CINXE.COM
Search | CSRC
<!DOCTYPE html> <html lang="en-us" xml:lang="en-us"> <head><script type="text/javascript" src="https://web-static.archive.org/_static/js/bundle-playback.js?v=7YQSqjSh" charset="utf-8"></script> <script type="text/javascript" src="https://web-static.archive.org/_static/js/wombat.js?v=txqj7nKC" charset="utf-8"></script> <script>window.RufflePlayer=window.RufflePlayer||{};window.RufflePlayer.config={"autoplay":"on","unmuteOverlay":"hidden"};</script> <script type="text/javascript" src="https://web-static.archive.org/_static/js/ruffle/ruffle.js"></script> <script type="text/javascript"> __wm.init("https://web.archive.org/web"); __wm.wombat("https://csrc.nist.gov/publications/itl-bulletin","20230128001836","https://web.archive.org/","web","https://web-static.archive.org/_static/", "1674865116"); </script> <link rel="stylesheet" type="text/css" href="https://web-static.archive.org/_static/css/banner-styles.css?v=p7PEIJWi" /> <link rel="stylesheet" type="text/css" href="https://web-static.archive.org/_static/css/iconochive.css?v=3PDvdIFv" /> <!-- End Wayback Rewrite JS Include --> <meta charset="utf-8"/> <title>Search | CSRC</title> <meta http-equiv="content-type" content="text/html; charset=UTF-8"/> <meta http-equiv="content-style-type" content="text/css"/> <meta http-equiv="content-script-type" content="text/javascript"/> <meta name="viewport" content="width=device-width, initial-scale=1.0"/> <meta name="msapplication-config" content="/CSRC/Media/images/favicons/browserconfig.xml"/> <meta name="theme-color" content="#000000"/> <meta name="google-site-verification" content="xbrnrVYDgLD-Bd64xHLCt4XsPXzUhQ-4lGMj4TdUUTA"/> <link rel="apple-touch-icon" sizes="180x180" href="/web/20230128001836im_/https://csrc.nist.gov/images/icons/apple-touch-icon.png"/> <link rel="icon" type="image/png" href="/web/20230128001836im_/https://csrc.nist.gov/images/icons/favicon-32x32.png" sizes="32x32"/> <link rel="icon" type="image/png" href="/web/20230128001836im_/https://csrc.nist.gov/images/icons/favicon-16x16.png" sizes="16x16"/> <link rel="manifest" href="/web/20230128001836/https://csrc.nist.gov/images/icons/manifest.json"/> <link rel="mask-icon" href="/web/20230128001836im_/https://csrc.nist.gov/images/icons/safari-pinned-tab.svg" color="#000000"/> <link href="/web/20230128001836im_/https://csrc.nist.gov/CSRC/Media/images/favicons/favicon.ico" type="image/x-icon" rel="shortcut icon"/> <link href="/web/20230128001836im_/https://csrc.nist.gov/CSRC/Media/images/favicons/favicon.ico" type="image/x-icon" rel="icon"/> <!-- <link href="/dist/katex/katex.min.css" rel="stylesheet"/> --> <link href="/web/20230128001836cs_/https://csrc.nist.gov/dist/app.css" rel="stylesheet"/> <!-- reCAPTCHA v3 --> <style> .grecaptcha-badge { visibility: hidden; } </style> <script async type="text/javascript" id="_fed_an_ua_tag" src="https://web.archive.org/web/20230128001836js_/https://dap.digitalgov.gov/Universal-Federated-Analytics-Min.js?agency=nist&subagency=csrc&pua=UA-66610693-15&yt=true&exts=xsd,xml,wav,mpg,mpeg,avi,rtf,webm,ogg,ogv,oga,map,otf,eot,svg,ttf,woff"></script> <style id="antiClickjack"> body > * { display: none !important; } #antiClickjack { display: block !important; } </style> <noscript> <style id="antiClickjackNoScript"> body > * { display: block !important; } #antiClickjack { display: none !important; } </style> </noscript> <script type="text/javascript" id="antiClickjackScript"> if (self === top) { // no clickjacking var antiClickjack = document.getElementById("antiClickjack"); antiClickjack.parentNode.removeChild(antiClickjack); } else { setTimeout(tryForward(), 5000); } function tryForward() { top.location = self.location; } </script> <!-- Google tag (gtag.js) --> <script async src="https://web.archive.org/web/20230128001836js_/https://www.googletagmanager.com/gtag/js?id=G-TSQ0PLGJZP"></script> <script>window.dataLayer = window.dataLayer || []; function gtag() { dataLayer.push(arguments); } gtag('js', new Date()); gtag('config', 'G-TSQ0PLGJZP');</script> </head> <body> <div id="antiClickjack" style="display: none;"> <strong style="font-size: 1.6rem;">You are viewing this page in an unauthorized frame window.</strong> <p>This is a potential security issue, you are being redirected to <a href="https://web.archive.org/web/20230128001836/https://csrc.nist.gov/">https://csrc.nist.gov</a>.</p> </div> <section class="usa-banner" aria-label="Official government website"> <div class="usa-accordion container"> <header class="usa-banner__header"> <noscript> <p style="font-size: 0.85rem; font-weight: bold;">You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.</p> </noscript> <img class="usa-banner__header-flag" src="/web/20230128001836im_/https://csrc.nist.gov/images/usbanner/us_flag_small.png" alt="U.S. flag"> <span class="usa-banner__header-text">An official website of the United States government</span> <button id="gov-banner-button" class="usa-accordion__button usa-banner__button" data-toggle="collapse" data-target="#gov-banner" aria-expanded="true" aria-controls="gov-banner"> <span class="usa-banner__button-text">Here's how you know</span> </button> </header> <div class="usa-banner__content usa-accordion__content collapse in" role="tabpanel" id="gov-banner" aria-expanded="true"> <div class="row"> <div class="col-md-5 col-sm-12"> <div class="row"> <div class="col-sm-2 col-xs-3"> <img class="usa-banner__icon usa-media-block__img" src="/web/20230128001836im_/https://csrc.nist.gov/images/usbanner/icon-dot-gov.svg" alt="Dot gov"> </div> <div class="col-sm-10 col-xs-9"> <p> <strong>Official websites use .gov</strong> <br> A <strong>.gov</strong> website belongs to an official government organization in the United States. </p> </div> </div> </div> <div class="col-md-5 col-sm-12"> <div class="row"> <div class="col-sm-2 col-xs-3"> <img class="usa-banner__icon usa-media-block__img" src="/web/20230128001836im_/https://csrc.nist.gov/images/usbanner/icon-https.svg" alt="Https"> </div> <div class="col-sm-10 col-xs-9"> <p> <strong>Secure .gov websites use HTTPS</strong> <br> A <strong>lock</strong> (<img class="usa-banner__lock" src="/web/20230128001836im_/https://csrc.nist.gov/images/usbanner/lock.svg" alt="Dot gov">) or <strong>https://</strong> means you've safely connected to the .gov website. Share sensitive information only on official, secure websites. </p> </div> </div> </div> </div> </div> </div> </section> <nav id="navbar" class="navbar"> <div id="nist-menu-container" class="container"> <div class="row"> <!-- Brand --> <div class="col-xs-6 col-md-4 navbar-header"> <a class="navbar-brand" href="https://web.archive.org/web/20230128001836/https://www.nist.gov/" target="_blank" id="navbar-brand-image"> <img src="/web/20230128001836im_/https://csrc.nist.gov/CSRC/media/images/svg/nist-logo.svg" alt="National Institute of Standards and Technology" width="110" height="30"> </a> </div> <div class="col-xs-6 col-md-8 navbar-nist-logo"> <div class="form-inline hidden-sm hidden-xs"> <form name="site-search" id="site-search-form" action="/web/20230128001836/https://csrc.nist.gov/search" method="GET"> <label for="search-csrc-query" class="element-invisible">Search</label> <input autocomplete="off" class="form-control" id="search-csrc-query" name="keywords" type="text" size="15" maxlength="128" placeholder="Search CSRC"/> <input type="hidden" name="ipp" value="25"/> <input type="hidden" name="sortBy" value="relevance"/> <input type="hidden" name="showOnly" value="publications,projects,news,events,presentations,glossary,topics"/> <input type="hidden" name="topicsMatch" value="ANY"/> <input type="hidden" name="status" value="Final,Draft"/> <input type="hidden" name="series" value="FIPS,SP,NISTIR,ITL Bulletin,White Paper,Building Block,Use Case,Journal Article,Conference Paper,Book"/> <button type="submit" id="search-csrc-submit-btn" class="form-submit"> <span class="element-invisible">Search</span> <i class="fa fa-search"></i> </button> </form> </div> <span id="nvd-menu-button" class="pull-right"> <a href="#" id="nvd-menu-button-link"> <span class="fa fa-bars"></span> <span id="nvd-menu-full-text">CSRC MENU</span> </a> </span> </div> </div> </div> <div class="form-inline hidden-md hidden-lg"> <form name="site-search-mobile" id="site-search-form-mobile" action="/web/20230128001836/https://csrc.nist.gov/search" method="GET"> <label for="search-csrc-query-mobile" class="element-invisible">Search</label> <input autocomplete="off" class="form-control" id="search-csrc-query-mobile" name="keywords" type="text" size="15" maxlength="128" placeholder="Search CSRC"/> <button type="submit" id="search-csrc-submit-btn-mobile" class="form-submit"> <span class="element-invisible">Search</span> <i class="fa fa-search"></i> </button> </form> </div> <div class="main-menu-row container"> <!-- Collect the nav links, forms, and other content for toggling --> <div id="main-menu-drop" class="col-lg-12" style="display: none;"> <ul> <li><a href="/web/20230128001836/https://csrc.nist.gov/projects">Projects</a></li> <li> <a href="/web/20230128001836/https://csrc.nist.gov/publications"> Publications <span class="expander fa fa-plus" id="main-menu-pubs-expander" data-expander-name="publications" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="publications" id="main-menu-pubs-expanded"> <div class="row"> <div class="col-lg-4"> <p><a href="/web/20230128001836/https://csrc.nist.gov/publications/drafts-open-for-comment">Drafts for Public Comment</a></p> <p><a href="/web/20230128001836/https://csrc.nist.gov/publications/draft-pubs">All Public Drafts</a></p> <p><a href="/web/20230128001836/https://csrc.nist.gov/publications/final-pubs">Final Pubs</a></p> <p><a href="/web/20230128001836/https://csrc.nist.gov/publications/fips">FIPS</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20230128001836/https://csrc.nist.gov/publications/sp">Special Publications (SP<small>s</small>)</a></p> <p><a href="/web/20230128001836/https://csrc.nist.gov/publications/nistir">NISTIR<small>s</small></a></p> <p><a href="/web/20230128001836/https://csrc.nist.gov/publications/itl-bulletin">ITL Bulletins</a></p> <p><a href="/web/20230128001836/https://csrc.nist.gov/publications/white-paper">White Papers</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20230128001836/https://csrc.nist.gov/publications/journal-article">Journal Articles</a></p> <p><a href="/web/20230128001836/https://csrc.nist.gov/publications/conference-paper">Conference Papers</a></p> <p><a href="/web/20230128001836/https://csrc.nist.gov/publications/book">Books</a></p> </div> </div> </div> </li> <li> <a href="/web/20230128001836/https://csrc.nist.gov/topics"> Topics <span class="expander fa fa-plus" id="main-menu-topics-expander" data-expander-name="topics" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="topics" id="main-menu-topics-expanded"> <div class="row"> <div class="col-lg-4"> <p><a href="/web/20230128001836/https://csrc.nist.gov/Topics/Security-and-Privacy">Security & Privacy</a></p> <p><a href="/web/20230128001836/https://csrc.nist.gov/Topics/Applications">Applications</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20230128001836/https://csrc.nist.gov/Topics/Technologies">Technologies</a></p> <p><a href="/web/20230128001836/https://csrc.nist.gov/Topics/Sectors">Sectors</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20230128001836/https://csrc.nist.gov/Topics/Laws-and-Regulations">Laws & Regulations</a></p> <p><a href="/web/20230128001836/https://csrc.nist.gov/Topics/Activities-and-Products">Activities & Products</a></p> </div> </div> </div> </li> <li><a href="/web/20230128001836/https://csrc.nist.gov/news">News & Updates</a></li> <li><a href="/web/20230128001836/https://csrc.nist.gov/events">Events</a></li> <li><a href="/web/20230128001836/https://csrc.nist.gov/glossary">Glossary</a></li> <li> <a href="/web/20230128001836/https://csrc.nist.gov/about"> About CSRC <span class="expander fa fa-plus" id="main-menu-about-expander" data-expander-name="about" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="about" id="main-menu-about-expanded"> <div class="row"> <div class="col-lg-6"> <p> <strong><a href="/web/20230128001836/https://csrc.nist.gov/Groups/Computer-Security-Division">Computer Security Division</a></strong><br/> <ul> <li><a href="/web/20230128001836/https://csrc.nist.gov/Groups/Computer-Security-Division/Cryptographic-Technology">Cryptographic Technology</a></li> <li><a href="/web/20230128001836/https://csrc.nist.gov/Groups/Computer-Security-Division/Secure-Systems-and-Applications">Secure Systems and Applications</a></li> <li><a href="/web/20230128001836/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Components-and-Mechanisms">Security Components and Mechanisms</a></li> <li><a href="/web/20230128001836/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Engineering-and-Risk-Management">Security Engineering and Risk Management</a></li> <li><a href="/web/20230128001836/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Testing-Validation-and-Measurement">Security Testing, Validation, and Measurement</a></li> </ul> </p> </div> <div class="col-lg-6"> <p> <strong><a href="/web/20230128001836/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division">Applied Cybersecurity Division</a></strong><br/> <ul> <li><a href="/web/20230128001836/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division/Cybersecurity-and-Privacy-Applications">Cybersecurity and Privacy Applications</a></li> <li><a href="/web/20230128001836/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division/National-Cybersecurity-Center-of-Excellence">National Cybersecurity Center of Excellence (NCCoE)</a></li> <li><a href="https://web.archive.org/web/20230128001836/https://www.nist.gov/nice/">National Initiative for Cybersecurity Education (NICE)</a></li> </ul> </p> <p> <a href="/web/20230128001836/https://csrc.nist.gov/contact"> Contact Us </a> </p> </div> </div> </div> </li> </ul> </div><!-- /#mobile-nav-container --> </div> </nav> <section id="itl-header" class="has-menu"> <div class="container"> <div class="row"> <div class="col-sm-12 col-md-8"> <div class="hidden-xs hidden-sm" id="itl-header-lg"> <a href="https://web.archive.org/web/20230128001836/https://www.nist.gov/itl" target="_blank" id="itl-header-link">Information Technology Laboratory</a> </div> <div class="hidden-xs hidden-sm" id="csrc-header-lg"> <a href="/web/20230128001836/https://csrc.nist.gov/" id="csrc-header-link-lg">Computer Security Resource Center</a> </div> </div> <div class="col-sm-12 col-md-4"> <div class="hidden-xs hidden-sm hidden-md"> <a id="logo-csrc-lg" href="/web/20230128001836/https://csrc.nist.gov/"><img id="img-logo-csrc-lg" src="/web/20230128001836im_/https://csrc.nist.gov/CSRC/Media/images/nist-logo-csrc-white.svg" alt="CSRC Logo" class="csrc-header-logo"></a> </div> <div class="hidden-lg"> <a id="logo-csrc-sm" href="/web/20230128001836/https://csrc.nist.gov/"><img id="img-logo-csrc-sm" src="/web/20230128001836im_/https://csrc.nist.gov/CSRC/Media/images/nist-logo-csrc-white.svg" alt="CSRC Logo" class="csrc-header-logo"></a> </div> </div> </div> </div> </section> <div id="body-section" class="container"> <div class="publications-content"> <div class="row"> <div class="col-lg-3 col-md-4 hidden-sm hidden-xs hidden-xxs"> <div id="publications-quicklinks-lg" class="bs-callout bs-callout-subnav hidden-sm hidden-xs hidden-xxs"> <h4>Current Publications <i class="fa fa-bolt"></i></h4> <ul> <li> <strong> NIST Series Pubs <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-series-pubs-tooltip"></i> </strong> <ul> <li><a href="/web/20230128001836/https://csrc.nist.gov/publications/final-pubs" id="quick-link-final-lg">Final Pubs</a></li> <li><a href="/web/20230128001836/https://csrc.nist.gov/publications/drafts-open-for-comment" id="quick-links-comments-lg">Drafts Open for Comment</a></li> <li><a href="/web/20230128001836/https://csrc.nist.gov/publications/draft-pubs" id="quick-link-draft-lg">All Public Drafts</a></li> <li> <strong> View By Series <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-view-series-pubs-tooltip"></i> </strong> <ul> <li><a href="/web/20230128001836/https://csrc.nist.gov/publications/fips" id="quick-link-fips-lg">FIPS</a></li> <li><a href="/web/20230128001836/https://csrc.nist.gov/publications/sp800" id="quick-link-sp-800-lg">SP 800 series</a></li> <li><a href="/web/20230128001836/https://csrc.nist.gov/publications/sp" id="quick-link-sp-lg">All SP series</a></li> <li><a href="/web/20230128001836/https://csrc.nist.gov/publications/nistir" id="quick-link-nistir-lg">NISTIRs</a></li> <li><a href="/web/20230128001836/https://csrc.nist.gov/publications/itl-bulletin" id="quick-link-itl-bul-lg">ITL Bulletins</a></li> </ul> </li> </ul> </li> <li> <strong> Other Pubs <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-other-pubs-tooltip"></i> </strong> <ul> <li><a href="/web/20230128001836/https://csrc.nist.gov/publications/white-paper" id="quick-link-white-papers-lg">White Papers</a></li> <li><a href="/web/20230128001836/https://csrc.nist.gov/publications/journal-article" id="quick-link-journal-articles-lg">Journal Articles</a></li> <li><a href="/web/20230128001836/https://csrc.nist.gov/publications/conference-paper" id="quick-link-conference-papers-lg">Conference Papers</a></li> <li><a href="/web/20230128001836/https://csrc.nist.gov/publications/book" id="quick-link-books-lg">Books</a></li> </ul> </li> </ul> <span style="display: none;" id="nist-series-pubs-tooltip"> <strong>Final:</strong> <em>Current list of all published NIST cybersecurity documents.</em> Does not include "Withdrawn" documents. Includes FIPS, Special Publications, NISTIRs, ITL Bulletins, and NIST Cybersecurity White Papers.<br/> <br/> <strong>Public Drafts:</strong> <em>Current list of all draft NIST cybersecurity documents--they are typically posted for public comment.</em> "Current" public drafts are the latest draft versions that have not yet been published as "Final." </span> <span style="display: none;" id="nist-view-series-pubs-tooltip"> <strong>FIPS:</strong> <em>Current Federal Information Processing Standard Publications (FIPS).</em> Includes current (Final and Draft) FIPS.<br/> <br/> <strong>SP 800 Series:</strong> <em>Current NIST Special Publication (SP) 800 series publications, which focus on Computer/Information Security.</em> Includes current (Final and Draft) SP 800 pubs.<br/> <br/> <strong>All SP Series:</strong> <em> Current NIST Special Publications (SP), including SP 800 (Computer/Information Security) and SP 1800 (Cybersecurity Practice Guides) pubs. Also includes SP 500 (Computer Systems Technology) pubs related to cybersecurity and privacy. </em> Includes current (Final and Draft) NIST Special Publications.<br/> <br/> <strong>NISTIRs:</strong> <em>Current list of NIST Interagency or Internal Reports (NISTIR) related to cybersecurity and privacy.</em> Includes current (Final and Draft) NISTIRs.<br/> <br/> <strong>ITL Bulletins:</strong> Current list of NIST Information Technology Laboratory (ITL) Bulletins. </span> <span style="display: none;" id="nist-other-pubs-tooltip"> <strong>White Papers:</strong> <em> Consists of NIST Cybersecurity White Papers; NCCoE Project Descriptions, Building Blocks and Use Cases; and other NIST-authored papers that are not part of a formal series. </em> Includes current (Final and Draft) papers.<br/> <br/> <strong>Journal Articles:</strong> NIST-authored articles published in external journals and in the NIST Journal of Research (JRES).<br/> <br/> <strong>Conference Papers:</strong> NIST-authored conference papers related to cybersecurity and privacy.<br/> <br/> <strong>Books:</strong> NIST-authored books, book sections, and encyclopedia entries related to cybersecurity and privacy. </span> </div> <form action="/web/20230128001836/https://csrc.nist.gov/publications/search" class="bs-callout bs-callout-success csrc-search-form hidden-sm hidden-xs hidden-xxs" data-csrc-form="true" data-default-query="sortBy-lg=releasedate+DESC&viewMode-lg=brief&ipp-lg=ALL&status-lg=Final&series-lg=ITL+Bulletin" data-form-ignore-default="sortBy" data-form-name="pubSearchDesktop" id="pubs-search-form-lg" method="get"> <div class="form-group"> <label for="keywords-lg">Search</label> <input name="keywords-lg" class="form-control" data-val="true" data-val-length="The field Search must be a string with a maximum length of 255." data-val-length-max="255" id="keywords-lg" name="Form.Keywords" type="text" value=""/> <em class="text-muted">Search publication record data<br/> (not a full text search)</em> </div> <div class="form-group"> <label for="sortBy-lg">Sort By</label> <div class="form-inline"> <select name="sortBy-lg" class="form-control" id="sortBy-lg" name="Form.SortBy"><option value="relevance">Relevance (best match)</option> <option selected="selected" value="releasedate DESC">Release Date (newest first)</option> <option value="releasedate ASC">Release Date (oldest first)</option> <option value="Series ASC">Series (A-Z)</option> <option value="Series DESC">Series (Z-A)</option> <option value="Number ASC">Number (lowest to highest)</option> <option value="Number DESC">Number (highest to lowest)</option> <option value="title asc">Title (A-Z)</option> <option value="title desc">Title (Z-A)</option> </select> </div> </div> <div class="form-group"> <label for="viewMode-lg">Results View</label> <select name="viewMode-lg" class="form-control" id="viewMode-lg" name="Form.ResultsViewMode"><option selected="selected" value="brief">Brief</option> <option value="summary">Summary</option> </select> </div> <div class="form-group form-inline"> <label for="ipp-lg" class="form-control-half">Items Per Page</label> <select name="ipp-lg" class="form-control" id="ipp-lg" name="Form.ItemsPerPage"><option value="25">25</option> <option value="50">50</option> <option value="75">75</option> <option value="100">100</option> <option selected="selected" value="all">All</option> </select> </div> <div class="form-group"> <label for="dateFrom-lg">Date</label> <div class="form-inline form-date-inline"> <div class="input-group date" data-date-picker="true"> <input name="dateFrom-lg" class="form-control" data-control-type="date" data-val="true" data-val-date="The field Date must be a date." data-validation="true" data-validation-compare-field="dateTo-lg" data-validation-message="From date must be less than To date" data-validation-type="less-than-date" id="dateFrom-lg" name="Form.DateFrom" placeholder=" / / " type="text" value=""/> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> <div class="input-group date" data-date-picker="true"> <input name="dateTo-lg" class="form-control" data-control-type="date" data-val="true" data-val-date="The field DateTo must be a date." id="dateTo-lg" name="Form.DateTo" placeholder=" / / " type="text" value=""/> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> </div> </div> <div class="form-group"> <label for="status-all-lg"> Status <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="publications-status-info"></i> </label> <div class="form-inline status-type" style="margin-left: 1rem;"> <label class="meta-label"> <input type="checkbox" id="status-final-lg" name="status-lg" value="Final" data-default-checked="True" checked="'checked'"/> Final<br/> </label> <label class="meta-label"> <input type="checkbox" id="status-draft-lg" name="status-lg" value="Draft" data-default-checked="True"/> Public Draft<br/> </label> <label class="meta-label"> <input type="checkbox" id="status-withdrawn-lg" name="status-lg" value="Withdrawn" data-default-checked="True"/> Withdrawn<br/> </label> </div> </div> <div class="form-group"> <label for="pub-search-series"> Series <button type="button" id="series-all-lg" class="btn btn-sm btn-success" data-check-all="series-lg">Check All</button> <button type="button" id="series-clear-lg" class="btn btn-sm btn-success" data-check-none="series-lg">Clear</button> </label> <div class="form-inline series-type" style="margin-left: 1rem;"> <label class="meta-label"> <input type="checkbox" id="series-fips-lg" name="series-lg" value="FIPS" data-default-checked="True"/> FIPS<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-sp-lg" name="series-lg" value="SP" data-default-checked="True"/> SP<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-nistir-lg" name="series-lg" value="NISTIR" data-default-checked="True"/> NISTIR<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-itl-bul-lg" name="series-lg" value="ITL Bulletin" data-default-checked="True" checked="'checked'/"> ITL Bulletin<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-white-paper-lg" name="series-lg" value="White Paper" data-default-checked="True"/> White Paper<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-build-block-lg" name="series-lg" value="Building Block" data-default-checked="True"/> Building Block<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-use-case-lg" name="series-lg" value="Use Case" data-default-checked="True"/> Use Case<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-journal-lg" name="series-lg" value="Journal Article" data-default-checked="True"/> Journal Article<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-conf-paper-lg" name="series-lg" value="Conference Paper" data-default-checked="True"/> Conference Paper<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-book-lg" name="series-lg" value="Book" data-default-checked="True"/> Book<br/> </label> </div> </div> <div class="form-group"> <label for="pub-search-topics-lg"> Topics </label> <input name="topics-lg" id="topics-lg" name="Form.Topics" type="hidden" value=""/> <div class="form-control topics-selection" id="pub-search-topics-lg" contenteditable="true" data-drop-target="pub-search-topics-drop-lg" data-field-name="topics-lg" aria-haspopup="true" aria-expanded="false"> </div> <div class="topics-selection-dropdown desktop" id="pub-search-topics-drop-lg" style="display: none;" data-topics-selector=""><div class="col-sm-4"><strong>Security and Privacy</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27481" data-expander-for="/topics/security-and-privacy/cryptography"></i> <a data-topic-id="27481" data-topic-text="cryptography">cryptography</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27647" data-topic-text="digital signatures">digital signatures</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27648" data-topic-text="encryption">encryption</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27649" data-topic-text="key management">key management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27650" data-topic-text="message authentication">message authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27651" data-topic-text="post-quantum cryptography">post-quantum cryptography</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27652" data-topic-text="random number generation">random number generation</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27653" data-topic-text="secure hashing">secure hashing</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27482" data-topic-text="cybersecurity supply chain risk management">cybersecurity supply chain risk management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27483" data-topic-text="general security & privacy">general security & privacy</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27484" data-expander-for="/topics/security-and-privacy/identity-and-access-management"></i> <a data-topic-id="27484" data-topic-text="identity & access management">identity & access management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27663" data-topic-text="access authorization">access authorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27664" data-topic-text="access control">access control</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27665" data-topic-text="authentication">authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27666" data-topic-text="Personal Identity Verification">Personal Identity Verification</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27667" data-topic-text="public key infrastructure">public key infrastructure</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27485" data-expander-for="/topics/security-and-privacy/privacy"></i> <a data-topic-id="27485" data-topic-text="privacy">privacy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27680" data-topic-text="personally identifiable information">personally identifiable information</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27681" data-topic-text="privacy engineering">privacy engineering</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27486" data-expander-for="/topics/security-and-privacy/risk-management"></i> <a data-topic-id="27486" data-topic-text="risk management">risk management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27682" data-topic-text="categorization">categorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27683" data-topic-text="continuous monitoring">continuous monitoring</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-27486-27684" data-expander-for="/topics/security-and-privacy/risk-management/controls"></i> <a data-topic-id="27684" data-topic-text="controls">controls</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27767" data-topic-text="controls assessment">controls assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27768" data-topic-text="privacy controls">privacy controls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27769" data-topic-text="security controls">security controls</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27685" data-topic-text="risk assessment">risk assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27686" data-topic-text="roots of trust">roots of trust</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27687" data-topic-text="system authorization">system authorization</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-27486-27688" data-expander-for="/topics/security-and-privacy/risk-management/threats"></i> <a data-topic-id="27688" data-topic-text="threats">threats</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27770" data-topic-text="advanced persistent threats">advanced persistent threats</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27771" data-topic-text="botnets">botnets</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27772" data-topic-text="information sharing">information sharing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27773" data-topic-text="intrusion detection & prevention">intrusion detection & prevention</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27774" data-topic-text="malware">malware</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27689" data-topic-text="vulnerability management">vulnerability management</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27487" data-expander-for="/topics/security-and-privacy/security-and-behavior"></i> <a data-topic-id="27487" data-topic-text="security & behavior">security & behavior</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27709" data-topic-text="accessibility">accessibility</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27710" data-topic-text="behavior">behavior</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27711" data-topic-text="usability">usability</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27488" data-expander-for="/topics/security-and-privacy/security-measurement"></i> <a data-topic-id="27488" data-topic-text="security measurement">security measurement</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27690" data-topic-text="analytics">analytics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27691" data-topic-text="assurance">assurance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27692" data-topic-text="modeling">modeling</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27693" data-topic-text="testing & validation">testing & validation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27489" data-expander-for="/topics/security-and-privacy/security-programs-and-operations"></i> <a data-topic-id="27489" data-topic-text="security programs & operations">security programs & operations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27694" data-topic-text="acquisition">acquisition</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27695" data-topic-text="asset management">asset management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27696" data-topic-text="audit & accountability">audit & accountability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27697" data-topic-text="awareness training & education">awareness training & education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27698" data-topic-text="configuration management">configuration management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27699" data-topic-text="contingency planning">contingency planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27700" data-topic-text="incident response">incident response</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27701" data-topic-text="maintenance">maintenance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27702" data-topic-text="media protection">media protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27703" data-topic-text="patch management">patch management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27704" data-topic-text="personnel security">personnel security</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27705" data-topic-text="physical & environmental protection">physical & environmental protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27706" data-topic-text="planning">planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27707" data-topic-text="program management">program management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27708" data-topic-text="security automation">security automation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27490" data-expander-for="/topics/security-and-privacy/systems-security-engineering"></i> <a data-topic-id="27490" data-topic-text="systems security engineering">systems security engineering</a><ul style="display: none;"><li><i class="fa fa-plus fa-fw" id="topics-expander-27490-27713" data-expander-for="/topics/security-and-privacy/systems-security-engineering/trustworthiness"></i> <a data-topic-id="27713" data-topic-text="trustworthiness">trustworthiness</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27775" data-topic-text="reliability">reliability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27776" data-topic-text="resilience">resilience</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27777" data-topic-text="safety">safety</a></li></ul> </li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="33442" data-topic-text="zero trust">zero trust</a></li></ul><strong>Technologies</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27491" data-topic-text="artificial intelligence">artificial intelligence</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27492" data-topic-text="big data">big data</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27493" data-topic-text="biometrics">biometrics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27494" data-topic-text="blockchain">blockchain</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27495" data-topic-text="cloud & virtualization">cloud & virtualization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27496" data-topic-text="combinatorial testing">combinatorial testing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27497" data-topic-text="complexity">complexity</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24671-27499" data-expander-for="/topics/technologies/hardware"></i> <a data-topic-id="27499" data-topic-text="hardware">hardware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27714" data-topic-text="circuits">circuits</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27715" data-topic-text="personal computers">personal computers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27716" data-topic-text="sensors">sensors</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27498" data-topic-text="mobile">mobile</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24671-27500" data-expander-for="/topics/technologies/networks"></i> <a data-topic-id="27500" data-topic-text="networks">networks</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27717" data-topic-text="email">email</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27718" data-topic-text="firewalls">firewalls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27719" data-topic-text="internet">internet</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27501" data-topic-text="quantum information science">quantum information science</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27502" data-topic-text="servers">servers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27503" data-topic-text="smart cards">smart cards</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24671-27504" data-expander-for="/topics/technologies/software-firmware"></i> <a data-topic-id="27504" data-topic-text="software & firmware">software & firmware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27720" data-topic-text="BIOS">BIOS</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27721" data-topic-text="databases">databases</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27722" data-topic-text="operating systems">operating systems</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27505" data-topic-text="storage">storage</a></li></ul></div><div class="col-sm-4"><strong>Applications</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27456" data-topic-text="communications & wireless">communications & wireless</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27457" data-topic-text="cyber-physical systems">cyber-physical systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27458" data-topic-text="cybersecurity education">cybersecurity education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27459" data-topic-text="cybersecurity framework">cybersecurity framework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27460" data-topic-text="cybersecurity workforce">cybersecurity workforce</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27461" data-topic-text="enterprise">enterprise</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27462" data-topic-text="forensics">forensics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27463" data-topic-text="industrial control systems">industrial control systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27464" data-topic-text="Internet of Things">Internet of Things</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28914" data-topic-text="positioning navigation & timing">positioning navigation & timing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27465" data-topic-text="small & medium business">small & medium business</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27466" data-topic-text="telework">telework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27467" data-topic-text="voting">voting</a></li></ul><strong>Laws and Regulations</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-24673-27468" data-expander-for="/topics/laws-and-regulations/executive-documents"></i> <a data-topic-id="27468" data-topic-text="executive documents">executive documents</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27668" data-topic-text="Comprehensive National Cybersecurity Initiative">Comprehensive National Cybersecurity Initiative</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27669" data-topic-text="Cybersecurity Strategy and Implementation Plan">Cybersecurity Strategy and Implementation Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27670" data-topic-text="Cyberspace Policy Review">Cyberspace Policy Review</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27671" data-topic-text="Executive Order 13636">Executive Order 13636</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27672" data-topic-text="Executive Order 13702">Executive Order 13702</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27673" data-topic-text="Executive Order 13718">Executive Order 13718</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27674" data-topic-text="Executive Order 13800">Executive Order 13800</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28915" data-topic-text="Executive Order 13905">Executive Order 13905</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="33441" data-topic-text="Executive Order 14028">Executive Order 14028</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27675" data-topic-text="Federal Cybersecurity Research and Development Strategic Plan">Federal Cybersecurity Research and Development Strategic Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27676" data-topic-text="Homeland Security Presidential Directive 7">Homeland Security Presidential Directive 7</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27677" data-topic-text="Homeland Security Presidential Directive 12">Homeland Security Presidential Directive 12</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27678" data-topic-text="OMB Circular A-11">OMB Circular A-11</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27679" data-topic-text="OMB Circular A-130">OMB Circular A-130</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24673-27469" data-expander-for="/topics/laws-and-regulations/laws"></i> <a data-topic-id="27469" data-topic-text="laws">laws</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27654" data-topic-text="Cyber Security R&D Act">Cyber Security R&D; Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27655" data-topic-text="Cybersecurity Enhancement Act">Cybersecurity Enhancement Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27656" data-topic-text="E-Government Act">E-Government Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27657" data-topic-text="Energy Independence and Security Act">Energy Independence and Security Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27658" data-topic-text="Federal Information Security Modernization Act">Federal Information Security Modernization Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27659" data-topic-text="First Responder Network Authority">First Responder Network Authority</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27660" data-topic-text="Health Insurance Portability and Accountability Act">Health Insurance Portability and Accountability Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27661" data-topic-text="Help America Vote Act">Help America Vote Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="33553" data-topic-text="Internet of Things Cybersecurity Improvement Act">Internet of Things Cybersecurity Improvement Act</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24673-27470" data-expander-for="/topics/laws-and-regulations/regulations"></i> <a data-topic-id="27470" data-topic-text="regulations">regulations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27662" data-topic-text="Federal Acquisition Regulation">Federal Acquisition Regulation</a></li></ul> </li></ul></div><div class="col-sm-4"><strong>Activities and Products</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27452" data-topic-text="annual reports">annual reports</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27453" data-topic-text="conferences & workshops">conferences & workshops</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27454" data-topic-text="reference materials">reference materials</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27455" data-topic-text="standards development">standards development</a></li></ul><strong>Sectors</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27471" data-topic-text="aerospace">aerospace</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24675-27472" data-expander-for="/topics/sectors/energy"></i> <a data-topic-id="27472" data-topic-text="energy">energy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27712" data-topic-text="smart grid">smart grid</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27473" data-topic-text="financial services">financial services</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27474" data-topic-text="healthcare">healthcare</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27475" data-topic-text="hospitality">hospitality</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27476" data-topic-text="manufacturing">manufacturing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27477" data-topic-text="public safety">public safety</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27478" data-topic-text="retail">retail</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27479" data-topic-text="telecommunications">telecommunications</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27480" data-topic-text="transportation">transportation</a></li></ul></div></div> <div class="form-inline topics-type"> <label class="radio-label">Match ANY: <input name="topicsMatch-lg" checked="checked" id="topicsMatch-any-lg" name="Form.TopicsMatch" type="radio" value="ANY"/></label> <label class="radio-label">Match ALL: <input name="topicsMatch-lg" id="topicsMatch-all-lg" name="Form.TopicsMatch" type="radio" value="ALL"/></label> </div> </div> <div class="form-group"> <label for="pub-search-controls-lg"> Control Family (800-53) </label> <input name="controls-lg" id="controls-lg" name="Form.Controls" type="hidden" value=""/> <div class="form-control controls-selection" id="pub-search-controls-lg" contenteditable="true" data-drop-target="pub-search-controls-drop-lg" data-field-name="controls-lg" aria-haspopup="true" aria-expanded="false"> </div> <div class="controls-selection-dropdown desktop" id="pub-search-controls-drop-lg" style="display: none;" data-controls-selector=""> <strong>Control Families</strong> <ul> <li><a data-control-id="63d54ae4-c6cf-4ae4-a398-f19298c74903">AC - Access Control</a></li> <li><a data-control-id="36fb0b10-f6ae-4e0e-803c-bece9c947fd8">AT - Awareness and Training</a></li> <li><a data-control-id="4243d52c-ff5e-417b-8e1b-8344ff811570">AU - Audit and Accountability</a></li> <li><a data-control-id="0d93bf29-4551-4b7d-9677-23d0eb0524e0">CA - Assessment, Authorization and Monitoring</a></li> <li><a data-control-id="809b7563-f050-4bbf-a0e4-7ad25411734d">CM - Configuration Management</a></li> <li><a data-control-id="da51be5c-b86d-4e32-9484-f94cf75b8217">CP - Contingency Planning</a></li> <li><a data-control-id="ed87a12a-b75a-4555-862c-52f071b7ddb0">IA - Identification and Authentication</a></li> <li><a data-control-id="4801756a-a4ed-4b64-8890-4169d9b6a9ce">IR - Incident Response</a></li> <li><a data-control-id="88089d1d-c115-41f7-92ad-a84abe6101fc">MA - Maintenance</a></li> <li><a data-control-id="3fb9de77-cb37-43fd-b8a5-e33576b8caa1">MP - Media Protection</a></li> <li><a data-control-id="f3b91e7e-2498-49ce-bd0f-5b9ce3bbd9e0">PE - Physical and Environmental Protection</a></li> <li><a data-control-id="641492d1-d2da-40e6-a523-f93fdb5358e9">PL - Planning</a></li> <li><a data-control-id="9d2a46b6-2530-4266-ae75-dab3ea78d7a0">PM - Program Management</a></li> <li><a data-control-id="205e7cff-23a5-4b59-85bc-168ae6e7d95f">PS - Personnel Security</a></li> <li><a data-control-id="09385da5-c3cd-4dcf-91e9-fd455b0ef704">PT - PII Processing and Transparency</a></li> <li><a data-control-id="e08f7835-ea6b-4b7c-9db3-33a3662a38d1">RA - Risk Assessment</a></li> <li><a data-control-id="8e2ea53d-c53d-480e-b374-eb5ab055a94b">SA - System and Services Acquisition</a></li> <li><a data-control-id="f35646b1-d701-4941-b1c5-8e872f6bb812">SC - System and Communications Protection</a></li> <li><a data-control-id="660d9ce0-9cfe-4f5e-890a-41670d010846">SI - System and Information Integrity</a></li> <li><a data-control-id="605d44df-5027-4c32-a228-c000bbcac173">SR - Supply Chain Risk Management</a></li> </ul> </div> <div class="form-inline controls-type"> <label class="radio-label">Match ANY: <input name="controlsMatch-lg" checked="checked" id="controlsMatch-any-lg" name="Form.ControlsMatch" type="radio" value="ANY"/></label> <label class="radio-label">Match ALL: <input name="controlsMatch-lg" id="controlsMatch-all-lg" name="Form.ControlsMatch" type="radio" value="ALL"/></label> </div> </div> <div style="display: none;" data-form-error-pane="true" class="text-danger"> <strong class="text-danger">Please fix the following:</strong> <ul data-form-error-list="true"> </ul> <div class="validation-summary-valid" data-valmsg-summary="true"><ul><li style="display:none"></li> </ul></div> </div> <div class="form-group"> <button type="submit" id="pubs-search-submit-lg" name="submit-btn" data-form-button="submit" class="btn">Search</button> <button type="reset" id="pubs-search-reset-lg" name="reset-btn" data-form-button="reset" class="btn">Reset</button> </div> <span style="display: none;" id="publications-status-info"> <p><strong>Final:</strong> Published documents.</p> <p><strong>Public Draft:</strong> Documents have been posted as Public Drafts, typically with a public comment period.</p> <p> <strong>Withdrawn:</strong> Documents that have been withdrawn, and are no longer current. This includes:<br/> - Final publications that have been withdrawn;<br/> - Public drafts that have been obsoleted by a subsequent draft or final publication;<br/> - Public drafts that have been retired—further development was discontinued. </p> </span> </form> </div> <div class="col-lg-9 col-md-8 col-sm-12 col-xs-12 col-xxs-12"> <h4>Search Results</h4> <form action="/web/20230128001836/https://csrc.nist.gov/publications/search" class="bs-callout bs-callout-success csrc-search-form hidden-lg hidden-md mobile-form" data-csrc-form="true" data-default-query="sortBy-lg=releasedate+DESC&viewMode-lg=brief&ipp-lg=ALL&status-lg=Final&series-lg=ITL+Bulletin" data-form-ignore-default="sortBy" data-form-name="pubSearchMobile" id="pubs-search-form-sm" method="get"> <div class="form-group"> <label for="keywords-sm">Search</label> <input name="keywords-sm" class="form-control" data-val="true" data-val-length="The field Search must be a string with a maximum length of 255." data-val-length-max="255" id="keywords-sm" name="Form.Keywords" type="text" value=""/> <em class="text-muted">Search publication record data<br/> (not a full text search)</em> </div> <div class="form-group"> <label for="sortBy-sm">Sort By</label> <div class="form-inline"> <select name="sortBy-sm" class="form-control" id="sortBy-sm" name="Form.SortBy"><option value="relevance">Relevance (best match)</option> <option selected="selected" value="releasedate DESC">Release Date (newest first)</option> <option value="releasedate ASC">Release Date (oldest first)</option> <option value="Series ASC">Series (A-Z)</option> <option value="Series DESC">Series (Z-A)</option> <option value="Number ASC">Number (lowest to highest)</option> <option value="Number DESC">Number (highest to lowest)</option> <option value="title asc">Title (A-Z)</option> <option value="title desc">Title (Z-A)</option> </select> </div> </div> <div class="form-group"> <label for="viewMode-sm">Results View</label> <select name="viewMode-sm" class="form-control" id="viewMode-sm" name="Form.ResultsViewMode"><option selected="selected" value="brief">Brief</option> <option value="summary">Summary</option> </select> </div> <div class="form-group form-inline"> <label for="ipp-sm" class="form-control-half">Items Per Page</label> <select name="ipp-sm" class="form-control" id="ipp-sm" name="Form.ItemsPerPage"><option value="25">25</option> <option value="50">50</option> <option value="75">75</option> <option value="100">100</option> <option selected="selected" value="all">All</option> </select> </div> <div class="form-group"> <p class="text-center"> <a href="#" data-form-show-name="advancedSearch" id="advanced-search-link"> Advanced Search <i class="fa fa-caret-down" aria-hidden="true" data-form-show-expanded="true" style="display: none;"></i> <i class="fa fa-caret-up" aria-hidden="true" data-form-show-expanded="false"></i> </a> </p> </div> <div style="display: none;" data-form-show-trigger="advancedSearch" data-form-show="false"> <div class="form-group"> <label for="dateFrom-sm">Date</label> <div class="form-inline form-date-inline"> <div class="input-group date" data-date-picker="true"> <input name="dateFrom-sm" class="form-control" data-control-type="date" data-val="true" data-val-date="The field Date must be a date." data-validation="true" data-validation-compare-field="dateTo-sm" data-validation-message="From date must be less than To date" data-validation-type="less-than-date" id="dateFrom-sm" name="Form.DateFrom" placeholder=" / / " type="text" value=""/> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> <div class="input-group date" data-date-picker="true"> <input name="dateTo-sm" class="form-control" data-control-type="date" data-val="true" data-val-date="The field DateTo must be a date." id="dateTo-sm" name="Form.DateTo" placeholder=" / / " type="text" value=""/> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> </div> </div> <div class="form-group"> <label for="status-all-sm"> Status <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="publications-status-info"></i> </label> <div class="form-inline status-type" style="margin-left: 1rem;"> <label class="meta-label"> <input type="checkbox" id="status-final-sm" name="status-sm" value="Final" data-default-checked="True" checked="'checked'"/> Final<br/> </label> <label class="meta-label"> <input type="checkbox" id="status-draft-sm" name="status-sm" value="Draft" data-default-checked="True"/> Public Draft<br/> </label> <label class="meta-label"> <input type="checkbox" id="status-withdrawn-sm" name="status-sm" value="Withdrawn" data-default-checked="True"/> Withdrawn<br/> </label> </div> </div> <div class="form-group"> <label for="pub-search-series"> Series <button type="button" id="series-all-sm" class="btn btn-sm btn-success" data-check-all="series-sm">Check All</button> <button type="button" id="series-clear-sm" class="btn btn-sm btn-success" data-check-none="series-sm">Clear</button> </label> <div class="form-inline series-type" style="margin-left: 1rem;"> <label class="meta-label"> <input type="checkbox" id="series-fips-sm" name="series-sm" value="FIPS" data-default-checked="True"/> FIPS<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-sp-sm" name="series-sm" value="SP" data-default-checked="True"/> SP<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-nistir-sm" name="series-sm" value="NISTIR" data-default-checked="True"/> NISTIR<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-itl-bul-sm" name="series-sm" value="ITL Bulletin" data-default-checked="True" checked="'checked'/"> ITL Bulletin<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-white-paper-sm" name="series-sm" value="White Paper" data-default-checked="True"/> White Paper<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-build-block-sm" name="series-sm" value="Building Block" data-default-checked="True"/> Building Block<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-use-case-sm" name="series-sm" value="Use Case" data-default-checked="True"/> Use Case<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-journal-sm" name="series-sm" value="Journal Article" data-default-checked="True"/> Journal Article<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-conf-paper-sm" name="series-sm" value="Conference Paper" data-default-checked="True"/> Conference Paper<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-book-sm" name="series-sm" value="Book" data-default-checked="True"/> Book<br/> </label> </div> </div> <div class="form-group"> <label for="pub-search-topics-sm"> Topics </label> <input name="topics-sm" id="topics-sm" name="Form.Topics" type="hidden" value=""/> <div class="form-control topics-selection" id="pub-search-topics-sm" contenteditable="true" data-drop-target="pub-search-topics-drop-sm" data-field-name="topics-sm" aria-haspopup="true" aria-expanded="false"> </div> <div class="topics-selection-dropdown desktop" id="pub-search-topics-drop-sm" style="display: none;" data-topics-selector=""><div class="col-sm-4"><strong>Security and Privacy</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27481" data-expander-for="/topics/security-and-privacy/cryptography"></i> <a data-topic-id="27481" data-topic-text="cryptography">cryptography</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27647" data-topic-text="digital signatures">digital signatures</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27648" data-topic-text="encryption">encryption</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27649" data-topic-text="key management">key management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27650" data-topic-text="message authentication">message authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27651" data-topic-text="post-quantum cryptography">post-quantum cryptography</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27652" data-topic-text="random number generation">random number generation</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27653" data-topic-text="secure hashing">secure hashing</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27482" data-topic-text="cybersecurity supply chain risk management">cybersecurity supply chain risk management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27483" data-topic-text="general security & privacy">general security & privacy</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27484" data-expander-for="/topics/security-and-privacy/identity-and-access-management"></i> <a data-topic-id="27484" data-topic-text="identity & access management">identity & access management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27663" data-topic-text="access authorization">access authorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27664" data-topic-text="access control">access control</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27665" data-topic-text="authentication">authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27666" data-topic-text="Personal Identity Verification">Personal Identity Verification</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27667" data-topic-text="public key infrastructure">public key infrastructure</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27485" data-expander-for="/topics/security-and-privacy/privacy"></i> <a data-topic-id="27485" data-topic-text="privacy">privacy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27680" data-topic-text="personally identifiable information">personally identifiable information</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27681" data-topic-text="privacy engineering">privacy engineering</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27486" data-expander-for="/topics/security-and-privacy/risk-management"></i> <a data-topic-id="27486" data-topic-text="risk management">risk management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27682" data-topic-text="categorization">categorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27683" data-topic-text="continuous monitoring">continuous monitoring</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-27486-27684" data-expander-for="/topics/security-and-privacy/risk-management/controls"></i> <a data-topic-id="27684" data-topic-text="controls">controls</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27767" data-topic-text="controls assessment">controls assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27768" data-topic-text="privacy controls">privacy controls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27769" data-topic-text="security controls">security controls</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27685" data-topic-text="risk assessment">risk assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27686" data-topic-text="roots of trust">roots of trust</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27687" data-topic-text="system authorization">system authorization</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-27486-27688" data-expander-for="/topics/security-and-privacy/risk-management/threats"></i> <a data-topic-id="27688" data-topic-text="threats">threats</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27770" data-topic-text="advanced persistent threats">advanced persistent threats</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27771" data-topic-text="botnets">botnets</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27772" data-topic-text="information sharing">information sharing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27773" data-topic-text="intrusion detection & prevention">intrusion detection & prevention</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27774" data-topic-text="malware">malware</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27689" data-topic-text="vulnerability management">vulnerability management</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27487" data-expander-for="/topics/security-and-privacy/security-and-behavior"></i> <a data-topic-id="27487" data-topic-text="security & behavior">security & behavior</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27709" data-topic-text="accessibility">accessibility</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27710" data-topic-text="behavior">behavior</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27711" data-topic-text="usability">usability</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27488" data-expander-for="/topics/security-and-privacy/security-measurement"></i> <a data-topic-id="27488" data-topic-text="security measurement">security measurement</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27690" data-topic-text="analytics">analytics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27691" data-topic-text="assurance">assurance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27692" data-topic-text="modeling">modeling</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27693" data-topic-text="testing & validation">testing & validation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27489" data-expander-for="/topics/security-and-privacy/security-programs-and-operations"></i> <a