CINXE.COM
CSRC Topics - Internet of Things | CSRC
<!DOCTYPE html> <html lang="en-us" xml:lang="en-us"> <head><script type="text/javascript" src="/_static/js/bundle-playback.js?v=HxkREWBo" charset="utf-8"></script> <script type="text/javascript" src="/_static/js/wombat.js?v=txqj7nKC" charset="utf-8"></script> <script>window.RufflePlayer=window.RufflePlayer||{};window.RufflePlayer.config={"autoplay":"on","unmuteOverlay":"hidden"};</script> <script type="text/javascript" src="/_static/js/ruffle/ruffle.js"></script> <script type="text/javascript"> __wm.init("https://web.archive.org/web"); __wm.wombat("https://csrc.nist.gov/topics/applications/internet-of-things","20231208150822","https://web.archive.org/","web","/_static/", "1702048102"); </script> <link rel="stylesheet" type="text/css" href="/_static/css/banner-styles.css?v=S1zqJCYt" /> <link rel="stylesheet" type="text/css" href="/_static/css/iconochive.css?v=3PDvdIFv" /> <!-- End Wayback Rewrite JS Include --> <meta charset="utf-8"/> <title>CSRC Topics - Internet of Things | CSRC</title> <meta http-equiv="content-type" content="text/html; charset=UTF-8"/> <meta http-equiv="content-style-type" content="text/css"/> <meta http-equiv="content-script-type" content="text/javascript"/> <meta name="viewport" content="width=device-width, initial-scale=1.0"/> <meta name="msapplication-config" content="/CSRC/Media/images/favicons/browserconfig.xml"/> <meta name="theme-color" content="#000000"/> <meta name="google-site-verification" content="xbrnrVYDgLD-Bd64xHLCt4XsPXzUhQ-4lGMj4TdUUTA"/> <meta name="description" content="Use these CSRC Topics to identify and learn more about NIST's cybersecurity Projects, Publications, News, Events and Presentations."/> <meta name="dcterms.title" content="CSRC Topic: Internet of Things | CSRC"/> <meta name="dcterms.description" content="Use these CSRC Topics to identify and learn more about NIST's cybersecurity Projects, Publications, News, Events and Presentations."/> <meta name="dcterms.creator" content="Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, U.S. Department of Commerce"/> <meta name="dcterms.date.created" scheme="ISO8601" content="2016-06-07"/> <meta name="dcterms.date.reviewed" scheme="ISO8601" content="2020-07-22"/> <meta name="dcterms.language" scheme="DCTERMS.RFC1766" content="EN-US"/> <!-- Facebook OpenGraph Tags --> <meta name="og:site_name" content="CSRC | NIST"/> <meta name="og:type" content="article"/> <meta name="og:url" content="https://web.archive.org/web/20231208150822im_/https://csrc.nist.gov/topics/applications/internet-of-things"/> <meta name="og:title" content="CSRC Topic: Internet of Things | CSRC"/> <meta name="og:description" content="Use these CSRC Topics to identify and learn more about NIST's cybersecurity Projects, Publications, News, Events and Presentations."/> <meta name="article:tag" content="Internet of Things"/> <meta name="article:published_time" content="2016-06-07"/> <meta name="article:modified_time" content="2020-07-22"/> <link rel="apple-touch-icon" sizes="180x180" href="/web/20231208150822im_/https://csrc.nist.gov/images/icons/apple-touch-icon.png"/> <link rel="icon" type="image/png" href="/web/20231208150822im_/https://csrc.nist.gov/images/icons/favicon-32x32.png" sizes="32x32"/> <link rel="icon" type="image/png" href="/web/20231208150822im_/https://csrc.nist.gov/images/icons/favicon-16x16.png" sizes="16x16"/> <link rel="manifest" href="/web/20231208150822/https://csrc.nist.gov/images/icons/manifest.json"/> <link rel="mask-icon" href="/web/20231208150822im_/https://csrc.nist.gov/images/icons/safari-pinned-tab.svg" color="#000000"/> <link href="/web/20231208150822im_/https://csrc.nist.gov/CSRC/Media/images/favicons/favicon.ico" type="image/x-icon" rel="shortcut icon"/> <link href="/web/20231208150822im_/https://csrc.nist.gov/CSRC/Media/images/favicons/favicon.ico" type="image/x-icon" rel="icon"/> <link href="/web/20231208150822cs_/https://csrc.nist.gov/dist/app.css" rel="stylesheet"/> <!-- reCAPTCHA v3 --> <style> .grecaptcha-badge { visibility: hidden; } </style> <script async type="text/javascript" id="_fed_an_ua_tag" src="https://web.archive.org/web/20231208150822js_/https://dap.digitalgov.gov/Universal-Federated-Analytics-Min.js?agency=nist&subagency=csrc&pua=UA-66610693-15&yt=true&exts=xsd,xml,wav,mpg,mpeg,avi,rtf,webm,ogg,ogv,oga,map,otf,eot,svg,ttf,woff"></script> <style id="antiClickjackCss"> body > * { display: none !important; } #antiClickjack { display: block !important; } </style> <noscript> <style id="antiClickjackNoScript"> body > * { display: block !important; } #antiClickjack { display: none !important; } </style> </noscript> <script type="text/javascript" id="antiClickjackScript"> if (self === top) { // no clickjacking var antiClickjack = document.getElementById("antiClickjackCss"); antiClickjack.parentNode.removeChild(antiClickjack); } else { setTimeout(tryForward(), 5000); } function tryForward() { top.location = self.location; } </script> <!-- Google tag (gtag.js) --> <script async src="https://web.archive.org/web/20231208150822js_/https://www.googletagmanager.com/gtag/js?id=G-TSQ0PLGJZP"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-TSQ0PLGJZP'); </script> <!-- Google Tag Manager --> <script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start':new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0],j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https://web.archive.org/web/20231208150822/https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer','GTM-MZQC4NCJ');</script> <!-- End Google Tag Manager --> </head> <body> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://web.archive.org/web/20231208150822if_/https://www.googletagmanager.com/ns.html?id=GTM-MZQC4NCJ" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <div id="antiClickjack" style="display: none;"> <strong style="font-size: 1.6rem;">You are viewing this page in an unauthorized frame window.</strong> <p>This is a potential security issue, you are being redirected to <a href="https://web.archive.org/web/20231208150822/https://csrc.nist.gov/">https://csrc.nist.gov</a>.</p> </div> <section class="usa-banner" aria-label="Official government website"> <div class="usa-accordion container"> <header class="usa-banner__header"> <noscript> <p style="font-size: 0.85rem; font-weight: bold;">You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.</p> </noscript> <img class="usa-banner__header-flag" src="/web/20231208150822im_/https://csrc.nist.gov/images/usbanner/us_flag_small.png" alt="U.S. flag"> <span class="usa-banner__header-text">An official website of the United States government</span> <button id="gov-banner-button" class="usa-accordion__button usa-banner__button" data-toggle="collapse" data-target="#gov-banner" aria-expanded="true" aria-controls="gov-banner"> <span class="usa-banner__button-text">Here's how you know</span> </button> </header> <div class="usa-banner__content usa-accordion__content collapse in" role="tabpanel" id="gov-banner" aria-expanded="true"> <div class="row"> <div class="col-md-5 col-sm-12"> <div class="row"> <div class="col-sm-2 col-xs-3"> <img class="usa-banner__icon usa-media-block__img" src="/web/20231208150822im_/https://csrc.nist.gov/images/usbanner/icon-dot-gov.svg" alt="Dot gov"> </div> <div class="col-sm-10 col-xs-9"> <p> <strong>Official websites use .gov</strong> <br> A <strong>.gov</strong> website belongs to an official government organization in the United States. </p> </div> </div> </div> <div class="col-md-5 col-sm-12"> <div class="row"> <div class="col-sm-2 col-xs-3"> <img class="usa-banner__icon usa-media-block__img" src="/web/20231208150822im_/https://csrc.nist.gov/images/usbanner/icon-https.svg" alt="Https"> </div> <div class="col-sm-10 col-xs-9"> <p> <strong>Secure .gov websites use HTTPS</strong> <br> A <strong>lock</strong> (<img class="usa-banner__lock" src="/web/20231208150822im_/https://csrc.nist.gov/images/usbanner/lock.svg" alt="Dot gov">) or <strong>https://</strong> means you've safely connected to the .gov website. Share sensitive information only on official, secure websites. </p> </div> </div> </div> </div> </div> </div> </section> <nav id="navbar" class="navbar"> <div id="nist-menu-container" class="container"> <div class="row"> <!-- Brand --> <div class="col-xs-6 col-md-4 navbar-header"> <a class="navbar-brand" href="https://web.archive.org/web/20231208150822/https://www.nist.gov/" target="_blank" id="navbar-brand-image"> <img src="/web/20231208150822im_/https://csrc.nist.gov/CSRC/media/images/svg/nist-logo.svg" alt="National Institute of Standards and Technology" width="110" height="30"> </a> </div> <div class="col-xs-6 col-md-8 navbar-nist-logo"> <div class="form-inline hidden-sm hidden-xs"> <form name="site-search" id="site-search-form" action="/web/20231208150822/https://csrc.nist.gov/search" method="GET"> <label for="search-csrc-query" class="element-invisible">Search</label> <input autocomplete="off" class="form-control" id="search-csrc-query" name="keywords" type="text" size="15" maxlength="128" placeholder="Search CSRC"/> <input type="hidden" name="ipp" value="25"/> <input type="hidden" name="sortBy" value="relevance"/> <input type="hidden" name="showOnly" value="publications,projects,news,events,presentations,glossary,topics"/> <input type="hidden" name="topicsMatch" value="ANY"/> <input type="hidden" name="status" value="Final,Draft"/> <button type="submit" id="search-csrc-submit-btn" class="form-submit"> <span class="element-invisible">Search</span> <i class="fa fa-search"></i> </button> </form> </div> <span id="nvd-menu-button" class="pull-right"> <a href="#" id="nvd-menu-button-link"> <span class="fa fa-bars"></span> <span id="nvd-menu-full-text">CSRC MENU</span> </a> </span> </div> </div> </div> <div class="form-inline hidden-md hidden-lg"> <form name="site-search-mobile" id="site-search-form-mobile" action="/web/20231208150822/https://csrc.nist.gov/search" method="GET"> <label for="search-csrc-query-mobile" class="element-invisible">Search</label> <input autocomplete="off" class="form-control" id="search-csrc-query-mobile" name="keywords" type="text" size="15" maxlength="128" placeholder="Search CSRC"/> <button type="submit" id="search-csrc-submit-btn-mobile" class="form-submit"> <span class="element-invisible">Search</span> <i class="fa fa-search"></i> </button> </form> </div> <div class="main-menu-row container"> <!