CINXE.COM
Publications | CSRC
<!DOCTYPE html> <html lang="en-us" xml:lang="en-us"> <head><script type="text/javascript" src="/_static/js/bundle-playback.js?v=HxkREWBo" charset="utf-8"></script> <script type="text/javascript" src="/_static/js/wombat.js?v=txqj7nKC" charset="utf-8"></script> <script>window.RufflePlayer=window.RufflePlayer||{};window.RufflePlayer.config={"autoplay":"on","unmuteOverlay":"hidden"};</script> <script type="text/javascript" src="/_static/js/ruffle/ruffle.js"></script> <script type="text/javascript"> __wm.init("https://web.archive.org/web"); __wm.wombat("https://csrc.nist.gov/publications","20230923045924","https://web.archive.org/","web","/_static/", "1695445164"); </script> <link rel="stylesheet" type="text/css" href="/_static/css/banner-styles.css?v=S1zqJCYt" /> <link rel="stylesheet" type="text/css" href="/_static/css/iconochive.css?v=3PDvdIFv" /> <!-- End Wayback Rewrite JS Include --> <meta charset="utf-8"/> <title>Publications | CSRC</title> <meta http-equiv="content-type" content="text/html; charset=UTF-8"/> <meta http-equiv="content-style-type" content="text/css"/> <meta http-equiv="content-script-type" content="text/javascript"/> <meta name="viewport" content="width=device-width, initial-scale=1.0"/> <meta name="msapplication-config" content="/CSRC/Media/images/favicons/browserconfig.xml"/> <meta name="theme-color" content="#000000"/> <meta name="google-site-verification" content="xbrnrVYDgLD-Bd64xHLCt4XsPXzUhQ-4lGMj4TdUUTA"/> <link rel="apple-touch-icon" sizes="180x180" href="/web/20230923045924im_/https://csrc.nist.gov/images/icons/apple-touch-icon.png"/> <link rel="icon" type="image/png" href="/web/20230923045924im_/https://csrc.nist.gov/images/icons/favicon-32x32.png" sizes="32x32"/> <link rel="icon" type="image/png" href="/web/20230923045924im_/https://csrc.nist.gov/images/icons/favicon-16x16.png" sizes="16x16"/> <link rel="manifest" href="/web/20230923045924/https://csrc.nist.gov/images/icons/manifest.json"/> <link rel="mask-icon" href="/web/20230923045924im_/https://csrc.nist.gov/images/icons/safari-pinned-tab.svg" color="#000000"/> <link href="/web/20230923045924im_/https://csrc.nist.gov/CSRC/Media/images/favicons/favicon.ico" type="image/x-icon" rel="shortcut icon"/> <link href="/web/20230923045924im_/https://csrc.nist.gov/CSRC/Media/images/favicons/favicon.ico" type="image/x-icon" rel="icon"/> <link href="/web/20230923045924cs_/https://csrc.nist.gov/dist/app.css" rel="stylesheet"/> <!-- reCAPTCHA v3 --> <style> .grecaptcha-badge { visibility: hidden; } </style> <script async type="text/javascript" id="_fed_an_ua_tag" src="https://web.archive.org/web/20230923045924js_/https://dap.digitalgov.gov/Universal-Federated-Analytics-Min.js?agency=nist&subagency=csrc&pua=UA-66610693-15&yt=true&exts=xsd,xml,wav,mpg,mpeg,avi,rtf,webm,ogg,ogv,oga,map,otf,eot,svg,ttf,woff"></script> <style id="antiClickjackCss"> body > * { display: none !important; } #antiClickjack { display: block !important; } </style> <noscript> <style id="antiClickjackNoScript"> body > * { display: block !important; } #antiClickjack { display: none !important; } </style> </noscript> <script type="text/javascript" id="antiClickjackScript"> if (self === top) { // no clickjacking var antiClickjack = document.getElementById("antiClickjackCss"); antiClickjack.parentNode.removeChild(antiClickjack); } else { setTimeout(tryForward(), 5000); } function tryForward() { top.location = self.location; } </script> <!-- Google tag (gtag.js) --> <script async src="https://web.archive.org/web/20230923045924js_/https://www.googletagmanager.com/gtag/js?id=G-TSQ0PLGJZP"></script> <script> 聽聽window.dataLayer = window.dataLayer || []; 聽聽function gtag(){dataLayer.push(arguments);} 聽聽gtag('js', new Date()); 聽聽gtag('config', 'G-TSQ0PLGJZP'); </script> </head> <body> <div id="antiClickjack" style="display: none;"> <strong style="font-size: 1.6rem;">You are viewing this page in an unauthorized frame window.</strong> <p>This is a potential security issue, you are being redirected to <a href="https://web.archive.org/web/20230923045924/https://csrc.nist.gov/">https://csrc.nist.gov</a>.</p> </div> <section class="usa-banner" aria-label="Official government website"> <div class="usa-accordion container"> <header class="usa-banner__header"> <noscript> <p style="font-size: 0.85rem; font-weight: bold;">You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.</p> </noscript> <img class="usa-banner__header-flag" src="/web/20230923045924im_/https://csrc.nist.gov/images/usbanner/us_flag_small.png" alt="U.S. flag"> <span class="usa-banner__header-text">An official website of the United States government</span> <button id="gov-banner-button" class="usa-accordion__button usa-banner__button" data-toggle="collapse" data-target="#gov-banner" aria-expanded="true" aria-controls="gov-banner"> <span class="usa-banner__button-text">Here's how you know</span> </button> </header> <div class="usa-banner__content usa-accordion__content collapse in" role="tabpanel" id="gov-banner" aria-expanded="true"> <div class="row"> <div class="col-md-5 col-sm-12"> <div class="row"> <div class="col-sm-2 col-xs-3"> <img class="usa-banner__icon usa-media-block__img" src="/web/20230923045924im_/https://csrc.nist.gov/images/usbanner/icon-dot-gov.svg" alt="Dot gov"> </div> <div class="col-sm-10 col-xs-9"> <p> <strong>Official websites use .gov</strong> <br> A <strong>.gov</strong> website belongs to an official government organization in the United States. </p> </div> </div> </div> <div class="col-md-5 col-sm-12"> <div class="row"> <div class="col-sm-2 col-xs-3"> <img class="usa-banner__icon usa-media-block__img" src="/web/20230923045924im_/https://csrc.nist.gov/images/usbanner/icon-https.svg" alt="Https"> </div> <div class="col-sm-10 col-xs-9"> <p> <strong>Secure .gov websites use HTTPS</strong> <br> A <strong>lock</strong> (<img class="usa-banner__lock" src="/web/20230923045924im_/https://csrc.nist.gov/images/usbanner/lock.svg" alt="Dot gov">) or <strong>https://</strong> means you've safely connected to the .gov website. Share sensitive information only on official, secure websites. </p> </div> </div> </div> </div> </div> </div> </section> <nav id="navbar" class="navbar"> <div id="nist-menu-container" class="container"> <div class="row"> <!-- Brand --> <div class="col-xs-6 col-md-4 navbar-header"> <a class="navbar-brand" href="https://web.archive.org/web/20230923045924/https://www.nist.gov/" target="_blank" id="navbar-brand-image"> <img src="/web/20230923045924im_/https://csrc.nist.gov/CSRC/media/images/svg/nist-logo.svg" alt="National Institute of Standards and Technology" width="110" height="30"> </a> </div> <div class="col-xs-6 col-md-8 navbar-nist-logo"> <div class="form-inline hidden-sm hidden-xs"> <form name="site-search" id="site-search-form" action="/web/20230923045924/https://csrc.nist.gov/search" method="GET"> <label for="search-csrc-query" class="element-invisible">Search</label> <input autocomplete="off" class="form-control" id="search-csrc-query" name="keywords" type="text" size="15" maxlength="128" placeholder="Search CSRC"/> <input type="hidden" name="ipp" value="25"/> <input type="hidden" name="sortBy" value="relevance"/> <input type="hidden" name="showOnly" value="publications,projects,news,events,presentations,glossary,topics"/> <input type="hidden" name="topicsMatch" value="ANY"/> <input type="hidden" name="status" value="Final,Draft"/> <button type="submit" id="search-csrc-submit-btn" class="form-submit"> <span class="element-invisible">Search</span> <i class="fa fa-search"></i> </button> </form> </div> <span id="nvd-menu-button" class="pull-right"> <a href="#" id="nvd-menu-button-link"> <span class="fa fa-bars"></span> <span id="nvd-menu-full-text">CSRC MENU</span> </a> </span> </div> </div> </div> <div class="form-inline hidden-md hidden-lg"> <form name="site-search-mobile" id="site-search-form-mobile" action="/web/20230923045924/https://csrc.nist.gov/search" method="GET"> <label for="search-csrc-query-mobile" class="element-invisible">Search</label> <input autocomplete="off" class="form-control" id="search-csrc-query-mobile" name="keywords" type="text" size="15" maxlength="128" placeholder="Search CSRC"/> <button type="submit" id="search-csrc-submit-btn-mobile" class="form-submit"> <span class="element-invisible">Search</span> <i class="fa fa-search"></i> </button> </form> </div> <div class="main-menu-row container"> <!-- Collect the nav links, forms, and other content for toggling --> <div id="main-menu-drop" class="col-lg-12" style="display: none;"> <ul> <li><a href="/web/20230923045924/https://csrc.nist.gov/projects">Projects</a></li> <li> <a href="/web/20230923045924/https://csrc.nist.gov/publications"> Publications <span class="expander fa fa-plus" id="main-menu-pubs-expander" data-expander-name="publications" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="publications" id="main-menu-pubs-expanded"> <div class="row"> <div class="col-lg-4"> <p><a href="/web/20230923045924/https://csrc.nist.gov/publications/drafts-open-for-comment">Drafts for Public Comment</a></p> <p><a href="/web/20230923045924/https://csrc.nist.gov/publications/draft-pubs">All Public Drafts</a></p> <p><a href="/web/20230923045924/https://csrc.nist.gov/publications/final-pubs">Final Pubs</a></p> <p><a href="/web/20230923045924/https://csrc.nist.gov/publications/fips">FIPS <small>(standards)</small></a></p> </div> <div class="col-lg-4"> <p><a href="/web/20230923045924/https://csrc.nist.gov/publications/sp">Special Publications (SP<small>s</small>)</a></p> <p><a href="/web/20230923045924/https://csrc.nist.gov/publications/ir">IR <small>(interagency/internal reports)</small></a></p> <p><a href="/web/20230923045924/https://csrc.nist.gov/publications/cswp">CSWP <small>(cybersecurity white papers)</small></a></p> <p><a href="/web/20230923045924/https://csrc.nist.gov/publications/itl-bulletin">ITL Bulletins</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20230923045924/https://csrc.nist.gov/publications/project-description">Project Descriptions</a></p> <p><a href="/web/20230923045924/https://csrc.nist.gov/publications/journal-article">Journal Articles</a></p> <p><a href="/web/20230923045924/https://csrc.nist.gov/publications/conference-paper">Conference Papers</a></p> <p><a href="/web/20230923045924/https://csrc.nist.gov/publications/book">Books</a></p> </div> </div> </div> </li> <li> <a href="/web/20230923045924/https://csrc.nist.gov/topics"> Topics <span class="expander fa fa-plus" id="main-menu-topics-expander" data-expander-name="topics" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="topics" id="main-menu-topics-expanded"> <div class="row"> <div class="col-lg-4"> <p><a href="/web/20230923045924/https://csrc.nist.gov/Topics/Security-and-Privacy">Security & Privacy</a></p> <p><a href="/web/20230923045924/https://csrc.nist.gov/Topics/Applications">Applications</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20230923045924/https://csrc.nist.gov/Topics/Technologies">Technologies</a></p> <p><a href="/web/20230923045924/https://csrc.nist.gov/Topics/Sectors">Sectors</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20230923045924/https://csrc.nist.gov/Topics/Laws-and-Regulations">Laws & Regulations</a></p> <p><a href="/web/20230923045924/https://csrc.nist.gov/Topics/Activities-and-Products">Activities & Products</a></p> </div> </div> </div> </li> <li><a href="/web/20230923045924/https://csrc.nist.gov/news">News & Updates</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/events">Events</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/glossary">Glossary</a></li> <li> <a href="/web/20230923045924/https://csrc.nist.gov/about"> About CSRC <span class="expander fa fa-plus" id="main-menu-about-expander" data-expander-name="about" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="about" id="main-menu-about-expanded"> <div class="row"> <div class="col-lg-6"> <p> <strong><a href="/web/20230923045924/https://csrc.nist.gov/Groups/Computer-Security-Division">Computer Security Division</a></strong><br/> <ul> <li><a href="/web/20230923045924/https://csrc.nist.gov/Groups/Computer-Security-Division/Cryptographic-Technology">Cryptographic Technology</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/Groups/Computer-Security-Division/Secure-Systems-and-Applications">Secure Systems and Applications</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Components-and-Mechanisms">Security Components and Mechanisms</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Engineering-and-Risk-Management">Security Engineering and Risk Management</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Testing-Validation-and-Measurement">Security Testing, Validation, and Measurement</a></li> </ul> </p> </div> <div class="col-lg-6"> <p> <strong><a href="/web/20230923045924/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division">Applied Cybersecurity Division</a></strong><br/> <ul> <li><a href="/web/20230923045924/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division/Cybersecurity-and-Privacy-Applications">Cybersecurity and Privacy Applications</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division/National-Cybersecurity-Center-of-Excellence">National Cybersecurity Center of Excellence (NCCoE)</a></li> <li><a href="https://web.archive.org/web/20230923045924/https://www.nist.gov/nice/">National Initiative for Cybersecurity Education (NICE)</a></li> </ul> </p> <p> <a href="/web/20230923045924/https://csrc.nist.gov/contact"> Contact Us </a> </p> </div> </div> </div> </li> </ul> </div><!-- /#mobile-nav-container --> </div> </nav> <section id="itl-header" class="has-menu"> <div class="container"> <div class="row"> <div class="col-sm-12 col-md-8"> <div class="hidden-xs hidden-sm" id="itl-header-lg"> <a href="https://web.archive.org/web/20230923045924/https://www.nist.gov/itl" target="_blank" id="itl-header-link">Information Technology Laboratory</a> </div> <div class="hidden-xs hidden-sm" id="csrc-header-lg"> <a href="/web/20230923045924/https://csrc.nist.gov/" id="csrc-header-link-lg">Computer Security Resource Center</a> </div> </div> <div class="col-sm-12 col-md-4"> <div class="hidden-xs hidden-sm hidden-md"> <a id="logo-csrc-lg" href="/web/20230923045924/https://csrc.nist.gov/"><img id="img-logo-csrc-lg" src="/web/20230923045924im_/https://csrc.nist.gov/CSRC/Media/images/nist-logo-csrc-white.svg" alt="CSRC Logo" class="csrc-header-logo"></a> </div> <div class="hidden-lg"> <a id="logo-csrc-sm" href="/web/20230923045924/https://csrc.nist.gov/"><img id="img-logo-csrc-sm" src="/web/20230923045924im_/https://csrc.nist.gov/CSRC/Media/images/nist-logo-csrc-white.svg" alt="CSRC Logo" class="csrc-header-logo"></a> </div> </div> </div> </div> </section> <div id="body-section" class="container"> <div class="publications-content"> <div class="row"> <div class="col-lg-3 col-md-4 hidden-sm hidden-xs hidden-xxs"> <ul class="side-nav" id="left-side-navigation"> <li><a href="/web/20230923045924/https://csrc.nist.gov/projects">Projects</a></li> <li> <a href="/web/20230923045924/https://csrc.nist.gov/publications"> Publications <span class="expander fa fa-plus" id="side-menu-pubs-expander" data-expander-name="publicationsSide" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="publicationsSide" id="side-menu-pubs-expanded"> <ul> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/drafts-open-for-comment">Drafts for Public Comment</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/draft-pubs">All Public Drafts</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/sp">NIST Special Publications (SPs)</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/fips">FIPS</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/nistir">NIST interagency/internal reports (NISTIRs)</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/itl-bulletin">ITL Bulletins</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/white-paper">White Papers</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/journal-article">Journal Articles</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/conference-paper">Conference Papers</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/book">Books</a></li> </ul> </div> </li> <li> <a href="/web/20230923045924/https://csrc.nist.gov/topics"> Topics <span class="expander fa