SP800

2020 Cybersecurity and Privacy Annual Report 
September 2021
Patrick O'Reilly, Kristina Rigopoulos, Larry Feldman, Greg Witte
NIST SP 800-214
10.6028/NIST.SP.800-214
Download PDF | Download Citation
Attribute-based Access Control for Microservices-based Applications Using a Service Mesh 
August 2021
Ramaswamy Chandramouli, Zack Butcher, Aradhna Chetal
NIST SP 800-204B
10.6028/NIST.SP.800-204B
Download PDF | Download Citation
Enhanced Security Requirements for Protecting Controlled Unclassified Information: A Supplement to NIST Special Publication 800-171 A Supplement to NIST Special Publication 800-171
January 2021
RON ROSS, VICTORIA PILLITTERI, GARY GUISSANIE, RYAN WAGNER, RICHARD GRAUBART, DEB BODEAU
NIST SP 800-172
10.6028/NIST.SP.800-172
Download PDF | Download Citation
Workforce Framework for Cybersecurity (NICE Framework) 
November 2020
Rodney Petersen, Danielle Santos, Matthew C. Smith, Karen A. Wetzel, Greg Witte
NIST SP 800-181r1
10.6028/NIST.SP.800-181r1
Download PDF | Download Citation
Recommendation for Stateful Hash-Based Signature Schemes 
October 2020
David A. Cooper, Daniel C. Apon, Quynh H. Dang, Michael S. Davidson, Morris J. Dworkin, Carl A. Miller
NIST SP 800-208
10.6028/NIST.SP.800-208
Download PDF | Download Citation
Security Guidelines for Storage Infrastructure 
October 2020
Ramaswamy Chandramouli, Doron Pinhas
NIST SP 800-209
10.6028/NIST.SP.800-209
Download PDF | Download Citation
Control Baselines for Information Systems and Organizations 
October 2020

NIST SP 800-53B
10.6028/NIST.SP.800-53B
Download PDF | Download Citation
Security and Privacy Controls for Information Systems and Organizations 
September 2020

NIST SP 800-53r5
10.6028/NIST.SP.800-53r5
Download PDF | Download Citation
Zero Trust Architecture 
August 2020
Scott Rose, Oliver Borchert, Stu Mitchell, Sean Connelly
NIST SP 800-207
10.6028/NIST.SP.800-207
Download PDF | Download Citation
2019 NIST/ITL Cybersecurity Program Annual Report 
August 2020
Patrick O’Reilly, Kristina Rigopoulos, Larry Feldman, Greg Witte
NIST SP 800-211
10.6028/NIST.SP.800-211
Download PDF | Download Citation
Recommendation for Key-Derivation Methods in Key-Establishment Schemes 
August 2020
Elaine Barker, Lily Chen, Richard Davis
NIST SP 800-56Cr2
10.6028/NIST.SP.800-56Cr2
Download PDF | Download Citation
General Access Control Guidance for Cloud Systems 
July 2020
Vincent C. Hu, Michaela Iorga, Wei Bao, Ang Li, Qinghua Li, Antonios Gouglidis
NIST SP 800-210
10.6028/NIST.SP.800-210
Download PDF | Download Citation
Recommendation for cryptographic key generation 
June 2020
Elaine Barker, Allen Roginsky, Richard Davis
NIST SP 800-133r2
10.6028/NIST.SP.800-133r2
Download PDF | Download Citation
Guide to IPsec VPNs 
June 2020
Elaine Barker, Quynh Dang, Sheila Frankel, Karen Scarfone, Paul Wouters
NIST SP 800-77r1
10.6028/NIST.SP.800-77r1
Download PDF | Download Citation
Assessing Information Security Continuous Monitoring (ISCM) Programs: Developing an ISCM Program Assessment 
May 2020
Kelley Dempsey, Victoria Yan Pillitteri, Chad Baer, Robert Niemeyer, Ron Rudman, Susan Urban
NIST SP 800-137A
10.6028/NIST.SP.800-137A
Download PDF | Download Citation
Building secure microservices-based applications using service-mesh architecture 
May 2020
Ramaswamy Chandramouli, Zack Butcher
NIST SP 800-204A
10.6028/NIST.SP.800-204a
Download PDF | Download Citation
Recommendation for key management: part 1 - general
May 2020
Elaine Barker
NIST SP 800-57pt1r5
10.6028/NIST.SP.800-57pt1r5
Download PDF | Download Citation
FIPS 140-3 derived test requirements (DTR): CMVP validation authority updates to ISOIEC 24759
March 2020
Kim Schaffer
NIST SP 800-140
10.6028/NIST.SP.800-140
Download PDF | Download Citation
CMVP documentation requirements: CMVP validation authority updates to ISOIEC 24759
March 2020
Kim Schaffer
NIST SP 800-140A
10.6028/NIST.SP.800-140A
Download PDF | Download Citation
CMVP security policy requirements: CMVP validation authority updates to ISOIEC 24759 and ISOIEC 19790 Annex B
March 2020
Kim Schaffer
NIST SP 800-140B
10.6028/NIST.SP.800-140B
Download PDF | Download Citation
CMVP approved security functions: CMVP validation authority updates to ISOIEC 24759
March 2020
Kim Schaffer
NIST SP 800-140C
10.6028/NIST.SP.800-140C
Download PDF | Download Citation
CMVP approved sensitive parameter generation and establishment methods: CMVP validation authority updates to ISOIEC 24759:2014(E)
March 2020
Kim Schaffer
NIST SP 800-140D
10.6028/NIST.SP.800-140D
Download PDF | Download Citation
CMVP approved authentication mechanisms: CMVP validation authority requirements for ISOIEC 19790:2012 Annex E and ISOIEC 24579:2017
March 2020
Kim Schaffer
NIST SP 800-140E
10.6028/NIST.SP.800-140E
Download PDF | Download Citation
CMVP approved non-invasive attack mitigation test metrics: CMVP validation authority updates to ISOIEC 24759:2014(E)
March 2020
Kim Schaffer
NIST SP 800-140F
10.6028/NIST.SP.800-140F
Download PDF | Download Citation
Guideline for using cryptographic standards in the federal government: cryptographic mechanisms
March 2020
Elaine Barker
NIST SP 800-175Br1
10.6028/NIST.SP.800-175Br1
Download PDF | Download Citation
NIST/ITL Cybersecurity Program: Annual Report 2018 
March 2020
Patrick O'Reilly, Kristina Rigopoulos, Larry Feldman, Greg Witte
NIST SP 800-206
10.6028/NIST.SP.800-206
Download PDF | Download Citation
Protecting controlled unclassified information in nonfederal systems and organizations 
February 2020
Ron Ross, Victoria Pillitteri, Kelley Dempsey, Mark Riddle, Gary Guissanie
NIST SP 800-171r2
10.6028/NIST.SP.800-171r2
Download PDF | Download Citation
Resilient interdomain traffic exchange: BGP security and DDos mitigation
December 2019
Kotikalapudi Sriram, Doug Montgomery
NIST SP 800-189
10.6028/NIST.SP.800-189
Download PDF | Download Citation
Developing cyber resilient systems: a systems security engineering approach
November 2019
Ron Ross, Victoria Pillitteri, Richard Graubart, Deborah Bodeau, Rosalie McQuaid
NIST SP 800-160v2
10.6028/NIST.SP.800-160v2
Download PDF | Download Citation
Guide for security-focused configuration management of information systems 
October 2019
Arnold Johnson, Kelley Dempsey, Ron Ross, Sarbari Gupta, Dennis Bailey
NIST SP 800-128
10.6028/NIST.SP.800-128
Download PDF | Download Citation
Security strategies for microservices-based application systems 
August 2019
Ramaswamy Chandramouli
NIST SP 800-204
10.6028/NIST.SP.800-204
Download PDF | Download Citation
Guidelines for the selection, configuration, and use of Transport Layer Security (TLS) implementations 
August 2019
Kerry A McKay, David A Cooper
NIST SP 800-52r2
10.6028/NIST.SP.800-52r2
Download PDF | Download Citation
Recommendation for cryptographic key generation 
July 2019
Elaine Barker, Allen Roginsky
NIST SP 800-133r1
10.6028/NIST.SP.800-133r1
Download PDF | Download Citation
Attribute considerations for access control systems 
June 2019
Vincent C Hu, David F Ferraiolo, D Richard Kuhn
NIST SP 800-205
10.6028/NIST.SP.800-205
Download PDF | Download Citation
Recommendation for key management: part 2 -- best practices for key management organizations
May 2019
Elaine Barker, William C Barker
NIST SP 800-57pt2r1
10.6028/NIST.SP.800-57pt2r1
Download PDF | Download Citation
Vetting the security of mobile applications 
April 2019
Michael Ogata, Josh Franklin, Jeffrey Voas, Vincent Sritapan, Stephen Quirolgico
NIST SP 800-163r1
10.6028/NIST.SP.800-163r1
Download PDF | Download Citation
Transitioning the use of cryptographic algorithms and key lengths 
March 2019
Elaine Barker, Allen Roginsky
NIST SP 800-131Ar2
10.6028/NIST.SP.800-131Ar2
Download PDF | Download Citation
Recommendation for pair-wise key establishment using integer factorization cryptography 