data-topic-id="27489" data-topic-text="security programs & operations">security programs & operations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27694" data-topic-text="acquisition">acquisition</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27695" data-topic-text="asset management">asset management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27696" data-topic-text="audit & accountability">audit & accountability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27697" data-topic-text="awareness training & education">awareness training & education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27698" data-topic-text="configuration management">configuration management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27699" data-topic-text="contingency planning">contingency planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27700" data-topic-text="incident response">incident response</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27701" data-topic-text="maintenance">maintenance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27702" data-topic-text="media protection">media protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27703" data-topic-text="patch management">patch management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27704" data-topic-text="personnel security">personnel security</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27705" data-topic-text="physical & environmental protection">physical & environmental protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27706" data-topic-text="planning">planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27707" data-topic-text="program management">program management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27708" data-topic-text="security automation">security automation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27490" data-expander-for="/topics/security-and-privacy/systems-security-engineering"></i> <a data-topic-id="27490" data-topic-text="systems security engineering">systems security engineering</a><ul style="display: none;"><li><i class="fa fa-plus fa-fw" id="topics-expander-27490-27713" data-expander-for="/topics/security-and-privacy/systems-security-engineering/trustworthiness"></i> <a data-topic-id="27713" data-topic-text="trustworthiness">trustworthiness</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27775" data-topic-text="reliability">reliability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27776" data-topic-text="resilience">resilience</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27777" data-topic-text="safety">safety</a></li></ul> </li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="33442" data-topic-text="zero trust">zero trust</a></li></ul><strong>Technologies</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27491" data-topic-text="artificial intelligence">artificial intelligence</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27492" data-topic-text="big data">big data</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27493" data-topic-text="biometrics">biometrics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27494" data-topic-text="blockchain">blockchain</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27495" data-topic-text="cloud & virtualization">cloud & virtualization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27496" data-topic-text="combinatorial testing">combinatorial testing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27497" data-topic-text="complexity">complexity</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24671-27499" data-expander-for="/topics/technologies/hardware"></i> <a data-topic-id="27499" data-topic-text="hardware">hardware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27714" data-topic-text="circuits">circuits</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27715" data-topic-text="personal computers">personal computers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27716" data-topic-text="sensors">sensors</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27498" data-topic-text="mobile">mobile</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24671-27500" data-expander-for="/topics/technologies/networks"></i> <a data-topic-id="27500" data-topic-text="networks">networks</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27717" data-topic-text="email">email</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27718" data-topic-text="firewalls">firewalls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27719" data-topic-text="internet">internet</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27501" data-topic-text="quantum information science">quantum information science</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27502" data-topic-text="servers">servers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27503" data-topic-text="smart cards">smart cards</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24671-27504" data-expander-for="/topics/technologies/software-firmware"></i> <a data-topic-id="27504" data-topic-text="software & firmware">software & firmware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27720" data-topic-text="BIOS">BIOS</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27721" data-topic-text="databases">databases</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27722" data-topic-text="operating systems">operating systems</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27505" data-topic-text="storage">storage</a></li></ul></div><div class="col-sm-4"><strong>Applications</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27456" data-topic-text="communications & wireless">communications & wireless</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27457" data-topic-text="cyber-physical systems">cyber-physical systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27458" data-topic-text="cybersecurity education">cybersecurity education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27459" data-topic-text="cybersecurity framework">cybersecurity framework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27460" data-topic-text="cybersecurity workforce">cybersecurity workforce</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27461" data-topic-text="enterprise">enterprise</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27462" data-topic-text="forensics">forensics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27463" data-topic-text="industrial control systems">industrial control systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27464" data-topic-text="Internet of Things">Internet of Things</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28914" data-topic-text="positioning navigation & timing">positioning navigation & timing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27465" data-topic-text="small & medium business">small & medium business</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27466" data-topic-text="telework">telework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27467" data-topic-text="voting">voting</a></li></ul><strong>Laws and Regulations</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-24673-27468" data-expander-for="/topics/laws-and-regulations/executive-documents"></i> <a data-topic-id="27468" data-topic-text="executive documents">executive documents</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27668" data-topic-text="Comprehensive National Cybersecurity Initiative">Comprehensive National Cybersecurity Initiative</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27669" data-topic-text="Cybersecurity Strategy and Implementation Plan">Cybersecurity Strategy and Implementation Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27670" data-topic-text="Cyberspace Policy Review">Cyberspace Policy Review</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27671" data-topic-text="Executive Order 13636">Executive Order 13636</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27672" data-topic-text="Executive Order 13702">Executive Order 13702</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27673" data-topic-text="Executive Order 13718">Executive Order 13718</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27674" data-topic-text="Executive Order 13800">Executive Order 13800</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28915" data-topic-text="Executive Order 13905">Executive Order 13905</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="33441" data-topic-text="Executive Order 14028">Executive Order 14028</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27675" data-topic-text="Federal Cybersecurity Research and Development Strategic Plan">Federal Cybersecurity Research and Development Strategic Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27676" data-topic-text="Homeland Security Presidential Directive 7">Homeland Security Presidential Directive 7</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27677" data-topic-text="Homeland Security Presidential Directive 12">Homeland Security Presidential Directive 12</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27678" data-topic-text="OMB Circular A-11">OMB Circular A-11</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27679" data-topic-text="OMB Circular A-130">OMB Circular A-130</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24673-27469" data-expander-for="/topics/laws-and-regulations/laws"></i> <a data-topic-id="27469" data-topic-text="laws">laws</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27654" data-topic-text="Cyber Security R&D Act">Cyber Security R&D; Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27655" data-topic-text="Cybersecurity Enhancement Act">Cybersecurity Enhancement Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27656" data-topic-text="E-Government Act">E-Government Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27657" data-topic-text="Energy Independence and Security Act">Energy Independence and Security Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27658" data-topic-text="Federal Information Security Modernization Act">Federal Information Security Modernization Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27659" data-topic-text="First Responder Network Authority">First Responder Network Authority</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27660" data-topic-text="Health Insurance Portability and Accountability Act">Health Insurance Portability and Accountability Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27661" data-topic-text="Help America Vote Act">Help America Vote Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="33553" data-topic-text="Internet of Things Cybersecurity Improvement Act">Internet of Things Cybersecurity Improvement Act</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24673-27470" data-expander-for="/topics/laws-and-regulations/regulations"></i> <a data-topic-id="27470" data-topic-text="regulations">regulations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27662" data-topic-text="Federal Acquisition Regulation">Federal Acquisition Regulation</a></li></ul> </li></ul></div><div class="col-sm-4"><strong>Activities and Products</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27452" data-topic-text="annual reports">annual reports</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27453" data-topic-text="conferences & workshops">conferences & workshops</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27454" data-topic-text="reference materials">reference materials</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27455" data-topic-text="standards development">standards development</a></li></ul><strong>Sectors</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27471" data-topic-text="aerospace">aerospace</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24675-27472" data-expander-for="/topics/sectors/energy"></i> <a data-topic-id="27472" data-topic-text="energy">energy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27712" data-topic-text="smart grid">smart grid</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27473" data-topic-text="financial services">financial services</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27474" data-topic-text="healthcare">healthcare</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27475" data-topic-text="hospitality">hospitality</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27476" data-topic-text="manufacturing">manufacturing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27477" data-topic-text="public safety">public safety</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27478" data-topic-text="retail">retail</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27479" data-topic-text="telecommunications">telecommunications</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27480" data-topic-text="transportation">transportation</a></li></ul></div></div> <div class="form-inline topics-type"> <label class="radio-label">Match ANY: <input name="topicsMatch-sm" checked="checked" id="topicsMatch-any-sm" name="Form.TopicsMatch" type="radio" value="ANY"/></label> <label class="radio-label">Match ALL: <input name="topicsMatch-sm" id="topicsMatch-all-sm" name="Form.TopicsMatch" type="radio" value="ALL"/></label> </div> </div> <div class="form-group"> <label for="pub-search-controls-sm"> Control Family (800-53) </label> <input name="controls-sm" id="controls-sm" name="Form.Controls" type="hidden" value=""/> <div class="form-control controls-selection" id="pub-search-controls-sm" contenteditable="true" data-drop-target="pub-search-controls-drop-sm" data-field-name="controls-sm" aria-haspopup="true" aria-expanded="false"> </div> <div class="controls-selection-dropdown desktop" id="pub-search-controls-drop-sm" style="display: none;" data-controls-selector=""> <strong>Control Families</strong> <ul> <li><a data-control-id="63d54ae4-c6cf-4ae4-a398-f19298c74903">AC - Access Control</a></li> <li><a data-control-id="36fb0b10-f6ae-4e0e-803c-bece9c947fd8">AT - Awareness and Training</a></li> <li><a data-control-id="4243d52c-ff5e-417b-8e1b-8344ff811570">AU - Audit and Accountability</a></li> <li><a data-control-id="0d93bf29-4551-4b7d-9677-23d0eb0524e0">CA - Assessment, Authorization and Monitoring</a></li> <li><a data-control-id="809b7563-f050-4bbf-a0e4-7ad25411734d">CM - Configuration Management</a></li> <li><a data-control-id="da51be5c-b86d-4e32-9484-f94cf75b8217">CP - Contingency Planning</a></li> <li><a data-control-id="ed87a12a-b75a-4555-862c-52f071b7ddb0">IA - Identification and Authentication</a></li> <li><a data-control-id="4801756a-a4ed-4b64-8890-4169d9b6a9ce">IR - Incident Response</a></li> <li><a data-control-id="88089d1d-c115-41f7-92ad-a84abe6101fc">MA - Maintenance</a></li> <li><a data-control-id="3fb9de77-cb37-43fd-b8a5-e33576b8caa1">MP - Media Protection</a></li> <li><a data-control-id="f3b91e7e-2498-49ce-bd0f-5b9ce3bbd9e0">PE - Physical and Environmental Protection</a></li> <li><a data-control-id="641492d1-d2da-40e6-a523-f93fdb5358e9">PL - Planning</a></li> <li><a data-control-id="9d2a46b6-2530-4266-ae75-dab3ea78d7a0">PM - Program Management</a></li> <li><a data-control-id="205e7cff-23a5-4b59-85bc-168ae6e7d95f">PS - Personnel Security</a></li> <li><a data-control-id="09385da5-c3cd-4dcf-91e9-fd455b0ef704">PT - PII Processing and Transparency</a></li> <li><a data-control-id="e08f7835-ea6b-4b7c-9db3-33a3662a38d1">RA - Risk Assessment</a></li> <li><a data-control-id="8e2ea53d-c53d-480e-b374-eb5ab055a94b">SA - System and Services Acquisition</a></li> <li><a data-control-id="f35646b1-d701-4941-b1c5-8e872f6bb812">SC - System and Communications Protection</a></li> <li><a data-control-id="660d9ce0-9cfe-4f5e-890a-41670d010846">SI - System and Information Integrity</a></li> <li><a data-control-id="605d44df-5027-4c32-a228-c000bbcac173">SR - Supply Chain Risk Management</a></li> </ul> </div> <div class="form-inline controls-type"> <label class="radio-label">Match ANY: <input name="controlsMatch-sm" checked="checked" id="controlsMatch-any-sm" name="Form.ControlsMatch" type="radio" value="ANY"/></label> <label class="radio-label">Match ALL: <input name="controlsMatch-sm" id="controlsMatch-all-sm" name="Form.ControlsMatch" type="radio" value="ALL"/></label> </div> </div> </div> <div style="display: none;" data-form-error-pane="true" class="text-danger"> <strong class="text-danger">Please fix the following:</strong> <ul data-form-error-list="true"> </ul> <div class="validation-summary-valid" data-valmsg-summary="true"><ul><li style="display:none"></li> </ul></div> </div> <div class="form-group"> <button type="submit" id="pubs-search-submit-sm" name="submit-btn" data-form-button="submit" class="btn">Search</button> <button type="reset" id="pubs-search-reset-sm" name="reset-btn" data-form-button="reset" class="btn">Reset</button> </div> <span style="display: none;" id="publications-status-info"> <p><strong>Final:</strong> Published documents.</p> <p><strong>Public Draft:</strong> Documents have been posted as Public Drafts, typically with a public comment period.</p> <p> <strong>Withdrawn:</strong> Documents that have been withdrawn, and are no longer current. This includes:<br/> - Final publications that have been withdrawn;<br/> - Public drafts that have been obsoleted by a subsequent draft or final publication;<br/> - Public drafts that have been retired—further development was discontinued. </p> </span> </form> <div id="search-criteria-container" data-target-form="pubSearchDesktop"></div> <div class="row top-pagination-area"> <div class="col-md-6 col-sm-12"> <span id="showing-results-text" data-total-pages="1" data-first-record="1" data-last-record="143" data-current-page="1" data-items-per-page="0" data-total-results="143">Showing <strong id="showing-results-total">143</strong> matching records.</span> </div> <div class="col-md-6 col-sm-12"> <span class="pull-right hidden-sm hidden-xs hidden-xxs"> <span class="pagination-links" id="top-pagination-container" data-total-pages="0" data-min-page="1" data-max-page="0" data-current-page="1" data-show-first="False" data-show-last="True"></span> </span> <p class="text-center hidden-md hidden-lg"> <span class="pagination-links" id="mobile-top-pagination-container" data-total-pages="0" data-min-page="1" data-max-page="0" data-current-page="1" data-show-first="False" data-show-last="True"></span> </p> </div> </div> <table class="table table-striped table-condensed publications-table table-bordered" id="publications-results-table" data-total-records="143" data-page="1" data-first-record="1" data-last-record="143" data-ipp="0"> <thead> <tr> <th nowrap class="hidden-sm hidden-xs hidden-xxs">Series</th> <th nowrap class="hidden-sm hidden-xs hidden-xxs">Number</th> <th nowrap> <span class="hidden-sm hidden-xs hidden-xxs">Title</span> <span class="hidden-md hidden-lg">Publications</span> </th> <th nowrap class="hidden-sm hidden-xs hidden-xxs">Status</th> <th nowrap class="hidden-sm hidden-xs hidden-xxs">Release Date</th> </tr> </thead> <tbody> <tr id="result-1"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-1">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-1"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2020/08/security-considerations-for-exchanging-files-over-the-internet/final" id="pub-title-link-1">Security Considerations for Exchanging Files Over the Internet</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-1">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2020/08/security-considerations-for-exchanging-files-over-the-internet/final" class="mobile-pub-title" id="pub-title-link-sm-1">Security Considerations for Exchanging Files Over the Internet</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-1">8/03/2020</strong> <br/> Status: <span id="pub-status-sm-1">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-1"> <span id="download-value-1-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2020-08.pdf">August 2020 ITL Bulletin</a>; </span> <span id="download-value-1-1"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/itl-bulletin/2020/08/security-considerations-for-exchanging-files-over-the-internet/final/documents/itlbul2020-08-infographic.pdf">Infographic: Play the Secure File Exchange Game</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-1"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-1"> 8/03/2020 </td> </tr> <tr id="result-2"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-2">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-2"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2020/06/nist-privacy-framework/final" id="pub-title-link-2">NIST Privacy Framework: An Overview</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-2">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2020/06/nist-privacy-framework/final" class="mobile-pub-title" id="pub-title-link-sm-2">NIST Privacy Framework: An Overview</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-2">6/24/2020</strong> <br/> Status: <span id="pub-status-sm-2">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-2"> <span id="download-value-2-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2020-06.pdf">June 2020 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-2"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-2"> 6/24/2020 </td> </tr> <tr id="result-3"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-3">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-3"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2020/03/security-for-enterprise-telework-remote-access-and-byod/final" id="pub-title-link-3">Security for Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Solutions</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-3">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2020/03/security-for-enterprise-telework-remote-access-and-byod/final" class="mobile-pub-title" id="pub-title-link-sm-3">Security for Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Solutions</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-3">3/18/2020</strong> <br/> Status: <span id="pub-status-sm-3">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-3"> <span id="download-value-3-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2020-03.pdf">March 2020 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-3"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-3"> 3/18/2020 </td> </tr> <tr id="result-4"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-4">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-4"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2019/05/fips-140-3-adopts-iso/iec-standards/final" id="pub-title-link-4">FIPS 140-3 Adopts ISO/IEC Standards</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-4">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2019/05/fips-140-3-adopts-iso/iec-standards/final" class="mobile-pub-title" id="pub-title-link-sm-4">FIPS 140-3 Adopts ISO/IEC Standards</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-4">5/20/2019</strong> <br/> Status: <span id="pub-status-sm-4">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-4"> <span id="download-value-4-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2019-05.pdf">May 2019 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-4"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-4"> 5/20/2019 </td> </tr> <tr id="result-5"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-5">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-5"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2019/04/standardize-threshold-schemes-for-cryptographic-primitives/final" id="pub-title-link-5">Time to Standardize Threshold Schemes for Cryptographic Primitives</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-5">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2019/04/standardize-threshold-schemes-for-cryptographic-primitives/final" class="mobile-pub-title" id="pub-title-link-sm-5">Time to Standardize Threshold Schemes for Cryptographic Primitives</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-5">4/09/2019</strong> <br/> Status: <span id="pub-status-sm-5">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-5"> <span id="download-value-5-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2019-04.pdf">April 2019 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-5"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-5"> 4/09/2019 </td> </tr> <tr id="result-6"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-6">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-6"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2019/02/the-next-generation-risk-management-framework-rmf/final" id="pub-title-link-6">The Next Generation Risk Management Framework (RMF 2.0): A Holistic Methodology to Manage Information Security, Privacy and Supply Chain Risk</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-6">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2019/02/the-next-generation-risk-management-framework-rmf/final" class="mobile-pub-title" id="pub-title-link-sm-6">The Next Generation Risk Management Framework (RMF 2.0): A Holistic Methodology to Manage Information Security, Privacy and Supply Chain Risk</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-6">2/28/2019</strong> <br/> Status: <span id="pub-status-sm-6">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-6"> <span id="download-value-6-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2019-02.pdf">February 2019 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-6"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-6"> 2/28/2019 </td> </tr> <tr id="result-7"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-7">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-7"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2018/12/securing-wireless-infusion-pumps/final" id="pub-title-link-7">Securing Wireless Infusion Pumps</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-7">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2018/12/securing-wireless-infusion-pumps/final" class="mobile-pub-title" id="pub-title-link-sm-7">Securing Wireless Infusion Pumps</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-7">12/19/2018</strong> <br/> Status: <span id="pub-status-sm-7">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-7"> <span id="download-value-7-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2018-12.pdf">December 2018 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-7"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-7"> 12/19/2018 </td> </tr> <tr id="result-8"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-8">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-8"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2018/10/helping-to-build-blockchain-knowledge/final" id="pub-title-link-8">One Block at a Time – Helping to Build Blockchain Knowledge</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-8">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2018/10/helping-to-build-blockchain-knowledge/final" class="mobile-pub-title" id="pub-title-link-sm-8">One Block at a Time – Helping to Build Blockchain Knowledge</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-8">10/25/2018</strong> <br/> Status: <span id="pub-status-sm-8">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-8"> <span id="download-value-8-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2018-10.pdf">October 2018 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-8"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-8"> 10/25/2018 </td> </tr> <tr id="result-9"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-9">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-9"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2018/09/automated-cryptographic-validation-testing/final" id="pub-title-link-9">Automated Cryptographic Validation (ACV) Testing</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-9">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2018/09/automated-cryptographic-validation-testing/final" class="mobile-pub-title" id="pub-title-link-sm-9">Automated Cryptographic Validation (ACV) Testing</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-9">9/20/2018</strong> <br/> Status: <span id="pub-status-sm-9">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-9"> <span id="download-value-9-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2018-09.pdf">September 2018 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-9"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-9"> 9/20/2018 </td> </tr> <tr id="result-10"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-10">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-10"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2018/07/controlled-unclassified-information-security-requirements/final" id="pub-title-link-10">Assessing Implementation of Controlled Unclassified Information (CUI) Security Requirements</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-10">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2018/07/controlled-unclassified-information-security-requirements/final" class="mobile-pub-title" id="pub-title-link-sm-10">Assessing Implementation of Controlled Unclassified Information (CUI) Security Requirements</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-10">7/26/2018</strong> <br/> Status: <span id="pub-status-sm-10">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-10"> <span id="download-value-10-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2018-07.pdf">July 2018 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-10"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-10"> 7/26/2018 </td> </tr> <tr id="result-11"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-11">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-11"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2018/06/a-model-process-for-criticality-analysis/final" id="pub-title-link-11">Putting First Things First – A Model Process for Criticality Analysis</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-11">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2018/06/a-model-process-for-criticality-analysis/final" class="mobile-pub-title" id="pub-title-link-sm-11">Putting First Things First – A Model Process for Criticality Analysis</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-11">6/26/2018</strong> <br/> Status: <span id="pub-status-sm-11">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-11"> <span id="download-value-11-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2018-06.pdf">June 2018 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-11"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-11"> 6/26/2018 </td> </tr> <tr id="result-12"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-12">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-12"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2018/05/protecting-software-integrity-through-code-signing/final" id="pub-title-link-12">Protecting Software Integrity Through Code Signing</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-12">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2018/05/protecting-software-integrity-through-code-signing/final" class="mobile-pub-title" id="pub-title-link-sm-12">Protecting Software Integrity Through Code Signing</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-12">5/23/2018</strong> <br/> Status: <span id="pub-status-sm-12">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-12"> <span id="download-value-12-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2018-05.pdf">May 2018 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-12"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-12"> 5/23/2018 </td> </tr> <tr id="result-13"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-13">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-13"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2018/04/improving-the-trustworthiness-of-email/final" id="pub-title-link-13">Improving the Trustworthiness of Email, and Beyond!