Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

SP 800-70 Rev. 4 (DRAFT)

National Checklist Program for IT Products: Guidelines for Checklist Users and Developers

Date Published: August 2017
Comments Due: August 30, 2017 (public comment period is CLOSED)
Email Questions to: checklists@nist.gov

Withdrawn: February 15, 2018

Author(s)

Stephen Quinn (NIST), Murugiah Souppaya (NIST), Melanie Cook (NIST), Karen Scarfone (Scarfone Cybersecurity)

Announcement

NIST requests public comments on the release of Draft Special Publication 800-70 Revision 4, National Checklist Program for IT Products: Guidelines for Checklist Users and Developers. Using security configuration checklists to verify the configuration of information technology (IT) products and identify unauthorized configuration changes can minimize product attack surfaces, reduce vulnerabilities, and lessen the impact of successful attacks. To facilitate development of checklists and to make checklists more organized and usable, NIST established the National Checklist Program (NCP). This publication explains how to use the NCP to find and retrieve checklists, and it also describes the policies, procedures, and general requirements for participation in the NCP. 

Abstract

Keywords

change detection; checklist; information security; National Checklist Program (NCP); security configuration checklist; Security Content Automation Protocol (SCAP); software configuration; vulnerability
Control Families

Configuration Management; System and Communications Protection; Audit and Accountability;

Documentation

Publication:
Draft SP 800-70 Rev. 4

Supplemental Material:
None available