CINXE.COM

Search | CSRC

<!DOCTYPE html> <html lang="en-us" xml:lang="en-us"> <head><script type="text/javascript" src="/_static/js/bundle-playback.js?v=HxkREWBo" charset="utf-8"></script> <script type="text/javascript" src="/_static/js/wombat.js?v=txqj7nKC" charset="utf-8"></script> <script>window.RufflePlayer=window.RufflePlayer||{};window.RufflePlayer.config={"autoplay":"on","unmuteOverlay":"hidden"};</script> <script type="text/javascript" src="/_static/js/ruffle/ruffle.js"></script> <script type="text/javascript"> __wm.init("https://web.archive.org/web"); __wm.wombat("https://csrc.nist.gov/publications/sp","20220708182845","https://web.archive.org/","web","/_static/", "1657304925"); </script> <link rel="stylesheet" type="text/css" href="/_static/css/banner-styles.css?v=S1zqJCYt" /> <link rel="stylesheet" type="text/css" href="/_static/css/iconochive.css?v=3PDvdIFv" /> <!-- End Wayback Rewrite JS Include --> <meta charset="utf-8"/> <title>Search | CSRC</title> <meta http-equiv="content-type" content="text/html; charset=UTF-8"/> <meta http-equiv="content-style-type" content="text/css"/> <meta http-equiv="content-script-type" content="text/javascript"/> <meta name="viewport" content="width=device-width, initial-scale=1.0"/> <meta name="msapplication-config" content="/CSRC/Media/images/favicons/browserconfig.xml"/> <meta name="theme-color" content="#000000"/> <meta name="google-site-verification" content="xbrnrVYDgLD-Bd64xHLCt4XsPXzUhQ-4lGMj4TdUUTA"/> <link rel="apple-touch-icon" sizes="180x180" href="/web/20220708182845im_/https://csrc.nist.gov/images/icons/apple-touch-icon.png"/> <link rel="icon" type="image/png" href="/web/20220708182845im_/https://csrc.nist.gov/images/icons/favicon-32x32.png" sizes="32x32"/> <link rel="icon" type="image/png" href="/web/20220708182845im_/https://csrc.nist.gov/images/icons/favicon-16x16.png" sizes="16x16"/> <link rel="manifest" href="/web/20220708182845/https://csrc.nist.gov/images/icons/manifest.json"/> <link rel="mask-icon" href="/web/20220708182845im_/https://csrc.nist.gov/images/icons/safari-pinned-tab.svg" color="#000000"/> <link href="/web/20220708182845im_/https://csrc.nist.gov/CSRC/Media/images/favicons/favicon.ico" type="image/x-icon" rel="shortcut icon"/> <link href="/web/20220708182845im_/https://csrc.nist.gov/CSRC/Media/images/favicons/favicon.ico" type="image/x-icon" rel="icon"/> <!-- <link href="/dist/katex/katex.min.css" rel="stylesheet"/> --> <link href="/web/20220708182845cs_/https://csrc.nist.gov/dist/app.css" rel="stylesheet"/> <!-- reCAPTCHA v3 --> <style> .grecaptcha-badge { visibility: hidden; } </style> <script async type="text/javascript" id="_fed_an_ua_tag" src="https://web.archive.org/web/20220708182845js_/https://dap.digitalgov.gov/Universal-Federated-Analytics-Min.js?agency=nist&amp;subagency=csrc&amp;pua=UA-66610693-15&amp;yt=true&amp;exts=xsd,xml,wav,mpg,mpeg,avi,rtf,webm,ogg,ogv,oga,map,otf,eot,svg,ttf,woff"></script> <style id="antiClickjack"> body > * { display: none !important; } #antiClickjack { display: block !important; } </style> <noscript> <style id="antiClickjackNoScript"> body > * { display: block !important; } #antiClickjack { display: none !important; } </style> </noscript> <script type="text/javascript" id="antiClickjackScript"> if (self === top) { // no clickjacking var antiClickjack = document.getElementById("antiClickjack"); antiClickjack.parentNode.removeChild(antiClickjack); } else { setTimeout(tryForward(), 5000); } function tryForward() { top.location = self.location; } </script> </head> <body> <div id="antiClickjack" style="display: none;"> <strong style="font-size: 1.6rem;">You are viewing this page in an unauthorized frame window.</strong> <p>This is a potential security issue, you are being redirected to <a href="https://web.archive.org/web/20220708182845/https://csrc.nist.gov/">https://csrc.nist.gov</a>.</p> </div> <section class="usa-banner" aria-label="Official government website"> <div class="usa-accordion container"> <header class="usa-banner__header"> <noscript> <p style="font-size: 0.85rem; font-weight: bold;">You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.</p> </noscript> <img class="usa-banner__header-flag" src="/web/20220708182845im_/https://csrc.nist.gov/images/usbanner/us_flag_small.png" alt="U.S. flag"> &nbsp; <span class="usa-banner__header-text">An official website of the United States government</span> <button id="gov-banner-button" class="usa-accordion__button usa-banner__button" data-toggle="collapse" data-target="#gov-banner" aria-expanded="true" aria-controls="gov-banner"> <span class="usa-banner__button-text">Here's how you know</span> </button> </header> <div class="usa-banner__content usa-accordion__content collapse in" role="tabpanel" id="gov-banner" aria-expanded="true"> <div class="row"> <div class="col-md-5 col-sm-12"> <div class="row"> <div class="col-sm-2 col-xs-3"> <img class="usa-banner__icon usa-media-block__img" src="/web/20220708182845im_/https://csrc.nist.gov/images/usbanner/icon-dot-gov.svg" alt="Dot gov"> </div> <div class="col-sm-10 col-xs-9"> <p> <strong>Official websites use .gov</strong> <br> A <strong>.gov</strong> website belongs to an official government organization in the United States. </p> </div> </div> </div> <div class="col-md-5 col-sm-12"> <div class="row"> <div class="col-sm-2 col-xs-3"> <img class="usa-banner__icon usa-media-block__img" src="/web/20220708182845im_/https://csrc.nist.gov/images/usbanner/icon-https.svg" alt="Https"> </div> <div class="col-sm-10 col-xs-9"> <p> <strong>Secure .gov websites use HTTPS</strong> <br> A <strong>lock</strong> (<img class="usa-banner__lock" src="/web/20220708182845im_/https://csrc.nist.gov/images/usbanner/lock.svg" alt="Dot gov">) or <strong>https://</strong> means you've safely connected to the .gov website. Share sensitive information only on official, secure websites. </p> </div> </div> </div> </div> </div> </div> </section> <nav id="navbar" class="navbar"> <div id="nist-menu-container" class="container"> <div class="row"> <!-- Brand --> <div class="col-xs-6 col-md-4 navbar-header"> <a class="navbar-brand" href="https://web.archive.org/web/20220708182845/https://www.nist.gov/" target="_blank" id="navbar-brand-image"> <img src="/web/20220708182845im_/https://csrc.nist.gov/CSRC/media/images/svg/nist-logo.svg" alt="National Institute of Standards and Technology" width="110" height="30"> </a> </div> <div class="col-xs-6 col-md-8 navbar-nist-logo"> <div class="form-inline hidden-sm hidden-xs"> <form name="site-search" id="site-search-form" action="/web/20220708182845/https://csrc.nist.gov/search" method="GET"> <label for="search-csrc-query" class="element-invisible">Search</label> <input autocomplete="off" class="form-control" id="search-csrc-query" name="keywords" type="text" size="15" maxlength="128" placeholder="Search CSRC"/> <input type="hidden" name="ipp" value="25"/> <input type="hidden" name="sortBy" value="relevance"/> <input type="hidden" name="showOnly" value="publications,projects,news,events,presentations,glossary,topics"/> <input type="hidden" name="topicsMatch" value="ANY"/> <input type="hidden" name="status" value="Final,Draft"/> <input type="hidden" name="series" value="FIPS,SP,NISTIR,ITL Bulletin,White Paper,Building Block,Use Case,Journal Article,Conference Paper,Book"/> <button type="submit" id="search-csrc-submit-btn" class="form-submit"> <span class="element-invisible">Search</span> <i class="fa fa-search"></i> </button> </form> </div> <span id="nvd-menu-button" class="pull-right"> <a href="#" id="nvd-menu-button-link"> <span class="fa fa-bars"></span> <span id="nvd-menu-full-text">CSRC MENU</span> </a> </span> </div> </div> </div> <div class="form-inline hidden-md hidden-lg"> <form name="site-search-mobile" id="site-search-form-mobile" action="/web/20220708182845/https://csrc.nist.gov/search" method="GET"> <label for="search-csrc-query-mobile" class="element-invisible">Search</label> <input autocomplete="off" class="form-control" id="search-csrc-query-mobile" name="keywords" type="text" size="15" maxlength="128" placeholder="Search CSRC"/> <button type="submit" id="search-csrc-submit-btn-mobile" class="form-submit"> <span class="element-invisible">Search</span> <i class="fa fa-search"></i> </button> </form> </div> <div class="main-menu-row container"> <!-- Collect the nav links, forms, and other content for toggling --> <div id="main-menu-drop" class="col-lg-12" style="display: none;"> <ul> <li><a href="/web/20220708182845/https://csrc.nist.gov/projects">Projects</a></li> <li> <a href="/web/20220708182845/https://csrc.nist.gov/publications"> Publications <span class="expander fa fa-plus" id="main-menu-pubs-expander" data-expander-name="publications" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="publications" id="main-menu-pubs-expanded"> <div class="row"> <div class="col-lg-4"> <p><a href="/web/20220708182845/https://csrc.nist.gov/publications/drafts-open-for-comment">Drafts for Public Comment</a></p> <p><a href="/web/20220708182845/https://csrc.nist.gov/publications/draft-pubs">All Public Drafts</a></p> <p><a href="/web/20220708182845/https://csrc.nist.gov/publications/final-pubs">Final Pubs</a></p> <p><a href="/web/20220708182845/https://csrc.nist.gov/publications/fips">FIPS</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20220708182845/https://csrc.nist.gov/publications/sp">Special Publications (SP<small>s</small>)</a></p> <p><a href="/web/20220708182845/https://csrc.nist.gov/publications/nistir">NISTIR<small>s</small></a></p> <p><a href="/web/20220708182845/https://csrc.nist.gov/publications/itl-bulletin">ITL Bulletins</a></p> <p><a href="/web/20220708182845/https://csrc.nist.gov/publications/white-paper">White Papers</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20220708182845/https://csrc.nist.gov/publications/journal-article">Journal Articles</a></p> <p><a href="/web/20220708182845/https://csrc.nist.gov/publications/conference-paper">Conference Papers</a></p> <p><a href="/web/20220708182845/https://csrc.nist.gov/publications/book">Books</a></p> </div> </div> </div> </li> <li> <a href="/web/20220708182845/https://csrc.nist.gov/topics"> Topics <span class="expander fa fa-plus" id="main-menu-topics-expander" data-expander-name="topics" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="topics" id="main-menu-topics-expanded"> <div class="row"> <div class="col-lg-4"> <p><a href="/web/20220708182845/https://csrc.nist.gov/Topics/Security-and-Privacy">Security &amp; Privacy</a></p> <p><a href="/web/20220708182845/https://csrc.nist.gov/Topics/Applications">Applications</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20220708182845/https://csrc.nist.gov/Topics/Technologies">Technologies</a></p> <p><a href="/web/20220708182845/https://csrc.nist.gov/Topics/Sectors">Sectors</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20220708182845/https://csrc.nist.gov/Topics/Laws-and-Regulations">Laws &amp; Regulations</a></p> <p><a href="/web/20220708182845/https://csrc.nist.gov/Topics/Activities-and-Products">Activities &amp; Products</a></p> </div> </div> </div> </li> <li><a href="/web/20220708182845/https://csrc.nist.gov/news">News &amp; Updates</a></li> <li><a href="/web/20220708182845/https://csrc.nist.gov/events">Events</a></li> <li><a href="/web/20220708182845/https://csrc.nist.gov/glossary">Glossary</a></li> <li> <a href="/web/20220708182845/https://csrc.nist.gov/about"> About CSRC <span class="expander fa fa-plus" id="main-menu-about-expander" data-expander-name="about" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="about" id="main-menu-about-expanded"> <div class="row"> <div class="col-lg-6"> <p> <strong><a href="/web/20220708182845/https://csrc.nist.gov/Groups/Computer-Security-Division">Computer Security Division</a></strong><br/> <ul> <li><a href="/web/20220708182845/https://csrc.nist.gov/Groups/Computer-Security-Division/Cryptographic-Technology">Cryptographic Technology</a></li> <li><a href="/web/20220708182845/https://csrc.nist.gov/Groups/Computer-Security-Division/Secure-Systems-and-Applications">Secure Systems and Applications</a></li> <li><a href="/web/20220708182845/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Components-and-Mechanisms">Security Components and Mechanisms</a></li> <li><a href="/web/20220708182845/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Engineering-and-Risk-Management">Security Engineering and Risk Management</a></li> <li><a href="/web/20220708182845/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Testing-Validation-and-Measurement">Security Testing, Validation, and Measurement</a></li> </ul> </p> </div> <div class="col-lg-6"> <p> <strong><a href="/web/20220708182845/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division">Applied Cybersecurity Division</a></strong><br/> <ul> <li><a href="/web/20220708182845/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division/Cybersecurity-and-Privacy-Applications">Cybersecurity and Privacy Applications</a></li> <li><a href="/web/20220708182845/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division/National-Cybersecurity-Center-of-Excellence">National Cybersecurity Center of Excellence (NCCoE)</a></li> <li><a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/nice/">National Initiative for Cybersecurity Education (NICE)</a></li> </ul> </p> <p> <a href="/web/20220708182845/https://csrc.nist.gov/contact"> Contact Us </a> </p> </div> </div> </div> </li> </ul> </div><!-- /#mobile-nav-container --> </div> </nav> <section id="itl-header" class="has-menu"> <div class="container"> <div class="row"> <div class="col-sm-12 col-md-8"> <h2 class="hidden-xs hidden-sm"> <a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/itl" target="_blank" id="itl-header-link">Information Technology Laboratory</a> </h2> <h1 class="hidden-xs hidden-sm"> <a href="/web/20220708182845/https://csrc.nist.gov/" id="csrc-header-link-lg">Computer Security Resource Center</a> </h1> <h1 class="hidden-xs text-center hidden-md hidden-lg" id="csrc-header-link-md">Computer Security Resource Center</h1> </div> <div class="col-sm-12 col-md-4"> <a id="logo-csrc" href="/web/20220708182845/https://csrc.nist.gov/" style="width: 100%; text-align: center; display: block; margin-top: 1rem;"><img id="img-logo-csrc" src="/web/20220708182845im_/https://csrc.nist.gov/CSRC/Media/images/CSRC-white-134-38.png" alt="CSRC Logo" class="csrc-header-logo"></a> </div> </div> </div> </section> <div id="body-section" class="container"> <div class="publications-content"> <div class="row"> <div class="col-lg-3 col-md-4 hidden-sm hidden-xs hidden-xxs"> <div id="publications-quicklinks-lg" class="bs-callout bs-callout-subnav hidden-sm hidden-xs hidden-xxs"> <h4>Current Publications <i class="fa fa-bolt"></i></h4> <ul> <li> <strong> NIST Series Pubs <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-series-pubs-tooltip"></i> </strong> <ul> <li><a href="/web/20220708182845/https://csrc.nist.gov/publications/final-pubs" id="quick-link-final-lg">Final Pubs</a></li> <li><a href="/web/20220708182845/https://csrc.nist.gov/publications/drafts-open-for-comment" id="quick-links-comments-lg">Drafts Open for Comment</a></li> <li><a href="/web/20220708182845/https://csrc.nist.gov/publications/draft-pubs" id="quick-link-draft-lg">All Public Drafts</a></li> <li> <strong> View By Series <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-view-series-pubs-tooltip"></i> </strong> <ul> <li><a href="/web/20220708182845/https://csrc.nist.gov/publications/fips" id="quick-link-fips-lg">FIPS</a></li> <li><a href="/web/20220708182845/https://csrc.nist.gov/publications/sp800" id="quick-link-sp-800-lg">SP 800 series</a></li> <li><a href="/web/20220708182845/https://csrc.nist.gov/publications/sp" id="quick-link-sp-lg">All SP series</a></li> <li><a href="/web/20220708182845/https://csrc.nist.gov/publications/nistir" id="quick-link-nistir-lg">NISTIRs</a></li> <li><a href="/web/20220708182845/https://csrc.nist.gov/publications/itl-bulletin" id="quick-link-itl-bul-lg">ITL Bulletins</a></li> </ul> </li> </ul> </li> <li> <strong> Other Pubs <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-other-pubs-tooltip"></i> </strong> <ul> <li><a href="/web/20220708182845/https://csrc.nist.gov/publications/white-paper" id="quick-link-white-papers-lg">White Papers</a></li> <li><a href="/web/20220708182845/https://csrc.nist.gov/publications/journal-article" id="quick-link-journal-articles-lg">Journal Articles</a></li> <li><a href="/web/20220708182845/https://csrc.nist.gov/publications/conference-paper" id="quick-link-conference-papers-lg">Conference Papers</a></li> <li><a href="/web/20220708182845/https://csrc.nist.gov/publications/book" id="quick-link-books-lg">Books</a></li> </ul> </li> </ul> <span style="display: none;" id="nist-series-pubs-tooltip"> <strong>Final:</strong> <em>Current list of all published NIST cybersecurity documents.</em> Does not include "Withdrawn" documents. Includes FIPS, Special Publications, NISTIRs, ITL Bulletins, and NIST Cybersecurity White Papers.<br/> <br/> <strong>Public Drafts:</strong> <em>Current list of all draft NIST cybersecurity documents--they are typically posted for public comment.</em> "Current" public drafts are the latest draft versions that have not yet been published as "Final." </span> <span style="display: none;" id="nist-view-series-pubs-tooltip"> <strong>FIPS:</strong> <em>Current Federal Information Processing Standard Publications (FIPS).</em> Includes current (Final and Draft) FIPS.<br/> <br/> <strong>SP 800 Series:</strong> <em>Current NIST Special Publication (SP) 800 series publications, which focus on Computer/Information Security.</em> Includes current (Final and Draft) SP 800 pubs.<br/> <br/> <strong>All SP Series:</strong> <em> Current NIST Special Publications (SP), including SP 800 (Computer/Information Security) and SP 1800 (Cybersecurity Practice Guides) pubs. Also includes SP 500 (Computer Systems Technology) pubs related to cybersecurity and privacy. </em> Includes current (Final and Draft) NIST Special Publications.<br/> <br/> <strong>NISTIRs:</strong> <em>Current list of NIST Interagency or Internal Reports (NISTIR) related to cybersecurity and privacy.</em> Includes current (Final and Draft) NISTIRs.<br/> <br/> <strong>ITL Bulletins:</strong> Current list of NIST Information Technology Laboratory (ITL) Bulletins. </span> <span style="display: none;" id="nist-other-pubs-tooltip"> <strong>White Papers:</strong> <em> Consists of NIST Cybersecurity White Papers; NCCoE Project Descriptions, Building Blocks and Use Cases; and other NIST-authored papers that are not part of a formal series. </em> Includes current (Final and Draft) papers.<br/> <br/> <strong>Journal Articles:</strong> NIST-authored articles published in external journals and in the NIST Journal of Research (JRES).<br/> <br/> <strong>Conference Papers:</strong> NIST-authored conference papers related to cybersecurity and privacy.<br/> <br/> <strong>Books:</strong> NIST-authored books, book sections, and encyclopedia entries related to cybersecurity and privacy. </span> </div> <form action="/web/20220708182845/https://csrc.nist.gov/publications/search" class="bs-callout bs-callout-success csrc-search-form hidden-sm hidden-xs hidden-xxs" data-csrc-form="true" data-default-query="sortBy-lg=Number+DESC&amp;viewMode-lg=brief&amp;ipp-lg=ALL&amp;status-lg=Draft%2CFinal&amp;series-lg=SP" data-form-ignore-default="sortBy" data-form-name="pubSearchDesktop" id="pubs-search-form-lg" method="get"> <div class="form-group"> <label for="keywords-lg">Search</label> <input name="keywords-lg" class="form-control" data-val="true" data-val-length="The field Search must be a string with a maximum length of 255." data-val-length-max="255" id="keywords-lg" name="Form.Keywords" type="text" value=""/> <em class="text-muted">Search publication record data<br/> (not a full text search)</em> </div> <div class="form-group"> <label for="sortBy-lg">Sort By</label> <div class="form-inline"> <select name="sortBy-lg" class="form-control" id="sortBy-lg" name="Form.SortBy"><option value="relevance">Relevance (best match)</option> <option value="releasedate DESC">Release Date (newest first)</option> <option value="releasedate ASC">Release Date (oldest first)</option> <option value="Series ASC">Series (A-Z)</option> <option value="Series DESC">Series (Z-A)</option> <option value="Number ASC">Number (lowest to highest)</option> <option selected="selected" value="Number DESC">Number (highest to lowest)</option> <option value="title asc">Title (A-Z)</option> <option value="title desc">Title (Z-A)</option> </select> </div> </div> <div class="form-group"> <label for="viewMode-lg">Results View</label> <select name="viewMode-lg" class="form-control" id="viewMode-lg" name="Form.ResultsViewMode"><option selected="selected" value="brief">Brief</option> <option value="summary">Summary</option> </select> </div> <div class="form-group form-inline"> <label for="ipp-lg" class="form-control-half">Items Per Page</label> <select name="ipp-lg" class="form-control" id="ipp-lg" name="Form.ItemsPerPage"><option value="25">25</option> <option value="50">50</option> <option value="75">75</option> <option value="100">100</option> <option selected="selected" value="all">All</option> </select> </div> <div class="form-group"> <label for="dateFrom-lg">Date</label> <div class="form-inline form-date-inline"> <div class="input-group date" data-date-picker="true"> <input name="dateFrom-lg" class="form-control" data-control-type="date" data-val="true" data-val-date="The field Date must be a date." data-validation="true" data-validation-compare-field="dateTo-lg" data-validation-message="From date must be less than To date" data-validation-type="less-than-date" id="dateFrom-lg" name="Form.DateFrom" placeholder=" / / " type="text" value=""/> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> <div class="input-group date" data-date-picker="true"> <input name="dateTo-lg" class="form-control" data-control-type="date" data-val="true" data-val-date="The field DateTo must be a date." id="dateTo-lg" name="Form.DateTo" placeholder=" / / " type="text" value=""/> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> </div> </div> <div class="form-group"> <label for="status-all-lg"> Status <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="publications-status-info"></i> </label> <div class="form-inline status-type" style="margin-left: 1rem;"> <label class="meta-label"> <input type="checkbox" id="status-final-lg" name="status-lg" value="Final" data-default-checked="True" checked="'checked'"/> Final<br/> </label> <label class="meta-label"> <input type="checkbox" id="status-draft-lg" name="status-lg" value="Draft" data-default-checked="True" checked="'checked'"/> Public Draft<br/> </label> <label class="meta-label"> <input type="checkbox" id="status-withdrawn-lg" name="status-lg" value="Withdrawn" data-default-checked="True"/> Withdrawn<br/> </label> </div> </div> <div class="form-group"> <label for="pub-search-series"> Series <button type="button" id="series-all-lg" class="btn btn-sm btn-success" data-check-all="series-lg">Check All</button> <button type="button" id="series-clear-lg" class="btn btn-sm btn-success" data-check-none="series-lg">Clear</button> </label> <div class="form-inline series-type" style="margin-left: 1rem;"> <label class="meta-label"> <input type="checkbox" id="series-fips-lg" name="series-lg" value="FIPS" data-default-checked="True"/> FIPS<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-sp-lg" name="series-lg" value="SP" data-default-checked="True" checked="'checked'/"> SP<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-nistir-lg" name="series-lg" value="NISTIR" data-default-checked="True"/> NISTIR<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-itl-bul-lg" name="series-lg" value="ITL Bulletin" data-default-checked="True"/> ITL Bulletin<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-white-paper-lg" name="series-lg" value="White Paper" data-default-checked="True"/> White Paper<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-build-block-lg" name="series-lg" value="Building Block" data-default-checked="True"/> Building Block<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-use-case-lg" name="series-lg" value="Use Case" data-default-checked="True"/> Use Case<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-journal-lg" name="series-lg" value="Journal Article" data-default-checked="True"/> Journal Article<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-conf-paper-lg" name="series-lg" value="Conference Paper" data-default-checked="True"/> Conference Paper<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-book-lg" name="series-lg" value="Book" data-default-checked="True"/> Book<br/> </label> </div> </div> <div class="form-group"> <label for="pub-search-topics-lg"> Topics </label> <input name="topics-lg" id="topics-lg" name="Form.Topics" type="hidden" value=""/> <div class="form-control topics-selection" id="pub-search-topics-lg" contenteditable="true" data-drop-target="pub-search-topics-drop-lg" data-field-name="topics-lg" aria-haspopup="true" aria-expanded="false"> </div> <div class="topics-selection-dropdown desktop" id="pub-search-topics-drop-lg" style="display: none;" data-topics-selector=""><div class="col-sm-4"><strong>Security and Privacy</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27481" data-expander-for="/topics/security-and-privacy/cryptography"></i> <a data-topic-id="27481" data-topic-text="cryptography">cryptography</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27647" data-topic-text="digital signatures">digital signatures</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27648" data-topic-text="encryption">encryption</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27649" data-topic-text="key management">key management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27650" data-topic-text="message authentication">message authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27651" data-topic-text="post-quantum cryptography">post-quantum cryptography</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27652" data-topic-text="random number generation">random number generation</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27653" data-topic-text="secure hashing">secure hashing</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27482" data-topic-text="cybersecurity supply chain risk management">cybersecurity supply chain risk management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27483" data-topic-text="general security &amp; privacy">general security &amp; privacy</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27484" data-expander-for="/topics/security-and-privacy/identity-and-access-management"></i> <a data-topic-id="27484" data-topic-text="identity &amp; access management">identity &amp; access management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27663" data-topic-text="access authorization">access authorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27664" data-topic-text="access control">access control</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27665" data-topic-text="authentication">authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27666" data-topic-text="Personal Identity Verification">Personal Identity Verification</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27667" data-topic-text="public key infrastructure">public key infrastructure</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27485" data-expander-for="/topics/security-and-privacy/privacy"></i> <a data-topic-id="27485" data-topic-text="privacy">privacy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27680" data-topic-text="personally identifiable information">personally identifiable information</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27681" data-topic-text="privacy engineering">privacy engineering</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27486" data-expander-for="/topics/security-and-privacy/risk-management"></i> <a data-topic-id="27486" data-topic-text="risk management">risk management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27682" data-topic-text="categorization">categorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27683" data-topic-text="continuous monitoring">continuous monitoring</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-27486-27684" data-expander-for="/topics/security-and-privacy/risk-management/controls"></i> <a data-topic-id="27684" data-topic-text="controls">controls</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27767" data-topic-text="controls assessment">controls assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27768" data-topic-text="privacy controls">privacy controls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27769" data-topic-text="security controls">security controls</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27685" data-topic-text="risk assessment">risk assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27686" data-topic-text="roots of trust">roots of trust</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27687" data-topic-text="system authorization">system authorization</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-27486-27688" data-expander-for="/topics/security-and-privacy/risk-management/threats"></i> <a data-topic-id="27688" data-topic-text="threats">threats</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27770" data-topic-text="advanced persistent threats">advanced persistent