-- Collect the nav links, forms, and other content for toggling --> <div id="main-menu-drop" class="col-lg-12" style="display: none;"> <ul> <li><a href="/web/20231208150822/https://csrc.nist.gov/projects">Projects</a></li> <li> <a href="/web/20231208150822/https://csrc.nist.gov/publications"> Publications <span class="expander fa fa-plus" id="main-menu-pubs-expander" data-expander-name="publications" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="publications" id="main-menu-pubs-expanded"> <div class="row"> <div class="col-lg-4"> <p><a href="/web/20231208150822/https://csrc.nist.gov/publications/drafts-open-for-comment">Drafts for Public Comment</a></p> <p><a href="/web/20231208150822/https://csrc.nist.gov/publications/draft-pubs">All Public Drafts</a></p> <p><a href="/web/20231208150822/https://csrc.nist.gov/publications/final-pubs">Final Pubs</a></p> <p><a href="/web/20231208150822/https://csrc.nist.gov/publications/fips">FIPS <small>(standards)</small></a></p> </div> <div class="col-lg-4"> <p><a href="/web/20231208150822/https://csrc.nist.gov/publications/sp">Special Publications (SP<small>s</small>)</a></p> <p><a href="/web/20231208150822/https://csrc.nist.gov/publications/ir">IR <small>(interagency/internal reports)</small></a></p> <p><a href="/web/20231208150822/https://csrc.nist.gov/publications/cswp">CSWP <small>(cybersecurity white papers)</small></a></p> <p><a href="/web/20231208150822/https://csrc.nist.gov/publications/itl-bulletin">ITL Bulletins</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20231208150822/https://csrc.nist.gov/publications/project-description">Project Descriptions</a></p> <p><a href="/web/20231208150822/https://csrc.nist.gov/publications/journal-article">Journal Articles</a></p> <p><a href="/web/20231208150822/https://csrc.nist.gov/publications/conference-paper">Conference Papers</a></p> <p><a href="/web/20231208150822/https://csrc.nist.gov/publications/book">Books</a></p> </div> </div> </div> </li> <li> <a href="/web/20231208150822/https://csrc.nist.gov/topics"> Topics <span class="expander fa fa-plus" id="main-menu-topics-expander" data-expander-name="topics" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="topics" id="main-menu-topics-expanded"> <div class="row"> <div class="col-lg-4"> <p><a href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy">Security & Privacy</a></p> <p><a href="/web/20231208150822/https://csrc.nist.gov/Topics/Applications">Applications</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20231208150822/https://csrc.nist.gov/Topics/Technologies">Technologies</a></p> <p><a href="/web/20231208150822/https://csrc.nist.gov/Topics/Sectors">Sectors</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20231208150822/https://csrc.nist.gov/Topics/Laws-and-Regulations">Laws & Regulations</a></p> <p><a href="/web/20231208150822/https://csrc.nist.gov/Topics/Activities-and-Products">Activities & Products</a></p> </div> </div> </div> </li> <li><a href="/web/20231208150822/https://csrc.nist.gov/news">News & Updates</a></li> <li><a href="/web/20231208150822/https://csrc.nist.gov/events">Events</a></li> <li><a href="/web/20231208150822/https://csrc.nist.gov/glossary">Glossary</a></li> <li> <a href="/web/20231208150822/https://csrc.nist.gov/about"> About CSRC <span class="expander fa fa-plus" id="main-menu-about-expander" data-expander-name="about" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="about" id="main-menu-about-expanded"> <div class="row"> <div class="col-lg-6"> <p> <strong><a href="/web/20231208150822/https://csrc.nist.gov/Groups/Computer-Security-Division">Computer Security Division</a></strong><br/> <ul> <li><a href="/web/20231208150822/https://csrc.nist.gov/Groups/Computer-Security-Division/Cryptographic-Technology">Cryptographic Technology</a></li> <li><a href="/web/20231208150822/https://csrc.nist.gov/Groups/Computer-Security-Division/Secure-Systems-and-Applications">Secure Systems and Applications</a></li> <li><a href="/web/20231208150822/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Components-and-Mechanisms">Security Components and Mechanisms</a></li> <li><a href="/web/20231208150822/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Engineering-and-Risk-Management">Security Engineering and Risk Management</a></li> <li><a href="/web/20231208150822/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Testing-Validation-and-Measurement">Security Testing, Validation, and Measurement</a></li> </ul> </p> </div> <div class="col-lg-6"> <p> <strong><a href="/web/20231208150822/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division">Applied Cybersecurity Division</a></strong><br/> <ul> <li><a href="/web/20231208150822/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division/Cybersecurity-and-Privacy-Applications">Cybersecurity and Privacy Applications</a></li> <li><a href="/web/20231208150822/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division/National-Cybersecurity-Center-of-Excellence">National Cybersecurity Center of Excellence (NCCoE)</a></li> <li><a href="https://web.archive.org/web/20231208150822/https://www.nist.gov/nice/">National Initiative for Cybersecurity Education (NICE)</a></li> </ul> </p> <p> <a href="/web/20231208150822/https://csrc.nist.gov/contact"> Contact Us </a> </p> </div> </div> </div> </li> </ul> </div><!-- /#mobile-nav-container --> </div> </nav> <section id="itl-header" class="has-menu"> <div class="container"> <div class="row"> <div class="col-sm-12 col-md-8"> <div class="hidden-xs hidden-sm" id="itl-header-lg"> <a href="https://web.archive.org/web/20231208150822/https://www.nist.gov/itl" target="_blank" id="itl-header-link">Information Technology Laboratory</a> </div> <div class="hidden-xs hidden-sm" id="csrc-header-lg"> <a href="/web/20231208150822/https://csrc.nist.gov/" id="csrc-header-link-lg">Computer Security Resource Center</a> </div> </div> <div class="col-sm-12 col-md-4"> <div class="hidden-xs hidden-sm hidden-md"> <a id="logo-csrc-lg" href="/web/20231208150822/https://csrc.nist.gov/"><img id="img-logo-csrc-lg" src="/web/20231208150822im_/https://csrc.nist.gov/CSRC/Media/images/nist-logo-csrc-white.svg" alt="CSRC Logo" class="csrc-header-logo"></a> </div> <div class="hidden-lg"> <a id="logo-csrc-sm" href="/web/20231208150822/https://csrc.nist.gov/"><img id="img-logo-csrc-sm" src="/web/20231208150822im_/https://csrc.nist.gov/CSRC/Media/images/nist-logo-csrc-white.svg" alt="CSRC Logo" class="csrc-header-logo"></a> </div> </div> </div> </div> </section> <div id="body-section" class="container"> <div class="breadcrumb"> <a href="/web/20231208150822/https://csrc.nist.gov/topics" class="breadcrumb-link">Topics</a> <a href="/web/20231208150822/https://csrc.nist.gov/topics/applications" class="breadcrumb-link">Applications</a> </div> <div class="topics-content"> <h1 id="page-name">Internet of Things <small id="page-acronym">IoT</small> </h1> <div class="page-social-buttons" id=""page-social-buttons""> <a href="https://web.archive.org/web/20231208150822/https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fcsrc.nist.gov%2Ftopics%2Fapplications%2Finternet-of-things" class="social-facebook"><i class="fa fa-facebook fa-fw" aria-hidden="true"></i><span class="sr-only">Share to Facebook</span></a> <a href="https://web.archive.org/web/20231208150822/https://twitter.com/share?url=https%3A%2F%2Fcsrc.nist.gov%2Ftopics%2Fapplications%2Finternet-of-things" class="social-twitter"><i class="fa fa-twitter fa-fw" aria-hidden="true"></i><span class="sr-only">Share to Twitter</span></a> <a href="https://web.archive.org/web/20231208150822/https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fcsrc.nist.gov%2Ftopics%2Fapplications%2Finternet-of-things&source=csrc.nist.gov" class="social-linked-in"><i class="fa fa-linkedin fa-fw" aria-hidden="true"></i><span class="sr-only">Share to LinkedIn</span></a> <a href="https://web.archive.org/web/20231208150822/mailto:/?subject=csrc.nist.gov&body=Check out this site https://csrc.nist.gov/topics/applications/internet-of-things" class="social-email"><i class="fa fa-envelope fa-fw" aria-hidden="true"></i><span class="sr-only">Share ia Email</span></a> </div> <div class="row"> <div class="col-md-8 col-sm-12"> <div style="margin-bottom: 1.4rem;" id="page-description">See the <a href="https://web.archive.org/web/20231208150822/https://www.nist.gov/programs-projects/nist-cybersecurity-iot-program">NIST Cybersecurity for IoT Program </a>for details about how the Applied Cybersecurity Division supports the development and application of standards, guidelines, and related tools to improve the cybersecurity of connected devices and the environments in which they are deployed. <br/> <br/> [This "Internet of Things" CSRC topic page consolidates content related to IoT that exists on the CSRC website.]