fa-plus" id="side-menu-topics-expander" data-expander-name="topicsSide" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="topicsSide" id="side-menu-topics-expanded"> <ul> <li><a href="/web/20230923045924/https://csrc.nist.gov/Topics/Security-and-Privacy">Security & Privacy</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/Topics/Applications">Applications</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/Topics/Technologies">Technologies</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/Topics/Sectors">Sectors</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/Topics/Laws-and-Regulations">Laws & Regulations</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/Topics/Activities-and-Products">Activities & Products</a></li> </ul> </div> </li> <li><a href="/web/20230923045924/https://csrc.nist.gov/news">News & Updates</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/events">Events</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/glossary">Glossary</a></li> <li> <a href="/web/20230923045924/https://csrc.nist.gov/about"> About CSRC <span class="expander fa fa-plus" id="side-menu-about-expander" data-expander-name="aboutSide" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="aboutSide" id="side-menu-about-expanded"> <strong><a href="/web/20230923045924/https://csrc.nist.gov/Groups/Computer-Security-Division">Computer Security Division</a></strong><br/> <ul> <li><a href="/web/20230923045924/https://csrc.nist.gov/Groups/Computer-Security-Division/Cryptographic-Technology">Cryptographic Technology</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/Groups/Computer-Security-Division/Secure-Systems-and-Applications">Secure Systems and Applications</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Components-and-Mechanisms">Security Components and Mechanisms</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Engineering-and-Risk-Management">Security Engineering and Risk Management</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Testing-Validation-and-Measurement">Security Testing, Validation, and Measurement</a></li> </ul> <strong><a href="/web/20230923045924/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division">Applied Cybersecurity Division</a></strong><br/> <ul> <li><a href="/web/20230923045924/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division/Cybersecurity-and-Privacy-Applications">Cybersecurity and Privacy Applications</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division/National-Cybersecurity-Center-of-Excellence">National Cybersecurity Center of Excellence (NCCoE)</a></li> <li><a href="https://web.archive.org/web/20230923045924/https://www.nist.gov/nice/">National Initiative for Cybersecurity Education (NICE)</a></li> </ul> <strong><a href="/web/20230923045924/https://csrc.nist.gov/contact-us">Contact Us</a></strong> </div> </li> </ul> <div id="publications-quicklinks-lg" class="bs-callout bs-callout-subnav hidden-sm hidden-xs hidden-xxs"> <h4>Current Publications <i class="fa fa-bolt"></i></h4> <ul> <li> <strong> NIST Series Pubs <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-series-pubs-tooltip"></i> </strong> <ul> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/final-pubs" id="quick-link-final-lg">Final Pubs</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/drafts-open-for-comment" id="quick-links-comments-lg">Drafts Open for Comment</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/draft-pubs" id="quick-link-draft-lg">Drafts</a> (all)</li> <li> <strong> View By Series <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-view-series-pubs-tooltip"></i> </strong> <ul> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/fips" id="quick-link-fips-lg">FIPS</a> (standards)</li> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/sp800" id="quick-link-sp-800-lg">SP 800</a> (guidance)</li> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/sp1800" id="quick-link-sp-1800-lg">SP 1800</a> (practice guides)</li> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/sp" id="quick-link-sp-lg">SP</a> (all subseries)</li> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/ir" id="quick-link-nistir-lg">IR</a> (interagency/internal reports)</li> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/cswp" id="quick-link-white-papers-lg">CSWP</a> (cybersecurity white papers)</li> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/itl-bulletin" id="quick-link-itl-bul-lg">ITL Bulletins</a></li> </ul> </li> </ul> </li> <li> <strong> Other Pubs <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-other-pubs-tooltip"></i> </strong> <ul> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/project-description" id="quick-link-project-description-lg">Project Descriptions</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/journal-article" id="quick-link-journal-articles-lg">Journal Articles</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/conference-paper" id="quick-link-conference-papers-lg">Conference Papers</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/book" id="quick-link-books-lg">Books</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/other" id="quick-link-other-lg">Other</a></li> </ul> </li> </ul> <span style="display: none;" id="nist-series-pubs-tooltip"> <strong>Final:</strong> <em>Current list of all published NIST cybersecurity documents.</em> Does not include "Withdrawn" documents. Includes FIPS, Special Publications, NISTIRs, ITL Bulletins, and NIST Cybersecurity White Papers.<br/> <br/> <strong>Public Drafts:</strong> <em>Current list of all draft NIST cybersecurity documents--they are typically posted for public comment.</em> "Current" public drafts are the latest draft versions that have not yet been published as "Final." </span> <span style="display: none;" id="nist-view-series-pubs-tooltip"> <strong>FIPS:</strong> <em>Current Federal Information Processing Standard Publications (FIPS).</em> Includes current (Final and Draft) FIPS.<br/> <br/> <strong>SP 800 Series:</strong> <em>Current NIST Special Publication (SP) 800 series publications, which focus on Computer/Information Security.</em> Includes current (Final and Draft) SP 800 pubs.<br/> <br/> <strong>All SP Series:</strong> <em> Current NIST Special Publications (SP), including SP 800 (Computer/Information Security) and SP 1800 (Cybersecurity Practice Guides) pubs. Also includes SP 500 (Computer Systems Technology) pubs related to cybersecurity and privacy. </em> Includes current (Final and Draft) NIST Special Publications.<br/> <br/> <strong>NISTIRs:</strong> <em>Current list of NIST Interagency or Internal Reports (NISTIR) related to cybersecurity and privacy.</em> Includes current (Final and Draft) NISTIRs.<br/> <br/> <strong>ITL Bulletins:</strong> Current list of NIST Information Technology Laboratory (ITL) Bulletins. </span> <span style="display: none;" id="nist-other-pubs-tooltip"> <strong>White Papers:</strong> <em> Consists of NIST Cybersecurity White Papers; NCCoE Project Descriptions, Building Blocks and Use Cases; and other NIST-authored papers that are not part of a formal series. </em> Includes current (Final and Draft) papers.<br/> <br/> <strong>Journal Articles:</strong> NIST-authored articles published in external journals and in the NIST Journal of Research (JRES).<br/> <br/> <strong>Conference Papers:</strong> NIST-authored conference papers related to cybersecurity and privacy.<br/> <br/> <strong>Books:</strong> NIST-authored books, book sections, and encyclopedia entries related to cybersecurity and privacy. </span> </div> <form action="/web/20230923045924/https://csrc.nist.gov/publications/search" class="bs-callout bs-callout-success csrc-search-form hidden-sm hidden-xs hidden-xxs" data-csrc-form="true" data-default-query="sortBy-lg=releasedate+DESC&viewMode-lg=brief&ipp-lg=25&status-lg=Final%2CDraft&topicsMatch-lg=ANY&controlsMatch-lg=ANY" data-form-ignore-default="sortBy" data-form-name="pubSearchDesktop" id="pubs-search-form-lg" method="get"> <div class="form-group"> <label for="keywords-lg">Search</label> <input name="keywords-lg" class="form-control" data-val="true" data-val-length="The field Search must be a string with a maximum length of 255." data-val-length-max="255" id="keywords-lg" name="Form.Keywords" type="text" value=""/> <em class="text-muted">Search publication record data<br/> (not a full text search)</em> </div> <div class="form-group"> <label for="sortBy-lg">Sort By</label> <div class="form-inline"> <select name="sortBy-lg" class="form-control" id="sortBy-lg" name="Form.SortBy"><option selected="selected" value="relevance">Relevance (best match)</option> <option value="releasedate DESC">Release Date (newest first)</option> <option value="releasedate ASC">Release Date (oldest first)</option> <option value="Series ASC">Series (A-Z)</option> <option value="Series DESC">Series (Z-A)</option> <option value="Number ASC">Number (lowest to highest)</option> <option value="Number DESC">Number (highest to lowest)</option> <option value="title asc">Title (A-Z)</option> <option value="title desc">Title (Z-A)</option> </select> </div> </div> <div class="form-group"> <label for="viewMode-lg">Results View</label> <select name="viewMode-lg" class="form-control" id="viewMode-lg" name="Form.ResultsViewMode"><option selected="selected" value="brief">Brief</option> <option value="summary">Summary</option> </select> </div> <div class="form-group form-inline"> <label for="ipp-lg" class="form-control-half">Items Per Page</label> <select name="ipp-lg" class="form-control" id="ipp-lg" name="Form.ItemsPerPage"><option selected="selected" value="50">50</option> <option value="75">75</option> <option value="100">100</option> <option value="all">All</option> </select> </div> <div class="form-group"> <label for="dateFrom-lg">Date</label> <div class="form-inline form-date-inline"> <div class="input-group date" data-date-picker="true"> <input name="dateFrom-lg" class="form-control" data-control-type="date" data-val="true" data-val-date="The field Date must be a date." data-validation="true" data-validation-compare-field="dateTo-lg" data-validation-message="From date must be less than To date" data-validation-type="less-than-date" id="dateFrom-lg" name="Form.DateFrom" placeholder=" / / " type="text" value=""/> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> <div class="input-group date" data-date-picker="true"> <input name="dateTo-lg" class="form-control" data-control-type="date" data-val="true" data-val-date="The field DateTo must be a date." id="dateTo-lg" name="Form.DateTo" placeholder=" / / " type="text" value=""/> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> </div> </div> <div class="form-group"> <label for="status-all-lg"> Status <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="publications-status-info"></i> </label> <div class="form-inline status-type" style="margin-left: 1rem;"> <label class="meta-label"> <input type="checkbox" id="status-final-lg" name="status-lg" value="Final" data-default-checked="True"/> Final<br/> </label> <label class="meta-label"> <input type="checkbox" id="status-draft-lg" name="status-lg" value="Draft" data-default-checked="True"/> Public Draft<br/> </label> <label class="meta-label"> <input type="checkbox" id="status-withdrawn-lg" name="status-lg" value="Withdrawn" data-default-checked="True"/> Withdrawn<br/> </label> </div> </div> <div class="form-group"> <label for="pub-search-series"> Series <button type="button" id="series-all-lg" class="btn btn-sm btn-success" data-check-all="series-lg">Check All</button> <button type="button" id="series-clear-lg" class="btn btn-sm btn-success" data-check-none="series-lg">Clear</button> </label> <div class="form-inline series-type" style="margin-left: 1rem;"> <label class="meta-label"> <input type="checkbox" id="series-b2b6ef80-0dec-4d48-ae2d-a37ab486a846-lg" name="series-lg" value="FIPS" data-default-checked="True"/> FIPS<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-749c7275-15f5-4eec-8cb9-3b6f1528756c-lg" name="series-lg" value="SP" data-default-checked="True"/> SP<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-344a35c7-520e-4845-88b0-6997147ffc76-lg" name="series-lg" value="IR" data-default-checked="True"/> IR<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-5f83968e-4758-479d-9aa4-1d42166b7deb-lg" name="series-lg" value="CSWP" data-default-checked="True"/> CSWP<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-b2004197-4249-454a-bdce-edc6186b5c60-lg" name="series-lg" value="TN" data-default-checked="True"/> TN<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-09acb409-e18b-4a05-ac84-631662bcccd9-lg" name="series-lg" value="VTS" data-default-checked="True"/> VTS<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-8022364e-73db-4498-b2eb-9317ce32fff2-lg" name="series-lg" value="AI" data-default-checked="True"/> AI<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-57afe5d0-383f-4fd6-b702-84233dcd5f13-lg" name="series-lg" value="GCR" data-default-checked="True"/> GCR<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-23801152-858e-4dbc-baad-eb51795cf0e2-lg" name="series-lg" value="Project Description" data-default-checked="True"/> Project Description<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-8c9f1828-ae8a-4f03-8d9f-9ff7192b508e-lg" name="series-lg" value="ITL Bulletin" data-default-checked="True"/> ITL Bulletin<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-debd6afb-aeaa-4790-a32b-c977c9654df0-lg" name="series-lg" value="Journal Article" data-default-checked="True"/> Journal Article<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-ed478237-d49d-41c6-91ed-5dd341bd50c8-lg" name="series-lg" value="Conference Paper" data-default-checked="True"/> Conference Paper<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-f2273ac7-d756-4cce-b006-a527778c84f0-lg" name="series-lg" value="Book" data-default-checked="True"/> Book<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-80e369a4-bea5-46f5-8082-91f19c3eeefa-lg" name="series-lg" value="Book Section" data-default-checked="True"/> Book Section<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-b1570e28-332c-4f29-a1e0-cd31c3930848-lg" name="series-lg" value="Other" data-default-checked="True"/> Other<br/> </label> </div> </div> <div class="form-group"> <label for="pub-search-topics-lg"> Topics </label> <input name="topics-lg" id="topics-lg" name="Form.Topics" type="hidden" value=""/> <div class="form-control topics-selection" id="pub-search-topics-lg" contenteditable="true" data-drop-target="pub-search-topics-drop-lg" data-field-name="topics-lg" aria-haspopup="true"> </div> <div class="topics-selection-dropdown desktop" id="pub-search-topics-drop-lg" style="display: none;" data-topics-selector=""><div class="col-sm-4"><strong>Security and Privacy</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24670-27481" data-expander-for="/topics/security-and-privacy/cryptography"></i> <a data-topic-id="27481" data-topic-text="cryptography">cryptography</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27647" data-topic-text="digital signatures">digital signatures</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27648" data-topic-text="encryption">encryption</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27649" data-topic-text="key management">key management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="30027" data-topic-text="lightweight cryptography">lightweight cryptography</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27650" data-topic-text="message authentication">message authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27651" data-topic-text="post-quantum cryptography">post-quantum cryptography</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27652" data-topic-text="random number generation">random number generation</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27653" data-topic-text="secure hashing">secure hashing</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27482" data-topic-text="cybersecurity supply chain risk management">cybersecurity supply chain risk management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27483" data-topic-text="general security & privacy">general security & privacy</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24670-27484" data-expander-for="/topics/security-and-privacy/identity-and-access-management"></i> <a