CINXE.COM

CSRC Topics - media protection | CSRC

<!DOCTYPE html> <html lang="en-us" xml:lang="en-us"> <head><script type="text/javascript" src="/_static/js/bundle-playback.js?v=HxkREWBo" charset="utf-8"></script> <script type="text/javascript" src="/_static/js/wombat.js?v=txqj7nKC" charset="utf-8"></script> <script>window.RufflePlayer=window.RufflePlayer||{};window.RufflePlayer.config={"autoplay":"on","unmuteOverlay":"hidden"};</script> <script type="text/javascript" src="/_static/js/ruffle/ruffle.js"></script> <script type="text/javascript"> __wm.init("https://web.archive.org/web"); __wm.wombat("https://csrc.nist.gov/Topics/Security-and-Privacy/security-programs-and-operations/media-protection","20230930190518","https://web.archive.org/","web","/_static/", "1696100718"); </script> <link rel="stylesheet" type="text/css" href="/_static/css/banner-styles.css?v=S1zqJCYt" /> <link rel="stylesheet" type="text/css" href="/_static/css/iconochive.css?v=3PDvdIFv" /> <!-- End Wayback Rewrite JS Include --> <meta charset="utf-8"/> <title>CSRC Topics - media protection | CSRC</title> <meta http-equiv="content-type" content="text/html; charset=UTF-8"/> <meta http-equiv="content-style-type" content="text/css"/> <meta http-equiv="content-script-type" content="text/javascript"/> <meta name="viewport" content="width=device-width, initial-scale=1.0"/> <meta name="msapplication-config" content="/CSRC/Media/images/favicons/browserconfig.xml"/> <meta name="theme-color" content="#000000"/> <meta name="google-site-verification" content="xbrnrVYDgLD-Bd64xHLCt4XsPXzUhQ-4lGMj4TdUUTA"/> <meta name="description" content="Use these CSRC Topics to identify and learn more about NIST's cybersecurity Projects, Publications, News, Events and Presentations."/> <meta name="dcterms.title" content="CSRC Topic: media protection | CSRC"/> <meta name="dcterms.description" content="Use these CSRC Topics to identify and learn more about NIST's cybersecurity Projects, Publications, News, Events and Presentations."/> <meta name="dcterms.creator" content="Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, U.S. Department of Commerce"/> <meta name="dcterms.date.created" scheme="ISO8601" content="2016-06-08"/> <meta name="dcterms.date.reviewed" scheme="ISO8601" content="2020-06-22"/> <meta name="dcterms.language" scheme="DCTERMS.RFC1766" content="EN-US"/> <!-- Facebook OpenGraph Tags --> <meta name="og:site_name" content="CSRC | NIST"/> <meta name="og:type" content="article"/> <meta name="og:url" content="https://web.archive.org/web/20230930190518im_/https://csrc.nist.gov/Topics/Security-and-Privacy/security-programs-and-operations/media-protection"/> <meta name="og:title" content="CSRC Topic: media protection | CSRC"/> <meta name="og:description" content="Use these CSRC Topics to identify and learn more about NIST's cybersecurity Projects, Publications, News, Events and Presentations."/> <meta name="article:tag" content="media protection"/> <meta name="article:published_time" content="2016-06-08"/> <meta name="article:modified_time" content="2020-06-22"/> <meta name="og:image" content="https://web.archive.org/web/20230930190518im_/https://csrc.nist.gov/CSRC/media/images/CSRC-logo-open-graph.png"/> <link rel="apple-touch-icon" sizes="180x180" href="/web/20230930190518im_/https://csrc.nist.gov/images/icons/apple-touch-icon.png"/> <link rel="icon" type="image/png" href="/web/20230930190518im_/https://csrc.nist.gov/images/icons/favicon-32x32.png" sizes="32x32"/> <link rel="icon" type="image/png" href="/web/20230930190518im_/https://csrc.nist.gov/images/icons/favicon-16x16.png" sizes="16x16"/> <link rel="manifest" href="/web/20230930190518/https://csrc.nist.gov/images/icons/manifest.json"/> <link rel="mask-icon" href="/web/20230930190518im_/https://csrc.nist.gov/images/icons/safari-pinned-tab.svg" color="#000000"/> <link href="/web/20230930190518im_/https://csrc.nist.gov/CSRC/Media/images/favicons/favicon.ico" type="image/x-icon" rel="shortcut icon"/> <link href="/web/20230930190518im_/https://csrc.nist.gov/CSRC/Media/images/favicons/favicon.ico" type="image/x-icon" rel="icon"/> <link href="/web/20230930190518cs_/https://csrc.nist.gov/dist/app.css" rel="stylesheet"/> <!-- reCAPTCHA v3 --> <style> .grecaptcha-badge { visibility: hidden; } </style> <script async type="text/javascript" id="_fed_an_ua_tag" src="https://web.archive.org/web/20230930190518js_/https://dap.digitalgov.gov/Universal-Federated-Analytics-Min.js?agency=nist&amp;subagency=csrc&amp;pua=UA-66610693-15&amp;yt=true&amp;exts=xsd,xml,wav,mpg,mpeg,avi,rtf,webm,ogg,ogv,oga,map,otf,eot,svg,ttf,woff"></script> <style id="antiClickjackCss"> body > * { display: none !important; } #antiClickjack { display: block !important; } </style> <noscript> <style id="antiClickjackNoScript"> body > * { display: block !important; } #antiClickjack { display: none !important; } </style> </noscript> <script type="text/javascript" id="antiClickjackScript"> if (self === top) { // no clickjacking var antiClickjack = document.getElementById("antiClickjackCss"); antiClickjack.parentNode.removeChild(antiClickjack); } else { setTimeout(tryForward(), 5000); } function tryForward() { top.location = self.location; } </script> <!-- Google tag (gtag.js) --> <script async src="https://web.archive.org/web/20230930190518js_/https://www.googletagmanager.com/gtag/js?id=G-TSQ0PLGJZP"></script> <script> 聽聽window.dataLayer = window.dataLayer || []; 聽聽function gtag(){dataLayer.push(arguments);} 聽聽gtag('js', new Date()); 聽聽gtag('config', 'G-TSQ0PLGJZP'); </script> </head> <body> <div id="antiClickjack" style="display: none;"> <strong style="font-size: 1.6rem;">You are viewing this page in an unauthorized frame window.</strong> <p>This is a potential security issue, you are being redirected to <a href="https://web.archive.org/web/20230930190518/https://csrc.nist.gov/">https://csrc.nist.gov</a>.</p> </div> <section class="usa-banner" aria-label="Official government website"> <div class="usa-accordion container"> <header class="usa-banner__header"> <noscript> <p style="font-size: 0.85rem; font-weight: bold;">You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.</p> </noscript> <img class="usa-banner__header-flag" src="/web/20230930190518im_/https://csrc.nist.gov/images/usbanner/us_flag_small.png" alt="U.S. flag"> &nbsp; <span class="usa-banner__header-text">An official website of the United States government</span> <button id="gov-banner-button" class="usa-accordion__button usa-banner__button" data-toggle="collapse" data-target="#gov-banner" aria-expanded="true" aria-controls="gov-banner"> <span class="usa-banner__button-text">Here's how you know</span> </button> </header> <div class="usa-banner__content usa-accordion__content collapse in" role="tabpanel" id="gov-banner" aria-expanded="true"> <div class="row"> <div class="col-md-5 col-sm-12"> <div class="row"> <div class="col-sm-2 col-xs-3"> <img class="usa-banner__icon usa-media-block__img" src="/web/20230930190518im_/https://csrc.nist.gov/images/usbanner/icon-dot-gov.svg" alt="Dot gov"> </div> <div class="col-sm-10 col-xs-9"> <p> <strong>Official websites use .gov</strong> <br> A <strong>.gov</strong> website belongs to an official government organization in the United States. </p> </div> </div> </div> <div class="col-md-5 col-sm-12"> <div class="row"> <div class="col-sm-2 col-xs-3"> <img class="usa-banner__icon usa-media-block__img" src="/web/20230930190518im_/https://csrc.nist.gov/images/usbanner/icon-https.svg" alt="Https"> </div> <div class="col-sm-10 col-xs-9"> <p> <strong>Secure .gov websites use HTTPS</strong> <br> A <strong>lock</strong> (<img class="usa-banner__lock" src="/web/20230930190518im_/https://csrc.nist.gov/images/usbanner/lock.svg" alt="Dot gov">) or <strong>https://</strong> means you've safely connected to the .gov website. Share sensitive information only on official, secure websites. </p> </div> </div> </div> </div> </div> </div> </section> <nav id="navbar" class="navbar"> <div id="nist-menu-container" class="container"> <div class="row"> <!