</div> <div class="topics-related-list" id="related-proj-list"> <h3><i class="fa fa-folder-o"></i> Related Projects</h3> <div class="related-list-item" id="related-proj-0"> <strong><a href="/web/20231208150822/https://csrc.nist.gov/Projects/human-centered-cybersecurity" id="related-proj-name-0">Human-Centered Cybersecurity</a> <small id="related-proj-acronym-0"></small></strong><br/> <span id="related-proj-overview-0">The National Institute of Standards and Technology (NIST) Human-Centered Cybersecurity program...</span> </div> <div class="related-list-item" id="related-proj-1"> <strong><a href="/web/20231208150822/https://csrc.nist.gov/Projects/nist-cybersecurity-iot-program" id="related-proj-name-1">NIST Cybersecurity for IoT Program</a> <small id="related-proj-acronym-1"></small></strong><br/> <span id="related-proj-overview-1">[Redirect to https://www.nist.gov/programs-projects/nist-cybersecurity-iot-program] NIST’s...</span> </div> <div class="related-list-item" id="related-proj-2"> <strong><a href="/web/20231208150822/https://csrc.nist.gov/Projects/Software-Identification-SWID" id="related-proj-name-2">Software Identification (SWID) Tagging</a> <small id="related-proj-acronym-2">SWID</small></strong><br/> <span id="related-proj-overview-2">Software is vital to our economy and way of life as part of the critical infrastructure for the...</span> </div> <p><strong> <a href="/web/20231208150822/https://csrc.nist.gov/projects?sortBy-lg=Name+ASC&ipp-lg=25&topics-lg=27464%7cInternet+of+Things&topicsMatch-lg=ANY" id="related-proj-all-link">View All Projects</a> </strong></p> </div> <div class="event-list" id="related-event-list"> <h3><i class="fa fa-calendar-o"></i> Related Events</h3> <div class="event-list-item" id="related-event-0"> <strong><a href="/web/20231208150822/https://csrc.nist.gov/Events/2019/human-factors-in-smart-home-technologies" id="related-event-link-0">Human Factors in Smart Home Technologies</a></strong><br/> <small><strong> <span id="related-event-start-date-0">September 24, 2019</span> </strong></small><br/> <span id="related-event-desc-0">Human Factors in Smart Home Technologies Workshop September 24, 2019 National Institute of...</span> </div> <div class="event-list-item" id="related-event-1"> <strong><a href="/web/20231208150822/https://csrc.nist.gov/Events/2018/Second-Workshop-on-Enhancing-Internet-Resilience" id="related-event-link-1">Second Workshop on Enhancing Resilience of the Internet and Communications Ecosystem</a></strong><br/> <small><strong> <span id="related-event-start-date-1">February 28, 2018</span> to <span id="related-event-end-date-1">March 1, 2018</span> </strong></small><br/> <span id="related-event-desc-1">This workshop will discuss substantive public comments, including open issues) on a draft report...</span> </div> <div class="event-list-item" id="related-event-2"> <strong><a href="/web/20231208150822/https://csrc.nist.gov/Events/2017/ISPAB-October-2017-Meeting" id="related-event-link-2">ISPAB October 2017 Meeting</a></strong><br/> <small><strong> <span id="related-event-start-date-2">October 25, 2017</span> to <span id="related-event-end-date-2">October 27, 2017</span> </strong></small><br/> <span id="related-event-desc-2">See the Federal Register Notice from October 3, 2017 for meeting details. Approved Minutes from the...</span> </div> <div class="event-list-item" id="related-event-3"> <strong><a href="/web/20231208150822/https://csrc.nist.gov/Events/2017/IoT-Cybersecurity-Colloquium" id="related-event-link-3">IoT Cybersecurity Colloquium</a></strong><br/> <small><strong> <span id="related-event-start-date-3">October 19, 2017</span> </strong></small><br/> <span id="related-event-desc-3">On October 19th, 2017, NIST is hosting the IoT Cybersecurity Colloquium to convene stakeholders from...</span> </div> <div class="event-list-item" id="related-event-4"> <strong><a href="/web/20231208150822/https://csrc.nist.gov/Events/2016/ISPAB-June-2016-Meeting" id="related-event-link-4">ISPAB June 2016 Meeting</a></strong><br/> <small><strong> <span id="related-event-start-date-4">June 15, 2016</span> to <span id="related-event-end-date-4">June 17, 2016</span> </strong></small><br/> <span id="related-event-desc-4">The Information Security and Privacy Advisory Board (ISPAB) met from June 15-17, 2016, at the U.S....</span> </div> <p><strong> <a href="/web/20231208150822/https://csrc.nist.gov/events?sortBy-lg=StartDateTime+DESC&ipp-lg=25&topics-lg=27464%7cInternet+of+Things&topicsMatch-lg=ANY" id="related-event-all-link">View All Events</a> </strong></p> </div> <div class="news-list" id="related-news-list"> <h3><i class="fa fa-newspaper-o"></i> Related News</h3> <div class="news-list-item" id="related-news-item-0"> <strong><a href="/web/20231208150822/https://csrc.nist.gov/News/2023/nist-publishes-sp-800-82-revision-3" id="related-news-link-0">NIST Publishes SP 800-82, Revision 3</a></strong><br/> <small><strong id="related-news-date-0">September 28, 2023</strong></small><br/> <span id="related-news-desc-0">NIST has published "Special Publication (SP) 800-82r3 (Revision 3), Guide to Operational Technology...</span> </div> <div class="news-list-item" id="related-news-item-1"> <strong><a href="/web/20231208150822/https://csrc.nist.gov/News/2023/sp-1800-36-2nd-prelim-draft-vols-a-d" id="related-news-link-1">SP 1800-36, 2nd Preliminary Draft of Vols. A and D</a></strong><br/> <small><strong id="related-news-date-1">September 26, 2023</strong></small><br/> <span id="related-news-desc-1">The NCCoE has released the second preliminary drafts of NIST SP 1800-36, Vols. A and D, “Trusted...</span> </div> <div class="news-list-item" id="related-news-item-2"> <strong><a href="/web/20231208150822/https://csrc.nist.gov/News/2023/just-released-nist-csf-2-0-reference-tool" id="related-news-link-2">Just released: NIST Cybersecurity Framework 2.0 Reference Tool!</a></strong><br/> <small><strong id="related-news-date-2">August 15, 2023</strong></small><br/> <span id="related-news-desc-2">Today, NIST is officially unveiling our new Cybersecurity Framework (CSF) 2.0 Reference Tool.</span> </div> <div class="news-list-item" id="related-news-item-3"> <strong><a href="/web/20231208150822/https://csrc.nist.gov/News/2023/draft-nist-sp-1800-36-vols-be-available-comment" id="related-news-link-3">Draft NIST SP 1800-36, Vols. B–E available for public comment</a></strong><br/> <small><strong id="related-news-date-3">May 3, 2023</strong></small><br/> <span id="related-news-desc-3">The NCCoE has released the preliminary public drafts of NIST SP 1800-36, Vols. B –E, Trusted...</span> </div> <div class="news-list-item" id="related-news-item-4"> <strong><a href="/web/20231208150822/https://csrc.nist.gov/News/2022/nist-iot-cybersecurity-program-nist-irs-8425-8431" id="related-news-link-4">NIST IoT Cybersecurity Program Releases Two New Documents</a></strong><br/> <small><strong id="related-news-date-4">September 20, 2022</strong></small><br/> <span id="related-news-desc-4">The National Institute of Standards and Technology (NIST) Cybersecurity for the Internet of Things...</span> </div> <p><strong> <a href="/web/20231208150822/https://csrc.nist.gov/news?sortBy-lg=NewsDateTime+DESC&ipp-lg=25&topics-lg=27464%7cInternet+of+Things&topicsMatch-lg=ANY" id="related-news-all-link">View All News</a> </strong></p> </div> <div class="topics-related-list" id="related-pubs-list"> <h3><i class="fa fa-file-text-o"></i> Related Publications</h3> <div class="related-list-item" id="related-pubs-item-0"> <strong><a href="/web/20231208150822/https://csrc.nist.gov/pubs/sp/800/124/r2/final" id="related-pubs-link-0">Managing the Security of Mobile Devices in the Enterprise</a></strong><br/> <strong><small id="related-pubs-title-0">SP 800-124 Rev. 2</small></strong><br/> <strong><small id="related-pubs-date-0" data-date-type="citation">May 2023</small></strong><br/> <span id="related-pubs-status-0">Final</span> </div> <div class="related-list-item" id="related-pubs-item-1"> <strong><a href="/web/20231208150822/https://csrc.nist.gov/pubs/sp/1800/36/iprd" id="related-pubs-link-1">Trusted IoT Device Network-Layer Onboarding and LC Management</a></strong><br/> <strong><small id="related-pubs-title-1">SP 1800-36 (Initial Preliminary Draft)</small></strong><br/> <strong><small id="related-pubs-date-1" data-date-type="citation">May 3, 2023</small></strong><br/> <span id="related-pubs-status-1">Withdrawn</span> </div> <div class="related-list-item" id="related-pubs-item-2"> <strong><a href="/web/20231208150822/https://csrc.nist.gov/pubs/sp/1800/36/iprd-(1)" id="related-pubs-link-2">Trusted IoT Device Network-Layer Onboarding and LC Management</a></strong><br/> <strong><small id="related-pubs-title-2">SP 1800-36 (Initial Preliminary Draft)</small></strong><br/> <strong><small id="related-pubs-date-2" data-date-type="citation">December 5, 2022</small></strong><br/> <span