All
All

Managing the Configuration of Information Systems with a Focus on Security

405 KB | 3 files |  PDF

Follow these NIST recommendations on secure configuration of all components of your information systems.

Organizations have to make frequent changes to their information systems in order to implement new and updated hardware and software components, correct software flaws and other errors, address new security threats and adapt to changing business objectives. These constant changes result in adjustments being made to the configuration of information systems; these activities could have an impact on the security of the systems and operations.

In developing information systems, organizations employ many components that can be interconnected in different arrangements to meet the organization’s business, mission and information security needs. To protect information systems and information, organizations need techniques for the secure configuration, operation and management of system components, including mainframes, workstations, servers, networks, operating systems, middleware and applications, and for the management and control of risks to systems and information.

The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) has issued a new guide to help organizations develop a well-defined process for managing and controlling secure system configurations and for managing risks in information systems.

Included in this ZIP file are:

  • Intro Page.pdf
  • Terms and Conditions.pdf
  • Secure Configuration Management of Information Systems.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

NIST is a non-regulatory federal agency within the U.S. Department of Commerce. NIST's mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards and technology in ways that enhance economic security and improve our quality of life.

All IT Downloads from National Institute of Standards and Technology» | Visit National Institute of Standards and Technology »

Related IT Downloads

Template Sample Business Intelligence Contract

“Getting Innovation Right: How Leaders Leverage Inflection Points to Drive Success,” written by Seth Kahan, reveals how your company can secure real traction and growth in the marketplace. ...  More >>

Job Description: Open Source Developer Job Description: Open Source Developer

Evaluate your next Open Source developer candidate with the help of this sample job description....  More >>

System Integrity Best Practices System Integrity Best Practices

Software authenticity and the assurance of user identity are two key components of system integrity. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data