-- Brand --> <div class="col-xs-6 col-md-4 navbar-header"> <a class="navbar-brand" href="https://web.archive.org/web/20230930190518/https://www.nist.gov/" target="_blank" id="navbar-brand-image"> <img src="/web/20230930190518im_/https://csrc.nist.gov/CSRC/media/images/svg/nist-logo.svg" alt="National Institute of Standards and Technology" width="110" height="30"> </a> </div> <div class="col-xs-6 col-md-8 navbar-nist-logo"> <div class="form-inline hidden-sm hidden-xs"> <form name="site-search" id="site-search-form" action="/web/20230930190518/https://csrc.nist.gov/search" method="GET"> <label for="search-csrc-query" class="element-invisible">Search</label> <input autocomplete="off" class="form-control" id="search-csrc-query" name="keywords" type="text" size="15" maxlength="128" placeholder="Search CSRC"/> <input type="hidden" name="ipp" value="25"/> <input type="hidden" name="sortBy" value="relevance"/> <input type="hidden" name="showOnly" value="publications,projects,news,events,presentations,glossary,topics"/> <input type="hidden" name="topicsMatch" value="ANY"/> <input type="hidden" name="status" value="Final,Draft"/> <button type="submit" id="search-csrc-submit-btn" class="form-submit"> <span class="element-invisible">Search</span> <i class="fa fa-search"></i> </button> </form> </div> <span id="nvd-menu-button" class="pull-right"> <a href="#" id="nvd-menu-button-link"> <span class="fa fa-bars"></span> <span id="nvd-menu-full-text">CSRC MENU</span> </a> </span> </div> </div> </div> <div class="form-inline hidden-md hidden-lg"> <form name="site-search-mobile" id="site-search-form-mobile" action="/web/20230930190518/https://csrc.nist.gov/search" method="GET"> <label for="search-csrc-query-mobile" class="element-invisible">Search</label> <input autocomplete="off" class="form-control" id="search-csrc-query-mobile" name="keywords" type="text" size="15" maxlength="128" placeholder="Search CSRC"/> <button type="submit" id="search-csrc-submit-btn-mobile" class="form-submit"> <span class="element-invisible">Search</span> <i class="fa fa-search"></i> </button> </form> </div> <div class="main-menu-row container"> <!-- Collect the nav links, forms, and other content for toggling --> <div id="main-menu-drop" class="col-lg-12" style="display: none;"> <ul> <li><a href="/web/20230930190518/https://csrc.nist.gov/projects">Projects</a></li> <li> <a href="/web/20230930190518/https://csrc.nist.gov/publications"> Publications <span class="expander fa fa-plus" id="main-menu-pubs-expander" data-expander-name="publications" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="publications" id="main-menu-pubs-expanded"> <div class="row"> <div class="col-lg-4"> <p><a href="/web/20230930190518/https://csrc.nist.gov/publications/drafts-open-for-comment">Drafts for Public Comment</a></p> <p><a href="/web/20230930190518/https://csrc.nist.gov/publications/draft-pubs">All Public Drafts</a></p> <p><a href="/web/20230930190518/https://csrc.nist.gov/publications/final-pubs">Final Pubs</a></p> <p><a href="/web/20230930190518/https://csrc.nist.gov/publications/fips">FIPS <small>(standards)</small></a></p> </div> <div class="col-lg-4"> <p><a href="/web/20230930190518/https://csrc.nist.gov/publications/sp">Special Publications (SP<small>s</small>)</a></p> <p><a href="/web/20230930190518/https://csrc.nist.gov/publications/ir">IR <small>(interagency/internal reports)</small></a></p> <p><a href="/web/20230930190518/https://csrc.nist.gov/publications/cswp">CSWP <small>(cybersecurity white papers)</small></a></p> <p><a href="/web/20230930190518/https://csrc.nist.gov/publications/itl-bulletin">ITL Bulletins</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20230930190518/https://csrc.nist.gov/publications/project-description">Project Descriptions</a></p> <p><a href="/web/20230930190518/https://csrc.nist.gov/publications/journal-article">Journal Articles</a></p> <p><a href="/web/20230930190518/https://csrc.nist.gov/publications/conference-paper">Conference Papers</a></p> <p><a href="/web/20230930190518/https://csrc.nist.gov/publications/book">Books</a></p> </div> </div> </div> </li> <li> <a href="/web/20230930190518/https://csrc.nist.gov/topics"> Topics <span class="expander fa fa-plus" id="main-menu-topics-expander" data-expander-name="topics" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="topics" id="main-menu-topics-expanded"> <div class="row"> <div class="col-lg-4"> <p><a href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy">Security &amp; Privacy</a></p> <p><a href="/web/20230930190518/https://csrc.nist.gov/Topics/Applications">Applications</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20230930190518/https://csrc.nist.gov/Topics/Technologies">Technologies</a></p> <p><a href="/web/20230930190518/https://csrc.nist.gov/Topics/Sectors">Sectors</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20230930190518/https://csrc.nist.gov/Topics/Laws-and-Regulations">Laws &amp; Regulations</a></p> <p><a href="/web/20230930190518/https://csrc.nist.gov/Topics/Activities-and-Products">Activities &amp; Products</a></p> </div> </div> </div> </li> <li><a href="/web/20230930190518/https://csrc.nist.gov/news">News &amp; Updates</a></li> <li><a href="/web/20230930190518/https://csrc.nist.gov/events">Events</a></li> <li><a href="/web/20230930190518/https://csrc.nist.gov/glossary">Glossary</a></li> <li> <a href="/web/20230930190518/https://csrc.nist.gov/about"> About CSRC <span class="expander fa fa-plus" id="main-menu-about-expander" data-expander-name="about" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="about" id="main-menu-about-expanded"> <div class="row"> <div class="col-lg-6"> <p> <strong><a href="/web/20230930190518/https://csrc.nist.gov/Groups/Computer-Security-Division">Computer Security Division</a></strong><br/> <ul> <li><a href="/web/20230930190518/https://csrc.nist.gov/Groups/Computer-Security-Division/Cryptographic-Technology">Cryptographic Technology</a></li> <li><a href="/web/20230930190518/https://csrc.nist.gov/Groups/Computer-Security-Division/Secure-Systems-and-Applications">Secure Systems and Applications</a></li> <li><a href="/web/20230930190518/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Components-and-Mechanisms">Security Components and Mechanisms</a></li> <li><a href="/web/20230930190518/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Engineering-and-Risk-Management">Security Engineering and Risk Management</a></li> <li><a href="/web/20230930190518/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Testing-Validation-and-Measurement">Security Testing, Validation, and Measurement</a></li> </ul> </p> </div> <div class="col-lg-6"> <p> <strong><a href="/web/20230930190518/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division">Applied Cybersecurity Division</a></strong><br/> <ul> <li><a href="/web/20230930190518/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division/Cybersecurity-and-Privacy-Applications">Cybersecurity and Privacy Applications</a></li> <li><a href="/web/20230930190518/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division/National-Cybersecurity-Center-of-Excellence">National Cybersecurity Center of Excellence (NCCoE)</a></li> <li><a href="https://web.archive.org/web/20230930190518/https://www.nist.gov/nice/">National Initiative for Cybersecurity Education (NICE)</a></li> </ul> </p> <p> <a href="/web/20230930190518/https://csrc.nist.gov/contact"> Contact Us </a> </p> </div> </div> </div> </li> </ul> </div><!-- /#mobile-nav-container --> </div> </nav> <section id="itl-header" class="has-menu"> <div class="container"> <div class="row"> <div class="col-sm-12 col-md-8"> <div class="hidden-xs hidden-sm" id="itl-header-lg"> <a href="https://web.archive.org/web/20230930190518/https://www.nist.gov/itl" target="_blank" id="itl-header-link">Information Technology Laboratory</a> </div> <div class="hidden-xs hidden-sm" id="csrc-header-lg"> <a href="/web/20230930190518/https://csrc.nist.gov/" id="csrc-header-link-lg">Computer Security Resource Center</a> </div> </div> <div class="col-sm-12 col-md-4"> <div class="hidden-xs hidden-sm hidden-md"> <a id="logo-csrc-lg" href="/web/20230930190518/https://csrc.nist.gov/"><img id="img-logo-csrc-lg" src="/web/20230930190518im_/https://csrc.nist.gov/CSRC/Media/images/nist-logo-csrc-white.svg" alt="CSRC Logo" class="csrc-header-logo"></a> </div> <div class="hidden-lg"> <a id="logo-csrc-sm" href="/web/20230930190518/https://csrc.nist.gov/"><img id="img-logo-csrc-sm" src="/web/20230930190518im_/https://csrc.nist.gov/CSRC/Media/images/nist-logo-csrc-white.svg" alt="CSRC Logo" class="csrc-header-logo"></a> </div> </div> </div> </div> </section> <div id="body-section" class="container"> <div class="breadcrumb"> <a href="/web/20230930190518/https://csrc.nist.gov/topics" class="breadcrumb-link">Topics</a> <a href="/web/20230930190518/https://csrc.nist.gov/topics/security-and-privacy" class="breadcrumb-link">Security and Privacy</a> <a href="/web/20230930190518/https://csrc.nist.gov/topics/security-and-privacy/security-programs-and-operations" class="breadcrumb-link">security programs &amp; operations</a> </div> <div class="topics-content"> <h1 id="page-name">media protection </h1> <div class="page-social-buttons" id="&quot;page-social-buttons&quot;"> <a href="https://web.archive.org/web/20230930190518/https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fcontent.csrc.e1c.nist.gov%2Ftopics%2Fsecurity-and-privacy%2Fsecurity-programs-and-operations%2Fmedia-protection" class="social-facebook"><i class="fa fa-facebook fa-fw" aria-hidden="true"></i><span class="sr-only">Share to Facebook</span></a> <a href="https://web.archive.org/web/20230930190518/https://twitter.com/share?url=https%3A%2F%2Fcontent.csrc.e1c.nist.gov%2Ftopics%2Fsecurity-and-privacy%2Fsecurity-programs-and-operations%2Fmedia-protection" class="social-twitter"><i class="fa fa-twitter fa-fw" aria-hidden="true"></i><span class="sr-only">Share to Twitter</span></a> </div> <div class="row"> <div class="col-md-8 col-sm-12"> <div style="margin-bottom: 1.4rem;" id="page-description"><p>Security controls related to media protection include media: i) policies and procedures, ii) access, iii) marking, iv) storage, v) transport, vi) sanitization, vii) use, and viii) downgrading. (SP 800-53, Appendix F-MP)</p> </div> <div class="news-list" id="related-news-list"> <h3><i class="fa fa-newspaper-o"></i> Related News</h3> <div class="news-list-item" id="related-news-item-0"> <strong><a href="/web/20230930190518/https://csrc.nist.gov/News/2020/security-guidelines-for-storage-infrastructure" id="related-news-link-0">Security Guidelines for Storage Infrastructure</a></strong><br/> <small><strong id="related-news-date-0">October 26, 2020</strong></small><br/> <span id="related-news-desc-0">NIST SP 800-209, "Security Guidelines for Storage Infrastructure," has been published.</span> </div> <div class="news-list-item" id="related-news-item-1"> <strong><a href="/web/20230930190518/https://csrc.nist.gov/News/2020/draft-sp-800-209-available-for-comment" id="related-news-link-1">Draft SP 800-209 Available for Comment</a></strong><br/> <small><strong id="related-news-date-1">July 21, 2020</strong></small><br/> <span id="related-news-desc-1">NIST has released Draft Special Publication (SP) 800-209, "Security Guidelines for Storage...</span> </div> <p><strong> <a href="/web/20230930190518/https://csrc.nist.gov/news?sortBy-lg=NewsDateTime+DESC&amp;ipp-lg=25&amp;topics-lg=27702%7cmedia+protection&amp;topicsMatch-lg=ANY" id="related-news-all-link">View All News</a> </strong></p> </div> <div class="topics-related-list" id="related-pubs-list"> <h3><i class="fa fa-file-text-o"></i> Related Publications</h3> <div class="related-list-item" id="related-pubs-item-0"> <strong><a href="/web/20230930190518/https://csrc.nist.gov/pubs/sp/1800/26/final" id="related-pubs-link-0">Data Integrity: Detecting and Responding to Ransomware</a></strong><br/> <strong><small id="related-pubs-title-0">SP 1800-26</small></strong><br/> <strong><small id="related-pubs-date-0" data-date-type="citation">December 2020</small></strong><br/> <span id="related-pubs-status-0">Final</span> </div> <div class="related-list-item" id="related-pubs-item-1"> <strong><a href="/web/20230930190518/https://csrc.nist.gov/pubs/sp/1800/25/final" id="related-pubs-link-1">Identifying and Protecting Assets Against Ransomware</a></strong><br/> <strong><small id="related-pubs-title-1">SP 1800-25</small></strong><br/> <strong><small id="related-pubs-date-1" data-date-type="citation">December 2020</small></strong><br/> <span id="related-pubs-status-1">Final</span> </div> <div class="related-list-item" id="related-pubs-item-2"> <strong><a href="/web/20230930190518/https://csrc.nist.gov/pubs/sp/800/209/final" id="related-pubs-link-2">Security Guidelines for Storage Infrastructure</a></strong><br/> <strong><small id="related-pubs-title-2">SP 800-209</small></strong><br/> <strong><small id="related-pubs-date-2" data-date-type="citation">October 2020</small></strong><br/> <span id="related-pubs-status-2">Final</span> </div> <div class="related-list-item" id="related-pubs-item-3"> <strong><a href="/web/20230930190518/https://csrc.nist.gov/pubs/sp/800/209/ipd" id="related-pubs-link-3">Security Guidelines for Storage Infrastructure</a></strong><br/> <strong><small id="related-pubs-title-3">SP 800-209 (Initial Public Draft)</small></strong><br/> <strong><small id="related-pubs-date-3" data-date-type="citation">July 2020</small></strong><br/> <span id="related-pubs-status-3">Withdrawn</span> </div> <div class="related-list-item" id="related-pubs-item-4"> <strong><a href="/web/20230930190518/https://csrc.nist.gov/pubs/sp/1800/25/ipd" id="related-pubs-link-4">Identifying and Protecting Assets Against Ransomware</a></strong><br/> <strong><small id="related-pubs-title-4">SP 1800-25 (Initial Public Draft)</small></strong><br/> <strong><small id="related-pubs-date-4" data-date-type="citation">January 2020</small></strong><br/> <span id="related-pubs-status-4">Withdrawn</span> </div> <p><strong> <a href="/web/20230930190518/https://csrc.nist.gov/publications/search?sortBy-lg=relevance&amp;viewMode-lg=brief&amp;ipp-lg=25&amp;status-lg=Draft%2CFinal&amp;topics-lg=27702%7cmedia+protection&amp;topicsMatch-lg=ANY&amp;controlsMatch-lg=ANY" id="related-pubs-all-link">View All Publications</a> </strong></p> </div> </div> <div class="col-md-4 col-sm-12"> <div class="bs-callout bs-callout-danger hidden-sm hidden-xs hidden-xxs" id="used-for-callout"> <h4>Used For</h4> <span id="used-for-content">sanitization</span> </div> <div class="bs-callout bs-callout-warning topics-tree" id="topics-callout"> <h4>Topics</h4> <div class="category-topics-container" id="tcd-category-topics-container"><ul><li><i class="fa fa-minus fa-fw fa-sm" id="topics-expander-tcd-24663-24670" data-expander-for="/Topics/Security-and-Privacy/security-programs-and-operations/media-protection" data-expanded="true"></i> <strong><a data-topic-id="24670" data-topic-text="Security and Privacy" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy">Security and Privacy</a></strong><ul><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24670-27481"></i> <a data-topic-id="27481" data-topic-text="cryptography" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/cryptography">cryptography</a><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27647" data-topic-text="digital signatures" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/cryptography/digital-signatures">digital signatures</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27648" data-topic-text="encryption" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/cryptography/encryption">encryption</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27649" data-topic-text="key management" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/cryptography/key-management">key management</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="30027" data-topic-text="lightweight cryptography" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/cryptography/lightweight-cryptography">lightweight