id="related-pubs-status-2">Withdrawn</span> </div> <div class="related-list-item" id="related-pubs-item-3"> <strong><a href="/web/20231208150822/https://csrc.nist.gov/pubs/ir/8431/final" id="related-pubs-link-3">Workshop Summary Report for Next Steps in IoT Cybersecurity</a></strong><br/> <strong><small id="related-pubs-title-3">IR 8431</small></strong><br/> <strong><small id="related-pubs-date-3" data-date-type="citation">September 2022</small></strong><br/> <span id="related-pubs-status-3">Final</span> </div> <div class="related-list-item" id="related-pubs-item-4"> <strong><a href="/web/20231208150822/https://csrc.nist.gov/pubs/ir/8425/final" id="related-pubs-link-4">Profile of the IoT Core Baseline for Consumer IoT Products</a></strong><br/> <strong><small id="related-pubs-title-4">IR 8425</small></strong><br/> <strong><small id="related-pubs-date-4" data-date-type="citation">September 2022</small></strong><br/> <span id="related-pubs-status-4">Final</span> </div> <p><strong> <a href="/web/20231208150822/https://csrc.nist.gov/publications/search?sortBy-lg=relevance&viewMode-lg=brief&ipp-lg=25&status-lg=Draft%2CFinal&topics-lg=27464%7cInternet+of+Things&topicsMatch-lg=ANY&controlsMatch-lg=ANY" id="related-pubs-all-link">View All Publications</a> </strong></p> </div> <div class="topics-related-list" id="related-pres-list"> <h3><i class="fa fa-desktop"></i> Related Presentations</h3> <div class="related-list-item" id="presentation-container-0"> <strong><a href="/web/20231208150822/https://csrc.nist.gov/Presentations/2023/iot-cybersecurity-strategies" id="presentation-link-0">IoT Cybersecurity: Strategies, Laws, Guidance, Labels, and some Working Group Updates too…</a></strong><br/> <strong><small> <span><span id="presentation-type-0">Presentation</span> - </span> <span id="presentation-date-0">September 12, 2023</span> </small></strong> </div> <div class="related-list-item" id="presentation-container-1"> <strong><a href="/web/20231208150822/https://csrc.nist.gov/Presentations/2022/overview-of-sp-800-213-213a" id="presentation-link-1">Overview of SP 800-213 / 213A: IoT Device Cybersecurity Guidance for the Federal Government</a></strong><br/> <strong><small> <span><span id="presentation-type-1">Presentation</span> - </span> <span id="presentation-date-1">May 17, 2022</span> </small></strong> </div> <div class="related-list-item" id="presentation-container-2"> <strong><a href="/web/20231208150822/https://csrc.nist.gov/Presentations/2021/requirements-for-post-quantum-cryptography-on-embe" id="presentation-link-2">Requirements for Post-Quantum Cryptography on Embedded Devices in the IoT</a></strong><br/> <strong><small> <span><span id="presentation-type-2">Presentation</span> - </span> <span id="presentation-date-2">June 8, 2021</span> </small></strong> </div> <div class="related-list-item" id="presentation-container-3"> <strong><a href="/web/20231208150822/https://csrc.nist.gov/Presentations/2020/smart-home-consumers-privacy-security-perceptions" id="presentation-link-3">Smart Home Consumers' Privacy and Security Perceptions and Practices</a></strong><br/> <strong><small> <span><span id="presentation-type-3">Presentation</span> - </span> <span id="presentation-date-3">December 7, 2020</span> </small></strong> </div> <div class="related-list-item" id="presentation-container-4"> <strong><a href="/web/20231208150822/https://csrc.nist.gov/Presentations/2019/consumer-perceptions-smart-home-privacy-security" id="presentation-link-4">Consumer Perceptions of Smart Home Privacy and Security</a></strong><br/> <strong><small> <span><span id="presentation-type-4">Presentation</span> - </span> <span id="presentation-date-4">September 26, 2019</span> </small></strong> </div> <p><strong> <a href="/web/20231208150822/https://csrc.nist.gov/search?ipp=25&sortBy=relevance&showOnly=presentations&topicsMatch=ANY&topics=27464%7cInternet+of+Things" id="related-pers-all-link">View All Presentations</a> </strong></p> </div> </div> <div class="col-md-4 col-sm-12"> <div class="bs-callout bs-callout-danger hidden-sm hidden-xs hidden-xxs" id="used-for-callout"> <h4>Used For</h4> <span id="used-for-content">IoT; Networks of Things; NoT</span> </div> <div class="bs-callout bs-callout-warning topics-tree" id="topics-callout"> <h4>Topics</h4> <div class="category-topics-container" id="tcd-category-topics-container"><ul><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24663-24670"></i> <strong><a data-topic-id="24670" data-topic-text="Security and Privacy" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy">Security and Privacy</a></strong><ul style="display: none;"><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24670-27481"></i> <a data-topic-id="27481" data-topic-text="cryptography" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/cryptography">cryptography</a><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27647" data-topic-text="digital signatures" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/cryptography/digital-signatures">digital signatures</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27648" data-topic-text="encryption" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/cryptography/encryption">encryption</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27649" data-topic-text="key management" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/cryptography/key-management">key management</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="30027" data-topic-text="lightweight cryptography" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/cryptography/lightweight-cryptography">lightweight cryptography</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27650" data-topic-text="message authentication" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/cryptography/message-authentication">message authentication</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27651" data-topic-text="post-quantum cryptography" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/cryptography/post-quantum-cryptography">post-quantum cryptography</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27652" data-topic-text="random number generation" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/cryptography/random-number-generation">random number generation</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27653" data-topic-text="secure hashing" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/cryptography/secure-hashing">secure hashing</a></li></ul> </li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27482" data-topic-text="cybersecurity supply chain risk management" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/cyber-supply-chain-risk-management">cybersecurity supply chain risk management</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27483" data-topic-text="general security & privacy" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/general-security-and-privacy">general security & privacy</a></li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24670-27484"></i> <a data-topic-id="27484" data-topic-text="identity & access management" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/identity-and-access-management">identity & access management</a><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27663" data-topic-text="access authorization" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/identity-and-access-management/access-authorization">access authorization</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27664" data-topic-text="access control" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/identity-and-access-management/access-control">access control</a></li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-27484-27665"></i> <a data-topic-id="27665" data-topic-text="authentication" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/identity-and-access-management/authentication">authentication</a><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="36231" data-topic-text="passwords" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/identity-and-access-management/authentication/passwords">passwords</a></li></ul> </li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27666" data-topic-text="Personal Identity Verification" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/identity-and-access-management/PIV">Personal Identity Verification</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27667" data-topic-text="public key infrastructure" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/identity-and-access-management/PKI">public key infrastructure</a></li></ul> </li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24670-27485"></i> <a data-topic-id="27485" data-topic-text="privacy" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/privacy">privacy</a><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27680" data-topic-text="personally identifiable information" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/privacy/personally-identifiable-information">personally identifiable information</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27681" data-topic-text="privacy engineering" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/privacy/privacy-engineering">privacy engineering</a></li></ul> </li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24670-27486"></i> <a data-topic-id="27486" data-topic-text="risk management" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/risk-management">risk management</a><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27682" data-topic-text="categorization" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/risk-management/categorization">categorization</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27683" data-topic-text="continuous monitoring" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/risk-management/continuous-monitoring">continuous monitoring</a></li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-27486-27684"></i> <a data-topic-id="27684" data-topic-text="controls" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/risk-management/controls">controls</a><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27767" data-topic-text="controls assessment" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/risk-management/controls/controls-assessment">controls assessment</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27768" data-topic-text="privacy controls" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/risk-management/controls/privacy-controls">privacy controls</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27769" data-topic-text="security controls" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/risk-management/controls/security-controls">security controls</a></li></ul> </li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27685" data-topic-text="risk assessment" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/risk-management/risk-assessment">risk assessment</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27686" data-topic-text="roots of trust" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/risk-management/roots-of-trust">roots of trust</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27687" data-topic-text="system authorization" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/risk-management/system-authorization">system authorization</a></li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-27486-27688"></i> <a data-topic-id="27688" data-topic-text="threats" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/risk-management/threats">threats</a><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27770" data-topic-text="advanced persistent threats" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/risk-management/threats/advanced-persistent-threats">advanced persistent threats</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27771" data-topic-text="botnets" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/risk-management/threats/botnets">botnets</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27772" data-topic-text="information sharing" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/risk-management/threats/information-sharing">information sharing</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27773" data-topic-text="intrusion detection & prevention" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/risk-management/threats/intrusion-detection-and-prevention">intrusion detection & prevention</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27774" data-topic-text="malware" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/risk-management/threats/malware">malware</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="36186" data-topic-text="phishing" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/risk-management/threats/phishing">phishing</a></li></ul> </li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27689" data-topic-text="vulnerability management" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/risk-management/vulnerability-management">vulnerability management</a></li></ul> </li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24670-27487"></i> <a data-topic-id="27487" data-topic-text="security & behavior" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/security-and-behavior">security & behavior</a><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27709" data-topic-text="accessibility" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/security-and-behavior/accessibility">accessibility</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27710" data-topic-text="behavior" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/security-and-behavior/behavior">behavior</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27711" data-topic-text="usability" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/security-and-behavior/usability">usability</a></li></ul> </li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24670-27488"></i> <a data-topic-id="27488" data-topic-text="security measurement" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/security-measurement">security measurement</a><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27690" data-topic-text="analytics" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/security-measurement/analytics">analytics</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27691" data-topic-text="assurance" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/security-measurement/assurance">assurance</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27692" data-topic-text="modeling" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/security-measurement/modeling">modeling</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27693" data-topic-text="testing & validation" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/security-measurement/testing-and-validation">testing & validation</a></li></ul> </li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24670-27489"></i> <a data-topic-id="27489" data-topic-text="security programs & operations" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/security-programs-and-operations">security programs & operations</a><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27694" data-topic-text="acquisition" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/security-programs-and-operations/acquisition">acquisition</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27695" data-topic-text="asset management" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/security-programs-and-operations/asset-management">asset management</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27696" data-topic-text="audit & accountability" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/security-programs-and-operations/audit-and-accountability">audit & accountability</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27697" data-topic-text="awareness training & education" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/security-programs-and-operations/awareness-training-education">awareness training & education</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27698" data-topic-text="configuration management" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/security-programs-and-operations/configuration-management">configuration management</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27699" data-topic-text="contingency planning" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/security-programs-and-operations/contingency-planning">contingency planning</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27700" data-topic-text="incident response" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/security-programs-and-operations/incident-response">incident response</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27701" data-topic-text="maintenance" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/security-programs-and-operations/maintenance">maintenance</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27702" data-topic-text="media protection" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/security-programs-and-operations/media-protection">media protection</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27703" data-topic-text="patch management" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/security-programs-and-operations/patch-management">patch management</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27704" data-topic-text="personnel security" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/security-programs-and-operations/personnel-security">personnel security</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27705" data-topic-text="physical & environmental protection" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/security-programs-and-operations/physical-and-environmental-protection">physical & environmental protection</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27706" data-topic-text="planning" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/security-programs-and-operations/planning">planning</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27707" data-topic-text="program management" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/security-programs-and-operations/program-management">program management</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27708" data-topic-text="security automation" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/security-programs-and-operations/security-automation">security automation</a></li></ul> </li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24670-27490"></i> <a data-topic-id="27490" data-topic-text="systems security