threats</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27771" data-topic-text="botnets">botnets</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27772" data-topic-text="information sharing">information sharing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27773" data-topic-text="intrusion detection &amp; prevention">intrusion detection &amp; prevention</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27774" data-topic-text="malware">malware</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27689" data-topic-text="vulnerability management">vulnerability management</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27487" data-expander-for="/topics/security-and-privacy/security-and-behavior"></i> <a data-topic-id="27487" data-topic-text="security &amp; behavior">security &amp; behavior</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27709" data-topic-text="accessibility">accessibility</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27710" data-topic-text="behavior">behavior</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27711" data-topic-text="usability">usability</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27488" data-expander-for="/topics/security-and-privacy/security-measurement"></i> <a data-topic-id="27488" data-topic-text="security measurement">security measurement</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27690" data-topic-text="analytics">analytics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27691" data-topic-text="assurance">assurance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27692" data-topic-text="modeling">modeling</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27693" data-topic-text="testing &amp; validation">testing &amp; validation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27489" data-expander-for="/topics/security-and-privacy/security-programs-and-operations"></i> <a data-topic-id="27489" data-topic-text="security programs &amp; operations">security programs &amp; operations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27694" data-topic-text="acquisition">acquisition</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27695" data-topic-text="asset management">asset management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27696" data-topic-text="audit &amp; accountability">audit &amp; accountability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27697" data-topic-text="awareness training &amp; education">awareness training &amp; education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27698" data-topic-text="configuration management">configuration management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27699" data-topic-text="contingency planning">contingency planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27700" data-topic-text="incident response">incident response</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27701" data-topic-text="maintenance">maintenance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27702" data-topic-text="media protection">media protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27703" data-topic-text="patch management">patch management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27704" data-topic-text="personnel security">personnel security</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27705" data-topic-text="physical &amp; environmental protection">physical &amp; environmental protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27706" data-topic-text="planning">planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27707" data-topic-text="program management">program management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27708" data-topic-text="security automation">security automation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27490" data-expander-for="/topics/security-and-privacy/systems-security-engineering"></i> <a data-topic-id="27490" data-topic-text="systems security engineering">systems security engineering</a><ul style="display: none;"><li><i class="fa fa-plus fa-fw" id="topics-expander-27490-27713" data-expander-for="/topics/security-and-privacy/systems-security-engineering/trustworthiness"></i> <a data-topic-id="27713" data-topic-text="trustworthiness">trustworthiness</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27775" data-topic-text="reliability">reliability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27776" data-topic-text="resilience">resilience</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27777" data-topic-text="safety">safety</a></li></ul> </li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="36440" data-topic-text="zero trust">zero trust</a></li></ul><strong>Technologies</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27491" data-topic-text="artificial intelligence">artificial intelligence</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27492" data-topic-text="big data">big data</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27493" data-topic-text="biometrics">biometrics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27494" data-topic-text="blockchain">blockchain</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27495" data-topic-text="cloud &amp; virtualization">cloud &amp; virtualization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27496" data-topic-text="combinatorial testing">combinatorial testing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27497" data-topic-text="complexity">complexity</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24671-27499" data-expander-for="/topics/technologies/hardware"></i> <a data-topic-id="27499" data-topic-text="hardware">hardware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27714" data-topic-text="circuits">circuits</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27715" data-topic-text="personal computers">personal computers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27716" data-topic-text="sensors">sensors</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27498" data-topic-text="mobile">mobile</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24671-27500" data-expander-for="/topics/technologies/networks"></i> <a data-topic-id="27500" data-topic-text="networks">networks</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27717" data-topic-text="email">email</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27718" data-topic-text="firewalls">firewalls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27719" data-topic-text="internet">internet</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27501" data-topic-text="quantum information science">quantum information science</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27502" data-topic-text="servers">servers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27503" data-topic-text="smart cards">smart cards</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24671-27504" data-expander-for="/topics/technologies/software-firmware"></i> <a data-topic-id="27504" data-topic-text="software &amp; firmware">software &amp; firmware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27720" data-topic-text="BIOS">BIOS</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27721" data-topic-text="databases">databases</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27722" data-topic-text="operating systems">operating systems</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27505" data-topic-text="storage">storage</a></li></ul></div><div class="col-sm-4"><strong>Applications</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27456" data-topic-text="communications &amp; wireless">communications &amp; wireless</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27457" data-topic-text="cyber-physical systems">cyber-physical systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27458" data-topic-text="cybersecurity education">cybersecurity education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27459" data-topic-text="cybersecurity framework">cybersecurity framework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27460" data-topic-text="cybersecurity workforce">cybersecurity workforce</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27461" data-topic-text="enterprise">enterprise</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27462" data-topic-text="forensics">forensics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27463" data-topic-text="industrial control systems">industrial control systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27464" data-topic-text="Internet of Things">Internet of Things</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28914" data-topic-text="positioning navigation &amp; timing">positioning navigation &amp; timing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27465" data-topic-text="small &amp; medium business">small &amp; medium business</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27466" data-topic-text="telework">telework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27467" data-topic-text="voting">voting</a></li></ul><strong>Laws and Regulations</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-24673-27468" data-expander-for="/topics/laws-and-regulations/executive-documents"></i> <a data-topic-id="27468" data-topic-text="executive documents">executive documents</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27668" data-topic-text="Comprehensive National Cybersecurity Initiative">Comprehensive National Cybersecurity Initiative</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27669" data-topic-text="Cybersecurity Strategy and Implementation Plan">Cybersecurity Strategy and Implementation Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27670" data-topic-text="Cyberspace Policy Review">Cyberspace Policy Review</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27671" data-topic-text="Executive Order 13636">Executive Order 13636</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27672" data-topic-text="Executive Order 13702">Executive Order 13702</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27673" data-topic-text="Executive Order 13718">Executive Order 13718</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27674" data-topic-text="Executive Order 13800">Executive Order 13800</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28915" data-topic-text="Executive Order 13905">Executive Order 13905</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="36439" data-topic-text="Executive Order 14028">Executive Order 14028</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27675" data-topic-text="Federal Cybersecurity Research and Development Strategic Plan">Federal Cybersecurity Research and Development Strategic Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27676" data-topic-text="Homeland Security Presidential Directive 7">Homeland Security Presidential Directive 7</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27677" data-topic-text="Homeland Security Presidential Directive 12">Homeland Security Presidential Directive 12</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27678" data-topic-text="OMB Circular A-11">OMB Circular A-11</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27679" data-topic-text="OMB Circular A-130">OMB Circular A-130</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24673-27469" data-expander-for="/topics/laws-and-regulations/laws"></i> <a data-topic-id="27469" data-topic-text="laws">laws</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27654" data-topic-text="Cyber Security R&amp;D Act">Cyber Security R&D; Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27655" data-topic-text="Cybersecurity Enhancement Act">Cybersecurity Enhancement Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27656" data-topic-text="E-Government Act">E-Government Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27657" data-topic-text="Energy Independence and Security Act">Energy Independence and Security Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27658" data-topic-text="Federal Information Security Modernization Act">Federal Information Security Modernization Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27659" data-topic-text="First Responder Network Authority">First Responder Network Authority</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27660" data-topic-text="Health Insurance Portability and Accountability Act">Health Insurance Portability and Accountability Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27661" data-topic-text="Help America Vote Act">Help America Vote Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="36551" data-topic-text="Internet of Things Cybersecurity Improvement Act">Internet of Things Cybersecurity Improvement Act</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24673-27470" data-expander-for="/topics/laws-and-regulations/regulations"></i> <a data-topic-id="27470" data-topic-text="regulations">regulations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27662" data-topic-text="Federal Acquisition Regulation">Federal Acquisition Regulation</a></li></ul> </li></ul></div><div class="col-sm-4"><strong>Activities and Products</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27452" data-topic-text="annual reports">annual reports</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27453" data-topic-text="conferences &amp; workshops">conferences &amp; workshops</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27454" data-topic-text="reference materials">reference materials</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27455" data-topic-text="standards development">standards development</a></li></ul><strong>Sectors</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27471" data-topic-text="aerospace">aerospace</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24675-27472" data-expander-for="/topics/sectors/energy"></i> <a data-topic-id="27472" data-topic-text="energy">energy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27712" data-topic-text="smart grid">smart grid</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27473" data-topic-text="financial services">financial services</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27474" data-topic-text="healthcare">healthcare</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27475" data-topic-text="hospitality">hospitality</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27476" data-topic-text="manufacturing">manufacturing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27477" data-topic-text="public safety">public safety</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27478" data-topic-text="retail">retail</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27479" data-topic-text="telecommunications">telecommunications</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27480" data-topic-text="transportation">transportation</a></li></ul></div></div> <div class="form-inline topics-type"> <label class="radio-label">Match ANY: <input name="topicsMatch-lg" checked="checked" id="topicsMatch-any-lg" name="Form.TopicsMatch" type="radio" value="ANY"/></label> <label class="radio-label">Match ALL: <input name="topicsMatch-lg" id="topicsMatch-all-lg" name="Form.TopicsMatch" type="radio" value="ALL"/></label> </div> </div> <div class="form-group"> <label for="pub-search-controls-lg"> Control Family (800-53) </label> <input name="controls-lg" id="controls-lg" name="Form.Controls" type="hidden" value=""/> <div class="form-control controls-selection" id="pub-search-controls-lg" contenteditable="true" data-drop-target="pub-search-controls-drop-lg" data-field-name="controls-lg" aria-haspopup="true" aria-expanded="false"> </div> <div class="controls-selection-dropdown desktop" id="pub-search-controls-drop-lg" style="display: none;" data-controls-selector=""> <strong>Control Families</strong> <ul> <li><a data-control-id="63d54ae4-c6cf-4ae4-a398-f19298c74903">AC - Access Control</a></li> <li><a data-control-id="36fb0b10-f6ae-4e0e-803c-bece9c947fd8">AT - Awareness and Training</a></li> <li><a data-control-id="4243d52c-ff5e-417b-8e1b-8344ff811570">AU - Audit and Accountability</a></li> <li><a data-control-id="0d93bf29-4551-4b7d-9677-23d0eb0524e0">CA - Assessment, Authorization and Monitoring</a></li> <li><a data-control-id="809b7563-f050-4bbf-a0e4-7ad25411734d">CM - Configuration Management</a></li> <li><a data-control-id="da51be5c-b86d-4e32-9484-f94cf75b8217">CP - Contingency Planning</a></li> <li><a data-control-id="ed87a12a-b75a-4555-862c-52f071b7ddb0">IA - Identification and Authentication</a></li> <li><a data-control-id="4801756a-a4ed-4b64-8890-4169d9b6a9ce">IR - Incident Response</a></li> <li><a data-control-id="88089d1d-c115-41f7-92ad-a84abe6101fc">MA - Maintenance</a></li> <li><a data-control-id="3fb9de77-cb37-43fd-b8a5-e33576b8caa1">MP - Media Protection</a></li> <li><a data-control-id="f3b91e7e-2498-49ce-bd0f-5b9ce3bbd9e0">PE - Physical and Environmental Protection</a></li> <li><a data-control-id="641492d1-d2da-40e6-a523-f93fdb5358e9">PL - Planning</a></li> <li><a data-control-id="9d2a46b6-2530-4266-ae75-dab3ea78d7a0">PM - Program Management</a></li> <li><a data-control-id="205e7cff-23a5-4b59-85bc-168ae6e7d95f">PS - Personnel Security</a></li> <li><a data-control-id="09385da5-c3cd-4dcf-91e9-fd455b0ef704">PT - PII Processing and Transparency</a></li> <li><a data-control-id="e08f7835-ea6b-4b7c-9db3-33a3662a38d1">RA - Risk Assessment</a></li> <li><a data-control-id="8e2ea53d-c53d-480e-b374-eb5ab055a94b">SA - System and Services Acquisition</a></li> <li><a data-control-id="f35646b1-d701-4941-b1c5-8e872f6bb812">SC - System and Communications Protection</a></li> <li><a data-control-id="660d9ce0-9cfe-4f5e-890a-41670d010846">SI - System and Information Integrity</a></li> <li><a data-control-id="605d44df-5027-4c32-a228-c000bbcac173">SR - Supply Chain Risk Management</a></li> </ul> </div> <div class="form-inline controls-type"> <label class="radio-label">Match ANY: <input name="controlsMatch-lg" checked="checked" id="controlsMatch-any-lg" name="Form.ControlsMatch" type="radio" value="ANY"/></label> <label class="radio-label">Match ALL: <input name="controlsMatch-lg" id="controlsMatch-all-lg" name="Form.ControlsMatch" type="radio" value="ALL"/></label> </div> </div> <div style="display: none;" data-form-error-pane="true" class="text-danger"> <strong class="text-danger">Please fix the following:</strong> <ul data-form-error-list="true"> </ul> <div class="validation-summary-valid" data-valmsg-summary="true"><ul><li style="display:none"></li> </ul></div> </div> <div class="form-group"> <button type="submit" id="pubs-search-submit-lg" name="submit-btn" data-form-button="submit" class="btn">Search</button> <button type="reset" id="pubs-search-reset-lg" name="reset-btn" data-form-button="reset" class="btn">Reset</button> </div> <span style="display: none;" id="publications-status-info"> <p><strong>Final:</strong> Published documents.</p> <p><strong>Public Draft:</strong> Documents have been posted as Public Drafts, typically with a public comment period.</p> <p> <strong>Withdrawn:</strong> Documents that have been withdrawn, and are no longer current. This includes:<br/> - Final publications that have been withdrawn;<br/> - Public drafts that have been obsoleted by a subsequent draft or final publication;<br/> - Public drafts that have been retired—further development was discontinued. </p> </span> </form> </div> <div class="col-lg-9 col-md-8 col-sm-12 col-xs-12 col-xxs-12"> <h4>Search Results</h4> <form action="/web/20220708182845/https://csrc.nist.gov/publications/search" class="bs-callout bs-callout-success csrc-search-form hidden-lg hidden-md mobile-form" data-csrc-form="true" data-default-query="sortBy-lg=Number+DESC&amp;viewMode-lg=brief&amp;ipp-lg=ALL&amp;status-lg=Draft%2CFinal&amp;series-lg=SP" data-form-ignore-default="sortBy" data-form-name="pubSearchMobile" id="pubs-search-form-sm" method="get"> <div class="form-group"> <label for="keywords-sm">Search</label> <input name="keywords-sm" class="form-control" data-val="true" data-val-length="The field Search must be a string with a maximum length of 255." data-val-length-max="255" id="keywords-sm" name="Form.Keywords" type="text" value=""/> <em class="text-muted">Search publication record data<br/> (not a full text search)</em> </div> <div class="form-group"> <label for="sortBy-sm">Sort By</label> <div class="form-inline"> <select name="sortBy-sm" class="form-control" id="sortBy-sm" name="Form.SortBy"><option value="relevance">Relevance (best match)</option> <option value="releasedate DESC">Release Date (newest first)</option> <option value="releasedate ASC">Release Date (oldest first)</option> <option value="Series ASC">Series (A-Z)</option> <option value="Series DESC">Series (Z-A)</option> <option value="Number ASC">Number (lowest to highest)</option> <option selected="selected" value="Number DESC">Number (highest to lowest)</option> <option value="title asc">Title (A-Z)</option> <option value="title desc">Title (Z-A)</option> </select> </div> </div> <div class="form-group"> <label for="viewMode-sm">Results View</label> <select name="viewMode-sm" class="form-control" id="viewMode-sm" name="Form.ResultsViewMode"><option selected="selected" value="brief">Brief</option> <option value="summary">Summary</option> </select> </div> <div class="form-group form-inline"> <label for="ipp-sm" class="form-control-half">Items Per Page</label> <select name="ipp-sm" class="form-control" id="ipp-sm" name="Form.ItemsPerPage"><option value="25">25</option> <option value="50">50</option> <option value="75">75</option> <option value="100">100</option> <option selected="selected" value="all">All</option> </select> </div> <div class="form-group"> <p class="text-center"> <a href="#" data-form-show-name="advancedSearch" id="advanced-search-link"> Advanced Search <i class="fa fa-caret-down" aria-hidden="true" data-form-show-expanded="true" style="display: none;"></i> <i class="fa fa-caret-up" aria-hidden="true" data-form-show-expanded="false"></i> </a> </p> </div> <div style="display: none;" data-form-show-trigger="advancedSearch" data-form-show="false"> <div class="form-group"> <label for="dateFrom-sm">Date</label> <div class="form-inline form-date-inline"> <div class="input-group date" data-date-picker="true"> <input name="dateFrom-sm" class="form-control" data-control-type="date" data-val="true" data-val-date="The field Date must be a date." data-validation="true" data-validation-compare-field="dateTo-sm" data-validation-message="From date must be less than To date" data-validation-type="less-than-date" id="dateFrom-sm" name="Form.DateFrom" placeholder=" / / " type="text" value=""/> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> <div class="input-group date" data-date-picker="true"> <input name="dateTo-sm" class="form-control" data-control-type="date" data-val="true" data-val-date="The field DateTo must be a date." id="dateTo-sm" name="Form.DateTo" placeholder=" / / " type="text" value=""/> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> </div> </div> <div class="form-group"> <label for="status-all-sm"> Status <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="publications-status-info"></i> </label> <div class="form-inline status-type" style="margin-left: 1rem;"> <label class="meta-label"> <input type="checkbox" id="status-final-sm" name="status-sm" value="Final" data-default-checked="True" checked="'checked'"/> Final<br/> </label> <label class="meta-label"> <input type="checkbox" id="status-draft-sm" name="status-sm" value="Draft" data-default-checked="True" checked="'checked'"/> Public Draft<br/> </label> <label class="meta-label"> <input type="checkbox" id="status-withdrawn-sm" name="status-sm" value="Withdrawn" data-default-checked="True"/> Withdrawn<br/> </label> </div> </div> <div class="form-group"> <label for="pub-search-series"> Series <button type="button" id="series-all-sm" class="btn btn-sm btn-success" data-check-all="series-sm">Check All</button> <button type="button" id="series-clear-sm" class="btn btn-sm btn-success" data-check-none="series-sm">Clear</button> </label> <div class="form-inline series-type" style="margin-left: 1rem;"> <label class="meta-label"> <input type="checkbox" id="series-fips-sm" name="series-sm" value="FIPS" data-default-checked="True"/> FIPS<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-sp-sm" name="series-sm" value="SP" data-default-checked="True" checked="'checked'/"> SP<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-nistir-sm" name="series-sm" value="NISTIR" data-default-checked="True"/> NISTIR<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-itl-bul-sm" name="series-sm" value="ITL Bulletin" data-default-checked="True"/> ITL Bulletin<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-white-paper-sm" name="series-sm" value="White Paper" data-default-checked="True"/> White Paper<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-build-block-sm" name="series-sm" value="Building Block" data-default-checked="True"/> Building Block<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-use-case-sm" name="series-sm" value="Use Case" data-default-checked="True"/> Use Case<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-journal-sm" name="series-sm" value="Journal Article" data-default-checked="True"/> Journal Article<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-conf-paper-sm" name="series-sm" value="Conference Paper" data-default-checked="True"/> Conference Paper<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-book-sm" name="series-sm" value="Book" data-default-checked="True"/> Book<br/> </label> </div> </div> <div class="form-group"> <label for="pub-search-topics-sm"> Topics </label> <input name="topics-sm" id="topics-sm" name="Form.Topics" type="hidden" value=""/> <div class="form-control topics-selection" id="pub-search-topics-sm" contenteditable="true" data-drop-target="pub-search-topics-drop-sm" data-field-name="topics-sm" aria-haspopup="true" aria-expanded="false"> </div> <div class="topics-selection-dropdown desktop" id="pub-search-topics-drop-sm" style="display: none;" data-topics-selector=""><div class="col-sm-4"><strong>Security and Privacy</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27481" data-expander-for="/topics/security-and-privacy/cryptography"></i> <a data-topic-id="27481" data-topic-text="cryptography">cryptography</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27647" data-topic-text="digital signatures">digital signatures</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27648" data-topic-text="encryption">encryption</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27649" data-topic-text="key management">key management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27650" data-topic-text="message authentication">message authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27651" data-topic-text="post-quantum cryptography">post-quantum cryptography</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27652" data-topic-text="random number generation">random number generation</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27653" data-topic-text="secure hashing">secure hashing</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27482" data-topic-text="cybersecurity supply chain risk management">cybersecurity supply chain risk management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27483" data-topic-text="general security &amp; privacy">general security &amp; privacy</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27484" data-expander-for="/topics/security-and-privacy/identity-and-access-management"></i> <a data-topic-id="27484" data-topic-text="identity &amp; access management">identity &amp; access management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27663" data-topic-text="access authorization">access authorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27664" data-topic-text="access control">access control</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27665" data-topic-text="authentication">authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27666" data-topic-text="Personal Identity Verification">Personal Identity Verification</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27667" data-topic-text="public key infrastructure">public key infrastructure</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27485" data-expander-for="/topics/security-and-privacy/privacy"></i> <a data-topic-id="27485" data-topic-text="privacy">privacy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27680" data-topic-text="personally identifiable information">personally identifiable information</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27681" data-topic-text="privacy engineering">privacy engineering</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27486" data-expander-for="/topics/security-and-privacy/risk-management"></i> <a data-topic-id="27486" data-topic-text="risk management">risk management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27682" data-topic-text="categorization">categorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27683" data-topic-text="continuous monitoring">continuous monitoring</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-27486-27684" data-expander-for="/topics/security-and-privacy/risk-management/controls"></i> <a data-topic-id="27684" data-topic-text="controls">controls</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27767" data-topic-text="controls