March 2019
Elaine Barker, Lily Chen, Allen Roginsky, Apostol Vassilev, Richard Davis, Scott Simon
NIST SP 800-56Br2
10.6028/NIST.SP.800-56Br2
Download PDF | Download Citation
Trustworthy email 
February 2019
Scott Rose, J Stephen Nightingale, Simson Garfinkel, Ramaswamy Chandramouli
NIST SP 800-177r1
10.6028/NIST.SP.800-177r1
Download PDF | Download Citation
Risk management framework for information systems and organizations: a system life cycle approach for security and privacy
December 2018

NIST SP 800-37r2
10.6028/NIST.SP.800-37r2
Download PDF | Download Citation
Guidelines for the use of PIV credentials in facility access 
June 2018
Hildegard Ferraiolo, Ketan Mehta, Nabil Ghadiali, Jason Mohler, Vincent Johnson, Steven Brady
NIST SP 800-116r1
10.6028/NIST.SP.800-116r1
Download PDF | Download Citation
Security recommendations for server-based hypervisor platforms 
June 2018
Ramaswamy Chandramouli
NIST SP 800-125Ar1
10.6028/NIST.SP.800-125Ar1
Download PDF | Download Citation
Assessing security requirements for controlled unclassified information 
June 2018
Ross Ron, Demspey Kelley, Pilliterri Victoria
NIST SP 800-171A
10.6028/NIST.SP.800-171A
Download PDF | Download Citation
Platform firmware resiliency guidelines 
May 2018
Andrew Regenscheid
NIST SP 800-193
10.6028/NIST.SP.800-193
Download PDF | Download Citation
Quick start guide for populating mobile test devices 
May 2018
Rick Ayers, Benjamin Livelsberger, Barbara Guttman
NIST SP 800-202
10.6028/NIST.SP.800-202
Download PDF | Download Citation
Recommendation for pair-wise key-establishment schemes using discrete logarithm cryptography 
April 2018
Elaine Barker, Lily Chen, Allen Roginsky, Apostol Vassilev, Richard Davis
NIST SP 800-56Ar3
10.6028/NIST.SP.800-56Ar3
Download PDF | Download Citation
Recommendation for key-derivation methods in key-establishment schemes 
April 2018
Elaine Barker, Lily Chen, Richard Davis
NIST SP 800-56Cr1
10.6028/NIST.SP.800-56Cr1
Download PDF | Download Citation
Codes for the identification of federal and federally-assisted organizations 
April 2018
Hildegard Ferraiolo
NIST SP 800-87r2
10.6028/NIST.SP.800-87r2
Download PDF | Download Citation
Systems security engineering: considerations for a multidisciplinary approach in the engineering of trustworthy secure systems, volume 1 
March 2018
Ron Ross, Michael McEvilley, Janet Carrier Oren
NIST SP 800-160v1
10.6028/NIST.SP.800-160v1
Download PDF | Download Citation
SCAP 1.3 component specification version updates: an annex to NIST special publication 800-126 revision 3 
February 2018
Harold Booth, David Waltermire, Lee Badger, Melanie Cook, Stephen D Quinn, Karen Scarfone
NIST SP 800-126A
10.6028/NIST.SP.800-126A
Download PDF | Download Citation
The technical specification for the security content automation protocol (SCAP) version 1.3 
February 2018
David Waltermire, Stephen Quinn, Harold Booth, Karen Scarfone, Dragos Prisaca
NIST SP 800-126r3
10.6028/NIST.SP.800-126r3
Download PDF | Download Citation
National checklist program for IT products - guidelines for checklist users and developers 
February 2018
Stephen D Quinn, Murugiah Souppaya, Melanie Cook, Karen Scarfone
NIST SP 800-70r4
10.6028/NIST.SP.800-70r4
Download PDF | Download Citation
Security recommendations for hypervisor deployment on servers 
January 2018
Ramaswamy Chandramouli
NIST SP 800-125A
10.6028/NIST.SP.800-125A
Download PDF | Download Citation
Recommendation for the entropy sources used for random bit generation 
January 2018
Meltem Sönmez Turan, Elaine Barker, John Kelsey, Kerry A McKay, Mary L Baish, Mike Boyle
NIST SP 800-90b
10.6028/NIST.SP.800-90B
Download PDF | Download Citation
Guide to LTE security 
December 2017
Jeffrey Cichonski, Joshua M Franklin, Michael Bartock
NIST SP 800-187
10.6028/NIST.SP.800-187
Download PDF | Download Citation
Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher 
November 2017
Elaine Barker, Nicky Mouha
NIST SP 800-67r2
10.6028/NIST.SP.800-67r2
Download PDF | Download Citation
Application container security guide 
September 2017
Murugiah Souppaya, John Morello, Karen Scarfone
NIST SP 800-190
10.6028/NIST.SP.800-190
Download PDF | Download Citation
2016 NIST/ITL cybersecurity program: annual report 
September 2017
Patrick O'Reilly, Kristina Rigopoulos, Larry Feldman, Greg Witte
NIST SP 800-195
10.6028/NIST.SP.800-195
Download PDF | Download Citation
National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework 
August 2017
William Newhouse, Stephanie Keith, Benjamin Scribner, Greg Witte
NIST SP 800-181
10.6028/NIST.SP.800-181
Download PDF | Download Citation
An introduction to information security 
June 2017
Michael Nieles, Kelley Dempsey, Victoria Yan Pillitteri
NIST SP 800-12r1
10.6028/NIST.SP.800-12r1
Download PDF | Download Citation
Verification and test methods for access control policiesmodels 
June 2017
Vincent C Hu, Rick Kuhn, Dylan Yaga
NIST SP 800-192
10.6028/NIST.SP.800-192
Download PDF | Download Citation
Digital identity guidelines: revision 3 
June 2017
Paul A Grassi, Michael E Garcia, James L Fenton
NIST SP 800-63-3
10.6028/NIST.SP.800-63-3
Download PDF | Download Citation
Digital identity guidelines: enrollment and identity proofing 
June 2017
Paul A Grassi, James L Fenton, Naomi B Lefkovitz, Jamie M Danker, Yee-Yin Choong, Kristen K Greene, Mary F Theofanos
NIST SP 800-63a
10.6028/NIST.SP.800-63a
Download PDF | Download Citation
Digital identity guidelines: authentication and lifecycle management 
June 2017
Paul A Grassi, James L Fenton, Elaine M Newton, Ray A Perlner, Andrew R Regenscheid, William E Burr, Justin P Richer, Naomi B Lefkovitz, Jamie M Danker, Yee-Yin Choong, Kristen K Greene, Mary F Theofanos
NIST SP 800-63b
10.6028/NIST.SP.800-63b
Download PDF | Download Citation
Digital identity guidelines: federation and assertions 
June 2017
Paul A Grassi, Justin P Richer, Sarah K Squire, James L Fenton, Ellen M Nadeau, Naomi B Lefkovitz, Jamie M Danker, Yee-Yin Choong, Kristen K Greene, Mary F Theofanos
NIST SP 800-63c
10.6028/NIST.SP.800-63c
Download PDF | Download Citation
Guide to bluetooth security 
May 2017
John Padgette, John Bahr, Mayank Batra, Marcel Holtmann, Rhonda Smithbey, Lily Chen, Karen Scarfone
NIST SP 800-121r2
10.6028/NIST.SP.800-121r2
Download PDF | Download Citation
Protecting controlled unclassified information in nonfederal systems and organizations 
December 2016
Ron Ross, Patrick Viscuso, Gary Guissanie, Kelley Dempsey, Mark Riddle
NIST SP 800-171r1
10.6028/NIST.SP.800-171r1
Download PDF | Download Citation
Guide to securing Apple OS X 10.10 systems for IT professionals: a NIST security configuration checklist 
December 2016
Lee Badger, Murugiah Souppaya, Mark Trapnell, Eric Trapnell, Dylan Yaga, Karen Scarfone
NIST SP 800-179
10.6028/NIST.SP.800-179
Download PDF | Download Citation
Guide for cybersecurity event recovery 
December 2016
Michael Bartock, Jeffrey Cichonski, Murugiah Souppaya, Matthew Smith, Greg Witte, Karen Scarfone
NIST SP 800-184
10.6028/NIST.SP.800-184
Download PDF | Download Citation
SHA-3 derived functions: cSHAKE, KMAC, TupleHash and ParallelHash 
December 2016
John Kelsey, Shu-jen Change, Ray Perlner
NIST SP 800-185
10.6028/NIST.SP.800-185
Download PDF | Download Citation
Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems 
November 2016
Ron Ross, Michael McEvilley, Janet Carrier Oren
NIST SP 800-160
10.6028/NIST.SP.800-160
Download PDF | Download Citation
Guide to Cyber Threat Information Sharing 
October 2016
Christopher S. Johnson, Mark Lee Badger, David A. Waltermire, Julie Snyder, Clem Skorupka
NIST SP 800-150
10.6028/NIST.SP.800-150
Download PDF | Download Citation
A Comparison of Attribute Based Access Control (ABAC) Standards for Data Service Applications 
October 2016
