DRAFTS

[1]
Barker E (2019) Recommendation for Cryptographic Key Generation. https://doi.org/10.6028/NIST.SP.800-133r1-draft
[2]
Barker E (2019) Recommendation for Key Management: Part 1 - General. https://doi.org/10.6028/NIST.SP.800-57pt1r5-draft
[3]
Barker E, Chen L, Davis R (2020) Recommendation for Key-Derivation Methods in Key-Establishment Schemes. https://doi.org/10.6028/NIST.SP.800-56Cr2-draft
[4]
Barker E, Roginsky A, Davis R (2020) Recommendation for Cryptographic Key Generation. https://doi.org/10.6028/NIST.SP.800-133r2-draft
[5]
Barker W, Polk W, Souppaya M (2020) Getting Ready for Post-Quantum Cryptography: Explore Challenges Associated with Adoption and Use of Post-Quantum Cryptographic Algorithms. https://doi.org/10.6028/NIST.CSWP.15.ipd
[6]
Barrett M, Keller N, Quinn S, Smith M, Scarfone K (2020) National Cybersecurity Online Informative References (OLIR) Program: Submission Guidance for OLIR Developers. https://doi.org/10.6028/NIST.IR.8278A-draft
[7]
Bartock M (2020) Hardware-Enabled Security for Server Platforms: Enabling a Layered Approach to Platform Security for Cloud and Edge Computing Use Cases. https://doi.org/10.6028/NIST.CSWP.14.ipd
[8]
Bartock M (2021) (Draft) Hardware-Enabled Security: Enabling a Layered Approach to Platform Security for Cloud and Edge Computing Use Cases. https://doi.org/10.6028/NIST.IR.8320-draft
[9]
Boyens J (2021) (Draft) Supply Chain Risk Management Practices for Federal Information Systems and Organizations: Revision 1. https://doi.org/10.6028/NIST.SP.800-161r1-draft
[10]
Boyens JM (2020) Key Practices in Cyber Supply Chain Risk Management: Observations from Industry. https://doi.org/10.6028/NIST.IR.8276-draft
[11]
Brandão LTAN, Davidson M, Vassilev A (2019) Towards NIST Standards for Threshold Schemes for Cryptographic Primitives: A Preliminary Roadma. https://doi.org/10.6028/NIST.IR.8214A-draft
[12]
Butler JM (2018) NIST Scientific Foundation Reviews. https://doi.org/10.6028/NIST.IR.8225-draft
[13]
Butler JM (2021) (Draft) DNA Mixture Interpretation: A NIST Scientific Foundation Review. https://doi.org/10.6028/NIST.IR.8351-draft
[14]
Byers R, Waltermire D, Turner C (2020) National Vulnerability Database (NVD) Metadata Submission Guidelines for Common Vulnerabilities and Exposures (CVE) Numbering Authorities (CNAs) and Authorized Data Publishers. https://doi.org/10.6028/NIST.IR.8246-draft
[15]
Cawthra J (2020) Securing Data Integrity Against Ransomware Attacks: Using the NIST Cybersecurity Framework and NIST Cybersecurity Practice Guides. https://doi.org/10.6028/NIST.CSWP.17.ipd
[16]
Chandramouli R (2019) Security Strategies for Microservices-based Application Systems. https://doi.org/10.6028/NIST.SP.800-204-draft
[17]
Chandramouli R, Butcher Z (2020) Building Secure Microservices-based Applications Using Service-Mesh Architecture. https://doi.org/10.6028/NIST.SP.800-204A-draft
[18]
Chandramouli R, Pinhas D (2020) Security Guidelines for Storage Infrastructure. https://doi.org/10.6028/NIST.SP.800-209-draft
[19]
Chen L (2021) Recommendation for Key Derivation Using Pseudorandom Functions, Revision 1 (Draft). https://doi.org/10.6028/NIST.SP.800-108r1-draft
[20]
Cichonski J (2019) Cybersecurity Framework Manufacturing Profile Low Security Level Example Implementations Guide: Volume 1 - General Implementation Guidance. https://doi.org/10.6028/NIST.IR.8183A-1-draft
[21]
Cichonski J (2019) Cybersecurity Framework Manufacturing Profile Low Security Level Example Implementations Guide: Volume 2 - Process-based Manufacturing System Use Case. https://doi.org/10.6028/NIST.IR.8183A-2-draft
[22]
Cichonski J (2019) Cybersecurity Framework Manufacturing Profile Low Security Level Example Implementations Guide: Volume 3 - Discrete-based Manufacturing System Use Case. https://doi.org/10.6028/NIST.IR.8183A-3-draft
[23]
Cooper DA (2019) Recommendation for Stateful Hash-Based Signature Schemes. https://doi.org/10.6028/NIST.SP.800-208-draft
[24]
Dempsey K, Eavy P, Moore G, Takamura E (2019) Automation Support for Security Control Assessments: Software Vulnerability Management. https://doi.org/10.6028/NIST.IR.8011-4-draft
[25]
Dempsey K, Pillitteri V, Baer C, Rudman R, Niemeyer R, Urban S (2020) ISCMA: An Information Security Continuous Monitoring Program Assessment. https://doi.org/10.6028/NIST.IR.8212-draft
[26]
Dempsey K, Pillitteri VY, Baer C, Niemeyer R, Rudman R, Urban S (2020) Assessing Information Security Continuous Monitoring (ISCM) Programs: Developing an ISCM Program Assessment. https://doi.org/10.6028/NIST.SP.800-137A-draft
[27]
Dworkin M (2019) Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption. https://doi.org/10.6028/NIST.SP.800-38Gr1-draft
[28]
Fagan M (2020) IoT Device Cybersecurity Guidance for the Federal Government: An Approach for Establishing IoT Device Cybersecurity Requirements. https://doi.org/10.6028/NIST.SP.800-213-draft
[29]
Fagan M (2020) Profile of the IoT Core Baseline for the Federal Government. https://doi.org/10.6028/NIST.IR.8259B-draft
[30]
Fagan M, Megas KN, Scarfone K, Smith M (2019) Core Cybersecurity Features Baseline for Securable IoT Devices: A Starting Point for IoT Device Manufacturers. https://doi.org/10.6028/NIST.IR.8259-draft
[31]
Fagan M, Megas KN, Scarfone K, Smith M (2020) Recommendations for IoT Device 2 Manufacturers: Foundational Activities and Core Device Cybersecurity 4 Capability Baseline. https://doi.org/10.6028/NIST.IR.8259-draft2
[32]
Fagan M, Yang M, Tan A, Randolph L, Scarfone K (2019) Security Review of Consumer Home 16 Internet of Things (IoT) Products. https://doi.org/10.6028/NIST.IR.8267-draft
[33]
Falco J, Van Wyk K, Messina E (2018) Performance Metrics and Test Methods for Robotic Hands. https://doi.org/10.6028/NIST.SP.1227-draft
[34]
Falco J, Van Wyk K, Messina E (2018) Proposed Standard Terminology for Robotic Hands and Associated Performance Metrics. https://doi.org/10.6028/NIST.SP.1229-draft
[35]
Fisher W (2021) (Draft) Using Mobile Device Biometrics for Authenticating First Responders. https://doi.org/10.6028/NIST.IR.8334-draft
[36]
Fisher W (2021) (Draft) Background on Identity Federation Technologies for the Public Safety Community. https://doi.org/10.6028/NIST.IR.8336-draft
