|
Checklist
Program |
|
Sponsored
by |
|
|
|
|
|
-
DOWNLOAD PAGE -
Special
Notice to Readers of SP 800-70
|
NIST
welcomes and greatly appreciates comments from readers. For SP 800-70,
NIST is especially interested in readers' comments about the following
(comments can be sent to checklists@nist.gov):
- Are
the operational environments plus the custom environments sufficiently
broad to cover the vast majority of your operational environments?
Are the threat statements and general policies sufficiently described?
Is there any criterion you would add or remove?
- For
potential developers of checklists, is the development criteria,
i.e., NIST publications and other checklists, sufficient for building
checklists that contain consistent levels of security? Is the
criteria too broad and general, or is it too specific so as to
potentially exclude certain types of products, or did NIST get
it right? NIST has tried to strike a balance between criteria
that is too restrictive versus criteria that is overly broad.
- Especially
for vendors, is the description of the checklist program participation
requirements straightforward and easy to understand? Are there
special concerns that NIST has failed to address? Do you wish
to participate in the program? Would you use the checklist program
logo?
- For
potential users, does the document adequately explain how to use
checklists? Are the checklist description fields useful? Are there
additional checklist description fields you would add?
- Are
there subjects or issues that NIST did not address but you think
should be included in this publication?
|
Updates
History
|
- 26-May-2005
- Final Release
- 12-Aug-2004
- Initial Draft Release
- 13-Aug-2004:
-
Corrected typos in Appendices C and D
- 20-Aug-2004:
-
Corrected unknown reference typo
|
E-mail
Notification of Updates
|
If
you would like to be notified of updates to Special Publication
800-70, send an e-mail message to checklists@nist.gov
requesting to be on the notification list.
|
|