NIST SP 800-70 Rev 4 A security configuration checklist is a document that contains instructions or procedures for configuring an information technology (IT) product to an operational environment, for verifying that the product has been configured properly, and/or for identifying unauthorized changes to the product. Using these checklists can minimize the attack surface, reduce vulnerabilities, lessen the impact of successful attacks, and identify changes that might otherwise go undetected. Why buy a book you can download for free? We print this book so you dont have to. First you gotta find a good clean (legible) copy and make sure its the latest version (not always easy). Some documents found on the web are missing some pages or the image quality is so poor, they are difficult to read. We look over each document carefully and replace poor quality images by going back to the original source document. We proof each document to make sure its all there including all changes. If you find a good copy, you could print it using a network printer you share with 100 other people (typically its either out of paper or toner). If its just a 10-page document, no problem, but if its 250-pages, you will need to punch 3 holes in all those pages and put it in a 3-ring binder. Takes at least an hour. Its much more cost-effective to just order the latest version from Amazon.com This book includes original commentary which is copyright material. Note that government documents are in the public domain. We print these large documents as a service so you dont have to. The books are compact, tightly-bound, full-size (8 by 11 inches), with large text and glossy covers. If you like the service we provide, please leave positive review on Amazon.com.