List now available on the NIST Research Library's website
SP 800: Computer Security Series
List updated 2024-03-13-04:00
SP800
Secure Development Practices for Generative AI and Dual-Use Foundation AI Models:
An SSDF Community Profile
2024
NIST SP 800-218A ipd
10.6028/NIST.SP.800-218A.ipd
Download PDF | Download Citation
2024
NIST SP 800-218A ipd
10.6028/NIST.SP.800-218A.ipd
Download PDF | Download Citation
High-Performance Computing Security: Architecture, Threat Analysis, and Security Posture
2024
NIST SP 800-223
10.6028/NIST.SP.800-223
Download PDF | Download Citation
2024
NIST SP 800-223
10.6028/NIST.SP.800-223
Download PDF | Download Citation
Recommendation for Key Derivation Using Pseudorandom Functions
2024
NIST SP 800-108r1-upd1
10.6028/NIST.SP.800-108r1-upd1
Download PDF | Download Citation
2024
NIST SP 800-108r1-upd1
10.6028/NIST.SP.800-108r1-upd1
Download PDF | Download Citation
Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security
Rule: A Cybersecurity Resource Guide
2024
NIST SP 800-66r2
10.6028/NIST.SP.800-66r2
Download PDF | Download Citation
2024
NIST SP 800-66r2
10.6028/NIST.SP.800-66r2
Download PDF | Download Citation
Guide for Mapping Types of Information and Systems to Security Categories
2024
NIST SP 800-60r2 iwd
10.6028/NIST.SP.800-60r2.iwd
Download PDF | Download Citation
2024
NIST SP 800-60r2 iwd
10.6028/NIST.SP.800-60r2.iwd
Download PDF | Download Citation
Recommendation for Additional Parameter Sets for the Stateless Hash-Based Digital
Signature Scheme
2024
NIST SP 800-230 ipd
10.6028/NIST.SP.800-230.ipd
Download PDF | Download Citation
2024
NIST SP 800-230 ipd
10.6028/NIST.SP.800-230.ipd
Download PDF | Download Citation
Measurement Guide for Information Security: Volume 1 — Identifying and Selecting Measures
2024
NIST SP 800-55v1 ipd
10.6028/NIST.SP.800-55v1.ipd
Download PDF | Download Citation
2024
NIST SP 800-55v1 ipd
10.6028/NIST.SP.800-55v1.ipd
Download PDF | Download Citation
Measurement Guide for Information Security: Volume 2 — Developing an Information Security Measurement Program
2024
NIST SP 800-55v2 ipd
10.6028/NIST.SP.800-55v2.ipd
Download PDF | Download Citation
2024
NIST SP 800-55v2 ipd
10.6028/NIST.SP.800-55v2.ipd
Download PDF | Download Citation
Guidelines for the Authorization of PIV Card and Derived PIV Credential Issuers
December 2023
NIST SP 800-79r3 ipd
10.6028/NIST.SP.800-79r3.ipd
Download PDF | Download Citation
December 2023
NIST SP 800-79r3 ipd
10.6028/NIST.SP.800-79r3.ipd
Download PDF | Download Citation
Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
November 2023
NIST SP 800-171r3 fpd
10.6028/NIST.SP.800-171r3.fpd
Download PDF | Download Citation
November 2023
NIST SP 800-171r3 fpd
10.6028/NIST.SP.800-171r3.fpd
Download PDF | Download Citation
Assessing Security Requirements for Controlled Unclassified Information
November 2023
NIST SP 800-171Ar3 ipd
10.6028/NIST.SP.800-171Ar3.ipd
Download PDF | Download Citation
November 2023
NIST SP 800-171Ar3 ipd
10.6028/NIST.SP.800-171Ar3.ipd
Download PDF | Download Citation
Cybersecurity Log Management Planning Guide
October 2023
NIST SP 800-92r1 ipd
10.6028/NIST.SP.800-92r1.ipd
Download PDF | Download Citation
October 2023
NIST SP 800-92r1 ipd
10.6028/NIST.SP.800-92r1.ipd
Download PDF | Download Citation
Interfaces for Personal Identity Verification: Part 2 – PIV Card Application Card Command Interface
September 2023
NIST SP 800-73pt2-5 ipd
10.6028/NIST.SP.800-73pt2-5.ipd
Download PDF | Download Citation
September 2023
NIST SP 800-73pt2-5 ipd
10.6028/NIST.SP.800-73pt2-5.ipd
Download PDF | Download Citation
Cryptographic Algorithms and Key Sizes for Personal Identity Verification
September 2023
NIST SP 800-78-5 ipd
10.6028/NIST.SP.800-78-5.ipd
Download PDF | Download Citation
September 2023
NIST SP 800-78-5 ipd
10.6028/NIST.SP.800-78-5.ipd
Download PDF | Download Citation
Interfaces for Personal Identity Verification: Part 3 – PIV Client Application Programming Interface
September 2023
NIST SP 800-73pt3-5 ipd
10.6028/NIST.SP.800-73pt3-5.ipd
Download PDF | Download Citation
September 2023
NIST SP 800-73pt3-5 ipd
10.6028/NIST.SP.800-73pt3-5.ipd
Download PDF | Download Citation
Interfaces for Personal Identity Verification: Part 1 – PIV Card Application Namespace, Data Model, and Representation
September 2023
NIST SP 800-73pt1-5 ipd
10.6028/NIST.SP.800-73pt1-5.ipd
Download PDF | Download Citation
September 2023
NIST SP 800-73pt1-5 ipd
10.6028/NIST.SP.800-73pt1-5.ipd
Download PDF | Download Citation
Guide to Operational Technology (OT) Security
September 2023
NIST SP 800-82r3
10.6028/NIST.SP.800-82r3
Download PDF | Download Citation
September 2023
NIST SP 800-82r3
10.6028/NIST.SP.800-82r3
Download PDF | Download Citation
National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework
(French translation)
August 2017
NIST SP 800-181 fre
10.6028/NIST.SP.800-181.fre
Download PDF | Download Citation
August 2017
NIST SP 800-181 fre
10.6028/NIST.SP.800-181.fre
Download PDF | Download Citation
Workforce Framework for Cybersecurity (NICE Framework) (French translation)
November 2020
NIST SP 800-181r1 fre
10.6028/NIST.SP.800-181r1.fre
Download PDF | Download Citation
November 2020
NIST SP 800-181r1 fre
10.6028/NIST.SP.800-181r1.fre
Download PDF | Download Citation
A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in
Multi-Location Environments
September 2023
NIST SP 800-207A
10.6028/NIST.SP.800-207A
Download PDF | Download Citation
September 2023
NIST SP 800-207A
10.6028/NIST.SP.800-207A
Download PDF | Download Citation
De-Identifying Government Datasets Techniques and Governance
September 2023
NIST SP 800-188
10.6028/NIST.SP.800-188
Download PDF | Download Citation
September 2023
NIST SP 800-188
10.6028/NIST.SP.800-188
Download PDF | Download Citation
Building a Cybersecurity and Privacy Learning Program
August 2023
NIST SP 800-50r1 ipd
10.6028/NIST.SP.800-50r1.ipd
Download PDF | Download Citation
August 2023
NIST SP 800-50r1 ipd
10.6028/NIST.SP.800-50r1.ipd
Download PDF | Download Citation
Automated secure configuration guidance from the macOS security compliance project: (mSCP)
July 2023
NIST SP 800-219r1
10.6028/NIST.SP.800-219r1
Download PDF | Download Citation
July 2023
NIST SP 800-219r1
10.6028/NIST.SP.800-219r1
Download PDF | Download Citation
Recommendations for federal vulnerability disclosure guidelines
May 2023
NIST SP 800-216
10.6028/NIST.SP.800-216
Download PDF | Download Citation
May 2023
NIST SP 800-216
10.6028/NIST.SP.800-216
Download PDF | Download Citation
Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
May 2023
NIST SP 800-171r3 ipd
10.6028/NIST.SP.800-171r3.ipd
Download PDF | Download Citation
May 2023
NIST SP 800-171r3 ipd
10.6028/NIST.SP.800-171r3.ipd
Download PDF | Download Citation
Guidelines for managing the security of 34 mobile devices in the enterprise
May 2023
NIST SP 800-124r2
10.6028/NIST.SP.800-124r2
Download PDF | Download Citation
May 2023
NIST SP 800-124r2
10.6028/NIST.SP.800-124r2
Download PDF | Download Citation
CMVP Approved Sensitive Security Parameter Generation and Establishment Methods
July 2023
NIST SP 800-140Dr2
10.6028/NIST.SP.800-140Dr2
Download PDF | Download Citation
July 2023
NIST SP 800-140Dr2
10.6028/NIST.SP.800-140Dr2
Download PDF | Download Citation
CMVP Approved Security Functions
July 2023
NIST SP 800-140Cr2
10.6028/NIST.SP.800-140Cr2
Download PDF | Download Citation
July 2023
NIST SP 800-140Cr2
10.6028/NIST.SP.800-140Cr2
Download PDF | Download Citation
2022 cybersecurity & privacy annual report
May 2023
NIST SP 800-225
10.6028/NIST.SP.800-225
Download PDF | Download Citation
May 2023
NIST SP 800-225
10.6028/NIST.SP.800-225
Download PDF | Download Citation
Automated Secure Configuration Guidance from the macOS Security Compliance Project
(mSCP)
March 2023
NIST SP 800-219r1 ipd
10.6028/NIST.SP.800-219r1.ipd
Download PDF | Download Citation
March 2023
NIST SP 800-219r1 ipd
10.6028/NIST.SP.800-219r1.ipd
Download PDF | Download Citation
NIST Cloud Computing Forensic Reference Architecture
February 2023
NIST SP 800-201 ipd
10.6028/NIST.SP.800-201.ipd
Download PDF | Download Citation
February 2023
NIST SP 800-201 ipd
10.6028/NIST.SP.800-201.ipd
Download PDF | Download Citation
Guidelines for Personal Identity Verification (PIV) Federation
January 2023
NIST SP 800-217 ipd
10.6028/NIST.SP.800-217.ipd
Download PDF | Download Citation
January 2023
NIST SP 800-217 ipd
10.6028/NIST.SP.800-217.ipd
Download PDF | Download Citation
Guidelines for Derived Personal Identity Verification (PIV) Credentials
January 2023
NIST SP 800-157r1 ipd
10.6028/NIST.SP.800-157r1.ipd
Download PDF | Download Citation
January 2023
NIST SP 800-157r1 ipd
10.6028/NIST.SP.800-157r1.ipd
Download PDF | Download Citation
De-Identifying Government Data Sets
November 2022
NIST SP 800-188 3pd
10.6028/NIST.SP.800-188.3pd
Download PDF | Download Citation
November 2022
NIST SP 800-188 3pd
10.6028/NIST.SP.800-188.3pd
Download PDF | Download Citation
Guide to a secure enterprise network landscape
November 2022
NIST SP 800-215
10.6028/NIST.SP.800-215
Download PDF | Download Citation
November 2022
NIST SP 800-215
10.6028/NIST.SP.800-215
Download PDF | Download Citation
Performance Measurement Guide for Information Security
November 2022
NIST SP 800-055r2 iwd
10.6028/NIST.SP.800-55r2.iwd
Download PDF | Download Citation
November 2022
NIST SP 800-055r2 iwd
10.6028/NIST.SP.800-55r2.iwd
Download PDF | Download Citation
Engineering trustworthy secure systems
November 2022
NIST SP 800-160v1r1
10.6028/NIST.SP.800-160v1r1
Download PDF | Download Citation
November 2022
NIST SP 800-160v1r1
10.6028/NIST.SP.800-160v1r1
Download PDF | Download Citation
Digital Identity Guidelines: Federation and Assertions
December 2022
NIST SP 800-63C-4 ipd
10.6028/NIST.SP.800-63C-4.ipd
Download PDF | Download Citation
December 2022
NIST SP 800-63C-4 ipd
10.6028/NIST.SP.800-63C-4.ipd
Download PDF | Download Citation
Digital Identity Guidelines: Authentication and Lifecycle Management
December 2022
NIST SP 800-63B-4 ipd
10.6028/NIST.SP.800-63B-4.ipd
Download PDF | Download Citation
December 2022
NIST SP 800-63B-4 ipd
10.6028/NIST.SP.800-63B-4.ipd
Download PDF | Download Citation
Digital Identity Guidelines
December 2022
NIST SP 800-063-4 ipd
10.6028/NIST.SP.800-63-4.ipd
Download PDF | Download Citation
December 2022
NIST SP 800-063-4 ipd
10.6028/NIST.SP.800-63-4.ipd
Download PDF | Download Citation
Digital Identity Guidelines: Enrollment and Identity Proofing
December 2022
NIST SP 800-63A-4 ipd
10.6028/NIST.SP.800-63A-4.ipd
Download PDF | Download Citation
December 2022
NIST SP 800-63A-4 ipd
10.6028/NIST.SP.800-63A-4.ipd
Download PDF | Download Citation
CMVP Security Policy Requirements: CMVP Validation Authority Updates to ISO/IEC 24759 and ISO/IEC 19790 Annex B
October 2022
NIST SP 800-140Br1 2pd
10.6028/NIST.SP.800-140Br1.2pd
Download PDF | Download Citation
October 2022
NIST SP 800-140Br1 2pd
10.6028/NIST.SP.800-140Br1.2pd
Download PDF | Download Citation
Recommendations for Discrete Logarithm-based Cryptography: Elliptic Curve Domain Parameters
February 2023
NIST SP 800-186
10.6028/NIST.SP.800-186
Download PDF | Download Citation
February 2023
NIST SP 800-186
10.6028/NIST.SP.800-186
Download PDF | Download Citation
Recommendation for Random Bit Generator (RBG) Constructions
September 2022
NIST SP 800-90C 3pd
10.6028/NIST.SP.800-90C.3pd
Download PDF | Download Citation
September 2022
NIST SP 800-90C 3pd
10.6028/NIST.SP.800-90C.3pd
Download PDF | Download Citation
2021 cybersecurity and privacy annual report
September 2022
NIST SP 800-220
10.6028/NIST.SP.800-220
Download PDF | Download Citation
September 2022
NIST SP 800-220
10.6028/NIST.SP.800-220
Download PDF | Download Citation
Recommendation for key derivation using pseudorandom functions
August 2022
NIST SP 800-108r1
10.6028/NIST.SP.800-108r1
Download PDF | Download Citation
August 2022
NIST SP 800-108r1
10.6028/NIST.SP.800-108r1
Download PDF | Download Citation
Guide to Secure Enterprise Network Access Landscape
August 2022
NIST SP 800-215 ipd
10.6028/NIST.SP.800-215.ipd
Download PDF | Download Citation
August 2022
NIST SP 800-215 ipd
10.6028/NIST.SP.800-215.ipd
Download PDF | Download Citation
High Performance Computing (HPC) Security: Architecture and Security Posture
February 2023
NIST SP 800-223 ipd
10.6028/NIST.SP.800-223.ipd
Download PDF | Download Citation
February 2023
NIST SP 800-223 ipd
10.6028/NIST.SP.800-223.ipd
Download PDF | Download Citation
Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security
Rule: A Cybersecurity Resource Guide
July 2022
NIST SP 800-66r2 ipd
10.6028/NIST.SP.800-66r2.ipd
Download PDF | Download Citation
July 2022
NIST SP 800-66r2 ipd
10.6028/NIST.SP.800-66r2.ipd
Download PDF | Download Citation
Information and Communications Technology (ICT) Risk Outcomes: A Framework for Integrating ICT Risk Management Programs with the Enterprise Risk
Portfolio
July 2022
NIST SP 800-221A ipd
10.6028/NIST.SP.800-221A.ipd
Download PDF | Download Citation
July 2022
NIST SP 800-221A ipd
10.6028/NIST.SP.800-221A.ipd
Download PDF | Download Citation
Enterprise Impact of Information and Communications Technology Risk: Governing and Managing ICT Risk Programs Within an Enterprise Risk Portfolio
July 2022
NIST SP 800-221 ipd
10.6028/NIST.SP.800-221.ipd
Download PDF | Download Citation
July 2022
NIST SP 800-221 ipd
10.6028/NIST.SP.800-221.ipd
Download PDF | Download Citation
Engineering Trustworthy Secure Systems
June 2022
NIST SP 800-160v1r1 fpd
10.6028/NIST.SP.800-160v1r1.fpd
Download PDF | Download Citation
June 2022
NIST SP 800-160v1r1 fpd
10.6028/NIST.SP.800-160v1r1.fpd
Download PDF | Download Citation
Automated secure configuration guidance from the macOS Security Compliance Project
(mSCP)
June 2022
NIST SP 800-219
10.6028/NIST.SP.800-219
Download PDF | Download Citation
June 2022
NIST SP 800-219
10.6028/NIST.SP.800-219
Download PDF | Download Citation
CMVP approved security functions : CMVP validation authority updates to ISOIEC 24759
May 2022
NIST SP 800-140Cr1
10.6028/NIST.SP.800-140Cr1
Download PDF | Download Citation
May 2022
NIST SP 800-140Cr1
10.6028/NIST.SP.800-140Cr1
Download PDF | Download Citation
CMVP approved sensitive security parameter generation and establishment methods : CMVP validation authority updates to ISOIEC 24759
May 2022
NIST SP 800-140Dr1
10.6028/NIST.SP.800-140Dr1
Download PDF | Download Citation
May 2022
NIST SP 800-140Dr1
10.6028/NIST.SP.800-140Dr1
Download PDF | Download Citation
CMVP Security Policy Requirements: CMVP Validation Authority Updates to ISO/IEC 24759
and ISO/IEC 19790 Annex B
May 2022
NIST SP 800-140Br1 ipd
10.6028/NIST.SP.800-140Br1.ipd
Download PDF | Download Citation
May 2022
NIST SP 800-140Br1 ipd
10.6028/NIST.SP.800-140Br1.ipd
Download PDF | Download Citation
Workforce framework for cybersecurity (NICE Framework) (Ukranian translation)
May 2022
NIST SP 800-181r1.ukr
10.6028/NIST.SP.800-181r1.ukr
Download PDF | Download Citation
May 2022
NIST SP 800-181r1.ukr
10.6028/NIST.SP.800-181r1.ukr
Download PDF | Download Citation
National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework
(Ukrainian translation)
May 2022
NIST SP 800-181.ukr
10.6028/NIST.SP.800-181.ukr
Download PDF | Download Citation
May 2022
NIST SP 800-181.ukr
10.6028/NIST.SP.800-181.ukr
Download PDF | Download Citation
Workforce framework for cybersecurity (NICE Framework) (Slovak translation)
May 2022
NIST SP 800-181r1.slo
10.6028/NIST.SP.800-181r1.slo
Download PDF | Download Citation
May 2022
NIST SP 800-181r1.slo
10.6028/NIST.SP.800-181r1.slo
Download PDF | Download Citation
Cybersecurity supply chain risk management for systems and organizations
May 2022
NIST SP 800-161r1
10.6028/NIST.SP.800-161r1
Download PDF | Download Citation
May 2022
NIST SP 800-161r1
10.6028/NIST.SP.800-161r1
Download PDF | Download Citation
Guide to enterprise patch management planning : preventive maintenance for technology
April 2022
NIST SP 800-40r4
10.6028/NIST.SP.800-40r4
Download PDF | Download Citation
April 2022
NIST SP 800-40r4
10.6028/NIST.SP.800-40r4
Download PDF | Download Citation
Assessing enhanced security requirements for controlled unclassified information
March 2022
NIST SP 800-172A
10.6028/NIST.SP.800-172A
Download PDF | Download Citation
March 2022
NIST SP 800-172A
10.6028/NIST.SP.800-172A
Download PDF | Download Citation
Implementation of DevSecOps for a microservices-based application with service mesh
March 2022
NIST SP 800-204C
10.6028/NIST.SP.800-204C
Download PDF | Download Citation
March 2022
NIST SP 800-204C
10.6028/NIST.SP.800-204C
Download PDF | Download Citation
Automated Secure Configuration Guidance from the macOS Security Compliance Project
(mSCP)
February 2022
NIST SP 800-219-draft
10.6028/NIST.SP.800-219-draft
Download PDF | Download Citation
February 2022
NIST SP 800-219-draft
10.6028/NIST.SP.800-219-draft
Download PDF | Download Citation
Workforce framework for cybersecurity (NICE Framework) (Portuguese translation)
May 2022
NIST SP 800-181r1pt
10.6028/NIST.SP.800-181r1pt
Download PDF | Download Citation
May 2022
NIST SP 800-181r1pt
10.6028/NIST.SP.800-181r1pt
Download PDF | Download Citation
Workforce framework for cybersecurity (NICE Framework) (Spanish translation)
February 2022
NIST SP 800-181r1es
10.6028/NIST.SP.800-181r1es
Download PDF | Download Citation
February 2022
NIST SP 800-181r1es
10.6028/NIST.SP.800-181r1es
Download PDF | Download Citation
National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework
(Ukrainian translation)
February 2022
NIST SP 800-181pt
10.6028/NIST.SP.800-181pt
Download PDF | Download Citation
February 2022
NIST SP 800-181pt
10.6028/NIST.SP.800-181pt
Download PDF | Download Citation
National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework
(Ukrainian translation)
February 2022
NIST SP 800-181es
10.6028/NIST.SP.800-181es
Download PDF | Download Citation
February 2022
NIST SP 800-181es
10.6028/NIST.SP.800-181es
Download PDF | Download Citation
CMVP Approved Sensitive Security Parameter Generation and Establishment Methods: CMVP
Validation Authority Updates to ISO/IEC 24759
February 2022
NIST SP 800-140Dr1-draft2
10.6028/NIST.SP.800-140Dr1-draft2
Download PDF | Download Citation
February 2022
NIST SP 800-140Dr1-draft2
10.6028/NIST.SP.800-140Dr1-draft2
Download PDF | Download Citation
CMVP Approved Security Functions: CMVP Validation Authority Updates to ISO/IEC 24759
February 2022
NIST SP 800-140Cr1-draft2
10.6028/NIST.SP.800-140Cr1-draft2
Download PDF | Download Citation
February 2022
NIST SP 800-140Cr1-draft2
10.6028/NIST.SP.800-140Cr1-draft2
Download PDF | Download Citation
Secure Software Development Framework (SSDF) version 1.1 : recommendations for mitigating the risk of software vulnerabilities
February 2022
NIST SP 800-218
10.6028/NIST.SP.800-218
Download PDF | Download Citation
February 2022
NIST SP 800-218
10.6028/NIST.SP.800-218
Download PDF | Download Citation
Assessing security and privacy controls in information systems and organizations
January 2022
NIST SP 800-53Ar5
10.6028/NIST.SP.800-53Ar5
Download PDF | Download Citation
January 2022
NIST SP 800-53Ar5
10.6028/NIST.SP.800-53Ar5
Download PDF | Download Citation
Developing cyber-resilient systems : a systems security engineering approach
December 2021
NIST SP 800-160v2r1
10.6028/NIST.SP.800-160v2r1
Download PDF | Download Citation
December 2021
NIST SP 800-160v2r1
10.6028/NIST.SP.800-160v2r1
Download PDF | Download Citation
IoT device cybersecurity guidance for the federal government : IoT device cybersecurity requirement catalog
November 2021
NIST SP 800-213A
10.6028/NIST.SP.800-213A
Download PDF | Download Citation
November 2021
NIST SP 800-213A
10.6028/NIST.SP.800-213A
Download PDF | Download Citation
IoT device cybersecurity guidance for the federal government : establishing IoT device cybersecurity requirements
November 2021
NIST SP 800-213
10.6028/NIST.SP.800-213
Download PDF | Download Citation
November 2021
NIST SP 800-213
10.6028/NIST.SP.800-213
Download PDF | Download Citation
2020 cybersecurity and privacy annual report
September 2021
NIST SP 800-214
10.6028/NIST.SP.800-214
Download PDF | Download Citation
September 2021
NIST SP 800-214
10.6028/NIST.SP.800-214
Download PDF | Download Citation
Attribute-based access control for microservices-based applications using a service
mesh
August 2021
NIST SP 800-204B
10.6028/NIST.SP.800-204B
Download PDF | Download Citation
August 2021
NIST SP 800-204B
10.6028/NIST.SP.800-204B
Download PDF | Download Citation
Enhanced Security Requirements for Protecting Controlled Unclassified Information:
A Supplement to NIST Special Publication 800-171 A Supplement to NIST Special Publication 800-171
January 2021
NIST SP 800-172
10.6028/NIST.SP.800-172
Download PDF | Download Citation
January 2021
NIST SP 800-172
10.6028/NIST.SP.800-172
Download PDF | Download Citation
Workforce Framework for Cybersecurity (NICE Framework)
November 2020
NIST SP 800-181r1
10.6028/NIST.SP.800-181r1
Download PDF | Download Citation
November 2020
NIST SP 800-181r1
10.6028/NIST.SP.800-181r1
Download PDF | Download Citation
Control Baselines for Information Systems and Organizations
October 2020
NIST SP 800-53B
10.6028/NIST.SP.800-53B
Download PDF | Download Citation
October 2020
NIST SP 800-53B
10.6028/NIST.SP.800-53B
Download PDF | Download Citation
Recommendation for Stateful Hash-Based Signature Schemes
October 2020
NIST SP 800-208
10.6028/NIST.SP.800-208
Download PDF | Download Citation
October 2020
NIST SP 800-208
10.6028/NIST.SP.800-208
Download PDF | Download Citation
Security Guidelines for Storage Infrastructure
October 2020
NIST SP 800-209
10.6028/NIST.SP.800-209
Download PDF | Download Citation
October 2020
NIST SP 800-209
10.6028/NIST.SP.800-209
Download PDF | Download Citation
Security and Privacy Controls for Information Systems and Organizations
September 2020
NIST SP 800-53r5
10.6028/NIST.SP.800-53r5
Download PDF | Download Citation
September 2020
NIST SP 800-53r5
10.6028/NIST.SP.800-53r5
Download PDF | Download Citation
2019 NIST/ITL Cybersecurity Program Annual Report
August 2020
NIST SP 800-211
10.6028/NIST.SP.800-211
Download PDF | Download Citation
August 2020
NIST SP 800-211
10.6028/NIST.SP.800-211
Download PDF | Download Citation
Recommendation for Key-Derivation Methods in Key-Establishment Schemes
August 2020
NIST SP 800-56Cr2
10.6028/NIST.SP.800-56Cr2
Download PDF | Download Citation
August 2020
NIST SP 800-56Cr2
10.6028/NIST.SP.800-56Cr2
Download PDF | Download Citation
Zero Trust Architecture
August 2020
NIST SP 800-207
10.6028/NIST.SP.800-207
Download PDF | Download Citation
August 2020
NIST SP 800-207
10.6028/NIST.SP.800-207
Download PDF | Download Citation
General access control guidance for cloud systems
July 2020
NIST SP 800-210
10.6028/NIST.SP.800-210
Download PDF | Download Citation
July 2020
NIST SP 800-210
10.6028/NIST.SP.800-210
Download PDF | Download Citation
Guide to IPsec VPNs
June 2020
NIST SP 800-77r1
10.6028/NIST.SP.800-77r1
Download PDF | Download Citation
June 2020
NIST SP 800-77r1
10.6028/NIST.SP.800-77r1
Download PDF | Download Citation
Recommendation for cryptographic key generation
June 2020
NIST SP 800-133r2
10.6028/NIST.SP.800-133r2
Download PDF | Download Citation
June 2020
NIST SP 800-133r2
10.6028/NIST.SP.800-133r2
Download PDF | Download Citation
Building secure microservices-based applications using service-mesh architecture
May 2020
NIST SP 800-204A
10.6028/NIST.SP.800-204a
Download PDF | Download Citation
May 2020
NIST SP 800-204A
10.6028/NIST.SP.800-204a
Download PDF | Download Citation
Assessing Information Security Continuous Monitoring (ISCM) Programs: Developing an
ISCM Program Assessment
May 2020
NIST SP 800-137A
10.6028/NIST.SP.800-137A
Download PDF | Download Citation
May 2020
NIST SP 800-137A
10.6028/NIST.SP.800-137A
Download PDF | Download Citation
Recommendation for key management: part 1 - general
May 2020
NIST SP 800-57pt1r5
10.6028/NIST.SP.800-57pt1r5
Download PDF | Download Citation
May 2020
NIST SP 800-57pt1r5
10.6028/NIST.SP.800-57pt1r5
Download PDF | Download Citation
Guideline for using cryptographic standards in the federal government: cryptographic mechanisms
March 2020
NIST SP 800-175Br1
10.6028/NIST.SP.800-175Br1
Download PDF | Download Citation
March 2020
NIST SP 800-175Br1
10.6028/NIST.SP.800-175Br1
Download PDF | Download Citation
FIPS 140-3 derived test requirements (DTR): CMVP validation authority updates to ISOIEC 24759
March 2020
NIST SP 800-140
10.6028/NIST.SP.800-140
Download PDF | Download Citation
March 2020
NIST SP 800-140
10.6028/NIST.SP.800-140
Download PDF | Download Citation
CMVP documentation requirements: CMVP validation authority updates to ISOIEC 24759
March 2020
NIST SP 800-140A
10.6028/NIST.SP.800-140A
Download PDF | Download Citation
March 2020
NIST SP 800-140A
10.6028/NIST.SP.800-140A
Download PDF | Download Citation
CMVP security policy requirements: CMVP validation authority updates to ISOIEC 24759 and ISOIEC 19790 Annex B
March 2020
NIST SP 800-140B
10.6028/NIST.SP.800-140B
Download PDF | Download Citation
March 2020
NIST SP 800-140B
10.6028/NIST.SP.800-140B
Download PDF | Download Citation
CMVP approved authentication mechanisms: CMVP validation authority requirements for ISOIEC 19790:2012 Annex E and ISOIEC 24579:2017
March 2020
NIST SP 800-140E
10.6028/NIST.SP.800-140E
Download PDF | Download Citation
March 2020
NIST SP 800-140E
10.6028/NIST.SP.800-140E
Download PDF | Download Citation
CMVP approved non-invasive attack mitigation test metrics: CMVP validation authority updates to ISOIEC 24759:2014(E)
March 2020
NIST SP 800-140F
10.6028/NIST.SP.800-140F
Download PDF | Download Citation
March 2020
NIST SP 800-140F
10.6028/NIST.SP.800-140F
Download PDF | Download Citation
CMVP approved security functions: CMVP validation authority updates to ISOIEC 24759
March 2020
NIST SP 800-140C
10.6028/NIST.SP.800-140C
Download PDF | Download Citation
March 2020
NIST SP 800-140C
10.6028/NIST.SP.800-140C
Download PDF | Download Citation
CMVP approved sensitive parameter generation and establishment methods: CMVP validation authority updates to ISOIEC 24759:2014(E)
March 2020
NIST SP 800-140D
10.6028/NIST.SP.800-140D
Download PDF | Download Citation
March 2020
NIST SP 800-140D
10.6028/NIST.SP.800-140D
Download PDF | Download Citation
NIST/ITL Cybersecurity Program: Annual Report 2018
March 2020
NIST SP 800-206
10.6028/NIST.SP.800-206
Download PDF | Download Citation
March 2020
NIST SP 800-206
10.6028/NIST.SP.800-206
Download PDF | Download Citation
Protecting controlled unclassified information in nonfederal systems and organizations
February 2020
NIST SP 800-171r2
10.6028/NIST.SP.800-171r2
Download PDF | Download Citation
February 2020
NIST SP 800-171r2
10.6028/NIST.SP.800-171r2
Download PDF | Download Citation
Resilient interdomain traffic exchange: BGP security and DDos mitigation
December 2019
NIST SP 800-189
10.6028/NIST.SP.800-189
Download PDF | Download Citation
December 2019
NIST SP 800-189
10.6028/NIST.SP.800-189
Download PDF | Download Citation
Developing cyber resilient systems: a systems security engineering approach
November 2019
NIST SP 800-160v2
10.6028/NIST.SP.800-160v2
Download PDF | Download Citation
November 2019
NIST SP 800-160v2
10.6028/NIST.SP.800-160v2
Download PDF | Download Citation
Guide for security-focused configuration management of information systems
August 2011
NIST SP 800-128-2011
10.6028/NIST.SP.800-128-2011
Download PDF | Download Citation
August 2011
NIST SP 800-128-2011
10.6028/NIST.SP.800-128-2011
Download PDF | Download Citation
Guidelines for the selection, configuration, and use of Transport Layer Security (TLS)
implementations
August 2019
NIST SP 800-52r2
10.6028/NIST.SP.800-52r2
Download PDF | Download Citation
August 2019
NIST SP 800-52r2
10.6028/NIST.SP.800-52r2
Download PDF | Download Citation
Security strategies for microservices-based application systems
August 2019
NIST SP 800-204
10.6028/NIST.SP.800-204
Download PDF | Download Citation
August 2019
NIST SP 800-204
10.6028/NIST.SP.800-204
Download PDF | Download Citation
Recommendation for cryptographic key generation
June 2021
NIST SP 800-133r1
10.6028/NIST.SP.800-133r1
Download PDF | Download Citation
June 2021
NIST SP 800-133r1
10.6028/NIST.SP.800-133r1
Download PDF | Download Citation
Attribute considerations for access control systems
June 2019
NIST SP 800-205
10.6028/NIST.SP.800-205
Download PDF | Download Citation
June 2019
NIST SP 800-205
10.6028/NIST.SP.800-205
Download PDF | Download Citation
Recommendation for key management: part 2 -- best practices for key management organizations
May 2019
NIST SP 800-57pt2r1
10.6028/NIST.SP.800-57pt2r1
Download PDF | Download Citation
May 2019
NIST SP 800-57pt2r1
10.6028/NIST.SP.800-57pt2r1
Download PDF | Download Citation
Vetting the security of mobile applications
April 2019
NIST SP 800-163r1
10.6028/NIST.SP.800-163r1
Download PDF | Download Citation
April 2019
NIST SP 800-163r1
10.6028/NIST.SP.800-163r1
Download PDF | Download Citation
Transitioning the use of cryptographic algorithms and key lengths
March 2019
NIST SP 800-131Ar2
10.6028/NIST.SP.800-131Ar2
Download PDF | Download Citation
March 2019
NIST SP 800-131Ar2
10.6028/NIST.SP.800-131Ar2
Download PDF | Download Citation
Recommendation for pair-wise key establishment using integer factorization cryptography
March 2019
NIST SP 800-56Br2
10.6028/NIST.SP.800-56Br2
Download PDF | Download Citation
March 2019
NIST SP 800-56Br2
10.6028/NIST.SP.800-56Br2
Download PDF | Download Citation
Trustworthy email
February 2019
NIST SP 800-177r1
10.6028/NIST.SP.800-177r1
Download PDF | Download Citation
February 2019
NIST SP 800-177r1
10.6028/NIST.SP.800-177r1
Download PDF | Download Citation
Risk management framework for information systems and organizations: a system life cycle approach for security and privacy
December 2018
NIST SP 800-37r2
10.6028/NIST.SP.800-37r2
Download PDF | Download Citation
December 2018
NIST SP 800-37r2
10.6028/NIST.SP.800-37r2
Download PDF | Download Citation
Guidelines for the use of PIV credentials in facility access
June 2018
NIST SP 800-116r1
10.6028/NIST.SP.800-116r1
Download PDF | Download Citation
June 2018
NIST SP 800-116r1
10.6028/NIST.SP.800-116r1
Download PDF | Download Citation
Security recommendations for server-based hypervisor platforms
June 2018
NIST SP 800-125Ar1
10.6028/NIST.SP.800-125Ar1
Download PDF | Download Citation
June 2018
NIST SP 800-125Ar1
10.6028/NIST.SP.800-125Ar1
Download PDF | Download Citation
Assessing security requirements for controlled unclassified information
June 2018
NIST SP 800-171A
10.6028/NIST.SP.800-171A
Download PDF | Download Citation
June 2018
NIST SP 800-171A
10.6028/NIST.SP.800-171A
Download PDF | Download Citation
Quick start guide for populating mobile test devices
May 2018
NIST SP 800-202
10.6028/NIST.SP.800-202
Download PDF | Download Citation
May 2018
NIST SP 800-202
10.6028/NIST.SP.800-202
Download PDF | Download Citation
Platform firmware resiliency guidelines
May 2018
NIST SP 800-193
10.6028/NIST.SP.800-193
Download PDF | Download Citation
May 2018
NIST SP 800-193
10.6028/NIST.SP.800-193
Download PDF | Download Citation
Codes for the identification of federal and federally-assisted organizations
April 2018
NIST SP 800-87r2
10.6028/NIST.SP.800-87r2
Download PDF | Download Citation
April 2018
NIST SP 800-87r2
10.6028/NIST.SP.800-87r2
Download PDF | Download Citation
Recommendation for pair-wise key-establishment schemes using discrete logarithm cryptography
April 2018
NIST SP 800-56Ar3
10.6028/NIST.SP.800-56Ar3
Download PDF | Download Citation
April 2018
NIST SP 800-56Ar3
10.6028/NIST.SP.800-56Ar3
Download PDF | Download Citation
Recommendation for key-derivation methods in key-establishment schemes
April 2018
NIST SP 800-56Cr1
10.6028/NIST.SP.800-56Cr1
Download PDF | Download Citation
April 2018
NIST SP 800-56Cr1
10.6028/NIST.SP.800-56Cr1
Download PDF | Download Citation
Systems security engineering: considerations for a multidisciplinary approach in the
engineering of trustworthy secure systems, volume 1
March 2018
NIST SP 800-160v1
10.6028/NIST.SP.800-160v1
Download PDF | Download Citation
March 2018
NIST SP 800-160v1
10.6028/NIST.SP.800-160v1
Download PDF | Download Citation
National checklist program for IT products - guidelines for checklist users and developers
February 2018
NIST SP 800-70r4
10.6028/NIST.SP.800-70r4
Download PDF | Download Citation
February 2018
NIST SP 800-70r4
10.6028/NIST.SP.800-70r4
Download PDF | Download Citation
SCAP 1.3 component specification version updates: an annex to NIST special publication
800-126 revision 3
February 2018
NIST SP 800-126A
10.6028/NIST.SP.800-126A
Download PDF | Download Citation
February 2018
NIST SP 800-126A
10.6028/NIST.SP.800-126A
Download PDF | Download Citation
The technical specification for the security content automation protocol (SCAP) version
1.3
February 2018
NIST SP 800-126r3
10.6028/NIST.SP.800-126r3
Download PDF | Download Citation
February 2018
NIST SP 800-126r3
10.6028/NIST.SP.800-126r3
Download PDF | Download Citation
Security recommendations for hypervisor deployment on servers
January 2018
NIST SP 800-125A
10.6028/NIST.SP.800-125A
Download PDF | Download Citation
January 2018
NIST SP 800-125A
10.6028/NIST.SP.800-125A
Download PDF | Download Citation
Recommendation for the entropy sources used for random bit generation
January 2018
NIST SP 800-90b
10.6028/NIST.SP.800-90B
Download PDF | Download Citation
January 2018
NIST SP 800-90b
10.6028/NIST.SP.800-90B
Download PDF | Download Citation
Guide to LTE security
December 2017
NIST SP 800-187
10.6028/NIST.SP.800-187
Download PDF | Download Citation
December 2017
NIST SP 800-187
10.6028/NIST.SP.800-187
Download PDF | Download Citation
Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher
November 2017
NIST SP 800-67r2
10.6028/NIST.SP.800-67r2
Download PDF | Download Citation
November 2017
NIST SP 800-67r2
10.6028/NIST.SP.800-67r2
Download PDF | Download Citation
2016 NIST/ITL cybersecurity program: annual report
September 2017
NIST SP 800-195
10.6028/NIST.SP.800-195
Download PDF | Download Citation
September 2017
NIST SP 800-195
10.6028/NIST.SP.800-195
Download PDF | Download Citation
Application container security guide
September 2017
NIST SP 800-190
10.6028/NIST.SP.800-190
Download PDF | Download Citation
September 2017
NIST SP 800-190
10.6028/NIST.SP.800-190
Download PDF | Download Citation
National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework
August 2017
NIST SP 800-181
10.6028/NIST.SP.800-181
Download PDF | Download Citation
August 2017
NIST SP 800-181
10.6028/NIST.SP.800-181
Download PDF | Download Citation
Verification and test methods for access control policiesmodels
June 2017
NIST SP 800-192
10.6028/NIST.SP.800-192
Download PDF | Download Citation
June 2017
NIST SP 800-192
10.6028/NIST.SP.800-192
Download PDF | Download Citation
An introduction to information security
June 2017
NIST SP 800-12r1
10.6028/NIST.SP.800-12r1
Download PDF | Download Citation
June 2017
NIST SP 800-12r1
10.6028/NIST.SP.800-12r1
Download PDF | Download Citation
Digital identity guidelines: revision 3
June 2017
NIST SP 800-63-3
10.6028/NIST.SP.800-63-3
Download PDF | Download Citation
June 2017
NIST SP 800-63-3
10.6028/NIST.SP.800-63-3
Download PDF | Download Citation
Digital identity guidelines: enrollment and identity proofing
June 2017
NIST SP 800-63a
10.6028/NIST.SP.800-63a
Download PDF | Download Citation
June 2017
NIST SP 800-63a
10.6028/NIST.SP.800-63a
Download PDF | Download Citation
Digital identity guidelines: authentication and lifecycle management
June 2017
NIST SP 800-63b
10.6028/NIST.SP.800-63b
Download PDF | Download Citation
June 2017
NIST SP 800-63b
10.6028/NIST.SP.800-63b
Download PDF | Download Citation
Digital identity guidelines: federation and assertions
June 2017
NIST SP 800-63c
10.6028/NIST.SP.800-63c
Download PDF | Download Citation
June 2017
NIST SP 800-63c
10.6028/NIST.SP.800-63c
Download PDF | Download Citation
Guide to bluetooth security
May 2017
NIST SP 800-121r2
10.6028/NIST.SP.800-121r2
Download PDF | Download Citation
May 2017
NIST SP 800-121r2
10.6028/NIST.SP.800-121r2
Download PDF | Download Citation
SHA-3 derived functions: cSHAKE, KMAC, TupleHash and ParallelHash
December 2016
NIST SP 800-185
10.6028/NIST.SP.800-185
Download PDF | Download Citation
December 2016
NIST SP 800-185
10.6028/NIST.SP.800-185
Download PDF | Download Citation
Guide for cybersecurity event recovery
December 2016
NIST SP 800-184
10.6028/NIST.SP.800-184
Download PDF | Download Citation
December 2016
NIST SP 800-184
10.6028/NIST.SP.800-184
Download PDF | Download Citation
Protecting controlled unclassified information in nonfederal systems and organizations
December 2016
NIST SP 800-171r1
10.6028/NIST.SP.800-171r1
Download PDF | Download Citation
December 2016
NIST SP 800-171r1
10.6028/NIST.SP.800-171r1
Download PDF | Download Citation
Guide to securing Apple OS X 10.10 systems for IT professionals: a NIST security configuration
checklist
December 2016
NIST SP 800-179
10.6028/NIST.SP.800-179
Download PDF | Download Citation
December 2016
NIST SP 800-179
10.6028/NIST.SP.800-179
Download PDF | Download Citation
Systems Security Engineering: Considerations for a Multidisciplinary Approach in the
Engineering of Trustworthy Secure Systems
November 2016
NIST SP 800-160
10.6028/NIST.SP.800-160
Download PDF | Download Citation
November 2016
NIST SP 800-160
10.6028/NIST.SP.800-160
Download PDF | Download Citation
Recommendation for block cipher modes of operation : the CMAC mode for authentication
2005
NIST SP 800-38b-2005
10.6028/NIST.SP.800-38b-2005
Download PDF | Download Citation
2005
NIST SP 800-38b-2005
10.6028/NIST.SP.800-38b-2005
Download PDF | Download Citation
Guide to Cyber Threat Information Sharing
October 2016
NIST SP 800-150
10.6028/NIST.SP.800-150
Download PDF | Download Citation
October 2016
NIST SP 800-150
10.6028/NIST.SP.800-150
Download PDF | Download Citation
A Comparison of Attribute Based Access Control (ABAC) Standards for Data Service Applications
October 2016
NIST SP 800-178
10.6028/NIST.SP.800-178
Download PDF | Download Citation
October 2016
NIST SP 800-178
10.6028/NIST.SP.800-178
Download PDF | Download Citation
Trustworthy Email
September 2016
NIST SP 800-177
10.6028/NIST.SP.800-177
Download PDF | Download Citation
September 2016
NIST SP 800-177
10.6028/NIST.SP.800-177
Download PDF | Download Citation
Guideline for Using Cryptographic Standards in the Federal Government: Directives,
Mandates and Policies
August 2016
NIST SP 800-175A
10.6028/NIST.SP.800-175A
Download PDF | Download Citation
August 2016
NIST SP 800-175A
10.6028/NIST.SP.800-175A
Download PDF | Download Citation
Guideline for Using Cryptographic Standards in the Federal Government: Cryptographic
Mechanisms
August 2016
NIST SP 800-175B
10.6028/NIST.SP.800-175B
Download PDF | Download Citation
August 2016
NIST SP 800-175B
10.6028/NIST.SP.800-175B
Download PDF | Download Citation
Computer Security Division 2015 Annual Report
August 2016
NIST SP 800-182
10.6028/NIST.SP.800-182
Download PDF | Download Citation
August 2016
NIST SP 800-182
10.6028/NIST.SP.800-182
Download PDF | Download Citation
User's Guide to Telework and Bring Your Own Device (BYOD) Security
July 2016
NIST SP 800-114r1
10.6028/NIST.SP.800-114r1
Download PDF | Download Citation
July 2016
NIST SP 800-114r1
10.6028/NIST.SP.800-114r1
Download PDF | Download Citation
Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security
July 2016
NIST SP 800-46r2
10.6028/NIST.SP.800-46r2
Download PDF | Download Citation
July 2016
NIST SP 800-46r2
10.6028/NIST.SP.800-46r2
Download PDF | Download Citation
Derived PIV Application and Data Model Test Guidelines
June 2016
NIST SP 800-166
10.6028/NIST.SP.800-166
Download PDF | Download Citation
June 2016
NIST SP 800-166
10.6028/NIST.SP.800-166
Download PDF | Download Citation
Representation of PIV Chain-of-Trust for Import and Export
May 2016
NIST SP 800-156
10.6028/NIST.SP.800-156
Download PDF | Download Citation
May 2016
NIST SP 800-156
10.6028/NIST.SP.800-156
Download PDF | Download Citation
PIV Card Application and Middleware Interface Test Guidelines (SP 800-73-4 compliance)
April 2016
NIST SP 800-85A-4
10.6028/NIST.SP.800-85A-4
Download PDF | Download Citation
April 2016
NIST SP 800-85A-4
10.6028/NIST.SP.800-85A-4
Download PDF | Download Citation
Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving
Encryption
March 2016
NIST SP 800-38G
10.6028/NIST.SP.800-38G
Download PDF | Download Citation
March 2016
NIST SP 800-38G
10.6028/NIST.SP.800-38G
Download PDF | Download Citation
Secure Virtual Network Configuration for Virtual Machine (VM) Protection
March 2016
NIST SP 800-125B
10.6028/NIST.SP.800-125B
Download PDF | Download Citation
March 2016
NIST SP 800-125B
10.6028/NIST.SP.800-125B
Download PDF | Download Citation
Recommendation for Key Management Part 1: General
January 2016
NIST SP 800-57pt1r4
10.6028/NIST.SP.800-57pt1r4
Download PDF | Download Citation
January 2016
NIST SP 800-57pt1r4
10.6028/NIST.SP.800-57pt1r4
Download PDF | Download Citation
National Checklist Program for IT Products – Guidelines for Checklist Users and Developers
December 2015
NIST SP 800-70r3
10.6028/NIST.SP.800-70r3
Download PDF | Download Citation
December 2015
NIST SP 800-70r3
10.6028/NIST.SP.800-70r3
Download PDF | Download Citation
Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms
and Key Lengths
November 2015
NIST SP 800-131Ar1
10.6028/NIST.SP.800-131Ar1
Download PDF | Download Citation
November 2015
NIST SP 800-131Ar1
10.6028/NIST.SP.800-131Ar1
Download PDF | Download Citation
The technical specification for the Security Content Automation Protocol (SCAP) : SCAP version 1.0
2009
NIST SP 800-126
10.6028/NIST.SP.800-126
Download PDF | Download Citation
2009
NIST SP 800-126
10.6028/NIST.SP.800-126
Download PDF | Download Citation
The technical specification for the Security Content Automation Protocol (SCAP) : SCAP version 1.1
2011
NIST SP 800-126r1
10.6028/NIST.SP.800-126r1
Download PDF | Download Citation
2011
NIST SP 800-126r1
10.6028/NIST.SP.800-126r1
Download PDF | Download Citation
The technical specification for the Security Content Automation Protocol (SCAP) : SCAP version 1.2
2011
NIST SP 800-126r2
10.6028/NIST.SP.800-126r2
Download PDF | Download Citation
2011
NIST SP 800-126r2
10.6028/NIST.SP.800-126r2
Download PDF | Download Citation
Guide to securing WiMAX wireless communications
2010
NIST SP 800-127
10.6028/NIST.SP.800-127
Download PDF | Download Citation
2010
NIST SP 800-127
10.6028/NIST.SP.800-127
Download PDF | Download Citation
Guide for security-focused configuration management of information systems
October 2019
NIST SP 800-128
10.6028/NIST.SP.800-128
Download PDF | Download Citation
October 2019
NIST SP 800-128
10.6028/NIST.SP.800-128
Download PDF | Download Citation
Transitions : recommendation for transitioning the use of cryptographic algorithms and key lengths
2011
NIST SP 800-131a
10.6028/NIST.SP.800-131a
Download PDF | Download Citation
2011
NIST SP 800-131a
10.6028/NIST.SP.800-131a
Download PDF | Download Citation
Recommendation for password-based key derivation : part 1: storage applications
2010
NIST SP 800-132
10.6028/NIST.SP.800-132
Download PDF | Download Citation
2010
NIST SP 800-132
10.6028/NIST.SP.800-132
Download PDF | Download Citation
Recommendation for existing application-specific key derivation functions
2010
NIST SP 800-135
10.6028/NIST.SP.800-135
Download PDF | Download Citation
2010
NIST SP 800-135
10.6028/NIST.SP.800-135
Download PDF | Download Citation
Recommendation for existing application-specific key derivation functions
2011
NIST SP 800-135r1
10.6028/NIST.SP.800-135r1
Download PDF | Download Citation
2011
NIST SP 800-135r1
10.6028/NIST.SP.800-135r1
Download PDF | Download Citation
Information Security Continuous Monitoring (ISCM) for federal information systems
and organizations
2011
NIST SP 800-137
10.6028/NIST.SP.800-137
Download PDF | Download Citation
2011
NIST SP 800-137
10.6028/NIST.SP.800-137
Download PDF | Download Citation
Practical combinatorial testing
2010
NIST SP 800-142
10.6028/NIST.SP.800-142
Download PDF | Download Citation
2010
NIST SP 800-142
10.6028/NIST.SP.800-142
Download PDF | Download Citation
Guidelines on security and privacy in public cloud computing
2011
NIST SP 800-144
10.6028/NIST.SP.800-144
Download PDF | Download Citation
2011
NIST SP 800-144
10.6028/NIST.SP.800-144
Download PDF | Download Citation
The NIST definition of cloud computing
2011
NIST SP 800-145
10.6028/NIST.SP.800-145
Download PDF | Download Citation
2011
NIST SP 800-145
10.6028/NIST.SP.800-145
Download PDF | Download Citation
Cloud computing synopsis and recommendations
2012
NIST SP 800-146
10.6028/NIST.SP.800-146
Download PDF | Download Citation
2012
NIST SP 800-146
10.6028/NIST.SP.800-146
Download PDF | Download Citation
BIOS protection guidelines
2011
NIST SP 800-147
10.6028/NIST.SP.800-147
Download PDF | Download Citation
2011
NIST SP 800-147
10.6028/NIST.SP.800-147
Download PDF | Download Citation
Guidelines for securing Wireless Local Area Networks (WLANs)
2012
NIST SP 800-153
10.6028/NIST.SP.800-153
Download PDF | Download Citation
2012
NIST SP 800-153
10.6028/NIST.SP.800-153
Download PDF | Download Citation
Guide for developing security plans for federal information systems
2006
NIST SP 800-18r1
10.6028/NIST.SP.800-18r1
Download PDF | Download Citation
2006
NIST SP 800-18r1
10.6028/NIST.SP.800-18r1
Download PDF | Download Citation
Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS)
: requirements and procedures
2012
NIST SP 800-20
10.6028/NIST.SP.800-20
Download PDF | Download Citation
2012
NIST SP 800-20
10.6028/NIST.SP.800-20
Download PDF | Download Citation
Guideline for implementing cryptography in the federal government
2005
NIST SP 800-21e2
10.6028/NIST.SP.800-21e2
Download PDF | Download Citation
2005
NIST SP 800-21e2
10.6028/NIST.SP.800-21e2
Download PDF | Download Citation
A statistical test suite for random and pseudorandom number generators for cryptographic
applications
2010
NIST SP 800-22r1a
10.6028/NIST.SP.800-22r1a
Download PDF | Download Citation
2010
NIST SP 800-22r1a
10.6028/NIST.SP.800-22r1a
Download PDF | Download Citation
Engineering principles for information technology security (a baseline for achieving
security), revision a
2004
NIST SP 800-27ra
10.6028/NIST.SP.800-27ra
Download PDF | Download Citation
2004
NIST SP 800-27ra
10.6028/NIST.SP.800-27ra
Download PDF | Download Citation
Guidelines on active content and mobile code
2001
NIST SP 800-28
10.6028/NIST.SP.800-28
Download PDF | Download Citation
2001
NIST SP 800-28
10.6028/NIST.SP.800-28
Download PDF | Download Citation
Guidelines on active content and mobile code
2008
NIST SP 800-28ver2
10.6028/NIST.SP.800-28ver2
Download PDF | Download Citation
2008
NIST SP 800-28ver2
10.6028/NIST.SP.800-28ver2
Download PDF | Download Citation
Guide for conducting risk assessments
2012
NIST SP 800-30r1
10.6028/NIST.SP.800-30r1
Download PDF | Download Citation
2012
NIST SP 800-30r1
10.6028/NIST.SP.800-30r1
Download PDF | Download Citation
Introduction to public key technology and the federal PKI infrastructure
2001
NIST SP 800-32
10.6028/NIST.SP.800-32
Download PDF | Download Citation
2001
NIST SP 800-32
10.6028/NIST.SP.800-32
Download PDF | Download Citation
Contingency planning guide for federal information systems
2010
NIST SP 800-34r1
10.6028/NIST.SP.800-34r1
Download PDF | Download Citation
2010
NIST SP 800-34r1
10.6028/NIST.SP.800-34r1
Download PDF | Download Citation
Guide to information technology security services
2003
NIST SP 800-35
10.6028/NIST.SP.800-35
Download PDF | Download Citation
2003
NIST SP 800-35
10.6028/NIST.SP.800-35
Download PDF | Download Citation
Guide to selecting information technology security products
2003
NIST SP 800-36
10.6028/NIST.SP.800-36
Download PDF | Download Citation
2003
NIST SP 800-36
10.6028/NIST.SP.800-36
Download PDF | Download Citation
Guide for the security certification and accreditation of federal information systems
2004
NIST SP 800-37
10.6028/NIST.SP.800-37
Download PDF | Download Citation
2004
NIST SP 800-37
10.6028/NIST.SP.800-37
Download PDF | Download Citation
Recommendation for block cipher modes of operation : methods and techniques
2001
NIST SP 800-38a
10.6028/NIST.SP.800-38a
Download PDF | Download Citation
2001
NIST SP 800-38a
10.6028/NIST.SP.800-38a
Download PDF | Download Citation
Recommendation for block cipher modes of operation : three variants of ciphertext stealing for CBC mode
2010
NIST SP 800-38a-add
10.6028/NIST.SP.800-38a-add
Download PDF | Download Citation
2010
NIST SP 800-38a-add
10.6028/NIST.SP.800-38a-add
Download PDF | Download Citation
Recommendation for block cipher modes of operation : the CMAC mode for authentication
2016
NIST SP 800-38b
10.6028/NIST.SP.800-38b
Download PDF | Download Citation
2016
NIST SP 800-38b
10.6028/NIST.SP.800-38b
Download PDF | Download Citation
Recommendation for block cipher modes of operation : the CCM mode for authentication and confidentiality
2007
NIST SP 800-38c
10.6028/NIST.SP.800-38c
Download PDF | Download Citation
2007
NIST SP 800-38c
10.6028/NIST.SP.800-38c
Download PDF | Download Citation
Recommendation for block cipher modes of operation : GaloisCounter Mode (GCM) and GMAC
2007
NIST SP 800-38d
10.6028/NIST.SP.800-38d
Download PDF | Download Citation
2007
NIST SP 800-38d
10.6028/NIST.SP.800-38d
Download PDF | Download Citation
Recommendation for block cipher modes of operation : the XTS-AES mode for confidentiality on storage devices
2010
NIST SP 800-38e
10.6028/NIST.SP.800-38e
Download PDF | Download Citation
2010
NIST SP 800-38e
10.6028/NIST.SP.800-38e
Download PDF | Download Citation
Managing information security risk : organization, mission, and information system view
2011
NIST SP 800-39
10.6028/NIST.SP.800-39
Download PDF | Download Citation
2011
NIST SP 800-39
10.6028/NIST.SP.800-39
Download PDF | Download Citation
Procedures for handling security patches
2002
NIST SP 800-40
10.6028/NIST.SP.800-40
Download PDF | Download Citation
2002
NIST SP 800-40
10.6028/NIST.SP.800-40
Download PDF | Download Citation
Creating a patch and vulnerability management program
2005
NIST SP 800-40ver2
10.6028/NIST.SP.800-40ver2
Download PDF | Download Citation
2005
NIST SP 800-40ver2
10.6028/NIST.SP.800-40ver2
Download PDF | Download Citation
Guidelines on firewalls and firewall policy
2009
NIST SP 800-41r1
10.6028/NIST.SP.800-41r1
Download PDF | Download Citation
2009
NIST SP 800-41r1
10.6028/NIST.SP.800-41r1
Download PDF | Download Citation
Guideline on network security testing
2003
NIST SP 800-42
10.6028/NIST.SP.800-42
Download PDF | Download Citation
2003
NIST SP 800-42
10.6028/NIST.SP.800-42
Download PDF | Download Citation
Systems administration guidance for securing Windows 2000 Professional system
2002
NIST SP 800-43
10.6028/NIST.SP.800-43
Download PDF | Download Citation
2002
NIST SP 800-43
10.6028/NIST.SP.800-43
Download PDF | Download Citation
Guidelines on securing public web servers
2002
NIST SP 800-44
10.6028/NIST.SP.800-44
Download PDF | Download Citation
2002
NIST SP 800-44
10.6028/NIST.SP.800-44
Download PDF | Download Citation
Volume I : guide for mapping types of information and information systems to security categories
2008
NIST SP 800-60v1r1
10.6028/NIST.SP.800-60v1r1
Download PDF | Download Citation
2008
NIST SP 800-60v1r1
10.6028/NIST.SP.800-60v1r1
Download PDF | Download Citation
Volume II : appendices to guide for mapping types of information and information systems to security
categories
2008
NIST SP 800-60v2r1
10.6028/NIST.SP.800-60v2r1
Download PDF | Download Citation
2008
NIST SP 800-60v2r1
10.6028/NIST.SP.800-60v2r1
Download PDF | Download Citation
Recommendation for the triple data encryption algorithm (TDEA) block cipher
2004
NIST SP 800-67ver1
10.6028/NIST.SP.800-67ver1
Download PDF | Download Citation
2004
NIST SP 800-67ver1
10.6028/NIST.SP.800-67ver1
Download PDF | Download Citation
Interfaces for personal identity verification : end-point PIV card application namespace, data model and representation
2010
NIST SP 800-73-3
10.6028/NIST.SP.800-73-3
Download PDF | Download Citation
2010
NIST SP 800-73-3
10.6028/NIST.SP.800-73-3
Download PDF | Download Citation
Recommendation for random number generation using deterministic random bit generators
(revised)
2007
NIST SP 800-90r
10.6028/NIST.SP.800-90r
Download PDF | Download Citation
2007
NIST SP 800-90r
10.6028/NIST.SP.800-90r
Download PDF | Download Citation
Guide to Application Whitelisting
October 2015
NIST SP 800-167
10.6028/NIST.SP.800-167
Download PDF | Download Citation
October 2015
NIST SP 800-167
10.6028/NIST.SP.800-167
Download PDF | Download Citation
A Profile for U. S. Federal Cryptographic Key Management Systems
October 2015
NIST SP 800-152
10.6028/NIST.SP.800-152
Download PDF | Download Citation
October 2015
NIST SP 800-152
10.6028/NIST.SP.800-152
Download PDF | Download Citation
Computer Security Division 2014 Annual Report
April 2015
NIST SP 800-176
10.6028/NIST.SP.800-176
Download PDF | Download Citation
April 2015
NIST SP 800-176
10.6028/NIST.SP.800-176
Download PDF | Download Citation
Guidelines for the Authorization of Personal Identity Verification Card Issuers (PCI)
and Derived PIV Credential Issuers (DPCI)
July 2015
NIST SP 800-79-2
10.6028/NIST.SP.800-79-2
Download PDF | Download Citation
July 2015
NIST SP 800-79-2
10.6028/NIST.SP.800-79-2
Download PDF | Download Citation
Recommendation for Random Number Generation Using Deterministic Random Bit Generators
June 2015
NIST SP 800-90Ar1
10.6028/NIST.SP.800-90Ar1
Download PDF | Download Citation
June 2015
NIST SP 800-90Ar1
10.6028/NIST.SP.800-90Ar1
Download PDF | Download Citation
Protecting Controlled Unclassified Information in Nonfederal Information Systems and
Organizations
June 2015
NIST SP 800-171
10.6028/NIST.SP.800-171
Download PDF | Download Citation
June 2015
NIST SP 800-171
10.6028/NIST.SP.800-171
Download PDF | Download Citation
Bibliography of selected computer security publications : January 1980-October 1989
1990
NIST SP 800-1
10.6028/NIST.SP.800-1
Download PDF | Download Citation
1990
NIST SP 800-1
10.6028/NIST.SP.800-1
Download PDF | Download Citation
Keeping your site comfortably secure : an introduction to Internet firewalls
1994
NIST SP 800-10
10.6028/NIST.SP.800-10
Download PDF | Download Citation
1994
NIST SP 800-10
10.6028/NIST.SP.800-10
Download PDF | Download Citation
Information security handbook : a guide for managers
2006
NIST SP 800-100
10.6028/NIST.SP.800-100
Download PDF | Download Citation
2006
NIST SP 800-100
10.6028/NIST.SP.800-100
Download PDF | Download Citation
Guidelines on cell phone forensics
2007
NIST SP 800-101
10.6028/NIST.SP.800-101
Download PDF | Download Citation
2007
NIST SP 800-101
10.6028/NIST.SP.800-101
Download PDF | Download Citation
Recommendation for digital signature timeliness
2009
NIST SP 800-102
10.6028/NIST.SP.800-102
Download PDF | Download Citation
2009
NIST SP 800-102
10.6028/NIST.SP.800-102
Download PDF | Download Citation
A scheme for PIV visual card topography
2007
NIST SP 800-104
10.6028/NIST.SP.800-104
Download PDF | Download Citation
2007
NIST SP 800-104
10.6028/NIST.SP.800-104
Download PDF | Download Citation
Randomized hashing for digital signatures
2009
NIST SP 800-106
10.6028/NIST.SP.800-106
Download PDF | Download Citation
2009
NIST SP 800-106
10.6028/NIST.SP.800-106
Download PDF | Download Citation
Recommendation for applications using approved hash algorithms
2009
NIST SP 800-107
10.6028/NIST.SP.800-107
Download PDF | Download Citation
2009
NIST SP 800-107
10.6028/NIST.SP.800-107
Download PDF | Download Citation
Recommendation for applications using approved hash algorithms
2012
NIST SP 800-107r1
10.6028/NIST.SP.800-107r1
Download PDF | Download Citation
2012
NIST SP 800-107r1
10.6028/NIST.SP.800-107r1
Download PDF | Download Citation
The impact of the FCC's Open Network Architecture on NSNP telecommunications security
1995
NIST SP 800-11
10.6028/NIST.SP.800-11
Download PDF | Download Citation
1995
NIST SP 800-11
10.6028/NIST.SP.800-11
Download PDF | Download Citation
Guide to storage encryption technologies for end user devices
2007
NIST SP 800-111
10.6028/NIST.SP.800-111
Download PDF | Download Citation
2007
NIST SP 800-111
10.6028/NIST.SP.800-111
Download PDF | Download Citation
User's guide to securing external devices for telework and remote access
2007
NIST SP 800-114
10.6028/NIST.SP.800-114
Download PDF | Download Citation
2007
NIST SP 800-114
10.6028/NIST.SP.800-114
Download PDF | Download Citation
Technical guide to information security testing and assessment.
2008
NIST SP 800-115
10.6028/NIST.SP.800-115
Download PDF | Download Citation
2008
NIST SP 800-115
10.6028/NIST.SP.800-115
Download PDF | Download Citation
A recommendation for the use of PIV credentials in Physical Access Control Systems
(PACS)
2008
NIST SP 800-116
10.6028/NIST.SP.800-116
Download PDF | Download Citation
2008
NIST SP 800-116
10.6028/NIST.SP.800-116
Download PDF | Download Citation
Guide to adopting and using the Security Content Automation Protocol (SCAP) version
1.0
2010
NIST SP 800-117
10.6028/NIST.SP.800-117
Download PDF | Download Citation
2010
NIST SP 800-117
10.6028/NIST.SP.800-117
Download PDF | Download Citation
Guidelines for the secure deployment of IPv6
2010
NIST SP 800-119
10.6028/NIST.SP.800-119
Download PDF | Download Citation
2010
NIST SP 800-119
10.6028/NIST.SP.800-119
Download PDF | Download Citation
An introduction to computer security : the NIST handbook
1995
NIST SP 800-12
10.6028/NIST.SP.800-12
Download PDF | Download Citation
1995
NIST SP 800-12
10.6028/NIST.SP.800-12
Download PDF | Download Citation
Recommendation for EAP methods used in wireless network access authentication
2009
NIST SP 800-120
10.6028/NIST.SP.800-120
Download PDF | Download Citation
2009
NIST SP 800-120
10.6028/NIST.SP.800-120
Download PDF | Download Citation
Guide to bluetooth security
2008
NIST SP 800-121
10.6028/NIST.SP.800-121
Download PDF | Download Citation
2008
NIST SP 800-121
10.6028/NIST.SP.800-121
Download PDF | Download Citation
Guide to bluetooth security
2012
NIST SP 800-121r1
10.6028/NIST.SP.800-121r1
Download PDF | Download Citation
2012
NIST SP 800-121r1
10.6028/NIST.SP.800-121r1
Download PDF | Download Citation
Guide to protecting the confidentiality of Personally Identifiable Information (PII)
2010
NIST SP 800-122
10.6028/NIST.SP.800-122
Download PDF | Download Citation
2010
NIST SP 800-122
10.6028/NIST.SP.800-122
Download PDF | Download Citation
Guide to general server security
2008
NIST SP 800-123
10.6028/NIST.SP.800-123
Download PDF | Download Citation
2008
NIST SP 800-123
10.6028/NIST.SP.800-123
Download PDF | Download Citation
Guide to security for full virtualization technologies
2011
NIST SP 800-125
10.6028/NIST.SP.800-125
Download PDF | Download Citation
2011
NIST SP 800-125
10.6028/NIST.SP.800-125
Download PDF | Download Citation
Telecommunications security guidelines for telecommunications management network
1995
NIST SP 800-13
10.6028/NIST.SP.800-13
Download PDF | Download Citation
1995
NIST SP 800-13
10.6028/NIST.SP.800-13
Download PDF | Download Citation
Generally accepted principles and practices for securing information technology systems
1996
NIST SP 800-14
10.6028/NIST.SP.800-14
Download PDF | Download Citation
1996
NIST SP 800-14
10.6028/NIST.SP.800-14
Download PDF | Download Citation
Minimum interoperability specification for PKI components (MISPC)
1998
NIST SP 800-15
10.6028/NIST.SP.800-15
Download PDF | Download Citation
1998
NIST SP 800-15
10.6028/NIST.SP.800-15
Download PDF | Download Citation
Information technology security training requirements : a role- and performance-based model
1998
NIST SP 800-16
10.6028/NIST.SP.800-16
Download PDF | Download Citation
1998
NIST SP 800-16
10.6028/NIST.SP.800-16
Download PDF | Download Citation
Modes of Operation Validation System (MOVS) : requirements and procedures
1998
NIST SP 800-17
10.6028/NIST.SP.800-17
Download PDF | Download Citation
1998
NIST SP 800-17
10.6028/NIST.SP.800-17
Download PDF | Download Citation
Guide for developing security plans for information technology systems
1998
NIST SP 800-18
10.6028/NIST.SP.800-18
Download PDF | Download Citation
1998
NIST SP 800-18
10.6028/NIST.SP.800-18
Download PDF | Download Citation
Guideline for implementing cryptography in the federal government
1999
NIST SP 800-21
10.6028/NIST.SP.800-21
Download PDF | Download Citation
1999
NIST SP 800-21
10.6028/NIST.SP.800-21
Download PDF | Download Citation
A statistical test suite for random and pseudorandom number generators for cryptographic
applications
2000
NIST SP 800-22
10.6028/NIST.SP.800-22
Download PDF | Download Citation
2000
NIST SP 800-22
10.6028/NIST.SP.800-22
Download PDF | Download Citation
Guidelines to federal organizations on security assurance and acquisitionuse of testedevaluated
products
2000
NIST SP 800-23
10.6028/NIST.SP.800-23
Download PDF | Download Citation
2000
NIST SP 800-23
10.6028/NIST.SP.800-23
Download PDF | Download Citation
PBX vulnerability analysis : finding holes in your PBX before someone else does
2001
NIST SP 800-24
10.6028/NIST.SP.800-24
Download PDF | Download Citation
2001
NIST SP 800-24
10.6028/NIST.SP.800-24
Download PDF | Download Citation
Federal agency use of public key technology for digital signatures and authentication
2000
NIST SP 800-25
10.6028/NIST.SP.800-25
Download PDF | Download Citation
2000
NIST SP 800-25
10.6028/NIST.SP.800-25
Download PDF | Download Citation
Security self-assessment guide for information technology systems
2001
NIST SP 800-26
10.6028/NIST.SP.800-26
Download PDF | Download Citation
2001
NIST SP 800-26
10.6028/NIST.SP.800-26
Download PDF | Download Citation
Engineering principles for information technology security (a baseline for achieving
security) : recommendations of the National Institute of Standards and Technology
2001
NIST SP 800-27
10.6028/NIST.SP.800-27
Download PDF | Download Citation
2001
NIST SP 800-27
10.6028/NIST.SP.800-27
Download PDF | Download Citation
A comparison of the security requirements for cryptographic modules in FIPS 140-1
and FIPS 140-2
2001
NIST SP 800-29
10.6028/NIST.SP.800-29
Download PDF | Download Citation
2001
NIST SP 800-29
10.6028/NIST.SP.800-29
Download PDF | Download Citation
Establishing a computer security incident response capability (CSIRC)
1991
NIST SP 800-3
10.6028/NIST.SP.800-3
Download PDF | Download Citation
1991
NIST SP 800-3
10.6028/NIST.SP.800-3
Download PDF | Download Citation
Risk management guide for information technology systems : recommendations of the National Institute of Standards and Technology
2002
NIST SP 800-30
10.6028/NIST.SP.800-30
Download PDF | Download Citation
2002
NIST SP 800-30
10.6028/NIST.SP.800-30
Download PDF | Download Citation
Intrusion detection systems
2001
NIST SP 800-31
10.6028/NIST.SP.800-31
Download PDF | Download Citation
2001
NIST SP 800-31
10.6028/NIST.SP.800-31
Download PDF | Download Citation
Underlying technical models for information technology security : recommendations of the National Institute of Standards and Technology
2001
NIST SP 800-33
10.6028/NIST.SP.800-33
Download PDF | Download Citation
2001
NIST SP 800-33
10.6028/NIST.SP.800-33
Download PDF | Download Citation
Contingency planning guide for information technology systems : recommendations of the National Institute of Standards and Technology
2002
NIST SP 800-34
10.6028/NIST.SP.800-34
Download PDF | Download Citation
2002
NIST SP 800-34
10.6028/NIST.SP.800-34
Download PDF | Download Citation
Computer security considerations in federal procurements : a guide for procurement initiators, contracting officers, and computer security officials
1992
NIST SP 800-4
10.6028/NIST.SP.800-4
Download PDF | Download Citation
1992
NIST SP 800-4
10.6028/NIST.SP.800-4
Download PDF | Download Citation
Guidelines on firewalls and firewall policy : recommendations of the National Institute of Standards and Technology
2002
NIST SP 800-41
10.6028/NIST.SP.800-41
Download PDF | Download Citation
2002
NIST SP 800-41
10.6028/NIST.SP.800-41
Download PDF | Download Citation
Guidelines on securing public web servers
2007
NIST SP 800-44ver2
10.6028/NIST.SP.800-44ver2
Download PDF | Download Citation
2007
NIST SP 800-44ver2
10.6028/NIST.SP.800-44ver2
Download PDF | Download Citation
Guidelines on electronic mail security
2002
NIST SP 800-45
10.6028/NIST.SP.800-45
Download PDF | Download Citation
2002
NIST SP 800-45
10.6028/NIST.SP.800-45
Download PDF | Download Citation
Guidelines on electronic mail security
2007
NIST SP 800-45ver2
10.6028/NIST.SP.800-45ver2
Download PDF | Download Citation
2007
NIST SP 800-45ver2
10.6028/NIST.SP.800-45ver2
Download PDF | Download Citation
Security for telecommuting and broadband communications : recommendations of the National Institute of Standards and Technology
2002
NIST SP 800-46
10.6028/NIST.SP.800-46
Download PDF | Download Citation
2002
NIST SP 800-46
10.6028/NIST.SP.800-46
Download PDF | Download Citation
Guide to enterprise telework and remote access security
2009
NIST SP 800-46r1
10.6028/NIST.SP.800-46r1
Download PDF | Download Citation
2009
NIST SP 800-46r1
10.6028/NIST.SP.800-46r1
Download PDF | Download Citation
Security guide for interconnecting information technology systems
2002
NIST SP 800-47
10.6028/NIST.SP.800-47
Download PDF | Download Citation
2002
NIST SP 800-47
10.6028/NIST.SP.800-47
Download PDF | Download Citation
Wireless security : 802.11, bluetooth and handheld devices
2002
NIST SP 800-48
10.6028/NIST.SP.800-48
Download PDF | Download Citation
2002
NIST SP 800-48
10.6028/NIST.SP.800-48
Download PDF | Download Citation
Guide to securing legacy IEEE 802.11 wireless networks
2008
NIST SP 800-48r1
10.6028/NIST.SP.800-48r1
Download PDF | Download Citation
2008
NIST SP 800-48r1
10.6028/NIST.SP.800-48r1
Download PDF | Download Citation
Federal SMIME V3 client profile
2002
NIST SP 800-49
10.6028/NIST.SP.800-49
Download PDF | Download Citation
2002
NIST SP 800-49
10.6028/NIST.SP.800-49
Download PDF | Download Citation
A guide to the selection of anti-virus tools and techniques
1992
NIST SP 800-5
10.6028/NIST.SP.800-5
Download PDF | Download Citation
1992
NIST SP 800-5
10.6028/NIST.SP.800-5
Download PDF | Download Citation
Building an Information Technology Security Awareness and Training Program
2003
NIST SP 800-50
10.6028/NIST.SP.800-50
Download PDF | Download Citation
2003
NIST SP 800-50
10.6028/NIST.SP.800-50
Download PDF | Download Citation
Use of the Common Vulnerabilities and Exposures (CVE) vulnerability naming scheme
2002
NIST SP 800-51
10.6028/NIST.SP.800-51
Download PDF | Download Citation
2002
NIST SP 800-51
10.6028/NIST.SP.800-51
Download PDF | Download Citation
Guide to using vulnerability naming schemes
2011
NIST SP 800-51r1
10.6028/NIST.SP.800-51r1
Download PDF | Download Citation
2011
NIST SP 800-51r1
10.6028/NIST.SP.800-51r1
Download PDF | Download Citation
Guidelines for the selection, configuration, and use of Transport Layer Security (TLS)
implementations
2005
NIST SP 800-52
10.6028/NIST.SP.800-52
Download PDF | Download Citation
2005
NIST SP 800-52
10.6028/NIST.SP.800-52
Download PDF | Download Citation
Recommended security controls for federal information systems and organizations
2005
NIST SP 800-53
10.6028/NIST.SP.800-53
Download PDF | Download Citation
2005
NIST SP 800-53
10.6028/NIST.SP.800-53
Download PDF | Download Citation
Guide for assessing the security controls in federal information systems and organizations
: building effective security assessment plans
2008
NIST SP 800-53a
10.6028/NIST.SP.800-53a
Download PDF | Download Citation
2008
NIST SP 800-53a
10.6028/NIST.SP.800-53a
Download PDF | Download Citation
Guide for assessing the security controls in federal information systems and organizations
: building effective security assessment plans
2010
NIST SP 800-53ar1
10.6028/NIST.SP.800-53ar1
Download PDF | Download Citation
2010
NIST SP 800-53ar1
10.6028/NIST.SP.800-53ar1
Download PDF | Download Citation
Recommended security controls for federal information systems and organizations
2006
NIST SP 800-53r1
10.6028/NIST.SP.800-53r1
Download PDF | Download Citation
2006
NIST SP 800-53r1
10.6028/NIST.SP.800-53r1
Download PDF | Download Citation
Recommended security controls for federal information systems and organizations
2007
NIST SP 800-53r2
10.6028/NIST.SP.800-53r2
Download PDF | Download Citation
2007
NIST SP 800-53r2
10.6028/NIST.SP.800-53r2
Download PDF | Download Citation
Recommended security controls for federal information systems and organizations
2009
NIST SP 800-53r3
10.6028/NIST.SP.800-53r3
Download PDF | Download Citation
2009
NIST SP 800-53r3
10.6028/NIST.SP.800-53r3
Download PDF | Download Citation
Border gateway protocol security
2007
NIST SP 800-54
10.6028/NIST.SP.800-54
Download PDF | Download Citation
2007
NIST SP 800-54
10.6028/NIST.SP.800-54
Download PDF | Download Citation
Security metrics guide for information technology systems
2003
NIST SP 800-55
10.6028/NIST.SP.800-55
Download PDF | Download Citation
2003
NIST SP 800-55
10.6028/NIST.SP.800-55
Download PDF | Download Citation
