CINXE.COM

Search | CSRC

<!DOCTYPE html> <html lang="en-us" xml:lang="en-us"> <head><script type="text/javascript" src="/_static/js/bundle-playback.js?v=HxkREWBo" charset="utf-8"></script> <script type="text/javascript" src="/_static/js/wombat.js?v=txqj7nKC" charset="utf-8"></script> <script>window.RufflePlayer=window.RufflePlayer||{};window.RufflePlayer.config={"autoplay":"on","unmuteOverlay":"hidden"};</script> <script type="text/javascript" src="/_static/js/ruffle/ruffle.js"></script> <script type="text/javascript"> __wm.init("https://web.archive.org/web"); __wm.wombat("https://csrc.nist.gov/publications/project-description","20231004175329","https://web.archive.org/","web","/_static/", "1696442009"); </script> <link rel="stylesheet" type="text/css" href="/_static/css/banner-styles.css?v=S1zqJCYt" /> <link rel="stylesheet" type="text/css" href="/_static/css/iconochive.css?v=3PDvdIFv" /> <!-- End Wayback Rewrite JS Include --> <meta charset="utf-8"/> <title>Search | CSRC</title> <meta http-equiv="content-type" content="text/html; charset=UTF-8"/> <meta http-equiv="content-style-type" content="text/css"/> <meta http-equiv="content-script-type" content="text/javascript"/> <meta name="viewport" content="width=device-width, initial-scale=1.0"/> <meta name="msapplication-config" content="/CSRC/Media/images/favicons/browserconfig.xml"/> <meta name="theme-color" content="#000000"/> <meta name="google-site-verification" content="xbrnrVYDgLD-Bd64xHLCt4XsPXzUhQ-4lGMj4TdUUTA"/> <link rel="apple-touch-icon" sizes="180x180" href="/web/20231004175329im_/https://csrc.nist.gov/images/icons/apple-touch-icon.png"/> <link rel="icon" type="image/png" href="/web/20231004175329im_/https://csrc.nist.gov/images/icons/favicon-32x32.png" sizes="32x32"/> <link rel="icon" type="image/png" href="/web/20231004175329im_/https://csrc.nist.gov/images/icons/favicon-16x16.png" sizes="16x16"/> <link rel="manifest" href="/web/20231004175329/https://csrc.nist.gov/images/icons/manifest.json"/> <link rel="mask-icon" href="/web/20231004175329im_/https://csrc.nist.gov/images/icons/safari-pinned-tab.svg" color="#000000"/> <link href="/web/20231004175329im_/https://csrc.nist.gov/CSRC/Media/images/favicons/favicon.ico" type="image/x-icon" rel="shortcut icon"/> <link href="/web/20231004175329im_/https://csrc.nist.gov/CSRC/Media/images/favicons/favicon.ico" type="image/x-icon" rel="icon"/> <link href="/web/20231004175329cs_/https://csrc.nist.gov/dist/app.css" rel="stylesheet"/> <!-- reCAPTCHA v3 --> <style> .grecaptcha-badge { visibility: hidden; } </style> <script async type="text/javascript" id="_fed_an_ua_tag" src="https://web.archive.org/web/20231004175329js_/https://dap.digitalgov.gov/Universal-Federated-Analytics-Min.js?agency=nist&amp;subagency=csrc&amp;pua=UA-66610693-15&amp;yt=true&amp;exts=xsd,xml,wav,mpg,mpeg,avi,rtf,webm,ogg,ogv,oga,map,otf,eot,svg,ttf,woff"></script> <style id="antiClickjackCss"> body > * { display: none !important; } #antiClickjack { display: block !important; } </style> <noscript> <style id="antiClickjackNoScript"> body > * { display: block !important; } #antiClickjack { display: none !important; } </style> </noscript> <script type="text/javascript" id="antiClickjackScript"> if (self === top) { // no clickjacking var antiClickjack = document.getElementById("antiClickjackCss"); antiClickjack.parentNode.removeChild(antiClickjack); } else { setTimeout(tryForward(), 5000); } function tryForward() { top.location = self.location; } </script> <!-- Google tag (gtag.js) --> <script async src="https://web.archive.org/web/20231004175329js_/https://www.googletagmanager.com/gtag/js?id=G-TSQ0PLGJZP"></script> <script> 聽聽window.dataLayer = window.dataLayer || []; 聽聽function gtag(){dataLayer.push(arguments);} 聽聽gtag('js', new Date()); 聽聽gtag('config', 'G-TSQ0PLGJZP'); </script> </head> <body> <div id="antiClickjack" style="display: none;"> <strong style="font-size: 1.6rem;">You are viewing this page in an unauthorized frame window.</strong> <p>This is a potential security issue, you are being redirected to <a href="https://web.archive.org/web/20231004175329/https://csrc.nist.gov/">https://csrc.nist.gov</a>.</p> </div> <section class="usa-banner" aria-label="Official government website"> <div class="usa-accordion container"> <header class="usa-banner__header"> <noscript> <p style="font-size: 0.85rem; font-weight: bold;">You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.</p> </noscript> <img class="usa-banner__header-flag" src="/web/20231004175329im_/https://csrc.nist.gov/images/usbanner/us_flag_small.png" alt="U.S. flag"> &nbsp; <span class="usa-banner__header-text">An official website of the United States government</span> <button id="gov-banner-button" class="usa-accordion__button usa-banner__button" data-toggle="collapse" data-target="#gov-banner" aria-expanded="true" aria-controls="gov-banner"> <span class="usa-banner__button-text">Here's how you know</span> </button> </header> <div class="usa-banner__content usa-accordion__content collapse in" role="tabpanel" id="gov-banner" aria-expanded="true"> <div class="row"> <div class="col-md-5 col-sm-12"> <div class="row"> <div class="col-sm-2 col-xs-3"> <img class="usa-banner__icon usa-media-block__img" src="/web/20231004175329im_/https://csrc.nist.gov/images/usbanner/icon-dot-gov.svg" alt="Dot gov"> </div> <div class="col-sm-10 col-xs-9"> <p> <strong>Official websites use .gov</strong> <br> A <strong>.gov</strong> website belongs to an official government organization in the United States. </p> </div> </div> </div> <div class="col-md-5 col-sm-12"> <div class="row"> <div class="col-sm-2 col-xs-3"> <img class="usa-banner__icon usa-media-block__img" src="/web/20231004175329im_/https://csrc.nist.gov/images/usbanner/icon-https.svg" alt="Https"> </div> <div class="col-sm-10 col-xs-9"> <p> <strong>Secure .gov websites use HTTPS</strong> <br> A <strong>lock</strong> (<img class="usa-banner__lock" src="/web/20231004175329im_/https://csrc.nist.gov/images/usbanner/lock.svg" alt="Dot gov">) or <strong>https://</strong> means you've safely connected to the .gov website. Share sensitive information only on official, secure websites. </p> </div> </div> </div> </div> </div> </div> </section> <nav id="navbar" class="navbar"> <div id="nist-menu-container" class="container"> <div class="row"> <!-- Brand --> <div class="col-xs-6 col-md-4 navbar-header"> <a class="navbar-brand" href="https://web.archive.org/web/20231004175329/https://www.nist.gov/" target="_blank" id="navbar-brand-image"> <img src="/web/20231004175329im_/https://csrc.nist.gov/CSRC/media/images/svg/nist-logo.svg" alt="National Institute of Standards and Technology" width="110" height="30"> </a> </div> <div class="col-xs-6 col-md-8 navbar-nist-logo"> <div class="form-inline hidden-sm hidden-xs"> <form name="site-search" id="site-search-form" action="/web/20231004175329/https://csrc.nist.gov/search" method="GET"> <label for="search-csrc-query" class="element-invisible">Search</label> <input autocomplete="off" class="form-control" id="search-csrc-query" name="keywords" type="text" size="15" maxlength="128" placeholder="Search CSRC"/> <input type="hidden" name="ipp" value="25"/> <input type="hidden" name="sortBy" value="relevance"/> <input type="hidden" name="showOnly" value="publications,projects,news,events,presentations,glossary,topics"/> <input type="hidden" name="topicsMatch" value="ANY"/> <input type="hidden" name="status" value="Final,Draft"/> <button type="submit" id="search-csrc-submit-btn" class="form-submit"> <span class="element-invisible">Search</span> <i class="fa fa-search"></i> </button> </form> </div> <span id="nvd-menu-button" class="pull-right"> <a href="#" id="nvd-menu-button-link"> <span class="fa fa-bars"></span> <span id="nvd-menu-full-text">CSRC MENU</span> </a> </span> </div> </div> </div> <div class="form-inline hidden-md hidden-lg"> <form name="site-search-mobile" id="site-search-form-mobile" action="/web/20231004175329/https://csrc.nist.gov/search" method="GET"> <label for="search-csrc-query-mobile" class="element-invisible">Search</label> <input autocomplete="off" class="form-control" id="search-csrc-query-mobile" name="keywords" type="text" size="15" maxlength="128" placeholder="Search CSRC"/> <button type="submit" id="search-csrc-submit-btn-mobile" class="form-submit"> <span class="element-invisible">Search</span> <i class="fa fa-search"></i> </button> </form> </div> <div class="main-menu-row container"> <!-- Collect the nav links, forms, and other content for toggling --> <div id="main-menu-drop" class="col-lg-12" style="display: none;"> <ul> <li><a href="/web/20231004175329/https://csrc.nist.gov/projects">Projects</a></li> <li> <a href="/web/20231004175329/https://csrc.nist.gov/publications"> Publications <span class="expander fa fa-plus" id="main-menu-pubs-expander" data-expander-name="publications" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="publications" id="main-menu-pubs-expanded"> <div class="row"> <div class="col-lg-4"> <p><a href="/web/20231004175329/https://csrc.nist.gov/publications/drafts-open-for-comment">Drafts for Public Comment</a></p> <p><a href="/web/20231004175329/https://csrc.nist.gov/publications/draft-pubs">All Public Drafts</a></p> <p><a href="/web/20231004175329/https://csrc.nist.gov/publications/final-pubs">Final Pubs</a></p> <p><a href="/web/20231004175329/https://csrc.nist.gov/publications/fips">FIPS <small>(standards)</small></a></p> </div> <div class="col-lg-4"> <p><a href="/web/20231004175329/https://csrc.nist.gov/publications/sp">Special Publications (SP<small>s</small>)</a></p> <p><a href="/web/20231004175329/https://csrc.nist.gov/publications/ir">IR <small>(interagency/internal reports)</small></a></p> <p><a href="/web/20231004175329/https://csrc.nist.gov/publications/cswp">CSWP <small>(cybersecurity white papers)</small></a></p> <p><a href="/web/20231004175329/https://csrc.nist.gov/publications/itl-bulletin">ITL Bulletins</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20231004175329/https://csrc.nist.gov/publications/project-description">Project Descriptions</a></p> <p><a href="/web/20231004175329/https://csrc.nist.gov/publications/journal-article">Journal Articles</a></p> <p><a href="/web/20231004175329/https://csrc.nist.gov/publications/conference-paper">Conference Papers</a></p> <p><a href="/web/20231004175329/https://csrc.nist.gov/publications/book">Books</a></p> </div> </div> </div> </li> <li> <a href="/web/20231004175329/https://csrc.nist.gov/topics"> Topics <span class="expander fa fa-plus" id="main-menu-topics-expander" data-expander-name="topics" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="topics" id="main-menu-topics-expanded"> <div class="row"> <div class="col-lg-4"> <p><a href="/web/20231004175329/https://csrc.nist.gov/Topics/Security-and-Privacy">Security &amp; Privacy</a></p> <p><a href="/web/20231004175329/https://csrc.nist.gov/Topics/Applications">Applications</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20231004175329/https://csrc.nist.gov/Topics/Technologies">Technologies</a></p> <p><a href="/web/20231004175329/https://csrc.nist.gov/Topics/Sectors">Sectors</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20231004175329/https://csrc.nist.gov/Topics/Laws-and-Regulations">Laws &amp; Regulations</a></p> <p><a href="/web/20231004175329/https://csrc.nist.gov/Topics/Activities-and-Products">Activities &amp; Products</a></p> </div> </div> </div> </li> <li><a href="/web/20231004175329/https://csrc.nist.gov/news">News &amp; Updates</a></li> <li><a href="/web/20231004175329/https://csrc.nist.gov/events">Events</a></li> <li><a href="/web/20231004175329/https://csrc.nist.gov/glossary">Glossary</a></li> <li> <a href="/web/20231004175329/https://csrc.nist.gov/about"> About CSRC <span class="expander fa fa-plus" id="main-menu-about-expander" data-expander-name="about" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="about" id="main-menu-about-expanded"> <div class="row"> <div class="col-lg-6"> <p> <strong><a href="/web/20231004175329/https://csrc.nist.gov/Groups/Computer-Security-Division">Computer Security Division</a></strong><br/> <ul> <li><a href="/web/20231004175329/https://csrc.nist.gov/Groups/Computer-Security-Division/Cryptographic-Technology">Cryptographic Technology</a></li> <li><a href="/web/20231004175329/https://csrc.nist.gov/Groups/Computer-Security-Division/Secure-Systems-and-Applications">Secure Systems and Applications</a></li> <li><a href="/web/20231004175329/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Components-and-Mechanisms">Security Components and Mechanisms</a></li> <li><a href="/web/20231004175329/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Engineering-and-Risk-Management">Security Engineering and Risk Management</a></li> <li><a href="/web/20231004175329/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Testing-Validation-and-Measurement">Security Testing, Validation, and Measurement</a></li> </ul> </p> </div> <div class="col-lg-6"> <p> <strong><a href="/web/20231004175329/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division">Applied Cybersecurity Division</a></strong><br/> <ul> <li><a href="/web/20231004175329/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division/Cybersecurity-and-Privacy-Applications">Cybersecurity and Privacy Applications</a></li> <li><a href="/web/20231004175329/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division/National-Cybersecurity-Center-of-Excellence">National Cybersecurity Center of Excellence (NCCoE)</a></li> <li><a href="https://web.archive.org/web/20231004175329/https://www.nist.gov/nice/">National Initiative for Cybersecurity Education (NICE)</a></li> </ul> </p> <p> <a href="/web/20231004175329/https://csrc.nist.gov/contact"> Contact Us </a> </p> </div> </div> </div> </li> </ul> </div><!-- /#mobile-nav-container --> </div> </nav> <section id="itl-header" class="has-menu"> <div class="container"> <div class="row"> <div class="col-sm-12 col-md-8"> <div class="hidden-xs hidden-sm" id="itl-header-lg"> <a href="https://web.archive.org/web/20231004175329/https://www.nist.gov/itl" target="_blank" id="itl-header-link">Information Technology Laboratory</a> </div> <div class="hidden-xs hidden-sm" id="csrc-header-lg"> <a href="/web/20231004175329/https://csrc.nist.gov/" id="csrc-header-link-lg">Computer Security Resource Center</a> </div> </div> <div class="col-sm-12 col-md-4"> <div class="hidden-xs hidden-sm hidden-md"> <a id="logo-csrc-lg" href="/web/20231004175329/https://csrc.nist.gov/"><img id="img-logo-csrc-lg" src="/web/20231004175329im_/https://csrc.nist.gov/CSRC/Media/images/nist-logo-csrc-white.svg" alt="CSRC Logo" class="csrc-header-logo"></a> </div> <div class="hidden-lg"> <a id="logo-csrc-sm" href="/web/20231004175329/https://csrc.nist.gov/"><img id="img-logo-csrc-sm" src="/web/20231004175329im_/https://csrc.nist.gov/CSRC/Media/images/nist-logo-csrc-white.svg" alt="CSRC Logo" class="csrc-header-logo"></a> </div> </div> </div> </div> </section> <div id="body-section" class="container"> <div class="publications-content"> <div class="row"> <div class="col-lg-3 col-md-4 hidden-sm hidden-xs hidden-xxs"> <div id="publications-quicklinks-lg" class="bs-callout bs-callout-subnav hidden-sm hidden-xs hidden-xxs"> <h4>Current Publications <i class="fa fa-bolt"></i></h4> <ul> <li> <strong> NIST Series Pubs <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-series-pubs-tooltip"></i> </strong> <ul> <li><a href="/web/20231004175329/https://csrc.nist.gov/publications/final-pubs" id="quick-link-final-lg">Final Pubs</a></li> <li><a href="/web/20231004175329/https://csrc.nist.gov/publications/drafts-open-for-comment" id="quick-links-comments-lg">Drafts Open for Comment</a></li> <li><a href="/web/20231004175329/https://csrc.nist.gov/publications/draft-pubs" id="quick-link-draft-lg">Drafts</a> (all)</li> <li> <strong> View By Series <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-view-series-pubs-tooltip"></i> </strong> <ul> <li><a href="/web/20231004175329/https://csrc.nist.gov/publications/fips" id="quick-link-fips-lg">FIPS</a> (standards)</li> <li><a href="/web/20231004175329/https://csrc.nist.gov/publications/sp800" id="quick-link-sp-800-lg">SP 800</a> (guidance)</li> <li><a href="/web/20231004175329/https://csrc.nist.gov/publications/sp1800" id="quick-link-sp-1800-lg">SP 1800</a> (practice guides)</li> <li><a href="/web/20231004175329/https://csrc.nist.gov/publications/sp" id="quick-link-sp-lg">SP</a> (all subseries)</li> <li><a href="/web/20231004175329/https://csrc.nist.gov/publications/ir" id="quick-link-nistir-lg">IR</a> (interagency/internal reports)</li> <li><a href="/web/20231004175329/https://csrc.nist.gov/publications/cswp" id="quick-link-white-papers-lg">CSWP</a> (cybersecurity white papers)</li> <li><a href="/web/20231004175329/https://csrc.nist.gov/publications/itl-bulletin" id="quick-link-itl-bul-lg">ITL Bulletins</a></li> </ul> </li> </ul> </li> <li> <strong> Other Pubs <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-other-pubs-tooltip"></i> </strong> <ul> <li><a href="/web/20231004175329/https://csrc.nist.gov/publications/project-description" id="quick-link-project-description-lg">Project Descriptions</a></li> <li><a href="/web/20231004175329/https://csrc.nist.gov/publications/journal-article" id="quick-link-journal-articles-lg">Journal Articles</a></li> <li><a href="/web/20231004175329/https://csrc.nist.gov/publications/conference-paper" id="quick-link-conference-papers-lg">Conference Papers</a></li> <li><a href="/web/20231004175329/https://csrc.nist.gov/publications/book" id="quick-link-books-lg">Books</a></li> <li><a href="/web/20231004175329/https://csrc.nist.gov/publications/other" id="quick-link-other-lg">Other</a></li> </ul> </li> </ul> <span style="display: none;" id="nist-series-pubs-tooltip"> <strong>Final:</strong> <em>Current list of all published NIST cybersecurity documents.