals that have limited resources for securing their systems. This publication is intended for users and developers of IT product security configuration checklists. For checklist users, this document gives an overview of the NIST Checklist Program, explains how to retrieve checklists from NIST's repository, and provides general information about threat discussions and baseline technical security practices for associated operational environments. For checklist developers, the document sets forth the policies, procedures, and general requirements for participation in the NIST Checklist Program. 410 0$aNIST special publication. 531 $aSECURITY CONFIGURATION CHECKLISTS PROGRAM FOR IT PRODUCTS 606 $aComputer networks$xSecurity measures 606 $aComputer networks$xSecurity measures$zUnited States 606 $aComputer security$xStandards 615 0$aComputer networks$xSecurity measures. 615 0$aComputer networks$xSecurity measures 615 0$aComputer security$xStandards. 676 $a005.8 700 $aSouppaya$b Murugiah$01352527 702 $aKent$b Karen$g(Karen Ann), 702 $aWack$b John P. 712 02$aNational Institute of Standards and Technology (U.S.) 712 02$aUnited States.$bDepartment of Homeland Security. 801 0$bNjHacI 801 1$bNjHacl 906 $aBOOK 912 $a9910703173103321 996 $aSecurity configuration checklists program for IT products$93182649 997 $aUNINA