cryptography</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27650" data-topic-text="message authentication" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/cryptography/message-authentication">message authentication</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27651" data-topic-text="post-quantum cryptography" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/cryptography/post-quantum-cryptography">post-quantum cryptography</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27652" data-topic-text="random number generation" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/cryptography/random-number-generation">random number generation</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27653" data-topic-text="secure hashing" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/cryptography/secure-hashing">secure hashing</a></li></ul> </li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27482" data-topic-text="cybersecurity supply chain risk management" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/cyber-supply-chain-risk-management">cybersecurity supply chain risk management</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27483" data-topic-text="general security &amp; privacy" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/general-security-and-privacy">general security &amp; privacy</a></li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24670-27484"></i> <a data-topic-id="27484" data-topic-text="identity &amp; access management" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/identity-and-access-management">identity &amp; access management</a><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27663" data-topic-text="access authorization" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/identity-and-access-management/access-authorization">access authorization</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27664" data-topic-text="access control" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/identity-and-access-management/access-control">access control</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27665" data-topic-text="authentication" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/identity-and-access-management/authentication">authentication</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27666" data-topic-text="Personal Identity Verification" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/identity-and-access-management/PIV">Personal Identity Verification</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27667" data-topic-text="public key infrastructure" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/identity-and-access-management/PKI">public key infrastructure</a></li></ul> </li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24670-27485"></i> <a data-topic-id="27485" data-topic-text="privacy" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/privacy">privacy</a><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27680" data-topic-text="personally identifiable information" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/privacy/personally-identifiable-information">personally identifiable information</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27681" data-topic-text="privacy engineering" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/privacy/privacy-engineering">privacy engineering</a></li></ul> </li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24670-27486"></i> <a data-topic-id="27486" data-topic-text="risk management" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/risk-management">risk management</a><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27682" data-topic-text="categorization" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/risk-management/categorization">categorization</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27683" data-topic-text="continuous monitoring" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/risk-management/continuous-monitoring">continuous monitoring</a></li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-27486-27684"></i> <a data-topic-id="27684" data-topic-text="controls" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/risk-management/controls">controls</a><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27767" data-topic-text="controls assessment" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/risk-management/controls/controls-assessment">controls assessment</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27768" data-topic-text="privacy controls" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/risk-management/controls/privacy-controls">privacy controls</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27769" data-topic-text="security controls" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/risk-management/controls/security-controls">security controls</a></li></ul> </li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27685" data-topic-text="risk assessment" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/risk-management/risk-assessment">risk assessment</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27686" data-topic-text="roots of trust" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/risk-management/roots-of-trust">roots of trust</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27687" data-topic-text="system authorization" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/risk-management/system-authorization">system authorization</a></li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-27486-27688"></i> <a data-topic-id="27688" data-topic-text="threats" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/risk-management/threats">threats</a><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27770" data-topic-text="advanced persistent threats" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/risk-management/threats/advanced-persistent-threats">advanced persistent threats</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27771" data-topic-text="botnets" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/risk-management/threats/botnets">botnets</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27772" data-topic-text="information sharing" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/risk-management/threats/information-sharing">information sharing</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27773" data-topic-text="intrusion detection &amp; prevention" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/risk-management/threats/intrusion-detection-and-prevention">intrusion detection &amp; prevention</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27774" data-topic-text="malware" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/risk-management/threats/malware">malware</a></li></ul> </li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27689" data-topic-text="vulnerability management" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/risk-management/vulnerability-management">vulnerability management</a></li></ul> </li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24670-27487"></i> <a data-topic-id="27487" data-topic-text="security &amp; behavior" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/security-and-behavior">security &amp; behavior</a><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27709" data-topic-text="accessibility" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/security-and-behavior/accessibility">accessibility</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27710" data-topic-text="behavior" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/security-and-behavior/behavior">behavior</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27711" data-topic-text="usability" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/security-and-behavior/usability">usability</a></li></ul> </li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24670-27488"></i> <a data-topic-id="27488" data-topic-text="security measurement" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/security-measurement">security