</em> Does not include "Withdrawn" documents. Includes FIPS, Special Publications, NISTIRs, ITL Bulletins, and NIST Cybersecurity White Papers.<br/> <br/> <strong>Public Drafts:</strong> <em>Current list of all draft NIST cybersecurity documents--they are typically posted for public comment.</em> "Current" public drafts are the latest draft versions that have not yet been published as "Final." </span> <span style="display: none;" id="nist-view-series-pubs-tooltip"> <strong>FIPS:</strong> <em>Current Federal Information Processing Standard Publications (FIPS).</em> Includes current (Final and Draft) FIPS.<br/> <br/> <strong>SP 800 Series:</strong> <em>Current NIST Special Publication (SP) 800 series publications, which focus on Computer/Information Security.</em> Includes current (Final and Draft) SP 800 pubs.<br/> <br/> <strong>All SP Series:</strong> <em> Current NIST Special Publications (SP), including SP 800 (Computer/Information Security) and SP 1800 (Cybersecurity Practice Guides) pubs. Also includes SP 500 (Computer Systems Technology) pubs related to cybersecurity and privacy. </em> Includes current (Final and Draft) NIST Special Publications.<br/> <br/> <strong>NISTIRs:</strong> <em>Current list of NIST Interagency or Internal Reports (NISTIR) related to cybersecurity and privacy.</em> Includes current (Final and Draft) NISTIRs.<br/> <br/> <strong>ITL Bulletins:</strong> Current list of NIST Information Technology Laboratory (ITL) Bulletins. </span> <span style="display: none;" id="nist-other-pubs-tooltip"> <strong>White Papers:</strong> <em> Consists of NIST Cybersecurity White Papers; NCCoE Project Descriptions, Building Blocks and Use Cases; and other NIST-authored papers that are not part of a formal series. </em> Includes current (Final and Draft) papers.<br/> <br/> <strong>Journal Articles:</strong> NIST-authored articles published in external journals and in the NIST Journal of Research (JRES).<br/> <br/> <strong>Conference Papers:</strong> NIST-authored conference papers related to cybersecurity and privacy.<br/> <br/> <strong>Books:</strong> NIST-authored books, book sections, and encyclopedia entries related to cybersecurity and privacy. </span> </div> <form action="/web/20231004175329/https://csrc.nist.gov/publications/search" class="bs-callout bs-callout-success csrc-search-form hidden-sm hidden-xs hidden-xxs" data-csrc-form="true" data-default-query="+ser_series:project* +ser_status:(draft final)" data-form-ignore-default="sortBy" data-form-name="pubSearchDesktop" id="pubs-search-form-lg" method="get"> <div class="form-group"> <label for="keywords-lg">Search</label> <input name="keywords-lg" class="form-control" data-val="true" data-val-length="The field Search must be a string with a maximum length of 255." data-val-length-max="255" id="keywords-lg" name="Form.Keywords" type="text" value=""/> <em class="text-muted">Search publication record data<br/> (not a full text search)</em> </div> <div class="form-group"> <label for="sortBy-lg">Sort By</label> <div class="form-inline"> <select name="sortBy-lg" class="form-control" id="sortBy-lg" name="Form.SortBy"><option selected="selected" value="relevance">Relevance (best match)</option> <option value="releasedate DESC">Release Date (newest first)</option> <option value="releasedate ASC">Release Date (oldest first)</option> <option value="Series ASC">Series (A-Z)</option> <option value="Series DESC">Series (Z-A)</option> <option value="Number ASC">Number (lowest to highest)</option> <option value="Number DESC">Number (highest to lowest)</option> <option value="title asc">Title (A-Z)</option> <option value="title desc">Title (Z-A)</option> </select> </div> </div> <div class="form-group"> <label for="viewMode-lg">Results View</label> <select name="viewMode-lg" class="form-control" id="viewMode-lg" name="Form.ResultsViewMode"><option selected="selected" value="brief">Brief</option> <option value="summary">Summary</option> </select> </div> <div class="form-group form-inline"> <label for="ipp-lg" class="form-control-half">Items Per Page</label> <select name="ipp-lg" class="form-control" id="ipp-lg" name="Form.ItemsPerPage"><option selected="selected" value="50">50</option> <option value="75">75</option> <option value="100">100</option> <option value="all">All</option> </select> </div> <div class="form-group"> <label for="dateFrom-lg">Date</label> <div class="form-inline form-date-inline"> <div class="input-group date" data-date-picker="true"> <input name="dateFrom-lg" class="form-control" data-control-type="date" data-val="true" data-val-date="The field Date must be a date." data-validation="true" data-validation-compare-field="dateTo-lg" data-validation-message="From date must be less than To date" data-validation-type="less-than-date" id="dateFrom-lg" name="Form.DateFrom" placeholder=" / / " type="text" value=""/> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> <div class="input-group date" data-date-picker="true"> <input name="dateTo-lg" class="form-control" data-control-type="date" data-val="true" data-val-date="The field DateTo must be a date." id="dateTo-lg" name="Form.DateTo" placeholder=" / / " type="text" value=""/> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> </div> </div> <div class="form-group"> <label for="status-all-lg"> Status <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="publications-status-info"></i> </label> <div class="form-inline status-type" style="margin-left: 1rem;"> <label class="meta-label"> <input type="checkbox" id="status-final-lg" name="status-lg" value="Final" data-default-checked="True" checked="'checked'"/> Final<br/> </label> <label class="meta-label"> <input type="checkbox" id="status-draft-lg" name="status-lg" value="Draft" data-default-checked="True" checked="'checked'"/> Public Draft<br/> </label> <label class="meta-label"> <input type="checkbox" id="status-withdrawn-lg" name="status-lg" value="Withdrawn" data-default-checked="True"/> Withdrawn<br/> </label> </div> </div> <div class="form-group"> <label for="pub-search-series"> Series <button type="button" id="series-all-lg" class="btn btn-sm btn-success" data-check-all="series-lg">Check All</button> <button type="button" id="series-clear-lg" class="btn btn-sm btn-success" data-check-none="series-lg">Clear</button> </label> <div class="form-inline series-type" style="margin-left: 1rem;"> <label class="meta-label"> <input type="checkbox" id="series-b2b6ef80-0dec-4d48-ae2d-a37ab486a846-lg" name="series-lg" value="FIPS" data-default-checked="True"/> FIPS<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-749c7275-15f5-4eec-8cb9-3b6f1528756c-lg" name="series-lg" value="SP" data-default-checked="True"/> SP<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-344a35c7-520e-4845-88b0-6997147ffc76-lg" name="series-lg" value="IR" data-default-checked="True"/> IR<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-5f83968e-4758-479d-9aa4-1d42166b7deb-lg" name="series-lg" value="CSWP" data-default-checked="True"/> CSWP<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-b2004197-4249-454a-bdce-edc6186b5c60-lg" name="series-lg" value="TN" data-default-checked="True"/> TN<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-09acb409-e18b-4a05-ac84-631662bcccd9-lg" name="series-lg" value="VTS" data-default-checked="True"/> VTS<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-8022364e-73db-4498-b2eb-9317ce32fff2-lg" name="series-lg" value="AI" data-default-checked="True"/> AI<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-57afe5d0-383f-4fd6-b702-84233dcd5f13-lg" name="series-lg" value="GCR" data-default-checked="True"/> GCR<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-23801152-858e-4dbc-baad-eb51795cf0e2-lg" name="series-lg" value="Project Description" data-default-checked="True"/> Project Description<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-8c9f1828-ae8a-4f03-8d9f-9ff7192b508e-lg" name="series-lg" value="ITL Bulletin" data-default-checked="True"/> ITL Bulletin<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-debd6afb-aeaa-4790-a32b-c977c9654df0-lg" name="series-lg" value="Journal Article" data-default-checked="True"/> Journal Article<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-ed478237-d49d-41c6-91ed-5dd341bd50c8-lg" name="series-lg" value="Conference Paper" data-default-checked="True"/> Conference Paper<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-f2273ac7-d756-4cce-b006-a527778c84f0-lg" name="series-lg" value="Book" data-default-checked="True"/> Book<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-80e369a4-bea5-46f5-8082-91f19c3eeefa-lg" name="series-lg" value="Book Section" data-default-checked="True"/> Book Section<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-b1570e28-332c-4f29-a1e0-cd31c3930848-lg" name="series-lg" value="Other" data-default-checked="True"/> Other<br/> </label> </div> </div> <div class="form-group"> <label for="pub-search-topics-lg"> Topics </label> <input name="topics-lg" id="topics-lg" name="Form.Topics" type="hidden" value=""/> <div class="form-control topics-selection" id="pub-search-topics-lg" contenteditable="true" data-drop-target="pub-search-topics-drop-lg" data-field-name="topics-lg" aria-haspopup="true"> </div> <div class="topics-selection-dropdown desktop" id="pub-search-topics-drop-lg" style="display: none;" data-topics-selector=""><div class="col-sm-4"><strong>Security and Privacy</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24670-27481" data-expander-for="/topics/security-and-privacy/cryptography"></i> <a data-topic-id="27481" data-topic-text="cryptography">cryptography</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27647" data-topic-text="digital signatures">digital signatures</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27648" data-topic-text="encryption">encryption</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27649" data-topic-text="key management">key management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="30027" data-topic-text="lightweight cryptography">lightweight cryptography</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27650" data-topic-text="message authentication">message authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27651" data-topic-text="post-quantum cryptography">post-quantum cryptography</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27652" data-topic-text="random number generation">random number generation</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27653" data-topic-text="secure hashing">secure hashing</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27482" data-topic-text="cybersecurity supply chain risk management">cybersecurity supply chain risk management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27483" data-topic-text="general security &amp; privacy">general security &amp; privacy</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24670-27484" data-expander-for="/topics/security-and-privacy/identity-and-access-management"></i> <a data-topic-id="27484" data-topic-text="identity &amp; access management">identity &amp; access management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27663" data-topic-text="access authorization">access authorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27664" data-topic-text="access control">access control</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27665" data-topic-text="authentication">authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27666" data-topic-text="Personal Identity Verification">Personal Identity Verification</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27667" data-topic-text="public key infrastructure">public key infrastructure</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24670-27485" data-expander-for="/topics/security-and-privacy/privacy"></i> <a data-topic-id="27485" data-topic-text="privacy">privacy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27680" data-topic-text="personally identifiable information">personally identifiable information</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27681" data-topic-text="privacy engineering">privacy engineering</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24670-27486" data-expander-for="/topics/security-and-privacy/risk-management"></i> <a data-topic-id="27486" data-topic-text="risk management">risk management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27682" data-topic-text="categorization">categorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27683" data-topic-text="continuous monitoring">continuous monitoring</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-27486-27684" data-expander-for="/topics/security-and-privacy/risk-management/controls"></i> <a data-topic-id="27684" data-topic-text="controls">controls</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27767" data-topic-text="controls assessment">controls assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27768" data-topic-text="privacy controls">privacy controls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27769" data-topic-text="security controls">security controls</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27685" data-topic-text="risk assessment">risk assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27686" data-topic-text="roots of trust">roots of trust</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27687" data-topic-text="system authorization">system authorization</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-27486-27688" data-expander-for="/topics/security-and-privacy/risk-management/threats"></i> <a data-topic-id="27688" data-topic-text="threats">threats</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27770" data-topic-text="advanced persistent threats">advanced persistent threats</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27771" data-topic-text="botnets">botnets</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27772" data-topic-text="information sharing">information sharing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27773" data-topic-text="intrusion detection &amp; prevention">intrusion detection &amp; prevention</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27774" data-topic-text="malware">malware</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27689" data-topic-text="vulnerability management">vulnerability management</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24670-27487" data-expander-for="/topics/security-and-privacy/security-and-behavior"></i> <a data-topic-id="27487" data-topic-text="security &amp; behavior">security &amp; behavior</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27709" data-topic-text="accessibility">accessibility</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27710" data-topic-text="behavior">behavior</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27711" data-topic-text="usability">usability</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24670-27488" data-expander-for="/topics/security-and-privacy/security-measurement"></i> <a data-topic-id="27488" data-topic-text="security measurement">security measurement</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27690" data-topic-text="analytics">analytics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27691" data-topic-text="assurance">assurance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27692" data-topic-text="modeling">modeling</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27693" data-topic-text="testing &amp; validation">testing &amp; validation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24670-27489" data-expander-for="/topics/security-and-privacy/security-programs-and-operations"></i> <a data-topic-id="27489" data-topic-text="security programs &amp; operations">security programs &amp; operations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27694" data-topic-text="acquisition">acquisition</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27695" data-topic-text="asset management">asset management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27696" data-topic-text="audit &amp; accountability">audit &amp; accountability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27697" data-topic-text="awareness training &amp; education">awareness training &amp; education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27698" data-topic-text="configuration management">configuration management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27699" data-topic-text="contingency planning">contingency planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27700" data-topic-text="incident response">incident response</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27701" data-topic-text="maintenance">maintenance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27702" data-topic-text="media protection">media protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27703" data-topic-text="patch management">patch management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27704" data-topic-text="personnel security">personnel