Date Published: September 2011
Author(s)
Andrew Regenscheid (NIST), Geoff Beier (Cygnacom Solutions), Santosh Chokhani (Cygnacom Solutions), Paul Hoffman (VPN Consortium), Jim Knoke (Cygnacom Solutions), Scott Shorter (Cygnacom Solutions)
IT systems used to support UOCAVA voting face a variety of threats. If IT systems are not selected, configured and managed using security practices commensurate with the importance of the services they provide and the sensitivity of the data they handle, a security compromise could carry consequences for the integrity of the election and the confidentiality of sensitive voter information. Failure to adequately address threats to these systems could prevent voters from casting ballots, expose individuals to identity fraud, or even compromise the results of an election. This document offers procedural and technical guidance, along with references to additional resources, to assist jurisdictions with the secure deployment of these systems.
IT systems used to support UOCAVA voting face a variety of threats. If IT systems are not selected, configured and managed using security practices commensurate with the importance of the services they provide and the sensitivity of the data they handle, a security compromise could carry...
See full abstract
IT systems used to support UOCAVA voting face a variety of threats. If IT systems are not selected, configured and managed using security practices commensurate with the importance of the services they provide and the sensitivity of the data they handle, a security compromise could carry consequences for the integrity of the election and the confidentiality of sensitive voter information. Failure to adequately address threats to these systems could prevent voters from casting ballots, expose individuals to identity fraud, or even compromise the results of an election. This document offers procedural and technical guidance, along with references to additional resources, to assist jurisdictions with the secure deployment of these systems.
Hide full abstract
Keywords
best practices; security; Uniformed and Overseas Citizens Absentee Voting Act; UOCAVA; voting; voting systems
Control Families
Audit and Accountability; Identification and Authentication; System and Communications Protection