David F. Ferraiolo, Ramaswamy Chandramouli, Vincent C. Hu, D. Richard R. Kuhn
NIST SP 800-178
10.6028/NIST.SP.800-178
Download PDF | Download Citation
Trustworthy Email 
September 2016
Scott W. Rose, Stephen J. Nightingale, Simson L. Garfinkel, Ramaswamy Chandramouli
NIST SP 800-177
10.6028/NIST.SP.800-177
Download PDF | Download Citation
Guideline for Using Cryptographic Standards in the Federal Government: Directives, Mandates and Policies 
August 2016
Elaine B. Barker, William C. Barker
NIST SP 800-175A
10.6028/NIST.SP.800-175A
Download PDF | Download Citation
Guideline for Using Cryptographic Standards in the Federal Government: Cryptographic Mechanisms 
August 2016
Elaine B. Barker
NIST SP 800-175B
10.6028/NIST.SP.800-175B
Download PDF | Download Citation
Computer Security Division 2015 Annual Report 
August 2016
Patrick D O'Reilly, Greg A Witte, Larry Feldman
NIST SP 800-182
10.6028/NIST.SP.800-182
Download PDF | Download Citation
User's Guide to Telework and Bring Your Own Device (BYOD) Security 
July 2016
Murugiah P Souppaya, Karen A Scarfone
NIST SP 800-114r1
10.6028/NIST.SP.800-114r1
Download PDF | Download Citation
Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security 
July 2016
Murugiah P Souppaya, Karen A Scarfone
NIST SP 800-46r2
10.6028/NIST.SP.800-46r2
Download PDF | Download Citation
Derived PIV Application and Data Model Test Guidelines 
June 2016
David Cooper, Hildegard Ferraiolo, Ramaswamy Chandramouli, Nabil Ghadiali, Jason Mohler, Steven Brady
NIST SP 800-166
10.6028/NIST.SP.800-166
Download PDF | Download Citation
Representation of PIV Chain-of-Trust for Import and Export 
May 2016
Hildegard Ferraiolo, Ramaswamy Chandramouli, Ketan Mehta, Jason Mohler, Stephen Skordinski, Steven Brady
NIST SP 800-156
10.6028/NIST.SP.800-156
Download PDF | Download Citation
PIV Card Application and Middleware Interface Test Guidelines (SP 800-73-4 compliance) 
April 2016
David A. Cooper, Hildegard Ferraiolo, Ramaswamy Chandramouli, Jason Mohler
NIST SP 800-85A-4
10.6028/NIST.SP.800-85A-4
Download PDF | Download Citation
Secure Virtual Network Configuration for Virtual Machine (VM) Protection 
March 2016
Ramaswamy Chandramouli
NIST SP 800-125B
10.6028/NIST.SP.800-125B
Download PDF | Download Citation
Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption 
March 2016
Morris Dworkin
NIST SP 800-38G
10.6028/NIST.SP.800-38G
Download PDF | Download Citation
Recommendation for Key Management Part 1: General 
January 2016
Elaine Barker
NIST SP 800-57pt1r4
10.6028/NIST.SP.800-57pt1r4
Download PDF | Download Citation
Networks of 'things' 
2016
Jeffrey M Voas
NIST SP 800-183
10.6028/NIST.SP.800-183
Download PDF | Download Citation
Recommendation for block cipher modes of operation : the CMAC mode for authentication
2016
M J Dworkin
NIST SP 800-38b
10.6028/NIST.SP.800-38b
Download PDF | Download Citation
National Checklist Program for IT Products – Guidelines for Checklist Users and Developers 
December 2015
Stephen D. Quinn, Murugiah Souppaya, Melanie Cook, Karen A. Scarfone
NIST SP 800-70r3
10.6028/NIST.SP.800-70r3
Download PDF | Download Citation
Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths 
November 2015
Elaine B. Barker, Allen L. Roginsky
NIST SP 800-131Ar1
10.6028/NIST.SP.800-131Ar1
Download PDF | Download Citation
A Profile for U. S. Federal Cryptographic Key Management Systems 
October 2015
Elaine B. Barker, Miles Smid, Dennis Branstad
NIST SP 800-152
10.6028/NIST.SP.800-152
Download PDF | Download Citation
Guide to Application Whitelisting 
October 2015
Adam Sedgewick, Murugiah P. Souppaya, Karen A. Scarfone
NIST SP 800-167
10.6028/NIST.SP.800-167
Download PDF | Download Citation
Guidelines for the Authorization of Personal Identity Verification Card Issuers (PCI) and Derived PIV Credential Issuers (DPCI) 
July 2015
Hildegard Ferraiolo, Ramaswamy Chandramouli, Nabil Ghadiali, Jason Mohler, Scott Shorter
NIST SP 800-79-2
10.6028/NIST.SP.800-79-2
Download PDF | Download Citation
Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations 
June 2015
Ronald S. Ross, Kelley L. Dempsey, Patrick Viscuso, Mark Riddle, Gary Guissanie
NIST SP 800-171
10.6028/NIST.SP.800-171
Download PDF | Download Citation
Guide to Industrial Control Systems (ICS) Security 
June 2015
Keith Stouffer, Victoria Pillitteri, Suzanne Lightman, Marshall Abrams, Adam Hahn
NIST SP 800-82r2
10.6028/NIST.SP.800-82r2
Download PDF | Download Citation
Recommendation for Random Number Generation Using Deterministic Random Bit Generators 
June 2015
Elaine B. Barker, John M. Kelsey
NIST SP 800-90Ar1
10.6028/NIST.SP.800-90Ar1
Download PDF | Download Citation
Interfaces for Personal Identity Verification 
May 2015
David A. Cooper, Hildegard Ferraiolo, Ketan L. Mehta, Salvatore Francomacaro, Ramaswamy Chandramouli, Jason Mohler
NIST SP 800-73-4
10.6028/NIST.SP.800-73-4
Download PDF | Download Citation
Cryptographic Algorithms and Key Sizes for Personal Identity Verification 
May 2015
William T. Polk, Donna F. Dodson, William Burr, Salvatore Francomacaro, David A. Cooper
NIST SP 800-78-4
10.6028/NIST.SP.800-78-4
Download PDF | Download Citation
Supply Chain Risk Management Practices for Federal Information Systems and Organizations 
April 2015
Jon M. Boyens, Celia Paulsen, Rama Moorthy, Nadya Bartol
NIST SP 800-161
10.6028/NIST.SP.800-161
Download PDF | Download Citation
Computer Security Division 2014 Annual Report 
April 2015
Patrick D. O'Reilly, Gregory A. Witte, Larry Feldman
NIST SP 800-176
10.6028/NIST.SP.800-176
Download PDF | Download Citation
Vetting the Security of Mobile Applications 
January 2015
Steve Quirolgico, Jeffrey Voas, Tom Karygiannis, Christoph Michael, Karen Scarfone
NIST SP 800-163
10.6028/NIST.SP.800-163
Download PDF | Download Citation
Recommendation for Key Management Part 3: Application-Specific Key Management Guidance 
January 2015
Elaine B. Barker, Quynh H. Dang
NIST SP 800-57Pt3r1
10.6028/NIST.SP.800-57Pt3r1
Download PDF | Download Citation
Guidelines for Derived Personal Identity Verification (PIV) Credentials 
December 2014
Hildegard Ferraiolo, David Cooper, Salvatore Francomacaro, Andrew Regenscheid, Jason Mohler, Sarbari Gupta, William Burr
NIST SP 800-157
10.6028/NIST.SP.800-157
Download PDF | Download Citation
Assessing Security and Privacy Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans
December 2014
Ronald S. Ross
NIST SP 800-53Ar4
10.6028/NIST.SP.800-53Ar4
Download PDF | Download Citation
Guidelines for Media Sanitization 
December 2014
Richard Kissel, Andrew Regenscheid, Matthew Scholl, Kevin Stine
NIST SP 800-88r1
10.6028/NIST.SP.800-88r1
Download PDF | Download Citation
Recommendation for Pair-Wise Key-Establishment Schemes Using Integer Factorization Cryptography 
October 2014
Elaine Barker, Lily Chen, Dustin Moody
NIST SP 800-56Br1
10.6028/NIST.SP.800-56Br1
Download PDF | Download Citation
Computer Security Division 2013 annual report 
June 2014
Patrick O'Reilly, Lorie Richards
NIST SP 800-170
10.6028/NIST.SP.800-170
Download PDF | Download Citation
Guide for applying the risk management framework to federal information systems : a security life cycle approach 
June 2014

NIST SP 800-37r1
10.6028/NIST.SP.800-37r1
Download PDF | Download Citation
Guidelines on mobile device forensics 
May 2014
Rick Ayers, Sam Brothers, Wayne Jansen
NIST SP 800-101r1
10.6028/NIST.SP.800-101r1
Download PDF | Download Citation
Approximate matching : definition and terminology 
May 2014
Frank Breitinger, Barbara Guttman, Michael McCarrin, Vassil Roussev, Douglas White
NIST SP 800-168
10.6028/NIST.SP.800-168
Download PDF | Download Citation
Guidelines for the selection, configuration, and use of transport layer security (TLS) implementations 
April 2014
Tim Polk, Kerry McKay, Santosh Chokhani
NIST SP 800-52r1