security</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27705" data-topic-text="physical &amp; environmental protection">physical &amp; environmental protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27706" data-topic-text="planning">planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27707" data-topic-text="program management">program management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27708" data-topic-text="security automation">security automation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24670-27490" data-expander-for="/topics/security-and-privacy/systems-security-engineering"></i> <a data-topic-id="27490" data-topic-text="systems security engineering">systems security engineering</a><ul style="display: none;"><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-27490-27713" data-expander-for="/topics/security-and-privacy/systems-security-engineering/trustworthiness"></i> <a data-topic-id="27713" data-topic-text="trustworthiness">trustworthiness</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27775" data-topic-text="reliability">reliability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27776" data-topic-text="resilience">resilience</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27777" data-topic-text="safety">safety</a></li></ul> </li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="28469" data-topic-text="zero trust">zero trust</a></li></ul><strong>Technologies</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27491" data-topic-text="artificial intelligence">artificial intelligence</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27492" data-topic-text="big data">big data</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27493" data-topic-text="biometrics">biometrics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27494" data-topic-text="blockchain">blockchain</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27495" data-topic-text="cloud &amp; virtualization">cloud &amp; virtualization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27496" data-topic-text="combinatorial testing">combinatorial testing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27497" data-topic-text="complexity">complexity</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24671-27499" data-expander-for="/topics/technologies/hardware"></i> <a data-topic-id="27499" data-topic-text="hardware">hardware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27714" data-topic-text="circuits">circuits</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27715" data-topic-text="personal computers">personal computers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27716" data-topic-text="sensors">sensors</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27498" data-topic-text="mobile">mobile</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24671-27500" data-expander-for="/topics/technologies/networks"></i> <a data-topic-id="27500" data-topic-text="networks">networks</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27717" data-topic-text="email">email</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27718" data-topic-text="firewalls">firewalls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27719" data-topic-text="internet">internet</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27501" data-topic-text="quantum information science">quantum information science</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27502" data-topic-text="servers">servers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27503" data-topic-text="smart cards">smart cards</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24671-27504" data-expander-for="/topics/technologies/software-firmware"></i> <a data-topic-id="27504" data-topic-text="software &amp; firmware">software &amp; firmware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27720" data-topic-text="BIOS">BIOS</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27721" data-topic-text="databases">databases</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27722" data-topic-text="operating systems">operating systems</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27505" data-topic-text="storage">storage</a></li></ul></div><div class="col-sm-4"><strong>Applications</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27456" data-topic-text="communications &amp; wireless">communications &amp; wireless</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27457" data-topic-text="cyber-physical systems">cyber-physical systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27458" data-topic-text="cybersecurity education">cybersecurity education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27459" data-topic-text="cybersecurity framework">cybersecurity framework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27460" data-topic-text="cybersecurity workforce">cybersecurity workforce</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27461" data-topic-text="enterprise">enterprise</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27462" data-topic-text="forensics">forensics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27463" data-topic-text="industrial control systems">industrial control systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27464" data-topic-text="Internet of Things">Internet of Things</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="29979" data-topic-text="mathematics">mathematics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27920" data-topic-text="positioning navigation &amp; timing">positioning navigation &amp; timing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27465" data-topic-text="small &amp; medium business">small &amp; medium business</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27466" data-topic-text="telework">telework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27467" data-topic-text="voting">voting</a></li></ul><strong>Laws and Regulations</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24673-27468" data-expander-for="/topics/laws-and-regulations/executive-documents"></i> <a data-topic-id="27468" data-topic-text="executive documents">executive documents</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27668" data-topic-text="Comprehensive National Cybersecurity Initiative">Comprehensive National Cybersecurity Initiative</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27669" data-topic-text="Cybersecurity Strategy and Implementation Plan">Cybersecurity Strategy and Implementation Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27670" data-topic-text="Cyberspace Policy Review">Cyberspace Policy Review</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27671" data-topic-text="Executive Order 13636">Executive Order 13636</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27672" data-topic-text="Executive Order 13702">Executive Order 13702</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27673" data-topic-text="Executive Order 13718">Executive Order 13718</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27674" data-topic-text="Executive Order 13800">Executive Order 13800</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27921" data-topic-text="Executive Order 13905">Executive Order 13905</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28468" data-topic-text="Executive Order 14028">Executive Order 14028</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27675" data-topic-text="Federal Cybersecurity Research and Development Strategic Plan">Federal Cybersecurity Research and Development Strategic Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27676" data-topic-text="Homeland Security Presidential Directive 7">Homeland Security Presidential Directive 7</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27677" data-topic-text="Homeland Security Presidential Directive 12">Homeland Security Presidential Directive 12</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27678" data-topic-text="OMB Circular A-11">OMB Circular A-11</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27679" data-topic-text="OMB Circular A-130">OMB Circular A-130</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24673-27469" data-expander-for="/topics/laws-and-regulations/laws"></i> <a data-topic-id="27469" data-topic-text="laws">laws</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="35985" data-topic-text="CHIPS and Science Act">CHIPS and Science Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27654" data-topic-text="Cyber Security R&amp;D Act">Cyber Security R&D; Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27655" data-topic-text="Cybersecurity Enhancement Act">Cybersecurity Enhancement Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27656" data-topic-text="E-Government Act">E-Government Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27657" data-topic-text="Energy Independence and Security Act">Energy Independence and Security Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27658" data-topic-text="Federal Information Security Modernization Act">Federal Information Security Modernization Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27659" data-topic-text="First Responder Network Authority">First Responder Network Authority</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27660" data-topic-text="Health Insurance Portability and Accountability Act">Health Insurance Portability and Accountability Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27661" data-topic-text="Help America Vote Act">Help America Vote Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28580" data-topic-text="Internet of Things Cybersecurity Improvement Act">Internet of Things Cybersecurity Improvement Act</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24673-27470" data-expander-for="/topics/laws-and-regulations/regulations"></i> <a data-topic-id="27470" data-topic-text="regulations">regulations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27662" data-topic-text="Federal Acquisition Regulation">Federal Acquisition Regulation</a></li></ul> </li></ul></div><div class="col-sm-4"><strong>Activities and Products</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27452" data-topic-text="annual reports">annual reports</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27453" data-topic-text="conferences &amp; workshops">conferences &amp; workshops</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="30210" data-topic-text="groups">groups</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27454" data-topic-text="reference materials">reference materials</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27455" data-topic-text="standards development">standards development</a></li></ul><strong>Sectors</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27471" data-topic-text="aerospace">aerospace</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24675-27472" data-expander-for="/topics/sectors/energy"></i> <a data-topic-id="27472" data-topic-text="energy">energy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27712" data-topic-text="smart grid">smart grid</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27473" data-topic-text="financial services">financial services</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27474" data-topic-text="healthcare">healthcare</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27475" data-topic-text="hospitality">hospitality</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27476" data-topic-text="manufacturing">manufacturing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27477" data-topic-text="public safety">public safety</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27478" data-topic-text="retail">retail</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27479" data-topic-text="telecommunications">telecommunications</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27480" data-topic-text="transportation">transportation</a></li></ul></div></div> <div class="form-inline topics-type"> <label class="radio-label">Match ANY: <input name="topicsMatch-lg" checked="checked" id="topicsMatch-any-lg" name="Form.TopicsMatch" type="radio" value="ANY"/></label> <label class="radio-label">Match ALL: <input name="topicsMatch-lg" id="topicsMatch-all-lg" name="Form.TopicsMatch" type="radio" value="ALL"/></label> </div> </div> <div class="form-group"> <label for="pub-search-controls-lg"> Control Family (800-53) </label> <input name="controls-lg" id="controls-lg" name="Form.Controls" type="hidden" value=""/> <div class="form-control controls-selection" id="pub-search-controls-lg" contenteditable="true" data-drop-target="pub-search-controls-drop-lg" data-field-name="controls-lg" aria-haspopup="true"> </div> <div class="controls-selection-dropdown desktop" id="pub-search-controls-drop-lg" style="display: none;" data-controls-selector=""> <strong>Control Families</strong> <ul> <li><a data-control-id="2049a555-9a3e-4395-88bc-8304c6d9b157">AC - Access Control</a></li> <li><a data-control-id="bb24a9c9-944e-41fc-b6a9-7c4217e054df">AT - Awareness and Training</a></li> <li><a data-control-id="b491696a-7f6b-4b1e-9145-b02938d9c279">AU - Audit and Accountability</a></li> <li><a data-control-id="27484ffc-ac08-40b0-8862-4be4154560e4">CA - Assessment, Authorization and Monitoring</a></li> <li><a data-control-id="b8b9a292-32ad-4698-abad-45c70b40757d">CM - Configuration Management</a></li> <li><a data-control-id="5604c7e8-b158-48c6-a497-c5357a43e7c2">CP - Contingency Planning</a></li> <li><a data-control-id="2b79dd04-6118-44ee-b54d-854948a5b55f">IA - Identification and Authentication</a></li> <li><a data-control-id="b6c1c9c0-3cf8-46c9-b2ae-4cd608f88b11">IR - Incident Response</a></li> <li><a data-control-id="c8219b58-a95d-4882-8e74-0c19369aceb6">MA - Maintenance</a></li> <li><a data-control-id="84b5d6fa-8fbc-4d32-b559-47a626a510b3">MP - Media Protection</a></li> <li><a data-control-id="f3703fe4-b51d-4139-98eb-1656b00fc4ed">PE - Physical and Environmental Protection</a></li> <li><a data-control-id="137c4d9f-6541-4431-bb88-d0d003ce039f">PL - Planning</a></li> <li><a data-control-id="6401481d-3689-49bb-840c-73256cfb102e">PM - Program Management</a></li> <li><a data-control-id="408d8a82-1783-414d-a303-d79525c87f6a">PS - Personnel Security</a></li> <li><a data-control-id="9f34a4cb-3ba3-49e1-8c5c-5aa38c2151e7">PT - PII Processing and Transparency</a></li> <li><a data-control-id="1d0ff39c-a0ed-408e-8251-fbcd24dc74eb">RA - Risk Assessment</a></li> <li><a data-control-id="d1d6d136-ad89-4ab2-9207-6bec08ef6299">SA - System and Services Acquisition</a></li> <li><a data-control-id="2067a45e-da04-471b-95ad-d0882d74ccaf">SC - System and Communications Protection</a></li> <li><a data-control-id="1d78556b-00f2-47e7-992a-9d8fb08bda2a">SI - System and Information Integrity</a></li> <li><a data-control-id="6a7ab58f-e8ef-4264-aad0-29c656a03c59">SR - Supply Chain Risk Management</a></li> </ul> </div> <div class="form-inline controls-type"> <label class="radio-label">Match ANY: <input name="controlsMatch-lg" checked="checked" id="controlsMatch-any-lg" name="Form.ControlsMatch" type="radio" value="ANY"/></label> <label class="radio-label">Match ALL: <input name="controlsMatch-lg" id="controlsMatch-all-lg" name="Form.ControlsMatch" type="radio" value="ALL"/></label> </div> </div> <div style="display: none;" data-form-error-pane="true" class="text-danger"> <strong class="text-danger">Please fix the following:</strong> <ul data-form-error-list="true"> </ul> <div class="validation-summary-valid" data-valmsg-summary="true"><ul><li style="display:none"></li> </ul></div> </div> <div class="form-group"> <button type="submit" id="pubs-search-submit-lg" name="submit-btn" data-form-button="submit" class="btn">Search</button> <button type="reset" id="pubs-search-reset-lg" name="reset-btn" data-form-button="reset" class="btn">Reset</button> </div> <span style="display: none;" id="publications-status-info"> <p><strong>Final:</strong> Published documents.</p> <p><strong>Public Draft:</strong> Documents have been posted as Public Drafts, typically with a public comment period.