Performance measurement guide for information security
2008
NIST SP 800-55r1
10.6028/NIST.SP.800-55r1
Download PDF | Download Citation
2008
NIST SP 800-55r1
10.6028/NIST.SP.800-55r1
Download PDF | Download Citation
Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography
2006
NIST SP 800-56a
10.6028/NIST.SP.800-56a
Download PDF | Download Citation
2006
NIST SP 800-56a
10.6028/NIST.SP.800-56a
Download PDF | Download Citation
Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography
2007
NIST SP 800-56ar
10.6028/NIST.SP.800-56ar
Download PDF | Download Citation
2007
NIST SP 800-56ar
10.6028/NIST.SP.800-56ar
Download PDF | Download Citation
Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography
2009
NIST SP 800-56b
10.6028/NIST.SP.800-56b
Download PDF | Download Citation
2009
NIST SP 800-56b
10.6028/NIST.SP.800-56b
Download PDF | Download Citation
Recommendation for key derivation through extraction-then-expansion
2011
NIST SP 800-56c
10.6028/NIST.SP.800-56c
Download PDF | Download Citation
2011
NIST SP 800-56c
10.6028/NIST.SP.800-56c
Download PDF | Download Citation
Recommendation for key management, part 1 : general
2005
NIST SP 800-57p1
10.6028/NIST.SP.800-57p1
Download PDF | Download Citation
2005
NIST SP 800-57p1
10.6028/NIST.SP.800-57p1
Download PDF | Download Citation
Recommendation for key management, part 1 : general (revised)
2006
NIST SP 800-57p1r2006
10.6028/NIST.SP.800-57p1r2006
Download PDF | Download Citation
2006
NIST SP 800-57p1r2006
10.6028/NIST.SP.800-57p1r2006
Download PDF | Download Citation
Recommendation for key management, part 1 : general (revised)
2007
NIST SP 800-57p1r2007
10.6028/NIST.SP.800-57p1r2007
Download PDF | Download Citation
2007
NIST SP 800-57p1r2007
10.6028/NIST.SP.800-57p1r2007
Download PDF | Download Citation
Recommendation for key management, part 1 : general (revision 3)
2012
NIST SP 800-57p1r3
10.6028/NIST.SP.800-57p1r3
Download PDF | Download Citation
2012
NIST SP 800-57p1r3
10.6028/NIST.SP.800-57p1r3
Download PDF | Download Citation
Recommendation for key management, part 2 : best practices for key management organization
2005
NIST SP 800-57p2
10.6028/NIST.SP.800-57p2
Download PDF | Download Citation
2005
NIST SP 800-57p2
10.6028/NIST.SP.800-57p2
Download PDF | Download Citation
Recommendation for key management, part 3 : application-specific key management guidance
2009
NIST SP 800-57p3
10.6028/NIST.SP.800-57p3
Download PDF | Download Citation
2009
NIST SP 800-57p3
10.6028/NIST.SP.800-57p3
Download PDF | Download Citation
Security considerations for Voice Over IP Systems
2005
NIST SP 800-58
10.6028/NIST.SP.800-58
Download PDF | Download Citation
2005
NIST SP 800-58
10.6028/NIST.SP.800-58
Download PDF | Download Citation
Guideline for identifying an information system as a national security system
2003
NIST SP 800-59
10.6028/NIST.SP.800-59
Download PDF | Download Citation
2003
NIST SP 800-59
10.6028/NIST.SP.800-59
Download PDF | Download Citation
Automated tools for testing computer system vulnerability
1992
NIST SP 800-6
10.6028/NIST.SP.800-6
Download PDF | Download Citation
1992
NIST SP 800-6
10.6028/NIST.SP.800-6
Download PDF | Download Citation
Volume I : guide for mapping types of information and information systems to security categories
2004
NIST SP 800-60ver2v1
10.6028/NIST.SP.800-60ver2v1
Download PDF | Download Citation
2004
NIST SP 800-60ver2v1
10.6028/NIST.SP.800-60ver2v1
Download PDF | Download Citation
Volume II : appendices to guide for mapping types of information and information systems to security
categories
2004
NIST SP 800-60ver2v2
10.6028/NIST.SP.800-60ver2v2
Download PDF | Download Citation
2004
NIST SP 800-60ver2v2
10.6028/NIST.SP.800-60ver2v2
Download PDF | Download Citation
Computer security incident handling guide
2004
NIST SP 800-61
10.6028/NIST.SP.800-61
Download PDF | Download Citation
2004
NIST SP 800-61
10.6028/NIST.SP.800-61
Download PDF | Download Citation
Computer security incident handling guide
2008
NIST SP 800-61r1
10.6028/NIST.SP.800-61r1
Download PDF | Download Citation
2008
NIST SP 800-61r1
10.6028/NIST.SP.800-61r1
Download PDF | Download Citation
Electronic authentication guideline
2011
NIST SP 800-63-1
10.6028/NIST.SP.800-63-1
Download PDF | Download Citation
2011
NIST SP 800-63-1
10.6028/NIST.SP.800-63-1
Download PDF | Download Citation
Electronic authentication guideline
2004
NIST SP 800-63v1.0.1
10.6028/NIST.SP.800-63v1.0.1
Download PDF | Download Citation
2004
NIST SP 800-63v1.0.1
10.6028/NIST.SP.800-63v1.0.1
Download PDF | Download Citation
Electronic authentication guideline
2006
NIST SP 800-63v1.0.2
10.6028/NIST.SP.800-63v1.0.2
Download PDF | Download Citation
2006
NIST SP 800-63v1.0.2
10.6028/NIST.SP.800-63v1.0.2
Download PDF | Download Citation
Security considerations in the information system development life cycle
2003
NIST SP 800-64
10.6028/NIST.SP.800-64
Download PDF | Download Citation
2003
NIST SP 800-64
10.6028/NIST.SP.800-64
Download PDF | Download Citation
Security considerations in the information system development life cycle
2004
NIST SP 800-64r1
10.6028/NIST.SP.800-64r1
Download PDF | Download Citation
2004
NIST SP 800-64r1
10.6028/NIST.SP.800-64r1
Download PDF | Download Citation
Security considerations in the system development life cycle
2008
NIST SP 800-64r2
10.6028/NIST.SP.800-64r2
Download PDF | Download Citation
2008
NIST SP 800-64r2
10.6028/NIST.SP.800-64r2
Download PDF | Download Citation
Integrating IT Security into the Capital Planning and Investment Control Process
2005
NIST SP 800-65
10.6028/NIST.SP.800-65
Download PDF | Download Citation
2005
NIST SP 800-65
10.6028/NIST.SP.800-65
Download PDF | Download Citation
An introductory resource guide for implementing the Health Insurance Portability and
Accountability Act (HIPAA) security rule
2005
NIST SP 800-66
10.6028/NIST.SP.800-66
Download PDF | Download Citation
2005
NIST SP 800-66
10.6028/NIST.SP.800-66
Download PDF | Download Citation
An introductory resource guide for implementing the Health Insurance Portability and
Accountability Act (HIPAA) security rule
2008
NIST SP 800-66r1
10.6028/NIST.SP.800-66r1
Download PDF | Download Citation
2008
NIST SP 800-66r1
10.6028/NIST.SP.800-66r1
Download PDF | Download Citation
Recommendation for the triple data encryption algorithm (TDEA) block cipher
2012
NIST SP 800-67r1
10.6028/NIST.SP.800-67r1
Download PDF | Download Citation
2012
NIST SP 800-67r1
10.6028/NIST.SP.800-67r1
Download PDF | Download Citation
Guidance for securing Microsoft Windows XP for IT Professionals : a NIST security configuration checklist : recommendations of the National Institute
of Standards and Technology
2005
NIST SP 800-68
10.6028/NIST.SP.800-68
Download PDF | Download Citation
2005
NIST SP 800-68
10.6028/NIST.SP.800-68
Download PDF | Download Citation
Guide to securing Microsoft Windows XP Systems for IT Professionals : a NIST security configuration checklist
2008
NIST SP 800-68r1
10.6028/NIST.SP.800-68r1
Download PDF | Download Citation
2008
NIST SP 800-68r1
10.6028/NIST.SP.800-68r1
Download PDF | Download Citation
Guidance for securing Microsoft Windows XP Home Edition : a NIST security configuration checklist
2006
NIST SP 800-69
10.6028/NIST.SP.800-69
Download PDF | Download Citation
2006
NIST SP 800-69
10.6028/NIST.SP.800-69
Download PDF | Download Citation
Security configuration checklists program for IT products : guidance for checklists users and developers
2005
NIST SP 800-70
10.6028/NIST.SP.800-70
Download PDF | Download Citation
2005
NIST SP 800-70
10.6028/NIST.SP.800-70
Download PDF | Download Citation
National checklist program for IT products : guidelines for checklist users and developers
2009
NIST SP 800-70r1
10.6028/NIST.SP.800-70r1
Download PDF | Download Citation
2009
NIST SP 800-70r1
10.6028/NIST.SP.800-70r1
Download PDF | Download Citation
National checklist program for IT products : guidelines for checklist users and developers
2011
NIST SP 800-70r2
10.6028/NIST.SP.800-70r2
Download PDF | Download Citation
2011
NIST SP 800-70r2
10.6028/NIST.SP.800-70r2
Download PDF | Download Citation
Guidelines on PDA forensics
2004
NIST SP 800-72
10.6028/NIST.SP.800-72
Download PDF | Download Citation
2004
NIST SP 800-72
10.6028/NIST.SP.800-72
Download PDF | Download Citation
Interfaces for personal identity verification
2005
NIST SP 800-73
10.6028/NIST.SP.800-73
Download PDF | Download Citation
2005
NIST SP 800-73
10.6028/NIST.SP.800-73
Download PDF | Download Citation
Interfaces for personal identity verification
2006
NIST SP 800-73-1
10.6028/NIST.SP.800-73-1
Download PDF | Download Citation
2006
NIST SP 800-73-1
10.6028/NIST.SP.800-73-1
Download PDF | Download Citation
Interfaces for personal identity verification
2008
NIST SP 800-73-2
10.6028/NIST.SP.800-73-2
Download PDF | Download Citation
2008
NIST SP 800-73-2
10.6028/NIST.SP.800-73-2
Download PDF | Download Citation
Biometric data specification for personal identity verification
2005
NIST SP 800-76
10.6028/NIST.SP.800-76
Download PDF | Download Citation
2005
NIST SP 800-76
10.6028/NIST.SP.800-76
Download PDF | Download Citation
Biometric data specification for personal identity verification
2007
NIST SP 800-76-1
10.6028/NIST.SP.800-76-1
Download PDF | Download Citation
2007
NIST SP 800-76-1
10.6028/NIST.SP.800-76-1
Download PDF | Download Citation
Cryptographic algorithms and key sizes for personal identity verification
2005
NIST SP 800-78
10.6028/NIST.SP.800-78
Download PDF | Download Citation
2005
NIST SP 800-78
10.6028/NIST.SP.800-78
Download PDF | Download Citation
Cryptographic algorithms and key sizes for personal identity verification
2007
NIST SP 800-78-1
10.6028/NIST.SP.800-78-1
Download PDF | Download Citation
2007
NIST SP 800-78-1
10.6028/NIST.SP.800-78-1
Download PDF | Download Citation
Cryptographic algorithms and key sizes for personal identity verification
2010
NIST SP 800-78-2
10.6028/NIST.SP.800-78-2
Download PDF | Download Citation
2010
NIST SP 800-78-2
10.6028/NIST.SP.800-78-2
Download PDF | Download Citation
Cryptographic algorithms and key sizes for personal identity verification
2010
NIST SP 800-78-3
10.6028/NIST.SP.800-78-3
Download PDF | Download Citation
2010
NIST SP 800-78-3
10.6028/NIST.SP.800-78-3
Download PDF | Download Citation
Guidelines for the certification and accreditation of PIV card issuing organizations
2005
NIST SP 800-79
10.6028/NIST.SP.800-79
Download PDF | Download Citation
2005
NIST SP 800-79
10.6028/NIST.SP.800-79
Download PDF | Download Citation
Guidelines for the Authorization of Personal Identity Verification Card Issuers (PCI)
and Derived PIV Credential Issuers (DPCI)
June 2008
NIST SP 800-79-1
10.6028/NIST.SP.800-79-1
Download PDF | Download Citation
June 2008
NIST SP 800-79-1
10.6028/NIST.SP.800-79-1
Download PDF | Download Citation
Security issues in the database language SQL
1993
NIST SP 800-8
10.6028/NIST.SP.800-8
Download PDF | Download Citation
1993
NIST SP 800-8
10.6028/NIST.SP.800-8
Download PDF | Download Citation
Secure Domain Name System (DNS) deployment guide
2006
NIST SP 800-81
10.6028/NIST.SP.800-81
Download PDF | Download Citation
2006
NIST SP 800-81
10.6028/NIST.SP.800-81
Download PDF | Download Citation
Secure Domain Name System (DNS) deployment guide
2010
NIST SP 800-81r1
10.6028/NIST.SP.800-81r1
Download PDF | Download Citation
2010
NIST SP 800-81r1
10.6028/NIST.SP.800-81r1
Download PDF | Download Citation
Guide to malware incident prevention and handling
2005
NIST SP 800-83
10.6028/NIST.SP.800-83
Download PDF | Download Citation
2005
NIST SP 800-83
10.6028/NIST.SP.800-83
Download PDF | Download Citation
Guide to test, training, and exercise programs for IT plans and capabilities
2006
NIST SP 800-84
10.6028/NIST.SP.800-84
Download PDF | Download Citation
2006
NIST SP 800-84
10.6028/NIST.SP.800-84
Download PDF | Download Citation
PIV middleware and on-card application conformance test guidance (SP 800-73 compliance)
2005
NIST SP 800-85
10.6028/NIST.SP.800-85
Download PDF | Download Citation
2005
NIST SP 800-85
10.6028/NIST.SP.800-85
Download PDF | Download Citation
PIV card application and middleware interface test guidelines (SP800-73 compliance)
2006
NIST SP 800-85a
10.6028/NIST.SP.800-85a
Download PDF | Download Citation
2006
NIST SP 800-85a
10.6028/NIST.SP.800-85a
Download PDF | Download Citation
PIV card application and middleware interface test guidelines (SP800-73-2 compliance)
2009
NIST SP 800-85a-1
10.6028/NIST.SP.800-85a-1
Download PDF | Download Citation
2009
NIST SP 800-85a-1
10.6028/NIST.SP.800-85a-1
Download PDF | Download Citation
