The IT Law Wiki
Tag: sourceedit
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
== Definition ==
+
== Definitions ==
   
 
'''Configuration settings''' refer to
 
'''Configuration settings''' refer to
Line 5: Line 5:
 
{{Quote|[t]he set of [[parameter]]s that can be changed in [[hardware]], [[software]], or [[firmware]] that affect the [[security]] posture and/or [[functionality]] of the [[information system]].<ref>[[NIST Special Publication 800-53]], App. B, Glossary.</ref>}}
 
{{Quote|[t]he set of [[parameter]]s that can be changed in [[hardware]], [[software]], or [[firmware]] that affect the [[security]] posture and/or [[functionality]] of the [[information system]].<ref>[[NIST Special Publication 800-53]], App. B, Glossary.</ref>}}
   
{{Quote|the set of [[parameter]]s that can be changed in [[hardware]], [[software]], or [[firmware]] [[component]]s of the [[information system]] that affect the [[security]] posture or [[functionality]] of the [[system]].<ref>[[NIST Special Publication SP 800-171]], at 10.</ref>}}
+
{{Quote|the set of [[parameter]]s that can be changed in [[hardware]], [[software]], or [[firmware]] [[component]]s of the [[information system]] that affect the [[security]] posture or [[functionality]] of the [[system]].<ref>[[NIST Special Publication SP 800-171]], at 10 n.20.</ref>}}
   
 
== Overview ==
 
== Overview ==

Latest revision as of 21:57, 7 July 2017

Definitions[]

Configuration settings refer to

[t]he set of parameters that can be changed in hardware, software, or firmware that affect the security posture and/or functionality of the information system.[1]
the set of parameters that can be changed in hardware, software, or firmware components of the information system that affect the security posture or functionality of the system.[2]

Overview[]

"Information technology products for which security-related configuration settings can be defined include, for example, mainframe computers, servers (e.g., database, electronic mail, authentication, web, proxy, file, domain name), workstations, input/output devices (e.g., scanners, copiers, and printers), network components (e.g., firewalls, routers, gateways, voice and data switches, wireless access points, network appliances, sensors), operating systems, middleware, and applications."[3]

References[]