Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

NISTIR 8011 Vol. 2 (Draft)

Automation Support for Security Control Assessments: Hardware Asset Management

Date Published: February 2016
Comments Due: March 18, 2016 (public comment period is CLOSED)
Email Questions to:


Kelley Dempsey (NIST), Paul Eavy (DHS), George Moore (APL)



assessment boundary; assessment method; authorization boundary; automated assessment; automation; capability; continuous diagnostics and mitigation; dashboard; defect; defect check; desired state specification; information security continuous monitoring; mitigation; ongoing assessment; root cause analysis; security automation; security capability; security control; security control assessment; assessment; actual state; security control item
Control Families

Audit and Accountability; Security Assessment and Authorization; Risk Assessment


Draft NISTIR 8011 Vol. 2: Hardware Asset Management

Supplemental Material:
None available

Other Parts of this Publication:
NISTIR 8011 Vol. 1 (Draft)

Document History:
02/02/16: NISTIR 8011 Vol. 2 (Draft)
06/06/17: NISTIR 8011 Vol. 2 (Final)