http://gcn.com/articles/2011/08/16/nist-configuration-security-rules.aspx By William Jackson GCN.com Aug 16, 2011 Change is the one constant for most information systems and managing changes in configuration is an essential element of IT security. “The configuration of an information system and its components has a direct impact on the security posture of the system,” the National Institute of Standards and Technology writes in newly released guidelines for configuration management. “How those configurations are established and maintained requires a disciplined approach for providing adequate security," it adds. Special Publication 800-128, Guide for Security-Focused Configuration Management of Information Systems, supports other publications and standards for configuration management, including SP 800-53, Recommended Security Controls for Federal Information Systems and Organizations. [...] ___________________________________________________________ Tegatai Managed Colocation: Four Provider Blended Tier-1 Bandwidth, Fortinet Universal Threat Management, Natural Disaster Avoidance, Always-On Power Delivery Network, Cisco Switches, SAS 70 Type II Datacenter. Find peace of mind, Defend your Critical Infrastructure. http://www.tegataiphoenix.com/Received on Tue Aug 16 2011 - 23:54:07 PDT
This archive was generated by hypermail 2.2.0 : Tue Aug 16 2011 - 23:51:34 PDT