X hits on this document

Powerpoint document

HHS Cybersecurity Program Training Information Security for Information Technology (IT) Administrato... - page 133 / 158

467 views

0 shares

0 downloads

0 comments

133 / 158

U.S. Department of Health and Human Services

Be sure you know the configuration management routine in your department and follow it consistently. Here is the guidance from NIST SP 800-128 DRAFT:

An information system is typically in a constant state of change in response to new or enhanced hardware and software capability, patches for correcting errors to existing components, new security threats, and changing business functions, etc. Implementing information system changes almost always results in some adjustment to the system baseline configuration. To ensure that the required adjustments to the system configuration do not adversely affect the information system security, a well-defined security configuration management process is needed.

The security configuration management concepts and principles described in this publication provide supporting information for NIST SP 800-53, Revision 3, Recommended Security Controls for Federal Information Systems and Organizations that include the Configuration Management family of security controls and other security controls that draw upon configuration management activities in implementing those controls. This publication also provides important supporting information for the Monitor Step (Step 6) of the Risk Management Framework that is discussed in NIST SP 800-37, Revision 1, Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach.  

Page 1 of 1

Configuration Management

Configuration Management

Document info
Document views467
Page views467
Page last viewedSat Dec 10 22:56:07 UTC 2016
Pages158
Paragraphs2058
Words16945

Comments