10.6028/NIST.SP.800-52r1
Download PDF | Download Citation
Guide to Attribute Based Access Control (ABAC) Definition and Considerations 
January 2014
Vincent C. Hu, David Ferraiolo, Rick Kuhn, Adam Schnitzer, Kenneth Sandlin, Robert Miller, Karen Scarfone
NIST SP 800-162
10.6028/NIST.SP.800-162
Download PDF | Download Citation
Electronic Authentication Guideline 
November 2013
William E. Burr, Donna F. Dodson, Elaine M. Newton, Ray A. Perlner, W. Timothy Polk, Sarbari Gupta, Ebad A. Nabbus
NIST SP 800-63-2
10.6028/NIST.SP.800-63-2
Download PDF | Download Citation
Secure Domain Name System (DNS) Deployment Guide 
September 2013
Ramaswamy Chandramouli, Scott Rose
NIST SP 800-81-2
10.6028/NIST.SP.800-81-2
Download PDF | Download Citation
A Framework for Designing Cryptographic Key Management Systems 
August 2013
Elaine Barker, Miles Smid, Dennis Branstad, Santosh Chokhani
NIST SP 800-130
10.6028/NIST.SP.800-130
Download PDF | Download Citation
Guide to Enterprise Patch Management Technologies 
July 2013
Murugiah Souppaya, Karen Scarfone
NIST SP 800-40r3
10.6028/NIST.SP.800-40r3
Download PDF | Download Citation
Biometric Specifications for Personal Identity Verification 
July 2013
Patrick Grother, Wayne Salamon, Ramaswamy Chandramouli
NIST SP 800-76-2
10.6028/NIST.SP.800-76-2
Download PDF | Download Citation
Guide to Malware Incident Prevention and Handling for Desktops and Laptops 
July 2013
Murugiah Souppaya, Karen Scarfone
NIST SP 800-83r1
10.6028/NIST.SP.800-83r1
Download PDF | Download Citation
Guidelines for Managing the Security of Mobile Devices in the Enterprise 
June 2013
Murugiah Souppaya, Karen Scarfone
NIST SP 800-124r1
10.6028/NIST.SP.800-124r1
Download PDF | Download Citation
Computer Security Division 2012 Annual Report 
June 2013
Patrick O'Reilly, Lorie Richards
NIST SP 800-165
10.6028/NIST.SP.800-165
Download PDF | Download Citation
Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography 
May 2013
Elaine Barker, Lily Chen, Allen Roginsky, Miles Smid
NIST SP 800-56Ar2
10.6028/NIST.SP.800-56Ar2
Download PDF | Download Citation
Guide to Industrial Control Systems (ICS) Security : Supervisory Control and Data Acquisition (SCADA) Systems, Distributed Control Systems (DCS), and Other Control System Configurations such as Programmable Logic Controllers (PLC) 
May 2013
Keith Stouffer, Joe Falco, Karen Scarfone
NIST SP 800-82r1
10.6028/NIST.SP.800-82r1
Download PDF | Download Citation
Security and Privacy Controls for Federal Information Systems and Organizations 
April 2013

NIST SP 800-53r4
10.6028/NIST.SP.800-53r4
Download PDF | Download Citation
Recommendation for Cryptographic Key Generation 
December 2012
Elaine Barker, Allen Roginsky
NIST SP 800-133
10.6028/NIST.SP.800-133
Download PDF | Download Citation
Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping (SP 800-38F)
December 2012
Morris J. Dworkin
NIST SP 800-38F
10.6028/NIST.SP.800-38F
Download PDF | Download Citation
Computer Security Incident Handling Guide : Recommendations of the National Institute of Standards and Technology 
August 2012
Paul Cichonski, Tom Millar, Tim Grance, Karen Scarfone
NIST SP 800-61r2
10.6028/NIST.SP.800-61r2
Download PDF | Download Citation
Recommendation for applications using approved hash algorithms 
2012
Q H Dang
NIST SP 800-107r1
10.6028/NIST.SP.800-107r1
Download PDF | Download Citation
Guide to bluetooth security 
2012
J Padgette, K A Scarfone, L Chen
NIST SP 800-121r1
10.6028/NIST.SP.800-121r1
Download PDF | Download Citation
Cloud computing synopsis and recommendations 
2012
M L Badger, T Grance, R Patt-Corner, J Voas
NIST SP 800-146
10.6028/NIST.SP.800-146
Download PDF | Download Citation
Guidelines for securing Wireless Local Area Networks (WLANs) 
2012
M P Souppaya, K A Scarfone
NIST SP 800-153
10.6028/NIST.SP.800-153
Download PDF | Download Citation
Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS) : requirements and procedures
2012
S S Keller
NIST SP 800-20
10.6028/NIST.SP.800-20
Download PDF | Download Citation
Guide for conducting risk assessments 
2012

NIST SP 800-30r1
10.6028/NIST.SP.800-30r1
Download PDF | Download Citation
Recommendation for key management, part 1 : general (revision 3)
2012
E B Barker, W C Barker, W E Burr, W T Polk, M E Smid
NIST SP 800-57p1r3
10.6028/NIST.SP.800-57p1r3
Download PDF | Download Citation
Recommendation for the triple data encryption algorithm (TDEA) block cipher 
2012
W C Barker, E B Barker
NIST SP 800-67r1
10.6028/NIST.SP.800-67r1
Download PDF | Download Citation
Recommendation for random number generation using deterministic random bit generators 
2012
E B Barker, J M Kelsey
NIST SP 800-90a
10.6028/NIST.SP.800-90a
Download PDF | Download Citation
Guide for security-focused configuration management of information systems 
August 2011
Arnold Johnson, Kelley Dempsey, Ron Ross, Sarbari Gupta, Dennis Bailey
NIST SP 800-128-2011
10.6028/NIST.SP.800-128-2011
Download PDF | Download Citation
Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC) : recommendations of the National Institute of Standards and Technology, Computer security 
June 2011
Keith Stouffer, Joe Falco, Karen Scarfone
NIST SP 800-82
10.6028/NIST.SP.800-82
Download PDF | Download Citation
Guide to security for full virtualization technologies 
2011
K A Scarfone, M P Souppaya, P Hoffman
NIST SP 800-125
10.6028/NIST.SP.800-125
Download PDF | Download Citation
The technical specification for the Security Content Automation Protocol (SCAP) : SCAP version 1.1
2011
D A Waltermire, S D Quinn, K A Scarfone
NIST SP 800-126r1
10.6028/NIST.SP.800-126r1
Download PDF | Download Citation
The technical specification for the Security Content Automation Protocol (SCAP) : SCAP version 1.2
2011
D A Waltermire, S D Quinn, K A Scarfone, A M Halbardier
NIST SP 800-126r2
10.6028/NIST.SP.800-126r2
Download PDF | Download Citation
Transitions : recommendation for transitioning the use of cryptographic algorithms and key lengths
2011
E B Barker, A L Roginsky
NIST SP 800-131a
10.6028/NIST.SP.800-131a
Download PDF | Download Citation
Recommendation for existing application-specific key derivation functions 
2011
Q H Dang
NIST SP 800-135r1
10.6028/NIST.SP.800-135r1
Download PDF | Download Citation
Information Security Continuous Monitoring (ISCM) for federal information systems and organizations 
2011
K L Dempsey, N S Chawla, L A Johnson, R Johnston, A C Jones, A D Orebaugh, M A Scholl, K M Stine
NIST SP 800-137
10.6028/NIST.SP.800-137
Download PDF | Download Citation
Guidelines on security and privacy in public cloud computing 
2011
W Jansen, T Grance
NIST SP 800-144
10.6028/NIST.SP.800-144
Download PDF | Download Citation
The NIST definition of cloud computing 
2011
P M Mell, T Grance
NIST SP 800-145
10.6028/NIST.SP.800-145
Download PDF | Download Citation
BIOS protection guidelines 
2011
D A Cooper, W T Polk, A R Regenscheid, M P Souppaya
NIST SP 800-147
10.6028/NIST.SP.800-147
Download PDF | Download Citation
Managing information security risk : organization, mission, and information system view
2011

NIST SP 800-39
10.6028/NIST.SP.800-39
Download PDF | Download Citation
Guide to using vulnerability naming schemes 
2011
D A Waltermire, K A Scarfone
NIST SP 800-51r1
10.6028/NIST.SP.800-51r1
Download PDF | Download Citation
Recommendation for key derivation through extraction-then-expansion 
2011
L Chen
NIST SP 800-56c
10.6028/NIST.SP.800-56c
Download PDF | Download Citation
Electronic authentication guideline 
2011
W E Burr, D F Dodson, E M Newton, R A Perlner, W T Polk, S Gupta, E A Nabbus
NIST SP 800-63-1
10.6028/NIST.SP.800-63-1
Download PDF | Download Citation
National checklist program for IT products : guidelines for checklist users and developers
2011
S D Quinn, M P Souppaya, M Cook, K A Scarfone
