NATIONAL CHECKLIST PROGRAM FOR IT PRODUCTS: GUIDELINES FOR CHECKLIST USERS AND DEVELOPERS
Federal agencies are required to use appropriate security configuration checklists from the NCP when
available. In February 2008, revised Part 39 of the Federal Acquisition Regulation (FAR) was published.
Paragraph (d) of section 39.101 states, ―In acquiring information technology, agencies shall include the
appropriate IT security policies and requirements, including use of common security configurations
available from the NIST website at http://checklists.nist.gov. Agency contracting officers should consult
with the requiring official to ensure the appropriate standards are incorporated.‖
5
2.3.1 Types of Checklists Listed by National Checklist Program
The NCP deals with checklists that are tied to specific IT products, such as a checklist for a specific brand
and model of a router. Some checklists may guide a user to other checklists. For example, a checklist for a
database product may reference the checklist for the operating system on which the database product runs.
The NCP includes two major groups of checklists:
Automated. An automated checklist is one that is used through one or more tools that automatically
alter or verify settings based on the contents of the checklist. Many checklists are written in
Extensible Markup Language (XML), and there are special tools that can use the contents of the XML
files to check and alter system settings.
6
For example, the Security Content Automation Protocol
(SCAP) is commonly used to express checklist content in a standardized way that can be processed
by tools that support SCAP.
Non-Automated. As the name implies, a non-automated checklist is one that is designed to be used
manually, such as English prose instructions that describe the steps an administrator should take to
secure a system or to verify its security settings.
Security configuration checklists in the NCP can help organizations meet FISMA requirements. FISMA
requires each agency to determine minimally acceptable system configuration requirements and to ensure
compliance with them. Checklists can also map specific technical control settings to the corresponding
NIST SP 800-53 controls, which can make the verification of compliance more consistent and efficient.
Accordingly, federal agencies, as well as vendors of products for the federal government, are encouraged
to acquire or develop and to share such checklists using the NIST repository. The development and
sharing of checklists can reduce what would otherwise be a ―reinvention of the wheel‖ for IT products
that are widely used in the federal government, such as common operating systems, servers, and client
applications.
The NIST checklist repository (located at http://checklists.nist.gov/) contains information on automated
and non-automated checklists that have been developed and screened to meet the requirements of the
NCP. The repository also hosts copies of some checklists, primarily those developed by the federal
government, and has pointers to the other checklists’ locations. Users can browse checklist descriptions to
locate and retrieve a particular checklist using a variety of different fields, including such fields as
product category, vendor name, and submitting organization. A mailing list for the checklist program is
available at http://nvd.nist.gov/home.cfm?emaillist.
5
http://www.acquisition.gov/far/current/html/FARTOCP39.html
6
The Extensible Checklist Configuration Description Format (XCCDF) is an XML-based format for automating tool usage
and eliminating interpretation issues. The XCCDF XML format can be used for both technical checklists (e.g., operating
systems, software applications, and hardware configurations) and non-technical checklists (e.g., physical security for IT
systems). More information on XCCDF is available from NIST Interagency Report (IR) 7275 Revision 3, Specification for
the Extensible Configuration Checklist Description Format (XCCDF) Version 1.1.4, which is available for download at
http://nvd.nist.gov/scap/xccdf/docs/xccdf-spec-1.1.4-20071102.pdf. Another XML-based format for checklists is the Open
Vulnerability and Assessment Language (OVAL), which is used to exchange technical details about how to check for the
presence of vulnerabilities and configuration issues on systems. More information on OVAL is available at
http://oval.mitre.org/.