[37]
Fisher W (2021) (Draft) Identity as a Service for Public Safety Organizations. https://doi.org/10.6028/NIST.IR.8335-draft
[38]
Franklin J (2018) Security Analysis of the Personal Area Network: The Future of Public Safety Technology. https://doi.org/10.6028/NIST.IR.8196-draft
[39]
Franklin JM, Howell G (2020) Guidelines for Managing the Security of Mobile Devices in the Enterprise. https://doi.org/10.6028/NIST.SP.800-124r2-draft
[40]
Howell G (2020) Security Guidance for First Responder Mobile and Wearable Devices. https://doi.org/10.6028/NIST.IR.8235-draft
[41]
Hu VC (2020) General Access Control Guidance for Cloud Systems. https://doi.org/10.6028/NIST.SP.800-210-draft
[42]
Hu VC (2019) Attribute Considerations for Access Control Systems. https://doi.org/10.6028/NIST.SP.800-205-draft
[43]
Hu VC (2021) Machine Learning for Access Control Policy Verification. https://doi.org/10.6028/NIST.IR.8360-draft
[44]
Joint Task Force (2020) Control Baselines for Information Systems and Organizations. https://doi.org/10.6028/NIST.SP.800-53B-draft
[45]
JOINT TASK FORCE (2021) Assessing Security and Privacy Controls in Information Systems and Organizations (Draft). https://doi.org/10.6028/NIST.SP.800-53Ar5-draft
[46]
Joint Task Force Transformation Initiative (2020) Security and Privacy Controls for Information Systems and Organizations. https://doi.org/10.6028/NIST.SP.800-53r5-draft
[47]
Keller N, Quinn S, Scarfone K, Smith M, Johnson V (2020) National Cybersecurity Online Informative References (OLIR) Program: Guidance for OLIR Users and Developers. https://doi.org/10.6028/NIST.IR.8278-draft
[48]
Keller N, Quinn S, Scarfone K, Smith M, Johnson V (2020) National Cybersecurity Online Informative References (OLIR) Program: Program Overview and OLIR Uses. https://doi.org/10.6028/NIST.IR.8278-draft2
[49]
Kuhn DR, Raunak MS, Kacker RN (2021) Combination Frequency Differencing. https://doi.org/10.6028/NIST.CSWP.22.ipd
[50]
Kuhn DR, Raunak MS, Kacker RN (2021) Combinatorial Coverage Difference Measurement. https://doi.org/10.6028/NIST.CSWP.19.ipd
[51]
Lesavre L, Varin P, Yaga D (2020) Blockchain Networks: Token Design and Management Overview. https://doi.org/10.6028/NIST.IR.8301-draft
[52]
Lyle JR, Guttman B, Butler JM, Sauerwein K, Reed C, Lloyd CE (2022) Digital Investigation Techniques: A NIST Scientific Foundation Review. https://doi.org/10.6028/NIST.IR.8354-draft
[53]
Marron J (2021) Draft Election Infrastructure Profile. https://doi.org/10.6028/NIST.IR.8310-draft
[54]
Megas KN, Cuthill B, Gupta S (2021) Establishing Confidence in IoT Device Security: How do we get there? https://doi.org/10.6028/NIST.CSWP.18.ipd
[55]
National Institute of Standards and Technology (2018) Return on investment initiative for unleashing American innovation. https://doi.org/10.6028/NIST.SP.1234-draft
[56]
National Institute of Standards and Technology (2019) Randomness Beacon Format 2.0. https://doi.org/10.6028/NIST.IR.8213-draft
[57]
National Institute of Standards and Technology (2019) Guide to IPsec VPNs: Revision 1. https://doi.org/10.6028/NIST.SP.800-77r1-draft
[58]
National Institute of Standards and Technology (2019) Guideline for Using Cryptographic Standards in the Federal Government: Cryptographic Mechanisms, Revision 1. https://doi.org/10.6028/NIST.SP.800-175Br1-draft
[59]
National Institute of Standards and Technology (2019) A Taxonomic Approach to Understanding Emerging Blockchain Identity Management Systems. https://doi.org/10.6028/NIST.CSWP.9.ipd
[60]
National Institute of Standards and Technology (2020) Hardware-Enabled Security: Container Platform Security Prototype. https://doi.org/10.6028/NIST.IR.8320A-draft
[61]
Paulsen C, Boyens J, Ng J, Winkler K, Gimbi J (2020) Impact analysis tool for interdependent cyber supply chain risks. https://doi.org/10.6028/NIST.IR.8272-draft
[62]
Petersen R, Santos D, Smith M, Witte G (2020) Workforce Framework for Cybersecurity (NICE Framework). https://doi.org/10.6028/NIST.SP.800-181r1-draft
[63]
Phillips PJ, Hahn CA, Fontana PC, Broniatowski DA, Przybocki MA (2020) Four Principles of Explainable Artificial Intelligence. https://doi.org/10.6028/NIST.IR.8312-draft
[64]
Quinn S (2020) Advancing Cybersecurity and Enterprise Risk Management (ERM): Improving Communications and Risk Information Sharing Using the Risk Register. https://doi.org/10.6028/NIST.IR.8286-draft
[65]
Regenscheid A (2019) Digital Signature Standard (DSS): Elliptic Curve Domain Parameters. https://doi.org/10.6028/NIST.FIPS.186-5-draft
[66]
Regenscheid A (2019) Recommendations for Discrete-Logarithm Based Cryptography: Elliptic Curve Domain Parameters. https://doi.org/10.6028/NIST.SP.800-186-draft
[67]
Rose S (2021) Planning for a Zero Trust Architecture: A Starting Guide for Administrators (Draft). https://doi.org/10.6028/NIST.CSWP.20.ipd
[68]
Rose S (2021) Developing Cyber Resilient Systems: A Systems Security Engineering Approach, Volume 2, Revision 1 (Draft). https://doi.org/10.6028/NIST.SP.800-160v2r1-draft
[69]
Rose S, Borchert O, Mitchell S, Connelly S (2019) Zero Trust Architecture. https://doi.org/10.6028/NIST.SP.800-207-draft
[70]
Rose S, Borchert O, Mitchell S, Connelly S (2020) Zero Trust Architecture. https://doi.org/10.6028/NIST.SP.800-207-draft2
[71]
Ross R (2020) Enhanced Security Requirements for Protecting Controlled Unclassified Information: A Supplement to NIST Special Publication 800-171. https://doi.org/10.6028/NIST.SP.800-172-draft
[72]
Ross R (2022) (Draft) Engineering Trustworthy Secure Systems: Volume 1. https://doi.org/10.6028/NIST.SP.800-160v1r1-draft
[73]
Ross R, Pillitteri V, Dempsey K (2021) (Draft) Assessing Enhanced Security Requirements for Controlled Unclassified Information. https://doi.org/10.6028/NIST.SP.800-172A-draft
[74]
Scarfone K (2018) Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks. https://doi.org/10.6028/NIST.IR.8228-draft
[75]
Schaffer K (2021) Ontology for Authentication. https://doi.org/10.6028/NIST.IR.8344-draft
[76]
Schaffer K (2021) (Draft) Recommendations for Federal Vulnerability Disclosure Guidelines. https://doi.org/10.6028/NIST.SP.800-216-draft