NIST SP 800-70r2
10.6028/NIST.SP.800-70r2
Download PDF | Download Citation
Guide to adopting and using the Security Content Automation Protocol (SCAP) version 1.0 
2010
S D Quinn, K A Scarfone, M Barrett, C S Johnson
NIST SP 800-117
10.6028/NIST.SP.800-117
Download PDF | Download Citation
Guidelines for the secure deployment of IPv6 
2010
S E Frankel, R Graveman, J Pearce, M Rooks
NIST SP 800-119
10.6028/NIST.SP.800-119
Download PDF | Download Citation
Guide to protecting the confidentiality of Personally Identifiable Information (PII) 
2010
E McCallister, T Grance, K A Scarfone
NIST SP 800-122
10.6028/NIST.SP.800-122
Download PDF | Download Citation
Guide to securing WiMAX wireless communications 
2010
K A Scarfone, C Tibbs, M Sexton
NIST SP 800-127
10.6028/NIST.SP.800-127
Download PDF | Download Citation
Recommendation for password-based key derivation : part 1: storage applications
2010
M S Turan, E B Barker, W E Burr, L Chen
NIST SP 800-132
10.6028/NIST.SP.800-132
Download PDF | Download Citation
Recommendation for existing application-specific key derivation functions 
2010
Q H Dang
NIST SP 800-135
10.6028/NIST.SP.800-135
Download PDF | Download Citation
Practical combinatorial testing 
2010
D R Kuhn, R N Kacker, Y Lei
NIST SP 800-142
10.6028/NIST.SP.800-142
Download PDF | Download Citation
A statistical test suite for random and pseudorandom number generators for cryptographic applications 
2010
L E Bassham, A L Rukhin, J Soto, J R Nechvatal, M E Smid, E B Barker, S D Leigh, M Levenson, M Vangel, D L Banks, N A Heckert, J F Dray, S Vo
NIST SP 800-22r1a
10.6028/NIST.SP.800-22r1a
Download PDF | Download Citation
Contingency planning guide for federal information systems 
2010
M Swanson, P Bowen, A W Phillips, D Gallup, D Lynes
NIST SP 800-34r1
10.6028/NIST.SP.800-34r1
Download PDF | Download Citation
Recommendation for block cipher modes of operation : three variants of ciphertext stealing for CBC mode
2010
M J Dworkin
NIST SP 800-38a-add
10.6028/NIST.SP.800-38a-add
Download PDF | Download Citation
Recommendation for block cipher modes of operation : the XTS-AES mode for confidentiality on storage devices
2010
M J Dworkin
NIST SP 800-38e
10.6028/NIST.SP.800-38e
Download PDF | Download Citation
Guide for assessing the security controls in federal information systems and organizations : building effective security assessment plans
2010

NIST SP 800-53ar1
10.6028/NIST.SP.800-53ar1
Download PDF | Download Citation
Interfaces for personal identity verification : end-point PIV card application namespace, data model and representation
2010
R Chandramouli, D A Cooper, J F Dray, H Ferraiolo, S B Guthery, W I MacGregor, K Mehta
NIST SP 800-73-3
10.6028/NIST.SP.800-73-3
Download PDF | Download Citation
Interfaces for personal identity verification - part 1 : end-point PIV card application namespace, data model and representation
2010
R Chandramouli, D A Cooper, J F Dray, H Ferraiolo, S B Guthery, W I MacGregor, K Mehta
NIST SP 800-73-3p1
10.6028/NIST.SP.800-73-3p1
Download PDF | Download Citation
Interfaces for personal identity verification - part 2 : end-point PIV card application card command interface
2010
R Chandramouli, D A Cooper, J F Dray, H Ferraiolo, S B Guthery, W I MacGregor, K Mehta
NIST SP 800-73-3p2
10.6028/NIST.SP.800-73-3p2
Download PDF | Download Citation
Interfaces for personal identity verification - part 3 : end-point PIV client application programming interface
2010
R Chandramouli, D A Cooper, J F Dray, H Ferraiolo, S B Guthery, W I MacGregor, K Mehta
NIST SP 800-73-3p3
10.6028/NIST.SP.800-73-3p3
Download PDF | Download Citation
Interfaces for personal identity verification - part 4 : the PIV transitional interfaces and data model specification
2010
R Chandramouli, D A Cooper, J F Dray, H Ferraiolo, S B Guthery, W I MacGregor, K Mehta
NIST SP 800-73-3p4
10.6028/NIST.SP.800-73-3p4
Download PDF | Download Citation
Cryptographic algorithms and key sizes for personal identity verification 
2010
W T Polk, D F Dodson, W E Burr
NIST SP 800-78-2
10.6028/NIST.SP.800-78-2
Download PDF | Download Citation
Cryptographic algorithms and key sizes for personal identity verification 
2010
W T Polk, D F Dodson, W E Burr, H Ferraiolo, D A Cooper
NIST SP 800-78-3
10.6028/NIST.SP.800-78-3
Download PDF | Download Citation
Secure Domain Name System (DNS) deployment guide 
2010
R Chandramouli, S W Rose
NIST SP 800-81r1
10.6028/NIST.SP.800-81r1
Download PDF | Download Citation
PIV card application and middleware interface test guidelines (SP800-73-3 compliance) 
2010
R Chandramouli, H Ferraiolo, K Mehta
NIST SP 800-85a-2
10.6028/NIST.SP.800-85a-2
Download PDF | Download Citation
Recommendation for digital signature timeliness 
2009
E B Barker
NIST SP 800-102
10.6028/NIST.SP.800-102
Download PDF | Download Citation
Randomized hashing for digital signatures 
2009
Q H Dang
NIST SP 800-106
10.6028/NIST.SP.800-106
Download PDF | Download Citation
Recommendation for applications using approved hash algorithms 
2009
Q H Dang
NIST SP 800-107
10.6028/NIST.SP.800-107
Download PDF | Download Citation
Recommendation for key derivation using pseudorandom functions (revised) 
2009
L Chen
NIST SP 800-108
10.6028/NIST.SP.800-108
Download PDF | Download Citation
Recommendation for EAP methods used in wireless network access authentication 
2009
K Hoeper, L Chen
NIST SP 800-120
10.6028/NIST.SP.800-120
Download PDF | Download Citation
The technical specification for the Security Content Automation Protocol (SCAP) : SCAP version 1.0
2009
S D Quinn, D A Waltermire, C S Johnson, K A Scarfone, J F Banghart
NIST SP 800-126
10.6028/NIST.SP.800-126
Download PDF | Download Citation
Guidelines on firewalls and firewall policy 
2009
K A Scarfone, P Hoffman
NIST SP 800-41r1
10.6028/NIST.SP.800-41r1
Download PDF | Download Citation
Guide to enterprise telework and remote access security 
2009
K A Scarfone, P Hoffman, M P Souppaya
NIST SP 800-46r1
10.6028/NIST.SP.800-46r1
Download PDF | Download Citation
Recommended security controls for federal information systems and organizations 
2009

NIST SP 800-53r3
10.6028/NIST.SP.800-53r3
Download PDF | Download Citation
Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography 
2009
E B Barker, L Chen, A R Regenscheid, M E Smid
NIST SP 800-56b
10.6028/NIST.SP.800-56b
Download PDF | Download Citation
Recommendation for key management, part 3 : application-specific key management guidance
2009
E B Barker, W E Burr, A C Jones, W T Polk, S W Rose, M E Smid, Q H Dang
NIST SP 800-57p3
10.6028/NIST.SP.800-57p3
Download PDF | Download Citation
National checklist program for IT products : guidelines for checklist users and developers
2009
S D Quinn, K A Scarfone, M P Souppaya
NIST SP 800-70r1
10.6028/NIST.SP.800-70r1
Download PDF | Download Citation
PIV card application and middleware interface test guidelines (SP800-73-2 compliance) 
2009

NIST SP 800-85a-1
10.6028/NIST.SP.800-85a-1
Download PDF | Download Citation
Guidelines on Cell Phone and PDA Security 
October 2008
Wayne Jansen, Karen Scarfone
NIST SP 800-124
10.6028/NIST.SP.800-124
Download PDF | Download Citation
Guidelines for the Authorization of Personal Identity Verification Card Issuers (PCI) and Derived PIV Credential Issuers (DPCI) 
June 2008
Ramaswamy Chandramouli, Dennis Bailey, Nabil Ghadiali, Dennis Branstad
NIST SP 800-79-1
10.6028/NIST.SP.800-79-1
Download PDF | Download Citation
BIOS Protection Guidelines for Servers 
January 2008
Andrew Regenscheid
NIST SP 800-147B
10.6028/NIST.SP.800-147B
Download PDF | Download Citation
Guide to SSL VPNs 
2008
S E Frankel, P Hoffman, A D Orebaugh, R Park
NIST SP 800-113
10.6028/NIST.SP.800-113
Download PDF | Download Citation
Technical guide to information security testing and assessment. 