</p> <p> <strong>Withdrawn:</strong> Documents that have been withdrawn, and are no longer current. This includes:<br/> - Final publications that have been withdrawn;<br/> - Public drafts that have been obsoleted by a subsequent draft or final publication;<br/> - Public drafts that have been retired鈥攆urther development was discontinued. </p> </span> </form> </div> <div class="col-lg-9 col-md-8 col-sm-12 col-xs-12 col-xxs-12"> <h4>Search Results</h4> <form action="/web/20231004175329/https://csrc.nist.gov/publications/search" class="bs-callout bs-callout-success csrc-search-form hidden-lg hidden-md mobile-form" data-csrc-form="true" data-default-query="+ser_series:project* +ser_status:(draft final)" data-form-ignore-default="sortBy" data-form-name="pubSearchMobile" id="pubs-search-form-sm" method="get"> <div class="form-group"> <label for="keywords-sm">Search</label> <input name="keywords-sm" class="form-control" data-val="true" data-val-length="The field Search must be a string with a maximum length of 255." data-val-length-max="255" id="keywords-sm" name="Form.Keywords" type="text" value=""/> <em class="text-muted">Search publication record data<br/> (not a full text search)</em> </div> <div class="form-group"> <label for="sortBy-sm">Sort By</label> <div class="form-inline"> <select name="sortBy-sm" class="form-control" id="sortBy-sm" name="Form.SortBy"><option selected="selected" value="relevance">Relevance (best match)</option> <option value="releasedate DESC">Release Date (newest first)</option> <option value="releasedate ASC">Release Date (oldest first)</option> <option value="Series ASC">Series (A-Z)</option> <option value="Series DESC">Series (Z-A)</option> <option value="Number ASC">Number (lowest to highest)</option> <option value="Number DESC">Number (highest to lowest)</option> <option value="title asc">Title (A-Z)</option> <option value="title desc">Title (Z-A)</option> </select> </div> </div> <div class="form-group"> <label for="viewMode-sm">Results View</label> <select name="viewMode-sm" class="form-control" id="viewMode-sm" name="Form.ResultsViewMode"><option selected="selected" value="brief">Brief</option> <option value="summary">Summary</option> </select> </div> <div class="form-group form-inline"> <label for="ipp-sm" class="form-control-half">Items Per Page</label> <select name="ipp-sm" class="form-control" id="ipp-sm" name="Form.ItemsPerPage"><option selected="selected" value="50">50</option> <option value="75">75</option> <option value="100">100</option> <option value="all">All</option> </select> </div> <div class="form-group"> <p class="text-center"> <a href="#" data-form-show-name="advancedSearch" id="advanced-search-link"> Advanced Search <i class="fa fa-caret-down" aria-hidden="true" data-form-show-expanded="true" style="display: none;"></i> <i class="fa fa-caret-up" aria-hidden="true" data-form-show-expanded="false"></i> </a> </p> </div> <div style="display: none;" data-form-show-trigger="advancedSearch" data-form-show="false"> <div class="form-group"> <label for="dateFrom-sm">Date</label> <div class="form-inline form-date-inline"> <div class="input-group date" data-date-picker="true"> <input name="dateFrom-sm" class="form-control" data-control-type="date" data-val="true" data-val-date="The field Date must be a date." data-validation="true" data-validation-compare-field="dateTo-sm" data-validation-message="From date must be less than To date" data-validation-type="less-than-date" id="dateFrom-sm" name="Form.DateFrom" placeholder=" / / " type="text" value=""/> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> <div class="input-group date" data-date-picker="true"> <input name="dateTo-sm" class="form-control" data-control-type="date" data-val="true" data-val-date="The field DateTo must be a date." id="dateTo-sm" name="Form.DateTo" placeholder=" / / " type="text" value=""/> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> </div> </div> <div class="form-group"> <label for="status-all-sm"> Status <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="publications-status-info-sm"></i> </label> <div class="form-inline status-type" style="margin-left: 1rem;"> <label class="meta-label"> <input type="checkbox" id="status-final-sm" name="status-sm" value="Final" data-default-checked="True" checked="'checked'"/> Final<br/> </label> <label class="meta-label"> <input type="checkbox" id="status-draft-sm" name="status-sm" value="Draft" data-default-checked="True" checked="'checked'"/> Public Draft<br/> </label> <label class="meta-label"> <input type="checkbox" id="status-withdrawn-sm" name="status-sm" value="Withdrawn" data-default-checked="True"/> Withdrawn<br/> </label> </div> </div> <div class="form-group"> <label for="pub-search-series"> Series <button type="button" id="series-all-sm" class="btn btn-sm btn-success" data-check-all="series-sm">Check All</button> <button type="button" id="series-clear-sm" class="btn btn-sm btn-success" data-check-none="series-sm">Clear</button> </label> <div class="form-inline series-type" style="margin-left: 1rem;"> <label class="meta-label"> <input type="checkbox" id="series-b2b6ef80-0dec-4d48-ae2d-a37ab486a846-sm" name="series-sm" value="FIPS" data-default-checked="True"/> FIPS<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-749c7275-15f5-4eec-8cb9-3b6f1528756c-sm" name="series-sm" value="SP" data-default-checked="True"/> SP<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-344a35c7-520e-4845-88b0-6997147ffc76-sm" name="series-sm" value="IR" data-default-checked="True"/> IR<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-5f83968e-4758-479d-9aa4-1d42166b7deb-sm" name="series-sm" value="CSWP" data-default-checked="True"/> CSWP<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-b2004197-4249-454a-bdce-edc6186b5c60-sm" name="series-sm" value="TN" data-default-checked="True"/> TN<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-09acb409-e18b-4a05-ac84-631662bcccd9-sm" name="series-sm" value="VTS" data-default-checked="True"/> VTS<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-8022364e-73db-4498-b2eb-9317ce32fff2-sm" name="series-sm" value="AI" data-default-checked="True"/> AI<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-57afe5d0-383f-4fd6-b702-84233dcd5f13-sm" name="series-sm" value="GCR" data-default-checked="True"/> GCR<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-23801152-858e-4dbc-baad-eb51795cf0e2-sm" name="series-sm" value="Project Description" data-default-checked="True"/> Project Description<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-8c9f1828-ae8a-4f03-8d9f-9ff7192b508e-sm" name="series-sm" value="ITL Bulletin" data-default-checked="True"/> ITL Bulletin<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-debd6afb-aeaa-4790-a32b-c977c9654df0-sm" name="series-sm" value="Journal Article" data-default-checked="True"/> Journal Article<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-ed478237-d49d-41c6-91ed-5dd341bd50c8-sm" name="series-sm" value="Conference Paper" data-default-checked="True"/> Conference Paper<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-f2273ac7-d756-4cce-b006-a527778c84f0-sm" name="series-sm" value="Book" data-default-checked="True"/> Book<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-80e369a4-bea5-46f5-8082-91f19c3eeefa-sm" name="series-sm" value="Book Section" data-default-checked="True"/> Book Section<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-b1570e28-332c-4f29-a1e0-cd31c3930848-sm" name="series-sm" value="Other" data-default-checked="True"/> Other<br/> </label> </div> </div> <div class="form-group"> <label for="pub-search-topics-sm"> Topics </label> <input name="topics-sm" id="topics-sm" name="Form.Topics" type="hidden" value=""/> <div class="form-control topics-selection" id="pub-search-topics-sm" contenteditable="true" data-drop-target="pub-search-topics-drop-sm" data-field-name="topics-sm" aria-haspopup="true" aria-expanded="false"> </div> <div class="topics-selection-dropdown desktop" id="pub-search-topics-drop-sm" style="display: none;" data-topics-selector=""><div class="col-sm-4"><strong>Security and Privacy</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24670-27481" data-expander-for="/topics/security-and-privacy/cryptography"></i> <a data-topic-id="27481" data-topic-text="cryptography">cryptography</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27647" data-topic-text="digital signatures">digital signatures</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27648" data-topic-text="encryption">encryption</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27649" data-topic-text="key management">key management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="30027" data-topic-text="lightweight cryptography">lightweight cryptography</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27650" data-topic-text="message authentication">message authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27651" data-topic-text="post-quantum cryptography">post-quantum cryptography</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27652" data-topic-text="random number generation">random number generation</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27653" data-topic-text="secure hashing">secure hashing</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27482" data-topic-text="cybersecurity supply chain risk management">cybersecurity supply chain risk management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27483" data-topic-text="general security &amp; privacy">general security &amp; privacy</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24670-27484" data-expander-for="/topics/security-and-privacy/identity-and-access-management"></i> <a data-topic-id="27484" data-topic-text="identity &amp; access management">identity &amp; access management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27663" data-topic-text="access authorization">access authorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27664" data-topic-text="access control">access control</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27665" data-topic-text="authentication">authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27666" data-topic-text="Personal Identity Verification">Personal Identity Verification</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27667" data-topic-text="public key infrastructure">public key infrastructure</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24670-27485" data-expander-for="/topics/security-and-privacy/privacy"></i> <a data-topic-id="27485" data-topic-text="privacy">privacy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27680" data-topic-text="personally identifiable information">personally identifiable information</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27681" data-topic-text="privacy engineering">privacy engineering</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24670-27486" data-expander-for="/topics/security-and-privacy/risk-management"></i> <a data-topic-id="27486" data-topic-text="risk management">risk management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27682" data-topic-text="categorization">categorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27683" data-topic-text="continuous monitoring">continuous monitoring</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-27486-27684" data-expander-for="/topics/security-and-privacy/risk-management/controls"></i> <a data-topic-id="27684" data-topic-text="controls">controls</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27767" data-topic-text="controls assessment">controls assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27768" data-topic-text="privacy controls">privacy controls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27769" data-topic-text="security controls">security controls</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27685" data-topic-text="risk assessment">risk assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27686" data-topic-text="roots of trust">roots of trust</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27687" data-topic-text="system authorization">system authorization</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-27486-27688" data-expander-for="/topics/security-and-privacy/risk-management/threats"></i> <a data-topic-id="27688" data-topic-text="threats">threats</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27770" data-topic-text="advanced persistent threats">advanced persistent threats</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27771" data-topic-text="botnets">botnets</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27772" data-topic-text="information sharing">information sharing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27773" data-topic-text="intrusion detection &amp; prevention">intrusion detection &amp; prevention</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27774" data-topic-text="malware">malware</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27689" data-topic-text="vulnerability management">vulnerability management</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24670-27487" data-expander-for="/topics/security-and-privacy/security-and-behavior"></i> <a data-topic-id="27487" data-topic-text="security &amp; behavior">security &amp; behavior</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27709" data-topic-text="accessibility">accessibility</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27710" data-topic-text="behavior">behavior</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27711" data-topic-text="usability">usability</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24670-27488" data-expander-for="/topics/security-and-privacy/security-measurement"></i> <a data-topic-id="27488" data-topic-text="security measurement">security measurement</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27690" data-topic-text="analytics">analytics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27691" data-topic-text="assurance">assurance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27692" data-topic-text="modeling">modeling</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27693" data-topic-text="testing &amp; validation">testing &amp; validation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24670-27489" data-expander-for="/topics/security-and-privacy/security-programs-and-operations"></i> <a data-topic-id="27489" data-topic-text="security programs &amp; operations">security programs &amp; operations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27694" data-topic-text="acquisition">acquisition</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27695" data-topic-text="asset management">asset management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27696" data-topic-text="audit &amp; accountability">audit &amp; accountability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27697" data-topic-text="awareness training &amp; education">awareness training &amp; education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27698" data-topic-text="configuration management">configuration management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27699" data-topic-text="contingency planning">contingency planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27700" data-topic-text="incident response">incident response</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27701" data-topic-text="maintenance">maintenance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27702" data-topic-text="media protection">media protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27703" data-topic-text="patch management">patch management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27704" data-topic-text="personnel security">personnel security</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27705" data-topic-text="physical &amp; environmental protection">physical &amp; environmental protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27706" data-topic-text="planning">planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27707" data-topic-text="program management">program management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27708" data-topic-text="security automation">security automation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24670-27490" data-expander-for="/topics/security-and-privacy/systems-security-engineering"></i> <a data-topic-id="27490" data-topic-text="systems security engineering">systems security engineering</a><ul style="display: none;"><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-27490-27713" data-expander-for="/topics/security-and-privacy/systems-security-engineering/trustworthiness"></i> <a data-topic-id="27713" data-topic-text="trustworthiness">trustworthiness</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27775" data-topic-text="reliability">reliability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27776" data-topic-text="resilience">resilience</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27777" data-topic-text="safety">safety</a></li></ul> </li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="28469" data-topic-text="zero trust">zero trust</a></li></ul><strong>Technologies</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27491" data-topic-text="artificial intelligence">artificial intelligence</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27492" data-topic-text="big data">big data</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27493" data-topic-text="biometrics">biometrics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27494" data-topic-text="blockchain">blockchain</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27495" data-topic-text="cloud &amp; virtualization">cloud &amp; virtualization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27496" data-topic-text="combinatorial testing">combinatorial testing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27497" data-topic-text="complexity">complexity</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24671-27499" data-expander-for="/topics/technologies/hardware"></i> <a data-topic-id="27499" data-topic-text="hardware">hardware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27714" data-topic-text="circuits">circuits</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27715" data-topic-text="personal computers">personal computers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27716" data-topic-text="sensors">sensors</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27498" data-topic-text="mobile">mobile</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24671-27500" data-expander-for="/topics/technologies/networks"></i> <a