[77]
Scholl M (2021) (Draft) Introduction to Cybersecurity for Commercial Satellite Operations. https://doi.org/10.6028/NIST.IR.8270-draft
[78]
Souppaya M (2020) Methodology for Characterizing Network Behavior of Internet of Things Devices. https://doi.org/10.6028/NIST.CSWP.12.ipd
[79]
Souppaya M, Scarfone K, Dodson D (2021) Secure Software Development Framework (SSDF) Version 1.1: (Draft): Recommendations for Mitigating the Risk of Software Vulnerabilities. https://doi.org/10.6028/NIST.SP.800-218-draft
[80]
Sriram K (2018) Secure Interdomain Traffic Exchange. https://doi.org/10.6028/NIST.SP.800-189-draft
[81]
Sriram K, Montgomery D (2019) Resilient Interdomain Traffic Exchange: 3 BGP Security and DDoS Mitigation. https://doi.org/10.6028/NIST.SP.800-189-draft2
[82]
Stanton B, Jensen T (2021) Trust and Artificial Intelligence. https://doi.org/10.6028/NIST.IR.8332-draft
[83]
Stine K (2021) Prioritizing Cybersecurity Risk for Enterprise Risk Management (Draft). https://doi.org/10.6028/NIST.IR.8286B-draft
[84]
Stine K, Quinn S, Witte G, Gardner RK (2020) Integrating Cybersecurity and Enterprise Risk Management (ERM). https://doi.org/10.6028/NIST.IR.8286-draft2
[85]
Stouffer K, Pease M, Tang C, Zimmerman T, Pillitteri V, Lightman S (2022) Guide to Operational Technology (OT) Security: Initial Public Draft. https://doi.org/10.6028/NIST.SP.800-82r3.ipd
[86]
Stouffer K, Zimmerman T, Tang C, Lubell J, Cichonski J, Pease M, McCarthy J (2020) Cybersecurity Framework Version 1.1 Manufacturing Profile. https://doi.org/10.6028/NIST.IR.8183r1-draft
[87]
Symington S, Polk W, Souppaya M (2020) Trusted Internet of Things (IoT) Device Network-Layer Onboarding and Lifecycle Management (Draft). https://doi.org/10.6028/NIST.CSWP.16.ipd
[88]
Tabassi E, Burns KJ, Hadjimichael M, Molina-Markham AD, Sexton JT (2019) A taxonomy and terminology of adversarial machine learning. https://doi.org/10.6028/NIST.IR.8269-draft
[89]
Voas J (2021) (Draft) Considerations for Digital Twins Standards. https://doi.org/10.6028/NIST.IR.8356-draft
[90]
Voas J (2022) (Draft) Cybersecurity Considerations for Open Banking Technology and Emerging Standards. https://doi.org/10.6028/NIST.IR.8389-draft
[91]
Wetzel K (2021) Draft NICE Framework Competencies. https://doi.org/10.6028/NIST.IR.8355-draft
[92]
National Institute of Standards                    and Technology (2020) Personal Identity Verification (PIV) of Federal Employees and Contractors. https://doi.org/10.6028/NIST.FIPS.201-3-draft
[93]
National Institute of Standards                    and Technology (2020) Foundational Cybersecurity Activities for IoT Device Manufacturers C. https://doi.org/10.6028/NIST.IR.8259C-draft
[94]
National Institute of Standards                    and Technology (2020) Foundational Cybersecurity Activities for IoT Device Manufacturers D. https://doi.org/10.6028/NIST.IR.8259D-draft
[95]
National Institute of Standards                    and Technology (2020) Integrating Cybersecurity and Enterprise Risk Management (ERM) A. https://doi.org/10.6028/NIST.IR.8286A-draft
[96]
National Institute of Standards                    and Technology (2021) Attribute-based Access Control for Microservices-based Applications Using a Service Mes. https://doi.org/10.6028/NIST.SP.800-204B-draft
[97]
National Institute of Standards                    and Technology (2021) Managing the Security of Information Exchanges. https://doi.org/10.6028/NIST.SP.800-47r1-draft
[98]
Barker E (2024) Recommendation for Random Bit Generator (RBG) Constructions. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-90C 4pd, p NIST SP 800-90C 4pd. https://doi.org/10.6028/NIST.SP.800-90C.4pd
[99]
Barker E (2024) Transitioning the Use of Cryptographic Algorithms and Key Lengths. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-131Ar3 ipd, p NIST SP 800-131Ar3 ipd. https://doi.org/10.6028/NIST.SP.800-131Ar3.ipd
[100]
Barker E, Kelsey J, McKay K, Roginsky A, Turan MS (2022) Recommendation for Random Bit Generator (RBG) Constructions. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-90C 3pd, p NIST SP 800-90C 3pd. https://doi.org/10.6028/NIST.SP.800-90C.3pd
[101]
Barker WC, Scarfone K, Fisher W, Souppaya M (2021) Cybersecurity Framework Profile for Ransomware Risk Management. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.IR.8374-draft
[102]
Bartock M (2022) Foundational PNT Profile: Applying the Cybersecurity Framework for the Responsible Use of Positioning, Navigation, and Timing (PNT) Services. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8323r1 ipd, p NIST IR 8323r1 ipd. https://doi.org/10.6028/NIST.IR.8323r1.ipd
[103]
Bartock M (2022) Hardware Enabled Security: Machine Identity Management and Protection. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8320C.ipd, p NIST IR 8320C.ipd. https://doi.org/10.6028/NIST.IR.8320C.ipd
[104]
Bartock M (2024) Applying 5G Cybersecurity and Privacy Capabilities: Introduction to the White Paper Series. (National Institute of Standards and Technology, Gaithersburg, MD), NIST CSWP 36 ipd, p NIST CSWP 36 ipd. https://doi.org/10.6028/NIST.CSWP.36.ipd
[105]
Bartock M (2024) Protecting Subscriber Identifiers with Subscription Concealed Identifier (SUCI): Applying 5G Cybersecurity and Privacy Capabilities. (National Institute of Standards and Technology, Gaithersburg, MD), NIST CSWP 36A ipd, p NIST CSWP 36A ipd. https://doi.org/10.6028/NIST.CSWP.36A.ipd
[106]
Bartock M (2024) Reallocation of Temporary Identities: Applying 5G Cybersecurity andPrivacy Capabilities. (National Institute of Standards and Technology, Gaithersburg, MD), NIST CSWP 36C ipd, p NIST CSWP 36C ipd. https://doi.org/10.6028/NIST.CSWP.36C.ipd
[107]
Bartock M (2024) Using Hardware-Enabled Security to Ensure 5G System Platform Integrity: Applying 5G Cybersecurity and Privacy Capabilities. (National Institute of Standards and Technology, Gaithersburg, MD), NIST CSWP 36B ipd, p NIST CSWP 36B ipd. https://doi.org/10.6028/NIST.CSWP.36B.ipd
[108]