PIV card application and middleware interface test guidelines (SP800-73-3 compliance)
2010
NIST SP 800-85a-2
10.6028/NIST.SP.800-85a-2
Download PDF | Download Citation
2010
NIST SP 800-85a-2
10.6028/NIST.SP.800-85a-2
Download PDF | Download Citation
PIV data model test guidelines
2006
NIST SP 800-85b
10.6028/NIST.SP.800-85b
Download PDF | Download Citation
2006
NIST SP 800-85b
10.6028/NIST.SP.800-85b
Download PDF | Download Citation
Guide to integrating forensic techniques into incident response
2006
NIST SP 800-86
10.6028/NIST.SP.800-86
Download PDF | Download Citation
2006
NIST SP 800-86
10.6028/NIST.SP.800-86
Download PDF | Download Citation
Codes for identification of federal and federally-assisted organizations
2008
NIST SP 800-87r1
10.6028/NIST.SP.800-87r1
Download PDF | Download Citation
2008
NIST SP 800-87r1
10.6028/NIST.SP.800-87r1
Download PDF | Download Citation
Codes for the identification of federal and federally assisted organizations version
1.0
2005
NIST SP 800-87ver1
10.6028/NIST.SP.800-87ver1
Download PDF | Download Citation
2005
NIST SP 800-87ver1
10.6028/NIST.SP.800-87ver1
Download PDF | Download Citation
Codes for the identification of federal and federally assisted organizations
2006
NIST SP 800-87ver1e2006
10.6028/NIST.SP.800-87ver1e2006
Download PDF | Download Citation
2006
NIST SP 800-87ver1e2006
10.6028/NIST.SP.800-87ver1e2006
Download PDF | Download Citation
Codes for the identification of federal and federally assisted organizations
2007
NIST SP 800-87ver1e2007
10.6028/NIST.SP.800-87ver1e2007
Download PDF | Download Citation
2007
NIST SP 800-87ver1e2007
10.6028/NIST.SP.800-87ver1e2007
Download PDF | Download Citation
Guidelines for media sanitization
2006
NIST SP 800-88
10.6028/NIST.SP.800-88
Download PDF | Download Citation
2006
NIST SP 800-88
10.6028/NIST.SP.800-88
Download PDF | Download Citation
Recommendation for obtaining assurances for digital signature applications
2006
NIST SP 800-89
10.6028/NIST.SP.800-89
Download PDF | Download Citation
2006
NIST SP 800-89
10.6028/NIST.SP.800-89
Download PDF | Download Citation
Good security practices for electronic commerce, including electronic data interchange
1993
NIST SP 800-9
10.6028/NIST.SP.800-9
Download PDF | Download Citation
1993
NIST SP 800-9
10.6028/NIST.SP.800-9
Download PDF | Download Citation
Recommendation for random number generation using deterministic random bit generators
(revised)
2007
NIST SP 800-90
10.6028/NIST.SP.800-90
Download PDF | Download Citation
2007
NIST SP 800-90
10.6028/NIST.SP.800-90
Download PDF | Download Citation
Recommendation for random number generation using deterministic random bit generators
2012
NIST SP 800-90a
10.6028/NIST.SP.800-90a
Download PDF | Download Citation
2012
NIST SP 800-90a
10.6028/NIST.SP.800-90a
Download PDF | Download Citation
Guide to computer security log management
2006
NIST SP 800-92
10.6028/NIST.SP.800-92
Download PDF | Download Citation
2006
NIST SP 800-92
10.6028/NIST.SP.800-92
Download PDF | Download Citation
Guide to Intrusion Detection and Prevention Systems (IDPS)
2007
NIST SP 800-94
10.6028/NIST.SP.800-94
Download PDF | Download Citation
2007
NIST SP 800-94
10.6028/NIST.SP.800-94
Download PDF | Download Citation
Guide to secure web services
2007
NIST SP 800-95
10.6028/NIST.SP.800-95
Download PDF | Download Citation
2007
NIST SP 800-95
10.6028/NIST.SP.800-95
Download PDF | Download Citation
PIV card to reader interoperability guidelines
2006
NIST SP 800-96
10.6028/NIST.SP.800-96
Download PDF | Download Citation
2006
NIST SP 800-96
10.6028/NIST.SP.800-96
Download PDF | Download Citation
Establishing wireless robust security networks : a guide to IEEE 802.11i
2007
NIST SP 800-97
10.6028/NIST.SP.800-97
Download PDF | Download Citation
2007
NIST SP 800-97
10.6028/NIST.SP.800-97
Download PDF | Download Citation
Guidelines for securing Radio Frequency Identification (RFID) systems
2007
NIST SP 800-98
10.6028/NIST.SP.800-98
Download PDF | Download Citation
2007
NIST SP 800-98
10.6028/NIST.SP.800-98
Download PDF | Download Citation
Recommendation for key derivation using pseudorandom functions (revised)
2009
NIST SP 800-108
10.6028/NIST.SP.800-108
Download PDF | Download Citation
2009
NIST SP 800-108
10.6028/NIST.SP.800-108
Download PDF | Download Citation
Guide to Industrial Control Systems (ICS) Security
June 2015
NIST SP 800-82r2
10.6028/NIST.SP.800-82r2
Download PDF | Download Citation
June 2015
NIST SP 800-82r2
10.6028/NIST.SP.800-82r2
Download PDF | Download Citation
Interfaces for Personal Identity Verification
May 2015
NIST SP 800-73-4
10.6028/NIST.SP.800-73-4
Download PDF | Download Citation
May 2015
NIST SP 800-73-4
10.6028/NIST.SP.800-73-4
Download PDF | Download Citation
Cryptographic Algorithms and Key Sizes for Personal Identity Verification
May 2015
NIST SP 800-78-4
10.6028/NIST.SP.800-78-4
Download PDF | Download Citation
May 2015
NIST SP 800-78-4
10.6028/NIST.SP.800-78-4
Download PDF | Download Citation
Supply Chain Risk Management Practices for Federal Information Systems and Organizations
April 2015
NIST SP 800-161
10.6028/NIST.SP.800-161
Download PDF | Download Citation
April 2015
NIST SP 800-161
10.6028/NIST.SP.800-161
Download PDF | Download Citation
Vetting the Security of Mobile Applications
January 2015
NIST SP 800-163
10.6028/NIST.SP.800-163
Download PDF | Download Citation
January 2015
NIST SP 800-163
10.6028/NIST.SP.800-163
Download PDF | Download Citation
Recommendation for Key Management Part 3: Application-Specific Key Management Guidance
January 2015
NIST SP 800-57Pt3r1
10.6028/NIST.SP.800-57Pt3r1
Download PDF | Download Citation
January 2015
NIST SP 800-57Pt3r1
10.6028/NIST.SP.800-57Pt3r1
Download PDF | Download Citation
Guidelines for Derived Personal Identity Verification (PIV) Credentials
December 2014
NIST SP 800-157
10.6028/NIST.SP.800-157
Download PDF | Download Citation
December 2014
NIST SP 800-157
10.6028/NIST.SP.800-157
Download PDF | Download Citation
Guidelines for Media Sanitization
December 2014
NIST SP 800-88r1
10.6028/NIST.SP.800-88r1
Download PDF | Download Citation
December 2014
NIST SP 800-88r1
10.6028/NIST.SP.800-88r1
Download PDF | Download Citation
Assessing Security and Privacy Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans
December 2014
NIST SP 800-53Ar4
10.6028/NIST.SP.800-53Ar4
Download PDF | Download Citation
December 2014
NIST SP 800-53Ar4
10.6028/NIST.SP.800-53Ar4
Download PDF | Download Citation
Recommendation for Pair-Wise Key-Establishment Schemes Using Integer Factorization
Cryptography
October 2014
NIST SP 800-56Br1
10.6028/NIST.SP.800-56Br1
Download PDF | Download Citation
October 2014
NIST SP 800-56Br1
10.6028/NIST.SP.800-56Br1
Download PDF | Download Citation
A Framework for Designing Cryptographic Key Management Systems
August 2013
NIST SP 800-130
10.6028/NIST.SP.800-130
Download PDF | Download Citation
August 2013
NIST SP 800-130
10.6028/NIST.SP.800-130
Download PDF | Download Citation
Computer Security Division 2013 annual report
June 2014
NIST SP 800-170
10.6028/NIST.SP.800-170
Download PDF | Download Citation
June 2014
NIST SP 800-170
10.6028/NIST.SP.800-170
Download PDF | Download Citation
BIOS Protection Guidelines for Servers
January 2008
NIST SP 800-147B
10.6028/NIST.SP.800-147B
Download PDF | Download Citation
January 2008
NIST SP 800-147B
10.6028/NIST.SP.800-147B
Download PDF | Download Citation
Guidelines on Cell Phone and PDA Security
October 2008
NIST SP 800-124
10.6028/NIST.SP.800-124
Download PDF | Download Citation
October 2008
NIST SP 800-124
10.6028/NIST.SP.800-124
Download PDF | Download Citation
Guide to Attribute Based Access Control (ABAC) Definition and Considerations
January 2014
NIST SP 800-162
10.6028/NIST.SP.800-162
Download PDF | Download Citation
January 2014
NIST SP 800-162
10.6028/NIST.SP.800-162
Download PDF | Download Citation
Computer Security Division 2012 Annual Report
June 2013
NIST SP 800-165
10.6028/NIST.SP.800-165
Download PDF | Download Citation
June 2013
NIST SP 800-165
10.6028/NIST.SP.800-165
Download PDF | Download Citation
Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography
May 2013
NIST SP 800-56Ar2
10.6028/NIST.SP.800-56Ar2
Download PDF | Download Citation
May 2013
NIST SP 800-56Ar2
10.6028/NIST.SP.800-56Ar2
Download PDF | Download Citation
Biometric Specifications for Personal Identity Verification
July 2013
NIST SP 800-76-2
10.6028/NIST.SP.800-76-2
Download PDF | Download Citation
July 2013
NIST SP 800-76-2
10.6028/NIST.SP.800-76-2
Download PDF | Download Citation
Guide to Malware Incident Prevention and Handling for Desktops and Laptops
July 2013
NIST SP 800-83r1
10.6028/NIST.SP.800-83r1
Download PDF | Download Citation
July 2013
NIST SP 800-83r1
10.6028/NIST.SP.800-83r1
Download PDF | Download Citation
Guide to Enterprise Patch Management Technologies
July 2013
NIST SP 800-40r3
10.6028/NIST.SP.800-40r3
Download PDF | Download Citation
July 2013
NIST SP 800-40r3
10.6028/NIST.SP.800-40r3
Download PDF | Download Citation
Approximate matching : definition and terminology
May 2014
NIST SP 800-168
10.6028/NIST.SP.800-168
Download PDF | Download Citation
May 2014
NIST SP 800-168
10.6028/NIST.SP.800-168
Download PDF | Download Citation
Guidelines for Managing the Security of Mobile Devices in the Enterprise
June 2013
NIST SP 800-124r1
10.6028/NIST.SP.800-124r1
Download PDF | Download Citation
June 2013
NIST SP 800-124r1
10.6028/NIST.SP.800-124r1
Download PDF | Download Citation
Guide for applying the risk management framework to federal information systems :
a security life cycle approach
June 2014
NIST SP 800-37r1
10.6028/NIST.SP.800-37r1
Download PDF | Download Citation
June 2014
NIST SP 800-37r1
10.6028/NIST.SP.800-37r1
Download PDF | Download Citation
Guidelines on mobile device forensics
May 2014
NIST SP 800-101r1
10.6028/NIST.SP.800-101r1
Download PDF | Download Citation
May 2014
NIST SP 800-101r1
10.6028/NIST.SP.800-101r1
Download PDF | Download Citation
Guidelines for the selection, configuration, and use of transport layer security (TLS)
implementations
April 2014
NIST SP 800-52r1
10.6028/NIST.SP.800-52r1
Download PDF | Download Citation
April 2014
NIST SP 800-52r1
10.6028/NIST.SP.800-52r1
Download PDF | Download Citation
Computer Security Incident Handling Guide : Recommendations of the National Institute
of Standards and Technology
August 2012
NIST SP 800-61r2
10.6028/NIST.SP.800-61r2
Download PDF | Download Citation
August 2012
NIST SP 800-61r2
10.6028/NIST.SP.800-61r2
Download PDF | Download Citation
Electronic Authentication Guideline
November 2013
NIST SP 800-63-2
10.6028/NIST.SP.800-63-2
Download PDF | Download Citation
November 2013
NIST SP 800-63-2
10.6028/NIST.SP.800-63-2
Download PDF | Download Citation
Secure Domain Name System (DNS) Deployment Guide
September 2013
NIST SP 800-81-2
10.6028/NIST.SP.800-81-2
Download PDF | Download Citation
September 2013
NIST SP 800-81-2
10.6028/NIST.SP.800-81-2
Download PDF | Download Citation
Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data
Acquisition (SCADA) systems, Distributed Control systems (DCS), and other control
system configurations such as Programmable Logic Controllers (PLC) : recommendations
of the National Institute of Standards and Technology, Computer security
June 2011
NIST SP 800-82
10.6028/NIST.SP.800-82
Download PDF | Download Citation
June 2011
NIST SP 800-82
10.6028/NIST.SP.800-82
Download PDF | Download Citation
Guide to Industrial Control Systems (ICS) Security : Supervisory Control and Data
Acquisition (SCADA) Systems, Distributed Control Systems (DCS), and Other Control
System Configurations such as Programmable Logic Controllers (PLC)
May 2013
NIST SP 800-82r1
10.6028/NIST.SP.800-82r1
Download PDF | Download Citation
May 2013
NIST SP 800-82r1
10.6028/NIST.SP.800-82r1
Download PDF | Download Citation
Security and Privacy Controls for Federal Information Systems and Organizations
April 2013
NIST SP 800-53r4
10.6028/NIST.SP.800-53r4
Download PDF | Download Citation
April 2013
NIST SP 800-53r4
10.6028/NIST.SP.800-53r4
Download PDF | Download Citation
Recommendation for Cryptographic Key Generation
December 2012
NIST SP 800-133
10.6028/NIST.SP.800-133
Download PDF | Download Citation
December 2012
NIST SP 800-133
10.6028/NIST.SP.800-133
Download PDF | Download Citation
Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping (SP 800-38F)
December 2012
NIST SP 800-38F
10.6028/NIST.SP.800-38F
Download PDF | Download Citation
December 2012
NIST SP 800-38F
10.6028/NIST.SP.800-38F
Download PDF | Download Citation