measurement</a><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27690" data-topic-text="analytics" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/security-measurement/analytics">analytics</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27691" data-topic-text="assurance" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/security-measurement/assurance">assurance</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27692" data-topic-text="modeling" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/security-measurement/modeling">modeling</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27693" data-topic-text="testing &amp; validation" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/security-measurement/testing-and-validation">testing &amp; validation</a></li></ul> </li><li><i class="fa fa-minus fa-fw fa-sm" id="topics-expander-tcd-24670-27489" data-expander-for="/Topics/Security-and-Privacy/security-programs-and-operations/media-protection" data-expanded="true"></i> <a data-topic-id="27489" data-topic-text="security programs &amp; operations" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/security-programs-and-operations">security programs &amp; operations</a><ul><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27694" data-topic-text="acquisition" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/security-programs-and-operations/acquisition">acquisition</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27695" data-topic-text="asset management" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/security-programs-and-operations/asset-management">asset management</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27696" data-topic-text="audit &amp; accountability" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/security-programs-and-operations/audit-and-accountability">audit &amp; accountability</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27697" data-topic-text="awareness training &amp; education" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/security-programs-and-operations/awareness-training-education">awareness training &amp; education</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27698" data-topic-text="configuration management" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/security-programs-and-operations/configuration-management">configuration management</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27699" data-topic-text="contingency planning" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/security-programs-and-operations/contingency-planning">contingency planning</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27700" data-topic-text="incident response" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/security-programs-and-operations/incident-response">incident response</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27701" data-topic-text="maintenance" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/security-programs-and-operations/maintenance">maintenance</a></li><li><i class="fa fa-fw fa-sm"></i> <span data-topic-id="27702" data-topic-text="media protection">media protection</span></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27703" data-topic-text="patch management" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/security-programs-and-operations/patch-management">patch management</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27704" data-topic-text="personnel security" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/security-programs-and-operations/personnel-security">personnel security</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27705" data-topic-text="physical &amp; environmental protection" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/security-programs-and-operations/physical-and-environmental-protection">physical &amp; environmental protection</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27706" data-topic-text="planning" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/security-programs-and-operations/planning">planning</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27707" data-topic-text="program management" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/security-programs-and-operations/program-management">program management</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27708" data-topic-text="security automation" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/security-programs-and-operations/security-automation">security automation</a></li></ul> </li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24670-27490"></i> <a data-topic-id="27490" data-topic-text="systems security engineering" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/systems-security-engineering">systems security engineering</a><ul style="display: none;"><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-27490-27713"></i> <a data-topic-id="27713" data-topic-text="trustworthiness" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/systems-security-engineering/trustworthiness">trustworthiness</a><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27775" data-topic-text="reliability" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/systems-security-engineering/trustworthiness/reliability">reliability</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27776" data-topic-text="resilience" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/systems-security-engineering/trustworthiness/resilience">resilience</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27777" data-topic-text="safety" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/systems-security-engineering/trustworthiness/safety">safety</a></li></ul> </li></ul> </li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="28469" data-topic-text="zero trust" href="/web/20230930190518/https://csrc.nist.gov/Topics/Security-and-Privacy/zero-trust">zero trust</a></li></ul> </li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24663-24671"></i> <strong><a data-topic-id="24671" data-topic-text="Technologies" href="/web/20230930190518/https://csrc.nist.gov/Topics/technologies">Technologies</a></strong><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27491" data-topic-text="artificial intelligence" href="/web/20230930190518/https://csrc.nist.gov/Topics/technologies/artificial-intelligence">artificial intelligence</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27492" data-topic-text="big data" href="/web/20230930190518/https://csrc.nist.gov/Topics/technologies/big-data">big data</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27493" data-topic-text="biometrics" href="/web/20230930190518/https://csrc.nist.gov/Topics/technologies/biometrics">biometrics</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27494" data-topic-text="blockchain" href="/web/20230930190518/https://csrc.nist.gov/Topics/technologies/blockchain">blockchain</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27495" data-topic-text="cloud &amp; virtualization" href="/web/20230930190518/https://csrc.nist.gov/Topics/technologies/cloud-computing-and-virtualization">cloud &amp; virtualization</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27496" data-topic-text="combinatorial testing" href="/web/20230930190518/https://csrc.nist.gov/Topics/technologies/combinatorial-testing">combinatorial testing</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27497" data-topic-text="complexity" href="/web/20230930190518/https://csrc.nist.gov/Topics/technologies/complexity">complexity</a></li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24671-27499"></i> <a data-topic-id="27499" data-topic-text="hardware" href="/web/20230930190518/https://csrc.nist.gov/Topics/technologies/hardware">hardware</a><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27714" data-topic-text="circuits" href="/web/20230930190518/https://csrc.nist.gov/Topics/technologies/hardware/circuits">circuits</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27715" data-topic-text="personal