Bartock M, Brule J, Li-Baboud Y-S, Lightman S, McCarthy J, Reczek K, Northrip D, Scholz A, Suloway T (2020) Cybersecurity Profile for the Responsible Use of Positioning, Navigation and Timing (PNT) Services. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8323-draft, p NIST IR 8323-draft. https://doi.org/10.6028/NIST.IR.8323-draft
[109]
Bartock M, Souppaya M, Savino R, Knoll T, Shetty U, Cherfaoui M, Yeluri R, Malhotra A, Banks D, Jordan M, Pendarakis D, Rao JR, Romness P, Scarfone K (2021) Hardware-Enabled Security: Enabling a Layered Approach to Platform Security for Cloud and Edge Computing Use Cases. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.IR.8320-draft2
[110]
Bartock M, Souppaya M, Wheeler J, Knoll T, Ramalingam M, Righi S (2023) Hardware Enabled Security: Hardware-Based Confidential Computing. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8320D ipd, p NIST IR 8320D ipd. https://doi.org/10.6028/NIST.IR.8320D.ipd
[111]
Bartock M, Souppaya M, Xia H, Yeluri R, Shetty U, Lum B, Sabath M, Singh H, Youssef A, Steinder G, Cao Y, Ramanathan J (2021) Hardware-Enabled Security: Policy-Based Governance in Trusted Container Platforms. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.IR.8320B-draft
[112]
Bojanova I (2024) Bug Framework (BF): Formalizing Cybersecurity Weaknesses and Vulnerabilities. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-231 ipd, p NIST SP 800-231 ipd. https://doi.org/10.6028/NIST.SP.800-231.ipd
[113]
Booth H (2024) Secure Software Development Practices for Generative AI and Dual-Use Foundation Models: An SSDF Community Profile. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-218A ipd, p NIST SP 800-218A ipd. https://doi.org/10.6028/NIST.SP.800-218A.ipd
[114]
Boyens J (2024) NIST Cybersecurity Framework 2.0: C-SCRM. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 1306 ipd, p NIST SP 1306 ipd. https://doi.org/10.6028/NIST.SP.1306.ipd
[115]
Boyens J, Smith A, Bartol N, Winkler K, Holbrook A, Fallon M (2021) Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.SP.800-161r1-draft2
[116]
Brandao L, Davidson M (2022) Notes on Threshold EdDSA/Schnorr Signatures. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8214B ipd, p NIST IR 8214B ipd. https://doi.org/10.6028/NIST.IR.8214B.ipd
[117]
Buller D (2022) Discussion on the Full Entropy Assumption of the SP 800-90 Series. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8427 ipd, p NIST IR 8427 ipd. https://doi.org/10.6028/NIST.IR.8427.ipd
[118]
Butler JM (2022) Bitemark Analysis: A NIST Scientific Foundation Review. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8352-draft, p NIST IR 8352-draft. https://doi.org/10.6028/NIST.IR.8352-draft
[119]
Celi C (2024) Automation of the NIST Cryptographic Module Validation Program and the NIST. (National Institute of Standards and Technology, Gaithersburg, MD), NIST CSWP 37 ipd, p NIST CSWP 37 ipd. https://doi.org/10.6028/NIST.CSWP.37.ipd
[120]
Chandramouli R (2021) Implementation of DevSecOps for a Microservices-based Application with Service Mesh. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.SP.800-204C-draft
[121]
Chandramouli R (2022) Guide to Secure Enterprise Network Access Landscape. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-215 ipd, p NIST SP 800-215 ipd. https://doi.org/10.6028/NIST.SP.800-215.ipd
[122]
Chandramouli R (2023) A Zero Trust Architecture Model for Access Control in Cloud Native Applications in Multi-Cloud Environments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-207A ipd, p NIST SP 800-207A ipd. https://doi.org/10.6028/NIST.SP.800-207A.ipd
[123]
Chandramouli R (2023) Strategies for Integration of Software Supply Chain Security in DevSecOps CI/CD Pipelines. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-204D ipd, p NIST SP 800-204D ipd. https://doi.org/10.6028/NIST.SP.800-204D.ipd
[124]
Chandramouli R (2024) A Data Protection Approach for Cloud-Native Applications. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8505 ipd, p NIST IR 8505 ipd. https://doi.org/10.6028/NIST.IR.8505.ipd
[125]
Chandramouli R (2024) Service Mesh Proxy Models for Cloud-Native Applications. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-233 ipd, p NIST SP 800-233 ipd. https://doi.org/10.6028/NIST.SP.800-233.ipd
[126]
Cuthill B (2024) Cybersecurity Requirements for Consumer-Grade Router Products. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8425pt1 ipd, p NIST IR 8425pt1 ipd. https://doi.org/10.6028/NIST.IR.8425pt1.ipd
[127]
Cuthill B (2024) Recommended Cybersecurity Requirements for Consumer-Grade Router Products. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8425A ipd, p NIST IR 8425A ipd. https://doi.org/10.6028/NIST.IR.8425A.ipd
[128]
Dang Q (2024) Recommendation for Additional Parameter Sets for the Stateless Hash-Based Digital Signature Scheme. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-230 ipd, p NIST SP 800-230 ipd. https://doi.org/10.6028/NIST.SP.800-230.ipd
[129]
Davidson M (2023) State Machine Replication and Consensus with Byzantine Adversaries. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8460 ipd, p NIST IR 8460 ipd. https://doi.org/10.6028/NIST.IR.8460.ipd
[130]
Dunaway M (2024) Global Community Technology Challenge (GCTC) Strategic Plan 2024-2026: Smart City Infrastructure Program. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 1900-207 ipd, p NIST SP 1900-207 ipd. https://doi.org/10.6028/NIST.SP.1900-207.ipd
[131]
Fagan M (2022) Profile of the IoT Core Baseline for Consumer IoT Products. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8425.ipd, p NIST IR 8425.ipd. https://doi.org/10.6028/NIST.IR.8425.ipd
[132]
Fagan M (2024) Product Development Cybersecurity Handbook: Concepts and Considerations for IoT Product Manufacturers. (National Institute of Standards and Technology, Gaithersburg, MD), NIST CSWP 33 ipd, p NIST CSWP 33 ipd. https://doi.org/10.6028/NIST.CSWP.33.ipd
[133]
Ferraiolo H, Mehta K, Francomacaro S, Gupta S (2023) Interfaces for Personal Identity Verification: Part 1 – PIV Card Application Namespace, Data Model, and Representation. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-73pt1-5 ipd, p NIST SP 800-73pt1-5 ipd. https://doi.org/10.6028/NIST.SP.800-73pt1-5.ipd
[134]