assessment">controls assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27768" data-topic-text="privacy controls">privacy controls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27769" data-topic-text="security controls">security controls</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27685" data-topic-text="risk assessment">risk assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27686" data-topic-text="roots of trust">roots of trust</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27687" data-topic-text="system authorization">system authorization</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-27486-27688" data-expander-for="/topics/security-and-privacy/risk-management/threats"></i> <a data-topic-id="27688" data-topic-text="threats">threats</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27770" data-topic-text="advanced persistent threats">advanced persistent threats</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27771" data-topic-text="botnets">botnets</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27772" data-topic-text="information sharing">information sharing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27773" data-topic-text="intrusion detection &amp; prevention">intrusion detection &amp; prevention</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27774" data-topic-text="malware">malware</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27689" data-topic-text="vulnerability management">vulnerability management</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27487" data-expander-for="/topics/security-and-privacy/security-and-behavior"></i> <a data-topic-id="27487" data-topic-text="security &amp; behavior">security &amp; behavior</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27709" data-topic-text="accessibility">accessibility</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27710" data-topic-text="behavior">behavior</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27711" data-topic-text="usability">usability</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27488" data-expander-for="/topics/security-and-privacy/security-measurement"></i> <a data-topic-id="27488" data-topic-text="security measurement">security measurement</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27690" data-topic-text="analytics">analytics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27691" data-topic-text="assurance">assurance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27692" data-topic-text="modeling">modeling</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27693" data-topic-text="testing &amp; validation">testing &amp; validation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27489" data-expander-for="/topics/security-and-privacy/security-programs-and-operations"></i> <a data-topic-id="27489" data-topic-text="security programs &amp; operations">security programs &amp; operations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27694" data-topic-text="acquisition">acquisition</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27695" data-topic-text="asset management">asset management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27696" data-topic-text="audit &amp; accountability">audit &amp; accountability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27697" data-topic-text="awareness training &amp; education">awareness training &amp; education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27698" data-topic-text="configuration management">configuration management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27699" data-topic-text="contingency planning">contingency planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27700" data-topic-text="incident response">incident response</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27701" data-topic-text="maintenance">maintenance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27702" data-topic-text="media protection">media protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27703" data-topic-text="patch management">patch management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27704" data-topic-text="personnel security">personnel security</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27705" data-topic-text="physical &amp; environmental protection">physical &amp; environmental protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27706" data-topic-text="planning">planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27707" data-topic-text="program management">program management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27708" data-topic-text="security automation">security automation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27490" data-expander-for="/topics/security-and-privacy/systems-security-engineering"></i> <a data-topic-id="27490" data-topic-text="systems security engineering">systems security engineering</a><ul style="display: none;"><li><i class="fa fa-plus fa-fw" id="topics-expander-27490-27713" data-expander-for="/topics/security-and-privacy/systems-security-engineering/trustworthiness"></i> <a data-topic-id="27713" data-topic-text="trustworthiness">trustworthiness</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27775" data-topic-text="reliability">reliability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27776" data-topic-text="resilience">resilience</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27777" data-topic-text="safety">safety</a></li></ul> </li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="36440" data-topic-text="zero trust">zero trust</a></li></ul><strong>Technologies</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27491" data-topic-text="artificial intelligence">artificial intelligence</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27492" data-topic-text="big data">big data</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27493" data-topic-text="biometrics">biometrics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27494" data-topic-text="blockchain">blockchain</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27495" data-topic-text="cloud &amp; virtualization">cloud &amp; virtualization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27496" data-topic-text="combinatorial testing">combinatorial testing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27497" data-topic-text="complexity">complexity</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24671-27499" data-expander-for="/topics/technologies/hardware"></i> <a data-topic-id="27499" data-topic-text="hardware">hardware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27714" data-topic-text="circuits">circuits</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27715" data-topic-text="personal computers">personal computers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27716" data-topic-text="sensors">sensors</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27498" data-topic-text="mobile">mobile</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24671-27500" data-expander-for="/topics/technologies/networks"></i> <a data-topic-id="27500" data-topic-text="networks">networks</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27717" data-topic-text="email">email</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27718" data-topic-text="firewalls">firewalls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27719" data-topic-text="internet">internet</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27501" data-topic-text="quantum information science">quantum information science</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27502" data-topic-text="servers">servers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27503" data-topic-text="smart cards">smart cards</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24671-27504" data-expander-for="/topics/technologies/software-firmware"></i> <a data-topic-id="27504" data-topic-text="software &amp; firmware">software &amp; firmware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27720" data-topic-text="BIOS">BIOS</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27721" data-topic-text="databases">databases</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27722" data-topic-text="operating systems">operating systems</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27505" data-topic-text="storage">storage</a></li></ul></div><div class="col-sm-4"><strong>Applications</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27456" data-topic-text="communications &amp; wireless">communications &amp; wireless</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27457" data-topic-text="cyber-physical systems">cyber-physical systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27458" data-topic-text="cybersecurity education">cybersecurity education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27459" data-topic-text="cybersecurity framework">cybersecurity framework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27460" data-topic-text="cybersecurity workforce">cybersecurity workforce</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27461" data-topic-text="enterprise">enterprise</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27462" data-topic-text="forensics">forensics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27463" data-topic-text="industrial control systems">industrial control systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27464" data-topic-text="Internet of Things">Internet of Things</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28914" data-topic-text="positioning navigation &amp; timing">positioning navigation &amp; timing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27465" data-topic-text="small &amp; medium business">small &amp; medium business</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27466" data-topic-text="telework">telework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27467" data-topic-text="voting">voting</a></li></ul><strong>Laws and Regulations</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-24673-27468" data-expander-for="/topics/laws-and-regulations/executive-documents"></i> <a data-topic-id="27468" data-topic-text="executive documents">executive documents</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27668" data-topic-text="Comprehensive National Cybersecurity Initiative">Comprehensive National Cybersecurity Initiative</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27669" data-topic-text="Cybersecurity Strategy and Implementation Plan">Cybersecurity Strategy and Implementation Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27670" data-topic-text="Cyberspace Policy Review">Cyberspace Policy Review</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27671" data-topic-text="Executive Order 13636">Executive Order 13636</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27672" data-topic-text="Executive Order 13702">Executive Order 13702</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27673" data-topic-text="Executive Order 13718">Executive Order 13718</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27674" data-topic-text="Executive Order 13800">Executive Order 13800</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28915" data-topic-text="Executive Order 13905">Executive Order 13905</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="36439" data-topic-text="Executive Order 14028">Executive Order 14028</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27675" data-topic-text="Federal Cybersecurity Research and Development Strategic Plan">Federal Cybersecurity Research and Development Strategic Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27676" data-topic-text="Homeland Security Presidential Directive 7">Homeland Security Presidential Directive 7</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27677" data-topic-text="Homeland Security Presidential Directive 12">Homeland Security Presidential Directive 12</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27678" data-topic-text="OMB Circular A-11">OMB Circular A-11</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27679" data-topic-text="OMB Circular A-130">OMB Circular A-130</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24673-27469" data-expander-for="/topics/laws-and-regulations/laws"></i> <a data-topic-id="27469" data-topic-text="laws">laws</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27654" data-topic-text="Cyber Security R&amp;D Act">Cyber Security R&D; Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27655" data-topic-text="Cybersecurity Enhancement Act">Cybersecurity Enhancement Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27656" data-topic-text="E-Government Act">E-Government Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27657" data-topic-text="Energy Independence and Security Act">Energy Independence and Security Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27658" data-topic-text="Federal Information Security Modernization Act">Federal Information Security Modernization Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27659" data-topic-text="First Responder Network Authority">First Responder Network Authority</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27660" data-topic-text="Health Insurance Portability and Accountability Act">Health Insurance Portability and Accountability Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27661" data-topic-text="Help America Vote Act">Help America Vote Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="36551" data-topic-text="Internet of Things Cybersecurity Improvement Act">Internet of Things Cybersecurity Improvement Act</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24673-27470" data-expander-for="/topics/laws-and-regulations/regulations"></i> <a data-topic-id="27470" data-topic-text="regulations">regulations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27662" data-topic-text="Federal Acquisition Regulation">Federal Acquisition Regulation</a></li></ul> </li></ul></div><div class="col-sm-4"><strong>Activities and Products</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27452" data-topic-text="annual reports">annual reports</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27453" data-topic-text="conferences &amp; workshops">conferences &amp; workshops</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27454" data-topic-text="reference materials">reference materials</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27455" data-topic-text="standards development">standards development</a></li></ul><strong>Sectors</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27471" data-topic-text="aerospace">aerospace</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24675-27472" data-expander-for="/topics/sectors/energy"></i> <a data-topic-id="27472" data-topic-text="energy">energy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27712" data-topic-text="smart grid">smart grid</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27473" data-topic-text="financial services">financial services</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27474" data-topic-text="healthcare">healthcare</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27475" data-topic-text="hospitality">hospitality</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27476" data-topic-text="manufacturing">manufacturing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27477" data-topic-text="public safety">public safety</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27478" data-topic-text="retail">retail</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27479" data-topic-text="telecommunications">telecommunications</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27480" data-topic-text="transportation">transportation</a></li></ul></div></div> <div class="form-inline topics-type"> <label class="radio-label">Match ANY: <input name="topicsMatch-sm" checked="checked" id="topicsMatch-any-sm" name="Form.TopicsMatch" type="radio" value="ANY"/></label> <label class="radio-label">Match ALL: <input name="topicsMatch-sm" id="topicsMatch-all-sm" name="Form.TopicsMatch" type="radio" value="ALL"/></label> </div> </div> <div class="form-group"> <label for="pub-search-controls-sm"> Control Family (800-53) </label> <input name="controls-sm" id="controls-sm" name="Form.Controls" type="hidden" value=""/> <div class="form-control controls-selection" id="pub-search-controls-sm" contenteditable="true" data-drop-target="pub-search-controls-drop-sm" data-field-name="controls-sm" aria-haspopup="true" aria-expanded="false"> </div> <div class="controls-selection-dropdown desktop" id="pub-search-controls-drop-sm" style="display: none;" data-controls-selector=""> <strong>Control Families</strong> <ul> <li><a data-control-id="63d54ae4-c6cf-4ae4-a398-f19298c74903">AC - Access Control</a></li> <li><a data-control-id="36fb0b10-f6ae-4e0e-803c-bece9c947fd8">AT - Awareness and Training</a></li> <li><a data-control-id="4243d52c-ff5e-417b-8e1b-8344ff811570">AU - Audit and Accountability</a></li> <li><a data-control-id="0d93bf29-4551-4b7d-9677-23d0eb0524e0">CA - Assessment, Authorization and Monitoring</a></li> <li><a data-control-id="809b7563-f050-4bbf-a0e4-7ad25411734d">CM - Configuration Management</a></li> <li><a data-control-id="da51be5c-b86d-4e32-9484-f94cf75b8217">CP - Contingency Planning</a></li> <li><a data-control-id="ed87a12a-b75a-4555-862c-52f071b7ddb0">IA - Identification and Authentication</a></li> <li><a data-control-id="4801756a-a4ed-4b64-8890-4169d9b6a9ce">IR - Incident Response</a></li> <li><a data-control-id="88089d1d-c115-41f7-92ad-a84abe6101fc">MA - Maintenance</a></li> <li><a data-control-id="3fb9de77-cb37-43fd-b8a5-e33576b8caa1">MP - Media Protection</a></li> <li><a data-control-id="f3b91e7e-2498-49ce-bd0f-5b9ce3bbd9e0">PE - Physical and Environmental Protection</a></li> <li><a data-control-id="641492d1-d2da-40e6-a523-f93fdb5358e9">PL - Planning</a></li> <li><a data-control-id="9d2a46b6-2530-4266-ae75-dab3ea78d7a0">PM - Program Management</a></li> <li><a data-control-id="205e7cff-23a5-4b59-85bc-168ae6e7d95f">PS - Personnel Security</a></li> <li><a data-control-id="09385da5-c3cd-4dcf-91e9-fd455b0ef704">PT - PII Processing and Transparency</a></li> <li><a data-control-id="e08f7835-ea6b-4b7c-9db3-33a3662a38d1">RA - Risk Assessment</a></li> <li><a data-control-id="8e2ea53d-c53d-480e-b374-eb5ab055a94b">SA - System and Services Acquisition</a></li> <li><a data-control-id="f35646b1-d701-4941-b1c5-8e872f6bb812">SC - System and Communications Protection</a></li> <li><a data-control-id="660d9ce0-9cfe-4f5e-890a-41670d010846">SI - System and Information Integrity</a></li> <li><a data-control-id="605d44df-5027-4c32-a228-c000bbcac173">SR - Supply Chain Risk Management</a></li> </ul> </div> <div class="form-inline controls-type"> <label class="radio-label">Match ANY: <input name="controlsMatch-sm" checked="checked" id="controlsMatch-any-sm" name="Form.ControlsMatch" type="radio" value="ANY"/></label> <label class="radio-label">Match ALL: <input name="controlsMatch-sm" id="controlsMatch-all-sm" name="Form.ControlsMatch" type="radio" value="ALL"/></label> </div> </div> </div> <div style="display: none;" data-form-error-pane="true" class="text-danger"> <strong class="text-danger">Please fix the following:</strong> <ul data-form-error-list="true"> </ul> <div class="validation-summary-valid" data-valmsg-summary="true"><ul><li style="display:none"></li> </ul></div> </div> <div class="form-group"> <button type="submit" id="pubs-search-submit-sm" name="submit-btn" data-form-button="submit" class="btn">Search</button> <button type="reset" id="pubs-search-reset-sm" name="reset-btn" data-form-button="reset" class="btn">Reset</button> </div> <span style="display: none;" id="publications-status-info"> <p><strong>Final:</strong> Published documents.</p> <p><strong>Public Draft:</strong> Documents have been posted as Public Drafts, typically with a public comment period.</p> <p> <strong>Withdrawn:</strong> Documents that have been withdrawn, and are no longer current. This includes:<br/> - Final publications that have been withdrawn;<br/> - Public drafts that have been obsoleted by a subsequent draft or final publication;<br/> - Public drafts that have been retired—further development was discontinued. </p> </span> </form> <div id="search-criteria-container" data-target-form="pubSearchDesktop"></div> <div class="row top-pagination-area"> <div class="col-md-6 col-sm-12"> <span id="showing-results-text" data-total-pages="1" data-first-record="1" data-last-record="234" data-current-page="1" data-items-per-page="0" data-total-results="234">Showing <strong id="showing-results-total">234</strong> matching records.</span> </div> <div class="col-md-6 col-sm-12"> <span class="pull-right hidden-sm hidden-xs hidden-xxs"> <span class="pagination-links" id="top-pagination-container" data-total-pages="0" data-min-page="1" data-max-page="0" data-current-page="1" data-show-first="False" data-show-last="True"></span> </span> <p class="text-center hidden-md hidden-lg"> <span class="pagination-links" id="mobile-top-pagination-container" data-total-pages="0" data-min-page="1" data-max-page="0" data-current-page="1" data-show-first="False" data-show-last="True"></span> </p> </div> </div> <table class="table table-striped table-condensed publications-table table-bordered" id="publications-results-table" data-total-records="234" data-page="1" data-first-record="1" data-last-record="234" data-ipp="0"> <thead> <tr> <th nowrap class="hidden-sm hidden-xs hidden-xxs">Series</th> <th nowrap class="hidden-sm hidden-xs hidden-xxs">Number</th> <th nowrap> <span class="hidden-sm hidden-xs hidden-xxs">Title</span> <span class="hidden-md hidden-lg">Publications</span> </th> <th nowrap class="hidden-sm hidden-xs hidden-xxs">Status</th> <th nowrap class="hidden-sm hidden-xs hidden-xxs">Release Date</th> </tr> </thead> <tbody> <tr id="result-1"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-1">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-1"> 1800-35</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-35/draft" id="pub-title-link-1">Implementing a Zero Trust Architecture (Preliminary Draft)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-1">SP 1800-35 (Draft)</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-35/draft" class="mobile-pub-title" id="pub-title-link-sm-1">Implementing a Zero Trust Architecture (Preliminary Draft)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-1">7/07/2022</strong> <br/> Status: <span id="pub-status-sm-1">Draft</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-1"> <span id="download-value-1-0"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/sites/default/files/2022-07/zta-nist-sp-1800-35b-preliminary-draft.pdf">NIST SP 1800-35B iprd</a>; </span> <span id="download-value-1-1"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/sites/default/files/2022-06/zta-nist-sp-1800-35a-preliminary-draft.pdf">NIST SP 1800-35A iprd</a>; </span> <span id="download-value-1-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/projects/implementing-zero-trust-architecture">Project homepage</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-1"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-1"> 7/07/2022 </td> </tr> <tr id="result-2"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-2">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-2"> 1800-34</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-34/draft" id="pub-title-link-2">Validating the Integrity of Computing Devices</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-2">SP 1800-34 (Draft)</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-34/draft" class="mobile-pub-title" id="pub-title-link-sm-2">Validating the Integrity of Computing Devices</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-2">6/23/2022</strong> <br/> Status: <span id="pub-status-sm-2">Draft</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-2"> <span id="download-value-2-0"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/publications/practice-guide/validating-integrity-computing-devices-nist-1800-34-practice-guide">NIST SP 1800-34 ipd</a>; </span> <span id="download-value-2-1"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/supply-chain-assurance">Project homepage</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-2"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-2"> 6/23/2022 </td> </tr> <tr id="result-3"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-3">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-3"> 1800-33</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-33/draft" id="pub-title-link-3">5G Cybersecurity (Preliminary Draft)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-3">SP 1800-33 (Draft)</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-33/draft" class="mobile-pub-title" id="pub-title-link-sm-3">5G Cybersecurity (Preliminary Draft)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-3">4/25/2022</strong> <br/> Status: <span id="pub-status-sm-3">Draft</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-3"> <span id="download-value-3-0"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/sites/default/files/2022-04/nist-5G-sp1800-33b-preliminary-draft.pdf">SP 1800-33B (Prelim. Draft)</a>; </span> <span id="download-value-3-1"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/5g-cybersecurity">Project homepage</a>; </span> <span id="download-value-3-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/sites/default/files/legacy-files/nist-5G-sp1800-33a-preliminary-draft.pdf">SP 1800-33A (Prelim. Draft)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-3"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-3"> 4/25/2022 </td> </tr> <tr id="result-4"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-4">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-4"> 1800-32</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-32/final" id="pub-title-link-4">Securing Distributed Energy Resources: An Example of Industrial Internet of Things Cybersecurity</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-4">SP 1800-32</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-32/final" class="mobile-pub-title" id="pub-title-link-sm-4">Securing Distributed Energy Resources: An Example of Industrial Internet of Things Cybersecurity</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-4">2/02/2022</strong> <br/> Status: <span id="pub-status-sm-4">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-4"> <span id="download-value-4-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.1800-32">SP 1800-32 (DOI)</a>; </span> <span id="download-value-4-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-32.pdf">Local Download</a>; </span> <span id="download-value-4-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/publications/practice-guide/securing-distributed-energy-resources-nist-sp-1800-32-practice-guide">SP 1800-32 files</a>; </span> <span id="download-value-4-3"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/iiot">Project homepage</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-4"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-4"> 2/02/2022 </td> </tr> <tr id="result-5"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-5">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-5"> 1800-31</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-31/final" id="pub-title-link-5">Improving Enterprise Patching for General IT Systems: Utilizing Existing Tools and Performing Processes in Better Ways</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-5">SP 1800-31</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-31/final" class="mobile-pub-title" id="pub-title-link-sm-5">Improving Enterprise Patching for General IT Systems: Utilizing Existing Tools and Performing Processes in Better Ways</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-5">4/06/2022</strong> <br/> Status: <span id="pub-status-sm-5">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-5"> <span id="download-value-5-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.1800-31">SP 1800-31 (DOI)</a>; </span> <span id="download-value-5-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-31.pdf">Local Download</a>; </span> <span id="download-value-5-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/projects/critical-cybersecurity-hygiene-patching-enterprise">Project homepage</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-5"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-5"> 4/06/2022 </td> </tr> <tr id="result-6"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-6">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-6"> 1800-30</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-30/final" id="pub-title-link-6">Securing Telehealth Remote Patient Monitoring Ecosystem</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-6">SP 1800-30</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-30/final" class="mobile-pub-title" id="pub-title-link-sm-6">Securing Telehealth Remote Patient Monitoring Ecosystem</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-6">2/22/2022</strong> <br/> Status: <span id="pub-status-sm-6">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-6"> <span id="download-value-6-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.1800-30">SP 1800-30 (DOI)</a>; </span> <span id="download-value-6-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-30.pdf">Local