Guide: Configuration Management Family
Configuration Management
NIST FIPS 200 | Security Controls for Federal Information Systems |
---|---|
NIST SP 800-100 | Information Security Handbook for Managers |
NIST SP 800-86 | Guide to Integrating Forensic Techniques into Incident Response |
NIST SP 800-83 | Guide to Malware Incident Prevention and Handling |
NIST SP 800-81 | Secure Domain Name System (DNS) Deployment Guide |
NIST SP 800-70 | Security Configuration Checklists Program for IT Products |
NIST SP 800-68 | Guidance for Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist |
NIST SP 800-48 | Wireless Network Security: 802.11, Bluetooth, and Handheld Devices |
NIST SP 800-46 | Security for Telecommuting and Broadband Communications |
NIST SP 800-45 | Guidelines on Electronic Mail Security |
NIST SP 800-44 | Guidelines on Securing Public Web Servers |
NIST SP 800-43 | Systems Administration Guidance for Securing Microsoft Windows 2000 Professional System |
NIST SP 800-40 | Procedures for Handling Security Patches |
NIST SP 800-37 | Guidelines for the Security Certification and Accreditation of Federal Information Technology Systems |
NIST SP 800-35 | Guide to Information Technology Security Services |
NIST SP 800-14 | Generally Accepted Principles and Practices for Securing Information Technology Systems |
NIST SP 800-12 | An Introduction to Computer Security: The NIST Handbook |
Original source for tables: Guide to NIST Security Documents.