Date Published: December 9, 2025
Comments Due: January 16, 2026 (public comment period is CLOSED)
Email Questions to:
[email protected]
NIST established the National Checklist Program (NCP) to facilitate the generation of security checklists from authoritative sources, centralize the location of checklists, and make checklists broadly accessible. SP 800-70r5 ipd describes the uses, benefits, and management of checklists and checklist control catalogs, as well as the policies, procedures, and general requirements for participation in the NCP.
A security configuration checklist is a document or technical content that contains instructions or procedures for securely configuring an IT product to match an operational environment’s risk tolerance, verifying that the product has been configured properly, and/or identifying unauthorized changes to the product. Using these checklists can minimize the attack surface, reduce vulnerabilities, lessen the impacts of successful attacks, and identify changes that might otherwise go undetected.
This revision introduces significant updates to improve usability, automation, and alignment with modern cybersecurity practices.
This document is intended for users and developers of security configuration.
NOTE: A call for patent claims is included in this draft. For additional information, see the Information Technology Laboratory (ITL) Patent Policy – Inclusion of Patents in ITL Publications.
None selected
Publication:
https://doi.org/10.6028/NIST.SP.800-70r5.ipd
Download URL
Supplemental Material:
National Checklist Program
Document History:
12/09/25: SP 800-70 Rev. 5 (Draft)
audit & accountability, configuration management, security automation, vulnerability management
Technologies Laws and RegulationsCyber Security R&D Act, Federal Information Security Modernization Act, OMB Circular A-130