Ferraiolo H, Mehta K, Francomacaro S, Chandramouli R, Gupta S (2023) Interfaces for Personal Identity Verification: Part 2 – PIV Card Application Card Command Interface. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-73pt2-5 ipd, p NIST SP 800-73pt2-5 ipd. https://doi.org/10.6028/NIST.SP.800-73pt2-5.ipd
[135]
Ferraiolo H, Mehta K, Francomacaro S, Chandramouli R, Gupta S (2023) Interfaces for Personal Identity Verification: Part 3 – PIV Client Application Programming Interface. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-73pt3-5 ipd, p NIST SP 800-73pt3-5 ipd. https://doi.org/10.6028/NIST.SP.800-73pt3-5.ipd
[136]
Ferraiolo H, Regenscheid A (2023) Cryptographic Algorithms and Key Sizes for Personal Identity Verification. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-78-5 ipd, p NIST SP 800-78-5 ipd. https://doi.org/10.6028/NIST.SP.800-78-5.ipd
[137]
Ferraiolo H, Regenscheid A, Fenton J (2023) Guidelines for Derived Personal Identity Verification (PIV) Credentials. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-157r1 ipd, p NIST SP 800-157r1 ipd. https://doi.org/10.6028/NIST.SP.800-157r1.ipd
[138]
Ferraiolo H, Regenscheid A, Gupta S, Ghadiali N (2023) Guidelines for the Authorization of PIV Card and Derived PIV Credential Issuers. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-79r3 ipd, p NIST SP 800-79r3 ipd. https://doi.org/10.6028/NIST.SP.800-79r3.ipd
[139]
Ferraiolo H, Regenscheid A, Richer J (2023) Guidelines for Personal Identity Verification (PIV) Federation. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-217 ipd, p NIST SP 800-217 ipd. https://doi.org/10.6028/NIST.SP.800-217.ipd
[140]
Fisher B (2024) Multifactor Authentication for Law Enforcement Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8523 ipd, p NIST IR 8523 ipd. https://doi.org/10.6028/NIST.IR.8523.ipd
[141]
Foti J (2022) Advanced Encryption Standard (AES). (National Institute of Standards and Technology, Gaithersburg, MD), NIST FIPS 197 upd1 ipd, p NIST FIPS 197 upd1 ipd. https://doi.org/10.6028/NIST.FIPS.197-upd1.ipd
[142]
Galluzzo R (2023) Implementation Guidance for the VVSG 2.0: Multi-Factor Authentication. (National Institute of Standards and Technology, Gaithersburg, MD), NIST VTS 200-2 ipd, p NIST VTS 200-2 ipd. https://doi.org/10.6028/NIST.VTS.200-2.ipd
[143]
Garfnkel S (2022) De-Identifying Government Data Sets. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-188 3pd, p NIST SP 800-188 3pd. https://doi.org/10.6028/NIST.SP.800-188.3pd
[144]
Gilbert D (2024) NIST Cybersecurity Framework 2.0: Privacy Framework. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 1307 ipd, p NIST SP 1307 ipd. https://doi.org/10.6028/NIST.SP.1307.ipd
[145]
Grother P (2022) Face Recognition Vendor Test (FRVT) Part 8: Summarizing Demographic Differentials. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8429 ipd, p NIST IR 8429 ipd. https://doi.org/10.6028/NIST.IR.8429.ipd
[146]
Guo Y (2024) High-Performance Computing Security Control Overlay. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-234 ipd, p NIST SP 800-234 ipd. https://doi.org/10.6028/NIST.SP.800-234.ipd
[147]
Guo Y, Chandramouli R, Wofford L, Gregg R, Key G, Clark A, Hinton C, Prout A, Reuther A, Adamson R, Warren A, Bangalore P, Deumens E, Farkas C (2023) High Performance Computing (HPC) Security: Architecture and Security Posture. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-223 ipd, p NIST SP 800-223 ipd. https://doi.org/10.6028/NIST.SP.800-223.ipd
[148]
Hawes D (2022) CMVP Security Policy Requirements: CMVP Validation Authority Updates to ISO/IEC 24759 and ISO/IEC 19790 Annex B. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-140Br1 2pd, p NIST SP 800-140Br1 2pd. https://doi.org/10.6028/NIST.SP.800-140Br1.2pd
[149]
Hawes D, Calis A, Crombie R (2022) CMVP Security Policy Requirements: CMVP Validation Authority Updates to ISO/IEC 24759 and ISO/IEC 19790 Annex B. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.SP.800-140Br1.ipd
[150]
Herman M, Iorga M, Salim AM, Jackson R, Hurst M, Leo R, Mishra AK, Landreville N, Wang Y (2023) NIST Cloud Computing Forensic Reference Architecture. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-201 ipd, p NIST SP 800-201 ipd. https://doi.org/10.6028/NIST.SP.800-201.ipd
[151]
Howell GE (2024) Cybersecurity Framework Voter Registration Profile. (National Institute of Standards and Technology, Gaithersburg, MD), NIST VTS 200-6 ipd, p NIST VTS 200-6 ipd. https://doi.org/10.6028/NIST.VTS.200-6.ipd
[152]
Hu VC (2023) Overview and Considerations of Access Control Based on Attribute Encryption. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8450 ipd, p NIST IR 8450 ipd. https://doi.org/10.6028/NIST.IR.8450.ipd
[153]
Hu VC (2024) Access Control on NoSQL Databases. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8504 ipd, p NIST IR 8504 ipd. https://doi.org/10.6028/NIST.IR.8504.ipd
[154]
Hu VC (2024) Security Property Verification by Transition Model. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8539 ipd, p NIST IR 8539 ipd. https://doi.org/10.6028/NIST.IR.8539.ipd
[155]
Hu VC (2021) Blockchain for Access Control Systems. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.IR.8403-draft
[156]
Keller N, Quinn S, Scarfone K, Smith M, Johnson V (2022) National Online Informative References (OLIR) Program: Overview, Benefits, and Use. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8278r1 ipd, p NIST IR 8278r1 ipd. https://doi.org/10.6028/NIST.IR.8278r1.ipd
[157]
Keller N, Quinn S, Scarfone K, Smith M, Johnson V (2022) National Online Informative References (OLIR) Program: Submission Guidance for OLIR Developers. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8278Ar1 ipd, p NIST IR 8278Ar1 ipd. https://doi.org/10.6028/NIST.IR.8278Ar1.ipd
[158]
LaSalle C, Howell G, Martinez L (2023) Cybersecurity for Research: Findings and Possible Paths Forward. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8481 ipd, p NIST IR 8481 ipd. https://doi.org/10.6028/NIST.IR.8481.ipd
[159]
