U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)

ITL Bulletin

Using Security Configuration Checklists and the National Checklist Program

Date Published: May 2011

Author(s)

Shirley Radack (NIST)

Abstract

Keywords

checklists; National Checklist Program; cyber security; Federal Information Processing Standards; Federal Information Security Management Act; FISMA; information security; information systems; information technology (IT); National Checklist Program; National Checklist Repository; NIST Special Publications; product vendors; risk management; security configurations; security controls; security plans; security policy; security requirements; security risks; threats; vulnerabilities
Control Families

None selected

Documentation

Publication:
May 2011 ITL Bulletin

Supplemental Material:
None available

Related NIST Publications:
SP 800-70 Rev. 4
SP 800-179 Rev. 1 (Draft)
SP 800-179

Document History:
05/25/11: ITL Bulletin (Final)

Topics

Security and Privacy
acquisition; security automation

Laws and Regulations
OMB Circular A-130