Download</a>; </span> <span id="download-value-6-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/publications/practice-guide/securing-telehealth-remote-patient-monitoring-ecosystem-nist-sp-1800-30">SP 1800-30 files</a>; </span> <span id="download-value-6-3"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/healthcare/securing-telehealth-remote-patient-monitoring-ecosystem">Project homepage</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-6"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-6"> 2/22/2022 </td> </tr> <tr id="result-7"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-7">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-7"> 1800-27</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-27/final" id="pub-title-link-7">Securing Property Management Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-7">SP 1800-27</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-27/final" class="mobile-pub-title" id="pub-title-link-sm-7">Securing Property Management Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-7">3/30/2021</strong> <br/> Status: <span id="pub-status-sm-7">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-7"> <span id="download-value-7-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.1800-27">SP 1800-27 (DOI)</a>; </span> <span id="download-value-7-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-27.pdf">Local Download</a>; </span> <span id="download-value-7-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/publications/practice-guide/securing-property-management-systems-nist-sp-1800-27-practice-guide-final">SP 1800-27 files</a>; </span> <span id="download-value-7-3"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/securing-property-management-systems">Project homepage</a>; </span> <span id="download-value-7-4"> <a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/news-events/news/2021/03/nist-offers-cybersecurity-guide-tailored-hospitality-industry">NIST News article</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-7"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-7"> 3/30/2021 </td> </tr> <tr id="result-8"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-8">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-8"> 1800-26</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-26/final" id="pub-title-link-8">Data Integrity: Detecting and Responding to Ransomware and Other Destructive Events</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-8">SP 1800-26</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-26/final" class="mobile-pub-title" id="pub-title-link-sm-8">Data Integrity: Detecting and Responding to Ransomware and Other Destructive Events</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-8">12/08/2020</strong> <br/> Status: <span id="pub-status-sm-8">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-8"> <span id="download-value-8-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.1800-26">SP 1800-26 (DOI)</a>; </span> <span id="download-value-8-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-26.pdf">Local Download</a>; </span> <span id="download-value-8-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/publications/practice-guide/data-integrity-detecting-and-responding-ransomware-final">SP 1800-26 files</a>; </span> <span id="download-value-8-3"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/data-integrity-detecting-and-responding-ransomware-and-other-destructive-events">Project homepage</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-8"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-8"> 12/08/2020 </td> </tr> <tr id="result-9"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-9">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-9"> 1800-25</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-25/final" id="pub-title-link-9">Data Integrity: Identifying and Protecting Assets Against Ransomware and Other Destructive Events</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-9">SP 1800-25</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-25/final" class="mobile-pub-title" id="pub-title-link-sm-9">Data Integrity: Identifying and Protecting Assets Against Ransomware and Other Destructive Events</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-9">12/08/2020</strong> <br/> Status: <span id="pub-status-sm-9">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-9"> <span id="download-value-9-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.1800-25">SP 1800-25 (DOI)</a>; </span> <span id="download-value-9-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-25.pdf">Local Download</a>; </span> <span id="download-value-9-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/publications/practice-guide/data-integrity-identifying-and-protecting-assets-against-ransomware-final">SP 1800-25 files</a>; </span> <span id="download-value-9-3"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/data-integrity-identifying-and-protecting-assets-against-ransomware-and-other-destructive-events">Project homepage</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-9"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-9"> 12/08/2020 </td> </tr> <tr id="result-10"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-10">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-10"> 1800-24</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-24/final" id="pub-title-link-10">Securing Picture Archiving and Communication System (PACS): Cybersecurity for the Healthcare Sector</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-10">SP 1800-24</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-24/final" class="mobile-pub-title" id="pub-title-link-sm-10">Securing Picture Archiving and Communication System (PACS): Cybersecurity for the Healthcare Sector</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-10">12/21/2020</strong> <br/> Status: <span id="pub-status-sm-10">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-10"> <span id="download-value-10-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.1800-24">SP 1800-24 (DOI)</a>; </span> <span id="download-value-10-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-24.pdf">Local Download</a>; </span> <span id="download-value-10-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/publications/practice-guide/securing-picture-archiving-and-communication-system-nist-sp-1800-24-final">SP 1800-24 files</a>; </span> <span id="download-value-10-3"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/healthcare/securing-picture-archiving-and-communication-system">Project homepage</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-10"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-10"> 12/21/2020 </td> </tr> <tr id="result-11"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-11">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-11"> 1800-23</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-23/final" id="pub-title-link-11">Energy Sector Asset Management: For Electric Utilities, Oil &amp; Gas Industry</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-11">SP 1800-23</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-23/final" class="mobile-pub-title" id="pub-title-link-sm-11">Energy Sector Asset Management: For Electric Utilities, Oil &amp; Gas Industry</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-11">5/20/2020</strong> <br/> Status: <span id="pub-status-sm-11">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-11"> <span id="download-value-11-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.1800-23">SP 1800-23 (DOI)</a>; </span> <span id="download-value-11-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-23.pdf">Local Download</a>; </span> <span id="download-value-11-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/publications/practice-guide/energy-sector-asset-management-nist-sp-1800-23-practice-guide-final">SP 1800-23 files</a>; </span> <span id="download-value-11-3"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/energy/asset-management">Project homepage</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-11"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-11"> 5/20/2020 </td> </tr> <tr id="result-12"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-12">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-12"> 1800-22</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-22/draft" id="pub-title-link-12">Mobile Device Security: Bring Your Own Device (BYOD)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-12">SP 1800-22 (Draft)</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-22/draft" class="mobile-pub-title" id="pub-title-link-sm-12">Mobile Device Security: Bring Your Own Device (BYOD)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-12">3/18/2021</strong> <br/> Status: <span id="pub-status-sm-12">Draft</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-12"> <span id="download-value-12-0"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/publications/practice-guide/mobile-device-security-bring-your-own-device-nist-sp-1800-22-draft">Draft SP 1800-22</a>; </span> <span id="download-value-12-1"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/mobile-device-security/bring-your-own-device">Project homepage</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-12"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-12"> 3/18/2021 </td> </tr> <tr id="result-13"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-13">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-13"> 1800-21</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-21/final" id="pub-title-link-13">Mobile Device Security: Corporate-Owned Personally-Enabled (COPE)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-13">SP 1800-21</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-21/final" class="mobile-pub-title" id="pub-title-link-sm-13">Mobile Device Security: Corporate-Owned Personally-Enabled (COPE)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-13">9/15/2020</strong> <br/> Status: <span id="pub-status-sm-13">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-13"> <span id="download-value-13-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.1800-21">SP 1800-21 (DOI)</a>; </span> <span id="download-value-13-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-21.pdf">Local Download</a>; </span> <span id="download-value-13-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/publications/practice-guide/mobile-device-security-corporate-owned-personally-enabled-nist-sp-1800-21-final">SP 1800-21 files</a>; </span> <span id="download-value-13-3"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/mobile-device-security/corporate-owned-personally-enabled">Project homepage</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-13"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-13"> 9/15/2020 </td> </tr> <tr id="result-14"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-14">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-14"> 1800-19</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-19/final" id="pub-title-link-14">Trusted Cloud: Security Practice Guide for VMware Hybrid Cloud Infrastructure as a Service (IaaS) Environments</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-14">SP 1800-19</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-19/final" class="mobile-pub-title" id="pub-title-link-sm-14">Trusted Cloud: Security Practice Guide for VMware Hybrid Cloud Infrastructure as a Service (IaaS) Environments</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-14">4/20/2022</strong> <br/> Status: <span id="pub-status-sm-14">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-14"> <span id="download-value-14-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.1800-19">SP 1800-19 (DOI)</a>; </span> <span id="download-value-14-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-19.pdf">Local Download</a>; </span> <span id="download-value-14-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/projects/trusted-cloud-vmware-hybrid-cloud-iaas-environments">Project homepage</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-14"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-14"> 4/20/2022 </td> </tr> <tr id="result-15"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-15">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-15"> 1800-18</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-18/draft" id="pub-title-link-15">Privileged Account Management for the Financial Services Sector</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-15">SP 1800-18 (Draft)</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-18/draft" class="mobile-pub-title" id="pub-title-link-sm-15">Privileged Account Management for the Financial Services Sector</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-15">9/28/2018</strong> <br/> Status: <span id="pub-status-sm-15">Draft</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-15"> <span id="download-value-15-0"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/publications/practice-guide/privileged-account-management-financial-services-sector-nist-sp-1800-18-draft">Draft SP 1800-18</a>; </span> <span id="download-value-15-1"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/financial-services/privileged-account-management">Project homepage</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-15"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-15"> 9/28/2018 </td> </tr> <tr id="result-16"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-16">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-16"> 1800-17</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-17/final" id="pub-title-link-16">Multifactor Authentication for E-Commerce: Risk-Based, FIDO Universal Second Factor Implementations for Purchasers</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-16">SP 1800-17</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-17/final" class="mobile-pub-title" id="pub-title-link-sm-16">Multifactor Authentication for E-Commerce: Risk-Based, FIDO Universal Second Factor Implementations for Purchasers</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-16">7/30/2019</strong> <br/> Status: <span id="pub-status-sm-16">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-16"> <span id="download-value-16-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.1800-17">SP 1800-17 (DOI)</a>; </span> <span id="download-value-16-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-17.pdf">Local Download</a>; </span> <span id="download-value-16-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/publications/practice-guide/multifactor-authentication-e-commerce-nist-sp-1800-17-practice-guide-final">SP 1800-17 files</a>; </span> <span id="download-value-16-3"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/multifactor-authentication-e-commerce">Project homepage</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-16"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-16"> 7/30/2019 </td> </tr> <tr id="result-17"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-17">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-17"> 1800-16</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-16/final" id="pub-title-link-17">Securing Web Transactions: TLS Server Certificate Management</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-17">SP 1800-16</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-16/final" class="mobile-pub-title" id="pub-title-link-sm-17">Securing Web Transactions: TLS Server Certificate Management</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-17">6/16/2020</strong> <br/> Status: <span id="pub-status-sm-17">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-17"> <span id="download-value-17-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.1800-16">SP 1800-16 (DOI)</a>; </span> <span id="download-value-17-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-16.pdf">Local Download</a>; </span> <span id="download-value-17-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/publications/practice-guide/securing-web-transactions-nist-sp-1800-16-practice-guide-final">SP 1800-16 files</a>; </span> <span id="download-value-17-3"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/tls-server-certificate-management">Project homepage</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-17"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-17"> 6/16/2020 </td> </tr> <tr id="result-18"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-18">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-18"> 1800-15</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-15/final" id="pub-title-link-18">Securing Small-Business and Home Internet of Things (IoT) Devices: Mitigating Network-Based Attacks Using Manufacturer Usage Description (MUD)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-18">SP 1800-15</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-15/final" class="mobile-pub-title" id="pub-title-link-sm-18">Securing Small-Business and Home Internet of Things (IoT) Devices: Mitigating Network-Based Attacks Using Manufacturer Usage Description (MUD)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-18">5/26/2021</strong> <br/> Status: <span id="pub-status-sm-18">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-18"> <span id="download-value-18-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.1800-15">SP 1800-15 (DOI)</a>; </span> <span id="download-value-18-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-15.pdf">Local Download</a>; </span> <span id="download-value-18-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/publications/practice-guide/securing-small-business-and-home-internet-things-iot-devices-mitigating-final">SP 1800-15 files</a>; </span> <span id="download-value-18-3"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/projects/securing-home-iot-devices-using-mud">Project homepage</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-18"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-18"> 5/26/2021 </td> </tr> <tr id="result-19"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-19">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-19"> 1800-14</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-14/final" id="pub-title-link-19">Protecting the Integrity of Internet Routing: Border Gateway Protocol (BGP) Route Origin Validation</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-19">SP 1800-14</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-14/final" class="mobile-pub-title" id="pub-title-link-sm-19">Protecting the Integrity of Internet Routing: Border Gateway Protocol (BGP) Route Origin Validation</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-19">6/28/2019</strong> <br/> Status: <span id="pub-status-sm-19">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-19"> <span id="download-value-19-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.1800-14">SP 1800-14 (DOI)</a>; </span> <span id="download-value-19-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-14.pdf">Local Download</a>; </span> <span id="download-value-19-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/publications/practice-guide/protecting-integrity-internet-routing-nist-sp-1800-14-practice-guide-final">SP 1800-14 files</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-19"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-19"> 6/28/2019 </td> </tr> <tr id="result-20"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-20">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-20"> 1800-13</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-13/final" id="pub-title-link-20">Mobile Application Single Sign-On: Improving Authentication for Public Safety First Responders</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-20">SP 1800-13</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-13/final" class="mobile-pub-title" id="pub-title-link-sm-20">Mobile Application Single Sign-On: Improving Authentication for Public Safety First Responders</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-20">8/25/2021</strong> <br/> Status: <span id="pub-status-sm-20">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-20"> <span id="download-value-20-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.1800-13">SP 1800-13 (DOI)</a>; </span> <span id="download-value-20-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-13.pdf">Local Download</a>; </span> <span id="download-value-20-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/publications/practice-guide/mobile-application-single-sign-nist-sp-1800-13-practice-guide-final">SP 1800-13 files</a>; </span> <span id="download-value-20-3"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/public-safety-first-responder/mobile-application-single-sign">Project homepage</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-20"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-20"> 8/25/2021 </td> </tr> <tr id="result-21"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-21">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-21"> 1800-12</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-12/final" id="pub-title-link-21">Derived Personal Identity Verification (PIV) Credentials</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-21">SP 1800-12</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-12/final" class="mobile-pub-title" id="pub-title-link-sm-21">Derived Personal Identity Verification (PIV) Credentials</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-21">8/27/2019</strong> <br/> Status: <span id="pub-status-sm-21">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-21"> <span id="download-value-21-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.1800-12">SP 1800-12 (DOI)</a>; </span> <span id="download-value-21-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-12.pdf">Local Download</a>; </span> <span id="download-value-21-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/publications/practice-guide/derived-piv-credentials-nist-sp-1800-12-practice-guide-final">SP 1800-12 files</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-21"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-21"> 8/27/2019 </td> </tr> <tr id="result-22"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-22">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-22"> 1800-11</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-11/final" id="pub-title-link-22">Data Integrity: Recovering from Ransomware and Other Destructive Events</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-22">SP 1800-11</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-11/final" class="mobile-pub-title" id="pub-title-link-sm-22">Data Integrity: Recovering from Ransomware and Other Destructive Events</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-22">9/22/2020</strong> <br/> Status: <span id="pub-status-sm-22">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-22"> <span id="download-value-22-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.1800-11">SP 1800-11 (DOI)</a>; </span> <span id="download-value-22-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-11.pdf">Local Download</a>; </span> <span id="download-value-22-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/publications/practice-guide/data-integrity-nist-sp-1800-11-practice-guide-final">SP 1800-11 files</a>; </span> <span id="download-value-22-3"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/data-integrity-recovering-ransomware-and-other-destructive-events">Project homepage</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-22"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-22"> 9/22/2020 </td> </tr> <tr id="result-23"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-23">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-23"> 1800-10</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-10/final" id="pub-title-link-23">Protecting Information and System Integrity in Industrial Control System Environments: Cybersecurity for the Manufacturing Sector</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-23">SP 1800-10</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-10/final" class="mobile-pub-title" id="pub-title-link-sm-23">Protecting Information and System Integrity in Industrial Control System Environments: Cybersecurity for the Manufacturing Sector</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-23">3/16/2022</strong> <br/> Status: <span id="pub-status-sm-23">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-23"> <span id="download-value-23-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.1800-10">SP 1800-10 (DOI)</a>; </span> <span id="download-value-23-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-10.pdf">Local Download</a>; </span> <span id="download-value-23-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/manufacturing/protecting-information-and-system-integrity-industrial-control-system-environments">Project homepage</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-23"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-23"> 3/16/2022 </td> </tr> <tr id="result-24"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-24">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-24"> 1800-9</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-9/draft" id="pub-title-link-24">Access Rights Management for the Financial Services Sector</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-24">SP 1800-9 (Draft)</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-9/draft" class="mobile-pub-title" id="pub-title-link-sm-24">Access Rights Management for the Financial Services Sector</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-24">8/31/2017</strong> <br/> Status: <span id="pub-status-sm-24">Draft</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-24"> <span id="download-value-24-0"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/publications/practice-guide/access-rights-management-financial-services-sector-nist-sp-1800-9-draft">Draft SP 1800-9</a>; </span> <span id="download-value-24-1"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/financial-services/access-rights-management">Project homepage</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-24"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-24"> 8/31/2017 </td> </tr> <tr id="result-25"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-25">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-25"> 1800-8</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-8/final" id="pub-title-link-25">Securing Wireless Infusion Pumps in Healthcare Delivery Organizations</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-25">SP 1800-8</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-8/final" class="mobile-pub-title" id="pub-title-link-sm-25">Securing Wireless Infusion Pumps in Healthcare Delivery Organizations</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-25">8/17/2018</strong> <br/> Status: <span id="pub-status-sm-25">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-25"> <span id="download-value-25-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.1800-8">SP 1800-8 (DOI)</a>; </span> <span id="download-value-25-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-8.pdf">Local Download</a>; </span> <span id="download-value-25-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/publications/practice-guide/securing-wireless-infusion-pumps-healthcare-delivery-organizations-final">SP 1800-8 files</a>; </span> <span id="download-value-25-3"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/healthcare/securing-wireless-infusion-pumps">Project homepage</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-25"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-25"> 8/17/2018 </td> </tr> <tr id="result-26"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-26">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-26"> 1800-7</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-7/final" id="pub-title-link-26">Situational Awareness for Electric Utilities</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-26">SP 1800-7</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-7/final" class="mobile-pub-title" id="pub-title-link-sm-26">Situational Awareness for Electric Utilities</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-26">8/07/2019</strong> <br/> Status: <span id="pub-status-sm-26">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-26"> <span id="download-value-26-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.1800-7">SP 1800-7 (DOI)</a>; </span> <span id="download-value-26-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-7.pdf">Local Download</a>; </span> <span id="download-value-26-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/publications/practice-guide/situational-awareness-electric-utilities-nist-sp-1800-7-practice-guide-final">SP 1800-7 files</a>; </span> <span id="download-value-26-3"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/energy/situational-awareness">Project homepage</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-26"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-26"> 8/07/2019 </td> </tr> <tr id="result-27"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-27">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-27"> 1800-6</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-6/final" id="pub-title-link-27">Domain Name System-Based Electronic Mail Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-27">SP 1800-6</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-6/final" class="mobile-pub-title" id="pub-title-link-sm-27">Domain Name System-Based Electronic Mail Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-27">1/19/2018</strong> <br/> Status: <span id="pub-status-sm-27">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-27"> <span id="download-value-27-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.1800-6">SP 1800-6 (DOI)</a>; </span> <span id="download-value-27-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-6.pdf">Local Download</a>; </span> <span id="download-value-27-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/publications/practice-guide/dns-based-secure-email-nist-sp-1800-6-practice-guide-final">SP 1800-6 files</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-27"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-27"> 1/19/2018 </td> </tr> <tr id="result-28"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-28">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-28"> 1800-5</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-5/final" id="pub-title-link-28">IT Asset Management</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-28">SP 1800-5</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-5/final" class="mobile-pub-title" id="pub-title-link-sm-28">IT Asset Management</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-28">9/07/2018</strong> <br/> Status: <span id="pub-status-sm-28">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-28"> <span id="download-value-28-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.1800-5">SP 1800-5 (DOI)</a>; </span> <span id="download-value-28-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-5.pdf">Local Download</a>; </span> <span id="download-value-28-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/publications/practice-guide/it-asset-management-nist-sp-1800-5-practice-guide-final">SP 1800-5 files</a>; </span> <span id="download-value-28-3"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/financial-services/it-asset-management">Project homepage</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-28"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-28"> 9/07/2018 </td> </tr> <tr id="result-29"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-29">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-29"> 1800-4</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-4/final" id="pub-title-link-29">Mobile Device Security: Cloud and Hybrid Builds</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-29">SP 1800-4</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-4/final" class="mobile-pub-title" id="pub-title-link-sm-29">Mobile Device Security: Cloud and Hybrid Builds</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-29">2/21/2019</strong> <br/> Status: <span id="pub-status-sm-29">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-29"> <span id="download-value-29-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.1800-4">SP 1800-4 (DOI)</a>; </span> <span id="download-value-29-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-4.pdf">Local Download</a>; </span> <span id="download-value-29-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/publications/practice-guide/mobile-device-security-nist-sp-1800-4-practice-guide-final">SP 1800-4 files</a>; </span> <span id="download-value-29-3"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/mobile-device-security/cloud-and-hybrid-builds">Project homepage</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-29"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-29"> 2/21/2019 </td> </tr> <tr id="result-30"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-30">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-30"> 1800-3</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-3/draft" id="pub-title-link-30">Attribute Based Access Control (2nd Draft)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-30">SP 1800-3 (Draft)</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-3/draft" class="mobile-pub-title" id="pub-title-link-sm-30">Attribute Based Access Control (2nd Draft)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-30">9/20/2017</strong> <br/> Status: <span id="pub-status-sm-30">Draft</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-30"> <span id="download-value-30-0"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/publications/practice-guide/identity-and-access-management-electric-utilities-nist-sp-1800-2-final">Second Draft SP 1800-3</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-30"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-30"> 9/20/2017 </td> </tr> <tr id="result-31"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-31">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-31"> 1800-2</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-2/final" id="pub-title-link-31">Identity and Access Management for Electric Utilities</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-31">SP 1800-2</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-2/final" class="mobile-pub-title" id="pub-title-link-sm-31">Identity and Access Management for Electric Utilities</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-31">7/13/2018</strong> <br/> Status: <span id="pub-status-sm-31">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-31"> <span id="download-value-31-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.1800-2">SP 1800-2 (DOI)</a>; </span> <span id="download-value-31-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-2.pdf">Local Download</a>; </span> <span id="download-value-31-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/publications/practice-guide/identity-and-access-management-electric-utilities-nist-sp-1800-2-final">SP 1800-2 files</a>; </span> <span id="download-value-31-3"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/energy/identity-and-access-management-idam">Project homepage</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-31"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-31"> 7/13/2018 </td> </tr> <tr id="result-32"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-32">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-32"> 1800-1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-1/final" id="pub-title-link-32">Securing Electronic Health Records on Mobile Devices</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-32">SP 1800-1</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1800-1/final" class="mobile-pub-title" id="pub-title-link-sm-32">Securing Electronic Health Records on Mobile Devices</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-32">7/27/2018</strong> <br/> Status: <span id="pub-status-sm-32">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-32"> <span id="download-value-32-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.1800-1">SP 1800-1 (DOI)</a>; </span> <span id="download-value-32-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-1.pdf">Local Download</a>; </span> <span id="download-value-32-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/publications/practice-guide/securing-electronic-health-records-mobile-devices-nist-sp-1800-1-final">SP 1800-1 files</a>; </span> <span id="download-value-32-3"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/healthcare/electronic-health-records-mobile-devices">Project homepage</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-32"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-32"> 7/27/2018 </td> </tr> <tr id="result-33"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-33">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-33"> 1500-16</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1500-16/final" id="pub-title-link-33">Improving Veteran Transitions to Civilian Cybersecurity Roles: Workshop Report</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-33">SP 1500-16</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1500-16/final" class="mobile-pub-title" id="pub-title-link-sm-33">Improving Veteran Transitions to Civilian Cybersecurity Roles: Workshop Report</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-33">8/20/2020</strong> <br/> Status: <span id="pub-status-sm-33">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-33"> <span id="download-value-33-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.1500-16">SP 1500-16 (DOI)</a>; </span> <span id="download-value-33-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-16.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-33"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-33"> 8/20/2020 </td> </tr> <tr id="result-34"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-34">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-34"> 1500-4r2</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1500-4r2/final" id="pub-title-link-34">NIST Big Data Interoperability Framework: Volume 4, Security and Privacy Version 3</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-34">SP 1500-4r2</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1500-4r2/final" class="mobile-pub-title" id="pub-title-link-sm-34">NIST Big Data Interoperability Framework: Volume 4, Security and Privacy Version 3</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-34">10/21/2019</strong> <br/> Status: <span id="pub-status-sm-34">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-34"> <span id="download-value-34-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.1500-4r2">SP 1500-4r2 (DOI)</a>; </span> <span id="download-value-34-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4r2.pdf">Local Download</a>; </span> <span id="download-value-34-2"> <a href="https://web.archive.org/web/20220708182845/https://bigdatawg.nist.gov/V3_output_docs.php">NIST Big Data Interoperability Framework V3.0</a>; </span> <span id="download-value-34-3"> <a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/news-events/news/2019/10/nist-final-big-data-framework-will-help-make-sense-our-data-drenched-age">NIST news article</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-34"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-34"> 10/21/2019 </td> </tr> <tr id="result-35"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-35">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-35"> 1271</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1271/final" id="pub-title-link-35">Getting Started with the NIST Cybersecurity Framework: A Quick Start Guide</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-35">SP 1271</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/1271/final" class="mobile-pub-title" id="pub-title-link-sm-35">Getting Started with the NIST Cybersecurity Framework: A Quick Start Guide</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-35">8/06/2021</strong> <br/> Status: <span id="pub-status-sm-35">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-35"> <span id="download-value-35-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.1271">SP 1271 (DOI)</a>; </span> <span id="download-value-35-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1271.pdf">Local Download</a>; </span> <span id="download-value-35-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/cybersecurity/translations-nist-cybersecurity-and-privacy-resources">Translations of NIST SP 1271</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-35"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-35"> 8/06/2021 </td> </tr> <tr id="result-36"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-36">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-36"> 800-219</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-219/final" id="pub-title-link-36">Automated Secure Configuration Guidance from the macOS Security Compliance Project (mSCP)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-36">SP 800-219</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-219/final" class="mobile-pub-title" id="pub-title-link-sm-36">Automated Secure Configuration Guidance from the macOS Security Compliance Project (mSCP)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-36">6/24/2022</strong> <br/> Status: <span id="pub-status-sm-36">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-36"> <span id="download-value-36-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-219">SP 800-219 (DOI)</a>; </span> <span id="download-value-36-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-219.pdf">Local Download</a>; </span> <span id="download-value-36-2"> <a href="https://web.archive.org/web/20220708182845/https://github.com/usnistgov/macos_security#readme">mSCP GitHub site</a>; </span> <span id="download-value-36-3"> <a href="https://web.archive.org/web/20220708182845/https://github.com/usnistgov/macos_security/wiki">mSCP project documentation</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-36"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-36"> 6/24/2022 </td> </tr> <tr id="result-37"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-37">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-37"> 800-218</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-218/final" id="pub-title-link-37">Secure Software Development Framework (SSDF) Version 1.1: Recommendations for Mitigating the Risk of Software Vulnerabilities</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-37">SP 800-218</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-218/final" class="mobile-pub-title" id="pub-title-link-sm-37">Secure Software Development Framework (SSDF) Version 1.1: Recommendations for Mitigating the Risk of Software Vulnerabilities</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-37">2/03/2022</strong> <br/> Status: <span id="pub-status-sm-37">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-37"> <span id="download-value-37-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-218">SP 800-218 (DOI)</a>; </span> <span id="download-value-37-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-218.pdf">Local Download</a>; </span> <span id="download-value-37-2"> <a href="/web/20220708182845/https://csrc.nist.gov/csrc/media/Publications/sp/800-218/final/documents/sp800-218-potential-updates.xlsx">Potential updates</a>; </span> <span id="download-value-37-3"> <a href="/web/20220708182845/https://csrc.nist.gov/csrc/media/Publications/sp/800-218/final/documents/NIST.SP.800-218.SSDF-table.xlsx">SP 800-218 Table in Excel</a>; </span> <span id="download-value-37-4"> <a href="/web/20220708182845/https://csrc.nist.gov/csrc/media/Publications/sp/800-218/final/documents/800-218-deltas-from-wp-to-final.docx">Delta from April 2020 paper</a>; </span> <span id="download-value-37-5"> <a href="/web/20220708182845/https://csrc.nist.gov/csrc/media/Publications/sp/800-218/final/documents/800-218-deltas-from-draft-to-final.docx">Delta from September 2021 public draft</a>; </span> <span id="download-value-37-6"> <a href="https://web.archive.org/web/20220708182845/https://csrc.nist.gov/projects/ssdf">SSDF Project homepage</a>; </span> <span id="download-value-37-7"> <a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/itl/executive-order-improving-nations-cybersecurity">Executive Order 14028, Improving the Nation's Cybersecurity</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-37"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-37"> 2/03/2022 </td> </tr> <tr id="result-38"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-38">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-38"> 800-216</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-216/draft" id="pub-title-link-38">Recommendations for Federal Vulnerability Disclosure Guidelines</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-38">SP 800-216 (Draft)</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-216/draft" class="mobile-pub-title" id="pub-title-link-sm-38">Recommendations for Federal Vulnerability Disclosure Guidelines</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-38">6/07/2021</strong> <br/> Status: <span id="pub-status-sm-38">Draft</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-38"> <span id="download-value-38-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-216-draft">SP 800-216 (Draft) (DOI)</a>; </span> <span id="download-value-38-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-216-draft.pdf">Local Download</a>; </span> <span id="download-value-38-2"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-216/draft/documents/sp800-216-draft-comment-template.xlsx">Comment template</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-38"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-38"> 6/07/2021 </td> </tr> <tr id="result-39"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-39">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-39"> 800-214</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-214/final" id="pub-title-link-39">2020 Cybersecurity and Privacy Annual Report</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-39">SP 800-214</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-214/final" class="mobile-pub-title" id="pub-title-link-sm-39">2020 Cybersecurity and Privacy Annual Report</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-39">9/28/2021</strong> <br/> Status: <span id="pub-status-sm-39">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-39"> <span id="download-value-39-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-214">SP 800-214 (DOI)</a>; </span> <span id="download-value-39-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-214.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-39"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-39"> 9/28/2021 </td> </tr> <tr id="result-40"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-40">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-40"> 800-213A</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-213a/final" id="pub-title-link-40">IoT Device Cybersecurity Guidance for the Federal Government: IoT Device Cybersecurity Requirement Catalog</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-40">SP 800-213A</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-213a/final" class="mobile-pub-title" id="pub-title-link-sm-40">IoT Device Cybersecurity Guidance for the Federal Government: IoT Device Cybersecurity Requirement Catalog</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-40">11/29/2021</strong> <br/> Status: <span id="pub-status-sm-40">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-40"> <span id="download-value-40-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-213A">SP 800-213A (DOI)</a>; </span> <span id="download-value-40-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-213A.pdf">Local Download</a>; </span> <span id="download-value-40-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/blogs/cybersecurity-insights/convergent-evolution-sp-800-213-federal-profile-and-iot-cybersecurity">Blog post</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-40"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-40"> 11/29/2021 </td> </tr> <tr id="result-41"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-41">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-41"> 800-213</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-213/final" id="pub-title-link-41">IoT Device Cybersecurity Guidance for the Federal Government: Establishing IoT Device Cybersecurity Requirements</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-41">SP 800-213</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-213/final" class="mobile-pub-title" id="pub-title-link-sm-41">IoT Device Cybersecurity Guidance for the Federal Government: Establishing IoT Device Cybersecurity Requirements</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-41">11/29/2021</strong> <br/> Status: <span id="pub-status-sm-41">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-41"> <span id="download-value-41-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-213">SP 800-213 (DOI)</a>; </span> <span id="download-value-41-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-213.pdf">Local Download</a>; </span> <span id="download-value-41-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/blogs/cybersecurity-insights/convergent-evolution-sp-800-213-federal-profile-and-iot-cybersecurity">Blog post</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-41"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-41"> 11/29/2021 </td> </tr> <tr id="result-42"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-42">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-42"> 800-211</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-211/final" id="pub-title-link-42">2019 NIST/ITL Cybersecurity Program Annual Report</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-42">SP 800-211</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-211/final" class="mobile-pub-title" id="pub-title-link-sm-42">2019 NIST/ITL Cybersecurity Program Annual Report</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-42">8/24/2020</strong> <br/> Status: <span id="pub-status-sm-42">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-42"> <span id="download-value-42-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-211">SP 800-211 (DOI)</a>; </span> <span id="download-value-42-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-211.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-42"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-42"> 8/24/2020 </td> </tr> <tr id="result-43"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-43">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-43"> 800-210</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-210/final" id="pub-title-link-43">General Access Control Guidance for Cloud Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-43">SP 800-210</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-210/final" class="mobile-pub-title" id="pub-title-link-sm-43">General Access Control Guidance for Cloud Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-43">7/31/2020</strong> <br/> Status: <span id="pub-status-sm-43">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-43"> <span id="download-value-43-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-210">SP 800-210 (DOI)</a>; </span> <span id="download-value-43-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-210.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-43"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-43"> 7/31/2020 </td> </tr> <tr id="result-44"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-44">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-44"> 800-209</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-209/final" id="pub-title-link-44">Security Guidelines for Storage Infrastructure</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-44">SP 800-209</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-209/final" class="mobile-pub-title" id="pub-title-link-sm-44">Security Guidelines for Storage Infrastructure</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-44">10/26/2020</strong> <br/> Status: <span id="pub-status-sm-44">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-44"> <span id="download-value-44-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-209">SP 800-209 (DOI)</a>; </span> <span id="download-value-44-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-209.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-44"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-44"> 10/26/2020 </td> </tr> <tr id="result-45"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-45">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-45"> 800-208</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-208/final" id="pub-title-link-45">Recommendation for Stateful Hash-Based Signature Schemes</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-45">SP 800-208</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-208/final" class="mobile-pub-title" id="pub-title-link-sm-45">Recommendation for Stateful Hash-Based Signature Schemes</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-45">10/29/2020</strong> <br/> Status: <span id="pub-status-sm-45">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-45"> <span id="download-value-45-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-208">SP 800-208 (DOI)</a>; </span> <span id="download-value-45-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-208.pdf">Local Download</a>; </span> <span id="download-value-45-2"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-208/draft/documents/sp800-208-draft-comments-received.pdf">Comments received</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-45"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-45"> 10/29/2020 </td> </tr> <tr id="result-46"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-46">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-46"> 800-207</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-207/final" id="pub-title-link-46">Zero Trust Architecture</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-46">SP 800-207</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-207/final" class="mobile-pub-title" id="pub-title-link-sm-46">Zero Trust Architecture</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-46">8/11/2020</strong> <br/> Status: <span id="pub-status-sm-46">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-46"> <span id="download-value-46-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-207">SP 800-207 (DOI)</a>; </span> <span id="download-value-46-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf">Local Download</a>; </span> <span id="download-value-46-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nccoe.nist.gov/projects/building-blocks/zero-trust-architecture">ZTA project at NCCoE</a>; </span> <span id="download-value-46-3"> <a href="https://web.archive.org/web/20220708182845/https://www.pwc.com/jp/ja/knowledge/column/awareness-cyber-security/zero-trust-architecture-jp.html">Japanese translation (unofficial--from PwC Consulting LLC for IPA, Japan)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-46"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-46"> 8/11/2020 </td> </tr> <tr id="result-47"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-47">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-47"> 800-206</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-206/final" id="pub-title-link-47">Annual Report 2018: NIST/ITL Cybersecurity Program</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-47">SP 800-206</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-206/final" class="mobile-pub-title" id="pub-title-link-sm-47">Annual Report 2018: NIST/ITL Cybersecurity Program</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-47">3/13/2020</strong> <br/> Status: <span id="pub-status-sm-47">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-47"> <span id="download-value-47-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-206">SP 800-206 (DOI)</a>; </span> <span id="download-value-47-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-206.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-47"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-47"> 3/13/2020 </td> </tr> <tr id="result-48"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-48">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-48"> 800-205</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-205/final" id="pub-title-link-48">Attribute Considerations for Access Control Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-48">SP 800-205</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-205/final" class="mobile-pub-title" id="pub-title-link-sm-48">Attribute Considerations for Access Control Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-48">6/18/2019</strong> <br/> Status: <span id="pub-status-sm-48">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-48"> <span id="download-value-48-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-205">SP 800-205 (DOI)</a>; </span> <span id="download-value-48-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-205.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-48"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-48"> 6/18/2019 </td> </tr> <tr id="result-49"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-49">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-49"> 800-204C</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-204c/final" id="pub-title-link-49">Implementation of DevSecOps for a Microservices-based Application with Service Mesh</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-49">SP 800-204C</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-204c/final" class="mobile-pub-title" id="pub-title-link-sm-49">Implementation of DevSecOps for a Microservices-based Application with Service Mesh</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-49">3/08/2022</strong> <br/> Status: <span id="pub-status-sm-49">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-49"> <span id="download-value-49-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-204C">SP 800-204C (DOI)</a>; </span> <span id="download-value-49-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-204C.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-49"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-49"> 3/08/2022 </td> </tr> <tr id="result-50"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-50">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-50"> 800-204B</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-204b/final" id="pub-title-link-50">Attribute-based Access Control for Microservices-based Applications using a Service Mesh</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-50">SP 800-204B</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-204b/final" class="mobile-pub-title" id="pub-title-link-sm-50">Attribute-based Access Control for Microservices-based Applications using a Service Mesh</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-50">8/06/2021</strong> <br/> Status: <span id="pub-status-sm-50">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-50"> <span id="download-value-50-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-204B">SP 800-204B (DOI)</a>; </span> <span id="download-value-50-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-204B.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-50"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-50"> 8/06/2021 </td> </tr> <tr id="result-51"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-51">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-51"> 800-204A</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-204a/final" id="pub-title-link-51">Building Secure Microservices-based Applications Using Service-Mesh Architecture</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-51">SP 800-204A</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-204a/final" class="mobile-pub-title" id="pub-title-link-sm-51">Building Secure Microservices-based Applications Using Service-Mesh Architecture</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-51">5/27/2020</strong> <br/> Status: <span id="pub-status-sm-51">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-51"> <span id="download-value-51-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-204A">SP 800-204A (DOI)</a>; </span> <span id="download-value-51-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-204A.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-51"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-51"> 5/27/2020 </td> </tr> <tr id="result-52"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-52">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-52"> 800-204</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-204/final" id="pub-title-link-52">Security Strategies for Microservices-based Application Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-52">SP 800-204</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-204/final" class="mobile-pub-title" id="pub-title-link-sm-52">Security Strategies for Microservices-based Application Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-52">8/07/2019</strong> <br/> Status: <span id="pub-status-sm-52">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-52"> <span id="download-value-52-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-204">SP 800-204 (DOI)</a>; </span> <span id="download-value-52-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-204.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-52"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-52"> 8/07/2019 </td> </tr> <tr id="result-53"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-53">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-53"> 800-203</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-203/final" id="pub-title-link-53">2017 NIST/ITL Cybersecurity Program Annual Report</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-53">SP 800-203</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-203/final" class="mobile-pub-title" id="pub-title-link-sm-53">2017 NIST/ITL Cybersecurity Program Annual Report</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-53">7/02/2018</strong> <br/> Status: <span id="pub-status-sm-53">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-53"> <span id="download-value-53-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-203">SP 800-203 (DOI)</a>; </span> <span id="download-value-53-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-203.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-53"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-53"> 7/02/2018 </td> </tr> <tr id="result-54"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-54">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-54"> 800-202</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-202/final" id="pub-title-link-54">Quick Start Guide for Populating Mobile Test Devices</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-54">SP 800-202</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-202/final" class="mobile-pub-title" id="pub-title-link-sm-54">Quick Start Guide for Populating Mobile Test Devices</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-54">5/10/2018</strong> <br/> Status: <span id="pub-status-sm-54">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-54"> <span id="download-value-54-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-202">SP 800-202 (DOI)</a>; </span> <span id="download-value-54-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-202.pdf">Local Download</a>; </span> <span id="download-value-54-2"> <a href="https://web.archive.org/web/20220708182845/https://www.cftt.nist.gov/">Computer Forensics Tool Testing (CFTT) Program</a>; </span> <span id="download-value-54-3"> <a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/itl/ssd/software-quality-group/computer-forensics-tool-testing-program-cftt/cftt-federated-testing">CFTT Federated Testing Project</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-54"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-54"> 5/10/2018 </td> </tr> <tr id="result-55"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-55">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-55"> 800-195</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-195/final" id="pub-title-link-55">2016 NIST/ITL Cybersecurity Program Annual Report</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-55">SP 800-195</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-195/final" class="mobile-pub-title" id="pub-title-link-sm-55">2016 NIST/ITL Cybersecurity Program Annual Report</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-55">9/28/2017</strong> <br/> Status: <span id="pub-status-sm-55">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-55"> <span id="download-value-55-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-195">SP 800-195 (DOI)</a>; </span> <span id="download-value-55-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-195.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-55"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-55"> 9/28/2017 </td> </tr> <tr id="result-56"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-56">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-56"> 800-193</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-193/final" id="pub-title-link-56">Platform Firmware Resiliency Guidelines</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-56">SP 800-193</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-193/final" class="mobile-pub-title" id="pub-title-link-sm-56">Platform Firmware Resiliency Guidelines</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-56">5/04/2018</strong> <br/> Status: <span id="pub-status-sm-56">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-56"> <span id="download-value-56-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-193">SP 800-193 (DOI)</a>; </span> <span id="download-value-56-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-193.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-56"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-56"> 5/04/2018 </td> </tr> <tr id="result-57"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-57">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-57"> 800-192</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-192/final" id="pub-title-link-57">Verification and Test Methods for Access Control Policies/Models</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-57">SP 800-192</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-192/final" class="mobile-pub-title" id="pub-title-link-sm-57">Verification and Test Methods for Access Control Policies/Models</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-57">6/27/2017</strong> <br/> Status: <span id="pub-status-sm-57">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-57"> <span id="download-value-57-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-192">SP 800-192 (DOI)</a>; </span> <span id="download-value-57-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-192.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-57"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-57"> 6/27/2017 </td> </tr> <tr id="result-58"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-58">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-58"> 800-190</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-190/final" id="pub-title-link-58">Application Container Security Guide</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-58">SP 800-190</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-190/final" class="mobile-pub-title" id="pub-title-link-sm-58">Application Container Security Guide</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-58">9/25/2017</strong> <br/> Status: <span id="pub-status-sm-58">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-58"> <span id="download-value-58-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-190">SP 800-190 (DOI)</a>; </span> <span id="download-value-58-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-190.pdf">Local Download</a>; </span> <span id="download-value-58-2"> <a href="https://web.archive.org/web/20220708182845/https://www.ipa.go.jp/files/000085279.pdf">Japanese translation (unofficial--from IPA, Japan)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-58"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-58"> 9/25/2017 </td> </tr> <tr id="result-59"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-59">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-59"> 800-189</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-189/final" id="pub-title-link-59">Resilient Interdomain Traffic Exchange: BGP Security and DDoS Mitigation</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-59">SP 800-189</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-189/final" class="mobile-pub-title" id="pub-title-link-sm-59">Resilient Interdomain Traffic Exchange: BGP Security and DDoS Mitigation</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-59">12/17/2019</strong> <br/> Status: <span id="pub-status-sm-59">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-59"> <span id="download-value-59-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-189">SP 800-189 (DOI)</a>; </span> <span id="download-value-59-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-189.pdf">Local Download</a>; </span> <span id="download-value-59-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/services-resources/software/nist-rpki-deployment-monitor">NIST RPKI Deployment Monitor</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-59"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-59"> 12/17/2019 </td> </tr> <tr id="result-60"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-60">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-60"> 800-188</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-188/draft" id="pub-title-link-60">De-Identifying Government Datasets (2nd Draft)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-60">SP 800-188 (Draft)</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-188/draft" class="mobile-pub-title" id="pub-title-link-sm-60">De-Identifying Government Datasets (2nd Draft)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-60">12/15/2016</strong> <br/> Status: <span id="pub-status-sm-60">Draft</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-60"> <span id="download-value-60-0"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-188/draft/documents/sp800_188_draft2.pdf">Draft SP 800-188</a>; </span> <span id="download-value-60-1"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-188/draft/documents/sp800_188_draft2_comment-template-form.docx">Comment Template</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-60"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-60"> 12/15/2016 </td> </tr> <tr id="result-61"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-61">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-61"> 800-187</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-187/final" id="pub-title-link-61">Guide to LTE Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-61">SP 800-187</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-187/final" class="mobile-pub-title" id="pub-title-link-sm-61">Guide to LTE Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-61">12/21/2017</strong> <br/> Status: <span id="pub-status-sm-61">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-61"> <span id="download-value-61-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-187">SP 800-187 (DOI)</a>; </span> <span id="download-value-61-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-187.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-61"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-61"> 12/21/2017 </td> </tr> <tr id="result-62"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-62">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-62"> 800-186</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-186/draft" id="pub-title-link-62">Recommendations for Discrete Logarithm-Based Cryptography: Elliptic Curve Domain Parameters</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-62">SP 800-186 (Draft)</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-186/draft" class="mobile-pub-title" id="pub-title-link-sm-62">Recommendations for Discrete Logarithm-Based Cryptography: Elliptic Curve Domain Parameters</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-62">10/31/2019</strong> <br/> Status: <span id="pub-status-sm-62">Draft</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-62"> <span id="download-value-62-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-186-draft">SP 800-186 (Draft) (DOI)</a>; </span> <span id="download-value-62-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-186-draft.pdf">Local Download</a>; </span> <span id="download-value-62-2"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-186/draft/documents/sp800-186-draft-comments-received.pdf">Comments received on Draft SP 800-186</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-62"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-62"> 10/31/2019 </td> </tr> <tr id="result-63"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-63">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-63"> 800-185</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-185/final" id="pub-title-link-63">SHA-3 Derived Functions: cSHAKE, KMAC, TupleHash, and ParallelHash</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-63">SP 800-185</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-185/final" class="mobile-pub-title" id="pub-title-link-sm-63">SHA-3 Derived Functions: cSHAKE, KMAC, TupleHash, and ParallelHash</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-63">12/22/2016</strong> <br/> Status: <span id="pub-status-sm-63">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-63"> <span id="download-value-63-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-185">SP 800-185 (DOI)</a>; </span> <span id="download-value-63-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-185.pdf">Local Download</a>; </span> <span id="download-value-63-2"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-185/archive/2016-08-04/documents/sp800_185_draft_comments_received.pdf">Comments Received on Draft SP 800-185</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-63"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-63"> 12/22/2016 </td> </tr> <tr id="result-64"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-64">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-64"> 800-184</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-184/final" id="pub-title-link-64">Guide for Cybersecurity Event Recovery</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-64">SP 800-184</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-184/final" class="mobile-pub-title" id="pub-title-link-sm-64">Guide for Cybersecurity Event Recovery</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-64">12/22/2016</strong> <br/> Status: <span id="pub-status-sm-64">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-64"> <span id="download-value-64-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-184">SP 800-184 (DOI)</a>; </span> <span id="download-value-64-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-184.pdf">Local Download</a>; </span> <span id="download-value-64-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/news-events/news/2016/12/nist-guide-provides-way-tackle-cybersecurity-incidents-recovery-plan">Press Release (12-22-2016)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-64"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-64"> 12/22/2016 </td> </tr> <tr id="result-65"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-65">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-65"> 800-183</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-183/final" id="pub-title-link-65">Networks of &#39;Things&#39;</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-65">SP 800-183</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-183/final" class="mobile-pub-title" id="pub-title-link-sm-65">Networks of &#39;Things&#39;</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-65">7/28/2016</strong> <br/> Status: <span id="pub-status-sm-65">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-65"> <span id="download-value-65-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-183">SP 800-183 (DOI)</a>; </span> <span id="download-value-65-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-183.pdf">Local Download</a>; </span> <span id="download-value-65-2"> <a href="https://web.archive.org/web/20220708182845/http://nist.gov/itl/csd/nists-network-of-things-model-builds-foundation-to-help-define-the-internet-of-things.cfm">Press Release</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-65"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-65"> 7/28/2016 </td> </tr> <tr id="result-66"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-66">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-66"> 800-182</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-182/final" id="pub-title-link-66">Computer Security Division 2015 Annual Report</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-66">SP 800-182</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-182/final" class="mobile-pub-title" id="pub-title-link-sm-66">Computer Security Division 2015 Annual Report</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-66">8/10/2016</strong> <br/> Status: <span id="pub-status-sm-66">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-66"> <span id="download-value-66-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-182">SP 800-182 (DOI)</a>; </span> <span id="download-value-66-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-182.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-66"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-66"> 8/10/2016 </td> </tr> <tr id="result-67"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-67">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-67"> 800-181 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-181/rev-1/final" id="pub-title-link-67">Workforce Framework for Cybersecurity (NICE Framework)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-67">SP 800-181 Rev. 1</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-181/rev-1/final" class="mobile-pub-title" id="pub-title-link-sm-67">Workforce Framework for Cybersecurity (NICE Framework)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-67">11/16/2020</strong> <br/> Status: <span id="pub-status-sm-67">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-67"> <span id="download-value-67-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-181r1">SP 800-181 Rev. 1 (DOI)</a>; </span> <span id="download-value-67-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-181r1.pdf">Local Download</a>; </span> <span id="download-value-67-2"> <a href="https://web.archive.org/web/20220708182845/https://nist.gov/itl/applied-cybersecurity/nice/nice-framework-resource-center">NICE Framework homepage</a>; </span> <span id="download-value-67-3"> <a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/blogs/cybersecurity-insights/back-basics-announcing-new-nice-framework">Blog post: "Back to the Basics: Announcing the New NICE Framework"</a>; </span> <span id="download-value-67-4"> <a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/cybersecurity/translations-nist-cybersecurity-and-privacy-resources">Translations</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-67"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-67"> 11/16/2020 </td> </tr> <tr id="result-68"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-68">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-68"> 800-180</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-180/draft" id="pub-title-link-68">NIST Definition of Microservices, Application Containers and System Virtual Machines</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-68">SP 800-180 (Draft)</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-180/draft" class="mobile-pub-title" id="pub-title-link-sm-68">NIST Definition of Microservices, Application Containers and System Virtual Machines</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-68">2/18/2016</strong> <br/> Status: <span id="pub-status-sm-68">Draft</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-68"> <span id="download-value-68-0"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-180/draft/documents/sp800-180_draft.pdf">Draft SP 800-180</a>; </span> <span id="download-value-68-1"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-180/draft/documents/sp800-180_draft_comment-template.xls">Comment Template</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-68"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-68"> 2/18/2016 </td> </tr> <tr id="result-69"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-69">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-69"> 800-178</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-178/final" id="pub-title-link-69">A Comparison of Attribute Based Access Control (ABAC) Standards for Data Service Applications: Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-69">SP 800-178</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-178/final" class="mobile-pub-title" id="pub-title-link-sm-69">A Comparison of Attribute Based Access Control (ABAC) Standards for Data Service Applications: Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-69">10/03/2016</strong> <br/> Status: <span id="pub-status-sm-69">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-69"> <span id="download-value-69-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-178">SP 800-178 (DOI)</a>; </span> <span id="download-value-69-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-178.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-69"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-69"> 10/03/2016 </td> </tr> <tr id="result-70"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-70">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-70"> 800-177 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-177/rev-1/final" id="pub-title-link-70">Trustworthy Email</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-70">SP 800-177 Rev. 1</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-177/rev-1/final" class="mobile-pub-title" id="pub-title-link-sm-70">Trustworthy Email</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-70">2/26/2019</strong> <br/> Status: <span id="pub-status-sm-70">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-70"> <span id="download-value-70-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-177r1">SP 800-177 Rev. 1 (DOI)</a>; </span> <span id="download-value-70-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-177r1.pdf">Local Download</a>; </span> <span id="download-value-70-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/programs-projects/high-assurance-domains">High Assurance Domains project</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-70"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-70"> 2/26/2019 </td> </tr> <tr id="result-71"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-71">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-71"> 800-176</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-176/final" id="pub-title-link-71">Computer Security Division 2014 Annual Report</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-71">SP 800-176</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-176/final" class="mobile-pub-title" id="pub-title-link-sm-71">Computer Security Division 2014 Annual Report</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-71">8/20/2015</strong> <br/> Status: <span id="pub-status-sm-71">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-71"> <span id="download-value-71-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-176">SP 800-176 (DOI)</a>; </span> <span id="download-value-71-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-176.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-71"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-71"> 8/20/2015 </td> </tr> <tr id="result-72"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-72">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-72"> 800-175B Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-175b/rev-1/final" id="pub-title-link-72">Guideline for Using Cryptographic Standards in the Federal Government: Cryptographic Mechanisms</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-72">SP 800-175B Rev. 1</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-175b/rev-1/final" class="mobile-pub-title" id="pub-title-link-sm-72">Guideline for Using Cryptographic Standards in the Federal Government: Cryptographic Mechanisms</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-72">3/31/2020</strong> <br/> Status: <span id="pub-status-sm-72">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-72"> <span id="download-value-72-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-175Br1">SP 800-175B Rev. 1 (DOI)</a>; </span> <span id="download-value-72-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-175Br1.