Laskowski SJ (2021) (Draft) Promoting Access to Voting: Recommendations for Addressing Barriers to Private and Independent Voting for People with Disabilities. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 1273-draft, p NIST SP 1273-draft. https://doi.org/10.6028/NIST.SP.1273-draft
[160]
Lefkovitz N (2023) Guidelines for Evaluating Differential Privacy Guarantees. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-226 ipd, p NIST SP 800-226 ipd. https://doi.org/10.6028/NIST.SP.800-226.ipd
[161]
Lightman S, Suloway T, Brule J (2022) Satellite Ground Segment: Applying the Cybersecurity Framework to Assure Satellite Command and Control. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.IR.8401.ipd
[162]
Marron JA (2022) Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule: A Cybersecurity Resource Guide. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-66r2 ipd, p NIST SP 800-66r2 ipd. https://doi.org/10.6028/NIST.SP.800-66r2.ipd
[163]
McCarthy J, Mamula D, Brule J, Meldorf K (2022) Cybersecurity Profile for the Hybrid Satellite Networks (HSN) Cybersecurity DRAFT Annotated Outline. (National Institute of Standards and Technology, Gaithersburg, MD), NIST CSWP 27 ipd, p NIST CSWP 27 ipd. https://doi.org/10.6028/NIST.CSWP.27.ipd
[164]
McCarthy J, Mamula D, Brule J, Meldorf K, Jennings R, Wiltberger J, Thorpe C, Dombrowski J, Lattin O (2023) Cybersecurity Framework Profile for Hybrid Satellite Networks (HSN). (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8441 ipd, p NIST IR 8441 ipd. https://doi.org/10.6028/NIST.IR.8441.ipd
[165]
McCarthy J, Grayson N, Brule J, Cottle T, Dinerman A, Dombrowski J, Long J, Quigg K, Thompson M, Townsend A, Tran H, Urlaub N (2023) Cybersecurity Framework Profile for Electric Vehicle Extreme Fast Charging Infrastructure. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8473 ipd, p NIST IR 8473 ipd. https://doi.org/10.6028/NIST.IR.8473.ipd
[166]
McWhite R (2024) NIST Cybersecurity Supply Chain Risk Management: Quick-Start Guide for Due Diligence Assessments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 1326 ipd, p NIST SP 1326 ipd. https://doi.org/10.6028/NIST.SP.1326.ipd
[167]
Mell P (2022) Measuring the Common Vulnerability Scoring System Base Score Equation. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8409.ipd, p NIST IR 8409.ipd. https://doi.org/10.6028/NIST.IR.8409.ipd
[168]
Mell P (2024) Hardware Security Failure Scenarios: Potential Weaknesses in Hardware Design. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8517 ipd, p NIST IR 8517 ipd. https://doi.org/10.6028/NIST.IR.8517.ipd
[169]
Mell P, Yaga D (2022) Understanding Stablecoin Technology and Related Security Considerations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8408 ipd, p NIST IR 8408 ipd. https://doi.org/10.6028/NIST.IR.8408.ipd
[170]
Merritt M, Hansche S, Ellis B, Sanchez-Cherry K, Snyder J, Walden D (2023) Building a Cybersecurity and Privacy Learning Program. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-50r1 ipd, p NIST SP 800-50r1 ipd. https://doi.org/10.6028/NIST.SP.800-50r1.ipd
[171]
Mouha N, Dworkin M (2023) Report on the Block Cipher Modes of Operation in the 800-38 Series. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8459 ipd, p NIST IR 8459 ipd. https://doi.org/10.6028/NIST.IR.8459.ipd
[172]
National Institute of Standards and Technology (2023) The NIST Cybersecurity Framework 2.0. (National Institute of Standards and Technology, Gaithersburg, MD), NIST CSWP 29 ipd, p NIST CSWP 29 ipd. https://doi.org/10.6028/NIST.CSWP.29.ipd
[173]
National Institute of Standards and Technology (2023) Module-Lattice-Based Digital Signature Standard. (National Institute of Standards and Technology, Gaithersburg, MD), NIST FIPS 204 ipd, p NIST FIPS 204 ipd. https://doi.org/10.6028/NIST.FIPS.204.ipd
[174]
National Institute of Standards and Technology (2023) Module-Lattice-Based Key-Encapsulation Mechanism Standard. (National Institute of Standards and Technology, Gaithersburg, MD), NIST FIPS 203 ipd, p NIST FIPS 203 ipd. https://doi.org/10.6028/NIST.FIPS.203.ipd
[175]
National Institute of Standards and Technology (2023) Stateless Hash-Based Digital Signature Standard. (National Institute of Standards and Technology, Gaithersburg, MD), NIST FIPS 205 ipd, p NIST FIPS 205 ipd. https://doi.org/10.6028/NIST.FIPS.205.ipd
[176]
National Institute of Standards and Technology (2023) Building a Metrology Exchange to Innovate in Semiconductors (METIS): A Vision for the CHIPS Metrology Program Data Exchange. (National Institute of Standards and Technology, Gaithersburg, MD), error: NIST CHIPS 1000-2 ipd, p error: NIST CHIPS 1000-2 ipd. https://doi.org/10.6028/NIST.CHIPS.1000-2.ipd
[177]
National Institute of Standards and Technology (2024) NIST Cybersecurity Framework 2.0: Enterprise Risk Management Quick-Start Guide. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 1303 ipd, p NIST SP 1303 ipd. https://doi.org/10.6028/NIST.SP.1303.ipd
[178]
National Institute of Standards and Technology (2024) NIST Cybersecurity Framework 2.0: Quick-Start Guide for Using the CSF Tiers. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 1302 ipd, p NIST SP 1302 ipd. https://doi.org/10.6028/NIST.SP.1302.ipd
[179]
Nelson A (2024) Incident Response Recommendations and Considerations for Cybersecurity Risk Management: A CSF 2.0 Community Profile. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-61r3 ipd, p NIST SP 800-61r3 ipd. https://doi.org/10.6028/NIST.SP.800-61r3.ipd
[180]
Newhouse W, Long J, Weitzel D, Warren J, Thompson M, Yates C, Tran H, Mink A, Herriott A, Cottle T (2022) Cybersecurity Framework Profile for Liquefied Natural Gas. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8406 ipd, p NIST IR 8406 ipd. https://doi.org/10.6028/NIST.IR.8406.ipd
[181]
Newhouse W, Souppaya M, Kent J, Sandlin K, Scarfone K (2023) Data Classification Concepts and Considerations for Improving Data Protection. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8496 ipd, p NIST IR 8496 ipd. https://doi.org/10.6028/NIST.IR.8496.ipd
[182]
Nist GM (2024) Guide for Mapping Types of Information and Systems to Security Categories. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-60r2 iwd, p NIST SP 800-60r2 iwd. https://doi.org/10.6028/NIST.SP.800-60r2.iwd