computers" href="/web/20230930190518/https://csrc.nist.gov/Topics/technologies/hardware/personal-computers">personal computers</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27716" data-topic-text="sensors" href="/web/20230930190518/https://csrc.nist.gov/Topics/technologies/hardware/sensors">sensors</a></li></ul> </li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27498" data-topic-text="mobile" href="/web/20230930190518/https://csrc.nist.gov/Topics/technologies/mobile">mobile</a></li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24671-27500"></i> <a data-topic-id="27500" data-topic-text="networks" href="/web/20230930190518/https://csrc.nist.gov/Topics/technologies/networks">networks</a><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27717" data-topic-text="email" href="/web/20230930190518/https://csrc.nist.gov/Topics/technologies/networks/email">email</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27718" data-topic-text="firewalls" href="/web/20230930190518/https://csrc.nist.gov/Topics/technologies/networks/firewalls">firewalls</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27719" data-topic-text="internet" href="/web/20230930190518/https://csrc.nist.gov/Topics/technologies/networks/internet">internet</a></li></ul> </li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27501" data-topic-text="quantum information science" href="/web/20230930190518/https://csrc.nist.gov/Topics/technologies/quantum-information-science">quantum information science</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27502" data-topic-text="servers" href="/web/20230930190518/https://csrc.nist.gov/Topics/technologies/servers">servers</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27503" data-topic-text="smart cards" href="/web/20230930190518/https://csrc.nist.gov/Topics/technologies/smart-cards">smart cards</a></li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24671-27504"></i> <a data-topic-id="27504" data-topic-text="software &amp; firmware" href="/web/20230930190518/https://csrc.nist.gov/Topics/technologies/software-firmware">software &amp; firmware</a><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27720" data-topic-text="BIOS" href="/web/20230930190518/https://csrc.nist.gov/Topics/technologies/software-firmware/bios">BIOS</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27721" data-topic-text="databases" href="/web/20230930190518/https://csrc.nist.gov/Topics/technologies/software-firmware/databases">databases</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27722" data-topic-text="operating systems" href="/web/20230930190518/https://csrc.nist.gov/Topics/technologies/software-firmware/operating-systems">operating systems</a></li></ul> </li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27505" data-topic-text="storage" href="/web/20230930190518/https://csrc.nist.gov/Topics/technologies/storage">storage</a></li></ul> </li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24663-24672"></i> <strong><a data-topic-id="24672" data-topic-text="Applications" href="/web/20230930190518/https://csrc.nist.gov/Topics/Applications">Applications</a></strong><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27456" data-topic-text="communications &amp; wireless" href="/web/20230930190518/https://csrc.nist.gov/Topics/Applications/communications-and-wireless">communications &amp; wireless</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27457" data-topic-text="cyber-physical systems" href="/web/20230930190518/https://csrc.nist.gov/Topics/Applications/cyber-physical-systems">cyber-physical systems</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27458" data-topic-text="cybersecurity education" href="/web/20230930190518/https://csrc.nist.gov/Topics/Applications/cybersecurity-education">cybersecurity education</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27459" data-topic-text="cybersecurity framework" href="/web/20230930190518/https://csrc.nist.gov/Topics/Applications/cybersecurity-framework">cybersecurity framework</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27460" data-topic-text="cybersecurity workforce" href="/web/20230930190518/https://csrc.nist.gov/Topics/Applications/cybersecurity-workforce">cybersecurity workforce</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27461" data-topic-text="enterprise" href="/web/20230930190518/https://csrc.nist.gov/Topics/Applications/enterprise">enterprise</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27462" data-topic-text="forensics" href="/web/20230930190518/https://csrc.nist.gov/Topics/Applications/forensics">forensics</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27463" data-topic-text="industrial control systems" href="/web/20230930190518/https://csrc.nist.gov/Topics/Applications/industrial-control-systems">industrial control systems</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27464" data-topic-text="Internet of Things" href="/web/20230930190518/https://csrc.nist.gov/Topics/Applications/Internet-of-Things">Internet of Things</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="29979" data-topic-text="mathematics" href="/web/20230930190518/https://csrc.nist.gov/Topics/Applications/mathematics">mathematics</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27920" data-topic-text="positioning navigation &amp; timing" href="/web/20230930190518/https://csrc.nist.gov/Topics/Applications/positioning-navigation-timing">positioning navigation &amp; timing</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27465" data-topic-text="small &amp; medium business" href="/web/20230930190518/https://csrc.nist.gov/Topics/Applications/small-and-medium-business">small &amp; medium business</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27466" data-topic-text="telework" href="/web/20230930190518/https://csrc.nist.gov/Topics/Applications/telework">telework</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27467" data-topic-text="voting" href="/web/20230930190518/https://csrc.nist.gov/Topics/Applications/voting">voting</a></li></ul> </li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24663-24673"></i> <strong><a data-topic-id="24673" data-topic-text="Laws and Regulations" href="/web/20230930190518/https://csrc.nist.gov/Topics/Laws-and-Regulations">Laws and Regulations</a></strong><ul style="display: none;"><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24673-27468"></i> <a data-topic-id="27468" data-topic-text="executive documents" href="/web/20230930190518/https://csrc.nist.gov/Topics/Laws-and-Regulations/executive-documents">executive documents</a><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27668" data-topic-text="Comprehensive National Cybersecurity Initiative" href="/web/20230930190518/https://csrc.nist.gov/Topics/Laws-and-Regulations/executive-documents/CNCI">Comprehensive National Cybersecurity Initiative</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27669" data-topic-text="Cybersecurity Strategy and Implementation Plan" href="/web/20230930190518/https://csrc.nist.gov/Topics/Laws-and-Regulations/executive-documents/CSIP">Cybersecurity Strategy and Implementation Plan</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27670" data-topic-text="Cyberspace Policy Review" href="/web/20230930190518/https://csrc.nist.gov/Topics/Laws-and-Regulations/executive-documents/Cyberspace-Policy-Review">Cyberspace Policy Review</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27671" data-topic-text="Executive Order 13636" href="/web/20230930190518/https://csrc.nist.gov/Topics/Laws-and-Regulations/executive-documents/EO-13636">Executive Order 13636</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27672" data-topic-text="Executive Order 13702" href="/web/20230930190518/https://csrc.nist.gov/Topics/Laws-and-Regulations/executive-documents/EO-13702">Executive Order 13702</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27673" data-topic-text="Executive Order 13718" href="/web/20230930190518/https://csrc.nist.gov/Topics/Laws-and-Regulations/executive-documents/EO-13718">Executive