data-topic-id="27500" data-topic-text="networks">networks</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27717" data-topic-text="email">email</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27718" data-topic-text="firewalls">firewalls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27719" data-topic-text="internet">internet</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27501" data-topic-text="quantum information science">quantum information science</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27502" data-topic-text="servers">servers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27503" data-topic-text="smart cards">smart cards</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24671-27504" data-expander-for="/topics/technologies/software-firmware"></i> <a data-topic-id="27504" data-topic-text="software &amp; firmware">software &amp; firmware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27720" data-topic-text="BIOS">BIOS</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27721" data-topic-text="databases">databases</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27722" data-topic-text="operating systems">operating systems</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27505" data-topic-text="storage">storage</a></li></ul></div><div class="col-sm-4"><strong>Applications</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27456" data-topic-text="communications &amp; wireless">communications &amp; wireless</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27457" data-topic-text="cyber-physical systems">cyber-physical systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27458" data-topic-text="cybersecurity education">cybersecurity education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27459" data-topic-text="cybersecurity framework">cybersecurity framework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27460" data-topic-text="cybersecurity workforce">cybersecurity workforce</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27461" data-topic-text="enterprise">enterprise</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27462" data-topic-text="forensics">forensics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27463" data-topic-text="industrial control systems">industrial control systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27464" data-topic-text="Internet of Things">Internet of Things</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="29979" data-topic-text="mathematics">mathematics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27920" data-topic-text="positioning navigation &amp; timing">positioning navigation &amp; timing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27465" data-topic-text="small &amp; medium business">small &amp; medium business</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27466" data-topic-text="telework">telework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27467" data-topic-text="voting">voting</a></li></ul><strong>Laws and Regulations</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24673-27468" data-expander-for="/topics/laws-and-regulations/executive-documents"></i> <a data-topic-id="27468" data-topic-text="executive documents">executive documents</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27668" data-topic-text="Comprehensive National Cybersecurity Initiative">Comprehensive National Cybersecurity Initiative</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27669" data-topic-text="Cybersecurity Strategy and Implementation Plan">Cybersecurity Strategy and Implementation Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27670" data-topic-text="Cyberspace Policy Review">Cyberspace Policy Review</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27671" data-topic-text="Executive Order 13636">Executive Order 13636</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27672" data-topic-text="Executive Order 13702">Executive Order 13702</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27673" data-topic-text="Executive Order 13718">Executive Order 13718</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27674" data-topic-text="Executive Order 13800">Executive Order 13800</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27921" data-topic-text="Executive Order 13905">Executive Order 13905</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28468" data-topic-text="Executive Order 14028">Executive Order 14028</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27675" data-topic-text="Federal Cybersecurity Research and Development Strategic Plan">Federal Cybersecurity Research and Development Strategic Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27676" data-topic-text="Homeland Security Presidential Directive 7">Homeland Security Presidential Directive 7</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27677" data-topic-text="Homeland Security Presidential Directive 12">Homeland Security Presidential Directive 12</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27678" data-topic-text="OMB Circular A-11">OMB Circular A-11</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27679" data-topic-text="OMB Circular A-130">OMB Circular A-130</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24673-27469" data-expander-for="/topics/laws-and-regulations/laws"></i> <a data-topic-id="27469" data-topic-text="laws">laws</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="35985" data-topic-text="CHIPS and Science Act">CHIPS and Science Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27654" data-topic-text="Cyber Security R&amp;D Act">Cyber Security R&D; Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27655" data-topic-text="Cybersecurity Enhancement Act">Cybersecurity Enhancement Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27656" data-topic-text="E-Government Act">E-Government Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27657" data-topic-text="Energy Independence and Security Act">Energy Independence and Security Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27658" data-topic-text="Federal Information Security Modernization Act">Federal Information Security Modernization Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27659" data-topic-text="First Responder Network Authority">First Responder Network Authority</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27660" data-topic-text="Health Insurance Portability and Accountability Act">Health Insurance Portability and Accountability Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27661" data-topic-text="Help America Vote Act">Help America Vote Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28580" data-topic-text="Internet of Things Cybersecurity Improvement Act">Internet of Things Cybersecurity Improvement Act</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24673-27470" data-expander-for="/topics/laws-and-regulations/regulations"></i> <a data-topic-id="27470" data-topic-text="regulations">regulations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27662" data-topic-text="Federal Acquisition Regulation">Federal Acquisition Regulation</a></li></ul> </li></ul></div><div class="col-sm-4"><strong>Activities and Products</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27452" data-topic-text="annual reports">annual reports</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27453" data-topic-text="conferences &amp; workshops">conferences &amp; workshops</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="30210" data-topic-text="groups">groups</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27454" data-topic-text="reference materials">reference materials</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27455" data-topic-text="standards development">standards development</a></li></ul><strong>Sectors</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27471" data-topic-text="aerospace">aerospace</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24675-27472" data-expander-for="/topics/sectors/energy"></i> <a data-topic-id="27472" data-topic-text="energy">energy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27712" data-topic-text="smart grid">smart grid</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27473" data-topic-text="financial services">financial services</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27474" data-topic-text="healthcare">healthcare</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27475" data-topic-text="hospitality">hospitality</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27476" data-topic-text="manufacturing">manufacturing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27477" data-topic-text="public safety">public safety</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27478" data-topic-text="retail">retail</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27479" data-topic-text="telecommunications">telecommunications</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27480" data-topic-text="transportation">transportation</a></li></ul></div></div> <div class="form-inline topics-type"> <label class="radio-label">Match ANY: <input name="topicsMatch-sm" checked="checked" id="topicsMatch-any-sm" name="Form.TopicsMatch" type="radio" value="ANY"/></label> <label class="radio-label">Match ALL: <input name="topicsMatch-sm" id="topicsMatch-all-sm" name="Form.TopicsMatch" type="radio" value="ALL"/></label> </div> </div> <div class="form-group"> <label for="pub-search-controls-sm"> Control Family (800-53) </label> <input name="controls-sm" id="controls-sm" name="Form.Controls" type="hidden" value=""/> <div class="form-control controls-selection" id="pub-search-controls-sm" contenteditable="true" data-drop-target="pub-search-controls-drop-sm" data-field-name="controls-sm" aria-haspopup="true" aria-expanded="false"> </div> <div class="controls-selection-dropdown desktop" id="pub-search-controls-drop-sm" style="display: none;" data-controls-selector=""> <strong>Control Families</strong> <ul> <li><a data-control-id="2049a555-9a3e-4395-88bc-8304c6d9b157">AC - Access Control</a></li> <li><a data-control-id="bb24a9c9-944e-41fc-b6a9-7c4217e054df">AT - Awareness and Training</a></li> <li><a data-control-id="b491696a-7f6b-4b1e-9145-b02938d9c279">AU - Audit and Accountability</a></li> <li><a data-control-id="27484ffc-ac08-40b0-8862-4be4154560e4">CA - Assessment, Authorization and Monitoring</a></li> <li><a data-control-id="b8b9a292-32ad-4698-abad-45c70b40757d">CM - Configuration Management</a></li> <li><a data-control-id="5604c7e8-b158-48c6-a497-c5357a43e7c2">CP - Contingency Planning</a></li> <li><a data-control-id="2b79dd04-6118-44ee-b54d-854948a5b55f">IA - Identification and Authentication</a></li> <li><a data-control-id="b6c1c9c0-3cf8-46c9-b2ae-4cd608f88b11">IR - Incident Response</a></li> <li><a data-control-id="c8219b58-a95d-4882-8e74-0c19369aceb6">MA - Maintenance</a></li> <li><a data-control-id="84b5d6fa-8fbc-4d32-b559-47a626a510b3">MP - Media Protection</a></li> <li><a data-control-id="f3703fe4-b51d-4139-98eb-1656b00fc4ed">PE - Physical and Environmental Protection</a></li> <li><a data-control-id="137c4d9f-6541-4431-bb88-d0d003ce039f">PL - Planning</a></li> <li><a data-control-id="6401481d-3689-49bb-840c-73256cfb102e">PM - Program Management</a></li> <li><a data-control-id="408d8a82-1783-414d-a303-d79525c87f6a">PS - Personnel Security</a></li> <li><a data-control-id="9f34a4cb-3ba3-49e1-8c5c-5aa38c2151e7">PT - PII Processing and Transparency</a></li> <li><a data-control-id="1d0ff39c-a0ed-408e-8251-fbcd24dc74eb">RA - Risk Assessment</a></li> <li><a data-control-id="d1d6d136-ad89-4ab2-9207-6bec08ef6299">SA - System and Services Acquisition</a></li> <li><a data-control-id="2067a45e-da04-471b-95ad-d0882d74ccaf">SC - System and Communications Protection</a></li> <li><a data-control-id="1d78556b-00f2-47e7-992a-9d8fb08bda2a">SI - System and Information Integrity</a></li> <li><a data-control-id="6a7ab58f-e8ef-4264-aad0-29c656a03c59">SR - Supply Chain Risk Management</a></li> </ul> </div> <div class="form-inline controls-type"> <label class="radio-label">Match ANY: <input name="controlsMatch-sm" checked="checked" id="controlsMatch-any-sm" name="Form.ControlsMatch" type="radio" value="ANY"/></label> <label class="radio-label">Match ALL: <input name="controlsMatch-sm" id="controlsMatch-all-sm" name="Form.ControlsMatch" type="radio" value="ALL"/></label> </div> </div> </div> <div style="display: none;" data-form-error-pane="true" class="text-danger"> <strong class="text-danger">Please fix the following:</strong> <ul data-form-error-list="true"> </ul> <div class="validation-summary-valid" data-valmsg-summary="true"><ul><li style="display:none"></li> </ul></div> </div> <div class="form-group"> <button type="submit" id="pubs-search-submit-sm" name="submit-btn" data-form-button="submit" class="btn">Search</button> <button type="reset" id="pubs-search-reset-sm" name="reset-btn" data-form-button="reset" class="btn">Reset</button> </div> <span style="display: none;" id="publications-status-info-sm"> <p><strong>Final:</strong> Published documents.</p> <p><strong>Public Draft:</strong> Documents have been posted as Public Drafts, typically with a public comment period.</p> <p> <strong>Withdrawn:</strong> Documents that have been withdrawn, and are no longer current. This includes:<br/> - Final publications that have been withdrawn;<br/> - Public drafts that have been obsoleted by a subsequent draft or final publication;<br/> - Public drafts that have been retired鈥攆urther development was discontinued. </p> </span> </form> <div id="search-criteria-container" data-target-form="pubSearchDesktop"></div> <div class="row top-pagination-area"> <div class="col-md-6 col-sm-12"> <span id="showing-results-text" data-total-pages="1" data-first-record="1" data-last-record="46" data-current-page="1" data-items-per-page="0" data-total-results="46">Showing <strong id="showing-results-total">46</strong> matching records.</span> </div> <div class="col-md-6 col-sm-12"> <span class="pull-right hidden-sm hidden-xs hidden-xxs"> <span class="pagination-links" id="top-pagination-container" data-total-pages="0" data-min-page="1" data-max-page="0" data-current-page="1" data-show-first="False" data-show-last="True"></span> </span> <p class="text-center hidden-md hidden-lg"> <span class="pagination-links" id="mobile-top-pagination-container" data-total-pages="0" data-min-page="1" data-max-page="0" data-current-page="1" data-show-first="False" data-show-last="True"></span> </p> </div> </div> <table class="table table-striped table-condensed publications-table table-bordered" id="publications-results-table" data-total-records="46" data-page="1" data-first-record="1" data-last-record="46" data-ipp="0"> <thead> <tr> <th nowrap class="hidden-sm hidden-xs hidden-xxs">Series</th> <th nowrap class="hidden-sm hidden-xs hidden-xxs">Number</th> <th nowrap> <span class="hidden-sm hidden-xs hidden-xxs">Title</span> <span class="hidden-md hidden-lg">Publications</span> </th> <th nowrap class="hidden-sm hidden-xs hidden-xxs">Status</th> <th nowrap class="hidden-sm hidden-xs hidden-xxs">Release Date</th> </tr> </thead> <tbody> <tr id="result-1"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-1">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-1"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2023/08/14/manufacturing-supply-chain-traceability-with-block/final" id="pub-title-link-1">Manufacturing Supply Chain Traceability with Blockchain Related Technology: Reference Implementation</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-1">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2023/08/14/manufacturing-supply-chain-traceability-with-block/final" class="mobile-pub-title" id="pub-title-link-sm-1">Manufacturing Supply Chain Traceability with Blockchain Related Technology: Reference Implementation</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-1">8/14/2023</strong> <br/> Status: <span id="pub-status-sm-1">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-1"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-1"> 8/14/2023 </td> </tr> <tr id="result-2"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-2">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-2"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2023/06/20/cybersecurity-for-the-water-and-wastewater-sector/final" id="pub-title-link-2">Cybersecurity for the Water and Wastewater Sector: A Practical Reference Design for Mitigating Cyber Risk in Water and Wastewater Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-2">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2023/06/20/cybersecurity-for-the-water-and-wastewater-sector/final" class="mobile-pub-title" id="pub-title-link-sm-2">Cybersecurity for the Water and Wastewater Sector: A Practical Reference Design for Mitigating Cyber Risk in Water and Wastewater Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-2">6/20/2023</strong> <br/> Status: <span id="pub-status-sm-2">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-2"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-2"> 6/20/2023 </td> </tr> <tr id="result-3"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-3">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-3"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2023/06/01/accelerate-adoption-of-digital-identities-on-mobil/final" id="pub-title-link-3">Accelerate Adoption of Digital Identities on Mobile Devices: Identity