Configuration Management Guide Focuses on Information System Security

John Storts
Slide Show

Five Security Budget Tips for 2011

Five tips that IT organizations should use to remind the business side why it needs to invest in security.

Information systems are complicated beasts in a perpetual state of flux. Managing and maintaining the security of all the components (routers, switches, workstations, etc.) is no easy task when the system is constantly changing due to new software and hardware, new threats and patches deployed to fix problems with existing components.


In order to prevent adverse effects to system security in the face of such ongoing change, the National Institute of Standards and Technology (NIST) created the Guide for Security Configuration Management of Information Systems. While the guidelines are intended to assist organizations that manage and administer security measures for federal information system computing environments, these principles and concepts can also be applied in private sector businesses and other enterprises.


Whether you manage the system in-house or rely on an external supplier for these computing services, put these guidelines in place to stay on top of security risks and keep pace with change.


More from the Knowledge Network and IT Business Edge

Definitions: Configuration Management

Getting the Most Out of Your CMDB

Contingency Planning Guide for Federal Information Systems

Add Comment      Leave a comment on this blog post

Post a comment





(Maximum characters: 1200). You have 1200 characters left.




Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.