[183]
Nist GM (2024) Managing Misuse Risk for Dual-Use Foundation Models. (National Institute of Standards and Technology, Gaithersburg, MD), NIST AI NIST AI 800-1 ipd, p NIST AI NIST AI 800-1 ipd. https://doi.org/10.6028/NIST.AI.800-1.ipd
[184]
Nist GM (2024) NIST Cybersecurity Framework 2.0: Informative Reference Mapping Quick-Start Guide. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 1309 ipd, p NIST SP 1309 ipd. https://doi.org/10.6028/NIST.SP.1309.ipd
[185]
Nist GM (2024) NIST Cybersecurity Framework 2.0: Informative Reference Submission Quick-Start Guide. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 1312 ipd, p NIST SP 1312 ipd. https://doi.org/10.6028/NIST.SP.1312.ipd
[186]
Nist GM (2024) NIST Privacy Workforce Taxonomy. (National Institute of Standards and Technology, Gaithersburg, MD), NIST CSWP 38 ipd, p NIST CSWP 38 ipd. https://doi.org/10.6028/NIST.CSWP.38.ipd
[187]
Oprea A, Vassilev A (2023) Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST AI 100-2e2023 ipd, p NIST AI 100-2e2023 ipd. https://doi.org/10.6028/NIST.AI.100-2e2023.ipd
[188]
Pascoe C (2024) NIST Cybersecurity Framework 2.0: Generating a Community Profile. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 1304 ipd, p NIST SP 1304 ipd. https://doi.org/10.6028/NIST.SP.1304.ipd
[189]
Pascoe C (2024) NIST Cybersecurity Framework 2.0: Implementing a Community Profile. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 1305 ipd, p NIST SP 1305 ipd. https://doi.org/10.6028/NIST.SP.1305.ipd
[190]
Pascoe C, Nethery Snyder J, Scarfone K (2024) A Guide to Creating CSF 2.0 Community Profiles. (National Institute of Standards and Technology, Gaithersburg, MD), NIST CSWP 32 ipd, p NIST CSWP 32 ipd. https://doi.org/10.6028/NIST.CSWP.32.ipd
[191]
Pease M (2024) Supply Chain Traceability: Manufacturing Meta-Framework. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8536 ipd, p NIST IR 8536 ipd. https://doi.org/10.6028/NIST.IR.8536.ipd
[192]
Peralta R, Brandão LTAN (2023) NIST First Call for Multi-Party Threshold Schemes. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8214C ipd, p NIST IR 8214C ipd. https://doi.org/10.6028/NIST.IR.8214C.ipd
[193]
Pillitteri V (2024) NIST Cybersecurity Framework 2.0: Risk Management Framework. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 1308 ipd, p NIST SP 1308 ipd. https://doi.org/10.6028/NIST.SP.1308.ipd
[194]
Pulivarti R (2024) Mitigating Cybersecurity Risk in Telehealth Smart Home Integration. (National Institute of Standards and Technology, Gaithersburg, MD), NIST CSWP 34 ipd, p NIST CSWP 34 ipd. https://doi.org/10.6028/NIST.CSWP.34.ipd
[195]
Pulivarti R (2023) Cybersecurity Framework Profile for Genomic Data. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8467 ipd, p NIST IR 8467 ipd. https://doi.org/10.6028/NIST.IR.8467.ipd
[196]
Pulivarti R, Martin N, Byers F, Wagner J, Zook J, Maragh S, Wilson K, Wojtyniak M, Kreider B, France A-M, Edwards S, Morris T, Shelton J, Ross S, Whitlow P (2023) Cybersecurity of Genomic Data. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8432 ipd, p NIST IR 8432 ipd. https://doi.org/10.6028/NIST.IR.8432.ipd
[197]
Quinn S (2022) Using Business Impact Analysis to Inform Risk Prioritization and Response. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8286D.ipd, p NIST IR 8286D.ipd. https://doi.org/10.6028/NIST.IR.8286D.ipd
[198]
Quinn S, Ivy N, Barrett M, Witte G, Gardner RK (2022) Staging Cybersecurity Risks for Enterprise Risk Management and Governance Oversight. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.IR.8286C-draft
[199]
Quinn S, Ivy N, Chua J, Barrett M, Feldman L, Topper D, Witte G, Gardner R, Scarfone K (2022) Enterprise Impact of Information and Communications Technology Risk: Governing and Managing ICT Risk Programs Within an Enterprise Risk Portfolio. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-221 ipd, p NIST SP 800-221 ipd. https://doi.org/10.6028/NIST.SP.800-221.ipd
[200]
Quinn S, Ivy N, Chua J, Scarfone K, Barrett M, Feldman L, Topper D, Witte G, Gardner R (2022) Information and Communications Technology (ICT) Risk Outcomes: A Framework for Integrating ICT Risk Management Programs with the Enterprise Risk Portfolio. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-221A ipd, p NIST SP 800-221A ipd. https://doi.org/10.6028/NIST.SP.800-221A.ipd
[201]
Quinn S (2024) NIST Cybersecurity Framework 2.0: OLIR, How to do a Mapping. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 1310 ipd, p NIST SP 1310 ipd. https://doi.org/10.6028/NIST.SP.1310.ipd
[202]
Rekhi S (2024) Workshop on Enhancing Security of Devices and Components Across the Supply Chain. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8532 ipd, p NIST IR 8532 ipd. https://doi.org/10.6028/NIST.IR.8532.ipd
[203]
Ross R, Pillitteri V (2023) Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-171r3 ipd, p NIST SP 800-171r3 ipd. https://doi.org/10.6028/NIST.SP.800-171r3.ipd
[204]
Ross R, Pillitteri V (2023) Assessing Security Requirements for Controlled Unclassified Information. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-171Ar3 ipd, p NIST SP 800-171Ar3 ipd. https://doi.org/10.6028/NIST.SP.800-171Ar3.ipd
[205]
Ross R, Pillitteri V (2023) Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-171r3 fpd, p NIST SP 800-171r3 fpd. https://doi.org/10.6028/NIST.SP.800-171r3.fpd
[206]
Ross R, Winstead M, McEvilley M (2022) Engineering Trustworthy Secure Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-160v1r1 fpd, p NIST SP 800-160v1r1 fpd. https://doi.org/10.6028/NIST.SP.800-160v1r1.fpd
[207]
Scarfone K, Souppaya M (2023) Cybersecurity Log Management Planning Guide. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-92r1 ipd, p NIST SP 800-92r1 ipd. https://doi.org/10.6028/NIST.SP.800-92r1.ipd
[208]
Scarfone K, Souppaya M, Fagan M (2023) Mapping Relationships Between Documentary Standards, Regulations, Frameworks, and Guidelines. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8477 ipd, p NIST IR 8477 ipd. https://doi.org/10.6028/NIST.IR.8477.ipd
[209]