Management</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-3">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2023/06/01/accelerate-adoption-of-digital-identities-on-mobil/final" class="mobile-pub-title" id="pub-title-link-sm-3">Accelerate Adoption of Digital Identities on Mobile Devices: Identity Management</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-3">6/01/2023</strong> <br/> Status: <span id="pub-status-sm-3">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-3"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-3"> 6/01/2023 </td> </tr> <tr id="result-4"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-4">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-4"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2022/12/22/responding-to-and-recovering-from-a-cyber-attack-m/final" id="pub-title-link-4">Responding to and Recovering from a Cyber Attack: Cybersecurity for the Manufacturing Sector (Rev. 1)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-4">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2022/12/22/responding-to-and-recovering-from-a-cyber-attack-m/final" class="mobile-pub-title" id="pub-title-link-sm-4">Responding to and Recovering from a Cyber Attack: Cybersecurity for the Manufacturing Sector (Rev. 1)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-4">12/22/2022</strong> <br/> Status: <span id="pub-status-sm-4">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-4"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-4"> 12/22/2022 </td> </tr> <tr id="result-5"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-5">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-5"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2022/11/09/mitigating-ai-ml-bias-in-context/final" id="pub-title-link-5">Mitigating AI/ML Bias in Context: Establishing Practices for Testing, Evaluation, Verification, and Validation of AI Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-5">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2022/11/09/mitigating-ai-ml-bias-in-context/final" class="mobile-pub-title" id="pub-title-link-sm-5">Mitigating AI/ML Bias in Context: Establishing Practices for Testing, Evaluation, Verification, and Validation of AI Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-5">11/09/2022</strong> <br/> Status: <span id="pub-status-sm-5">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-5"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-5"> 11/09/2022 </td> </tr> <tr id="result-6"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-6">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-6"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2022/11/09/implementing-a-riskbased-approach-to-devsecops/final" id="pub-title-link-6">Software Supply Chain and DevOps Security Practices: Implementing a Risk-Based Approach to DevSecOps</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-6">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2022/11/09/implementing-a-riskbased-approach-to-devsecops/final" class="mobile-pub-title" id="pub-title-link-sm-6">Software Supply Chain and DevOps Security Practices: Implementing a Risk-Based Approach to DevSecOps</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-6">11/09/2022</strong> <br/> Status: <span id="pub-status-sm-6">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-6"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-6"> 11/09/2022 </td> </tr> <tr id="result-7"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-7">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-7"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2022/08/29/mitigating-cyber-risk-in-telehealth-smart-home-int/final" id="pub-title-link-7">Mitigating Cybersecurity Risk in Telehealth Smart Home Integration: Cybersecurity for the Healthcare Sector</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-7">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2022/08/29/mitigating-cyber-risk-in-telehealth-smart-home-int/final" class="mobile-pub-title" id="pub-title-link-sm-7">Mitigating Cybersecurity Risk in Telehealth Smart Home Integration: Cybersecurity for the Healthcare Sector</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-7">8/29/2022</strong> <br/> Status: <span id="pub-status-sm-7">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-7"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-7"> 8/29/2022 </td> </tr> <tr id="result-8"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-8">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-8"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2021/12/09/secure-ipv6only-implementation-in-the-enterprise/ipd" id="pub-title-link-8">Secure IPv6-Only Implementation in the Enterprise</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-8">Project Description (Initial Public Draft)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2021/12/09/secure-ipv6only-implementation-in-the-enterprise/ipd" class="mobile-pub-title" id="pub-title-link-sm-8">Secure IPv6-Only Implementation in the Enterprise</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-8">12/09/2021</strong> <br/> Status: <span id="pub-status-sm-8">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-8"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-8"> 12/09/2021 </td> </tr> <tr id="result-9"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-9">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-9"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2021/08/04/migration-to-postquantum-cryptography/final" id="pub-title-link-9">Migration to Post-Quantum Cryptography</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-9">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2021/08/04/migration-to-postquantum-cryptography/final" class="mobile-pub-title" id="pub-title-link-sm-9">Migration to Post-Quantum Cryptography</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-9">8/04/2021</strong> <br/> Status: <span id="pub-status-sm-9">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-9"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-9"> 8/04/2021 </td> </tr> <tr id="result-10"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-10">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-10"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2021/07/22/data-classification-practices-datacentric-security/final" id="pub-title-link-10">Data Classification Practices: Facilitating Data-Centric Security Management</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-10">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2021/07/22/data-classification-practices-datacentric-security/final" class="mobile-pub-title" id="pub-title-link-sm-10">Data Classification Practices: Facilitating Data-Centric Security Management</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-10">7/22/2021</strong> <br/> Status: <span id="pub-status-sm-10">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-10"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-10"> 7/22/2021 </td> </tr> <tr id="result-11"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-11">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-11"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2021/07/01/automation-of-the-cryptographic-module-validation/final" id="pub-title-link-11">Automation of the Cryptographic Module Validation Program (CMVP)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-11">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2021/07/01/automation-of-the-cryptographic-module-validation/final" class="mobile-pub-title" id="pub-title-link-sm-11">Automation of the Cryptographic Module Validation Program (CMVP)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-11">7/01/2021</strong> <br/> Status: <span id="pub-status-sm-11">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-11"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-11"> 7/01/2021 </td> </tr> <tr id="result-12"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-12">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-12"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2021/05/26/addressing-visibility-challenges-with-tls-13/final" id="pub-title-link-12">Addressing Visibility Challenges with TLS 1.3</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-12">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2021/05/26/addressing-visibility-challenges-with-tls-13/final" class="mobile-pub-title" id="pub-title-link-sm-12">Addressing Visibility Challenges with TLS 1.3</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-12">5/26/2021</strong> <br/> Status: <span id="pub-status-sm-12">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-12"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-12"> 5/26/2021 </td> </tr> <tr id="result-13"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-13">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-13"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2021/05/20/trusted-iot-device-networklayer-onboarding-and-lcm/final" id="pub-title-link-13">Trusted Internet of Things (IoT) Device Network-Layer Onboarding and Lifecycle Management: Enhancing Internet Protocol-Based IoT Device and Network Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-13">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2021/05/20/trusted-iot-device-networklayer-onboarding-and-lcm/final" class="mobile-pub-title" id="pub-title-link-sm-13">Trusted Internet of Things (IoT) Device Network-Layer Onboarding and Lifecycle Management: Enhancing Internet Protocol-Based IoT Device and Network Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-13">5/20/2021</strong> <br/> Status: <span id="pub-status-sm-13">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-13"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-13"> 5/20/2021 </td> </tr> <tr id="result-14"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-14">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-14"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2020/10/21/implementing-a-zero-trust-architecture/final" id="pub-title-link-14">Implementing a Zero Trust Architecture</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-14">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2020/10/21/implementing-a-zero-trust-architecture/final" class="mobile-pub-title" id="pub-title-link-sm-14">Implementing a Zero Trust Architecture</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-14">10/21/2020</strong> <br/> Status: <span id="pub-status-sm-14">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-14"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-14"> 10/21/2020 </td> </tr> <tr id="result-15"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-15">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-15"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2020/04/13/5g-cybersecurity-preparing-a-secure-evolution-to-5/final" id="pub-title-link-15">5G Cybersecurity: Preparing a Secure Evolution to 5G</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-15">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2020/04/13/5g-cybersecurity-preparing-a-secure-evolution-to-5/final" class="mobile-pub-title" id="pub-title-link-sm-15">5G Cybersecurity: Preparing a Secure Evolution to 5G</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-15">4/13/2020</strong> <br/> Status: <span id="pub-status-sm-15">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-15"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-15"> 4/13/2020 </td> </tr> <tr id="result-16"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-16">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-16"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2020/03/30/critical-cybersecurity-hygiene-patching-the-enterp/final" id="pub-title-link-16">Critical Cybersecurity Hygiene: Patching the Enterprise</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-16">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2020/03/30/critical-cybersecurity-hygiene-patching-the-enterp/final" class="mobile-pub-title" id="pub-title-link-sm-16">Critical Cybersecurity Hygiene: Patching the Enterprise</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-16">3/30/2020</strong> <br/> Status: <span id="pub-status-sm-16">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-16"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-16"> 3/30/2020 </td> </tr> <tr id="result-17"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-17">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-17"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2020/03/26/validating-the-integrity-of-servers-and-client-dev/final" id="pub-title-link-17">Validating the Integrity of Computing Devices: Supply Chain Assurance</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-17">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2020/03/26/validating-the-integrity-of-servers-and-client-dev/final" class="mobile-pub-title" id="pub-title-link-sm-17">Validating the Integrity of Computing Devices: Supply Chain Assurance</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-17">3/26/2020</strong> <br/> Status: <span id="pub-status-sm-17">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-17"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-17"> 3/26/2020 </td> </tr> <tr id="result-18"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-18">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-18"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2020/02/07/protecting-information-and-system-integrity-attack/final" id="pub-title-link-18">Protecting Information and System Integrity in Industrial Control Systems Environments: Cybersecurity for the Manufacturing Sector</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-18">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2020/02/07/protecting-information-and-system-integrity-attack/final" class="mobile-pub-title" id="pub-title-link-sm-18">Protecting Information and System Integrity in Industrial Control Systems Environments: Cybersecurity for the Manufacturing Sector</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-18">2/07/2020</strong> <br/> Status: <span id="pub-status-sm-18">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-18"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-18"> 2/07/2020 </td> </tr> <tr id="result-19"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-19">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-19"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2019/12/05/detect-respond-to-and-recover-from-data-breaches/final" id="pub-title-link-19">Data Confidentiality: Detect, Respond to, and Recover from Data Breaches</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-19">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2019/12/05/detect-respond-to-and-recover-from-data-breaches/final" class="mobile-pub-title" id="pub-title-link-sm-19">Data Confidentiality: Detect, Respond to, and Recover from Data Breaches</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-19">12/05/2019</strong> <br/> Status: <span id="pub-status-sm-19">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-19"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-19"> 12/05/2019 </td> </tr> <tr id="result-20"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-20">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-20"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2019/12/05/identifying-and-protecting-assets-and-data-against/final" id="pub-title-link-20">Data Confidentiality: Identifying and Protecting Assets and Data Against Data Breaches</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-20">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2019/12/05/identifying-and-protecting-assets-and-data-against/final" class="mobile-pub-title" id="pub-title-link-sm-20">Data Confidentiality: Identifying and Protecting Assets and Data Against Data Breaches</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-20">12/05/2019</strong> <br/> Status: <span id="pub-status-sm-20">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-20"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-20"> 12/05/2019 </td> </tr> <tr id="result-21"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-21">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-21"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2019/10/08/improving-cybersecurity-of-managed-service-provide/ipd" id="pub-title-link-21">Improving Cybersecurity of Managed Service Providers (Supporting Small- and Medium-Sized Businesses)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-21">Project Description (Initial Public Draft)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2019/10/08/improving-cybersecurity-of-managed-service-provide/ipd" class="mobile-pub-title" id="pub-title-link-sm-21">Improving Cybersecurity of Managed Service Providers (Supporting Small- and Medium-Sized Businesses)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-21">10/08/2019</strong> <br/> Status: <span id="pub-status-sm-21">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-21"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-21"> 10/08/2019 </td> </tr> <tr id="result-22"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-22">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-22"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2019/08/15/securing-the-iiot-cybersecurity-for-distributed-en/final" id="pub-title-link-22">Securing the Industrial Internet of Things: Cybersecurity for Distributed Energy