2008
K A Scarfone, M P Souppaya, A Cody, A D Orebaugh
NIST SP 800-115
10.6028/NIST.SP.800-115
Download PDF | Download Citation
A recommendation for the use of PIV credentials in Physical Access Control Systems (PACS) 
2008
W I MacGregor, K Mehta, D A Cooper, K A Scarfone
NIST SP 800-116
10.6028/NIST.SP.800-116
Download PDF | Download Citation
Guide to bluetooth security 
2008
K A Scarfone, J Padgette
NIST SP 800-121
10.6028/NIST.SP.800-121
Download PDF | Download Citation
Guide to general server security 
2008
K A Scarfone, W Jansen, M Tracy
NIST SP 800-123
10.6028/NIST.SP.800-123
Download PDF | Download Citation
Guidelines on active content and mobile code 
2008
W Jansen, T Winograd, K A Scarfone
NIST SP 800-28ver2
10.6028/NIST.SP.800-28ver2
Download PDF | Download Citation
Guide to securing legacy IEEE 802.11 wireless networks 
2008
K A Scarfone, D Dicoi, M Sexton, C Tibbs
NIST SP 800-48r1
10.6028/NIST.SP.800-48r1
Download PDF | Download Citation
Guide for assessing the security controls in federal information systems and organizations : building effective security assessment plans
2008
R Ross, L A Johnson, S Katzke, P Toth, G Stoneburner, G Rogers
NIST SP 800-53a
10.6028/NIST.SP.800-53a
Download PDF | Download Citation
Performance measurement guide for information security 
2008
E Chew, M Swanson, K M Stine, N Bartol, A Brown, W Robinson
NIST SP 800-55r1
10.6028/NIST.SP.800-55r1
Download PDF | Download Citation
Volume I : guide for mapping types of information and information systems to security categories
2008
Kevin Stine, Rich Kissel, William C Barker, Jim Fahlsing, Jessica Gulick
NIST SP 800-60v1r1
10.6028/NIST.SP.800-60v1r1
Download PDF | Download Citation
Volume II : appendices to guide for mapping types of information and information systems to security categories
2008
Kevin Stine, Rich Kissel, William C Barker, Annabelle Lee, Jim Fahlsing
NIST SP 800-60v2r1
10.6028/NIST.SP.800-60v2r1
Download PDF | Download Citation
Computer security incident handling guide 
2008
K A Scarfone, T Grance, K Masone
NIST SP 800-61r1
10.6028/NIST.SP.800-61r1
Download PDF | Download Citation
Security considerations in the system development life cycle 
2008
R Kissel, K M Stine, M A Scholl, H Rossman, J Fahlsing, J Gulick
NIST SP 800-64r2
10.6028/NIST.SP.800-64r2
Download PDF | Download Citation
An introductory resource guide for implementing the Health Insurance Portability and Accountability Act (HIPAA) security rule 
2008
M A Scholl, K M Stine, J Hash, P Bowen, L A Johnson, C D Smith, D I Steinberg
NIST SP 800-66r1
10.6028/NIST.SP.800-66r1
Download PDF | Download Citation
Guide to securing Microsoft Windows XP Systems for IT Professionals : a NIST security configuration checklist
2008
K A Scarfone, M P Souppaya, P M Johnson
NIST SP 800-68r1
10.6028/NIST.SP.800-68r1
Download PDF | Download Citation
Interfaces for personal identity verification 
2008
R Chandramouli, J F Dray, H Ferraiolo, S B Guthery, W I MacGregor, K Mehta
NIST SP 800-73-2
10.6028/NIST.SP.800-73-2
Download PDF | Download Citation
Guide to Industrial control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC)
2008
K A Stouffer, J A Falco, K A Scarfone
NIST SP 800-82e2008
10.6028/NIST.SP.800-82e2008
Download PDF | Download Citation
Codes for identification of federal and federally-assisted organizations 
2008
W C Barker, H Ferraiolo
NIST SP 800-87r1
10.6028/NIST.SP.800-87r1
Download PDF | Download Citation
Guidelines on cell phone forensics 
2007
W Jansen, R P Ayers
NIST SP 800-101
10.6028/NIST.SP.800-101
Download PDF | Download Citation
A scheme for PIV visual card topography 
2007
W I MacGregor, T Schwarzhoff, K Mehta
NIST SP 800-104
10.6028/NIST.SP.800-104
Download PDF | Download Citation
Guide to storage encryption technologies for end user devices 
2007
K A Scarfone, M P Souppaya, M Sexton
NIST SP 800-111
10.6028/NIST.SP.800-111
Download PDF | Download Citation
User's guide to securing external devices for telework and remote access 
2007
K A Scarfone, M P Souppaya
NIST SP 800-114
10.6028/NIST.SP.800-114
Download PDF | Download Citation
Recommendation for block cipher modes of operation : the CCM mode for authentication and confidentiality
2007
M J Dworkin
NIST SP 800-38c
10.6028/NIST.SP.800-38c
Download PDF | Download Citation
Recommendation for block cipher modes of operation : GaloisCounter Mode (GCM) and GMAC
2007
M J Dworkin
NIST SP 800-38d
10.6028/NIST.SP.800-38d
Download PDF | Download Citation
Guidelines on securing public web servers 
2007
M C Tracy, W Jansen, K A Scarfone, T Winograd
NIST SP 800-44ver2
10.6028/NIST.SP.800-44ver2
Download PDF | Download Citation
Guidelines on electronic mail security 
2007
M C Tracy, W Jansen, K A Scarfone, J Butterfield
NIST SP 800-45ver2
10.6028/NIST.SP.800-45ver2
Download PDF | Download Citation
Recommended security controls for federal information systems and organizations 
2007
R Ross, S Katzke, L A Johnson, M Swanson, G Stoneburner, G Rogers
NIST SP 800-53r2
10.6028/NIST.SP.800-53r2
Download PDF | Download Citation
Border gateway protocol security 
2007
D R Kuhn, K Sriram, D C Montgomery
NIST SP 800-54
10.6028/NIST.SP.800-54
Download PDF | Download Citation
Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography 
2007
E B Barker, D Johnson, M E Smid
NIST SP 800-56ar
10.6028/NIST.SP.800-56ar
Download PDF | Download Citation
Recommendation for key management, part 1 : general (revised)
2007
E B Barker, W C Barker, W E Burr, W T Polk, M E Smid
NIST SP 800-57p1r2007
10.6028/NIST.SP.800-57p1r2007
Download PDF | Download Citation
Biometric data specification for personal identity verification 
2007
C L Wilson, P J Grother, R Chandramouli
NIST SP 800-76-1
10.6028/NIST.SP.800-76-1
Download PDF | Download Citation
Cryptographic algorithms and key sizes for personal identity verification 
2007
W T Polk, D F Dodson, W E Burr
NIST SP 800-78-1
10.6028/NIST.SP.800-78-1
Download PDF | Download Citation
Codes for the identification of federal and federally assisted organizations 
2007
W C Barker, H Ferraiolo
NIST SP 800-87ver1e2007
10.6028/NIST.SP.800-87ver1e2007
Download PDF | Download Citation
Recommendation for random number generation using deterministic random bit generators (revised) 
2007
E B Barker, J M Kelsey
NIST SP 800-90
10.6028/NIST.SP.800-90
Download PDF | Download Citation
Recommendation for random number generation using deterministic random bit generators (revised) 
2007
E B Barker, J M Kelsey
NIST SP 800-90r
10.6028/NIST.SP.800-90r
Download PDF | Download Citation
Guide to Intrusion Detection and Prevention Systems (IDPS) 
2007
K A Scarfone, P M Mell
NIST SP 800-94
10.6028/NIST.SP.800-94
Download PDF | Download Citation
Guide to secure web services 
2007
A Singhal, T Winograd, K A Scarfone
NIST SP 800-95
10.6028/NIST.SP.800-95
Download PDF | Download Citation
Establishing wireless robust security networks : a guide to IEEE 802.11i
2007
S E Frankel, B Eydt, L Owens, K A Scarfone
NIST SP 800-97
10.6028/NIST.SP.800-97
Download PDF | Download Citation
Guidelines for securing Radio Frequency Identification (RFID) systems 
2007
A T Karygiannis, B Eydt, G Barber, L Bunn, T Phillips
NIST SP 800-98
10.6028/NIST.SP.800-98
Download PDF | Download Citation
Information security handbook : a guide for managers
2006
P Bowen, J Hash, M Wilson
NIST SP 800-100
10.6028/NIST.SP.800-100
Download PDF | Download Citation
Guide for developing security plans for federal information systems 
2006
M Swanson, J Hash, P Bowen
NIST SP 800-18r1
10.6028/NIST.SP.800-18r1
Download PDF | Download Citation
Recommended security controls for federal information systems and organizations 
2006
R Ross, S Katzke, L A Johnson, M Swanson, G Stoneburner, G Rogers
NIST SP 800-53r1
10.6028/NIST.SP.800-53r1
Download PDF | Download Citation
Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography 
2006

NIST SP 800-56a
10.6028/NIST.SP.800-56a
Download PDF | Download Citation
Recommendation for key management, part 1 : general (revised)
2006
E B Barker, W C Barker, W E Burr, W T Polk, M E Smid
NIST SP 800-57p1r2006
10.6028/NIST.SP.800-57p1r2006
Download PDF | Download Citation
Electronic authentication guideline 
2006
W E Burr, D F Dodson, W T Polk
NIST SP 800-63v1.0.2
10.6028/NIST.SP.800-63v1.0.2
Download PDF | Download Citation
Guidance for securing Microsoft Windows XP Home Edition : a NIST security configuration checklist
2006
K Kent, M P Souppaya, J Connor
NIST SP 800-69
10.6028/NIST.SP.800-69
Download PDF | Download Citation
Interfaces for personal identity verification 
2006
