405 KB | 3 files | PDF
Follow these NIST recommendations on secure configuration of all components of your information systems.
Organizations have to make frequent changes to their information systems in order to implement new and updated hardware and software components, correct software flaws and other errors, address new security threats and adapt to changing business objectives. These constant changes result in adjustments being made to the configuration of information systems; these activities could have an impact on the security of the systems and operations.
In developing information systems, organizations employ many components that can be interconnected in different arrangements to meet the organization’s business, mission and information security needs. To protect information systems and information, organizations need techniques for the secure configuration, operation and management of system components, including mainframes, workstations, servers, networks, operating systems, middleware and applications, and for the management and control of risks to systems and information.
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) has issued a new guide to help organizations develop a well-defined process for managing and controlling secure system configurations and for managing risks in information systems.
Included in this ZIP file are:
Microsoft PowerPoint 2013 is a slide-based presentation software that helps you show your information in a organized, visual manner for easier understanding. ... More >>
Chapter 2 provides an introduction to the role CRM systems play in an organization, examines the anatomy of a CRM system and the type of CRM systems available, and looks at the CRM's role as keeper of customer knowledge assets. ... More >>
This document analyzes approaches to identity management for public safety networks in an effort to assist individuals developing technical and policy requirements for public safety use. ... More >>