Skip to content

The National Cybersecurity Center of Excellence's Validating the Integrity of Computing Devices project.

License

Notifications You must be signed in to change notification settings

usnistgov/nccoe-sca

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

79 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Overview

This repository accompanies NIST Cybersecurity Practice Guide 1800-34 - Validating the Integrity of Computing Devices. Visit the National Cybersecurity Center of Excellence (NCCoE) project website for more information and project status.

NIST Cybersecurity Practice Guides (Special Publication 1800 series) target specific cybersecurity challenges in the public and private sectors. They are practical, user-friendly guides that facilitate the adoption of standards-based approaches to cybersecurity. They show members of the information security community how to implement example solutions that help them align with relevant standards and best practices, and provide users with the materials lists, configuration files, and other information they need to implement a similar approach.

This preliminary draft of Volume C describes the steps necessary to set up an environment that focuses on laptop (sometimes referred to by industry as client) and server computing devices. It also provides guidance on the operational usage of manufacturers’ tools that may be useful to your IT personnel who verify that the computing device is acceptable to receive into the acquiring organization.

Participating Collaborators

Organizations participating in this project submitted their capabilities in response to an open call in the Federal Register for all sources of relevant security capabilities from academia and industry (vendors and integrators). The following respondents with relevant capabilities or product components (identified as “Technology Partners/Collaborators” herein) signed a Cooperative Research and Development Agreement to collaborate with NIST in a consortium to build this example solution.

Archer
Dell Technologies
Eclypsium
HP Inc
Hewlett Packard Enterprise
IBM
Intel
National Security Agency
Seagate

Download and Installation

Follow the procedures as outlined in 1800-34 Volume C. This README will be updated if any major changes occur.

Support

The code, scripts, and configuration files are protytpe-level and are not intedended for production systems. If you encounter an issue, feel free to open an issue and the NCCoE project team will help on a best-effort basis.

About

The National Cybersecurity Center of Excellence's Validating the Integrity of Computing Devices project.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published