J F Dray, S Guthery, T Schwarzhoff
NIST SP 800-73-1
10.6028/NIST.SP.800-73-1
Download PDF | Download Citation
Secure Domain Name System (DNS) deployment guide 
2006
R Chandramouli, S W Rose
NIST SP 800-81
10.6028/NIST.SP.800-81
Download PDF | Download Citation
Guide to test, training, and exercise programs for IT plans and capabilities 
2006
T Grance, T Nolan, K Burke, R Dudley, G White, T Good
NIST SP 800-84
10.6028/NIST.SP.800-84
Download PDF | Download Citation
PIV card application and middleware interface test guidelines (SP800-73 compliance) 
2006
R Chandramouli, L Eyuboglu, K Mehta
NIST SP 800-85a
10.6028/NIST.SP.800-85a
Download PDF | Download Citation
PIV data model test guidelines 
2006
R Chandramouli, K Mehta, P A Uzamere II, D Simon, N Ghadiali, A P Founds
NIST SP 800-85b
10.6028/NIST.SP.800-85b
Download PDF | Download Citation
Guide to integrating forensic techniques into incident response 
2006
K Kent, S Chevalier, T Grance, H Dang
NIST SP 800-86
10.6028/NIST.SP.800-86
Download PDF | Download Citation
Codes for the identification of federal and federally assisted organizations 
2006
W C Barker, H Ferraiolo
NIST SP 800-87ver1e2006
10.6028/NIST.SP.800-87ver1e2006
Download PDF | Download Citation
Guidelines for media sanitization 
2006
R Kissel, M A Scholl, S Skolochenko, X Li
NIST SP 800-88
10.6028/NIST.SP.800-88
Download PDF | Download Citation
Recommendation for obtaining assurances for digital signature applications 
2006
E B Barker
NIST SP 800-89
10.6028/NIST.SP.800-89
Download PDF | Download Citation
Guide to computer security log management 
2006
K Kent, M P Souppaya
NIST SP 800-92
10.6028/NIST.SP.800-92
Download PDF | Download Citation
PIV card to reader interoperability guidelines 
2006
J F Dray, A Giles, M Kelley, R Chandramouli
NIST SP 800-96
10.6028/NIST.SP.800-96
Download PDF | Download Citation
Guideline for implementing cryptography in the federal government 
2005
E B Barker, W C Barker, A Lee
NIST SP 800-21e2
10.6028/NIST.SP.800-21e2
Download PDF | Download Citation
Recommendation for block cipher modes of operation : the CMAC mode for authentication
2005
M J Dworkin
NIST SP 800-38b-2005
10.6028/NIST.SP.800-38b-2005
Download PDF | Download Citation
Creating a patch and vulnerability management program 
2005
P M Mell, T Bergeron, D Henning
NIST SP 800-40ver2
10.6028/NIST.SP.800-40ver2
Download PDF | Download Citation
Guidelines for the selection, configuration, and use of Transport Layer Security (TLS) implementations 
2005
C M Chernick, C, III Edington, M J Fanto, R Rosenthal
NIST SP 800-52
10.6028/NIST.SP.800-52
Download PDF | Download Citation
Recommended security controls for federal information systems and organizations 
2005
R Ross, S Katzke, L A Johnson, M Swanson, G Stoneburner, G Rogers, A Lee
NIST SP 800-53
10.6028/NIST.SP.800-53
Download PDF | Download Citation
Recommendation for key management, part 1 : general
2005
E B Barker, W C Barker, W E Burr, W T Polk, M E Smid
NIST SP 800-57p1
10.6028/NIST.SP.800-57p1
Download PDF | Download Citation
Recommendation for key management, part 2 : best practices for key management organization
2005
E B Barker, W C Barker, W E Burr, W T Polk, M E Smid
NIST SP 800-57p2
10.6028/NIST.SP.800-57p2
Download PDF | Download Citation
Security considerations for Voice Over IP Systems 
2005
D R Kuhn, T J Walsh, S Fries
NIST SP 800-58
10.6028/NIST.SP.800-58
Download PDF | Download Citation
Integrating IT Security into the Capital Planning and Investment Control Process 
2005
J Hash, N Bartol, H Rollins, W Robinson, J Abeles, S Batdorff
NIST SP 800-65
10.6028/NIST.SP.800-65
Download PDF | Download Citation
An introductory resource guide for implementing the Health Insurance Portability and Accountability Act (HIPAA) security rule 
2005
J Hash, P Bowen, L A Johnson, C D Smith, D I Steingberg
NIST SP 800-66
10.6028/NIST.SP.800-66
Download PDF | Download Citation
Guidance for securing Microsoft Windows XP for IT Professionals : a NIST security configuration checklist : recommendations of the National Institute of Standards and Technology
2005
Murugia Souppaya, Karen Kent, Paul M Johnson
NIST SP 800-68
10.6028/NIST.SP.800-68
Download PDF | Download Citation
Security configuration checklists program for IT products : guidance for checklists users and developers
2005
Murugiah Souppaya, John P Wack, Karen Kent
NIST SP 800-70
10.6028/NIST.SP.800-70
Download PDF | Download Citation
Interfaces for personal identity verification 
2005
J F Dray, S Guthery, T Schwarzhoff
NIST SP 800-73
10.6028/NIST.SP.800-73
Download PDF | Download Citation
Biometric data specification for personal identity verification 
2005
C L Wilson, P J Grother, R Chandramouli
NIST SP 800-76
10.6028/NIST.SP.800-76
Download PDF | Download Citation
Guide to IPsec VPNs 
2005
S E Frankel, K Kent, R Lewkowski, A D Orebaugh, R W Ritchey, S R Sharma
NIST SP 800-77
10.6028/NIST.SP.800-77
Download PDF | Download Citation
Cryptographic algorithms and key sizes for personal identity verification 
2005
W T Polk, D F Dodson, W E Burr
NIST SP 800-78
10.6028/NIST.SP.800-78
Download PDF | Download Citation
Guidelines for the certification and accreditation of PIV card issuing organizations 
2005
D K Branstad, A Clay, J Hash
NIST SP 800-79
10.6028/NIST.SP.800-79
Download PDF | Download Citation
Guide to malware incident prevention and handling 
2005
P Mell, K A Kent, J Nusbaum
NIST SP 800-83
10.6028/NIST.SP.800-83
Download PDF | Download Citation
PIV middleware and on-card application conformance test guidance (SP 800-73 compliance) 
2005
R Chandramouli, L Eyuboglu, K Mehta
NIST SP 800-85
10.6028/NIST.SP.800-85
Download PDF | Download Citation
Codes for the identification of federal and federally assisted organizations version 1.0 
2005
W C Barker, H Ferraiolo
NIST SP 800-87ver1
10.6028/NIST.SP.800-87ver1
Download PDF | Download Citation
Engineering principles for information technology security (a baseline for achieving security), revision a 
2004
G Stoneburner, C Hayden, A Feringa
NIST SP 800-27ra
10.6028/NIST.SP.800-27ra
Download PDF | Download Citation
Guide for the security certification and accreditation of federal information systems 
2004
R Ross, M Swanson, G Stoneburner, S Katzke, L A Johnson
NIST SP 800-37
10.6028/NIST.SP.800-37
Download PDF | Download Citation
Volume I : guide for mapping types of information and information systems to security categories
2004
William C Barker
NIST SP 800-60ver2v1
10.6028/NIST.SP.800-60ver2v1
Download PDF | Download Citation
Volume II : appendices to guide for mapping types of information and information systems to security categories
2004
William C Barker, Annabelle Lee
NIST SP 800-60ver2v2
10.6028/NIST.SP.800-60ver2v2
Download PDF | Download Citation
Computer security incident handling guide 
2004
T Grance, K A Kent, B Kim
NIST SP 800-61
10.6028/NIST.SP.800-61
Download PDF | Download Citation
Electronic authentication guideline 
2004
W E Burr, D F Dodson, W T Polk
NIST SP 800-63v1.0
10.6028/NIST.SP.800-63v1.0
Download PDF | Download Citation
Electronic authentication guideline 
2004
W E Burr, D F Dodson, W T Polk
NIST SP 800-63v1.0.1
10.6028/NIST.SP.800-63v1.0.1
Download PDF | Download Citation
Security considerations in the information system development life cycle 
2004
T Grance, J Hash, M Stevens
NIST SP 800-64r1
10.6028/NIST.SP.800-64r1
Download PDF | Download Citation
Recommendation for the triple data encryption algorithm (TDEA) block cipher 
2004
W C Barker
NIST SP 800-67ver1
10.6028/NIST.SP.800-67ver1
Download PDF | Download Citation
Guidelines on PDA forensics 
2004
W Jansen, R P Ayers
NIST SP 800-72
10.6028/NIST.SP.800-72
Download PDF | Download Citation
Guide to information technology security services 
2003
T Grance, J Hash, M Stevens, K O'Neal, N Bartol
NIST SP 800-35
10.6028/NIST.SP.800-35
Download PDF | Download Citation
Guide to selecting information technology security products 
2003
T Grance, M Stevens, M Myers
NIST SP 800-36
10.6028/NIST.SP.800-36
Download PDF | Download Citation
Guideline on network security testing 
2003
J P Wack, M C Tracy, M P Souppaya
NIST SP 800-42
10.6028/NIST.SP.800-42
Download PDF | Download Citation
Building an Information Technology Security Awareness and Training Program 
2003
M Wilson, J Hash
NIST SP 800-50
10.6028/NIST.SP.800-50
Download PDF | Download Citation
Security metrics guide for information technology systems 
2003
M Swanson, N Bartol, J Sabato, J Hash, L Graffo
NIST SP 800-55
10.6028/NIST.SP.800-55
Download PDF | Download Citation