Resources</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-22">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2019/08/15/securing-the-iiot-cybersecurity-for-distributed-en/final" class="mobile-pub-title" id="pub-title-link-sm-22">Securing the Industrial Internet of Things: Cybersecurity for Distributed Energy Resources</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-22">8/15/2019</strong> <br/> Status: <span id="pub-status-sm-22">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-22"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-22"> 8/15/2019 </td> </tr> <tr id="result-23"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-23">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-23"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2019/06/17/continuous-monitoring-for-it-infrastructure-for-sm/ipd" id="pub-title-link-23">Continuous Monitoring for IT Infrastructure: Techniques for auditing user activity and detecting irregular activity events within small and medium-size businesses</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-23">Project Description (Initial Public Draft)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2019/06/17/continuous-monitoring-for-it-infrastructure-for-sm/ipd" class="mobile-pub-title" id="pub-title-link-sm-23">Continuous Monitoring for IT Infrastructure: Techniques for auditing user activity and detecting irregular activity events within small and medium-size businesses</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-23">6/17/2019</strong> <br/> Status: <span id="pub-status-sm-23">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-23"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-23"> 6/17/2019 </td> </tr> <tr id="result-24"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-24">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-24"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2019/05/13/securing-telehealth-remote-patient-monitoring-ecos/final" id="pub-title-link-24">Securing Telehealth Remote Patient Monitoring Ecosystem: Cybersecurity for the Healthcare Sector</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-24">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2019/05/13/securing-telehealth-remote-patient-monitoring-ecos/final" class="mobile-pub-title" id="pub-title-link-sm-24">Securing Telehealth Remote Patient Monitoring Ecosystem: Cybersecurity for the Healthcare Sector</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-24">5/13/2019</strong> <br/> Status: <span id="pub-status-sm-24">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-24"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-24"> 5/13/2019 </td> </tr> <tr id="result-25"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-25">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-25"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2019/02/01/security-for-iot-sensor-networks/ipd" id="pub-title-link-25">Security for IoT Sensor Networks: Building Management Case Study</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-25">Project Description (Initial Public Draft)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2019/02/01/security-for-iot-sensor-networks/ipd" class="mobile-pub-title" id="pub-title-link-sm-25">Security for IoT Sensor Networks: Building Management Case Study</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-25">2/01/2019</strong> <br/> Status: <span id="pub-status-sm-25">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-25"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-25"> 2/01/2019 </td> </tr> <tr id="result-26"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-26">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-26"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2018/03/01/energy-sector-asset-management/final" id="pub-title-link-26">Energy Sector Asset Management: For Electric Utilities, Oil &amp; Gas Industry</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-26">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2018/03/01/energy-sector-asset-management/final" class="mobile-pub-title" id="pub-title-link-sm-26">Energy Sector Asset Management: For Electric Utilities, Oil &amp; Gas Industry</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-26">3/01/2018</strong> <br/> Status: <span id="pub-status-sm-26">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-26"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-26"> 3/01/2018 </td> </tr> <tr id="result-27"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-27">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-27"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2018/02/07/data-integrity-identifying-and-protecting-assets-v/final" id="pub-title-link-27">Data Integrity: Identifying and Protecting Assets Against Ransomware and Other Destructive Events</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-27">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2018/02/07/data-integrity-identifying-and-protecting-assets-v/final" class="mobile-pub-title" id="pub-title-link-sm-27">Data Integrity: Identifying and Protecting Assets Against Ransomware and Other Destructive Events</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-27">2/07/2018</strong> <br/> Status: <span id="pub-status-sm-27">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-27"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-27"> 2/07/2018 </td> </tr> <tr id="result-28"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-28">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-28"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2018/02/07/data-integrity-detecting-and-responding-to-ransomw/final" id="pub-title-link-28">Data Integrity: Detecting and Responding to Ransomware and Other Destructive Events</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-28">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2018/02/07/data-integrity-detecting-and-responding-to-ransomw/final" class="mobile-pub-title" id="pub-title-link-sm-28">Data Integrity: Detecting and Responding to Ransomware and Other Destructive Events</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-28">2/07/2018</strong> <br/> Status: <span id="pub-status-sm-28">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-28"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-28"> 2/07/2018 </td> </tr> <tr id="result-29"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-29">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-29"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2018/01/23/securing-pacs-cybersecurity-for-healthcare/final" id="pub-title-link-29">Securing Picture Archiving and Communication System (PACS): Cybersecurity for the Healthcare Sector</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-29">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2018/01/23/securing-pacs-cybersecurity-for-healthcare/final" class="mobile-pub-title" id="pub-title-link-sm-29">Securing Picture Archiving and Communication System (PACS): Cybersecurity for the Healthcare Sector</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-29">1/23/2018</strong> <br/> Status: <span id="pub-status-sm-29">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-29"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-29"> 1/23/2018 </td> </tr> <tr id="result-30"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-30">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-30"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2017/12/14/mitigating-iotbased-ddos/final" id="pub-title-link-30">Mitigating IoT-based Distributed Denial of Service (DDOS)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-30">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2017/12/14/mitigating-iotbased-ddos/final" class="mobile-pub-title" id="pub-title-link-sm-30">Mitigating IoT-based Distributed Denial of Service (DDOS)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-30">12/14/2017</strong> <br/> Status: <span id="pub-status-sm-30">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-30"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-30"> 12/14/2017 </td> </tr> <tr id="result-31"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-31">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-31"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2017/11/09/tls-server-certificate-management/final" id="pub-title-link-31">TLS Server Certificate Management</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-31">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2017/11/09/tls-server-certificate-management/final" class="mobile-pub-title" id="pub-title-link-sm-31">TLS Server Certificate Management</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-31">11/09/2017</strong> <br/> Status: <span id="pub-status-sm-31">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-31"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-31"> 11/09/2017 </td> </tr> <tr id="result-32"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-32">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-32"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2017/10/12/privileged-account-management-for-the-financial-se/ipd" id="pub-title-link-32">Privileged Account Management: Securing Privileged Accounts for the Financial Services Sector</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-32">Project Description (Initial Public Draft)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2017/10/12/privileged-account-management-for-the-financial-se/ipd" class="mobile-pub-title" id="pub-title-link-sm-32">Privileged Account Management: Securing Privileged Accounts for the Financial Services Sector</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-32">10/12/2017</strong> <br/> Status: <span id="pub-status-sm-32">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-32"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-32"> 10/12/2017 </td> </tr> <tr id="result-33"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-33">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-33"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2017/09/13/securing-property-management-systems/final" id="pub-title-link-33">Securing Property Management Systems: Cybersecurity for the Hospitality Sector</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-33">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2017/09/13/securing-property-management-systems/final" class="mobile-pub-title" id="pub-title-link-sm-33">Securing Property Management Systems: Cybersecurity for the Hospitality Sector</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-33">9/13/2017</strong> <br/> Status: <span id="pub-status-sm-33">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-33"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-33"> 9/13/2017 </td> </tr> <tr id="result-34"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-34">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-34"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2017/07/06/secure-interdomain-routingpart-1-route-hijacks/final" id="pub-title-link-34">Secure Inter-Domain Routing--Part 1: Route Hijacks</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-34">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2017/07/06/secure-interdomain-routingpart-1-route-hijacks/final" class="mobile-pub-title" id="pub-title-link-sm-34">Secure Inter-Domain Routing--Part 1: Route Hijacks</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-34">7/06/2017</strong> <br/> Status: <span id="pub-status-sm-34">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-34"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-34"> 7/06/2017 </td> </tr> <tr id="result-35"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-35">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-35"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2017/03/09/securing-manufacturing-ics/final" id="pub-title-link-35">Capabilities Assessment for Securing Manufacturing Industrial Control Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-35">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2017/03/09/securing-manufacturing-ics/final" class="mobile-pub-title" id="pub-title-link-sm-35">Capabilities Assessment for Securing Manufacturing Industrial Control Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-35">3/09/2017</strong> <br/> Status: <span id="pub-status-sm-35">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-35"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-35"> 3/09/2017 </td> </tr> <tr id="result-36"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-36">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-36"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2016/11/28/mobile-application-single-signon-for-psfr/final" id="pub-title-link-36">Mobile Application Single Sign-On: for Public Safety and First Responders</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-36">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2016/11/28/mobile-application-single-signon-for-psfr/final" class="mobile-pub-title" id="pub-title-link-sm-36">Mobile Application Single Sign-On: for Public Safety and First Responders</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-36">11/28/2016</strong> <br/> Status: <span id="pub-status-sm-36">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-36"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-36"> 11/28/2016 </td> </tr> <tr id="result-37"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-37">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-37"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2016/09/20/multifactor-authentication-for-ecommerce/final" id="pub-title-link-37">Multifactor Authentication for e-Commerce: Online Authentication for the Retail Sector</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-37">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2016/09/20/multifactor-authentication-for-ecommerce/final" class="mobile-pub-title" id="pub-title-link-sm-37">Multifactor Authentication for e-Commerce: Online Authentication for the Retail Sector</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-37">9/20/2016</strong> <br/> Status: <span id="pub-status-sm-37">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-37"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-37"> 9/20/2016 </td> </tr> <tr id="result-38"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-38">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-38"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2016/09/13/authentication-for-law-enforcement-vs/ipd" id="pub-title-link-38">Authentication for Law Enforcement Vehicle Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-38">Project Description (Initial Public Draft)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2016/09/13/authentication-for-law-enforcement-vs/ipd" class="mobile-pub-title" id="pub-title-link-sm-38">Authentication for Law Enforcement Vehicle Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-38">9/13/2016</strong> <br/> Status: <span id="pub-status-sm-38">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-38"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-38"> 9/13/2016 </td> </tr> <tr id="result-39"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-39">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-39"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2016/05/09/securing-sensitive-consumer-data-noncc/ipd" id="pub-title-link-39">Securing Non-Credit Card, Sensitive Consumer Data: Consumer Data Security for the Retail Sector</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-39">Project Description (Initial Public Draft)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2016/05/09/securing-sensitive-consumer-data-noncc/ipd" class="mobile-pub-title" id="pub-title-link-sm-39">Securing Non-Credit Card, Sensitive Consumer Data: Consumer Data Security for the Retail Sector</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-39">5/09/2016</strong> <br/> Status: <span id="pub-status-sm-39">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-39"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-39"> 5/09/2016 </td> </tr> <tr id="result-40"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-40">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-40"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2016/05/09/data-integrity-recovering-from-malware/final" id="pub-title-link-40">Data Integrity: Recovering from a destructive malware attack</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-40">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2016/05/09/data-integrity-recovering-from-malware/final" class="mobile-pub-title" id="pub-title-link-sm-40">Data Integrity: Recovering from a destructive malware attack</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-40">5/09/2016</strong> <br/> Status: <span id="pub-status-sm-40">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-40"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-40"> 5/09/2016 </td> </tr> <tr id="result-41"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-41">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-41"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2016/03/04/domain-name-systembased-security-for-electronic-ma/final" id="pub-title-link-41">Domain Name System-Based Security for Electronic Mail</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-41">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2016/03/04/domain-name-systembased-security-for-electronic-ma/final" class="mobile-pub-title" id="pub-title-link-sm-41">Domain