Jump to content

Checklist: Difference between revisions

From Hackerpedia
imported>Unknown user
No edit summary
imported>Unknown user
No edit summary
(No difference)

Revision as of 02:53, 15 January 2026

Languages: English | Français

Checklist

A document that contains instructions or procedures for configuring an IT product to an operational environment, for verifying that the product has been configured properly, and/or for identifying unauthorized configuration changes to the product. Also referred to as a security configuration checklist, lockdown guide, hardening guide, security guide, security technical implementation guide (STIG), or benchmark.


Source: NIST SP 800-70 Rev. 4 | Category: