Guide: Maintenance Topic Cluster
Maintenance
A collection of documents discussing security concerns with systems in the maintenance phase of the System Development Life Cycle.
NIST SP 800-88 | Media Sanitization Guide |
---|---|
NIST SP 800-84 | Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities |
NIST SP 800-83 | Guide to Malware Incident Prevention and Handling |
NIST SP 800-70 | Security Configuration Checklists Program for IT Products |
NIST SP 800-69 | Guidance for Securing Microsoft Windows XP Home Edition: a NIST Security Configuration Checklist |
NIST SP 800-68 | Guidance for Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist |
NIST SP 800-55 | Security Metrics Guide for Information Technology Systems |
NIST SP 800-53 | Security Controls for Federal Information Systems |
NIST SP 800-51 | Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme |
NIST SP 800-44 | Guidelines on Securing Public Web Servers |
NIST SP 800-43 | Systems Administration Guidance for Securing Microsoft Windows 2000 Professional System |
NIST SP 800-41 | Guidelines on Firewalls and Firewall Policy |
NIST SP 800-40 | Procedures for Handling Security Patches |
NIST SP 800-31 | Intrusion Detection Systems (IDSs) |
NIST SP 800-24 | PBX Vulnerability Analysis: Finding Holes in Your PBX Before Someone Else Does |
NIST IR 7284 | Personal Identity Verification Card Management Report |
NIST IR 7275 | Specification for the Extensible Configuration Checklist Description Format (XCCDF) |
NIST IR 6985 | COTS Security Protection Profile - Operating Systems (CSPP-OS) (Worked Example Applying Guidance of NISTIR-6462, CSPP) |
NIST IR 6462 | CSPP - Guidance for COTS Security Protection Profiles |
NIST FIPS 191 | Guideline for The Analysis of Local Area Network Security |
NIST FIPS 188 | Standard Security Labels for Information Transfer |
NIST SB 2005-12 | Preventing and Handling Malware Incidents: How To Protect Information Technology Systems From Malicious Code and Software |
NIST SB 2006-02 | Creating A Program To Manage Security Patches and Vulnerabilities: NIST Recommendations For Improving System Security |
NIST SB 2005-11 | Securing Microsoft Windows XP Systems: NIST Recommendations For Using A Security Configuration Checklist |
NIST SB 2005-10 | National Vulnerability Database: Helping Information Technology System Users and Developers Find Current Information About Cyber Security Vulnerabilities |
NIST SB 2004-10 | Securing Voice Over Internet Protocol (IP) Networks |
NIST SB 2004-01 | Computer Security Incidents: Assessing, Managing, and Controlling The Risks |
NIST SB 2003-11 | Network Security Testing |
NIST SB 2002-12 | Security of Public Web Servers |
NIST SB 2002-10 | Security Patches and The CVE Vulnerability Naming Scheme: Tools To Address Computer System Vulnerabilities |
NIST SB 2002-01 | Guidelines on Firewalls and Firewall Policy |
Original source for tables: Guide to NIST Security Documents.