Name System-Based Security for Electronic Mail</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-41">3/04/2016</strong> <br/> Status: <span id="pub-status-sm-41">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-41"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-41"> 3/04/2016 </td> </tr> <tr id="result-42"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-42">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-42"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2015/12/01/wireless-medical-infusion-pumps-medical-device-sec/final" id="pub-title-link-42">Wireless Medical Infusion Pumps: Medical Device Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-42">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2015/12/01/wireless-medical-infusion-pumps-medical-device-sec/final" class="mobile-pub-title" id="pub-title-link-sm-42">Wireless Medical Infusion Pumps: Medical Device Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-42">12/01/2015</strong> <br/> Status: <span id="pub-status-sm-42">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-42"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-42"> 12/01/2015 </td> </tr> <tr id="result-43"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-43">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-43"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2015/09/16/software-asset-management-continuous-monitoring/final" id="pub-title-link-43">Software Asset Management: Continuous Monitoring</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-43">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2015/09/16/software-asset-management-continuous-monitoring/final" class="mobile-pub-title" id="pub-title-link-sm-43">Software Asset Management: Continuous Monitoring</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-43">9/16/2015</strong> <br/> Status: <span id="pub-status-sm-43">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-43"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-43"> 9/16/2015 </td> </tr> <tr id="result-44"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-44">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-44"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2015/04/01/attribute-based-access-control/final" id="pub-title-link-44">Attribute Based Access Control</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-44">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2015/04/01/attribute-based-access-control/final" class="mobile-pub-title" id="pub-title-link-sm-44">Attribute Based Access Control</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-44">4/01/2015</strong> <br/> Status: <span id="pub-status-sm-44">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-44"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-44"> 4/01/2015 </td> </tr> <tr id="result-45"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-45">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-45"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2014/09/12/mobile-device-security-for-enterprises/final" id="pub-title-link-45">Mobile Device Security for Enterprises</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-45">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2014/09/12/mobile-device-security-for-enterprises/final" class="mobile-pub-title" id="pub-title-link-sm-45">Mobile Device Security for Enterprises</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-45">9/12/2014</strong> <br/> Status: <span id="pub-status-sm-45">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-45"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-45"> 9/12/2014 </td> </tr> <tr id="result-46"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-46">Project Description</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-46"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2013/11/05/idam-securing-networked-infrastructure-for-energy/final" id="pub-title-link-46">Identity and Access Management: Securing Networked Infrastructure for the Energy Sector</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-46">Project Description (Final)</span><br/> <a href="/web/20231004175329/https://csrc.nist.gov/pubs/pd/2013/11/05/idam-securing-networked-infrastructure-for-energy/final" class="mobile-pub-title" id="pub-title-link-sm-46">Identity and Access Management: Securing Networked Infrastructure for the Energy Sector</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-46">11/05/2013</strong> <br/> Status: <span id="pub-status-sm-46">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-46"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-46"> 11/05/2013 </td> </tr> </tbody> </table> <div class="row bottom-pagination-area"> <p class="text-center"> <span class="pagination-links" id="bottom-pagination-container" data-total-pages="0" data-min-page="1" data-max-page="0" data-current-page="1" data-show-first="False" data-show-last="True"></span> </p> </div> <p id="relevanceInfo">* "Relevance" merely indicates the search engine's score for a document. It is based on the search parameters and information in the document's detailed record.</p> <div> <span class="pull-right"> <a href="/web/20231004175329/https://csrc.nist.gov/publications/search" id="view-all-pubs-link">View All Publications</a> </span> </div> <div id="publications-quicklinks-sm" class="bs-callout bs-callout-subnav hidden-md hidden-lg"> <h4>Current Publications <i class="fa fa-bolt"></i></h4> <ul> <li> <strong> NIST Series Pubs <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-series-pubs-tooltip-lg"></i> </strong> <ul> <li><a href="/web/20231004175329/https://csrc.nist.gov/publications/final-pubs" id="quick-link-final-sm">Final Pubs</a></li> <li><a href="/web/20231004175329/https://csrc.nist.gov/publications/drafts-open-for-comment" id="quick-links-comments-sm">Drafts Open for Comment</a></li> <li><a href="/web/20231004175329/https://csrc.nist.gov/publications/draft-pubs" id="quick-link-draft-sm">Drafts</a> (all)</li> <li> <strong> View By Series <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-view-series-pubs-tooltip-lg"></i> </strong> <ul> <li><a href="/web/20231004175329/https://csrc.nist.gov/publications/fips" id="quick-link-fips-sm">FIPS</a> (standards)</li> <li><a href="/web/20231004175329/https://csrc.nist.gov/publications/sp800" id="quick-link-sp-800-sm">SP 800</a> (guidance)</li> <li><a href="/web/20231004175329/https://csrc.nist.gov/publications/sp1800" id="quick-link-sp-1800-sm">SP 1800</a> (practice guides)</li> <li><a href="/web/20231004175329/https://csrc.nist.gov/publications/sp" id="quick-link-sp-sm">SP</a> (all subseries)</li> <li><a href="/web/20231004175329/https://csrc.nist.gov/publications/ir" id="quick-link-nistir-sm">IR</a> (interagency/internal reports)</li> <li><a href="/web/20231004175329/https://csrc.nist.gov/publications/cswp" id="quick-link-white-papers-sm">CSWP</a> (cybersecurity white papers)</li> <li><a href="/web/20231004175329/https://csrc.nist.gov/publications/itl-bulletin" id="quick-link-itl-bul-sm">ITL Bulletins</a></li> </ul> </li> </ul> </li> <li> <strong> Other Pubs <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-other-pubs-tooltip-lg"></i> </strong> <ul> <li><a href="/web/20231004175329/https://csrc.nist.gov/publications/project-description" id="quick-link-project-description-sm">Project Descriptions</a></li> <li><a href="/web/20231004175329/https://csrc.nist.gov/publications/journal-article" id="quick-link-journal-articles-sm">Journal Articles</a></li> <li><a href="/web/20231004175329/https://csrc.nist.gov/publications/conference-paper" id="quick-link-conference-papers-sm">Conference Papers</a></li> <li><a href="/web/20231004175329/https://csrc.nist.gov/publications/book" id="quick-link-books-sm">Books</a></li> <li><a href="/web/20231004175329/https://csrc.nist.gov/publications/other" id="quick-link-other-sm">Other</a></li> </ul> </li> </ul> <span style="display: none;" id="nist-series-pubs-tooltip-lg"> <strong>Final:</strong> <em>Current list of all published NIST cybersecurity documents.</em> Does not include "Withdrawn" documents. Includes FIPS, Special Publications, NISTIRs, ITL Bulletins, and NIST Cybersecurity White Papers.<br/> <br/> <strong>Public Drafts:</strong> <em>Current list of all draft NIST cybersecurity documents--they are typically posted for public comment.</em> "Current" public drafts are the latest draft versions that have not yet been published as "Final." </span> <span style="display: none;" id="nist-view-series-pubs-tooltip-lg"> <strong>FIPS:</strong> <em>Current Federal Information Processing Standard Publications (FIPS).</em> Includes current (Final and Draft) FIPS.<br/> <br/> <strong>SP 800 Series:</strong> <em>Current NIST Special Publication (SP) 800 series publications, which focus on Computer/Information Security.</em> Includes current (Final and Draft) SP 800 pubs.<br/> <br/> <strong>All SP Series:</strong> <em> Current NIST Special Publications (SP), including SP 800 (Computer/Information Security) and SP 1800 (Cybersecurity Practice Guides) pubs. Also includes SP 500 (Computer Systems Technology) pubs related to cybersecurity and privacy. </em> Includes current (Final and Draft) NIST Special Publications.<br/> <br/> <strong>NISTIRs:</strong> <em>Current list of NIST Interagency or Internal Reports (NISTIR) related to cybersecurity and privacy.</em> Includes current (Final and Draft) NISTIRs.<br/> <br/> <strong>ITL Bulletins:</strong> Current list of NIST Information Technology Laboratory (ITL) Bulletins. </span> <span style="display: none;" id="nist-other-pubs-tooltip-lg"> <strong>White Papers:</strong> <em> Consists of NIST Cybersecurity White Papers; NCCoE Project Descriptions, Building Blocks and Use Cases; and other NIST-authored papers that are not part of a formal series. </em> Includes current (Final and Draft) papers.<br/> <br/> <strong>Journal Articles:</strong> NIST-authored articles published in external journals and in the NIST Journal of Research (JRES).<br/> <br/> <strong>Conference Papers:</strong> NIST-authored conference papers related to cybersecurity and privacy.<br/> <br/> <strong>Books:</strong> NIST-authored books, book sections, and encyclopedia entries related to cybersecurity and privacy. </span> </div> </div> </div> </div> <div id="footer-pusher"></div> </div> <footer id="footer"> <div class="container"> <div class="row"> <div class="col-sm-6"> <span class="hidden-xs"> <a href="https://web.archive.org/web/20231004175329/https://www.nist.gov/" title="National Institute of Standards and Technology" rel="home" target="_blank" class="footer-nist-logo" id="footer-nist-logo-link"> <img src="/web/20231004175329im_/https://csrc.nist.gov/CSRC/Media/images/nist-logo-brand-white.svg" alt="National Institute of Standards and Technology logo" id="footer-nist-logo"/> </a> </span> <div class="row footer-contact-container"> <div class="col-sm-12" id="footer-address"> <strong>HEADQUARTERS</strong><br> 100 Bureau Drive<br> Gaithersburg, MD 20899 </div> </div> </div> <div class="col-sm-6"> <ul class="social-list text-right" style="display: block;"> <li class="field-item service-twitter list-horiz"> <a href="https://web.archive.org/web/20231004175329/https://twitter.com/NISTCyber" class="social-btn social-btn--large extlink ext" id="footer-social-twitter-link"> <i class="fa fa-twitter fa-fw"><span class="element-invisible">twitter</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-facebook list-horiz"> <a href="https://web.archive.org/web/20231004175329/https://www.facebook.com/NIST" class="social-btn social-btn--large extlink ext" id="footer-social-facebook-link"> <i class="fa fa-facebook fa-fw"><span class="element-invisible">facebook</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-linkedin list-horiz"> <a href="https://web.archive.org/web/20231004175329/https://www.linkedin.com/company/nist" class="social-btn social-btn--large extlink ext" id="footer-social-linkedin-link"> <i class="fa fa-linkedin fa-fw"><span class="element-invisible">linkedin</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-instagram list-horiz"> <a href="https://web.archive.org/web/20231004175329/https://www.instagram.com/usnistgov/" class="social-btn social-btn--large extlink ext" id="footer-social-instagram-link"> <i class="fa fa-instagram fa-fw"><span class="element-invisible">instagram</span></i> <span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-youtube list-horiz"> <a href="https://web.archive.org/web/20231004175329/https://www.youtube.com/user/USNISTGOV" class="social-btn social-btn--large extlink ext" id="footer-social-youtube-link"> <i class="fa fa-youtube fa-fw"><span class="element-invisible">youtube</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-rss list-horiz"> <a href="https://web.archive.org/web/20231004175329/https://www.nist.gov/news-events/nist-rss-feeds" class="social-btn social-btn--large extlink" id="footer-social-rss-link"> <i class="fa fa-rss fa-fw"><span class="element-invisible">rss</span></i> </a> </li> <li class="field-item service-govdelivery list-horiz last"> <a href="https://web.archive.org/web/20231004175329/https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3" class="social-btn social-btn--large extlink ext" title="Subscribe to CSRC and publication updates, and other NIST cybersecurity news" id="footer-social-govdelivery-link"> <i class="fa fa-envelope fa-fw"><span class="element-invisible">govdelivery</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> </ul> <p class="text-right"> Want updates about CSRC and our publications? <a href="https://web.archive.org/web/20231004175329/https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3" class="btn btn-lg btn-primary" style="background-color: #12659c!important; border-color: #12659c!important;" id="footer-subscribe-link">Subscribe</a> </p> </div> </div> <div class="row hidden-sm hidden-md hidden-lg"> <div class="col-sm-12"> <a href="https://web.archive.org/web/20231004175329/https://www.nist.gov/" title="National Institute of Standards and Technology" rel="home" target="_blank" class="footer-nist-logo" id="footer-bottom-nist-logo-link"> <img src="/web/20231004175329im_/https://csrc.nist.gov/CSRC/Media/images/logo_rev.png" alt="National Institute of Standards and Technology logo" id="footer-bottom-nist-logo"/> </a> </div> </div> <div class="row"> <div class="col-sm-6"> <p> <a href="/web/20231004175329/https://csrc.nist.gov/about/contact" id="footer-contact-us-link">Contact Us</a> | <a href="https://web.archive.org/web/20231004175329/https://www.nist.gov/about-nist/our-organization" style="display: inline-block;" id="footer-org-link">Our Other Offices</a> </p> </div> <div class="col-sm-6"> <span class="pull-right text-right"> Send inquiries to <a href="https://web.archive.org/web/20231004175329/mailto:csrc-inquiry@nist.gov?subject=CSRC Inquiry" style="display: inline-block;" id="footer-inquiries-link">csrc-inquiry@nist.gov</a> </span> </div> </div> <div class="row"> <div class="footer-bottom-links-container" id="footer-bottom-links-container"> <ul> <li><a href="https://web.archive.org/web/20231004175329/https://www.nist.gov/privacy-policy">Site Privacy</a></li> <li><a href="https://web.archive.org/web/20231004175329/https://www.nist.gov/oism/accessibility">Accessibility</a></li> <li><a href="https://web.archive.org/web/20231004175329/https://www.nist.gov/privacy">Privacy Program</a></li> <li><a href="https://web.archive.org/web/20231004175329/https://www.nist.gov/oism/copyrights">Copyrights</a></li> <li><a href="https://web.archive.org/web/20231004175329/https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a></li> <li><a href="https://web.archive.org/web/20231004175329/https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a></li> <li><a href="https://web.archive.org/web/20231004175329/https://www.nist.gov/foia">FOIA</a></li> <li><a href="https://web.archive.org/web/20231004175329/https://www.nist.gov/environmental-policy-statement">Environmental Policy</a></li> <li><a href="https://web.archive.org/web/20231004175329/https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a></li> <li><a href="https://web.archive.org/web/20231004175329/https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a></li> <li><a href="https://web.archive.org/web/20231004175329/https://www.commerce.gov/">Commerce.gov</a></li> <li><a href="https://web.archive.org/web/20231004175329/https://www.science.gov/">Science.gov</a></li> <li><a href="https://web.archive.org/web/20231004175329/https://www.usa.gov/">USA.gov</a></li> <li><a href="https://web.archive.org/web/20231004175329/https://vote.gov/">Vote.gov</a></li> </ul> </div> </div> </div> </footer> <script type="text/javascript" src="/web/20231004175329js_/https://csrc.nist.gov/dist/js/quick-collapse.js"></script> <script type="text/javascript" src="/web/20231004175329js_/https://csrc.nist.gov/dist/app.bundle.js"></script> </body> </html> <!-- FILE ARCHIVED ON 17:53:29 Oct 04, 2023 AND RETRIEVED FROM THE INTERNET ARCHIVE ON 11:03:51 Nov 28, 2024. JAVASCRIPT APPENDED BY WAYBACK MACHINE, COPYRIGHT INTERNET ARCHIVE. ALL OTHER CONTENT MAY ALSO BE PROTECTED BY COPYRIGHT (17 U.S.C. SECTION 108(a)(3)). --> <!-- playback timings (ms): captures_list: 1.609 exclusion.robots: 0.024 exclusion.robots.policy: 0.015 esindex: 0.01 cdx.remote: 17.15 LoadShardBlock: 223.732 (3) PetaboxLoader3.datanode: 138.188 (4) PetaboxLoader3.resolve: 160.963 (3) load_resource: 181.674 -->

Pages: 1 2 3 4 5 6 7 8 9 10