data-topic-id="27484" data-topic-text="identity & access management">identity & access management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27663" data-topic-text="access authorization">access authorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27664" data-topic-text="access control">access control</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27665" data-topic-text="authentication">authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27666" data-topic-text="Personal Identity Verification">Personal Identity Verification</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27667" data-topic-text="public key infrastructure">public key infrastructure</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24670-27485" data-expander-for="/topics/security-and-privacy/privacy"></i> <a data-topic-id="27485" data-topic-text="privacy">privacy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27680" data-topic-text="personally identifiable information">personally identifiable information</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27681" data-topic-text="privacy engineering">privacy engineering</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24670-27486" data-expander-for="/topics/security-and-privacy/risk-management"></i> <a data-topic-id="27486" data-topic-text="risk management">risk management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27682" data-topic-text="categorization">categorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27683" data-topic-text="continuous monitoring">continuous monitoring</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-27486-27684" data-expander-for="/topics/security-and-privacy/risk-management/controls"></i> <a data-topic-id="27684" data-topic-text="controls">controls</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27767" data-topic-text="controls assessment">controls assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27768" data-topic-text="privacy controls">privacy controls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27769" data-topic-text="security controls">security controls</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27685" data-topic-text="risk assessment">risk assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27686" data-topic-text="roots of trust">roots of trust</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27687" data-topic-text="system authorization">system authorization</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-27486-27688" data-expander-for="/topics/security-and-privacy/risk-management/threats"></i> <a data-topic-id="27688" data-topic-text="threats">threats</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27770" data-topic-text="advanced persistent threats">advanced persistent threats</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27771" data-topic-text="botnets">botnets</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27772" data-topic-text="information sharing">information sharing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27773" data-topic-text="intrusion detection & prevention">intrusion detection & prevention</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27774" data-topic-text="malware">malware</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27689" data-topic-text="vulnerability management">vulnerability management</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24670-27487" data-expander-for="/topics/security-and-privacy/security-and-behavior"></i> <a data-topic-id="27487" data-topic-text="security & behavior">security & behavior</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27709" data-topic-text="accessibility">accessibility</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27710" data-topic-text="behavior">behavior</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27711" data-topic-text="usability">usability</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24670-27488" data-expander-for="/topics/security-and-privacy/security-measurement"></i> <a data-topic-id="27488" data-topic-text="security measurement">security measurement</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27690" data-topic-text="analytics">analytics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27691" data-topic-text="assurance">assurance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27692" data-topic-text="modeling">modeling</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27693" data-topic-text="testing & validation">testing & validation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24670-27489" data-expander-for="/topics/security-and-privacy/security-programs-and-operations"></i> <a data-topic-id="27489" data-topic-text="security programs & operations">security programs & operations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27694" data-topic-text="acquisition">acquisition</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27695" data-topic-text="asset management">asset management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27696" data-topic-text="audit & accountability">audit & accountability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27697" data-topic-text="awareness training & education">awareness training & education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27698" data-topic-text="configuration management">configuration management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27699" data-topic-text="contingency planning">contingency planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27700" data-topic-text="incident response">incident response</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27701" data-topic-text="maintenance">maintenance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27702" data-topic-text="media protection">media protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27703" data-topic-text="patch management">patch management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27704" data-topic-text="personnel security">personnel security</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27705" data-topic-text="physical & environmental protection">physical & environmental protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27706" data-topic-text="planning">planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27707" data-topic-text="program management">program management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27708" data-topic-text="security automation">security automation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24670-27490" data-expander-for="/topics/security-and-privacy/systems-security-engineering"></i> <a data-topic-id="27490" data-topic-text="systems security engineering">systems security engineering</a><ul style="display: none;"><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-27490-27713" data-expander-for="/topics/security-and-privacy/systems-security-engineering/trustworthiness"></i> <a data-topic-id="27713" data-topic-text="trustworthiness">trustworthiness</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27775" data-topic-text="reliability">reliability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27776" data-topic-text="resilience">resilience</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27777" data-topic-text="safety">safety</a></li></ul> </li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="28469" data-topic-text="zero trust">zero trust</a></li></ul><strong>Technologies</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27491" data-topic-text="artificial intelligence">artificial intelligence</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27492" data-topic-text="big data">big data</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27493" data-topic-text="biometrics">biometrics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27494" data-topic-text="blockchain">blockchain</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27495" data-topic-text="cloud & virtualization">cloud & virtualization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27496" data-topic-text="combinatorial testing">combinatorial testing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27497" data-topic-text="complexity">complexity</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24671-27499" data-expander-for="/topics/technologies/hardware"></i> <a data-topic-id="27499" data-topic-text="hardware">hardware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27714" data-topic-text="circuits">circuits</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27715" data-topic-text="personal computers">personal computers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27716" data-topic-text="sensors">sensors</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27498" data-topic-text="mobile">mobile</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24671-27500" data-expander-for="/topics/technologies/networks"></i> <a data-topic-id="27500" data-topic-text="networks">networks</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27717" data-topic-text="email">email</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27718" data-topic-text="firewalls">firewalls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27719" data-topic-text="internet">internet</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27501" data-topic-text="quantum information science">quantum information science</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27502" data-topic-text="servers">servers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27503" data-topic-text="smart cards">smart cards</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24671-27504" data-expander-for="/topics/technologies/software-firmware"></i> <a data-topic-id="27504" data-topic-text="software & firmware">software & firmware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27720" data-topic-text="BIOS">BIOS</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27721" data-topic-text="databases">databases</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27722" data-topic-text="operating systems">operating systems</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27505" data-topic-text="storage">storage</a></li></ul></div><div class="col-sm-4"><strong>Applications</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27456" data-topic-text="communications & wireless">communications & wireless</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27457" data-topic-text="cyber-physical systems">cyber-physical systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27458" data-topic-text="cybersecurity education">cybersecurity education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27459" data-topic-text="cybersecurity framework">cybersecurity framework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27460" data-topic-text="cybersecurity workforce">cybersecurity workforce</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27461" data-topic-text="enterprise">enterprise</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27462" data-topic-text="forensics">forensics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27463" data-topic-text="industrial control systems">industrial control systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27464" data-topic-text="Internet of Things">Internet of Things</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="29979" data-topic-text="mathematics">mathematics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27920" data-topic-text="positioning navigation & timing">positioning navigation & timing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27465" data-topic-text="small & medium business">small & medium business</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27466" data-topic-text="telework">telework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27467" data-topic-text="voting">voting</a></li></ul><strong>Laws and Regulations</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24673-27468" data-expander-for="/topics/laws-and-regulations/executive-documents"></i> <a data-topic-id="27468" data-topic-text="executive documents">executive documents</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27668" data-topic-text="Comprehensive National Cybersecurity Initiative">Comprehensive National Cybersecurity Initiative</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27669" data-topic-text="Cybersecurity Strategy and Implementation Plan">Cybersecurity Strategy and Implementation Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27670" data-topic-text="Cyberspace Policy Review">Cyberspace Policy Review</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27671" data-topic-text="Executive Order 13636">Executive Order 13636</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27672" data-topic-text="Executive Order 13702">Executive Order 13702</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27673" data-topic-text="Executive Order 13718">Executive Order 13718</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27674" data-topic-text="Executive Order 13800">Executive Order 13800</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27921" data-topic-text="Executive Order 13905">Executive Order 13905</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28468" data-topic-text="Executive Order 14028">Executive Order 14028</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27675" data-topic-text="Federal Cybersecurity Research and Development Strategic Plan">Federal Cybersecurity Research and Development Strategic Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27676" data-topic-text="Homeland Security Presidential Directive 7">Homeland Security Presidential Directive 7</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27677" data-topic-text="Homeland Security Presidential Directive 12">Homeland Security Presidential Directive 12</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27678" data-topic-text="OMB Circular A-11">OMB Circular A-11</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27679" data-topic-text="OMB Circular A-130">OMB Circular A-130</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24673-27469" data-expander-for="/topics/laws-and-regulations/laws"></i> <a data-topic-id="27469" data-topic-text="laws">laws</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="35986" data-topic-text="CHIPS and Science Act">CHIPS and Science Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27654" data-topic-text="Cyber Security R&D Act">Cyber Security R&D; Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27655" data-topic-text="Cybersecurity Enhancement Act">Cybersecurity Enhancement Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27656" data-topic-text="E-Government Act">E-Government Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27657" data-topic-text="Energy Independence and Security Act">Energy Independence and Security Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27658" data-topic-text="Federal Information Security Modernization Act">Federal Information Security Modernization Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27659" data-topic-text="First Responder Network Authority">First Responder Network Authority</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27660" data-topic-text="Health Insurance Portability and Accountability Act">Health Insurance Portability and Accountability Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27661" data-topic-text="Help America Vote Act">Help America Vote Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28580" data-topic-text="Internet of Things Cybersecurity Improvement Act">Internet of Things Cybersecurity Improvement Act</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24673-27470" data-expander-for="/topics/laws-and-regulations/regulations"></i> <a data-topic-id="27470" data-topic-text="regulations">regulations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27662" data-topic-text="Federal Acquisition Regulation">Federal Acquisition Regulation</a></li></ul> </li></ul></div><div class="col-sm-4"><strong>Activities and Products</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27452" data-topic-text="annual reports">annual