</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-13">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2018/04/improving-the-trustworthiness-of-email/final" class="mobile-pub-title" id="pub-title-link-sm-13">Improving the Trustworthiness of Email, and Beyond!</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-13">4/25/2018</strong> <br/> Status: <span id="pub-status-sm-13">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-13"> <span id="download-value-13-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2018-04.pdf">April 2018 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-13"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-13"> 4/25/2018 </td> </tr> <tr id="result-14"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-14">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-14"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2018/03/safeguards-for-securing-virtualized-servers/final" id="pub-title-link-14">Safeguards for Securing Virtualized Servers</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-14">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2018/03/safeguards-for-securing-virtualized-servers/final" class="mobile-pub-title" id="pub-title-link-sm-14">Safeguards for Securing Virtualized Servers</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-14">3/27/2018</strong> <br/> Status: <span id="pub-status-sm-14">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-14"> <span id="download-value-14-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2018-03.pdf">March 2018 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-14"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-14"> 3/27/2018 </td> </tr> <tr id="result-15"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-15">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-15"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2018/02/securing-information-through-post-quantum-cryptography/final" id="pub-title-link-15">Securing Tomorrow's Information Through Post-Quantum Cryptography</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-15">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2018/02/securing-information-through-post-quantum-cryptography/final" class="mobile-pub-title" id="pub-title-link-sm-15">Securing Tomorrow's Information Through Post-Quantum Cryptography</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-15">2/27/2018</strong> <br/> Status: <span id="pub-status-sm-15">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-15"> <span id="download-value-15-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2018-02.pdf">February 2018 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-15"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-15"> 2/27/2018 </td> </tr> <tr id="result-16"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-16">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-16"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2018/01/lte-based-mobile-communications/final" id="pub-title-link-16">Guidance for Improving LTE-Based Mobile Communications Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-16">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2018/01/lte-based-mobile-communications/final" class="mobile-pub-title" id="pub-title-link-sm-16">Guidance for Improving LTE-Based Mobile Communications Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-16">1/29/2018</strong> <br/> Status: <span id="pub-status-sm-16">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-16"> <span id="download-value-16-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2018-01.pdf">January 2018 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-16"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-16"> 1/29/2018 </td> </tr> <tr id="result-17"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-17">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-17"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2017/11/tdea-block-ciphers/final" id="pub-title-link-17">Guidance on TDEA Block Ciphers</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-17">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2017/11/tdea-block-ciphers/final" class="mobile-pub-title" id="pub-title-link-sm-17">Guidance on TDEA Block Ciphers</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-17">11/27/2017</strong> <br/> Status: <span id="pub-status-sm-17">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-17"> <span id="download-value-17-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2017-11.pdf">November 2017 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-17"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-17"> 11/27/2017 </td> </tr> <tr id="result-18"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-18">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-18"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2017/10/application-container-security/final" id="pub-title-link-18">NIST Guidance on Application Container Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-18">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2017/10/application-container-security/final" class="mobile-pub-title" id="pub-title-link-sm-18">NIST Guidance on Application Container Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-18">10/24/2017</strong> <br/> Status: <span id="pub-status-sm-18">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-18"> <span id="download-value-18-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2017-10.pdf">October 2017 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-18"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-18"> 10/24/2017 </td> </tr> <tr id="result-19"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-19">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-19"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2017/09/updating-keys-for-dns-security/final" id="pub-title-link-19">Updating the Keys for DNS Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-19">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2017/09/updating-keys-for-dns-security/final" class="mobile-pub-title" id="pub-title-link-sm-19">Updating the Keys for DNS Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-19">9/27/2017</strong> <br/> Status: <span id="pub-status-sm-19">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-19"> <span id="download-value-19-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2017-09.pdf">September 2017 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-19"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-19"> 9/27/2017 </td> </tr> <tr id="result-20"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-20">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-20"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2017/08/update-nist-sp-800-63-digital-identity-guidelines/final" id="pub-title-link-20">Understanding the Major Update to NIST SP 800-63: Digital Identity Guidelines</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-20">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2017/08/update-nist-sp-800-63-digital-identity-guidelines/final" class="mobile-pub-title" id="pub-title-link-sm-20">Understanding the Major Update to NIST SP 800-63: Digital Identity Guidelines</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-20">8/29/2017</strong> <br/> Status: <span id="pub-status-sm-20">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-20"> <span id="download-value-20-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2017-08.pdf">August 2017 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-20"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-20"> 8/29/2017 </td> </tr> <tr id="result-21"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-21">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-21"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2017/07/updated-nist-guidance-for-bluetooth-security/final" id="pub-title-link-21">Updated NIST Guidance for Bluetooth Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-21">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2017/07/updated-nist-guidance-for-bluetooth-security/final" class="mobile-pub-title" id="pub-title-link-sm-21">Updated NIST Guidance for Bluetooth Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-21">7/25/2017</strong> <br/> Status: <span id="pub-status-sm-21">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-21"> <span id="download-value-21-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2017-07.pdf">July 2017 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-21"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-21"> 7/25/2017 </td> </tr> <tr id="result-22"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-22">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-22"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2017/06/toward-standardizing-lightweight-cryptography/final" id="pub-title-link-22">Toward Standardizing Lightweight Cryptography</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-22">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2017/06/toward-standardizing-lightweight-cryptography/final" class="mobile-pub-title" id="pub-title-link-sm-22">Toward Standardizing Lightweight Cryptography</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-22">6/20/2017</strong> <br/> Status: <span id="pub-status-sm-22">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-22"> <span id="download-value-22-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2017-06.pdf">June 2017 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-22"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-22"> 6/20/2017 </td> </tr> <tr id="result-23"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-23">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-23"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2017/05/cyber-threat-intelligence-and-information-sharing/final" id="pub-title-link-23">Cyber-Threat Intelligence and Information Sharing</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-23">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2017/05/cyber-threat-intelligence-and-information-sharing/final" class="mobile-pub-title" id="pub-title-link-sm-23">Cyber-Threat Intelligence and Information Sharing</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-23">5/08/2017</strong> <br/> Status: <span id="pub-status-sm-23">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-23"> <span id="download-value-23-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2017-05.pdf">May 2017 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-23"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-23"> 5/08/2017 </td> </tr> <tr id="result-24"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-24">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-24"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2017/04/building-bridge-b/w-privacy--cybersecurity-for-federal-systems/final" id="pub-title-link-24">Building the Bridge Between Privacy and Cybersecurity for Federal Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-24">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2017/04/building-bridge-b/w-privacy--cybersecurity-for-federal-systems/final" class="mobile-pub-title" id="pub-title-link-sm-24">Building the Bridge Between Privacy and Cybersecurity for Federal Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-24">4/18/2017</strong> <br/> Status: <span id="pub-status-sm-24">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-24"> <span id="download-value-24-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2017-04.pdf">April 2017 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-24"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-24"> 4/18/2017 </td> </tr> <tr id="result-25"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-25">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-25"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2017/03/fundamentals-of-small-business-information-security/final" id="pub-title-link-25">Fundamentals of Small Business Information Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-25">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2017/03/fundamentals-of-small-business-information-security/final" class="mobile-pub-title" id="pub-title-link-sm-25">Fundamentals of Small Business Information Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-25">3/13/2017</strong> <br/> Status: <span id="pub-status-sm-25">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-25"> <span id="download-value-25-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2017-03.pdf">March 2017 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-25"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-25"> 3/13/2017 </td> </tr> <tr id="result-26"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-26">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-26"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2017/02/guide-for-cybersecurity-incident-recovery/final" id="pub-title-link-26">Guide for Cybersecurity Incident Recovery</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-26">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2017/02/guide-for-cybersecurity-incident-recovery/final" class="mobile-pub-title" id="pub-title-link-sm-26">Guide for Cybersecurity Incident Recovery</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-26">2/17/2017</strong> <br/> Status: <span id="pub-status-sm-26">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-26"> <span id="download-value-26-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2017-02.pdf">February 2017 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-26"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-26"> 2/17/2017 </td> </tr> <tr id="result-27"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-27">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-27"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2017/01/dramatically-reducing-software-vulnerabilities/final" id="pub-title-link-27">Dramatically Reducing Software Vulnerabilities</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-27">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2017/01/dramatically-reducing-software-vulnerabilities/final" class="mobile-pub-title" id="pub-title-link-sm-27">Dramatically Reducing Software Vulnerabilities</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-27">1/17/2017</strong> <br/> Status: <span id="pub-status-sm-27">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-27"> <span id="download-value-27-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2017-01.pdf">January 2017 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-27"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-27"> 1/17/2017 </td> </tr> <tr id="result-28"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-28">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-28"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2016/12/rethinking-security-through-systems-security-engineering/final" id="pub-title-link-28">Rethinking Security Through Systems Security Engineering</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-28">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2016/12/rethinking-security-through-systems-security-engineering/final" class="mobile-pub-title" id="pub-title-link-sm-28">Rethinking Security Through Systems Security Engineering</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-28">12/21/2016</strong> <br/> Status: <span id="pub-status-sm-28">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-28"> <span id="download-value-28-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2016-12.pdf">December 2016 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-28"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-28"> 12/21/2016 </td> </tr> <tr id="result-29"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-29">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-29"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2016/11/exploring-the-next-generation-of-ac-methodologies/final" id="pub-title-link-29">Exploring the Next Generation of Access Control Methodologies</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-29">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2016/11/exploring-the-next-generation-of-ac-methodologies/final" class="mobile-pub-title" id="pub-title-link-sm-29">Exploring the Next Generation of Access Control Methodologies</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-29">11/21/2016</strong> <br/> Status: <span id="pub-status-sm-29">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-29"> <span id="download-value-29-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2016-11.pdf">November 2016 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-29"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-29"> 11/21/2016 </td> </tr> <tr id="result-30"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-30">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-30"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2016/10/making-email-trustworthy/final" id="pub-title-link-30">Making Email Trustworthy</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-30">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2016/10/making-email-trustworthy/final" class="mobile-pub-title" id="pub-title-link-sm-30">Making Email Trustworthy</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-30">10/24/2016</strong> <br/> Status: <span id="pub-status-sm-30">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-30"> <span id="download-value-30-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2016-10.pdf">October 2016 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-30"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-30"> 10/24/2016 </td> </tr> <tr id="result-31"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-31">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-31"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2016/09/demystifying-the-internet-of-things/final" id="pub-title-link-31">Demystifying the Internet of Things</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-31">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2016/09/demystifying-the-internet-of-things/final" class="mobile-pub-title" id="pub-title-link-sm-31">Demystifying the Internet of Things</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-31">9/23/2016</strong> <br/> Status: <span id="pub-status-sm-31">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-31"> <span id="download-value-31-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2016-09.pdf">September 2016 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-31"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-31"> 9/23/2016 </td> </tr> <tr id="result-32"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-32">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-32"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2016/08/nist-updates-piv-guidelines/final" id="pub-title-link-32">NIST Updates Personal Identity Verification (PIV) Guidelines</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-32">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2016/08/nist-updates-piv-guidelines/final" class="mobile-pub-title" id="pub-title-link-sm-32">NIST Updates Personal Identity Verification (PIV) Guidelines</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-32">8/09/2016</strong> <br/> Status: <span id="pub-status-sm-32">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-32"> <span id="download-value-32-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2016-08.pdf">August 2016 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-32"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-32"> 8/09/2016 </td> </tr> <tr id="result-33"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-33">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-33"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2016/07/improving-security--software-management-using-swid-tags/final" id="pub-title-link-33">Improving Security and Software Management Through the Use of SWID Tags</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-33">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2016/07/improving-security--software-management-using-swid-tags/final" class="mobile-pub-title" id="pub-title-link-sm-33">Improving Security and Software Management Through the Use of SWID Tags</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-33">7/13/2016</strong> <br/> Status: <span id="pub-status-sm-33">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-33"> <span id="download-value-33-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2016-07.pdf">July 2016 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-33"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-33"> 7/13/2016 </td> </tr> <tr id="result-34"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-34">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-34"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2016/06/extending-network-security-into-virtualized-infrastructure/final" id="pub-title-link-34">Extending Network Security into Virtualized Infrastructure</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-34">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2016/06/extending-network-security-into-virtualized-infrastructure/final" class="mobile-pub-title" id="pub-title-link-sm-34">Extending Network Security into Virtualized Infrastructure</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-34">6/03/2016</strong> <br/> Status: <span id="pub-status-sm-34">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-34"> <span id="download-value-34-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2016-06.pdf">June 2016 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-34"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-34"> 6/03/2016 </td> </tr> <tr id="result-35"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-35">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-35"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2016/05/combinatorial-testing-for-cybersecurity-and-reliability/final" id="pub-title-link-35">Combinatorial Testing for Cybersecurity and Reliability</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-35">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2016/05/combinatorial-testing-for-cybersecurity-and-reliability/final" class="mobile-pub-title" id="pub-title-link-sm-35">Combinatorial Testing for Cybersecurity and Reliability</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-35">5/12/2016</strong> <br/> Status: <span id="pub-status-sm-35">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-35"> <span id="download-value-35-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2016-05.pdf">May 2016 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-35"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-35"> 5/12/2016 </td> </tr> <tr id="result-36"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-36">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-36"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2016/04/new-nist-security-standard-can-protect-credit-cards-health-info/final" id="pub-title-link-36">New NIST Security Standard Can Protect Credit Cards, Health Information</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-36">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2016/04/new-nist-security-standard-can-protect-credit-cards-health-info/final" class="mobile-pub-title" id="pub-title-link-sm-36">New NIST Security Standard Can Protect Credit Cards, Health Information</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-36">4/14/2016</strong> <br/> Status: <span id="pub-status-sm-36">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-36"> <span id="download-value-36-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2016-04.pdf">April 2016 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-36"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-36"> 4/14/2016 </td> </tr> <tr id="result-37"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-37">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-37"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2016/03/updates-to-the-nist-scap-validation-program-and-associated-test-/final" id="pub-title-link-37">Updates to the NIST SCAP Validation Program and Associated Test Requirements</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-37">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2016/03/updates-to-the-nist-scap-validation-program-and-associated-test-/final" class="mobile-pub-title" id="pub-title-link-sm-37">Updates to the NIST SCAP Validation Program and Associated Test Requirements</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-37">3/15/2016</strong> <br/> Status: <span id="pub-status-sm-37">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-37"> <span id="download-value-37-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2016-03.pdf">March 2016 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-37"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-37"> 3/15/2016 </td> </tr> <tr id="result-38"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-38">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-38"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2016/02/implementting-trusted-geolocation-services-in-the-cloud/final" id="pub-title-link-38">Implementing Trusted Geolocation Services in the Cloud</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-38">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2016/02/implementting-trusted-geolocation-services-in-the-cloud/final" class="mobile-pub-title" id="pub-title-link-sm-38">Implementing Trusted Geolocation Services in the Cloud</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-38">2/17/2016</strong> <br/> Status: <span id="pub-status-sm-38">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-38"> <span id="download-value-38-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2016-02.pdf">February 2016 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-38"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-38"> 2/17/2016 </td> </tr> <tr id="result-39"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-39">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-39"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2016/01/securing-interactive-and-automated-access-management-using-secur/final" id="pub-title-link-39">Securing Interactive and Automated Access Management Using Secure Shell (SSH)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-39">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2016/01/securing-interactive-and-automated-access-management-using-secur/final" class="mobile-pub-title" id="pub-title-link-sm-39">Securing Interactive and Automated Access Management Using Secure Shell (SSH)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-39">1/11/2016</strong> <br/> Status: <span id="pub-status-sm-39">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-39"> <span id="download-value-39-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2016-01.pdf">January 2016 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-39"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-39"> 1/11/2016 </td> </tr> <tr id="result-40"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-40">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-40"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2015/12/stopping-malware-and-unauthorized-software-through-application-w/final" id="pub-title-link-40">Stopping Malware and Unauthorized Software through Application Whitelisting</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-40">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2015/12/stopping-malware-and-unauthorized-software-through-application-w/final" class="mobile-pub-title" id="pub-title-link-sm-40">Stopping Malware and Unauthorized Software through Application Whitelisting</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-40">12/15/2015</strong> <br/> Status: <span id="pub-status-sm-40">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-40"> <span id="download-value-40-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2015-12.pdf">December 2015 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-40"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-40"> 12/15/2015 </td> </tr> <tr id="result-41"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-41">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-41"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2015/11/tailoring-security-controls-for-industrial-control-systems/final" id="pub-title-link-41">Tailoring Security Controls for Industrial Control Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-41">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2015/11/tailoring-security-controls-for-industrial-control-systems/final" class="mobile-pub-title" id="pub-title-link-sm-41">Tailoring Security Controls for Industrial Control Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-41">11/16/2015</strong> <br/> Status: <span id="pub-status-sm-41">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-41"> <span id="download-value-41-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2015-11.pdf">November 2015 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-41"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-41"> 11/16/2015 </td> </tr> <tr id="result-42"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-42">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-42"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2015/10/protection-of-controlled-unclassified-information/final" id="pub-title-link-42">Protection of Controlled Unclassified Information</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-42">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2015/10/protection-of-controlled-unclassified-information/final" class="mobile-pub-title" id="pub-title-link-sm-42">Protection of Controlled Unclassified Information</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-42">10/19/2015</strong> <br/> Status: <span id="pub-status-sm-42">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-42"> <span id="download-value-42-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2015-10.pdf">October 