This is a potential security issue, you are being redirected to https://csrc.nist.rip
As part of a holistic risk management strategy and applying the information security concept of defense-in-depth, organizations should employ appropriate configuration settings on commercial information technology products that compose their organizational systems. These products include, for example, mainframe computers, workstations, portable and mobile devices, and network components. Requirements to establish mandatory configuration settings derive from the Federal Information Security Management Act as implemented by FIPS 200 and NIST Special Publication 800-53 Rev. 4 (Security Control CM-6, Configuration Settings), and OMB Policy.
The following links provide important information for organizations implementing configuration settings on their system components:
Security and Privacy: risk management
Laws and Regulations: E-Government Act, Federal Information Security Modernization Act