reports</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27453" data-topic-text="conferences & workshops">conferences & workshops</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="30210" data-topic-text="groups">groups</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27454" data-topic-text="reference materials">reference materials</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27455" data-topic-text="standards development">standards development</a></li></ul><strong>Sectors</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27471" data-topic-text="aerospace">aerospace</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24675-27472" data-expander-for="/topics/sectors/energy"></i> <a data-topic-id="27472" data-topic-text="energy">energy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27712" data-topic-text="smart grid">smart grid</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27473" data-topic-text="financial services">financial services</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27474" data-topic-text="healthcare">healthcare</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27475" data-topic-text="hospitality">hospitality</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27476" data-topic-text="manufacturing">manufacturing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27477" data-topic-text="public safety">public safety</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27478" data-topic-text="retail">retail</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27479" data-topic-text="telecommunications">telecommunications</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27480" data-topic-text="transportation">transportation</a></li></ul></div></div> <div class="form-inline topics-type"> <label class="radio-label">Match ANY: <input name="topicsMatch-lg" checked="checked" id="topicsMatch-any-lg" name="Form.TopicsMatch" type="radio" value="ANY"/></label> <label class="radio-label">Match ALL: <input name="topicsMatch-lg" id="topicsMatch-all-lg" name="Form.TopicsMatch" type="radio" value="ALL"/></label> </div> </div> <div class="form-group"> <label for="pub-search-controls-lg"> Control Family (800-53) </label> <input name="controls-lg" id="controls-lg" name="Form.Controls" type="hidden" value=""/> <div class="form-control controls-selection" id="pub-search-controls-lg" contenteditable="true" data-drop-target="pub-search-controls-drop-lg" data-field-name="controls-lg" aria-haspopup="true"> </div> <div class="controls-selection-dropdown desktop" id="pub-search-controls-drop-lg" style="display: none;" data-controls-selector=""> <strong>Control Families</strong> <ul> <li><a data-control-id="2049a555-9a3e-4395-88bc-8304c6d9b157">AC - Access Control</a></li> <li><a data-control-id="bb24a9c9-944e-41fc-b6a9-7c4217e054df">AT - Awareness and Training</a></li> <li><a data-control-id="b491696a-7f6b-4b1e-9145-b02938d9c279">AU - Audit and Accountability</a></li> <li><a data-control-id="27484ffc-ac08-40b0-8862-4be4154560e4">CA - Assessment, Authorization and Monitoring</a></li> <li><a data-control-id="b8b9a292-32ad-4698-abad-45c70b40757d">CM - Configuration Management</a></li> <li><a data-control-id="5604c7e8-b158-48c6-a497-c5357a43e7c2">CP - Contingency Planning</a></li> <li><a data-control-id="2b79dd04-6118-44ee-b54d-854948a5b55f">IA - Identification and Authentication</a></li> <li><a data-control-id="b6c1c9c0-3cf8-46c9-b2ae-4cd608f88b11">IR - Incident Response</a></li> <li><a data-control-id="c8219b58-a95d-4882-8e74-0c19369aceb6">MA - Maintenance</a></li> <li><a data-control-id="84b5d6fa-8fbc-4d32-b559-47a626a510b3">MP - Media Protection</a></li> <li><a data-control-id="f3703fe4-b51d-4139-98eb-1656b00fc4ed">PE - Physical and Environmental Protection</a></li> <li><a data-control-id="137c4d9f-6541-4431-bb88-d0d003ce039f">PL - Planning</a></li> <li><a data-control-id="6401481d-3689-49bb-840c-73256cfb102e">PM - Program Management</a></li> <li><a data-control-id="408d8a82-1783-414d-a303-d79525c87f6a">PS - Personnel Security</a></li> <li><a data-control-id="9f34a4cb-3ba3-49e1-8c5c-5aa38c2151e7">PT - PII Processing and Transparency</a></li> <li><a data-control-id="1d0ff39c-a0ed-408e-8251-fbcd24dc74eb">RA - Risk Assessment</a></li> <li><a data-control-id="d1d6d136-ad89-4ab2-9207-6bec08ef6299">SA - System and Services Acquisition</a></li> <li><a data-control-id="2067a45e-da04-471b-95ad-d0882d74ccaf">SC - System and Communications Protection</a></li> <li><a data-control-id="1d78556b-00f2-47e7-992a-9d8fb08bda2a">SI - System and Information Integrity</a></li> <li><a data-control-id="6a7ab58f-e8ef-4264-aad0-29c656a03c59">SR - Supply Chain Risk Management</a></li> </ul> </div> <div class="form-inline controls-type"> <label class="radio-label">Match ANY: <input name="controlsMatch-lg" checked="checked" id="controlsMatch-any-lg" name="Form.ControlsMatch" type="radio" value="ANY"/></label> <label class="radio-label">Match ALL: <input name="controlsMatch-lg" id="controlsMatch-all-lg" name="Form.ControlsMatch" type="radio" value="ALL"/></label> </div> </div> <div style="display: none;" data-form-error-pane="true" class="text-danger"> <strong class="text-danger">Please fix the following:</strong> <ul data-form-error-list="true"> </ul> <div class="validation-summary-valid" data-valmsg-summary="true"><ul><li style="display:none"></li> </ul></div> </div> <div class="form-group"> <button type="submit" id="pubs-search-submit-lg" name="submit-btn" data-form-button="submit" class="btn">Search</button> <button type="reset" id="pubs-search-reset-lg" name="reset-btn" data-form-button="reset" class="btn">Reset</button> </div> <span style="display: none;" id="publications-status-info"> <p><strong>Final:</strong> Published documents.</p> <p><strong>Public Draft:</strong> Documents have been posted as Public Drafts, typically with a public comment period.</p> <p> <strong>Withdrawn:</strong> Documents that have been withdrawn, and are no longer current. This includes:<br/> - Final publications that have been withdrawn;<br/> - Public drafts that have been obsoleted by a subsequent draft or final publication;<br/> - Public drafts that have been retired鈥攆urther development was discontinued. </p> </span> </form> </div> <div class="col-lg-9 col-md-8 col-sm-12 col-xs-12 col-xxs-12"> <h1>Publications</h1> <content><webpart id="editabletext;a35c0574-6d33-4b9d-9777-51d5a407e37d"> <p><a class="btn btn-lg btn-info" href="#recent-pubs-title">Recent Publications</a></p> <!--<p><em>Jump to <a href="#recent-pubs-title">Recent Publications</a>.</em></p> --> <p>The NIST Cybersecurity and Privacy Program develops and maintains an extensive collection of standards, guidelines, recommendations, and research on the security and privacy of information and information systems. This catalog includes the following NIST technical publication series:</p> <div class="table-responsive"> <table class="table table-condensed table-striped"> <tbody> <tr valign="top"> <td><strong><a href="/web/20230923045924/https://csrc.nist.gov/publications/fips">FIPS</a></strong></td> <td><strong>Federal Information Processing Standards</strong><br/> Security standards. <a href="https://web.archive.org/web/20230923045924/https://www.nist.gov/itl/fips-general-information"><small><var><em>Learn more</em></var></small></a></td> </tr> <tr valign="top"> <td><strong><a href="/web/20230923045924/https://csrc.nist.gov/publications/sp">SP</a></strong></td> <td><strong>NIST Special Publications</strong><br/> Guidelines, technical specifications, recommendations and reference materials, comprising multiple sub-series: <div style="margin-left: 1rem;"><strong><a href="/web/20230923045924/https://csrc.nist.gov/publications/sp800">SP 800</a></strong> <strong>Computer security</strong> <a href="https://web.archive.org/web/20230923045924/https://www.nist.gov/itl/nist-special-publication-800-series-general-information"><small><var>Learn more</var></small></a><br/> <strong><a href="/web/20230923045924/https://csrc.nist.gov/publications/sp1800">SP 1800</a></strong> <strong>Cybersecurity practice guides</strong> <a href="https://web.archive.org/web/20230923045924/https://www.nist.gov/itl/nist-special-publication-1800-series-general-information"><small><var>Learn more</var></small></a><br/> <strong><a href="/web/20230923045924/https://csrc.nist.gov/publications/sp500">SP 500</a></strong> <strong>Information technology </strong><small>(only pubs on cybersecurity and privacy)</small></div> </td> </tr> <tr valign="top"> <td><strong><a href="/web/20230923045924/https://csrc.nist.gov/publications/ir">IR</a></strong></td> <td><strong>NIST Interagency or Internal Reports (NIST IR)</strong><br/> Reports of research findings, including background information for FIPS and SPs. The subset IRs listed here are related to the NIST Cybersecurity and Privacy Program.</td> </tr> <tr valign="top"> <td><a href="/web/20230923045924/https://csrc.nist.gov/Publications/cswp"><strong>CSWP</strong></a></td> <td><strong>NIST Cybersecurity White Papers</strong><br/> General white papers, thought pieces, and official cybersecurity- and privacy-related papers not published as a FIPS, SP, or IR.</td> </tr> <tr> <td><strong><a href="/web/20230923045924/https://csrc.nist.gov/publications/project-description">Project Descriptions</a></strong></td> <td>Project Descriptions from the <a href="https://web.archive.org/web/20230923045924/https://nccoe.nist.gov/">National Cybersecurity Center of Excellence (NCCoE)</a>.</td> </tr> <tr valign="top"> <td><strong><a href="/web/20230923045924/https://csrc.nist.gov/publications/itl-bulletin">ITL Bulletin</a></strong></td> <td><strong>NIST Information Technology Laboratory (ITL) Bulletins (1990-2020)</strong><br/> Monthly overviews of NIST's security and privacy publications, programs and projects.</td> </tr> <tr> <td colspan="2"><br/> Other publications in this catalog are from the following NIST technical series:</td> <td> </td> </tr> <tr> <td style="vertical-align: top; text-align: center;"><a href="/web/20230923045924/https://csrc.nist.gov/publications/search?sortBy-lg=relevance&viewMode-lg=brief&ipp-lg=50&status-lg=Final%2CDraft&series-lg=AI"><strong>AI</strong></a></td> <td><strong>Artificial Intelligence:</strong> AI series reports that are focused on cybersecurity and privacy.<br/> Also see the <a href="https://web.archive.org/web/20230923045924/https://airc.nist.gov/home">NIST Trustworty & Responsible AI Resource Center</a>. </td> </tr> <tr> <td style="vertical-align: top; text-align: center;"><a href="/web/20230923045924/https://csrc.nist.gov/publications/search?sortBy-lg=relevance&viewMode-lg=brief&ipp-lg=50&status-lg=Final%2CDraft&series-lg=GCR"><strong>GCR</strong></a></td> <td><strong>Grant/Contract Reports:</strong> Work perfromed solely by an external person/organization under a grant or contract with NIST.</td> </tr> <tr> <td style="vertical-align: top; text-align: center;"><a href="/web/20230923045924/https://csrc.nist.gov/publications/search?sortBy-lg=relevance&viewMode-lg=brief&ipp-lg=50&series-lg=TN&topicsMatch-lg=ANY&controlsMatch-lg=ANY"><strong>TN</strong></a></td> <td><strong>Technical Notes:</strong> Studies or reports that are very restrictive in their treatment of a subject. </td> </tr> </tbody> </table> </div> <p>Find more of our research in: <a href="/web/20230923045924/https://csrc.nist.gov/publications/journal-article">Journal Articles</a>, <a href="/web/20230923045924/https://csrc.nist.gov/publications/conference-paper">Conference Papers</a>, <a href="/web/20230923045924/https://csrc.nist.gov/publications/book">Books</a>, and <a href="/web/20230923045924/https://csrc.nist.gov/publications/other">Other</a> miscellaneous papers. More of these publications from before 2008 will be added to this database.</p> <p>See <a href="https://web.archive.org/web/20230923045924/https://www.nist.gov/publications">NIST Publications</a> for additional <a href="https://web.archive.org/web/20230923045924/https://www.nist.gov/topics/cybersecurity">Cybersecurity Publications</a>. </p> <div style="background: rgb(238, 238, 238); border: 1px solid rgb(204, 204, 204); padding: 5px 10px;"><strong>More info:</strong><br/> <em><strong>- </strong></em><strong><a href="/web/20230923045924/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/NIST-Cybersecurity-Publications.xlsx">Download a spreadsheet (XLSX)</a></strong> of current (draft and final) FIPS, SPs, NISTIRs, ITL Bulletins, and CSWPs.<br/> - <strong><a href="/web/20230923045924/https://csrc.nist.gov/CSRC/media/feeds/pubs/drafts-open-for-comment.xml" target="_blank">RSS/Atom</a> and <a href="/web/20230923045924/https://csrc.nist.gov/CSRC/media/feeds/pubs/drafts-open-for-comment.json" target="_blank">JSON</a> feeds</strong> for <a href="/web/20230923045924/https://csrc.nist.gov/Publications/Drafts-Open-for-Comment">Draft Publications Open for Comment</a>.<br/> - Learn about <strong><a href="/web/20230923045924/https://csrc.nist.gov/Publications/DOI">Digital Object Identifiers (DOI).</a></strong><br/> - 鈥婼ee the <a href="/web/20230923045924/https://csrc.nist.gov/Projects/crypto-publication-review-project"><strong>Crypto Publication Review Project</strong></a> for current reviews of numerous cryptography standards, recommendations, and guidelines.</div> <p><small><strong>Inclusive language. </strong>We recognize that some NIST publications contain potentially biased terminology. As we revise publications, we are reviewing and editing that language based on NIST’s <a href="https://web.archive.org/web/20230923045924/https://www.nist.gov/nist-research-library/nist-technical-series-publications-author-instructions#inclusive">inclusive language guidance</a>. New publications in development will also follow that guidance.</small></p> </webpart></content> <form action="/web/20230923045924/https://csrc.nist.gov/publications/search" class="bs-callout bs-callout-success csrc-search-form hidden-lg hidden-md mobile-form" data-csrc-form="true" data-default-query="sortBy-lg=releasedate+DESC&viewMode-lg=brief&ipp-lg=25&status-lg=Final%2CDraft&topicsMatch-lg=ANY&controlsMatch-lg=ANY" data-form-ignore-default="sortBy" data-form-name="pubSearchMobile" id="pubs-search-form-sm" method="get"> <div class="form-group"> <label for="keywords-sm">Search</label> <input name="keywords-sm" class="form-control" data-val="true" data-val-length="The field Search must be a string with a maximum length of 255." data-val-length-max="255" id="keywords-sm" name="Form.Keywords" type="text" value=""/> <em class="text-muted">Search publication record data<br/> (not a full text search)</em> </div> <div class="form-group"> <label for="sortBy-sm">Sort By</label> <div class="form-inline"> <select name="sortBy-sm" class="form-control" id="sortBy-sm" name="Form.SortBy"><option selected="selected" value="relevance">Relevance (best match)</option> <option value="releasedate DESC">Release Date (newest first)</option> <option value="releasedate ASC">Release Date (oldest first)</option> <option value="Series ASC">Series (A-Z)</option> <option value="Series DESC">Series (Z-A)</option> <option value="Number ASC">Number (lowest to highest)</option> <option value="Number DESC">Number (highest to lowest)</option> <option value="title asc">Title (A-Z)</option> <option value="title desc">Title (Z-A)</option> </select> </div> </div> <div class="form-group"> <label for="viewMode-sm">Results View</label> <select name="viewMode-sm" class="form-control" id="viewMode-sm" name="Form.ResultsViewMode"><option selected="selected" value="brief">Brief</option> <option value="summary">Summary</option> </select> </div> <div class="form-group form-inline"> <label for="ipp-sm" class="form-control-half">Items Per Page</label> <select name="ipp-sm" class="form-control" id="ipp-sm" name="Form.ItemsPerPage"><option selected="selected" value="50">50</option> <option value="75">75</option> <option value="100">100</option> <option value="all">All</option> </select> </div> <div class="form-group"> <p class="text-center"> <a href="#" data-form-show-name="advancedSearch" id="advanced-search-link"> Advanced Search <i class="fa fa-caret-down" aria-hidden="true" data-form-show-expanded="true" style="display: none;"></i> <i class="fa fa-caret-up" aria-hidden="true" data-form-show-expanded="false"></i> </a> </p> </div> <div style="display: none;" data-form-show-trigger="advancedSearch" data-form-show="false"> <div class="form-group"> <label for="dateFrom-sm">Date</label> <div class="form-inline form-date-inline"> <div class="input-group date" data-date-picker="true"> <input name="dateFrom-sm" class="form-control" data-control-type="date" data-val="true" data-val-date="The field Date must be a date." data-validation="true" data-validation-compare-field="dateTo-sm" data-validation-message="From date must be less than To date" data-validation-type="less-than-date" id="dateFrom-sm" name="Form.DateFrom" placeholder=" / / " type="text" value=""/> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> <div class="input-group date" data-date-picker="true"> <input name="dateTo-sm" class="form-control" data-control-type="date" data-val="true" data-val-date="The field DateTo must be a date." id="dateTo-sm" name="Form.DateTo" placeholder=" / / " type="text" value=""/> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> </div> </div> <div class="form-group"> <label for="status-all-sm"> Status <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="publications-status-info-sm"></i> </label> <div class="form-inline status-type" style="margin-left: 1rem;"> <label class="meta-label"> <input type="checkbox" id="status-final-sm" name="status-sm" value="Final" data-default-checked="True"/> Final<br/> </label> <label class="meta-label"> <input type="checkbox" id="status-draft-sm" name="status-sm" value="Draft" data-default-checked="True"/> Public Draft<br/> </label> <label class="meta-label"> <input type="checkbox" id="status-withdrawn-sm" name="status-sm" value="Withdrawn" data-default-checked="True"/> Withdrawn<br/> </label> </div> </div> <div class="form-group"> <label for="pub-search-series"> Series <button type="button" id="series-all-sm" class="btn btn-sm btn-success" data-check-all="series-sm">Check All</button> <button type="button" id="series-clear-sm" class="btn btn-sm btn-success" data-check-none="series-sm">Clear</button> </label> <div class="form-inline series-type" style="margin-left: 1rem;"> <label class="meta-label"> <input type="checkbox" id="series-b2b6ef80-0dec-4d48-ae2d-a37ab486a846-sm" name="series-sm" value="FIPS" data-default-checked="True"/> FIPS<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-749c7275-15f5-4eec-8cb9-3b6f1528756c-sm" name="series-sm" value="SP" data-default-checked="True"/> SP<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-344a35c7-520e-4845-88b0-6997147ffc76-sm" name="series-sm" value="IR" data-default-checked="True"/> IR<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-5f83968e-4758-479d-9aa4-1d42166b7deb-sm" name="series-sm" value="CSWP" data-default-checked="True"/> CSWP<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-b2004197-4249-454a-bdce-edc6186b5c60-sm" name="series-sm" value="TN" data-default-checked="True"/> TN<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-09acb409-e18b-4a05-ac84-631662bcccd9-sm" name="series-sm" value="VTS" data-default-checked="True"/> VTS<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-8022364e-73db-4498-b2eb-9317ce32fff2-sm" name="series-sm" value="AI" data-default-checked="True"/> AI<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-57afe5d0-383f-4fd6-b702-84233dcd5f13-sm" name="series-sm" value="GCR" data-default-checked="True"/> GCR<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-23801152-858e-4dbc-baad-eb51795cf0e2-sm" name="series-sm" value="Project Description" data-default-checked="True"/> Project Description<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-8c9f1828-ae8a-4f03-8d9f-9ff7192b508e-sm" name="series-sm" value="ITL Bulletin" data-default-checked="True"/> ITL Bulletin<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-debd6afb-aeaa-4790-a32b-c977c9654df0-sm" name="series-sm" value="Journal Article" data-default-checked="True"/> Journal Article<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-ed478237-d49d-41c6-91ed-5dd341bd50c8-sm" name="series-sm" value="Conference Paper" data-default-checked="True"/> Conference Paper<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-f2273ac7-d756-4cce-b006-a527778c84f0-sm" name="series-sm" value="Book" data-default-checked="True"/> Book<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-80e369a4-bea5-46f5-8082-91f19c3eeefa-sm" name="series-sm" value="Book Section" data-default-checked="True"/> Book Section<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-b1570e28-332c-4f29-a1e0-cd31c3930848-sm" name="series-sm" value="Other" data-default-checked="True"/> Other<br/> </label> </div> </div> <div class="form-group"> <label for="pub-search-topics-sm"> Topics </label> <input name="topics-sm" id="topics-sm" name="Form.Topics" type="hidden" value=""/> <div class="form-control topics-selection" id="pub-search-topics-sm" contenteditable="true" data-drop-target="pub-search-topics-drop-sm" data-field-name="topics-sm" aria-haspopup="true" aria-expanded="false"> </div> <div class="topics-selection-dropdown desktop" id="pub-search-topics-drop-sm" style="display: none;" data-topics-selector=""><div class="col-sm-4"><strong>Security and Privacy</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24670-27481" data-expander-for="/topics/security-and-privacy/cryptography"></i> <a data-topic-id="27481" data-topic-text="cryptography">cryptography</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27647" data-topic-text="digital signatures">digital signatures</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27648" data-topic-text="encryption">encryption</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27649" data-topic-text="key management">key management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="30027" data-topic-text="lightweight cryptography">lightweight cryptography</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27650" data-topic-text="message authentication">message authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27651" data-topic-text="post-quantum cryptography">post-quantum cryptography</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27652" data-topic-text="random number generation">random number generation</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27653" data-topic-text="secure hashing">secure hashing</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27482" data-topic-text="cybersecurity supply chain risk management">cybersecurity supply chain risk management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27483" data-topic-text="general security & privacy">general security & privacy</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24670-27484" data-expander-for="/topics/security-and-privacy/identity-and-access-management"></i> <a data-topic-id="27484" data-topic-text="identity & access management">identity & access management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27663" data-topic-text="access authorization">access authorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27664" data-topic-text="access control">access control</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27665" data-topic-text="authentication">authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27666" data-topic-text="Personal Identity Verification">Personal Identity Verification</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27667" data-topic-text="public key infrastructure">public key infrastructure</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24670-27485" data-expander-for="/topics/security-and-privacy/privacy"></i> <a data-topic-id="27485" data-topic-text="privacy">privacy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27680" data-topic-text="personally identifiable information">personally identifiable information</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27681" data-topic-text="privacy engineering">privacy engineering</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24670-27486" data-expander-for="/topics/security-and-privacy/risk-management"></i> <a data-topic-id="27486" data-topic-text="risk management">risk management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27682" data-topic-text="categorization">categorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27683" data-topic-text="continuous monitoring">continuous monitoring</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-27486-27684" data-expander-for="/topics/security-and-privacy/risk-management/controls"></i> <a data-topic-id="27684" data-topic-text="controls">controls</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27767" data-topic-text="controls assessment">controls assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27768" data-topic-text="privacy controls">privacy controls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27769" data-topic-text="security controls">security controls</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27685" data-topic-text="risk assessment">risk assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27686" data-topic-text="roots of trust">roots of trust</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27687" data-topic-text="system authorization">system authorization</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-27486-27688" data-expander-for="/topics/security-and-privacy/risk-management/threats"></i> <a data-topic-id="27688" data-topic-text="threats">threats</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27770" data-topic-text="advanced persistent threats">advanced persistent threats</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27771" data-topic-text="botnets">botnets</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27772" data-topic-text="information sharing">information sharing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27773" data-topic-text="intrusion detection & prevention">intrusion detection & prevention</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27774" data-topic-text="malware">malware</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27689" data-topic-text="vulnerability management">vulnerability management</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24670-27487" data-expander-for="/topics/security-and-privacy/security-and-behavior"></i> <a data-topic-id="27487" data-topic-text="security & behavior">security & behavior</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27709" data-topic-text="accessibility">accessibility</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27710" data-topic-text="behavior">behavior</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27711" data-topic-text="usability">usability</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24670-27488" data-expander-for="/topics/security-and-privacy/security-measurement"></i> <a data-topic-id="27488" data-topic-text="security measurement">security measurement</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27690" data-topic-text="analytics">analytics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27691" data-topic-text="assurance">assurance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27692" data-topic-text="modeling">modeling</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27693" data-topic-text="testing & validation">testing & validation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24670-27489" data-expander-for="/topics/security-and-privacy/security-programs-and-operations"></i> <a data-topic-id="27489" data-topic-text="security programs & operations">security programs & operations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27694" data-topic-text="acquisition">acquisition</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27695" data-topic-text="asset management">asset management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27696" data-topic-text="audit & accountability">audit & accountability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27697" data-topic-text="awareness training & education">awareness training & education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27698" data-topic-text="configuration management">configuration management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27699" data-topic-text="contingency planning">contingency planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27700" data-topic-text="incident response">incident response</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27701" data-topic-text="maintenance">maintenance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27702" data-topic-text="media protection">media protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27703" data-topic-text="patch management">patch management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27704" data-topic-text="personnel security">personnel security</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27705" data-topic-text="physical & environmental protection">physical & environmental protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27706" data-topic-text="planning">planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27707" data-topic-text="program management">program management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27708" data-topic-text="security automation">security automation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24670-27490" data-expander-for="/topics/security-and-privacy/systems-security-engineering"></i> <a data-topic-id="27490" data-topic-text="systems security engineering">systems security engineering</a><ul style="display: none;"><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-27490-27713" data-expander-for="/topics/security-and-privacy/systems-security-engineering/trustworthiness"></i> <a data-topic-id="27713" data-topic-text="trustworthiness">trustworthiness</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27775" data-topic-text="reliability">reliability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27776" data-topic-text="resilience">resilience</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27777" data-topic-text="safety">safety</a></li></ul> </li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="28469" data-topic-text="zero trust">zero trust</a></li></ul><strong>Technologies</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27491" data-topic-text="artificial intelligence">artificial intelligence</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27492" data-topic-text="big data">big data</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27493" data-topic-text="biometrics">biometrics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27494" data-topic-text="blockchain">blockchain</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27495" data-topic-text="cloud & virtualization">cloud & virtualization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27496" data-topic-text="combinatorial testing">combinatorial testing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27497" data-topic-text="complexity">complexity</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24671-27499" data-expander-for="/topics/technologies/hardware"></i> <a data-topic-id="27499" data-topic-text="hardware">hardware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27714" data-topic-text="circuits">circuits</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27715" data-topic-text="personal computers">personal computers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27716" data-topic-text="sensors">sensors</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27498" data-topic-text="mobile">mobile</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24671-27500" data-expander-for="/topics/technologies/networks"></i> <a data-topic-id="27500" data-topic-text="networks">networks</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27717" data-topic-text="email">email</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27718" data-topic-text="firewalls">firewalls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27719" data-topic-text="internet">internet</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27501" data-topic-text="quantum information science">quantum information science</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27502" data-topic-text="servers">servers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27503" data-topic-text="smart