All
All

Managing the Configuration of Information Systems with a Focus on Security

405 KB | 3 files |  PDF

Follow these NIST recommendations on secure configuration of all components of your information systems.

Organizations have to make frequent changes to their information systems in order to implement new and updated hardware and software components, correct software flaws and other errors, address new security threats and adapt to changing business objectives. These constant changes result in adjustments being made to the configuration of information systems; these activities could have an impact on the security of the systems and operations.

In developing information systems, organizations employ many components that can be interconnected in different arrangements to meet the organization’s business, mission and information security needs. To protect information systems and information, organizations need techniques for the secure configuration, operation and management of system components, including mainframes, workstations, servers, networks, operating systems, middleware and applications, and for the management and control of risks to systems and information.

The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) has issued a new guide to help organizations develop a well-defined process for managing and controlling secure system configurations and for managing risks in information systems.

Included in this ZIP file are:

  • Intro Page.pdf
  • Terms and Conditions.pdf
  • Secure Configuration Management of Information Systems.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

NIST is a non-regulatory federal agency within the U.S. Department of Commerce. NIST's mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards and technology in ways that enhance economic security and improve our quality of life.

All IT Downloads from National Institute of Standards and Technology» | Visit National Institute of Standards and Technology »
Related IT Downloads

Misc33 Microsoft PowerPoint 2013 Cheat Sheet

Microsoft PowerPoint 2013 is a slide-based presentation software that helps you show your information in a organized, visual manner for easier understanding. ...  More >>

BYOD1 Implementing SAPĀ® CRM: The Guide for Business and Technology Managers

Chapter 2 provides an introduction to the role CRM systems play in an organization, examines the anatomy of a CRM system and the type of CRM systems available, and looks at the CRM's role as keeper of customer knowledge assets. ...  More >>

Global13 Considerations for Identity Management in Public Safety Networks

This document analyzes approaches to identity management for public safety networks in an effort to assist individuals developing technical and policy requirements for public safety use. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date