Guideline for identifying an information system as a national security system 
2003
W C Barker
NIST SP 800-59
10.6028/NIST.SP.800-59
Download PDF | Download Citation
Security considerations in the information system development life cycle 
2003
T Grance, J Hash, M Stevens
NIST SP 800-64
10.6028/NIST.SP.800-64
Download PDF | Download Citation
Risk management guide for information technology systems : recommendations of the National Institute of Standards and Technology
2002
Gary Stoneburner, Alice Goguen, Alexis Feringa
NIST SP 800-30
10.6028/NIST.SP.800-30
Download PDF | Download Citation
Contingency planning guide for information technology systems : recommendations of the National Institute of Standards and Technology
2002
Marianne Swanson, Amy Wohl, Lucinda Pope, Tim Grance, Joan Hash, Ray Thomas
NIST SP 800-34
10.6028/NIST.SP.800-34
Download PDF | Download Citation
Procedures for handling security patches 
2002
P M Mell, M C Tracy
NIST SP 800-40
10.6028/NIST.SP.800-40
Download PDF | Download Citation
Guidelines on firewalls and firewall policy : recommendations of the National Institute of Standards and Technology
2002
John Wack, Ken Cutler, Jamie Pole
NIST SP 800-41
10.6028/NIST.SP.800-41
Download PDF | Download Citation
Systems administration guidance for securing Windows 2000 Professional system 
2002
M P Souppaya, A B Harris, M McLarnon, N Selimis
NIST SP 800-43
10.6028/NIST.SP.800-43
Download PDF | Download Citation
Guidelines on securing public web servers 
2002
M C Tracy, W Jansen, M McLarnon
NIST SP 800-44
10.6028/NIST.SP.800-44
Download PDF | Download Citation
Guidelines on electronic mail security 
2002
M C Tracy, W Jansen, S Bisker
NIST SP 800-45
10.6028/NIST.SP.800-45
Download PDF | Download Citation
Security for telecommuting and broadband communications : recommendations of the National Institute of Standards and Technology
2002
D Richard Kuhn, Miles C Tracy, Sheila E Frankel
NIST SP 800-46
10.6028/NIST.SP.800-46
Download PDF | Download Citation
Security guide for interconnecting information technology systems 
2002
T Grance, J Hash, S Peck, J Smith, K Korow-Diks
NIST SP 800-47
10.6028/NIST.SP.800-47
Download PDF | Download Citation
Wireless security : 802.11, bluetooth and handheld devices
2002
A T Karygiannis, L Owens
NIST SP 800-48
10.6028/NIST.SP.800-48
Download PDF | Download Citation
Federal SMIME V3 client profile 
2002
C M Chernick
NIST SP 800-49
10.6028/NIST.SP.800-49
Download PDF | Download Citation
Use of the Common Vulnerabilities and Exposures (CVE) vulnerability naming scheme 
2002
P Mell, T Grance
NIST SP 800-51
10.6028/NIST.SP.800-51
Download PDF | Download Citation
PBX vulnerability analysis : finding holes in your PBX before someone else does
2001
D Richard Kuhn
NIST SP 800-24
10.6028/NIST.SP.800-24
Download PDF | Download Citation
Security self-assessment guide for information technology systems 
2001
Marianne Swanson
NIST SP 800-26
10.6028/NIST.SP.800-26
Download PDF | Download Citation
Engineering principles for information technology security (a baseline for achieving security) : recommendations of the National Institute of Standards and Technology
2001
Gary Stoneburner, Clark Hayden, Alexis Feringa
NIST SP 800-27
10.6028/NIST.SP.800-27
Download PDF | Download Citation
Guidelines on active content and mobile code 
2001
W Jansen
NIST SP 800-28
10.6028/NIST.SP.800-28
Download PDF | Download Citation
A comparison of the security requirements for cryptographic modules in FIPS 140-1 and FIPS 140-2 
2001
Ray Snouffer, Annabelle Lee, Arch Oldehoeft
NIST SP 800-29
10.6028/NIST.SP.800-29
Download PDF | Download Citation
Intrusion detection systems 
2001
Rebecca Bace, Peter Mell
NIST SP 800-31
10.6028/NIST.SP.800-31
Download PDF | Download Citation
Introduction to public key technology and the federal PKI infrastructure 
2001
D R Kuhn, V Hu, W T Polk, Shu-Jen H Chang
NIST SP 800-32
10.6028/NIST.SP.800-32
Download PDF | Download Citation
Underlying technical models for information technology security : recommendations of the National Institute of Standards and Technology
2001
Gary Stoneburner
NIST SP 800-33
10.6028/NIST.SP.800-33
Download PDF | Download Citation
Recommendation for block cipher modes of operation : methods and techniques
2001
M J Dworkin
NIST SP 800-38a
10.6028/NIST.SP.800-38a
Download PDF | Download Citation
A statistical test suite for random and pseudorandom number generators for cryptographic applications 
2000
Andrew Rukhin, Juan Sota, James Nechvatal, Miles Smid, Elaine Barker, Stefan Leigh, Mark Levenson, Mark Vangel, David Banks, Alan Heckert, James Dray, San Vo
NIST SP 800-22
10.6028/NIST.SP.800-22
Download PDF | Download Citation
Guidelines to federal organizations on security assurance and acquisitionuse of testedevaluated products 
2000
Edward A Roback
NIST SP 800-23
10.6028/NIST.SP.800-23
Download PDF | Download Citation
Federal agency use of public key technology for digital signatures and authentication 
2000
Kathy Lyons-Burke
NIST SP 800-25
10.6028/NIST.SP.800-25
Download PDF | Download Citation
Mobile agent security 
1999
Wayne Jansen, Tom Karygiannis
NIST SP 800-19
10.6028/NIST.SP.800-19
Download PDF | Download Citation
Guideline for implementing cryptography in the federal government 
1999
Annabelle Lee
NIST SP 800-21
10.6028/NIST.SP.800-21
Download PDF | Download Citation
Minimum interoperability specification for PKI components (MISPC) 
1998
William Burr, Donna Dodson, Noel Nazario, Timothy Polk
NIST SP 800-15
10.6028/NIST.SP.800-15
Download PDF | Download Citation
Information technology security training requirements : a role- and performance-based model
1998
Mark Wilson, Dorothea E de Zafra, Sadie I Pitcher, John D Tressler, John B Ippolito
NIST SP 800-16
10.6028/NIST.SP.800-16
Download PDF | Download Citation
Modes of Operation Validation System (MOVS) : requirements and procedures
1998
Sharon Keller, Miles Smid
NIST SP 800-17
10.6028/NIST.SP.800-17
Download PDF | Download Citation
Guide for developing security plans for information technology systems 
1998
Marianne Swanson
NIST SP 800-18
10.6028/NIST.SP.800-18
Download PDF | Download Citation
Generally accepted principles and practices for securing information technology systems 
1996
Marianne Swanson, Barbara Guttman
NIST SP 800-14
10.6028/NIST.SP.800-14
Download PDF | Download Citation
The impact of the FCC's Open Network Architecture on NSNP telecommunications security 
1995
Karen Olsen, John Tebbutt
NIST SP 800-11
10.6028/NIST.SP.800-11
Download PDF | Download Citation
An introduction to computer security : the NIST handbook
1995
Barbara Guttman, Edward Roback
NIST SP 800-12
10.6028/NIST.SP.800-12
Download PDF | Download Citation
Telecommunications security guidelines for telecommunications management network 
1995
John Kimmins, Charles Dinkel, Dale Walters
NIST SP 800-13
10.6028/NIST.SP.800-13
Download PDF | Download Citation
Keeping your site comfortably secure : an introduction to Internet firewalls
1994
John P Wack, Lisa J Carnahan
NIST SP 800-10
10.6028/NIST.SP.800-10
Download PDF | Download Citation
Security in open systems 
1994
John Barkley
NIST SP 800-7
10.6028/NIST.SP.800-7
Download PDF | Download Citation
Security issues in the database language SQL 
1993
W Timothy Polk, Lawrence E, III Bassham
NIST SP 800-8
10.6028/NIST.SP.800-8
Download PDF | Download Citation
Good security practices for electronic commerce, including electronic data interchange 
1993
Roy G Saltman
NIST SP 800-9
10.6028/NIST.SP.800-9
Download PDF | Download Citation
Computer security considerations in federal procurements : a guide for procurement initiators, contracting officers, and computer security officials
1992
Barbara Guttman
NIST SP 800-4
10.6028/NIST.SP.800-4
Download PDF | Download Citation
A guide to the selection of anti-virus tools and techniques 
1992
W Timothy Polk, Lawrence E, III Bassham
NIST SP 800-5
10.6028/NIST.SP.800-5
Download PDF | Download Citation
Automated tools for testing computer system vulnerability 
1992
W Timothy Polk
NIST SP 800-6
10.6028/NIST.SP.800-6
Download PDF | Download Citation
Public-key cryptography 
1991
James Nechvatal
NIST SP 800-2
10.6028/NIST.SP.800-2
Download PDF | Download Citation
Establishing a computer security incident response capability (CSIRC) 
1991
John P Wack
NIST SP 800-3
10.6028/NIST.SP.800-3
Download PDF | Download Citation
Bibliography of selected computer security publications : January 1980-October 1989
1990
Lawrence E, III Bassham
NIST SP 800-1
10.6028/NIST.SP.800-1
Download PDF | Download Citation