2019
DOI: 10.6028/nist.sp.800-128
|View full text |Cite
|
Sign up to set email alerts
|

Guide for security-focused configuration management of information systems

Abstract: This publication has been developed by NIST to further its statutory responsibilities under the Federal Information Security Modernization Act of 2014, 44 U.S.C. § 3551 et seq., Public Law (P.L.) 113-283. NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate federal officials exercising policy autho… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0
2

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(27 citation statements)
references
References 0 publications
0
25
0
2
Order By: Relevance
“…• Configuration is "the possible conditions, parameters, and specifications with which an information system or system component can be described or arranged." [23] The Device Configuration capability does not define which configuration settings should exist, simply that a mechanism to manage configuration settings exists.…”
Section: Activity 3: Determine How To Address Customer Goalsmentioning
confidence: 99%
See 1 more Smart Citation
“…• Configuration is "the possible conditions, parameters, and specifications with which an information system or system component can be described or arranged." [23] The Device Configuration capability does not define which configuration settings should exist, simply that a mechanism to manage configuration settings exists.…”
Section: Activity 3: Determine How To Address Customer Goalsmentioning
confidence: 99%
“…"The possible conditions, parameters, and specifications with which an information system or system component can be described or arranged." [23] Core Baseline A set of technical device capabilities needed to support common cybersecurity controls that protect the customer's devices and device data, systems, and ecosystems.…”
Section: 30 Appendix A-acronyms and Abbreviationsmentioning
confidence: 99%
“…• Configuration is "the possible conditions, parameters, and specifications with which an information system or system 520 component can be described or arranged." [18] The Device Configuration feature does not define which configuration settings should exist, simply that a mechanism to manage configuration settings exists. 522…”
Section: Nist Ir 8228 Considerations For Managing Internet Of Thingsmentioning
confidence: 99%
“…"The possible conditions, parameters, and specifications with which an information system or system component can be described or arranged." [18] Core Baseline A set of technical features needed by a generic customer to support common cybersecurity controls that protect the customer's devices and device data, systems, and ecosystems Firmware "Computer programs and data stored in hardware[…]such that the programs and data cannot be dynamically written or modified during execution of the programs." [4] Interface A boundary between the IoT device and entities where interactions take place.…”
mentioning
confidence: 99%
“…The rapid development of information technology, the increasing need for information security transmission, and the biometric-related technology are developing rapidly. Human biometrics refer to the information features produced by human tissue structure, including the iris [2][3][4], face [1,5], fingerprint [6][7][8], voice [9][10][11], DNA [12][13][14], and palm postures [15]. The biological characteristics of human body are widely used in identity recognition and other fields because of their uniqueness.…”
Section: Introductionmentioning
confidence: 99%