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-72"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-72"> 3/31/2020 </td> </tr> <tr id="result-73"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-73">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-73"> 800-175A</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-175a/final" id="pub-title-link-73">Guideline for Using Cryptographic Standards in the Federal Government: Directives, Mandates and Policies</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-73">SP 800-175A</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-175a/final" class="mobile-pub-title" id="pub-title-link-sm-73">Guideline for Using Cryptographic Standards in the Federal Government: Directives, Mandates and Policies</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-73">8/22/2016</strong> <br/> Status: <span id="pub-status-sm-73">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-73"> <span id="download-value-73-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-175A">SP 800-175A (DOI)</a>; </span> <span id="download-value-73-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-175A.pdf">Local Download</a>; </span> <span id="download-value-73-2"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-175a/archive/2016-04-05/documents/sp800-175a-draft-comments-received.pdf">Comments Received from Final Draft</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-73"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-73"> 8/22/2016 </td> </tr> <tr id="result-74"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-74">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-74"> 800-172A</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-172a/final" id="pub-title-link-74">Assessing Enhanced Security Requirements for Controlled Unclassified Information</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-74">SP 800-172A</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-172a/final" class="mobile-pub-title" id="pub-title-link-sm-74">Assessing Enhanced Security Requirements for Controlled Unclassified Information</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-74">3/15/2022</strong> <br/> Status: <span id="pub-status-sm-74">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-74"> <span id="download-value-74-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-172A">SP 800-172A (DOI)</a>; </span> <span id="download-value-74-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-172A.pdf">Local Download</a>; </span> <span id="download-value-74-2"> <a href="/web/20220708182845/https://csrc.nist.gov/csrc/media/Publications/sp/800-172a/final/documents/sp800-172A-assessment-procedures.xlsx">Assessment Procedures Spreadsheet</a>; </span> <span id="download-value-74-3"> <a href="/web/20220708182845/https://csrc.nist.gov/csrc/media/Publications/sp/800-172a/final/documents/sp800-172A-assessment-procedures.csv">Assessment Procedures CSV</a>; </span> <span id="download-value-74-4"> <a href="/web/20220708182845/https://csrc.nist.gov/csrc/media/Publications/sp/800-172a/final/documents/README-for-CSV-sp800-172A-assessment-procedures.txt">README for CSV</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-74"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-74"> 3/15/2022 </td> </tr> <tr id="result-75"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-75">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-75"> 800-172</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-172/final" id="pub-title-link-75">Enhanced Security Requirements for Protecting Controlled Unclassified Information: A Supplement to NIST Special Publication 800-171</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-75">SP 800-172</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-172/final" class="mobile-pub-title" id="pub-title-link-sm-75">Enhanced Security Requirements for Protecting Controlled Unclassified Information: A Supplement to NIST Special Publication 800-171</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-75">2/02/2021</strong> <br/> Status: <span id="pub-status-sm-75">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-75"> <span id="download-value-75-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-172">SP 800-172 (DOI)</a>; </span> <span id="download-value-75-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-172.pdf">Local Download</a>; </span> <span id="download-value-75-2"> <a href="/web/20220708182845/https://csrc.nist.gov/csrc/media/Publications/sp/800-172/final/documents/sp800-172-enhanced-security-reqs.xlsx">Enhanced Security Requirements Spreadsheet</a>; </span> <span id="download-value-75-3"> <a href="/web/20220708182845/https://csrc.nist.gov/csrc/media/Publications/sp/800-172/final/documents/sp800-172-enhanced-security-reqs.csv">Enhanced Security Requirements CSV</a>; </span> <span id="download-value-75-4"> <a href="/web/20220708182845/https://csrc.nist.gov/csrc/media/Publications/sp/800-172/final/documents/README-for-CSV-sp800-172-enhanced-security-reqs.txt">README for CSV</a>; </span> <span id="download-value-75-5"> <a href="https://web.archive.org/web/20220708182845/https://nist.gov/news-events/news/2021/02/nist-offers-tools-help-defend-against-state-sponsored-hackers">NIST news article</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-75"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-75"> 2/02/2021 </td> </tr> <tr id="result-76"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-76">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-76"> 800-171 Rev. 2</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-171/rev-2/final" id="pub-title-link-76">Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-76">SP 800-171 Rev. 2</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-171/rev-2/final" class="mobile-pub-title" id="pub-title-link-sm-76">Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-76">1/28/2021</strong> <br/> Status: <span id="pub-status-sm-76">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-76"> <span id="download-value-76-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-171r2">SP 800-171 Rev. 2 (DOI)</a>; </span> <span id="download-value-76-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171r2.pdf">Local Download</a>; </span> <span id="download-value-76-2"> <a href="/web/20220708182845/https://csrc.nist.gov/csrc/media/Publications/sp/800-171/rev-2/final/documents/sp800-171r2-security-reqs.xlsx">Security Requirements Spreadsheet</a>; </span> <span id="download-value-76-3"> <a href="/web/20220708182845/https://csrc.nist.gov/csrc/media/Publications/sp/800-171/rev-2/final/documents/sp800-171r2-security-reqs.csv">Security Requirements CSV</a>; </span> <span id="download-value-76-4"> <a href="/web/20220708182845/https://csrc.nist.gov/csrc/media/Publications/sp/800-171/rev-2/final/documents/README-for-CSV-sp800-171r2-security-reqs.txt">README for CSV</a>; </span> <span id="download-value-76-5"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-171/rev-2/final/documents/CUI-Plan-of-Action-Template-final.docx">CUI Plan of Action template</a>; </span> <span id="download-value-76-6"> <a href="/web/20220708182845/https://csrc.nist.gov/csrc/media/Publications/sp/800-171/rev-2/final/documents/CUI-SSP-Template-final.docx">CUI SSP template **[see Planning Note]</a>; </span> <span id="download-value-76-7"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-171/rev-2/final/documents/csf-v1-0-to-sp800-171rev2-mapping.xlsx">Mapping: Cybersecurity Framework v.1.0 to SP 800-171 Rev. 2</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-76"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-76"> 1/28/2021 </td> </tr> <tr id="result-77"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-77">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-77"> 800-171A</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-171a/final" id="pub-title-link-77">Assessing Security Requirements for Controlled Unclassified Information</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-77">SP 800-171A</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-171a/final" class="mobile-pub-title" id="pub-title-link-sm-77">Assessing Security Requirements for Controlled Unclassified Information</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-77">6/13/2018</strong> <br/> Status: <span id="pub-status-sm-77">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-77"> <span id="download-value-77-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-171A">SP 800-171A (DOI)</a>; </span> <span id="download-value-77-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171a.pdf">Local Download</a>; </span> <span id="download-value-77-2"> <a href="/web/20220708182845/https://csrc.nist.gov/csrc/media/Publications/sp/800-171a/final/documents/sp800-171A-assessment-procedures.xlsx">Assessment Procedures Spreadsheet</a>; </span> <span id="download-value-77-3"> <a href="/web/20220708182845/https://csrc.nist.gov/csrc/media/Publications/sp/800-171a/final/documents/sp800-171A-assessment-procedures.csv">Assessment Procedures CSV</a>; </span> <span id="download-value-77-4"> <a href="/web/20220708182845/https://csrc.nist.gov/csrc/media/Publications/sp/800-171a/final/documents/README-for-CSV-sp800-171A-assessment-procedures.txt">README for CSV</a>; </span> <span id="download-value-77-5"> <a href="/web/20220708182845/https://csrc.nist.gov/csrc/media/Publications/sp/800-171/rev-2/final/documents/CUI-SSP-Template-final.docx">CUI SSP template **[see Planning Note]</a>; </span> <span id="download-value-77-6"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media//Publications/sp/800-171/rev-1/final/documents/CUI-Plan-of-Action-Template-final.docx">CUI Plan of Action template</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-77"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-77"> 6/13/2018 </td> </tr> <tr id="result-78"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-78">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-78"> 800-170</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-170/final" id="pub-title-link-78">Computer Security Division 2013 Annual Report</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-78">SP 800-170</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-170/final" class="mobile-pub-title" id="pub-title-link-sm-78">Computer Security Division 2013 Annual Report</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-78">9/04/2014</strong> <br/> Status: <span id="pub-status-sm-78">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-78"> <span id="download-value-78-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-170">SP 800-170 (DOI)</a>; </span> <span id="download-value-78-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-170.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-78"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-78"> 9/04/2014 </td> </tr> <tr id="result-79"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-79">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-79"> 800-168</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-168/final" id="pub-title-link-79">Approximate Matching: Definition and Terminology</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-79">SP 800-168</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-168/final" class="mobile-pub-title" id="pub-title-link-sm-79">Approximate Matching: Definition and Terminology</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-79">7/02/2014</strong> <br/> Status: <span id="pub-status-sm-79">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-79"> <span id="download-value-79-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-168">SP 800-168 (DOI)</a>; </span> <span id="download-value-79-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-168.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-79"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-79"> 7/02/2014 </td> </tr> <tr id="result-80"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-80">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-80"> 800-167</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-167/final" id="pub-title-link-80">Guide to Application Whitelisting</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-80">SP 800-167</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-167/final" class="mobile-pub-title" id="pub-title-link-sm-80">Guide to Application Whitelisting</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-80">10/28/2015</strong> <br/> Status: <span id="pub-status-sm-80">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-80"> <span id="download-value-80-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-167">SP 800-167 (DOI)</a>; </span> <span id="download-value-80-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-167.pdf">Local Download</a>; </span> <span id="download-value-80-2"> <a href="https://web.archive.org/web/20220708182845/http://www.nist.gov/itl/csd/20151105whitelisting.cfm">Press Release</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-80"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-80"> 10/28/2015 </td> </tr> <tr id="result-81"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-81">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-81"> 800-166</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-166/final" id="pub-title-link-81">Derived PIV Application and Data Model Test Guidelines</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-81">SP 800-166</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-166/final" class="mobile-pub-title" id="pub-title-link-sm-81">Derived PIV Application and Data Model Test Guidelines</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-81">6/06/2016</strong> <br/> Status: <span id="pub-status-sm-81">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-81"> <span id="download-value-81-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-166">SP 800-166 (DOI)</a>; </span> <span id="download-value-81-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-166.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-81"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-81"> 6/06/2016 </td> </tr> <tr id="result-82"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-82">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-82"> 800-165</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-165/final" id="pub-title-link-82">Computer Security Division 2012 Annual Report</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-82">SP 800-165</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-165/final" class="mobile-pub-title" id="pub-title-link-sm-82">Computer Security Division 2012 Annual Report</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-82">7/22/2013</strong> <br/> Status: <span id="pub-status-sm-82">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-82"> <span id="download-value-82-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-165">SP 800-165 (DOI)</a>; </span> <span id="download-value-82-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-165.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-82"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-82"> 7/22/2013 </td> </tr> <tr id="result-83"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-83">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-83"> 800-164</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-164/draft" id="pub-title-link-83">Guidelines on Hardware-Rooted Security in Mobile Devices</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-83">SP 800-164 (Draft)</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-164/draft" class="mobile-pub-title" id="pub-title-link-sm-83">Guidelines on Hardware-Rooted Security in Mobile Devices</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-83">10/31/2012</strong> <br/> Status: <span id="pub-status-sm-83">Draft</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-83"> <span id="download-value-83-0"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-164/draft/documents/sp800_164_draft.pdf">Draft SP 800-164</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-83"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-83"> 10/31/2012 </td> </tr> <tr id="result-84"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-84">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-84"> 800-163 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-163/rev-1/final" id="pub-title-link-84">Vetting the Security of Mobile Applications</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-84">SP 800-163 Rev. 1</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-163/rev-1/final" class="mobile-pub-title" id="pub-title-link-sm-84">Vetting the Security of Mobile Applications</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-84">4/19/2019</strong> <br/> Status: <span id="pub-status-sm-84">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-84"> <span id="download-value-84-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-163r1">SP 800-163 Rev. 1 (DOI)</a>; </span> <span id="download-value-84-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-163r1.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-84"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-84"> 4/19/2019 </td> </tr> <tr id="result-85"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-85">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-85"> 800-162</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-162/final" id="pub-title-link-85">Guide to Attribute Based Access Control (ABAC) Definition and Considerations</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-85">SP 800-162</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-162/final" class="mobile-pub-title" id="pub-title-link-sm-85">Guide to Attribute Based Access Control (ABAC) Definition and Considerations</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-85">8/02/2019</strong> <br/> Status: <span id="pub-status-sm-85">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-85"> <span id="download-value-85-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-162">SP 800-162 (DOI)</a>; </span> <span id="download-value-85-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/specialpublications/NIST.SP.800-162.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-85"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-85"> 8/02/2019 </td> </tr> <tr id="result-86"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-86">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-86"> 800-161 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-161/rev-1/final" id="pub-title-link-86">Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-86">SP 800-161 Rev. 1</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-161/rev-1/final" class="mobile-pub-title" id="pub-title-link-sm-86">Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-86">5/05/2022</strong> <br/> Status: <span id="pub-status-sm-86">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-86"> <span id="download-value-86-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-161r1">SP 800-161 Rev. 1 (DOI)</a>; </span> <span id="download-value-86-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-161r1.pdf">Local Download</a>; </span> <span id="download-value-86-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/itl/executive-order-14028-improving-nations-cybersecurity/software-security-supply-chains">EO 14028: Software Security in Supply Chains</a>; </span> <span id="download-value-86-3"> <a href="/web/20220708182845/https://csrc.nist.gov/projects/cyber-supply-chain-risk-management">NIST’s Cyber Supply Chain Risk Management Program</a>; </span> <span id="download-value-86-4"> <a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/news-events/news/2022/05/nist-updates-cybersecurity-guidance-supply-chain-risk-management">NIST news article</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-86"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-86"> 5/05/2022 </td> </tr> <tr id="result-87"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-87">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-87"> 800-160 Vol. 2 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-160/vol-2-rev-1/final" id="pub-title-link-87">Developing Cyber-Resilient Systems: A Systems Security Engineering Approach</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-87">SP 800-160 Vol. 2 Rev. 1</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-160/vol-2-rev-1/final" class="mobile-pub-title" id="pub-title-link-sm-87">Developing Cyber-Resilient Systems: A Systems Security Engineering Approach</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-87">12/09/2021</strong> <br/> Status: <span id="pub-status-sm-87">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-87"> <span id="download-value-87-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-160v2r1">SP 800-160 Vol. 2 Rev. 1 (DOI)</a>; </span> <span id="download-value-87-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-160v2r1.pdf">Local Download</a>; </span> <span id="download-value-87-2"> <a href="https://web.archive.org/web/20220708182845/https://csrc.nist.gov/projects/systems-security-engineering-project">Systems Security Engineering (SSE) Project</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-87"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-87"> 12/09/2021 </td> </tr> <tr id="result-88"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-88">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-88"> 800-160 Vol. 1 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-160/vol-1-rev-1/draft" id="pub-title-link-88">Engineering Trustworthy Secure Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-88">SP 800-160 Vol. 1 Rev. 1 (Draft)</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-160/vol-1-rev-1/draft" class="mobile-pub-title" id="pub-title-link-sm-88">Engineering Trustworthy Secure Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-88">6/07/2022</strong> <br/> Status: <span id="pub-status-sm-88">Draft</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-88"> <span id="download-value-88-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-160v1r1.fpd">SP 800-160 Vol. 1 Rev. 1 (Draft) (DOI)</a>; </span> <span id="download-value-88-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-160v1r1.fpd.pdf">Local Download</a>; </span> <span id="download-value-88-2"> <a href="/web/20220708182845/https://csrc.nist.gov/csrc/media/Publications/sp/800-160/vol-1-rev-1/draft/documents/sp800-160v1r1-fpd-comment-template.xlsx">Comment template</a>; </span> <span id="download-value-88-3"> <a href="https://web.archive.org/web/20220708182845/https://csrc.nist.gov/projects/systems-security-engineering-project">Systems Security Engineering (SSE) Project</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-88"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-88"> 6/07/2022 </td> </tr> <tr id="result-89"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-89">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-89"> 800-160 Vol. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-160/vol-1/final" id="pub-title-link-89">Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-89">SP 800-160 Vol. 1</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-160/vol-1/final" class="mobile-pub-title" id="pub-title-link-sm-89">Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-89">3/21/2018</strong> <br/> Status: <span id="pub-status-sm-89">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-89"> <span id="download-value-89-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-160v1">SP 800-160 Vol. 1 (DOI)</a>; </span> <span id="download-value-89-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-160v1.pdf">Local Download</a>; </span> <span id="download-value-89-2"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-160/vol-1/final/documents/sp800-160v1-appendixD-supplement.xlsx">Appendix D Supplement</a>; </span> <span id="download-value-89-3"> <a href="https://web.archive.org/web/20220708182845/https://csrc.nist.gov/projects/systems-security-engineering-project">Systems Security Engineering (SSE) Project</a>; </span> <span id="download-value-89-4"> <a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/blogs/taking-measure/rethinking-cybersecurity-inside-out">"Rethinking Cybersecurity from the Inside Out" (blog post)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-89"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-89"> 3/21/2018 </td> </tr> <tr id="result-90"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-90">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-90"> 800-157</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-157/final" id="pub-title-link-90">Guidelines for Derived Personal Identity Verification (PIV) Credentials</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-90">SP 800-157</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-157/final" class="mobile-pub-title" id="pub-title-link-sm-90">Guidelines for Derived Personal Identity Verification (PIV) Credentials</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-90">12/19/2014</strong> <br/> Status: <span id="pub-status-sm-90">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-90"> <span id="download-value-90-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-157">SP 800-157 (DOI)</a>; </span> <span id="download-value-90-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-157.pdf">Local Download</a>; </span> <span id="download-value-90-2"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-157/final/documents/sp800_157_comments_resolutions.pdf">Comments and resolutions on Draft SP 800-157 (Mar. 2014)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-90"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-90"> 12/19/2014 </td> </tr> <tr id="result-91"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-91">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-91"> 800-156</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-156/final" id="pub-title-link-91">Representation of PIV Chain-of-Trust for Import and Export</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-91">SP 800-156</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-156/final" class="mobile-pub-title" id="pub-title-link-sm-91">Representation of PIV Chain-of-Trust for Import and Export</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-91">5/20/2016</strong> <br/> Status: <span id="pub-status-sm-91">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-91"> <span id="download-value-91-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-156">SP 800-156 (DOI)</a>; </span> <span id="download-value-91-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-156.pdf">Local Download</a>; </span> <span id="download-value-91-2"> <a href="/web/20220708182845/https://csrc.nist.gov/schema/piv/chain-of-trust/piv-chain-of-trust-1.0.xsd">XSD Schema File for SP 800-156 Chain of Trust</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-91"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-91"> 5/20/2016 </td> </tr> <tr id="result-92"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-92">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-92"> 800-155</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-155/draft" id="pub-title-link-92">BIOS Integrity Measurement Guidelines</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-92">SP 800-155 (Draft)</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-155/draft" class="mobile-pub-title" id="pub-title-link-sm-92">BIOS Integrity Measurement Guidelines</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-92">12/08/2011</strong> <br/> Status: <span id="pub-status-sm-92">Draft</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-92"> <span id="download-value-92-0"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-155/draft/documents/draft-SP800-155_Dec2011.pdf">Draft SP 800-155</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-92"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-92"> 12/08/2011 </td> </tr> <tr id="result-93"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-93">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-93"> 800-154</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-154/draft" id="pub-title-link-93">Guide to Data-Centric System Threat Modeling</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-93">SP 800-154 (Draft)</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-154/draft" class="mobile-pub-title" id="pub-title-link-sm-93">Guide to Data-Centric System Threat Modeling</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-93">3/14/2016</strong> <br/> Status: <span id="pub-status-sm-93">Draft</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-93"> <span id="download-value-93-0"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-154/draft/documents/sp800_154_draft.pdf">Draft SP 800-154</a>; </span> <span id="download-value-93-1"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-154/draft/documents/sp800_154_draft_comment-template.xls">Comment Template</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-93"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-93"> 3/14/2016 </td> </tr> <tr id="result-94"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-94">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-94"> 800-153</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-153/final" id="pub-title-link-94">Guidelines for Securing Wireless Local Area Networks (WLANs)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-94">SP 800-153</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-153/final" class="mobile-pub-title" id="pub-title-link-sm-94">Guidelines for Securing Wireless Local Area Networks (WLANs)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-94">2/21/2012</strong> <br/> Status: <span id="pub-status-sm-94">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-94"> <span id="download-value-94-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-153">SP 800-153 (DOI)</a>; </span> <span id="download-value-94-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-153.pdf">Local Download</a>; </span> <span id="download-value-94-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/news-events/news/2012/03/guidance-wireless-local-area-network-security-close-hand">Press Release (Mar. 6, 2012)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-94"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-94"> 2/21/2012 </td> </tr> <tr id="result-95"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-95">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-95"> 800-152</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-152/final" id="pub-title-link-95">A Profile for U.S. Federal Cryptographic Key Management Systems (CKMS)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-95">SP 800-152</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-152/final" class="mobile-pub-title" id="pub-title-link-sm-95">A Profile for U.S. Federal Cryptographic Key Management Systems (CKMS)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-95">10/28/2015</strong> <br/> Status: <span id="pub-status-sm-95">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-95"> <span id="download-value-95-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-152">SP 800-152 (DOI)</a>; </span> <span id="download-value-95-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-152.pdf">Local Download</a>; </span> <span id="download-value-95-2"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-152/final/documents/draft_sp800_152_comments-received_march2015.pdf">Comments received on final (3rd) Draft (Dec. 2014)</a>; </span> <span id="download-value-95-3"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-152/final/documents/sp800-152_third_draft.pdf">Draft 3 (Dec. 2014)</a>; </span> <span id="download-value-95-4"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-152/final/documents/draft_sp_800_152_2nd.pdf">Draft 2 (Jan. 2014)</a>; </span> <span id="download-value-95-5"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-152/final/documents/draft-sp-800-152.pdf">Draft (Aug. 2012)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-95"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-95"> 10/28/2015 </td> </tr> <tr id="result-96"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-96">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-96"> 800-150</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-150/final" id="pub-title-link-96">Guide to Cyber Threat Information Sharing</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-96">SP 800-150</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-150/final" class="mobile-pub-title" id="pub-title-link-sm-96">Guide to Cyber Threat Information Sharing</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-96">10/04/2016</strong> <br/> Status: <span id="pub-status-sm-96">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-96"> <span id="download-value-96-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-150">SP 800-150 (DOI)</a>; </span> <span id="download-value-96-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-150.