Order 13718</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27674" data-topic-text="Executive Order 13800" href="/web/20230930190518/https://csrc.nist.gov/Topics/Laws-and-Regulations/executive-documents/EO-13800">Executive Order 13800</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27921" data-topic-text="Executive Order 13905" href="/web/20230930190518/https://csrc.nist.gov/Topics/Laws-and-Regulations/executive-documents/Executive-Order-13905">Executive Order 13905</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="28468" data-topic-text="Executive Order 14028" href="/web/20230930190518/https://csrc.nist.gov/Topics/Laws-and-Regulations/executive-documents/Executive-Order-14028">Executive Order 14028</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27675" data-topic-text="Federal Cybersecurity Research and Development Strategic Plan" href="/web/20230930190518/https://csrc.nist.gov/Topics/Laws-and-Regulations/executive-documents/Federal-Cybersecurity-Research-and-Development">Federal Cybersecurity Research and Development Strategic Plan</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27676" data-topic-text="Homeland Security Presidential Directive 7" href="/web/20230930190518/https://csrc.nist.gov/Topics/Laws-and-Regulations/executive-documents/HSPD-7">Homeland Security Presidential Directive 7</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27677" data-topic-text="Homeland Security Presidential Directive 12" href="/web/20230930190518/https://csrc.nist.gov/Topics/Laws-and-Regulations/executive-documents/HSPD-12">Homeland Security Presidential Directive 12</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27678" data-topic-text="OMB Circular A-11" href="/web/20230930190518/https://csrc.nist.gov/Topics/Laws-and-Regulations/executive-documents/OMB-A-11">OMB Circular A-11</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27679" data-topic-text="OMB Circular A-130" href="/web/20230930190518/https://csrc.nist.gov/Topics/Laws-and-Regulations/executive-documents/OMB-A-130">OMB Circular A-130</a></li></ul> </li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24673-27469"></i> <a data-topic-id="27469" data-topic-text="laws" href="/web/20230930190518/https://csrc.nist.gov/Topics/Laws-and-Regulations/laws">laws</a><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27654" data-topic-text="Cyber Security R&amp;D Act" href="/web/20230930190518/https://csrc.nist.gov/Topics/Laws-and-Regulations/laws/Cyber-Security-Research-and-Development-Act">Cyber Security R&D; Act</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27655" data-topic-text="Cybersecurity Enhancement Act" href="/web/20230930190518/https://csrc.nist.gov/Topics/Laws-and-Regulations/laws/Cybersecurity-Enhancement-Act">Cybersecurity Enhancement Act</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27656" data-topic-text="E-Government Act" href="/web/20230930190518/https://csrc.nist.gov/Topics/Laws-and-Regulations/laws/E-Gov-Act">E-Government Act</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27657" data-topic-text="Energy Independence and Security Act" href="/web/20230930190518/https://csrc.nist.gov/Topics/Laws-and-Regulations/laws/EISA">Energy Independence and Security Act</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27658" data-topic-text="Federal Information Security Modernization Act" href="/web/20230930190518/https://csrc.nist.gov/Topics/Laws-and-Regulations/laws/FISMA">Federal Information Security Modernization Act</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27659" data-topic-text="First Responder Network Authority" href="/web/20230930190518/https://csrc.nist.gov/Topics/Laws-and-Regulations/laws/FirstNet">First Responder Network Authority</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27660" data-topic-text="Health Insurance Portability and Accountability Act" href="/web/20230930190518/https://csrc.nist.gov/Topics/Laws-and-Regulations/laws/HIPAA">Health Insurance Portability and Accountability Act</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27661" data-topic-text="Help America Vote Act" href="/web/20230930190518/https://csrc.nist.gov/Topics/Laws-and-Regulations/laws/HAVA">Help America Vote Act</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="28580" data-topic-text="Internet of Things Cybersecurity Improvement Act" href="/web/20230930190518/https://csrc.nist.gov/Topics/Laws-and-Regulations/laws/Internet-of-Things-Cybersecurity-Improvement-Act">Internet of Things Cybersecurity Improvement Act</a></li></ul> </li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24673-27470"></i> <a data-topic-id="27470" data-topic-text="regulations" href="/web/20230930190518/https://csrc.nist.gov/Topics/Laws-and-Regulations/regulations">regulations</a><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27662" data-topic-text="Federal Acquisition Regulation" href="/web/20230930190518/https://csrc.nist.gov/Topics/Laws-and-Regulations/regulations/FAR">Federal Acquisition Regulation</a></li></ul> </li></ul> </li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24663-24674"></i> <strong><a data-topic-id="24674" data-topic-text="Activities and Products" href="/web/20230930190518/https://csrc.nist.gov/Topics/Activities-and-Products">Activities and Products</a></strong><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27452" data-topic-text="annual reports" href="/web/20230930190518/https://csrc.nist.gov/Topics/Activities-and-Products/annual-reports">annual reports</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27453" data-topic-text="conferences &amp; workshops" href="/web/20230930190518/https://csrc.nist.gov/Topics/Activities-and-Products/conferences-and-workshops">conferences &amp; workshops</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="30210" data-topic-text="groups" href="/web/20230930190518/https://csrc.nist.gov/Topics/Activities-and-Products/groups">groups</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27454" data-topic-text="reference materials" href="/web/20230930190518/https://csrc.nist.gov/Topics/Activities-and-Products/reference-materials">reference materials</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27455" data-topic-text="standards development" href="/web/20230930190518/https://csrc.nist.gov/Topics/Activities-and-Products/standards-development">standards development</a></li></ul> </li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24663-24675"></i> <strong><a data-topic-id="24675" data-topic-text="Sectors" href="/web/20230930190518/https://csrc.nist.gov/Topics/Sectors">Sectors</a></strong><ul style="display: none;"><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24675-27472"></i> <a data-topic-id="27472" data-topic-text="energy" href="/web/20230930190518/https://csrc.nist.gov/Topics/Sectors/energy">energy</a><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27712" data-topic-text="smart grid" href="/web/20230930190518/https://csrc.nist.gov/Topics/Sectors/energy/smart-grid">smart grid</a></li></ul> </li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27473" data-topic-text="financial services" href="/web/20230930190518/https://csrc.nist.gov/Topics/Sectors/financial-services">financial services</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27474" data-topic-text="healthcare" href="/web/20230930190518/https://csrc.nist.gov/Topics/Sectors/healthcare">healthcare</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27475" data-topic-text="hospitality" href="/web/20230930190518/https://csrc.nist.gov/Topics/Sectors/hospitality">hospitality</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27476" data-topic-text="manufacturing" href="/web/20230930190518/https://csrc.nist.gov/Topics/Sectors/manufacturing">manufacturing</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27477" data-topic-text="public safety" href="/web/20230930190518/https://csrc.nist.gov/Topics/Sectors/public-safety">public