[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Best Practices checklists
- Subject: Best Practices checklists
- From: Valdis.Kletnieks at vt.edu (Valdis.Kletnieks at vt.edu)
- Date: Thu, 10 Jun 2010 16:33:42 -0400
- In-reply-to: Your message of "Thu, 10 Jun 2010 17:05:35 BST." <[email protected]>
- References: <[email protected]>
On Thu, 10 Jun 2010 17:05:35 BST, Michael Dillon said:
> I expect that the collected members of this list could do a good job
> of defining some network security practices checklists.
Already done for some stuff: http://www.cisecurity.org
You disagree with the content or choices, feel free to join in and help ;)
(Full disclosure: I'll take partial blame for the Solaris, AIX, and
Linux benchmark documents...)
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 227 bytes
Desc: not available
URL: <http://mailman.nanog.org/pipermail/nanog/attachments/20100610/2da49475/attachment.bin>