cards">smart cards</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24671-27504" data-expander-for="/topics/technologies/software-firmware"></i> <a data-topic-id="27504" data-topic-text="software & firmware">software & firmware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27720" data-topic-text="BIOS">BIOS</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27721" data-topic-text="databases">databases</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27722" data-topic-text="operating systems">operating systems</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27505" data-topic-text="storage">storage</a></li></ul></div><div class="col-sm-4"><strong>Applications</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27456" data-topic-text="communications & wireless">communications & wireless</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27457" data-topic-text="cyber-physical systems">cyber-physical systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27458" data-topic-text="cybersecurity education">cybersecurity education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27459" data-topic-text="cybersecurity framework">cybersecurity framework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27460" data-topic-text="cybersecurity workforce">cybersecurity workforce</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27461" data-topic-text="enterprise">enterprise</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27462" data-topic-text="forensics">forensics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27463" data-topic-text="industrial control systems">industrial control systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27464" data-topic-text="Internet of Things">Internet of Things</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="29979" data-topic-text="mathematics">mathematics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27920" data-topic-text="positioning navigation & timing">positioning navigation & timing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27465" data-topic-text="small & medium business">small & medium business</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27466" data-topic-text="telework">telework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27467" data-topic-text="voting">voting</a></li></ul><strong>Laws and Regulations</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24673-27468" data-expander-for="/topics/laws-and-regulations/executive-documents"></i> <a data-topic-id="27468" data-topic-text="executive documents">executive documents</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27668" data-topic-text="Comprehensive National Cybersecurity Initiative">Comprehensive National Cybersecurity Initiative</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27669" data-topic-text="Cybersecurity Strategy and Implementation Plan">Cybersecurity Strategy and Implementation Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27670" data-topic-text="Cyberspace Policy Review">Cyberspace Policy Review</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27671" data-topic-text="Executive Order 13636">Executive Order 13636</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27672" data-topic-text="Executive Order 13702">Executive Order 13702</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27673" data-topic-text="Executive Order 13718">Executive Order 13718</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27674" data-topic-text="Executive Order 13800">Executive Order 13800</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27921" data-topic-text="Executive Order 13905">Executive Order 13905</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28468" data-topic-text="Executive Order 14028">Executive Order 14028</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27675" data-topic-text="Federal Cybersecurity Research and Development Strategic Plan">Federal Cybersecurity Research and Development Strategic Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27676" data-topic-text="Homeland Security Presidential Directive 7">Homeland Security Presidential Directive 7</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27677" data-topic-text="Homeland Security Presidential Directive 12">Homeland Security Presidential Directive 12</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27678" data-topic-text="OMB Circular A-11">OMB Circular A-11</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27679" data-topic-text="OMB Circular A-130">OMB Circular A-130</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24673-27469" data-expander-for="/topics/laws-and-regulations/laws"></i> <a data-topic-id="27469" data-topic-text="laws">laws</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="35986" data-topic-text="CHIPS and Science Act">CHIPS and Science Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27654" data-topic-text="Cyber Security R&D Act">Cyber Security R&D; Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27655" data-topic-text="Cybersecurity Enhancement Act">Cybersecurity Enhancement Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27656" data-topic-text="E-Government Act">E-Government Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27657" data-topic-text="Energy Independence and Security Act">Energy Independence and Security Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27658" data-topic-text="Federal Information Security Modernization Act">Federal Information Security Modernization Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27659" data-topic-text="First Responder Network Authority">First Responder Network Authority</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27660" data-topic-text="Health Insurance Portability and Accountability Act">Health Insurance Portability and Accountability Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27661" data-topic-text="Help America Vote Act">Help America Vote Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28580" data-topic-text="Internet of Things Cybersecurity Improvement Act">Internet of Things Cybersecurity Improvement Act</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24673-27470" data-expander-for="/topics/laws-and-regulations/regulations"></i> <a data-topic-id="27470" data-topic-text="regulations">regulations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27662" data-topic-text="Federal Acquisition Regulation">Federal Acquisition Regulation</a></li></ul> </li></ul></div><div class="col-sm-4"><strong>Activities and Products</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27452" data-topic-text="annual reports">annual reports</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27453" data-topic-text="conferences & workshops">conferences & workshops</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="30210" data-topic-text="groups">groups</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27454" data-topic-text="reference materials">reference materials</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27455" data-topic-text="standards development">standards development</a></li></ul><strong>Sectors</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27471" data-topic-text="aerospace">aerospace</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24675-27472" data-expander-for="/topics/sectors/energy"></i> <a data-topic-id="27472" data-topic-text="energy">energy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27712" data-topic-text="smart grid">smart grid</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27473" data-topic-text="financial services">financial services</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27474" data-topic-text="healthcare">healthcare</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27475" data-topic-text="hospitality">hospitality</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27476" data-topic-text="manufacturing">manufacturing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27477" data-topic-text="public safety">public safety</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27478" data-topic-text="retail">retail</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27479" data-topic-text="telecommunications">telecommunications</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27480" data-topic-text="transportation">transportation</a></li></ul></div></div> <div class="form-inline topics-type"> <label class="radio-label">Match ANY: <input name="topicsMatch-sm" checked="checked" id="topicsMatch-any-sm" name="Form.TopicsMatch" type="radio" value="ANY"/></label> <label class="radio-label">Match ALL: <input name="topicsMatch-sm" id="topicsMatch-all-sm" name="Form.TopicsMatch" type="radio" value="ALL"/></label> </div> </div> <div class="form-group"> <label for="pub-search-controls-sm"> Control Family (800-53) </label> <input name="controls-sm" id="controls-sm" name="Form.Controls" type="hidden" value=""/> <div class="form-control controls-selection" id="pub-search-controls-sm" contenteditable="true" data-drop-target="pub-search-controls-drop-sm" data-field-name="controls-sm" aria-haspopup="true" aria-expanded="false"> </div> <div class="controls-selection-dropdown desktop" id="pub-search-controls-drop-sm" style="display: none;" data-controls-selector=""> <strong>Control Families</strong> <ul> <li><a data-control-id="2049a555-9a3e-4395-88bc-8304c6d9b157">AC - Access Control</a></li> <li><a data-control-id="bb24a9c9-944e-41fc-b6a9-7c4217e054df">AT - Awareness and Training</a></li> <li><a data-control-id="b491696a-7f6b-4b1e-9145-b02938d9c279">AU - Audit and Accountability</a></li> <li><a data-control-id="27484ffc-ac08-40b0-8862-4be4154560e4">CA - Assessment, Authorization and Monitoring</a></li> <li><a data-control-id="b8b9a292-32ad-4698-abad-45c70b40757d">CM - Configuration Management</a></li> <li><a data-control-id="5604c7e8-b158-48c6-a497-c5357a43e7c2">CP - Contingency Planning</a></li> <li><a data-control-id="2b79dd04-6118-44ee-b54d-854948a5b55f">IA - Identification and Authentication</a></li> <li><a data-control-id="b6c1c9c0-3cf8-46c9-b2ae-4cd608f88b11">IR - Incident Response</a></li> <li><a data-control-id="c8219b58-a95d-4882-8e74-0c19369aceb6">MA - Maintenance</a></li> <li><a data-control-id="84b5d6fa-8fbc-4d32-b559-47a626a510b3">MP - Media Protection</a></li> <li><a data-control-id="f3703fe4-b51d-4139-98eb-1656b00fc4ed">PE - Physical and Environmental Protection</a></li> <li><a data-control-id="137c4d9f-6541-4431-bb88-d0d003ce039f">PL - Planning</a></li> <li><a data-control-id="6401481d-3689-49bb-840c-73256cfb102e">PM - Program Management</a></li> <li><a data-control-id="408d8a82-1783-414d-a303-d79525c87f6a">PS - Personnel Security</a></li> <li><a data-control-id="9f34a4cb-3ba3-49e1-8c5c-5aa38c2151e7">PT - PII Processing and Transparency</a></li> <li><a data-control-id="1d0ff39c-a0ed-408e-8251-fbcd24dc74eb">RA - Risk Assessment</a></li> <li><a data-control-id="d1d6d136-ad89-4ab2-9207-6bec08ef6299">SA - System and Services Acquisition</a></li> <li><a data-control-id="2067a45e-da04-471b-95ad-d0882d74ccaf">SC - System and Communications Protection</a></li> <li><a data-control-id="1d78556b-00f2-47e7-992a-9d8fb08bda2a">SI - System and Information Integrity</a></li> <li><a data-control-id="6a7ab58f-e8ef-4264-aad0-29c656a03c59">SR - Supply Chain Risk Management</a></li> </ul> </div> <div class="form-inline controls-type"> <label class="radio-label">Match ANY: <input name="controlsMatch-sm" checked="checked" id="controlsMatch-any-sm" name="Form.ControlsMatch" type="radio" value="ANY"/></label> <label class="radio-label">Match ALL: <input name="controlsMatch-sm" id="controlsMatch-all-sm" name="Form.ControlsMatch" type="radio" value="ALL"/></label> </div> </div> </div> <div style="display: none;" data-form-error-pane="true" class="text-danger"> <strong class="text-danger">Please fix the following:</strong> <ul data-form-error-list="true"> </ul> <div class="validation-summary-valid" data-valmsg-summary="true"><ul><li style="display:none"></li> </ul></div> </div> <div class="form-group"> <button type="submit" id="pubs-search-submit-sm" name="submit-btn" data-form-button="submit" class="btn">Search</button> <button type="reset" id="pubs-search-reset-sm" name="reset-btn" data-form-button="reset" class="btn">Reset</button> </div> <span style="display: none;" id="publications-status-info-sm"> <p><strong>Final:</strong> Published documents.</p> <p><strong>Public Draft:</strong> Documents have been posted as Public Drafts, typically with a public comment period.</p> <p> <strong>Withdrawn:</strong> Documents that have been withdrawn, and are no longer current. This includes:<br/> - Final publications that have been withdrawn;<br/> - Public drafts that have been obsoleted by a subsequent draft or final publication;<br/> - Public drafts that have been retired鈥攆urther development was discontinued. </p> </span> </form> <div class="pubs-list"> <h3 id="recent-pubs-title"><i class="fa fa-file-text"></i> Recent Publications</h3> </div> <table class="table table-striped table-condensed publications-table table-bordered" id="publications-results-table" data-total-records="2168" data-page="1" data-first-record="1" data-last-record="25" data-ipp="25"> <thead> <tr> <th nowrap class="hidden-sm hidden-xs hidden-xxs">Series</th> <th nowrap class="hidden-sm hidden-xs hidden-xxs">Number</th> <th nowrap> <span class="hidden-sm hidden-xs hidden-xxs">Title</span> <span class="hidden-md hidden-lg">Publications</span> </th> <th nowrap class="hidden-sm hidden-xs hidden-xxs">Status</th> <th nowrap class="hidden-sm hidden-xs hidden-xxs">Release Date</th> </tr> </thead> <tbody> <tr id="result-1"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-1">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-1">800-188</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923045924/https://csrc.nist.gov/pubs/sp/800/188/final" id="pub-title-link-1">De-Identifying Government Datasets: Techniques and Governance</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-1">SP 800-188 (Final)</span><br/> <a href="/web/20230923045924/https://csrc.nist.gov/pubs/sp/800/188/final" class="mobile-pub-title" id="pub-title-link-sm-1">De-Identifying Government Datasets: Techniques and Governance</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-1">9/14/2023</strong> <br/> Status: <span id="pub-status-sm-1">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-1"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-1"> 9/14/2023 </td> </tr> <tr id="result-2"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-2">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-2">800-207A</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923045924/https://csrc.nist.gov/pubs/sp/800/207/a/final" id="pub-title-link-2">A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Cloud Environments</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-2">SP 800-207A (Final)</span><br/> <a href="/web/20230923045924/https://csrc.nist.gov/pubs/sp/800/207/a/final" class="mobile-pub-title" id="pub-title-link-sm-2">A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Cloud Environments</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-2">9/13/2023</strong> <br/> Status: <span id="pub-status-sm-2">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-2"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-2"> 9/13/2023 </td> </tr> <tr id="result-3"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-3">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-3">1800-35</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923045924/https://csrc.nist.gov/pubs/sp/1800/35/2prd-(1)" id="pub-title-link-3">Implementing a Zero Trust Architecture (Volume E, Risk and Compliance Management)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-3">SP 1800-35 (2nd Preliminary Draft)</span><br/> <a href="/web/20230923045924/https://csrc.nist.gov/pubs/sp/1800/35/2prd-(1)" class="mobile-pub-title" id="pub-title-link-sm-3">Implementing a Zero Trust Architecture (Volume E, Risk and Compliance Management)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-3">9/12/2023</strong> <br/> Status: <span id="pub-status-sm-3">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-3"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-3"> 