safety</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27478" data-topic-text="retail" href="/web/20230930190518/https://csrc.nist.gov/Topics/Sectors/retail">retail</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27479" data-topic-text="telecommunications" href="/web/20230930190518/https://csrc.nist.gov/Topics/Sectors/telecommunications">telecommunications</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27480" data-topic-text="transportation" href="/web/20230930190518/https://csrc.nist.gov/Topics/Sectors/transportation">transportation</a></li></ul> </li></ul></div> </div> </div> </div> </div> <div class="row"> <div class="col-md-12 historical-data-area" id="historical-data-area"> <span>Created <span id="page-created-date">June 08, 2016</span>, Updated <span id="page-updated-date">June 22, 2020</span></span> </div> </div> <div id="footer-pusher"></div> </div> <footer id="footer"> <div class="container"> <div class="row"> <div class="col-sm-6"> <span class="hidden-xs"> <a href="https://web.archive.org/web/20230930190518/https://www.nist.gov/" title="National Institute of Standards and Technology" rel="home" target="_blank" class="footer-nist-logo" id="footer-nist-logo-link"> <img src="/web/20230930190518im_/https://csrc.nist.gov/CSRC/Media/images/nist-logo-brand-white.svg" alt="National Institute of Standards and Technology logo" id="footer-nist-logo"/> </a> </span> <div class="row footer-contact-container"> <div class="col-sm-12" id="footer-address"> <strong>HEADQUARTERS</strong><br> 100 Bureau Drive<br> Gaithersburg, MD 20899 </div> </div> </div> <div class="col-sm-6"> <ul class="social-list text-right" style="display: block;"> <li class="field-item service-twitter list-horiz"> <a href="https://web.archive.org/web/20230930190518/https://twitter.com/NISTCyber" class="social-btn social-btn--large extlink ext" id="footer-social-twitter-link"> <i class="fa fa-twitter fa-fw"><span class="element-invisible">twitter</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-facebook list-horiz"> <a href="https://web.archive.org/web/20230930190518/https://www.facebook.com/NIST" class="social-btn social-btn--large extlink ext" id="footer-social-facebook-link"> <i class="fa fa-facebook fa-fw"><span class="element-invisible">facebook</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-linkedin list-horiz"> <a href="https://web.archive.org/web/20230930190518/https://www.linkedin.com/company/nist" class="social-btn social-btn--large extlink ext" id="footer-social-linkedin-link"> <i class="fa fa-linkedin fa-fw"><span class="element-invisible">linkedin</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-instagram list-horiz"> <a href="https://web.archive.org/web/20230930190518/https://www.instagram.com/usnistgov/" class="social-btn social-btn--large extlink ext" id="footer-social-instagram-link"> <i class="fa fa-instagram fa-fw"><span class="element-invisible">instagram</span></i> <span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-youtube list-horiz"> <a href="https://web.archive.org/web/20230930190518/https://www.youtube.com/user/USNISTGOV" class="social-btn social-btn--large extlink ext" id="footer-social-youtube-link"> <i class="fa fa-youtube fa-fw"><span class="element-invisible">youtube</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-rss list-horiz"> <a href="https://web.archive.org/web/20230930190518/https://www.nist.gov/news-events/nist-rss-feeds" class="social-btn social-btn--large extlink" id="footer-social-rss-link"> <i class="fa fa-rss fa-fw"><span class="element-invisible">rss</span></i> </a> </li> <li class="field-item service-govdelivery list-horiz last"> <a href="https://web.archive.org/web/20230930190518/https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3" class="social-btn social-btn--large extlink ext" title="Subscribe to CSRC and publication updates, and other NIST cybersecurity news" id="footer-social-govdelivery-link"> <i class="fa fa-envelope fa-fw"><span class="element-invisible">govdelivery</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> </ul> <p class="text-right"> Want updates about CSRC and our publications? <a href="https://web.archive.org/web/20230930190518/https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3" class="btn btn-lg btn-primary" style="background-color: #12659c!important; border-color: #12659c!important;" id="footer-subscribe-link">Subscribe</a> </p> </div> </div> <div class="row hidden-sm hidden-md hidden-lg"> <div class="col-sm-12"> <a href="https://web.archive.org/web/20230930190518/https://www.nist.gov/" title="National Institute of Standards and Technology" rel="home" target="_blank" class="footer-nist-logo" id="footer-bottom-nist-logo-link"> <img src="/web/20230930190518im_/https://csrc.nist.gov/CSRC/Media/images/logo_rev.png" alt="National Institute of Standards and Technology logo" id="footer-bottom-nist-logo"/> </a> </div> </div> <div class="row"> <div class="col-sm-6"> <p> <a href="/web/20230930190518/https://csrc.nist.gov/about/contact" id="footer-contact-us-link">Contact Us</a> | <a href="https://web.archive.org/web/20230930190518/https://www.nist.gov/about-nist/our-organization" style="display: inline-block;" id="footer-org-link">Our Other Offices</a> </p> </div> <div class="col-sm-6"> <span class="pull-right text-right"> Send inquiries to <a href="https://web.archive.org/web/20230930190518/mailto:csrc-inquiry@nist.gov?subject=CSRC Inquiry" style="display: inline-block;" id="footer-inquiries-link">csrc-inquiry@nist.gov</a> </span> </div> </div> <div class="row"> <div class="footer-bottom-links-container" id="footer-bottom-links-container"> <ul> <li><a href="https://web.archive.org/web/20230930190518/https://www.nist.gov/privacy-policy">Site Privacy</a></li> <li><a href="https://web.archive.org/web/20230930190518/https://www.nist.gov/oism/accessibility">Accessibility</a></li> <li><a href="https://web.archive.org/web/20230930190518/https://www.nist.gov/privacy">Privacy Program</a></li> <li><a href="https://web.archive.org/web/20230930190518/https://www.nist.gov/oism/copyrights">Copyrights</a></li> <li><a href="https://web.archive.org/web/20230930190518/https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a></li> <li><a href="https://web.archive.org/web/20230930190518/https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a></li> <li><a href="https://web.archive.org/web/20230930190518/https://www.nist.gov/foia">FOIA</a></li> <li><a href="https://web.archive.org/web/20230930190518/https://www.nist.gov/environmental-policy-statement">Environmental Policy</a></li> <li><a href="https://web.archive.org/web/20230930190518/https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a></li> <li><a href="https://web.archive.org/web/20230930190518/https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a></li> <li><a href="https://web.archive.org/web/20230930190518/https://www.commerce.gov/">Commerce.gov</a></li> <li><a href="https://web.archive.org/web/20230930190518/https://www.science.gov/">Science.gov</a></li> <li><a href="https://web.archive.org/web/20230930190518/https://www.usa.gov/">USA.gov</a></li> <li><a href="https://web.archive.org/web/20230930190518/https://vote.gov/">Vote.gov</a></li> </ul> </div> </div> </div> </footer> <script type="text/javascript" src="/web/20230930190518js_/https://csrc.nist.gov/dist/js/quick-collapse.js"></script> <script type="text/javascript" src="/web/20230930190518js_/https://csrc.nist.gov/dist/app.bundle.js"></script> <script type="text/javascript" src="/web/20230930190518js_/https://csrc.nist.gov/dist/topics.bundle.js"></script> </body> </html> <!-- FILE ARCHIVED ON 19:05:18 Sep 30, 2023 AND RETRIEVED FROM THE INTERNET ARCHIVE ON 08:29:48 Dec 11, 2024. JAVASCRIPT APPENDED BY WAYBACK MACHINE, COPYRIGHT INTERNET ARCHIVE. ALL OTHER CONTENT MAY ALSO BE PROTECTED BY COPYRIGHT (17 U.S.C. SECTION 108(a)(3)). --> <!-- playback timings (ms): captures_list: 0.566 exclusion.robots: 0.036 exclusion.robots.policy: 0.025 esindex: 0.01 cdx.remote: 16.928 LoadShardBlock: 186.718 (3) PetaboxLoader3.resolve: 135.847 (4) PetaboxLoader3.datanode: 93.429 (4) load_resource: 77.75 -->

Pages: 1 2 3 4 5 6 7 8 9 10