All
All

Managing the Configuration of Information Systems with a Focus on Security

405 KB | 3 files |  PDF

Follow these NIST recommendations on secure configuration of all components of your information systems.

Organizations have to make frequent changes to their information systems in order to implement new and updated hardware and software components, correct software flaws and other errors, address new security threats and adapt to changing business objectives. These constant changes result in adjustments being made to the configuration of information systems; these activities could have an impact on the security of the systems and operations.

In developing information systems, organizations employ many components that can be interconnected in different arrangements to meet the organization’s business, mission and information security needs. To protect information systems and information, organizations need techniques for the secure configuration, operation and management of system components, including mainframes, workstations, servers, networks, operating systems, middleware and applications, and for the management and control of risks to systems and information.

The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) has issued a new guide to help organizations develop a well-defined process for managing and controlling secure system configurations and for managing risks in information systems.

Included in this ZIP file are:

  • Intro Page.pdf
  • Terms and Conditions.pdf
  • Secure Configuration Management of Information Systems.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

NIST is a non-regulatory federal agency within the U.S. Department of Commerce. NIST's mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards and technology in ways that enhance economic security and improve our quality of life.

All IT Downloads from National Institute of Standards and Technology» | Visit National Institute of Standards and Technology »
Related IT Downloads

IT_Man31 Microsoft SharePoint 2013 Cheat Sheet

This SharePoint 2013 Cheat Sheet covers program fundamentals, as well as tips on managing documents, accessing wikis and blogs, and task management. ...  More >>

Infra4 Screening for Factors Affecting Application Performance in Profiling Measurements

This report provides an example application of screening techniques in experimental computer science, including validation and selection of metrics and measures, the screening experiment itself, and supporting statistical methods. ...  More >>

Infra29 Microsoft Word 2013 Cheat Sheet

This Word 2013 Cheat Sheet from CustomGuide covers program fundamentals, as well as essential keyboard shortcuts for navigation, editing and formatting. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data


Thanks for your registration, follow us on our social networks to keep up-to-date