2015 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-42"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-42"> 10/19/2015 </td> </tr> <tr id="result-43"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-43">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-43"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2015/09/additional-secure-hash-algorithm-standards-offer-new-opportuniti/final" id="pub-title-link-43">Additional Secure Hash Algorithm Standards Offer New Opportunities for Data Protection</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-43">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2015/09/additional-secure-hash-algorithm-standards-offer-new-opportuniti/final" class="mobile-pub-title" id="pub-title-link-sm-43">Additional Secure Hash Algorithm Standards Offer New Opportunities for Data Protection</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-43">9/24/2015</strong> <br/> Status: <span id="pub-status-sm-43">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-43"> <span id="download-value-43-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2015-09.pdf">September 2015 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-43"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-43"> 9/24/2015 </td> </tr> <tr id="result-44"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-44">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-44"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2015/08/recommendation-for-random-number-generation-using-deterministic-/final" id="pub-title-link-44">Recommendation for Random Number Generation Using Deterministic Random Bit Generators</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-44">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2015/08/recommendation-for-random-number-generation-using-deterministic-/final" class="mobile-pub-title" id="pub-title-link-sm-44">Recommendation for Random Number Generation Using Deterministic Random Bit Generators</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-44">8/13/2015</strong> <br/> Status: <span id="pub-status-sm-44">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-44"> <span id="download-value-44-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2015-08.pdf">August 2015 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-44"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-44"> 8/13/2015 </td> </tr> <tr id="result-45"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-45">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-45"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2015/07/improved-security-and-mobility-through-updated-interfaces-for-pi/final" id="pub-title-link-45">Improved Security and Mobility Through Updated Interfaces for PIV Cards</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-45">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2015/07/improved-security-and-mobility-through-updated-interfaces-for-pi/final" class="mobile-pub-title" id="pub-title-link-sm-45">Improved Security and Mobility Through Updated Interfaces for PIV Cards</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-45">7/21/2015</strong> <br/> Status: <span id="pub-status-sm-45">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-45"> <span id="download-value-45-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2015-07.pdf">July 2015 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-45"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-45"> 7/21/2015 </td> </tr> <tr id="result-46"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-46">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-46"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2015/06/increasing-visibility-and-control-of-your-ict-supply-chain/final" id="pub-title-link-46">Increasing Visibility and Control of Your ICT Supply Chains</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-46">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2015/06/increasing-visibility-and-control-of-your-ict-supply-chain/final" class="mobile-pub-title" id="pub-title-link-sm-46">Increasing Visibility and Control of Your ICT Supply Chains</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-46">6/15/2015</strong> <br/> Status: <span id="pub-status-sm-46">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-46"> <span id="download-value-46-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2015-06.pdf">June 2015 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-46"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-46"> 6/15/2015 </td> </tr> <tr id="result-47"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-47">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-47"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2015/05/authentication-considerations-for-public-safety-mobile-networks/final" id="pub-title-link-47">Authentication Considerations for Public Safety Mobile Networks</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-47">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2015/05/authentication-considerations-for-public-safety-mobile-networks/final" class="mobile-pub-title" id="pub-title-link-sm-47">Authentication Considerations for Public Safety Mobile Networks</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-47">5/14/2015</strong> <br/> Status: <span id="pub-status-sm-47">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-47"> <span id="download-value-47-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2015-05.pdf">May 2015 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-47"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-47"> 5/14/2015 </td> </tr> <tr id="result-48"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-48">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-48"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2015/04/is-your-replication-device-making-an-extra-copy-for-someone-else/final" id="pub-title-link-48">Is Your Replication Device Making An Extra Copy For Someone Else?</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-48">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2015/04/is-your-replication-device-making-an-extra-copy-for-someone-else/final" class="mobile-pub-title" id="pub-title-link-sm-48">Is Your Replication Device Making An Extra Copy For Someone Else?</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-48">4/16/2015</strong> <br/> Status: <span id="pub-status-sm-48">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-48"> <span id="download-value-48-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2015-04.pdf">April 2015 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-48"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-48"> 4/16/2015 </td> </tr> <tr id="result-49"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-49">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-49"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2015/03/guidance-for-secure-authorization-of-mobile-applications-in-the-/final" id="pub-title-link-49">Guidance for Secure Authorization of Mobile Applications in the Corporate Environment</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-49">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2015/03/guidance-for-secure-authorization-of-mobile-applications-in-the-/final" class="mobile-pub-title" id="pub-title-link-sm-49">Guidance for Secure Authorization of Mobile Applications in the Corporate Environment</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-49">3/19/2015</strong> <br/> Status: <span id="pub-status-sm-49">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-49"> <span id="download-value-49-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2015-03.pdf">March 2015 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-49"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-49"> 3/19/2015 </td> </tr> <tr id="result-50"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-50">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-50"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2015/02/nist-special-publication-800-88-revision-1-guidelines-for-media/final" id="pub-title-link-50">NIST Special Publication 800-88 Revision 1, Guidelines for Media Sanitization</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-50">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2015/02/nist-special-publication-800-88-revision-1-guidelines-for-media/final" class="mobile-pub-title" id="pub-title-link-sm-50">NIST Special Publication 800-88 Revision 1, Guidelines for Media Sanitization</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-50">2/05/2015</strong> <br/> Status: <span id="pub-status-sm-50">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-50"> <span id="download-value-50-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2015-02.pdf">February 2015 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-50"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-50"> 2/05/2015 </td> </tr> <tr id="result-51"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-51">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-51"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2015/01/release-of-nist-special-publication-800-53a-revision-4-assessi/final" id="pub-title-link-51">Release of NIST Special Publication 800-53A, Revision 4, Assessing Security and Privacy Controls in Federal Information Systems and Organizations</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-51">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2015/01/release-of-nist-special-publication-800-53a-revision-4-assessi/final" class="mobile-pub-title" id="pub-title-link-sm-51">Release of NIST Special Publication 800-53A, Revision 4, Assessing Security and Privacy Controls in Federal Information Systems and Organizations</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-51">1/29/2015</strong> <br/> Status: <span id="pub-status-sm-51">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-51"> <span id="download-value-51-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2015-01.pdf">January 2015 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-51"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-51"> 1/29/2015 </td> </tr> <tr id="result-52"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-52">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-52"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2014/12/release-of-nist-special-publication-800-157-guidelines-for-deri/final" id="pub-title-link-52">Release Of NIST Special Publication 800-157, Guidelines For Derived Personal Identity Verification (PIV) Credentials</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-52">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2014/12/release-of-nist-special-publication-800-157-guidelines-for-deri/final" class="mobile-pub-title" id="pub-title-link-sm-52">Release Of NIST Special Publication 800-157, Guidelines For Derived Personal Identity Verification (PIV) Credentials</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-52">12/30/2014</strong> <br/> Status: <span id="pub-status-sm-52">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-52"> <span id="download-value-52-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2014-12.pdf">December 2014 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-52"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-52"> 12/30/2014 </td> </tr> <tr id="result-53"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-53">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-53"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2014/12/cryptographic-module-validation-program-cmvp/final" id="pub-title-link-53">Cryptographic Module Validation Program (CMVP)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-53">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2014/12/cryptographic-module-validation-program-cmvp/final" class="mobile-pub-title" id="pub-title-link-sm-53">Cryptographic Module Validation Program (CMVP)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-53">12/01/2014</strong> <br/> Status: <span id="pub-status-sm-53">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-53"> <span id="download-value-53-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2014-11.pdf">November 2014 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-53"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-53"> 12/01/2014 </td> </tr> <tr id="result-54"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-54">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-54"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2014/10/release-of-nist-sp-800-147b-bios-protection-guidelines-for-serv/final" id="pub-title-link-54">Release of NIST Special Publication 800-147B, BIOS Protection Guidelines for Servers</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-54">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2014/10/release-of-nist-sp-800-147b-bios-protection-guidelines-for-serv/final" class="mobile-pub-title" id="pub-title-link-sm-54">Release of NIST Special Publication 800-147B, BIOS Protection Guidelines for Servers</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-54">10/29/2014</strong> <br/> Status: <span id="pub-status-sm-54">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-54"> <span id="download-value-54-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2014-10.pdf">October 2014 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-54"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-54"> 10/29/2014 </td> </tr> <tr id="result-55"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-55">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-55"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2014/09/release-of-nist-interagency-report-7628-revision-1-guidelines-f/final" id="pub-title-link-55">Release of NIST Interagency Report 7628 Revision 1, Guidelines for Smart Grid Cybersecurity</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-55">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2014/09/release-of-nist-interagency-report-7628-revision-1-guidelines-f/final" class="mobile-pub-title" id="pub-title-link-sm-55">Release of NIST Interagency Report 7628 Revision 1, Guidelines for Smart Grid Cybersecurity</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-55">9/29/2014</strong> <br/> Status: <span id="pub-status-sm-55">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-55"> <span id="download-value-55-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2014-09.pdf">September 2014 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-55"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-55"> 9/29/2014 </td> </tr> <tr id="result-56"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-56">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-56"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2014/08/policy-machine-towards-a-general-purpose-enterprise-wide-opera/final" id="pub-title-link-56">Policy Machine: Towards a General-Purpose Enterprise-Wide Operating Environment</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-56">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2014/08/policy-machine-towards-a-general-purpose-enterprise-wide-opera/final" class="mobile-pub-title" id="pub-title-link-sm-56">Policy Machine: Towards a General-Purpose Enterprise-Wide Operating Environment</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-56">8/28/2014</strong> <br/> Status: <span id="pub-status-sm-56">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-56"> <span id="download-value-56-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2014-08.pdf">August 2014 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-56"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-56"> 8/28/2014 </td> </tr> <tr id="result-57"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-57">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-57"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2014/07/release-of-nist-interagency-report-7946-cvss-implementation-gui/final" id="pub-title-link-57">Release of NIST Interagency Report 7946, CVSS Implementation Guidance</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-57">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2014/07/release-of-nist-interagency-report-7946-cvss-implementation-gui/final" class="mobile-pub-title" id="pub-title-link-sm-57">Release of NIST Interagency Report 7946, CVSS Implementation Guidance</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-57">7/10/2014</strong> <br/> Status: <span id="pub-status-sm-57">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-57"> <span id="download-value-57-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2014-07.pdf">July 2014 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-57"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-57"> 7/10/2014 </td> </tr> <tr id="result-58"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-58">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-58"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2014/06/itl-forensic-science-program/final" id="pub-title-link-58">ITL Forensic Science Program</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-58">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2014/06/itl-forensic-science-program/final" class="mobile-pub-title" id="pub-title-link-sm-58">ITL Forensic Science Program</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-58">6/05/2014</strong> <br/> Status: <span id="pub-status-sm-58">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-58"> <span id="download-value-58-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2014-06.pdf">June 2014 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-58"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-58"> 6/05/2014 </td> </tr> <tr id="result-59"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-59">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-59"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2014/05/small-and-medium-size-business-information-security-outreach-pro/final" id="pub-title-link-59">Small and Medium-Size Business Information Security Outreach Program</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-59">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2014/05/small-and-medium-size-business-information-security-outreach-pro/final" class="mobile-pub-title" id="pub-title-link-sm-59">Small and Medium-Size Business Information Security Outreach Program</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-59">5/13/2014</strong> <br/> Status: <span id="pub-status-sm-59">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-59"> <span id="download-value-59-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2014-05.pdf">May 2014 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-59"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-59"> 5/13/2014 </td> </tr> <tr id="result-60"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-60">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-60"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2014/03/attribute-based-access-control-abac-definition-and-considerati/final" id="pub-title-link-60">Attribute Based Access Control (ABAC) Definition and Considerations</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-60">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2014/03/attribute-based-access-control-abac-definition-and-considerati/final" class="mobile-pub-title" id="pub-title-link-sm-60">Attribute Based Access Control (ABAC) Definition and Considerations</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-60">3/07/2014</strong> <br/> Status: <span id="pub-status-sm-60">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-60"> <span id="download-value-60-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2014-03.pdf">March 2014 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-60"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-60"> 3/07/2014 </td> </tr> <tr id="result-61"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-61">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-61"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2014/02/framework-for-improving-critical-infrastructure-cybersecurity/final" id="pub-title-link-61">Framework for Improving Critical Infrastructure Cybersecurity</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-61">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2014/02/framework-for-improving-critical-infrastructure-cybersecurity/final" class="mobile-pub-title" id="pub-title-link-sm-61">Framework for Improving Critical Infrastructure Cybersecurity</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-61">2/19/2014</strong> <br/> Status: <span id="pub-status-sm-61">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-61"> <span id="download-value-61-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2014-02.pdf">February 2014 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-61"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-61"> 2/19/2014 </td> </tr> <tr id="result-62"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-62">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-62"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2014/01/a-profile-of-the-key-management-framework-for-the-federal-govern/final" id="pub-title-link-62">A Profile of the Key Management Framework for the Federal Government</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-62">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2014/01/a-profile-of-the-key-management-framework-for-the-federal-govern/final" class="mobile-pub-title" id="pub-title-link-sm-62">A Profile of the Key Management Framework for the Federal Government</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-62">1/09/2014</strong> <br/> Status: <span id="pub-status-sm-62">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-62"> <span id="download-value-62-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2014-01.pdf">January 2014 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-62"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-62"> 1/09/2014 </td> </tr> <tr id="result-63"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-63">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-63"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2013/12/the-national-vulnerability-database-nvd-overview/final" id="pub-title-link-63">The National Vulnerability Database (NVD): Overview</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-63">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2013/12/the-national-vulnerability-database-nvd-overview/final" class="mobile-pub-title" id="pub-title-link-sm-63">The National Vulnerability Database (NVD): Overview</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-63">12/18/2013</strong> <br/> Status: <span id="pub-status-sm-63">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-63"> <span id="download-value-63-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2013-12.pdf">December 2013 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-63"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-63"> 12/18/2013 </td> </tr> <tr id="result-64"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-64">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-64"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2013/11/itl-releases-preliminary-cybersecurity-framework/final" id="pub-title-link-64">ITL Releases Preliminary Cybersecurity Framework</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-64">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2013/11/itl-releases-preliminary-cybersecurity-framework/final" class="mobile-pub-title" id="pub-title-link-sm-64">ITL Releases Preliminary Cybersecurity Framework</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-64">11/04/2013</strong> <br/> Status: <span id="pub-status-sm-64">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-64"> <span id="download-value-64-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2013-11.pdf">November 2013 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-64"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-64"> 11/04/2013 </td> </tr> <tr id="result-65"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-65">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-65"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2013/10/itl-updates-federal-information-processing-standard-fips-for-p/final" id="pub-title-link-65">ITL Updates Federal Information Processing Standard (FIPS) for Personal Identity Verification (PIV) of Federal Employees and Contractors</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-65">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2013/10/itl-updates-federal-information-processing-standard-fips-for-p/final" class="mobile-pub-title" id="pub-title-link-sm-65">ITL Updates Federal Information Processing Standard (FIPS) for Personal Identity Verification (PIV) of Federal Employees and Contractors</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-65">10/22/2013</strong> <br/> Status: <span id="pub-status-sm-65">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-65"> <span id="download-value-65-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2013-10.pdf">October 2013 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-65"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-65"> 10/22/2013 </td> </tr> <tr id="result-66"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-66">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-66"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2013/09/nist-opens-draft-special-publication-800-90a-recommendation-for/final" id="pub-title-link-66">NIST Opens Draft Special Publication 800-90A, Recommendation for Random Number Generation Using Deterministic Random Bit Generators, For Review and Comment (Supplemental ITL Bulletin for September 2013)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-66">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2013/09/nist-opens-draft-special-publication-800-90a-recommendation-for/final" class="mobile-pub-title" id="pub-title-link-sm-66">NIST Opens Draft Special Publication 800-90A, Recommendation for Random Number Generation Using Deterministic Random Bit Generators, For Review and Comment (Supplemental ITL Bulletin for September 2013)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-66">9/09/2013</strong> <br/> Status: <span id="pub-status-sm-66">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-66"> <span id="download-value-66-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2013-09-supplemental.pdf">Sep 2013 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-66"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-66"> 9/09/2013 </td> </tr> <tr id="result-67"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-67">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-67"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2013/08/itl-publishes-guidance-on-preventing-and-handling-malware-incide/final" id="pub-title-link-67">ITL Publishes Guidance on Preventing and Handling Malware Incidents</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-67">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2013/08/itl-publishes-guidance-on-preventing-and-handling-malware-incide/final" class="mobile-pub-title" id="pub-title-link-sm-67">ITL Publishes Guidance on Preventing and Handling Malware Incidents</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-67">8/22/2013</strong> <br/> Status: <span id="pub-status-sm-67">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-67"> <span id="download-value-67-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2013-09.pdf">September 2013 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-67"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-67"> 8/22/2013 </td> </tr> <tr id="result-68"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-68">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-68"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2013/08/itl-publishes-guidance-on-enterprise-patch-management-technologi/final" id="pub-title-link-68">ITL Publishes Guidance on Enterprise Patch Management Technologies</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-68">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2013/08/itl-publishes-guidance-on-enterprise-patch-management-technologi/final" class="mobile-pub-title" id="pub-title-link-sm-68">ITL Publishes Guidance on Enterprise Patch Management Technologies</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-68">8/08/2013</strong> <br/> Status: <span id="pub-status-sm-68">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-68"> <span id="download-value-68-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2013-08.pdf">August 2013 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-68"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-68"> 8/08/2013 </td> </tr> <tr id="result-69"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-69">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-69"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2013/07/itl-issues-guidelines-for-managing-the-security-of-mobile-device/final" id="pub-title-link-69">ITL Issues Guidelines for Managing the Security of Mobile Devices</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-69">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2013/07/itl-issues-guidelines-for-managing-the-security-of-mobile-device/final" class="mobile-pub-title" id="pub-title-link-sm-69">ITL Issues Guidelines for Managing the Security of Mobile Devices</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-69">7/15/2013</strong> <br/> Status: <span id="pub-status-sm-69">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-69"> <span id="download-value-69-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2013-07.pdf">July 2013 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-69"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-69"> 7/15/2013 </td> </tr> <tr id="result-70"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-70">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-70"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2013/05/itl-publishes-security-and-privacy-controls-for-federal-agencies/final" id="pub-title-link-70">ITL Publishes Security And Privacy Controls For Federal Agencies</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-70">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2013/05/itl-publishes-security-and-privacy-controls-for-federal-agencies/final" class="mobile-pub-title" id="pub-title-link-sm-70">ITL Publishes Security And Privacy Controls For Federal Agencies</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-70">5/01/2013</strong> <br/> Status: <span id="pub-status-sm-70">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-70"> <span id="download-value-70-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2013-05.pdf">May 2013 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-70"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-70"> 5/01/2013 </td> </tr> <tr