engineering" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/systems-security-engineering">systems security engineering</a><ul style="display: none;"><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-27490-27713"></i> <a data-topic-id="27713" data-topic-text="trustworthiness" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/systems-security-engineering/trustworthiness">trustworthiness</a><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27775" data-topic-text="reliability" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/systems-security-engineering/trustworthiness/reliability">reliability</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27776" data-topic-text="resilience" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/systems-security-engineering/trustworthiness/resilience">resilience</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27777" data-topic-text="safety" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/systems-security-engineering/trustworthiness/safety">safety</a></li></ul> </li></ul> </li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="28469" data-topic-text="zero trust" href="/web/20231208150822/https://csrc.nist.gov/Topics/Security-and-Privacy/zero-trust">zero trust</a></li></ul> </li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24663-24671"></i> <strong><a data-topic-id="24671" data-topic-text="Technologies" href="/web/20231208150822/https://csrc.nist.gov/Topics/technologies">Technologies</a></strong><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27491" data-topic-text="artificial intelligence" href="/web/20231208150822/https://csrc.nist.gov/Topics/technologies/artificial-intelligence">artificial intelligence</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27492" data-topic-text="big data" href="/web/20231208150822/https://csrc.nist.gov/Topics/technologies/big-data">big data</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27493" data-topic-text="biometrics" href="/web/20231208150822/https://csrc.nist.gov/Topics/technologies/biometrics">biometrics</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27494" data-topic-text="blockchain" href="/web/20231208150822/https://csrc.nist.gov/Topics/technologies/blockchain">blockchain</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27495" data-topic-text="cloud & virtualization" href="/web/20231208150822/https://csrc.nist.gov/Topics/technologies/cloud-computing-and-virtualization">cloud & virtualization</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27496" data-topic-text="combinatorial testing" href="/web/20231208150822/https://csrc.nist.gov/Topics/technologies/combinatorial-testing">combinatorial testing</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27497" data-topic-text="complexity" href="/web/20231208150822/https://csrc.nist.gov/Topics/technologies/complexity">complexity</a></li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24671-27499"></i> <a data-topic-id="27499" data-topic-text="hardware" href="/web/20231208150822/https://csrc.nist.gov/Topics/technologies/hardware">hardware</a><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27714" data-topic-text="circuits" href="/web/20231208150822/https://csrc.nist.gov/Topics/technologies/hardware/circuits">circuits</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27715" data-topic-text="personal computers" href="/web/20231208150822/https://csrc.nist.gov/Topics/technologies/hardware/personal-computers">personal computers</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27716" data-topic-text="sensors" href="/web/20231208150822/https://csrc.nist.gov/Topics/technologies/hardware/sensors">sensors</a></li></ul> </li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27498" data-topic-text="mobile" href="/web/20231208150822/https://csrc.nist.gov/Topics/technologies/mobile">mobile</a></li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24671-27500"></i> <a data-topic-id="27500" data-topic-text="networks" href="/web/20231208150822/https://csrc.nist.gov/Topics/technologies/networks">networks</a><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27717" data-topic-text="email" href="/web/20231208150822/https://csrc.nist.gov/Topics/technologies/networks/email">email</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27718" data-topic-text="firewalls" href="/web/20231208150822/https://csrc.nist.gov/Topics/technologies/networks/firewalls">firewalls</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27719" data-topic-text="internet" href="/web/20231208150822/https://csrc.nist.gov/Topics/technologies/networks/internet">internet</a></li></ul> </li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27501" data-topic-text="quantum information science" href="/web/20231208150822/https://csrc.nist.gov/Topics/technologies/quantum-information-science">quantum information science</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27502" data-topic-text="servers" href="/web/20231208150822/https://csrc.nist.gov/Topics/technologies/servers">servers</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27503" data-topic-text="smart cards" href="/web/20231208150822/https://csrc.nist.gov/Topics/technologies/smart-cards">smart cards</a></li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24671-27504"></i> <a data-topic-id="27504" data-topic-text="software & firmware" href="/web/20231208150822/https://csrc.nist.gov/Topics/technologies/software-firmware">software & firmware</a><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27720" data-topic-text="BIOS" href="/web/20231208150822/https://csrc.nist.gov/Topics/technologies/software-firmware/bios">BIOS</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27721" data-topic-text="databases" href="/web/20231208150822/https://csrc.nist.gov/Topics/technologies/software-firmware/databases">databases</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27722" data-topic-text="operating systems" href="/web/20231208150822/https://csrc.nist.gov/Topics/technologies/software-firmware/operating-systems">operating systems</a></li></ul> </li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27505" data-topic-text="storage" href="/web/20231208150822/https://csrc.nist.gov/Topics/technologies/storage">storage</a></li></ul> </li><li><i class="fa fa-minus fa-fw fa-sm" id="topics-expander-tcd-24663-24672" data-expander-for="/Topics/Applications/Internet-of-Things" data-expanded="true"></i> <strong><a data-topic-id="24672" data-topic-text="Applications" href="/web/20231208150822/https://csrc.nist.gov/Topics/Applications">Applications</a></strong><ul><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27456" data-topic-text="communications & wireless" href="/web/20231208150822/https://csrc.nist.gov/Topics/Applications/communications-and-wireless">communications & wireless</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27457" data-topic-text="cyber-physical systems" href="/web/20231208150822/https://csrc.nist.gov/Topics/Applications/cyber-physical-systems">cyber-physical systems</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27458" data-topic-text="cybersecurity education" href="/web/20231208150822/https://csrc.nist.gov/Topics/Applications/cybersecurity-education">cybersecurity education</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27459" data-topic-text="cybersecurity framework" href="/web/20231208150822/https://csrc.nist.gov/Topics/Applications/cybersecurity-framework">cybersecurity framework</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27460" data-topic-text="cybersecurity workforce" href="/web/20231208150822/https://csrc.nist.gov/Topics/Applications/cybersecurity-workforce">cybersecurity workforce</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27461" data-topic-text="enterprise" href="/web/20231208150822/https://csrc.nist.gov/Topics/Applications/enterprise">enterprise</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27462" data-topic-text="forensics" href="/web/20231208150822/https://csrc.nist.gov/Topics/Applications/forensics">forensics</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27463" data-topic-text="industrial control systems" href="/web/20231208150822/https://csrc.nist.gov/Topics/Applications/industrial-control-systems">industrial control systems</a></li><li><i class="fa fa-fw fa-sm"></i> <span data-topic-id="27464" data-topic-text="Internet of Things">Internet of Things</span></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="29979" data-topic-text="mathematics" href="/web/20231208150822/https://csrc.nist.gov/Topics/Applications/mathematics">mathematics</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27920" data-topic-text="positioning navigation & timing" href="/web/20231208150822/https://csrc.nist.gov/Topics/Applications/positioning-navigation-timing">positioning navigation & timing</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27465" data-topic-text="small & medium business" href="/web/20231208150822/https://csrc.nist.gov/Topics/Applications/small-and-medium-business">small & medium business</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27466" data-topic-text="telework" href="/web/20231208150822/https://csrc.nist.gov/Topics/Applications/telework">telework</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27467" data-topic-text="voting" href="/web/20231208150822/https://csrc.nist.gov/Topics/Applications/voting">voting</a></li></ul> </li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24663-24673"></i> <strong><a