This publication has been developed by nist in accordance with its statutory responsibilities under the federal information security modernization act fisma of 2014 44 u s c.
Nist desktop security standards.
Security testing validation and measurement nist verifies cryptographic modules based on cryptographic standards through the cryptographic module validation program.
For 20 years the computer security resource center csrc has provided access to nist s cybersecurity and information security related projects publications news and events csrc supports stakeholders in government industry and academia both in the u s.
The purpose of the united states government configuration baseline usgcb formerly the federal desktop core configuration fdcc initiative is to create security configuration baselines for information technology products widely deployed across the federal agencies.
In this major update to csrc.
The purpose of the united states government configuration baseline usgcb initiative is to create security configuration baselines for information technology products widely deployed across the federal agencies.
3541 et seq public law p l 113 283.
Nist is responsible for developing information security standards and guidelines incl uding.
The usgcb baseline evolved from the federal desktop core configuration mandate.
The usgcb is a federal government wide initiative that provides guidance to agencies.
Innovation and industrial competitiveness by advancing measurement science standards and technology in ways that enhance economic security and improve our quality of life.
Full virtualization is used for operational efficiency such as in.
Modules validated as conforming to specific standards are accepted by federal agencies for the protection of sensitive information.
Full virtualization technologies run one or more operating systems and their applications on top of virtual hardware.
The purpose of sp 800 125 is to discuss the security concerns associated with full virtualization technologies for server and desktop virtualization and to provide recommendations for addressing these concerns.
A security configuration checklist also called a lockdown hardening guide or benchmark is a series of instructions or procedures for configuring an it product to a particular operational environment for verifying that the product has been configured properly and or for.