id="result-71"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-71">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-71"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2013/04/security-content-automation-protocol-scap-version-12-validati/final" id="pub-title-link-71">Security Content Automation Protocol (SCAP) Version 1.2 Validation Program Test Requirements</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-71">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2013/04/security-content-automation-protocol-scap-version-12-validati/final" class="mobile-pub-title" id="pub-title-link-sm-71">Security Content Automation Protocol (SCAP) Version 1.2 Validation Program Test Requirements</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-71">4/10/2013</strong> <br/> Status: <span id="pub-status-sm-71">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-71"> <span id="download-value-71-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2013-04.pdf">April 2013 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-71"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-71"> 4/10/2013 </td> </tr> <tr id="result-72"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-72">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-72"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2013/03/nist-to-develop-a-cybersecurity-framework-to-protect-critical-in/final" id="pub-title-link-72">NIST to Develop a Cybersecurity Framework to Protect Critical Infrastructure</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-72">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2013/03/nist-to-develop-a-cybersecurity-framework-to-protect-critical-in/final" class="mobile-pub-title" id="pub-title-link-sm-72">NIST to Develop a Cybersecurity Framework to Protect Critical Infrastructure</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-72">3/21/2013</strong> <br/> Status: <span id="pub-status-sm-72">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-72"> <span id="download-value-72-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2013-03.pdf">March 2013 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-72"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-72"> 3/21/2013 </td> </tr> <tr id="result-73"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-73">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-73"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2013/01/managing-identity-requirements-for-remote-users-of-information-s/final" id="pub-title-link-73">Managing Identity Requirements for Remote Users of Information Systems to Protect System Security and Information Privacy</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-73">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2013/01/managing-identity-requirements-for-remote-users-of-information-s/final" class="mobile-pub-title" id="pub-title-link-sm-73">Managing Identity Requirements for Remote Users of Information Systems to Protect System Security and Information Privacy</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-73">1/29/2013</strong> <br/> Status: <span id="pub-status-sm-73">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-73"> <span id="download-value-73-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2013-01.pdf">January 2013 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-73"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-73"> 1/29/2013 </td> </tr> <tr id="result-74"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-74">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-74"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2012/12/generating-secure-cryptographic-keys-a-critical-component-of-cr/final" id="pub-title-link-74">Generating Secure Cryptographic Keys: A Critical Component of Cryptographic Key Management and the Protection of Sensitive Information</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-74">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2012/12/generating-secure-cryptographic-keys-a-critical-component-of-cr/final" class="mobile-pub-title" id="pub-title-link-sm-74">Generating Secure Cryptographic Keys: A Critical Component of Cryptographic Key Management and the Protection of Sensitive Information</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-74">12/19/2012</strong> <br/> Status: <span id="pub-status-sm-74">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-74"> <span id="download-value-74-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2012-12.pdf">December 2012 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-74"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-74"> 12/19/2012 </td> </tr> <tr id="result-75"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-75">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-75"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2012/11/practices-for-managing-supply-chain-risks-to-protect-federal-inf/final" id="pub-title-link-75">Practices for Managing Supply Chain Risks to Protect Federal Information Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-75">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2012/11/practices-for-managing-supply-chain-risks-to-protect-federal-inf/final" class="mobile-pub-title" id="pub-title-link-sm-75">Practices for Managing Supply Chain Risks to Protect Federal Information Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-75">11/27/2012</strong> <br/> Status: <span id="pub-status-sm-75">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-75"> <span id="download-value-75-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2012-11.pdf">November 2012 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-75"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-75"> 11/27/2012 </td> </tr> <tr id="result-76"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-76">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-76"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2012/10/conducting-information-security-related-risk-assessments--updat/final" id="pub-title-link-76">Conducting Information Security-Related Risk Assessments: Updated Guidelines for Comprehensive Risk Management Programs</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-76">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2012/10/conducting-information-security-related-risk-assessments--updat/final" class="mobile-pub-title" id="pub-title-link-sm-76">Conducting Information Security-Related Risk Assessments: Updated Guidelines for Comprehensive Risk Management Programs</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-76">10/25/2012</strong> <br/> Status: <span id="pub-status-sm-76">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-76"> <span id="download-value-76-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2012-10.pdf">October 2012 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-76"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-76"> 10/25/2012 </td> </tr> <tr id="result-77"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-77">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-77"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2012/09/revised-guide-helps-organizations-handle-security-related-incide/final" id="pub-title-link-77">Revised Guide Helps Organizations Handle Security Related Incidents</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-77">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2012/09/revised-guide-helps-organizations-handle-security-related-incide/final" class="mobile-pub-title" id="pub-title-link-sm-77">Revised Guide Helps Organizations Handle Security Related Incidents</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-77">9/27/2012</strong> <br/> Status: <span id="pub-status-sm-77">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-77"> <span id="download-value-77-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2012-09.pdf">September 2012 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-77"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-77"> 9/27/2012 </td> </tr> <tr id="result-78"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-78">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-78"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2012/08/security-of-bluetooth-systems-and-devices-updated-guide-issued-/final" id="pub-title-link-78">Security of Bluetooth Systems and Devices: Updated Guide Issued by the National Institute of Standards and Technology (NIST)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-78">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2012/08/security-of-bluetooth-systems-and-devices-updated-guide-issued-/final" class="mobile-pub-title" id="pub-title-link-sm-78">Security of Bluetooth Systems and Devices: Updated Guide Issued by the National Institute of Standards and Technology (NIST)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-78">8/13/2012</strong> <br/> Status: <span id="pub-status-sm-78">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-78"> <span id="download-value-78-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2012-08.pdf">August 2012 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-78"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-78"> 8/13/2012 </td> </tr> <tr id="result-79"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-79">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-79"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2012/07/preparing-for-and-responding-to-certification-authority-compromi/final" id="pub-title-link-79">Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-79">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2012/07/preparing-for-and-responding-to-certification-authority-compromi/final" class="mobile-pub-title" id="pub-title-link-sm-79">Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-79">7/10/2012</strong> <br/> Status: <span id="pub-status-sm-79">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-79"> <span id="download-value-79-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2012-07.pdf">July 2012 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-79"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-79"> 7/10/2012 </td> </tr> <tr id="result-80"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-80">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-80"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2012/06/cloud-computing-a-review-of-features-benefits-and-risks-and-/final" id="pub-title-link-80">Cloud Computing: A Review of Features, Benefits, and Risks, and Recommendations for Secure, Efficient Implementations</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-80">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2012/06/cloud-computing-a-review-of-features-benefits-and-risks-and-/final" class="mobile-pub-title" id="pub-title-link-sm-80">Cloud Computing: A Review of Features, Benefits, and Risks, and Recommendations for Secure, Efficient Implementations</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-80">6/27/2012</strong> <br/> Status: <span id="pub-status-sm-80">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-80"> <span id="download-value-80-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2012-06.pdf">June 2012 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-80"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-80"> 6/27/2012 </td> </tr> <tr id="result-81"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-81">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-81"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2012/05/secure-hash-standard-updated-specifications-approved-and-issued/final" id="pub-title-link-81">Secure Hash Standard: Updated Specifications Approved and Issued as Federal Information Processing Standard (FIPS) 180-4</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-81">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2012/05/secure-hash-standard-updated-specifications-approved-and-issued/final" class="mobile-pub-title" id="pub-title-link-sm-81">Secure Hash Standard: Updated Specifications Approved and Issued as Federal Information Processing Standard (FIPS) 180-4</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-81">5/09/2012</strong> <br/> Status: <span id="pub-status-sm-81">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-81"> <span id="download-value-81-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2012-05.pdf">May 2012 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-81"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-81"> 5/09/2012 </td> </tr> <tr id="result-82"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-82">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-82"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2012/03/guidelines-for-improving-security-and-privacy-in-public-cloud-co/final" id="pub-title-link-82">Guidelines for Improving Security and Privacy in Public Cloud Computing</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-82">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2012/03/guidelines-for-improving-security-and-privacy-in-public-cloud-co/final" class="mobile-pub-title" id="pub-title-link-sm-82">Guidelines for Improving Security and Privacy in Public Cloud Computing</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-82">3/28/2012</strong> <br/> Status: <span id="pub-status-sm-82">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-82"> <span id="download-value-82-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2012-03.pdf">March 2012 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-82"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-82"> 3/28/2012 </td> </tr> <tr id="result-83"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-83">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-83"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2012/02/guidelines-for-securing-wireless-local-area-networks-wlans/final" id="pub-title-link-83">Guidelines for Securing Wireless Local Area Networks (WLANs)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-83">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2012/02/guidelines-for-securing-wireless-local-area-networks-wlans/final" class="mobile-pub-title" id="pub-title-link-sm-83">Guidelines for Securing Wireless Local Area Networks (WLANs)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-83">2/27/2012</strong> <br/> Status: <span id="pub-status-sm-83">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-83"> <span id="download-value-83-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2012-02.pdf">February 2012 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-83"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-83"> 2/27/2012 </td> </tr> <tr id="result-84"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-84">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-84"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2012/01/advancing-security-automation-and-standardization--revised-tech/final" id="pub-title-link-84">Advancing Security Automation and Standardization: Revised Technical Specifications Issued for the Security Content Automation Protocol (SCAP)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-84">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2012/01/advancing-security-automation-and-standardization--revised-tech/final" class="mobile-pub-title" id="pub-title-link-sm-84">Advancing Security Automation and Standardization: Revised Technical Specifications Issued for the Security Content Automation Protocol (SCAP)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-84">1/24/2012</strong> <br/> Status: <span id="pub-status-sm-84">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-84"> <span id="download-value-84-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2012-01.pdf">January 2012 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-84"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-84"> 1/24/2012 </td> </tr> <tr id="result-85"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-85">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-85"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2011/12/revised-guideline-for-electronic-authentication-of-users-helps-o/final" id="pub-title-link-85">Revised Guideline for Electronic Authentication of Users Helps Organizations Protect the Security of Their Information Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-85">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2011/12/revised-guideline-for-electronic-authentication-of-users-helps-o/final" class="mobile-pub-title" id="pub-title-link-sm-85">Revised Guideline for Electronic Authentication of Users Helps Organizations Protect the Security of Their Information Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-85">12/22/2011</strong> <br/> Status: <span id="pub-status-sm-85">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-85"> <span id="download-value-85-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2011-12.pdf">December 2011 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-85"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-85"> 12/22/2011 </td> </tr> <tr id="result-86"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-86">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-86"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2011/10/continuous-monitoring-of-information-security-an-essential-comp/final" id="pub-title-link-86">Continuous Monitoring of Information Security: An Essential Component of Risk Management</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-86">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2011/10/continuous-monitoring-of-information-security-an-essential-comp/final" class="mobile-pub-title" id="pub-title-link-sm-86">Continuous Monitoring of Information Security: An Essential Component of Risk Management</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-86">10/25/2011</strong> <br/> Status: <span id="pub-status-sm-86">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-86"> <span id="download-value-86-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2011-10.pdf">October 2011 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-86"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-86"> 10/25/2011 </td> </tr> <tr id="result-87"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-87">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-87"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2011/09/managing-the-configuration-of-information-systems-with-a-focus-o/final" id="pub-title-link-87">Managing the Configuration of Information Systems with a Focus on Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-87">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2011/09/managing-the-configuration-of-information-systems-with-a-focus-o/final" class="mobile-pub-title" id="pub-title-link-sm-87">Managing the Configuration of Information Systems with a Focus on Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-87">9/26/2011</strong> <br/> Status: <span id="pub-status-sm-87">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-87"> <span id="download-value-87-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2011-09.pdf">September 2011 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-87"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-87"> 9/26/2011 </td> </tr> <tr id="result-88"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-88">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-88"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2011/08/protecting-industrial-control-systems-–-key-components-of-our-na/final" id="pub-title-link-88">Protecting Industrial Control Systems – Key Components of Our Nation's Critical Infrastructures</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-88">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2011/08/protecting-industrial-control-systems-–-key-components-of-our-na/final" class="mobile-pub-title" id="pub-title-link-sm-88">Protecting Industrial Control Systems – Key Components of Our Nation's Critical Infrastructures</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-88">8/24/2011</strong> <br/> Status: <span id="pub-status-sm-88">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-88"> <span id="download-value-88-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2011-08.pdf">August 2011 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-88"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-88"> 8/24/2011 </td> </tr> <tr id="result-89"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-89">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-89"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2011/06/guidelines-for-protecting-bios-firmware/final" id="pub-title-link-89">Guidelines for Protecting Basic Input/Output System (BIOS) Firmware</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-89">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2011/06/guidelines-for-protecting-bios-firmware/final" class="mobile-pub-title" id="pub-title-link-sm-89">Guidelines for Protecting Basic Input/Output System (BIOS) Firmware</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-89">6/28/2011</strong> <br/> Status: <span id="pub-status-sm-89">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-89"> <span id="download-value-89-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2011-06.pdf">June 2011 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-89"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-89"> 6/28/2011 </td> </tr> <tr id="result-90"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-90">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-90"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2011/05/using-security-configuration-checklists-and-the-national-checkli/final" id="pub-title-link-90">Using Security Configuration Checklists and the National Checklist Program</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-90">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2011/05/using-security-configuration-checklists-and-the-national-checkli/final" class="mobile-pub-title" id="pub-title-link-sm-90">Using Security Configuration Checklists and the National Checklist Program</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-90">5/25/2011</strong> <br/> Status: <span id="pub-status-sm-90">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-90"> <span id="download-value-90-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2011-05.pdf">May 2011 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-90"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-90"> 5/25/2011 </td> </tr> <tr id="result-91"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-91">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-91"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2011/04/full-virtualization-technologies-guidelines-for-secure-implemen/final" id="pub-title-link-91">Full Virtualization Technologies: Guidelines for Secure Implementation and Management</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-91">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2011/04/full-virtualization-technologies-guidelines-for-secure-implemen/final" class="mobile-pub-title" id="pub-title-link-sm-91">Full Virtualization Technologies: Guidelines for Secure Implementation and Management</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-91">4/25/2011</strong> <br/> Status: <span id="pub-status-sm-91">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-91"> <span id="download-value-91-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2011-04.pdf">April 2011 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-91"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-91"> 4/25/2011 </td> </tr> <tr id="result-92"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-92">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-92"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2011/03/managing-information-security-risk--organization-mission-and-i/final" id="pub-title-link-92">Managing Information Security Risk: Organization, Mission and Information System View</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-92">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2011/03/managing-information-security-risk--organization-mission-and-i/final" class="mobile-pub-title" id="pub-title-link-sm-92">Managing Information Security Risk: Organization, Mission and Information System View</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-92">3/22/2011</strong> <br/> Status: <span id="pub-status-sm-92">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-92"> <span id="download-value-92-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2011-03.pdf">March 2011 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-92"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-92"> 3/22/2011 </td> </tr> <tr id="result-93"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-93">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-93"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2011/01/internet-protocol-version-6-ipv6-nist-guidelines-help-organiz/final" id="pub-title-link-93">Internet Protocol Version 6 (IPv6): NIST Guidelines Help Organizations Manage the Secure Deployment of the New Network Protocol</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-93">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2011/01/internet-protocol-version-6-ipv6-nist-guidelines-help-organiz/final" class="mobile-pub-title" id="pub-title-link-sm-93">Internet Protocol Version 6 (IPv6): NIST Guidelines Help Organizations Manage the Secure Deployment of the New Network Protocol</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-93">1/31/2011</strong> <br/> Status: <span id="pub-status-sm-93">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-93"> <span id="download-value-93-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2011-01.pdf">January 2011 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-93"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-93"> 1/31/2011 </td> </tr> <tr id="result-94"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-94">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-94"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2010/12/securing-wimax-wireless-communications/final" id="pub-title-link-94">Securing WiMAX Wireless Communications</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-94">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2010/12/securing-wimax-wireless-communications/final" class="mobile-pub-title" id="pub-title-link-sm-94">Securing WiMAX Wireless Communications</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-94">12/27/2010</strong> <br/> Status: <span id="pub-status-sm-94">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-94"> <span id="download-value-94-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2010-12.pdf">December 2010 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-94"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-94"> 12/27/2010 </td> </tr> <tr id="result-95"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-95">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-95"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2010/11/the-exchange-of-health-information-designing-a-security-archite/final" id="pub-title-link-95">The Exchange of Health Information: Designing a Security Architecture to Provide Information Security and Privacy</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-95">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2010/11/the-exchange-of-health-information-designing-a-security-archite/final" class="mobile-pub-title" id="pub-title-link-sm-95">The Exchange of Health Information: Designing a Security Architecture to Provide Information Security and Privacy</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-95">11/23/2010</strong> <br/> Status: <span id="pub-status-sm-95">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-95"> <span id="download-value-95-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2010-11.pdf">November 2010 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-95"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-95"> 11/23/2010 </td> </tr> <tr id="result-96"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-96">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-96"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2010/09/security-content-automation-protocol-scap-helping-organizatio/final" id="pub-title-link-96">Security Content Automation Protocol (SCAP): Helping Organizations Maintain and Verify the Security of Their Information Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-96">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2010/09/security-content-automation-protocol-scap-helping-organizatio/final" class="mobile-pub-title" id="pub-title-link-sm-96">Security Content Automation Protocol (SCAP): Helping Organizations Maintain and Verify the Security of Their Information Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-96">9/27/2010</strong> <br/> Status: <span id="pub-status-sm-96">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-96"> <span id="download-value-96-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2010-09.pdf">September 2010 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-96"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-96"> 9/27/2010 </td> </tr> <tr id="result-97"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-97">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-97"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2010/07/contingency-planning-for-information-systems-updated-guide-for-/final" id="pub-title-link-97">Contingency Planning for Information Systems: Updated Guide for Federal Organizations</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-97">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2010/07/contingency-planning-for-information-systems-updated-guide-for-/final" class="mobile-pub-title" id="pub-title-link-sm-97">Contingency Planning for Information Systems: Updated Guide for Federal Organizations</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-97">7/20/2010</strong> <br/> Status: <span id="pub-status-sm-97">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-97"> <span id="download-value-97-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2010-07.pdf">July 2010 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-97"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-97"> 7/20/2010 </td> </tr> <tr id="result-98"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-98">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-98"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2010/06/how-to-identify-personnel-with-significant-responsibilities-for-/final" id="pub-title-link-98">How to Identify Personnel with Significant Responsibilities for Information Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-98">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2010/06/how-to-identify-personnel-with-significant-responsibilities-for-/final" class="mobile-pub-title" id="pub-title-link-sm-98">How to Identify Personnel with Significant Responsibilities for Information Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-98">6/22/2010</strong> <br/> Status: <span id="pub-status-sm-98">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-98"> <span id="download-value-98-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2010-06.pdf">June 2010 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-98"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-98"> 6/22/2010 </td> </tr> <tr id="result-99"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-99">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-99"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2010/04/guide-to-protecting-personally-identifiable-information/final" id="pub-title-link-99">Guide to Protecting Personally Identifiable Information</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-99">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2010/04/guide-to-protecting-personally-identifiable-information/final" class="mobile-pub-title" id="pub-title-link-sm-99">Guide to Protecting Personally Identifiable Information</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-99">4/28/2010</strong> <br/> Status: <span id="pub-status-sm-99">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-99"> <span id="download-value-99-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2010-04.pdf">April 2010 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-99"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-99"> 4/28/2010 </td> </tr> <tr id="result-100"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-100">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-100"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2010/03/revised-guide-helps-federal-organizations-improve-their-risk-man/final" id="pub-title-link-100">Revised Guide Helps Federal Organizations Improve Their Risk Management Practices and Information System Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-100">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2010/03/revised-guide-helps-federal-organizations-improve-their-risk-man/final" class="mobile-pub-title" id="pub-title-link-sm-100">Revised Guide Helps Federal Organizations Improve Their Risk Management Practices and Information System Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-100">3/29/2010</strong> <br/> Status: <span id="pub-status-sm-100">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-100"> <span id="download-value-100-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2010-03.pdf">March 2010 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-100"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-100"> 3/29/2010 </td> </tr> <tr id="result-101"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-101">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-101"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2010/02/secure-management-of-keys-in-cryptographic-applications-guidanc/final" id="pub-title-link-101">Secure Management of Keys in Cryptographic Applications: Guidance for Organizations</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-101">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2010/02/secure-management-of-keys-in-cryptographic-applications-guidanc/final" class="mobile-pub-title" id="pub-title-link-sm-101">Secure Management of Keys in Cryptographic Applications: Guidance for Organizations</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-101">2/24/2010</strong> <br/> Status: <span id="pub-status-sm-101">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-101"> <span id="download-value-101-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2010-02.pdf">February 2010 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-101"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-101"> 2/24/2010 </td> </tr> <tr id="result-102"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-102">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-102"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2010/01/security-metrics-measurements-to-support-the-continued-developm/final" id="pub-title-link-102">Security Metrics: Measurements to Support the Continued Development of Information Security Technology</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-102">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2010/01/security-metrics-measurements-to-support-the-continued-developm/final" class="mobile-pub-title" id="pub-title-link-sm-102">Security Metrics: Measurements to Support the Continued Development of Information Security Technology</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-102">1/27/2010</strong> <br/> Status: <span id="pub-status-sm-102">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-102"> <span id="download-value-102-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2010-01.pdf">January 2010 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-102"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-102"> 1/27/2010 </td> </tr> <tr id="result-103"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-103">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-103"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2009/11/cybersecurity-fundamentals-for-small-business-owners/final" id="pub-title-link-103">Cybersecurity Fundamentals for Small Business Owners</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-103">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2009/11/cybersecurity-fundamentals-for-small-business-owners/final" class="mobile-pub-title" id="pub-title-link-sm-103">Cybersecurity Fundamentals for Small Business Owners</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-103">11/19/2009</strong> <br/> Status: <span id="pub-status-sm-103">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-103"> <span id="download-value-103-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2009-11.pdf">November 2009 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-103"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-103"> 11/19/2009 </td> </tr> <tr id="result-104"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-104">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-104"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2009/10/protecting-information-systems-with-firewalls-revised-guideline/final" id="pub-title-link-104">Protecting Information Systems with Firewalls: Revised Guidelines on Firewall Technologies and Policies</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-104">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2009/10/protecting-information-systems-with-firewalls-revised-guideline/final" class="mobile-pub-title" id="pub-title-link-sm-104">Protecting Information Systems with Firewalls: Revised Guidelines on Firewall Technologies and Policies</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-104">10/29/2009</strong> <br/> Status: <span id="pub-status-sm-104">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-104"> <span id="download-value-104-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2009-10.pdf">October 2009 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-104"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-104"> 10/29/2009 </td> </tr> <tr id="result-105"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-105">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-105"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2009/07/risk-management-framework--helping-organizations-implement-effe/final" id="pub-title-link-105">Risk Management Framework: Helping Organizations Implement Effective Information Security Programs</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-105">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2009/07/risk-management-framework--helping-organizations-implement-effe/final" class="mobile-pub-title" id="pub-title-link-sm-105">Risk Management Framework: Helping Organizations Implement Effective Information Security Programs</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-105">7/23/2009</strong> <br/> Status: <span id="pub-status-sm-105">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-105"> <span id="download-value-105-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2009-07.pdf">July 2009 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-105"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-105"> 7/23/2009 </td> </tr> <tr id="result-106"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-106">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-106"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2009/03/the-cryptographic-hash-algorithm-family-revision-of-the-secure-/final" id="pub-title-link-106">The Cryptographic Hash Algorithm Family: Revision of the Secure Hash Standard and Ongoing Competition for New Hash Algorithms</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-106">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2009/03/the-cryptographic-hash-algorithm-family-revision-of-the-secure-/final" class="mobile-pub-title" id="pub-title-link-sm-106">The Cryptographic Hash Algorithm Family: Revision of the Secure Hash Standard and Ongoing Competition for New Hash Algorithms</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-106">3/25/2009</strong> <br/> Status: <span id="pub-status-sm-106">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-106"> <span id="download-value-106-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2009-03.pdf">March 2009 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-106"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-106"> 3/25/2009 </td> </tr> <tr id="result-107"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-107">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-107"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2009/02/using-personal-identity-verification-piv-credentials-in-physic/final" id="pub-title-link-107">Using Personal Identity Verification (Piv) Credentials in Physical Access Control Systems (PACS)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-107">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2009/02/using-personal-identity-verification-piv-credentials-in-physic/final" class="mobile-pub-title" id="pub-title-link-sm-107">Using Personal Identity Verification (Piv) Credentials in Physical Access Control Systems (PACS)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-107">2/26/2009</strong> <br/> Status: <span id="pub-status-sm-107">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-107"> <span id="download-value-107-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2009-02.pdf">February 2009 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-107"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-107"> 2/26/2009 </td> </tr> <tr id="result-108"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-108">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-108"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2008/12/guide-to-information-security-testing-and-assessment/final" id="pub-title-link-108">Guide to Information Security Testing and Assessment</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-108">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2008/12/guide-to-information-security-testing-and-assessment/final" class="mobile-pub-title" id="pub-title-link-sm-108">Guide to Information Security Testing and Assessment</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-108">12/18/2008</strong> <br/> Status: <span id="pub-status-sm-108">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-108"> <span id="download-value-108-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2008-12.pdf">December 2008 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-108"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-108"> 12/18/2008 </td> </tr> <tr id="result-109"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-109">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-109"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2008/10/keeping-information-technology-it-system-servers-secure--a-ge/final" id="pub-title-link-109">Keeping Information Technology (IT) System Servers Secure: A General Guide to Good Practices</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-109">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2008/10/keeping-information-technology-it-system-servers-secure--a-ge/final" class="mobile-pub-title" id="pub-title-link-sm-109">Keeping Information Technology (IT) System Servers Secure: A General Guide to Good Practices</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-109">10/15/2008</strong> <br/> Status: <span id="pub-status-sm-109">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-109"> <span id="download-value-109-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2008-10.pdf">October 2008 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-109"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-109"> 10/15/2008 </td> </tr> <tr id="result-110"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-110">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-110"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2008/09/using-performance-measurements-to-evaluate-and-strengthen-inform/final" id="pub-title-link-110">Using Performance Measurements to Evaluate and Strengthen Information System Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-110">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2008/09/using-performance-measurements-to-evaluate-and-strengthen-inform/final" class="mobile-pub-title" id="pub-title-link-sm-110">Using Performance Measurements to Evaluate and Strengthen Information System Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-110">9/18/2008</strong> <br/> Status: <span id="pub-status-sm-110">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-110"> <span id="download-value-110-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2008-09.pdf">September 2008 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-110"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-110"> 9/18/2008 </td> </tr> <tr id="result-111"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-111">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-111"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2008/07/guidelines-on-implementing-a-secure-sockets-layer-ssl-virtual-/final" id="pub-title-link-111">Guidelines on Implementing A Secure Sockets Layer (SSL) Virtual Private Network (VPN)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-111">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2008/07/guidelines-on-implementing-a-secure-sockets-layer-ssl-virtual-/final" class="mobile-pub-title" id="pub-title-link-sm-111">Guidelines on Implementing A Secure Sockets Layer (SSL) Virtual Private Network (VPN)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-111">7/23/2008</strong> <br/> Status: <span id="pub-status-sm-111">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-111"> <span id="download-value-111-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2008-07.pdf">July 2008 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-111"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-111"> 7/23/2008 </td> </tr> <tr id="result-112"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-112">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-112"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2008/05/new-cryptographic-hash-algorithm-family-nist-holds-a-public-com/final" id="pub-title-link-112">New Cryptographic Hash Algorithm Family: NIST Holds a Public Competition to Find New Algorithms</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-112">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2008/05/new-cryptographic-hash-algorithm-family-nist-holds-a-public-com/final" class="mobile-pub-title" id="pub-title-link-sm-112">New Cryptographic Hash Algorithm Family: NIST Holds a Public Competition to Find New Algorithms</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-112">5/28/2008</strong> <br/> Status: <span id="pub-status-sm-112">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-112"> <span id="download-value-112-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2008-05.pdf">May 2008 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-112"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-112"> 5/28/2008 </td> </tr> <tr id="result-113"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-113">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-113"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2008/04/using-active-content-and-mobile-code-and-safeguarding-the-securi/final" id="pub-title-link-113">Using Active Content and Mobile Code and Safeguarding the Security of Information Technology Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-113">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2008/04/using-active-content-and-mobile-code-and-safeguarding-the-securi/final" class="mobile-pub-title" id="pub-title-link-sm-113">Using Active Content and Mobile Code and Safeguarding the Security of Information Technology Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-113">4/24/2008</strong> <br/> Status: <span id="pub-status-sm-113">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-113"> <span id="download-value-113-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2008-04.pdf">April 2008 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-113"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-113"> 4/24/2008 </td> </tr> <tr id="result-114"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-114">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-114"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2008/02/federal-desktop-core-configuration-fdcc-improving-security-fo/final" id="pub-title-link-114">Federal Desktop Core Configuration (FDCC): Improving Security for Windows Desktop Operating Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-114">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2008/02/federal-desktop-core-configuration-fdcc-improving-security-fo/final" class="mobile-pub-title" id="pub-title-link-sm-114">Federal Desktop Core Configuration (FDCC): Improving Security for Windows Desktop Operating Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-114">2/27/2008</strong> <br/> Status: <span id="pub-status-sm-114">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-114"> <span id="download-value-114-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2008-02.pdf">February 2008 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-114"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-114"> 2/27/2008 </td> </tr> <tr id="result-115"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-115">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-115"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2008/01/secure-web-servers-protecting-web-sites-that-are-accessed-by-the/final" id="pub-title-link-115">Secure Web Servers Protecting Web Sites that are Accessed by the Public</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-115">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2008/01/secure-web-servers-protecting-web-sites-that-are-accessed-by-the/final" class="mobile-pub-title" id="pub-title-link-sm-115">Secure Web Servers Protecting Web Sites that are Accessed by the Public</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-115">1/31/2008</strong> <br/> Status: <span id="pub-status-sm-115">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-115"> <span id="download-value-115-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2008-01.pdf">January 2008 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-115"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-115"> 1/31/2008 </td> </tr> <tr id="result-116"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-116">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-116"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2007/11/using-storage-encryption-technologies-to-protect-end-user-device/final" id="pub-title-link-116">Using Storage Encryption Technologies to Protect End User Devices</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-116">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2007/11/using-storage-encryption-technologies-to-protect-end-user-device/final" class="mobile-pub-title" id="pub-title-link-sm-116">Using Storage Encryption Technologies to Protect End User Devices</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-116">11/26/2007</strong> <br/> Status: <span id="pub-status-sm-116">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-116"> <span id="download-value-116-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2007-11.pdf">November 2007 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-116"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-116"> 11/26/2007 </td> </tr> <tr id="result-117"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-117">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-117"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2007/10/the-common-vulnerability-scoring-system-cvss/final" id="pub-title-link-117">The Common Vulnerability Scoring System (CVSS)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-117">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2007/10/the-common-vulnerability-scoring-system-cvss/final" class="mobile-pub-title" id="pub-title-link-sm-117">The Common Vulnerability Scoring System (CVSS)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-117">10/25/2007</strong> <br/> Status: <span id="pub-status-sm-117">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-117"> <span id="download-value-117-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2007-10.pdf">October 2007 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-117"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-117"> 10/25/2007 </td> </tr> <tr id="result-118"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-118">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-118"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2007/08/secure-web-services/final" id="pub-title-link-118">Secure Web Services</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-118">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2007/08/secure-web-services/final" class="mobile-pub-title" id="pub-title-link-sm-118">Secure Web Services</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-118">8/23/2007</strong> <br/> Status: <span id="pub-status-sm-118">Final</span> </div> <div class="control-value-no-block"> Download: <span id="download-values-118">None available</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-118"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-118"> 8/23/2007 </td> </tr> <tr id="result-119"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-119">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-119"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2007/06/forensic-techniques-for-cell-phones/final" id="pub-title-link-119">Forensic Techniques for Cell Phones</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-119">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2007/06/forensic-techniques-for-cell-phones/final" class="mobile-pub-title" id="pub-title-link-sm-119">Forensic Techniques for Cell Phones</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-119">6/27/2007</strong> <br/> Status: <span id="pub-status-sm-119">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-119"> <span id="download-value-119-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2007-06.pdf">June 2007 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-119"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-119"> 6/27/2007 </td> </tr> <tr id="result-120"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-120">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-120"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2007/05/securing-radio-frequency-identification-rfid-systems/final" id="pub-title-link-120">Securing Radio Frequency Identification (RFID) Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-120">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2007/05/securing-radio-frequency-identification-rfid-systems/final" class="mobile-pub-title" id="pub-title-link-sm-120">Securing Radio Frequency Identification (RFID) Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-120">5/17/2007</strong> <br/> Status: <span id="pub-status-sm-120">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-120"> <span id="download-value-120-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2007-05.pdf">May 2007 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-120"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-120"> 5/17/2007 </td> </tr> <tr id="result-121"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-121">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-121"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2007/03/improving-the-security-of-electronic-mail-updated-guidelines/final" id="pub-title-link-121">Improving The Security of Electronic Mail: Updated Guidelines Issued by NIST</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-121">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2007/03/improving-the-security-of-electronic-mail-updated-guidelines/final" class="mobile-pub-title" id="pub-title-link-sm-121">Improving The Security of Electronic Mail: Updated Guidelines Issued by NIST</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-121">3/28/2007</strong> <br/> Status: <span id="pub-status-sm-121">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-121"> <span id="download-value-121-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2007-03.pdf">March 2007 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-121"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-121"> 3/28/2007 </td> </tr> <tr id="result-122"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-122">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-122"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2007/02/intrusion-detection-and-prevention-systems/final" id="pub-title-link-122">Intrusion Detection and Prevention Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-122">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2007/02/intrusion-detection-and-prevention-systems/final" class="mobile-pub-title" id="pub-title-link-sm-122">Intrusion Detection and Prevention Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-122">2/26/2007</strong> <br/> Status: <span id="pub-status-sm-122">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-122"> <span id="download-value-122-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2007-02.pdf">February 2007 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-122"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-122"> 2/26/2007 </td> </tr> <tr id="result-123"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-123">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-123"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2006/12/maintaining-effective-information-technology-it-security-throu/final" id="pub-title-link-123">Maintaining Effective Information Technology (IT) Security Through Test, Training, and Exercise Programs</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-123">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2006/12/maintaining-effective-information-technology-it-security-throu/final" class="mobile-pub-title" id="pub-title-link-sm-123">Maintaining Effective Information Technology (IT) Security Through Test, Training, and Exercise Programs</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-123">12/19/2006</strong> <br/> Status: <span id="pub-status-sm-123">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-123"> <span id="download-value-123-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2006-12.pdf">December 2006 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-123"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-123"> 12/19/2006 </td> </tr> <tr id="result-124"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-124">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-124"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2006/11/guide-to-securing-computers-using-windows-xp-home-edition/final" id="pub-title-link-124">Guide to Securing Computers Using Windows XP Home Edition</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-124">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2006/11/guide-to-securing-computers-using-windows-xp-home-edition/final" class="mobile-pub-title" id="pub-title-link-sm-124">Guide to Securing Computers Using Windows XP Home Edition</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-124">11/22/2006</strong> <br/> Status: <span id="pub-status-sm-124">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-124"> <span id="download-value-124-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2006-11.pdf">November 2006 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-124"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-124"> 11/22/2006 </td> </tr> <tr id="result-125"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-125">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-125"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2006/10/log-management-using-computer-and-network-records-to-improve-in/final" id="pub-title-link-125">Log Management: Using Computer and Network Records to Improve Information Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-125">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2006/10/log-management-using-computer-and-network-records-to-improve-in/final" class="mobile-pub-title" id="pub-title-link-sm-125">Log Management: Using Computer and Network Records to Improve Information Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-125">10/25/2006</strong> <br/> Status: <span id="pub-status-sm-125">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-125"> <span id="download-value-125-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2006-10.pdf">October 2006 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-125"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-125"> 10/25/2006 </td> </tr> <tr id="result-126"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-126">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-126"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2006/09/forensic-techniques-helping-organizations-improve-their-respons/final" id="pub-title-link-126">Forensic Techniques: Helping Organizations Improve Their Responses to Information Security Incidents</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-126">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2006/09/forensic-techniques-helping-organizations-improve-their-respons/final" class="mobile-pub-title" id="pub-title-link-sm-126">Forensic Techniques: Helping Organizations Improve Their Responses to Information Security Incidents</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-126">9/27/2006</strong> <br/> Status: <span id="pub-status-sm-126">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-126"> <span id="download-value-126-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2006-09.pdf">September 2006 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-126"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-126"> 9/27/2006 </td> </tr> <tr