data-topic-id="24673" data-topic-text="Laws and Regulations" href="/web/20231208150822/https://csrc.nist.gov/Topics/Laws-and-Regulations">Laws and Regulations</a></strong><ul style="display: none;"><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24673-27468"></i> <a data-topic-id="27468" data-topic-text="executive documents" href="/web/20231208150822/https://csrc.nist.gov/Topics/Laws-and-Regulations/executive-documents">executive documents</a><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27668" data-topic-text="Comprehensive National Cybersecurity Initiative" href="/web/20231208150822/https://csrc.nist.gov/Topics/Laws-and-Regulations/executive-documents/CNCI">Comprehensive National Cybersecurity Initiative</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27669" data-topic-text="Cybersecurity Strategy and Implementation Plan" href="/web/20231208150822/https://csrc.nist.gov/Topics/Laws-and-Regulations/executive-documents/CSIP">Cybersecurity Strategy and Implementation Plan</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27670" data-topic-text="Cyberspace Policy Review" href="/web/20231208150822/https://csrc.nist.gov/Topics/Laws-and-Regulations/executive-documents/Cyberspace-Policy-Review">Cyberspace Policy Review</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27671" data-topic-text="Executive Order 13636" href="/web/20231208150822/https://csrc.nist.gov/Topics/Laws-and-Regulations/executive-documents/EO-13636">Executive Order 13636</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27672" data-topic-text="Executive Order 13702" href="/web/20231208150822/https://csrc.nist.gov/Topics/Laws-and-Regulations/executive-documents/EO-13702">Executive Order 13702</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27673" data-topic-text="Executive Order 13718" href="/web/20231208150822/https://csrc.nist.gov/Topics/Laws-and-Regulations/executive-documents/EO-13718">Executive Order 13718</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27674" data-topic-text="Executive Order 13800" href="/web/20231208150822/https://csrc.nist.gov/Topics/Laws-and-Regulations/executive-documents/EO-13800">Executive Order 13800</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27921" data-topic-text="Executive Order 13905" href="/web/20231208150822/https://csrc.nist.gov/Topics/Laws-and-Regulations/executive-documents/Executive-Order-13905">Executive Order 13905</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="28468" data-topic-text="Executive Order 14028" href="/web/20231208150822/https://csrc.nist.gov/Topics/Laws-and-Regulations/executive-documents/Executive-Order-14028">Executive Order 14028</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="36203" data-topic-text="Executive Order 14110" href="/web/20231208150822/https://csrc.nist.gov/Topics/Laws-and-Regulations/executive-documents/Executive-Order-14110">Executive Order 14110</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27675" data-topic-text="Federal Cybersecurity Research and Development Strategic Plan" href="/web/20231208150822/https://csrc.nist.gov/Topics/Laws-and-Regulations/executive-documents/Federal-Cybersecurity-Research-and-Development">Federal Cybersecurity Research and Development Strategic Plan</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27676" data-topic-text="Homeland Security Presidential Directive 7" href="/web/20231208150822/https://csrc.nist.gov/Topics/Laws-and-Regulations/executive-documents/HSPD-7">Homeland Security Presidential Directive 7</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27677" data-topic-text="Homeland Security Presidential Directive 12" href="/web/20231208150822/https://csrc.nist.gov/Topics/Laws-and-Regulations/executive-documents/HSPD-12">Homeland Security Presidential Directive 12</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27678" data-topic-text="OMB Circular A-11" href="/web/20231208150822/https://csrc.nist.gov/Topics/Laws-and-Regulations/executive-documents/OMB-A-11">OMB Circular A-11</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27679" data-topic-text="OMB Circular A-130" href="/web/20231208150822/https://csrc.nist.gov/Topics/Laws-and-Regulations/executive-documents/OMB-A-130">OMB Circular A-130</a></li></ul> </li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24673-27469"></i> <a data-topic-id="27469" data-topic-text="laws" href="/web/20231208150822/https://csrc.nist.gov/Topics/Laws-and-Regulations/laws">laws</a><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27654" data-topic-text="Cyber Security R&D Act" href="/web/20231208150822/https://csrc.nist.gov/Topics/Laws-and-Regulations/laws/Cyber-Security-Research-and-Development-Act">Cyber Security R&D; Act</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27655" data-topic-text="Cybersecurity Enhancement Act" href="/web/20231208150822/https://csrc.nist.gov/Topics/Laws-and-Regulations/laws/Cybersecurity-Enhancement-Act">Cybersecurity Enhancement Act</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27656" data-topic-text="E-Government Act" href="/web/20231208150822/https://csrc.nist.gov/Topics/Laws-and-Regulations/laws/E-Gov-Act">E-Government Act</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27657" data-topic-text="Energy Independence and Security Act" href="/web/20231208150822/https://csrc.nist.gov/Topics/Laws-and-Regulations/laws/EISA">Energy Independence and Security Act</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27658" data-topic-text="Federal Information Security Modernization Act" href="/web/20231208150822/https://csrc.nist.gov/Topics/Laws-and-Regulations/laws/FISMA">Federal Information Security Modernization Act</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27659" data-topic-text="First Responder Network Authority" href="/web/20231208150822/https://csrc.nist.gov/Topics/Laws-and-Regulations/laws/FirstNet">First Responder Network Authority</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27660" data-topic-text="Health Insurance Portability and Accountability Act" href="/web/20231208150822/https://csrc.nist.gov/Topics/Laws-and-Regulations/laws/HIPAA">Health Insurance Portability and Accountability Act</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27661" data-topic-text="Help America Vote Act" href="/web/20231208150822/https://csrc.nist.gov/Topics/Laws-and-Regulations/laws/HAVA">Help America Vote Act</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="28580" data-topic-text="Internet of Things Cybersecurity Improvement Act" href="/web/20231208150822/https://csrc.nist.gov/Topics/Laws-and-Regulations/laws/Internet-of-Things-Cybersecurity-Improvement-Act">Internet of Things Cybersecurity Improvement Act</a></li></ul> </li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24673-27470"></i> <a data-topic-id="27470" data-topic-text="regulations" href="/web/20231208150822/https://csrc.nist.gov/Topics/Laws-and-Regulations/regulations">regulations</a><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27662" data-topic-text="Federal Acquisition Regulation" href="/web/20231208150822/https://csrc.nist.gov/Topics/Laws-and-Regulations/regulations/FAR">Federal Acquisition Regulation</a></li></ul> </li></ul> </li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24663-24674"></i> <strong><a data-topic-id="24674" data-topic-text="Activities and Products" href="/web/20231208150822/https://csrc.nist.gov/Topics/Activities-and-Products">Activities and Products</a></strong><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27452" data-topic-text="annual reports" href="/web/20231208150822/https://csrc.nist.gov/Topics/Activities-and-Products/annual-reports">annual reports</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27453" data-topic-text="conferences & workshops" href="/web/20231208150822/https://csrc.nist.gov/Topics/Activities-and-Products/conferences-and-workshops">conferences & workshops</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="30210" data-topic-text="groups" href="/web/20231208150822/https://csrc.nist.gov/Topics/Activities-and-Products/groups">groups</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27454" data-topic-text="reference materials" href="/web/20231208150822/https://csrc.nist.gov/Topics/Activities-and-Products/reference-materials">reference materials</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27455" data-topic-text="standards development" href="/web/20231208150822/https://csrc.nist.gov/Topics/Activities-and-Products/standards-development">standards development</a></li></ul> </li><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24663-24675"></i> <strong><a data-topic-id="24675" data-topic-text="Sectors" href="/web/20231208150822/https://csrc.nist.gov/Topics/Sectors">Sectors</a></strong><ul style="display: none;"><li><i class="fa fa-plus fa-fw fa-sm" id="topics-expander-tcd-24675-27472"></i> <a data-topic-id="27472" data-topic-text="energy" href="/web/20231208150822/https://csrc.nist.gov/Topics/Sectors/energy">energy</a><ul style="display: none;"><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27712" data-topic-text="smart grid" href="/web/20231208150822/https://csrc.nist.gov/Topics/Sectors/energy/smart-grid">smart