Schaffer K (2021) CMVP Approved Non-Invasive Attack Mitigation Test Metrics: CMVP Validation Authority Updates to ISO/IEC 24759. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.SP.800-140Fr1-draft
[210]
Schaffer K (2021) CMVP Approved Security Functions: CMVP Validation Authority Updates to ISO/IEC 24759. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.SP.800-140Cr1-draft
[211]
Schaffer K (2021) CMVP Approved Sensitive Security Parameter Generation and Establishment Methods: CMVP Validation Authority Updates to ISO/IEC 24759. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.SP.800-140Dr1-draft
[212]
Schaffer K (2022) CMVP Approved Security Functions: CMVP Validation Authority Updates to ISO/IEC 24759. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.SP.800-140Cr1-draft2
[213]
Schaffer K (2022) CMVP Approved Sensitive Security Parameter Generation and Establishment Methods: CMVP Validation Authority Updates to ISO/IEC 24759. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.SP.800-140Dr1-draft2
[214]
Scholl M, Suloway T (2022) Introduction to Cybersecurity for Commercial Satellite Operations. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.IR.8270-draft2
[215]
Schroeder K (2024) Measurement Guide for Information Security: Volume 1 — Identifying and Selecting Measures. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-55v1 ipd, p NIST SP 800-55v1 ipd. https://doi.org/10.6028/NIST.SP.800-55v1.ipd
[216]
Schroeder K (2024) Measurement Guide for Information Security: Volume 2 — Developing an Information Security Measurement Program. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-55v2 ipd, p NIST SP 800-55v2 ipd. https://doi.org/10.6028/NIST.SP.800-55v2.ipd
[217]
Schroeder K, Trinh H (2022) Performance Measurement Guide for Information Security. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-055r2 iwd, p NIST SP 800-055r2 iwd. https://doi.org/10.6028/NIST.SP.800-55r2.iwd
[218]
Schwartz R, Down L, Jonas A, Tabassi E (2021) A Proposal for Identifying and Managing Bias in Artificial Intelligence. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.SP.1270-draft
[219]
Sonmez Turan M (2024) ASCON Family for Constrained Environments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-232 ipd, p NIST SP 800-232 ipd. https://doi.org/10.6028/NIST.SP.800-232.ipd
[220]
Souppaya M, Scarfone K (2021) Guide to Enterprise Patch Management Planning: Preventive Maintenance for Technology. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.SP.800-40r4-draft
[221]
Stine K, Quinn S, Ivy N, Feldman L, Witte G, Gardner RK (2021) Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management (ERM). (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.IR.8286A-draft2
[222]
Tang C (2024) Cybersecurity for the Water and Wastewater Sector: Build Architecture: Operational Technology Remote Access. (National Institute of Standards and Technology, Gaithersburg, MD), NIST TN 2283 ipd, p NIST TN 2283 ipd. https://doi.org/10.6028/NIST.TN.2283.ipd
[223]
Temoshok D (2024) Digital Identity Guidelines. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-63-4 2pd, p NIST SP 800-63-4 2pd. https://doi.org/10.6028/NIST.SP.800-63-4.2pd
[224]
Temoshok D (2024) Digital Identity Guidelines: Authentication and Authenticator Management. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-63B-4 2pd, p NIST SP 800-63B-4 2pd. https://doi.org/10.6028/NIST.SP.800-63B-4.2pd
[225]
Temoshok D (2024) Digital Identity Guidelines: Federation and Assertions. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-63C-4 2pd, p NIST SP 800-63C-4 2pd. https://doi.org/10.6028/NIST.SP.800-63C-4.2pd
[226]
Temoshok D (2024) Digital Identity Guidelines: Identity Proofing and Enrollment. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-63A-4 2pd, p NIST SP 800-63A-4 2pd. https://doi.org/10.6028/NIST.SP.800-63A-4.2pd
[227]
Temoshok D, Abruzzi C, Choong Y-Y, Fenton J, Galluzzo R, LaSalle C, Lefkovitz N, Regenscheid A (2022) Digital Identity Guidelines: Enrollment and Identity Proofing. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-63A-4 ipd, p NIST SP 800-63A-4 ipd. https://doi.org/10.6028/NIST.SP.800-63A-4.ipd
[228]
Temoshok D, Fenton J, Choong Y-Y, Lefkovitz N, Regenscheid A, Richer J (2022) Digital Identity Guidelines: Authentication and Lifecycle Management. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-63B-4 ipd, p NIST SP 800-63B-4 ipd. https://doi.org/10.6028/NIST.SP.800-63B-4.ipd
[229]
Temoshok D, Proud-Madruga D, Choong Y-Y, Galluzzo R, Gupta S, LaSalle C, Lefkovitz N, Regenscheid A (2022) Digital Identity Guidelines. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-063-4 ipd, p NIST SP 800-063-4 ipd. https://doi.org/10.6028/NIST.SP.800-63-4.ipd
[230]
Temoshok D, Richer J, Choong Y-Y, Fenton J, Lefkovitz N, Regenscheid A (2022) Digital Identity Guidelines: Federation and Assertions. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-63C-4 ipd, p NIST SP 800-63C-4 ipd. https://doi.org/10.6028/NIST.SP.800-63C-4.ipd
[231]
Trapnell M, Trapnell E, Souppaya M, Gendler B, Scarfone K (2022) Automated Secure Configuration Guidance from the macOS Security Compliance Project (mSCP). (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.SP.800-219-draft
[232]
Trapnell M, Trapnell E, Souppaya M, Gendler B, Scarfone K (2023) Automated Secure Configuration Guidance from the macOS Security Compliance Project (mSCP). (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-219r1 ipd, p NIST SP 800-219r1 ipd. https://doi.org/10.6028/NIST.SP.800-219r1.ipd
[233]
Trello RM (2024) Towards an Approach for Evaluating the Impact of AI Standards. (National Institute of Standards and Technology, Gaithersburg, MD), NIST AI NIST AI 100-7 ipd, p NIST AI NIST AI 100-7 ipd. https://doi.org/10.6028/NIST.AI.100-7.ipd
[234]
Watrobski P, Souppaya M, Klosterman J, Barker W (2022) Methodology for Characterizing Network Behavior of Internet of Things Devices. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.IR.8349-draft
[235]
Wetzel KA (2021) NICE Framework Competencies: Assessing Learners for Cybersecurity Work. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.IR.8355-draft2