id="result-127"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-127">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-127"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2006/08/protecting-sensitive-information-processed-and-stored-in-informa/final" id="pub-title-link-127">Protecting Sensitive Information Processed and Stored in Information Technology (IT) Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-127">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2006/08/protecting-sensitive-information-processed-and-stored-in-informa/final" class="mobile-pub-title" id="pub-title-link-sm-127">Protecting Sensitive Information Processed and Stored in Information Technology (IT) Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-127">8/30/2006</strong> <br/> Status: <span id="pub-status-sm-127">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-127"> <span id="download-value-127-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2006-08.pdf">August 2006 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-127"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-127"> 8/30/2006 </td> </tr> <tr id="result-128"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-128">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-128"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2006/04/protecting-sensitive-information-transmitted-in-public-networks/final" id="pub-title-link-128">Protecting Sensitive Information Transmitted in Public Networks</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-128">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2006/04/protecting-sensitive-information-transmitted-in-public-networks/final" class="mobile-pub-title" id="pub-title-link-sm-128">Protecting Sensitive Information Transmitted in Public Networks</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-128">4/21/2006</strong> <br/> Status: <span id="pub-status-sm-128">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-128"> <span id="download-value-128-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2006-04.pdf">April 2006 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-128"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-128"> 4/21/2006 </td> </tr> <tr id="result-129"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-129">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-129"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2006/03/minimum-security-requirements-for-federal-information-and-inform/final" id="pub-title-link-129">Minimum Security Requirements for Federal Information and Information Systems: Federal Information Processing Standard (FIPS) 200 Approved by the Secretary of Commerce</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-129">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2006/03/minimum-security-requirements-for-federal-information-and-inform/final" class="mobile-pub-title" id="pub-title-link-sm-129">Minimum Security Requirements for Federal Information and Information Systems: Federal Information Processing Standard (FIPS) 200 Approved by the Secretary of Commerce</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-129">3/24/2006</strong> <br/> Status: <span id="pub-status-sm-129">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-129"> <span id="download-value-129-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2006-03.pdf">March 2006 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-129"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-129"> 3/24/2006 </td> </tr> <tr id="result-130"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-130">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-130"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2006/02/creating-a-program-to-manage-security-patches-and-vulnerabilitie/final" id="pub-title-link-130">Creating a Program to Manage Security Patches and Vulnerabilities: NIST Recommendations for Improving System Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-130">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2006/02/creating-a-program-to-manage-security-patches-and-vulnerabilitie/final" class="mobile-pub-title" id="pub-title-link-sm-130">Creating a Program to Manage Security Patches and Vulnerabilities: NIST Recommendations for Improving System Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-130">2/15/2006</strong> <br/> Status: <span id="pub-status-sm-130">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-130"> <span id="download-value-130-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2006-02.pdf">February 2006 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-130"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-130"> 2/15/2006 </td> </tr> <tr id="result-131"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-131">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-131"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2006/01/testing-and-validation-of-personal-identity-verification-piv-c/final" id="pub-title-link-131">Testing and Validation of Personal Identity Verification (PIV) Components and Subsystems for Conformance to Federal Information Processing Standard 201</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-131">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2006/01/testing-and-validation-of-personal-identity-verification-piv-c/final" class="mobile-pub-title" id="pub-title-link-sm-131">Testing and Validation of Personal Identity Verification (PIV) Components and Subsystems for Conformance to Federal Information Processing Standard 201</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-131">1/25/2006</strong> <br/> Status: <span id="pub-status-sm-131">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-131"> <span id="download-value-131-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2006-01.pdf">January 2006 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-131"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-131"> 1/25/2006 </td> </tr> <tr id="result-132"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-132">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-132"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2005/08/implementation-of-fips-201-personal-identity-verification-piv/final" id="pub-title-link-132">Implementation of FIPS 201, Personal Identity Verification (PIV) of Federal Employees and Contractors</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-132">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2005/08/implementation-of-fips-201-personal-identity-verification-piv/final" class="mobile-pub-title" id="pub-title-link-sm-132">Implementation of FIPS 201, Personal Identity Verification (PIV) of Federal Employees and Contractors</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-132">8/01/2005</strong> <br/> Status: <span id="pub-status-sm-132">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-132"> <span id="download-value-132-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2005-08.pdf">Aug 2005 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-132"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-132"> 8/01/2005 </td> </tr> <tr id="result-133"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-133">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-133"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2005/04/implementing-the-health-insurance-portability-and-accountability/final" id="pub-title-link-133">Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-133">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2005/04/implementing-the-health-insurance-portability-and-accountability/final" class="mobile-pub-title" id="pub-title-link-sm-133">Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-133">4/01/2005</strong> <br/> Status: <span id="pub-status-sm-133">Final</span> </div> <div class="control-value-no-block"> Download: <span id="download-values-133">None available</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-133"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-133"> 4/01/2005 </td> </tr> <tr id="result-134"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-134">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-134"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2005/01/integrating-information-technology-it-security-into-the-capita/final" id="pub-title-link-134">Integrating IT Security into the Capital Planning and Investment Control Process</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-134">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2005/01/integrating-information-technology-it-security-into-the-capita/final" class="mobile-pub-title" id="pub-title-link-sm-134">Integrating IT Security into the Capital Planning and Investment Control Process</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-134">1/27/2005</strong> <br/> Status: <span id="pub-status-sm-134">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-134"> <span id="download-value-134-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2005-01.pdf">January 2005 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-134"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-134"> 1/27/2005 </td> </tr> <tr id="result-135"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-135">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-135"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2004/10/securing-voice-over-internet-protocol-ip-networks/final" id="pub-title-link-135">Securing Voice Over Internet Protocol (IP) Networks</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-135">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2004/10/securing-voice-over-internet-protocol-ip-networks/final" class="mobile-pub-title" id="pub-title-link-sm-135">Securing Voice Over Internet Protocol (IP) Networks</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-135">10/01/2004</strong> <br/> Status: <span id="pub-status-sm-135">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-135"> <span id="download-value-135-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2004-10.pdf">October 2004 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-135"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-135"> 10/01/2004 </td> </tr> <tr id="result-136"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-136">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-136"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2004/09/information-security-within-the-system-development-life-cycle-s/final" id="pub-title-link-136">Information Security Within the System Development Life Cycle (SDLC)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-136">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2004/09/information-security-within-the-system-development-life-cycle-s/final" class="mobile-pub-title" id="pub-title-link-sm-136">Information Security Within the System Development Life Cycle (SDLC)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-136">9/01/2004</strong> <br/> Status: <span id="pub-status-sm-136">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-136"> <span id="download-value-136-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2004-09.pdf">September 2004 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-136"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-136"> 9/01/2004 </td> </tr> <tr id="result-137"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-137">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-137"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2004/06/information-technology-security-services-how-to-select-impleme/final" id="pub-title-link-137">Information Technology Security Services: How to Select, Implement, and Manage</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-137">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2004/06/information-technology-security-services-how-to-select-impleme/final" class="mobile-pub-title" id="pub-title-link-sm-137">Information Technology Security Services: How to Select, Implement, and Manage</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-137">6/01/2004</strong> <br/> Status: <span id="pub-status-sm-137">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-137"> <span id="download-value-137-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2004-06.pdf">June 2004 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-137"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-137"> 6/01/2004 </td> </tr> <tr id="result-138"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-138">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-138"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2004/04/selecting-information-technology-security-products/final" id="pub-title-link-138">Selecting Information Technology Security Products</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-138">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2004/04/selecting-information-technology-security-products/final" class="mobile-pub-title" id="pub-title-link-sm-138">Selecting Information Technology Security Products</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-138">4/28/2004</strong> <br/> Status: <span id="pub-status-sm-138">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-138"> <span id="download-value-138-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2004-04.pdf">April 2004 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-138"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-138"> 4/28/2004 </td> </tr> <tr id="result-139"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-139">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-139"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2004/03/federal-information-processing-standard-fips-199-standards-fo/final" id="pub-title-link-139">Federal Information Processing Standard (FIPS) 199, Standards for Security Categorization of Federal Information and Information Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-139">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2004/03/federal-information-processing-standard-fips-199-standards-fo/final" class="mobile-pub-title" id="pub-title-link-sm-139">Federal Information Processing Standard (FIPS) 199, Standards for Security Categorization of Federal Information and Information Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-139">3/01/2004</strong> <br/> Status: <span id="pub-status-sm-139">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-139"> <span id="download-value-139-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2004-03.pdf">March 2004 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-139"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-139"> 3/01/2004 </td> </tr> <tr id="result-140"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-140">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-140"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2003/10/information-technology-security-awareness-training-education-/final" id="pub-title-link-140">Information Technology Security Awareness, Training, Education, and Certification</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-140">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2003/10/information-technology-security-awareness-training-education-/final" class="mobile-pub-title" id="pub-title-link-sm-140">Information Technology Security Awareness, Training, Education, and Certification</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-140">10/15/2003</strong> <br/> Status: <span id="pub-status-sm-140">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-140"> <span id="download-value-140-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2003-10.pdf">October 2003 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-140"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-140"> 10/15/2003 </td> </tr> <tr id="result-141"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-141">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-141"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2003/07/testing-intrusion-detection-systems/final" id="pub-title-link-141">Testing Intrusion Detection Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-141">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2003/07/testing-intrusion-detection-systems/final" class="mobile-pub-title" id="pub-title-link-sm-141">Testing Intrusion Detection Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-141">7/01/2003</strong> <br/> Status: <span id="pub-status-sm-141">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-141"> <span id="download-value-141-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2003-07.pdf">Jul 2003 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-141"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-141"> 7/01/2003 </td> </tr> <tr id="result-142"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-142">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-142"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2003/02/secure-interconnections-for-information-technology-systems/final" id="pub-title-link-142">Secure Interconnections for Information Technology Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-142">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2003/02/secure-interconnections-for-information-technology-systems/final" class="mobile-pub-title" id="pub-title-link-sm-142">Secure Interconnections for Information Technology Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-142">2/26/2003</strong> <br/> Status: <span id="pub-status-sm-142">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-142"> <span id="download-value-142-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2003-02.pdf">February 2003 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-142"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-142"> 2/26/2003 </td> </tr> <tr id="result-143"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-143">ITL Bulletin</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-143"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2002/04/techniques-for-system-and-data-recovery/final" id="pub-title-link-143">Techniques for System and Data Recovery</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-143">ITL Bulletin </span><br/> <a href="/web/20230128001836/https://csrc.nist.gov/publications/detail/itl-bulletin/2002/04/techniques-for-system-and-data-recovery/final" class="mobile-pub-title" id="pub-title-link-sm-143">Techniques for System and Data Recovery</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-143">4/01/2002</strong> <br/> Status: <span id="pub-status-sm-143">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-143"> <span id="download-value-143-0"> <a href="/web/20230128001836/https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2002-04.pdf">April 2002 ITL Bulletin</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-143"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-143"> 4/01/2002 </td> </tr> </tbody> </table> <div class="row bottom-pagination-area"> <p class="text-center"> <span class="pagination-links" id="bottom-pagination-container" data-total-pages="0" data-min-page="1" data-max-page="0" data-current-page="1" data-show-first="False" data-show-last="True"></span> </p> </div> <div> <span class="pull-right"> <a href="/web/20230128001836/https://csrc.nist.gov/publications/search" id="view-all-pubs-link">View All Publications</a> </span> </div> <div id="publications-quicklinks-sm" class="bs-callout bs-callout-subnav hidden-md hidden-lg"> <h4>Current Publications <i class="fa fa-bolt"></i></h4> <ul> <li> <strong> NIST Series Pubs <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-series-pubs-tooltip"></i> </strong> <ul> <li><a href="/web/20230128001836/https://csrc.nist.gov/publications/final-pubs" id="quick-link-final-sm">Final Pubs</a></li> <li><a href="/web/20230128001836/https://csrc.nist.gov/publications/drafts-open-for-comment" id="quick-links-comments-sm">Drafts Open for Comment</a></li> <li><a href="/web/20230128001836/https://csrc.nist.gov/publications/draft-pubs" id="quick-link-draft-sm">All Public Drafts</a></li> <li> <strong> View By Series <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-view-series-pubs-tooltip"></i> </strong> <ul> <li><a href="/web/20230128001836/https://csrc.nist.gov/publications/fips" id="quick-link-fips-sm">FIPS</a></li> <li><a href="/web/20230128001836/https://csrc.nist.gov/publications/sp800" id="quick-link-sp-800-sm">SP 800 series</a></li> <li><a href="/web/20230128001836/https://csrc.nist.gov/publications/sp" id="quick-link-sp-sm">All SP series</a></li> <li><a href="/web/20230128001836/https://csrc.nist.gov/publications/nistir" id="quick-link-nistir-sm">NISTIRs</a></li> <li><a href="/web/20230128001836/https://csrc.nist.gov/publications/itl-bulletin" id="quick-link-itl-bul-sm">ITL Bulletins</a></li> </ul> </li> </ul> </li> <li> <strong> Other Pubs <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-other-pubs-tooltip"></i> </strong> <ul> <li><a href="/web/20230128001836/https://csrc.nist.gov/publications/white-paper" id="quick-link-white-papers-sm">White Papers</a></li> <li><a href="/web/20230128001836/https://csrc.nist.gov/publications/journal-article" id="quick-link-journal-articles-sm">Journal Articles</a></li> <li><a href="/web/20230128001836/https://csrc.nist.gov/publications/conference-paper" id="quick-link-conference-papers-sm">Conference Papers</a></li> <li><a href="/web/20230128001836/https://csrc.nist.gov/publications/book" id="quick-link-books-sm">Books</a></li> </ul> </li> </ul> <span style="display: none;" id="nist-series-pubs-tooltip"> <strong>Final:</strong> <em>Current list of all published NIST cybersecurity documents.</em> Does not include "Withdrawn" documents. Includes FIPS, Special Publications, NISTIRs, ITL Bulletins, and NIST Cybersecurity White Papers.<br/> <br/> <strong>Public Drafts:</strong> <em>Current list of all draft NIST cybersecurity documents--they are typically posted for public comment.</em> "Current" public drafts are the latest draft versions that have not yet been published as "Final." </span> <span style="display: none;" id="nist-view-series-pubs-tooltip"> <strong>FIPS:</strong> <em>Current Federal Information Processing Standard Publications (FIPS).</em> Includes current (Final and Draft) FIPS.<br/> <br/> <strong>SP 800 Series:</strong> <em>Current NIST Special Publication (SP) 800 series publications, which focus on Computer/Information Security.</em> Includes current (Final and Draft) SP 800 pubs.<br/> <br/> <strong>All SP Series:</strong> <em> Current NIST Special Publications (SP), including SP 800 (Computer/Information Security) and SP 1800 (Cybersecurity Practice Guides) pubs. Also includes SP 500 (Computer Systems Technology) pubs related to cybersecurity and privacy. </em> Includes current (Final and Draft) NIST Special Publications.<br/> <br/> <strong>NISTIRs:</strong> <em>Current list of NIST Interagency or Internal Reports (NISTIR) related to cybersecurity and privacy.</em> Includes current (Final and Draft) NISTIRs.<br/> <br/> <strong>ITL Bulletins:</strong> Current list of NIST Information Technology Laboratory (ITL) Bulletins. </span> <span style="display: none;" id="nist-other-pubs-tooltip"> <strong>White Papers:</strong> <em> Consists of NIST Cybersecurity White Papers; NCCoE Project Descriptions, Building Blocks and Use Cases; and other NIST-authored papers that are not part of a formal series. </em> Includes current (Final and Draft) papers.<br/> <br/> <strong>Journal Articles:</strong> NIST-authored articles published in external journals and in the NIST Journal of Research (JRES).<br/> <br/> <strong>Conference Papers:</strong> NIST-authored conference papers related to cybersecurity and privacy.<br/> <br/> <strong>Books:</strong> NIST-authored books, book sections, and encyclopedia entries related to cybersecurity and privacy. </span> </div> </div> </div> </div> <div id="footer-pusher"></div> </div> <footer id="footer"> <div class="container"> <div class="row"> <div class="col-sm-6"> <span class="hidden-xs"> <a href="https://web.archive.org/web/20230128001836/https://www.nist.gov/" title="National Institute of Standards and Technology" rel="home" target="_blank" class="footer-nist-logo" id="footer-nist-logo-link"> <img src="/web/20230128001836im_/https://csrc.nist.gov/CSRC/Media/images/nist-logo-brand-white.svg" alt="National Institute of Standards and Technology logo" id="footer-nist-logo"/> </a> </span> <div class="row footer-contact-container"> <div class="col-sm-12" id="footer-address"> <strong>HEADQUARTERS</strong><br> 100 Bureau Drive<br> Gaithersburg, MD 20899 </div> </div> </div> <div class="col-sm-6"> <ul class="social-list text-right" style="display: block;"> <li class="field-item service-twitter list-horiz"> <a href="https://web.archive.org/web/20230128001836/https://twitter.com/NISTCyber" class="social-btn social-btn--large extlink ext" id="footer-social-twitter-link"> <i class="fa fa-twitter fa-fw"><span class="element-invisible">twitter</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-facebook list-horiz"> <a href="https://web.archive.org/web/20230128001836/https://www.facebook.com/NIST" class="social-btn social-btn--large extlink ext" id="footer-social-facebook-link"> <i class="fa fa-facebook fa-fw"><span class="element-invisible">facebook</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-linkedin list-horiz"> <a href="https://web.archive.org/web/20230128001836/https://www.linkedin.com/company/nist" class="social-btn social-btn--large extlink ext" id="footer-social-linkedin-link"> <i class="fa fa-linkedin fa-fw"><span class="element-invisible">linkedin</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-instagram list-horiz"> <a href="https://web.archive.org/web/20230128001836/https://www.instagram.com/usnistgov/" class="social-btn social-btn--large extlink ext" id="footer-social-instagram-link"> <i class="fa fa-instagram fa-fw"><span class="element-invisible">instagram</span></i> <span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-youtube list-horiz"> <a href="https://web.archive.org/web/20230128001836/https://www.youtube.com/user/USNISTGOV" class="social-btn social-btn--large extlink ext" id="footer-social-youtube-link"> <i class="fa fa-youtube fa-fw"><span class="element-invisible">youtube</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-rss list-horiz"> <a href="https://web.archive.org/web/20230128001836/https://www.nist.gov/news-events/nist-rss-feeds" class="social-btn social-btn--large extlink" id="footer-social-rss-link"> <i class="fa fa-rss fa-fw"><span class="element-invisible">rss</span></i> </a> </li> <li class="field-item service-govdelivery list-horiz last"> <a href="https://web.archive.org/web/20230128001836/https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3" class="social-btn social-btn--large extlink ext" title="Subscribe to CSRC and publication updates, and other NIST cybersecurity news" id="footer-social-govdelivery-link"> <i class="fa fa-envelope fa-fw"><span class="element-invisible">govdelivery</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> </ul> <p class="text-right"> Want updates about CSRC and our publications? <a href="https://web.archive.org/web/20230128001836/https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3" class="btn btn-lg btn-info" style="background-color: #12659c!important; border-color: #12659c!important;" id="footer-subscribe-link">Subscribe</a> </p> </div> </div> <div class="row hidden-sm hidden-md hidden-lg"> <div class="col-sm-12"> <a href="https://web.archive.org/web/20230128001836/https://www.nist.gov/" title="National Institute of Standards and Technology" rel="home" target="_blank" class="footer-nist-logo" id="footer-bottom-nist-logo-link"> <img src="/web/20230128001836im_/https://csrc.nist.gov/CSRC/Media/images/logo_rev.png" alt="National Institute of Standards and Technology logo" id="footer-bottom-nist-logo"/> </a> </div> </div> <div class="row"> <div class="col-sm-6"> <p> <a href="/web/20230128001836/https://csrc.nist.gov/about/contact" id="footer-contact-us-link">Contact Us</a> | <a href="https://web.archive.org/web/20230128001836/https://www.nist.gov/about-nist/our-organization" style="display: inline-block;" id="footer-org-link">Our Other Offices</a> </p> </div> <div class="col-sm-6"> <span class="pull-right text-right"> Send inquiries to <a href="https://web.archive.org/web/20230128001836/mailto:csrc-inquiry@nist.gov?subject=CSRC Inquiry" style="display: inline-block;" id="footer-inquiries-link">csrc-inquiry@nist.gov</a> </span> </div> </div> <div class="row"> <div class="footer-bottom-links-container" id="footer-bottom-links-container"> <ul> <li><a href="https://web.archive.org/web/20230128001836/https://www.nist.gov/privacy-policy">Site Privacy</a></li> <li><a href="https://web.archive.org/web/20230128001836/https://www.nist.gov/oism/accessibility">Accessibility</a></li> <li><a href="https://web.archive.org/web/20230128001836/https://www.nist.gov/privacy">Privacy Program</a></li> <li><a href="https://web.archive.org/web/20230128001836/https://www.nist.gov/oism/copyrights">Copyrights</a></li> <li><a href="https://web.archive.org/web/20230128001836/https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a></li> <li><a href="https://web.archive.org/web/20230128001836/https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a></li> <li><a href="https://web.archive.org/web/20230128001836/https://www.nist.gov/foia">FOIA</a></li> <li><a href="https://web.archive.org/web/20230128001836/https://www.nist.gov/environmental-policy-statement">Environmental Policy</a></li> <li><a href="https://web.archive.org/web/20230128001836/https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a></li> <li><a href="https://web.archive.org/web/20230128001836/https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a></li> <li><a href="https://web.archive.org/web/20230128001836/https://www.commerce.gov/">Commerce.gov</a></li> <li><a href="https://web.archive.org/web/20230128001836/https://www.science.gov/">Science.gov</a></li> <li><a href="https://web.archive.org/web/20230128001836/https://www.usa.gov/">USA.gov</a></li> <li><a href="https://web.archive.org/web/20230128001836/https://vote.gov/">Vote.gov</a></li> </ul> </div> </div> </div> </footer> <script type="text/javascript" src="/web/20230128001836js_/https://csrc.nist.gov/dist/js/quick-collapse.js"></script> <script type="text/javascript" src="/web/20230128001836js_/https://csrc.nist.gov/dist/app.bundle.js"></script> <!-- reCAPTCHA v3 --> <script defer src="https://web.archive.org/web/20230128001836js_/https://www.google.com/recaptcha/api.js?render=6LcQo40UAAAAAJpAj4X-i-WfOzdbu6d7j7kKryDS"></script> </body> </html> <!-- FILE ARCHIVED ON 00:18:36 Jan 28, 2023 AND RETRIEVED FROM THE INTERNET ARCHIVE ON 19:22:54 Feb 17, 2025. JAVASCRIPT APPENDED BY WAYBACK MACHINE, COPYRIGHT INTERNET ARCHIVE. ALL OTHER CONTENT MAY ALSO BE PROTECTED BY COPYRIGHT (17 U.S.C. SECTION 108(a)(3)). --> <!-- playback timings (ms): captures_list: 0.518 exclusion.robots: 0.028 exclusion.robots.policy: 0.017 esindex: 0.01 cdx.remote: 6.55 LoadShardBlock: 1996.737 (3) PetaboxLoader3.datanode: 1865.691 (4) PetaboxLoader3.resolve: 256.809 (2) load_resource: 210.917 -->