grid</a></li></ul> </li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27473" data-topic-text="financial services" href="/web/20231208150822/https://csrc.nist.gov/Topics/Sectors/financial-services">financial services</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27474" data-topic-text="healthcare" href="/web/20231208150822/https://csrc.nist.gov/Topics/Sectors/healthcare">healthcare</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27475" data-topic-text="hospitality" href="/web/20231208150822/https://csrc.nist.gov/Topics/Sectors/hospitality">hospitality</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27476" data-topic-text="manufacturing" href="/web/20231208150822/https://csrc.nist.gov/Topics/Sectors/manufacturing">manufacturing</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27477" data-topic-text="public safety" href="/web/20231208150822/https://csrc.nist.gov/Topics/Sectors/public-safety">public safety</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27478" data-topic-text="retail" href="/web/20231208150822/https://csrc.nist.gov/Topics/Sectors/retail">retail</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27479" data-topic-text="telecommunications" href="/web/20231208150822/https://csrc.nist.gov/Topics/Sectors/telecommunications">telecommunications</a></li><li><i class="fa fa-fw fa-sm"></i> <a data-topic-id="27480" data-topic-text="transportation" href="/web/20231208150822/https://csrc.nist.gov/Topics/Sectors/transportation">transportation</a></li></ul> </li></ul></div> </div> <div class="bs-callout bs-callout-danger" id="categories-topics-callout"> <h4><i class="fa fa-tag"></i> Related Topics</h4> <p> <strong id="cat-0">Applications:</strong> <a href="/web/20231208150822/https://csrc.nist.gov/Topics/Applications/cyber-physical-systems" id="topic-0-0">cyber-physical systems</a> </p> </div> </div> </div> </div> <div class="row"> <div class="col-md-12 historical-data-area" id="historical-data-area"> <span>Created <span id="page-created-date">June 07, 2016</span>, Updated <span id="page-updated-date">July 22, 2020</span></span> </div> </div> <div id="footer-pusher"></div> </div> <footer id="footer"> <div class="container"> <div class="row"> <div class="col-sm-6"> <span class="hidden-xs"> <a href="https://web.archive.org/web/20231208150822/https://www.nist.gov/" title="National Institute of Standards and Technology" rel="home" target="_blank" class="footer-nist-logo" id="footer-nist-logo-link"> <img src="/web/20231208150822im_/https://csrc.nist.gov/CSRC/Media/images/nist-logo-brand-white.svg" alt="National Institute of Standards and Technology logo" id="footer-nist-logo"/> </a> </span> <div class="row footer-contact-container"> <div class="col-sm-12" id="footer-address"> <strong>HEADQUARTERS</strong><br> 100 Bureau Drive<br> Gaithersburg, MD 20899 </div> </div> </div> <div class="col-sm-6"> <ul class="social-list text-right" style="display: block;"> <li class="field-item service-twitter list-horiz"> <a href="https://web.archive.org/web/20231208150822/https://twitter.com/NISTCyber" class="social-btn social-btn--large extlink ext" id="footer-social-twitter-link"> <i class="fa fa-twitter fa-fw"><span class="element-invisible">twitter</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-facebook list-horiz"> <a href="https://web.archive.org/web/20231208150822/https://www.facebook.com/NIST" class="social-btn social-btn--large extlink ext" id="footer-social-facebook-link"> <i class="fa fa-facebook fa-fw"><span class="element-invisible">facebook</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-linkedin list-horiz"> <a href="https://web.archive.org/web/20231208150822/https://www.linkedin.com/company/nist" class="social-btn social-btn--large extlink ext" id="footer-social-linkedin-link"> <i class="fa fa-linkedin fa-fw"><span class="element-invisible">linkedin</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-instagram list-horiz"> <a href="https://web.archive.org/web/20231208150822/https://www.instagram.com/usnistgov/" class="social-btn social-btn--large extlink ext" id="footer-social-instagram-link"> <i class="fa fa-instagram fa-fw"><span class="element-invisible">instagram</span></i> <span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-youtube list-horiz"> <a href="https://web.archive.org/web/20231208150822/https://www.youtube.com/user/USNISTGOV" class="social-btn social-btn--large extlink ext" id="footer-social-youtube-link"> <i class="fa fa-youtube fa-fw"><span class="element-invisible">youtube</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-rss list-horiz"> <a href="https://web.archive.org/web/20231208150822/https://www.nist.gov/news-events/nist-rss-feeds" class="social-btn social-btn--large extlink" id="footer-social-rss-link"> <i class="fa fa-rss fa-fw"><span class="element-invisible">rss</span></i> </a> </li> <li class="field-item service-govdelivery list-horiz last"> <a href="https://web.archive.org/web/20231208150822/https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3" class="social-btn social-btn--large extlink ext" title="Subscribe to CSRC and publication updates, and other NIST cybersecurity news" id="footer-social-govdelivery-link"> <i class="fa fa-envelope fa-fw"><span class="element-invisible">govdelivery</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> </ul> <p class="text-right"> Want updates about CSRC and our publications? <a href="https://web.archive.org/web/20231208150822/https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3" class="btn btn-lg btn-primary" style="background-color: #12659c!important; border-color: #12659c!important;" id="footer-subscribe-link">Subscribe</a> </p> </div> </div> <div class="row hidden-sm hidden-md hidden-lg"> <div class="col-sm-12"> <a href="https://web.archive.org/web/20231208150822/https://www.nist.gov/" title="National Institute of Standards and Technology" rel="home" target="_blank" class="footer-nist-logo" id="footer-bottom-nist-logo-link"> <img src="/web/20231208150822im_/https://csrc.nist.gov/CSRC/Media/images/logo_rev.png" alt="National Institute of Standards and Technology logo" id="footer-bottom-nist-logo"/> </a> </div> </div> <div class="row"> <div class="col-sm-6"> <p> <a href="/web/20231208150822/https://csrc.nist.gov/about/contact" id="footer-contact-us-link">Contact Us</a> | <a href="https://web.archive.org/web/20231208150822/https://www.nist.gov/about-nist/our-organization" style="display: inline-block;" id="footer-org-link">Our Other Offices</a> </p> </div> <div class="col-sm-6"> <span class="pull-right text-right"> Send inquiries to <a href="https://web.archive.org/web/20231208150822/mailto:csrc-inquiry@nist.gov?subject=CSRC Inquiry" style="display: inline-block;" id="footer-inquiries-link">csrc-inquiry@nist.gov</a> </span> </div> </div> <div class="row"> <div class="footer-bottom-links-container" id="footer-bottom-links-container"> <ul> <li><a href="https://web.archive.org/web/20231208150822/https://www.nist.gov/privacy-policy">Site Privacy</a></li> <li><a href="https://web.archive.org/web/20231208150822/https://www.nist.gov/oism/accessibility">Accessibility</a></li> <li><a href="https://web.archive.org/web/20231208150822/https://www.nist.gov/privacy">Privacy Program</a></li> <li><a href="https://web.archive.org/web/20231208150822/https://www.nist.gov/oism/copyrights">Copyrights</a></li> <li><a href="https://web.archive.org/web/20231208150822/https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a></li> <li><a href="https://web.archive.org/web/20231208150822/https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a></li> <li><a href="https://web.archive.org/web/20231208150822/https://www.nist.gov/foia">FOIA</a></li> <li><a href="https://web.archive.org/web/20231208150822/https://www.nist.gov/environmental-policy-statement">Environmental Policy</a></li> <li><a href="https://web.archive.org/web/20231208150822/https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a></li> <li><a href="https://web.archive.org/web/20231208150822/https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a></li> <li><a href="https://web.archive.org/web/20231208150822/https://www.commerce.gov/">Commerce.gov</a></li> <li><a href="https://web.archive.org/web/20231208150822/https://www.science.gov/">Science.gov</a></li> <li><a href="https://web.archive.org/web/20231208150822/https://www.usa.gov/">USA.gov</a></li> <li><a href="https://web.archive.org/web/20231208150822/https://vote.gov/">Vote.gov</a></li> </ul> </div> </div> </div> </footer> <script type="text/javascript" src="/web/20231208150822js_/https://csrc.nist.gov/dist/js/quick-collapse.js"></script> <script type="text/javascript" src="/web/20231208150822js_/https://csrc.nist.gov/dist/app.bundle.js"></script> <script type="text/javascript" src="/web/20231208150822js_/https://csrc.nist.gov/dist/topics.bundle.js"></script> </body> </html> <!-- FILE ARCHIVED ON 15:08:22 Dec 08, 2023 AND RETRIEVED FROM THE INTERNET ARCHIVE ON 02:52:33 Dec 02, 2024. JAVASCRIPT APPENDED BY WAYBACK MACHINE, COPYRIGHT INTERNET ARCHIVE. ALL OTHER CONTENT MAY ALSO BE PROTECTED BY COPYRIGHT (17 U.S.C. SECTION 108(a)(3)). --> <!-- playback timings (ms): captures_list: 0.477 exclusion.robots: 0.021 exclusion.robots.policy: 0.013 esindex: 0.01 cdx.remote: 7.641 LoadShardBlock: 287.285 (3) PetaboxLoader3.datanode: 185.852 (4) PetaboxLoader3.resolve: 168.279 (2) load_resource: 148.332 -->