9/12/2023 </td> </tr> <tr id="result-4"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-4">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-4">8450</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923045924/https://csrc.nist.gov/pubs/ir/8450/final" id="pub-title-link-4">Overview and Considerations of Access Control Based on Attribute Encryption</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-4">IR 8450 (Final)</span><br/> <a href="/web/20230923045924/https://csrc.nist.gov/pubs/ir/8450/final" class="mobile-pub-title" id="pub-title-link-sm-4">Overview and Considerations of Access Control Based on Attribute Encryption</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-4">9/06/2023</strong> <br/> Status: <span id="pub-status-sm-4">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-4"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-4"> 9/06/2023 </td> </tr> <tr id="result-5"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-5">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-5">8408</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923045924/https://csrc.nist.gov/pubs/ir/8408/final" id="pub-title-link-5">Understanding Stablecoin Technology and Related Security Considerations</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-5">IR 8408 (Final)</span><br/> <a href="/web/20230923045924/https://csrc.nist.gov/pubs/ir/8408/final" class="mobile-pub-title" id="pub-title-link-sm-5">Understanding Stablecoin Technology and Related Security Considerations</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-5">9/05/2023</strong> <br/> Status: <span id="pub-status-sm-5">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-5"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-5"> 9/05/2023 </td> </tr> <tr id="result-6"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-6">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-6">8481</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923045924/https://csrc.nist.gov/pubs/ir/8481/ipd" id="pub-title-link-6">Cybersecurity for Research: Findings and Possible Paths Forward</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-6">IR 8481 (Initial Public Draft)</span><br/> <a href="/web/20230923045924/https://csrc.nist.gov/pubs/ir/8481/ipd" class="mobile-pub-title" id="pub-title-link-sm-6">Cybersecurity for Research: Findings and Possible Paths Forward</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-6">8/31/2023</strong> <br/> Status: <span id="pub-status-sm-6">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-6"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-6"> 8/31/2023 </td> </tr> <tr id="result-7"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-7">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-7">8472</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923045924/https://csrc.nist.gov/pubs/ir/8472/ipd" id="pub-title-link-7">Non-Fungible Token Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-7">IR 8472 (Initial Public Draft)</span><br/> <a href="/web/20230923045924/https://csrc.nist.gov/pubs/ir/8472/ipd" class="mobile-pub-title" id="pub-title-link-sm-7">Non-Fungible Token Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-7">8/31/2023</strong> <br/> Status: <span id="pub-status-sm-7">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-7"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-7"> 8/31/2023 </td> </tr> <tr id="result-8"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-8">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-8">800-204D</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923045924/https://csrc.nist.gov/pubs/sp/800/204/d/ipd" id="pub-title-link-8">Strategies for the Integration of Software Supply Chain Security in DevSecOps CI/CD pipelines</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-8">SP 800-204D (Initial Public Draft)</span><br/> <a href="/web/20230923045924/https://csrc.nist.gov/pubs/sp/800/204/d/ipd" class="mobile-pub-title" id="pub-title-link-sm-8">Strategies for the Integration of Software Supply Chain Security in DevSecOps CI/CD pipelines</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-8">8/30/2023</strong> <br/> Status: <span id="pub-status-sm-8">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-8"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-8"> 8/30/2023 </td> </tr> <tr id="result-9"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-9">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-9">800-50 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923045924/https://csrc.nist.gov/pubs/sp/800/50/r1/ipd" id="pub-title-link-9">Building a Cybersecurity and Privacy Learning Program</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-9">SP 800-50 Rev. 1 (Initial Public Draft)</span><br/> <a href="/web/20230923045924/https://csrc.nist.gov/pubs/sp/800/50/r1/ipd" class="mobile-pub-title" id="pub-title-link-sm-9">Building a Cybersecurity and Privacy Learning Program</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-9">8/28/2023</strong> <br/> Status: <span id="pub-status-sm-9">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-9"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-9"> 8/28/2023 </td> </tr> <tr id="result-10"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-10">FIPS</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-10">203</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923045924/https://csrc.nist.gov/pubs/fips/203/ipd" id="pub-title-link-10">Module-Lattice-Based Key-Encapsulation Mechanism Standard</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-10">FIPS 203 (Initial Public Draft)</span><br/> <a href="/web/20230923045924/https://csrc.nist.gov/pubs/fips/203/ipd" class="mobile-pub-title" id="pub-title-link-sm-10">Module-Lattice-Based Key-Encapsulation Mechanism Standard</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-10">8/24/2023</strong> <br/> Status: <span id="pub-status-sm-10">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-10"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-10"> 8/24/2023 </td> </tr> <tr id="result-11"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-11">FIPS</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-11">205</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923045924/https://csrc.nist.gov/pubs/fips/205/ipd" id="pub-title-link-11">Stateless Hash-Based Digital Signature Standard</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-11">FIPS 205 (Initial Public Draft)</span><br/> <a href="/web/20230923045924/https://csrc.nist.gov/pubs/fips/205/ipd" class="mobile-pub-title" id="pub-title-link-sm-11">Stateless Hash-Based Digital Signature Standard</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-11">8/24/2023</strong> <br/> Status: <span id="pub-status-sm-11">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-11"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-11"> 8/24/2023 </td> </tr> <tr id="result-12"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-12">FIPS</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-12">204</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923045924/https://csrc.nist.gov/pubs/fips/204/ipd" id="pub-title-link-12">Module-Lattice-Based Digital Signature Standard</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-12">FIPS 204 (Initial Public Draft)</span><br/> <a href="/web/20230923045924/https://csrc.nist.gov/pubs/fips/204/ipd" class="mobile-pub-title" id="pub-title-link-sm-12">Module-Lattice-Based Digital Signature Standard</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-12">8/24/2023</strong> <br/> Status: <span id="pub-status-sm-12">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-12"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-12"> 8/24/2023 </td> </tr> <tr id="result-13"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-13">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-13">1800-35</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923045924/https://csrc.nist.gov/pubs/sp/1800/35/3prd" id="pub-title-link-13">Implementing a Zero Trust Architecture</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-13">SP 1800-35 (3rd Preliminary Draft)</span><br/> <a href="/web/20230923045924/https://csrc.nist.gov/pubs/sp/1800/35/3prd" class="mobile-pub-title" id="pub-title-link-sm-13">Implementing a Zero Trust Architecture</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-13">8/22/2023</strong> <br/> Status: <span id="pub-status-sm-13">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-13"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-13"> 8/22/2023 </td> </tr> <tr id="result-14"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-14">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-14">8477</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923045924/https://csrc.nist.gov/pubs/ir/8477/ipd" id="pub-title-link-14">Mapping Relationships Between Documentary Standards, Regulations, Frameworks, and Guidelines: Developing Cybersecurity and Privacy Concept Mappings</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-14">IR 8477 (Initial Public Draft)</span><br/> <a href="/web/20230923045924/https://csrc.nist.gov/pubs/ir/8477/ipd" class="mobile-pub-title" id="pub-title-link-sm-14">Mapping Relationships Between Documentary Standards, Regulations, Frameworks, and Guidelines: Developing Cybersecurity and Privacy Concept Mappings</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-14">8/17/2023</strong> <br/> Status: <span id="pub-status-sm-14">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-14"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-14"> 8/17/2023 </td> </tr> <tr id="result-15"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-15">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-15"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923045924/https://csrc.nist.gov/pubs/pd/2023/08/14/manufacturing-supply-chain-traceability-with-block/final" id="pub-title-link-15">Manufacturing Supply Chain Traceability with Blockchain Related Technology: Reference Implementation</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-15">Project Description (Final)</span><br/> <a href="/web/20230923045924/https://csrc.nist.gov/pubs/pd/2023/08/14/manufacturing-supply-chain-traceability-with-block/final" class="mobile-pub-title" id="pub-title-link-sm-15">Manufacturing Supply Chain Traceability with Blockchain Related Technology: Reference Implementation</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-15">8/14/2023</strong> <br/> Status: <span id="pub-status-sm-15">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-15"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-15"> 8/14/2023 </td> </tr> <tr id="result-16"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-16">CSWP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-16">29</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923045924/https://csrc.nist.gov/pubs/cswp/29/the-nist-cybersecurity-framework-20/ipd" id="pub-title-link-16">The NIST Cybersecurity Framework 2.0</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-16">CSWP 29 (Initial Public Draft)</span><br/> <a href="/web/20230923045924/https://csrc.nist.gov/pubs/cswp/29/the-nist-cybersecurity-framework-20/ipd" class="mobile-pub-title" id="pub-title-link-sm-16">The NIST Cybersecurity Framework 2.0</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-16">8/08/2023</strong> <br/> Status: <span id="pub-status-sm-16">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-16"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-16"> 8/08/2023 </td> </tr> <tr id="result-17"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-17">Other</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-17"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923045924/https://csrc.nist.gov/pubs/other/2023/08/08/discussion-draft-of-the-nist-csf-20-core-with-impl/ipd" id="pub-title-link-17">Discussion Draft of the NIST Cybersecurity Framework 2.0 Core with Implementation Examples</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-17">Other (Initial Public Draft)</span><br/> <a href="/web/20230923045924/https://csrc.nist.gov/pubs/other/2023/08/08/discussion-draft-of-the-nist-csf-20-core-with-impl/ipd" class="mobile-pub-title" id="pub-title-link-sm-17">Discussion Draft of the NIST Cybersecurity Framework 2.0 Core with Implementation Examples</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-17">8/08/2023</strong> <br/> Status: <span id="pub-status-sm-17">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-17"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-17"> 8/08/2023 </td> </tr> <tr id="result-18"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-18">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-18">8270</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923045924/https://csrc.nist.gov/pubs/ir/8270/final" id="pub-title-link-18">Introduction to Cybersecurity for Commercial Satellite Operations</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-18">IR 8270 (Final)</span><br/> <a href="/web/20230923045924/https://csrc.nist.gov/pubs/ir/8270/final" class="mobile-pub-title" id="pub-title-link-sm-18">Introduction to Cybersecurity for Commercial Satellite Operations</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-18">7/25/2023</strong> <br/> Status: <span id="pub-status-sm-18">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-18"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-18"> 7/25/2023 </td> </tr> <tr id="result-19"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-19">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-19">800-140C Rev. 2</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923045924/https://csrc.nist.gov/pubs/sp/800/140/c/r2/final" id="pub-title-link-19">Cryptographic Module Validation Program (CMVP)-Approved Security Functions: CMVP Validation Authority Updates to ISO/IEC 24759</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-19">SP 800-140C Rev. 2 (Final)</span><br/> <a href="/web/20230923045924/https://csrc.nist.gov/pubs/sp/800/140/c/r2/final" class="mobile-pub-title" id="pub-title-link-sm-19">Cryptographic Module Validation Program (CMVP)-Approved Security Functions: CMVP Validation Authority Updates to ISO/IEC 24759</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-19">7/25/2023</strong> <br/> Status: <span id="pub-status-sm-19">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-19"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-19"> 7/25/2023 </td> </tr> <tr id="result-20"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-20">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-20">800-140D Rev. 2</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923045924/https://csrc.nist.gov/pubs/sp/800/140/d/r2/final" id="pub-title-link-20">Cryptographic Module Validation Program (CMVP)-Approved Sensitive Security Parameter Generation and Establishment Methods: CMVP Validation Authority Updates to ISO/IEC 24759</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-20">SP 800-140D Rev. 2 (Final)</span><br/> <a href="/web/20230923045924/https://csrc.nist.gov/pubs/sp/800/140/d/r2/final" class="mobile-pub-title" id="pub-title-link-sm-20">Cryptographic Module Validation Program (CMVP)-Approved Sensitive Security Parameter Generation and Establishment Methods: CMVP Validation Authority Updates to ISO/IEC 24759</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-20">7/25/2023</strong> <br/> Status: <span id="pub-status-sm-20">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-20"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-20"> 7/25/2023 </td> </tr> <tr id="result-21"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-21">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-21">800-219 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923045924/https://csrc.nist.gov/pubs/sp/800/219/r1/final" id="pub-title-link-21">Automated Secure Configuration Guidance from the macOS Security Compliance Project (mSCP)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-21">SP 800-219 Rev. 1 (Final)</span><br/> <a href="/web/20230923045924/https://csrc.nist.gov/pubs/sp/800/219/r1/final" class="mobile-pub-title" id="pub-title-link-sm-21">Automated Secure Configuration Guidance from the macOS Security Compliance Project (mSCP)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-21">7/20/2023</strong> <br/> Status: <span id="pub-status-sm-21">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-21"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-21"> 7/20/2023 </td> </tr> <tr id="result-22"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-22">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-22">1800-35</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923045924/https://csrc.nist.gov/pubs/sp/1800/35/2prd" id="pub-title-link-22">Implementing a Zero Trust Architecture</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-22">SP 1800-35 (2nd Preliminary Draft)</span><br/> <a href="/web/20230923045924/https://csrc.nist.gov/pubs/sp/1800/35/2prd" class="mobile-pub-title" id="pub-title-link-sm-22">Implementing a Zero Trust Architecture</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-22">7/19/2023</strong> <br/> Status: <span id="pub-status-sm-22">Draft (Obsolete)</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-22"> Draft (Obsolete) </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-22"> 7/19/2023 </td> </tr> <tr id="result-23"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-23">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-23">8473</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923045924/https://csrc.nist.gov/pubs/ir/8473/ipd" id="pub-title-link-23">Cybersecurity Framework Profile for Electric Vehicle Extreme Fast Charging Infrastructure</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-23">IR 8473 (Initial Public Draft)</span><br/> <a href="/web/20230923045924/https://csrc.nist.gov/pubs/ir/8473/ipd" class="mobile-pub-title" id="pub-title-link-sm-23">Cybersecurity Framework Profile for Electric Vehicle Extreme Fast Charging Infrastructure</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-23">7/14/2023</strong> <br/> Status: <span id="pub-status-sm-23">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-23"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-23"> 7/14/2023 </td> </tr> <tr id="result-24"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-24">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-24">8355</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923045924/https://csrc.nist.gov/pubs/ir/8355/final" id="pub-title-link-24">NICE Framework Competency Areas: Preparing a Job-Ready Cybersecurity Workforce</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-24">IR 8355 (Final)</span><br/> <a href="/web/20230923045924/https://csrc.nist.gov/pubs/ir/8355/final" class="mobile-pub-title" id="pub-title-link-sm-24">NICE Framework Competency Areas: Preparing a Job-Ready Cybersecurity Workforce</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-24">6/21/2023</strong> <br/> Status: <span id="pub-status-sm-24">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-24"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-24"> 6/21/2023 </td> </tr> <tr id="result-25"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-25">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-25"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923045924/https://csrc.nist.gov/pubs/pd/2023/06/20/cybersecurity-for-the-water-and-wastewater-sector/final" id="pub-title-link-25">Cybersecurity for the Water and Wastewater Sector: A Practical Reference Design for Mitigating Cyber Risk in Water and Wastewater Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-25">Project Description (Final)</span><br/> <a href="/web/20230923045924/https://csrc.nist.gov/pubs/pd/2023/06/20/cybersecurity-for-the-water-and-wastewater-sector/final" class="mobile-pub-title" id="pub-title-link-sm-25">Cybersecurity for the Water and Wastewater Sector: A Practical Reference Design for Mitigating Cyber Risk in Water and Wastewater Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-25">6/20/2023</strong> <br/> Status: <span id="pub-status-sm-25">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-25"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-25"> 6/20/2023 </td> </tr> </tbody> </table> <p id="relevanceInfo">* "Relevance" merely indicates the search engine's score for a document. It is based on the search parameters and information in the document's detailed record.</p> <div> <span class="pull-right"> <a href="/web/20230923045924/https://csrc.nist.gov/publications/search" id="view-all-pubs-link">View All Publications</a> </span> </div> <div id="publications-quicklinks-sm" class="bs-callout bs-callout-subnav hidden-md hidden-lg"> <h4>Current Publications <i class="fa fa-bolt"></i></h4> <ul> <li> <strong> NIST Series Pubs <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-series-pubs-tooltip-lg"></i> </strong> <ul> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/final-pubs" id="quick-link-final-sm">Final Pubs</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/drafts-open-for-comment" id="quick-links-comments-sm">Drafts Open for Comment</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/draft-pubs" id="quick-link-draft-sm">Drafts</a> (all)</li> <li> <strong> View By Series <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-view-series-pubs-tooltip-lg"></i> </strong> <ul> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/fips" id="quick-link-fips-sm">FIPS</a> (standards)</li> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/sp800" id="quick-link-sp-800-sm">SP 800</a> (guidance)</li> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/sp1800" id="quick-link-sp-1800-sm">SP 1800</a> (practice guides)</li> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/sp" id="quick-link-sp-sm">SP</a> (all subseries)</li> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/ir" id="quick-link-nistir-sm">IR</a> (interagency/internal reports)</li> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/cswp" id="quick-link-white-papers-sm">CSWP</a> (cybersecurity white papers)</li> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/itl-bulletin" id="quick-link-itl-bul-sm">ITL Bulletins</a></li> </ul> </li> </ul> </li> <li> <strong> Other Pubs <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-other-pubs-tooltip-lg"></i> </strong> <ul> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/project-description" id="quick-link-project-description-sm">Project Descriptions</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/journal-article" id="quick-link-journal-articles-sm">Journal Articles</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/conference-paper" id="quick-link-conference-papers-sm">Conference Papers</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/book" id="quick-link-books-sm">Books</a></li> <li><a href="/web/20230923045924/https://csrc.nist.gov/publications/other" id="quick-link-other-sm">Other</a></li> </ul> </li> </ul> <span style="display: none;" id="nist-series-pubs-tooltip-lg"> <strong>Final:</strong> <em>Current list of all published NIST cybersecurity documents.</em> Does not include "Withdrawn" documents. Includes FIPS, Special Publications, NISTIRs, ITL Bulletins, and NIST Cybersecurity White Papers.<br/> <br/> <strong>Public Drafts:</strong> <em>Current list of all draft NIST cybersecurity documents--they are typically posted for public comment.</em> "Current" public drafts are the latest draft versions that have not yet been published as "Final." </span> <span style="display: none;" id="nist-view-series-pubs-tooltip-lg"> <strong>FIPS:</strong> <em>Current Federal Information Processing Standard Publications (FIPS).</em> Includes current (Final and Draft) FIPS.<br/> <br/> <strong>SP 800 Series:</strong> <em>Current NIST Special Publication (SP) 800 series publications, which focus on Computer/Information Security.</em> Includes current (Final and Draft) SP 800 pubs.<br/> <br/> <strong>All SP Series:</strong> <em> Current NIST Special Publications (SP), including SP 800 (Computer/Information Security) and SP 1800 (Cybersecurity Practice Guides) pubs. Also includes SP 500 (Computer Systems Technology) pubs related to cybersecurity and privacy. </em> Includes current (Final and Draft) NIST Special Publications.<br/> <br/> <strong>NISTIRs:</strong> <em>Current list of NIST Interagency or Internal Reports (NISTIR) related to cybersecurity and privacy.</em> Includes current (Final and Draft) NISTIRs.<br/> <br/> <strong>ITL Bulletins:</strong> Current list of NIST Information Technology Laboratory (ITL) Bulletins. </span> <span style="display: none;" id="nist-other-pubs-tooltip-lg"> <strong>White Papers:</strong> <em> Consists of NIST Cybersecurity White Papers; NCCoE Project Descriptions, Building Blocks and Use Cases; and other NIST-authored papers that are not part of a formal series. </em> Includes current (Final and Draft) papers.<br/> <br/> <strong>Journal Articles:</strong> NIST-authored articles published in external journals and in the NIST Journal of Research (JRES).<br/> <br/> <strong>Conference Papers:</strong> NIST-authored conference papers related to cybersecurity and privacy.<br/> <br/> <strong>Books:</strong> NIST-authored books, book sections, and encyclopedia entries related to cybersecurity and privacy. </span> </div> </div> </div> </div> <div id="footer-pusher"></div> </div> <footer id="footer"> <div class="container"> <div class="row"> <div class="col-sm-6"> <span class="hidden-xs"> <a href="https://web.archive.org/web/20230923045924/https://www.nist.gov/" title="National Institute of Standards and Technology" rel="home" target="_blank" class="footer-nist-logo" id="footer-nist-logo-link"> <img src="/web/20230923045924im_/https://csrc.nist.gov/CSRC/Media/images/nist-logo-brand-white.svg" alt="National Institute of Standards and Technology logo" id="footer-nist-logo"/> </a> </span> <div class="row footer-contact-container"> <div class="col-sm-12" id="footer-address"> <strong>HEADQUARTERS</strong><br> 100 Bureau Drive<br> Gaithersburg, MD 20899 </div> </div> </div> <div class="col-sm-6"> <ul class="social-list text-right" style="display: block;"> <li class="field-item service-twitter list-horiz"> <a href="https://web.archive.org/web/20230923045924/https://twitter.com/NISTCyber" class="social-btn social-btn--large extlink ext" id="footer-social-twitter-link"> <i class="fa fa-twitter fa-fw"><span class="element-invisible">twitter</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-facebook list-horiz"> <a href="https://web.archive.org/web/20230923045924/https://www.facebook.com/NIST" class="social-btn social-btn--large extlink ext" id="footer-social-facebook-link"> <i class="fa fa-facebook fa-fw"><span class="element-invisible">facebook</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-linkedin list-horiz"> <a href="https://web.archive.org/web/20230923045924/https://www.linkedin.com/company/nist" class="social-btn social-btn--large extlink ext" id="footer-social-linkedin-link"> <i class="fa fa-linkedin fa-fw"><span class="element-invisible">linkedin</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-instagram list-horiz"> <a href="https://web.archive.org/web/20230923045924/https://www.instagram.com/usnistgov/" class="social-btn social-btn--large extlink ext" id="footer-social-instagram-link"> <i class="fa fa-instagram fa-fw"><span class="element-invisible">instagram</span></i> <span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-youtube list-horiz"> <a href="https://web.archive.org/web/20230923045924/https://www.youtube.com/user/USNISTGOV" class="social-btn social-btn--large extlink ext" id="footer-social-youtube-link"> <i class="fa fa-youtube fa-fw"><span class="element-invisible">youtube</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-rss list-horiz"> <a href="https://web.archive.org/web/20230923045924/https://www.nist.gov/news-events/nist-rss-feeds" class="social-btn social-btn--large extlink" id="footer-social-rss-link"> <i class="fa fa-rss fa-fw"><span class="element-invisible">rss</span></i> </a> </li> <li class="field-item service-govdelivery list-horiz last"> <a href="https://web.archive.org/web/20230923045924/https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3" class="social-btn social-btn--large extlink ext" title="Subscribe to CSRC and publication updates, and other NIST cybersecurity news" id="footer-social-govdelivery-link"> <i class="fa fa-envelope fa-fw"><span class="element-invisible">govdelivery</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> </ul> <p class="text-right"> Want updates about CSRC and our publications? <a href="https://web.archive.org/web/20230923045924/https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3" class="btn btn-lg btn-primary" style="background-color: #12659c!important; border-color: #12659c!important;" id="footer-subscribe-link">Subscribe</a> </p> </div> </div> <div class="row hidden-sm hidden-md hidden-lg"> <div class="col-sm-12"> <a href="https://web.archive.org/web/20230923045924/https://www.nist.gov/" title="National Institute of Standards and Technology" rel="home" target="_blank" class="footer-nist-logo" id="footer-bottom-nist-logo-link"> <img src="/web/20230923045924im_/https://csrc.nist.gov/CSRC/Media/images/logo_rev.png" alt="National Institute of Standards and Technology logo" id="footer-bottom-nist-logo"/> </a> </div> </div> <div class="row"> <div class="col-sm-6"> <p> <a href="/web/20230923045924/https://csrc.nist.gov/about/contact" id="footer-contact-us-link">Contact Us</a> | <a href="https://web.archive.org/web/20230923045924/https://www.nist.gov/about-nist/our-organization" style="display: inline-block;" id="footer-org-link">Our Other Offices</a> </p> </div> <div class="col-sm-6"> <span class="pull-right text-right"> Send inquiries to <a href="https://web.archive.org/web/20230923045924/mailto:csrc-inquiry@nist.gov?subject=CSRC Inquiry" style="display: inline-block;" id="footer-inquiries-link">csrc-inquiry@nist.gov</a> </span> </div> </div> <div class="row"> <div class="footer-bottom-links-container" id="footer-bottom-links-container"> <ul> <li><a href="https://web.archive.org/web/20230923045924/https://www.nist.gov/privacy-policy">Site Privacy</a></li> <li><a href="https://web.archive.org/web/20230923045924/https://www.nist.gov/oism/accessibility">Accessibility</a></li> <li><a href="https://web.archive.org/web/20230923045924/https://www.nist.gov/privacy">Privacy Program</a></li> <li><a href="https://web.archive.org/web/20230923045924/https://www.nist.gov/oism/copyrights">Copyrights</a></li> <li><a href="https://web.archive.org/web/20230923045924/https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a></li> <li><a href="https://web.archive.org/web/20230923045924/https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a></li> <li><a href="https://web.archive.org/web/20230923045924/https://www.nist.gov/foia">FOIA</a></li> <li><a href="https://web.archive.org/web/20230923045924/https://www.nist.gov/environmental-policy-statement">Environmental Policy</a></li> <li><a href="https://web.archive.org/web/20230923045924/https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a></li> <li><a href="https://web.archive.org/web/20230923045924/https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a></li> <li><a href="https://web.archive.org/web/20230923045924/https://www.commerce.gov/">Commerce.gov</a></li> <li><a href="https://web.archive.org/web/20230923045924/https://www.science.gov/">Science.gov</a></li> <li><a href="https://web.archive.org/web/20230923045924/https://www.usa.gov/">USA.gov</a></li> <li><a href="https://web.archive.org/web/20230923045924/https://vote.gov/">Vote.gov</a></li> </ul> </div> </div> </div> </footer> <script type="text/javascript" src="/web/20230923045924js_/https://csrc.nist.gov/dist/js/quick-collapse.js"></script> <script type="text/javascript" src="/web/20230923045924js_/https://csrc.nist.gov/dist/app.bundle.js"></script> </body> </html> <!-- FILE ARCHIVED ON 04:59:24 Sep 23, 2023 AND RETRIEVED FROM THE INTERNET ARCHIVE ON 06:51:25 Nov 24, 2024. JAVASCRIPT APPENDED BY WAYBACK MACHINE, COPYRIGHT INTERNET ARCHIVE. ALL OTHER CONTENT MAY ALSO BE PROTECTED BY COPYRIGHT (17 U.S.C. SECTION 108(a)(3)). --> <!-- playback timings (ms): captures_list: 0.464 exclusion.robots: 0.025 exclusion.robots.policy: 0.015 esindex: 0.01 cdx.remote: 5.009 LoadShardBlock: 374.114 (3) PetaboxLoader3.datanode: 225.595 (4) PetaboxLoader3.resolve: 325.653 (2) load_resource: 235.333 -->