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-96"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-96"> 10/04/2016 </td> </tr> <tr id="result-97"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-97">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-97"> 800-147B</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-147b/final" id="pub-title-link-97">BIOS Protection Guidelines for Servers</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-97">SP 800-147B</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-147b/final" class="mobile-pub-title" id="pub-title-link-sm-97">BIOS Protection Guidelines for Servers</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-97">8/28/2014</strong> <br/> Status: <span id="pub-status-sm-97">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-97"> <span id="download-value-97-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-147B">SP 800-147B (DOI)</a>; </span> <span id="download-value-97-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-147B.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-97"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-97"> 8/28/2014 </td> </tr> <tr id="result-98"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-98">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-98"> 800-147</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-147/final" id="pub-title-link-98">BIOS Protection Guidelines</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-98">SP 800-147</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-147/final" class="mobile-pub-title" id="pub-title-link-sm-98">BIOS Protection Guidelines</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-98">4/29/2011</strong> <br/> Status: <span id="pub-status-sm-98">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-98"> <span id="download-value-98-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-147">SP 800-147 (DOI)</a>; </span> <span id="download-value-98-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-147.pdf">Local Download</a>; </span> <span id="download-value-98-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/news-events/news/2011/04/build-safety-very-beginning-computer-system">Press Release</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-98"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-98"> 4/29/2011 </td> </tr> <tr id="result-99"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-99">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-99"> 800-146</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-146/final" id="pub-title-link-99">Cloud Computing Synopsis and Recommendations</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-99">SP 800-146</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-146/final" class="mobile-pub-title" id="pub-title-link-sm-99">Cloud Computing Synopsis and Recommendations</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-99">5/29/2012</strong> <br/> Status: <span id="pub-status-sm-99">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-99"> <span id="download-value-99-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-146">SP 800-146 (DOI)</a>; </span> <span id="download-value-99-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-146.pdf">Local Download</a>; </span> <span id="download-value-99-2"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-146/final/documents/sp800_146.epub">SP 800-146 (EPUB)</a>; </span> <span id="download-value-99-3"> <a href="https://web.archive.org/web/20220708182845/http://www.nist.gov/itl/cloud-052912.cfm">Press Release</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-99"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-99"> 5/29/2012 </td> </tr> <tr id="result-100"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-100">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-100"> 800-145</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-145/final" id="pub-title-link-100">The NIST Definition of Cloud Computing</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-100">SP 800-145</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-145/final" class="mobile-pub-title" id="pub-title-link-sm-100">The NIST Definition of Cloud Computing</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-100">9/28/2011</strong> <br/> Status: <span id="pub-status-sm-100">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-100"> <span id="download-value-100-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-145">SP 800-145 (DOI)</a>; </span> <span id="download-value-100-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf">Local Download</a>; </span> <span id="download-value-100-2"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-145/final/documents/sp800_145.epub">SP 800-145 (EPUB)</a>; </span> <span id="download-value-100-3"> <a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/news-events/news/2011/10/final-version-nist-cloud-computing-definition-published">Press Release</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-100"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-100"> 9/28/2011 </td> </tr> <tr id="result-101"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-101">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-101"> 800-144</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-144/final" id="pub-title-link-101">Guidelines on Security and Privacy in Public Cloud Computing</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-101">SP 800-144</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-144/final" class="mobile-pub-title" id="pub-title-link-sm-101">Guidelines on Security and Privacy in Public Cloud Computing</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-101">12/09/2011</strong> <br/> Status: <span id="pub-status-sm-101">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-101"> <span id="download-value-101-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-144">SP 800-144 (DOI)</a>; </span> <span id="download-value-101-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-144.pdf">Local Download</a>; </span> <span id="download-value-101-2"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-144/final/documents/sp800_144.epub">SP 800-144 (EPUB)</a>; </span> <span id="download-value-101-3"> <a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/news-events/news/2012/01/nist-issues-cloud-computing-guidelines-managing-security-and-privacy">Press Release</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-101"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-101"> 12/09/2011 </td> </tr> <tr id="result-102"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-102">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-102"> 800-142</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-142/final" id="pub-title-link-102">Practical Combinatorial Testing</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-102">SP 800-142</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-142/final" class="mobile-pub-title" id="pub-title-link-sm-102">Practical Combinatorial Testing</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-102">10/07/2010</strong> <br/> Status: <span id="pub-status-sm-102">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-102"> <span id="download-value-102-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-142">SP 800-142 (DOI)</a>; </span> <span id="download-value-102-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-142.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-102"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-102"> 10/07/2010 </td> </tr> <tr id="result-103"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-103">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-103"> 800-140F Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-140f/rev-1/draft" id="pub-title-link-103">CMVP Approved Non-Invasive Attack Mitigation Test Metrics: CMVP Validation Authority Updates to ISO/IEC 24759</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-103">SP 800-140F Rev. 1 (Draft)</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-140f/rev-1/draft" class="mobile-pub-title" id="pub-title-link-sm-103">CMVP Approved Non-Invasive Attack Mitigation Test Metrics: CMVP Validation Authority Updates to ISO/IEC 24759</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-103">8/20/2021</strong> <br/> Status: <span id="pub-status-sm-103">Draft</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-103"> <span id="download-value-103-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-140Fr1-draft">SP 800-140F Rev. 1 (Draft) (DOI)</a>; </span> <span id="download-value-103-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-140Fr1-draft.pdf">Local Download</a>; </span> <span id="download-value-103-2"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-140f/rev-1/draft/documents/sp800-140fr1-draft-comment-template.docx">Comment template</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-103"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-103"> 8/20/2021 </td> </tr> <tr id="result-104"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-104">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-104"> 800-140F</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-140f/final" id="pub-title-link-104">CMVP Approved Non-Invasive Attack Mitigation Test Metrics: CMVP Validation Authority Updates to ISO/IEC 24759</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-104">SP 800-140F</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-140f/final" class="mobile-pub-title" id="pub-title-link-sm-104">CMVP Approved Non-Invasive Attack Mitigation Test Metrics: CMVP Validation Authority Updates to ISO/IEC 24759</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-104">3/20/2020</strong> <br/> Status: <span id="pub-status-sm-104">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-104"> <span id="download-value-104-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-140F">SP 800-140F (DOI)</a>; </span> <span id="download-value-104-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-140F.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-104"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-104"> 3/20/2020 </td> </tr> <tr id="result-105"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-105">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-105"> 800-140E</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-140e/final" id="pub-title-link-105">CMVP Approved Authentication Mechanisms: CMVP Validation Authority Requirements for ISO/IEC 19790 Annex E and ISO/IEC 24579 Section 6.17</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-105">SP 800-140E</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-140e/final" class="mobile-pub-title" id="pub-title-link-sm-105">CMVP Approved Authentication Mechanisms: CMVP Validation Authority Requirements for ISO/IEC 19790 Annex E and ISO/IEC 24579 Section 6.17</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-105">3/20/2020</strong> <br/> Status: <span id="pub-status-sm-105">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-105"> <span id="download-value-105-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-140E">SP 800-140E (DOI)</a>; </span> <span id="download-value-105-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-140E.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-105"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-105"> 3/20/2020 </td> </tr> <tr id="result-106"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-106">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-106"> 800-140D Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-140d/rev-1/final" id="pub-title-link-106">CMVP Approved Sensitive Parameter Generation and Establishment Methods: CMVP Validation Authority Updates to ISO/IEC 24759</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-106">SP 800-140D Rev. 1</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-140d/rev-1/final" class="mobile-pub-title" id="pub-title-link-sm-106">CMVP Approved Sensitive Parameter Generation and Establishment Methods: CMVP Validation Authority Updates to ISO/IEC 24759</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-106">5/20/2022</strong> <br/> Status: <span id="pub-status-sm-106">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-106"> <span id="download-value-106-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-140Dr1">SP 800-140D Rev. 1 (DOI)</a>; </span> <span id="download-value-106-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-140Dr1.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-106"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-106"> 5/20/2022 </td> </tr> <tr id="result-107"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-107">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-107"> 800-140C Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-140c/rev-1/final" id="pub-title-link-107">CMVP Approved Security Functions: CMVP Validation Authority Updates to ISO/IEC 24759</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-107">SP 800-140C Rev. 1</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-140c/rev-1/final" class="mobile-pub-title" id="pub-title-link-sm-107">CMVP Approved Security Functions: CMVP Validation Authority Updates to ISO/IEC 24759</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-107">5/20/2022</strong> <br/> Status: <span id="pub-status-sm-107">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-107"> <span id="download-value-107-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-140Cr1">SP 800-140C Rev. 1 (DOI)</a>; </span> <span id="download-value-107-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-140Cr1.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-107"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-107"> 5/20/2022 </td> </tr> <tr id="result-108"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-108">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-108"> 800-140B Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-140b/rev-1/draft" id="pub-title-link-108">CMVP Security Policy Requirements: CMVP Validation Authority Updates to ISO/IEC 24759 and ISO/IEC 19790 Annex B</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-108">SP 800-140B Rev. 1 (Draft)</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-140b/rev-1/draft" class="mobile-pub-title" id="pub-title-link-sm-108">CMVP Security Policy Requirements: CMVP Validation Authority Updates to ISO/IEC 24759 and ISO/IEC 19790 Annex B</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-108">5/12/2022</strong> <br/> Status: <span id="pub-status-sm-108">Draft</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-108"> <span id="download-value-108-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-140Br1.ipd">SP 800-140B Rev. 1 (Draft) (DOI)</a>; </span> <span id="download-value-108-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-140Br1.ipd.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-108"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-108"> 5/12/2022 </td> </tr> <tr id="result-109"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-109">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-109"> 800-140B</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-140b/final" id="pub-title-link-109">CMVP Security Policy Requirements: CMVP Validation Authority Updates to ISO/IEC 24759 and ISO/IEC 19790 Annex B</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-109">SP 800-140B</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-140b/final" class="mobile-pub-title" id="pub-title-link-sm-109">CMVP Security Policy Requirements: CMVP Validation Authority Updates to ISO/IEC 24759 and ISO/IEC 19790 Annex B</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-109">3/20/2020</strong> <br/> Status: <span id="pub-status-sm-109">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-109"> <span id="download-value-109-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-140B">SP 800-140B (DOI)</a>; </span> <span id="download-value-109-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-140B.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-109"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-109"> 3/20/2020 </td> </tr> <tr id="result-110"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-110">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-110"> 800-140A</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-140a/final" id="pub-title-link-110">CMVP Documentation Requirements: CMVP Validation Authority Updates to ISO/IEC 24759</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-110">SP 800-140A</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-140a/final" class="mobile-pub-title" id="pub-title-link-sm-110">CMVP Documentation Requirements: CMVP Validation Authority Updates to ISO/IEC 24759</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-110">3/20/2020</strong> <br/> Status: <span id="pub-status-sm-110">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-110"> <span id="download-value-110-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-140A">SP 800-140A (DOI)</a>; </span> <span id="download-value-110-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-140A.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-110"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-110"> 3/20/2020 </td> </tr> <tr id="result-111"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-111">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-111"> 800-140</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-140/final" id="pub-title-link-111">FIPS 140-3 Derived Test Requirements (DTR): CMVP Validation Authority Updates to ISO/IEC 24759</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-111">SP 800-140</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-140/final" class="mobile-pub-title" id="pub-title-link-sm-111">FIPS 140-3 Derived Test Requirements (DTR): CMVP Validation Authority Updates to ISO/IEC 24759</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-111">3/20/2020</strong> <br/> Status: <span id="pub-status-sm-111">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-111"> <span id="download-value-111-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-140">SP 800-140 (DOI)</a>; </span> <span id="download-value-111-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-140.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-111"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-111"> 3/20/2020 </td> </tr> <tr id="result-112"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-112">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-112"> 800-137A</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-137a/final" id="pub-title-link-112">Assessing Information Security Continuous Monitoring (ISCM) Programs: Developing an ISCM Program Assessment</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-112">SP 800-137A</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-137a/final" class="mobile-pub-title" id="pub-title-link-sm-112">Assessing Information Security Continuous Monitoring (ISCM) Programs: Developing an ISCM Program Assessment</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-112">5/21/2020</strong> <br/> Status: <span id="pub-status-sm-112">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-112"> <span id="download-value-112-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-137A">SP 800-137A (DOI)</a>; </span> <span id="download-value-112-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-137A.pdf">Local Download</a>; </span> <span id="download-value-112-2"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-137a/final/documents/sp800-137a-element-catalog.xlsx">Element Catalog for SP 800-137A</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-112"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-112"> 5/21/2020 </td> </tr> <tr id="result-113"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-113">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-113"> 800-137</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-137/final" id="pub-title-link-113">Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-113">SP 800-137</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-137/final" class="mobile-pub-title" id="pub-title-link-sm-113">Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-113">9/30/2011</strong> <br/> Status: <span id="pub-status-sm-113">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-113"> <span id="download-value-113-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-137">SP 800-137 (DOI)</a>; </span> <span id="download-value-113-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-137.pdf">Local Download</a>; </span> <span id="download-value-113-2"> <a href="https://web.archive.org/web/20220708182845/http://www.nist.gov/itl/csd/guide-101311.cfm">Press Release</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-113"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-113"> 9/30/2011 </td> </tr> <tr id="result-114"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-114">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-114"> 800-135 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-135/rev-1/final" id="pub-title-link-114">Recommendation for Existing Application-Specific Key Derivation Functions</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-114">SP 800-135 Rev. 1</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-135/rev-1/final" class="mobile-pub-title" id="pub-title-link-sm-114">Recommendation for Existing Application-Specific Key Derivation Functions</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-114">12/23/2011</strong> <br/> Status: <span id="pub-status-sm-114">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-114"> <span id="download-value-114-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-135r1">SP 800-135 Rev. 1 (DOI)</a>; </span> <span id="download-value-114-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-135r1.pdf">Local Download</a>; </span> <span id="download-value-114-2"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-135/rev-1/final/documents/sp800-135r1-informative-note-20160919.pdf">Informative Note (09-19-2016)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-114"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-114"> 12/23/2011 </td> </tr> <tr id="result-115"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-115">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-115"> 800-133 Rev. 2</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-133/rev-2/final" id="pub-title-link-115">Recommendation for Cryptographic Key Generation</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-115">SP 800-133 Rev. 2</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-133/rev-2/final" class="mobile-pub-title" id="pub-title-link-sm-115">Recommendation for Cryptographic Key Generation</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-115">6/04/2020</strong> <br/> Status: <span id="pub-status-sm-115">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-115"> <span id="download-value-115-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-133r2">SP 800-133 Rev. 2 (DOI)</a>; </span> <span id="download-value-115-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-133r2.pdf">Local Download</a>; </span> <span id="download-value-115-2"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-133/rev-2/draft/sp800-133r2-draft-comments-received.pdf">Comments received on Draft SP 800-133 Rev. 2</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-115"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-115"> 6/04/2020 </td> </tr> <tr id="result-116"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-116">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-116"> 800-132</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-132/final" id="pub-title-link-116">Recommendation for Password-Based Key Derivation: Part 1: Storage Applications</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-116">SP 800-132</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-132/final" class="mobile-pub-title" id="pub-title-link-sm-116">Recommendation for Password-Based Key Derivation: Part 1: Storage Applications</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-116">12/22/2010</strong> <br/> Status: <span id="pub-status-sm-116">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-116"> <span id="download-value-116-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-132">SP 800-132 (DOI)</a>; </span> <span id="download-value-116-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-132.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-116"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-116"> 12/22/2010 </td> </tr> <tr id="result-117"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-117">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-117"> 800-131A Rev. 2</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-131a/rev-2/final" id="pub-title-link-117">Transitioning the Use of Cryptographic Algorithms and Key Lengths</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-117">SP 800-131A Rev. 2</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-131a/rev-2/final" class="mobile-pub-title" id="pub-title-link-sm-117">Transitioning the Use of Cryptographic Algorithms and Key Lengths</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-117">3/21/2019</strong> <br/> Status: <span id="pub-status-sm-117">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-117"> <span id="download-value-117-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-131Ar2">SP 800-131A Rev. 2 (DOI)</a>; </span> <span id="download-value-117-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar2.pdf">Local Download</a>; </span> <span id="download-value-117-2"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media//Publications/sp/800-131a/rev-2/draft/documents/sp800-131Ar2-draft-comments-received.pdf">Comments received on Draft SP 800-131A Rev. 2</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-117"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-117"> 3/21/2019 </td> </tr> <tr id="result-118"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-118">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-118"> 800-130</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-130/final" id="pub-title-link-118">A Framework for Designing Cryptographic Key Management Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-118">SP 800-130</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-130/final" class="mobile-pub-title" id="pub-title-link-sm-118">A Framework for Designing Cryptographic Key Management Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-118">8/15/2013</strong> <br/> Status: <span id="pub-status-sm-118">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-118"> <span id="download-value-118-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-130">SP 800-130 (DOI)</a>; </span> <span id="download-value-118-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-130.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-118"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-118"> 8/15/2013 </td> </tr> <tr id="result-119"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-119">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-119"> 800-128</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-128/final" id="pub-title-link-119">Guide for Security-Focused Configuration Management of Information Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-119">SP 800-128</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-128/final" class="mobile-pub-title" id="pub-title-link-sm-119">Guide for Security-Focused Configuration Management of Information Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-119">10/10/2019</strong> <br/> Status: <span id="pub-status-sm-119">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-119"> <span id="download-value-119-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-128">SP 800-128 (DOI)</a>; </span> <span id="download-value-119-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-128.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-119"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-119"> 10/10/2019 </td> </tr> <tr id="result-120"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-120">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-120"> 800-126 Rev. 3</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-126/rev-3/final" id="pub-title-link-120">The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-120">SP 800-126 Rev. 3</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-126/rev-3/final" class="mobile-pub-title" id="pub-title-link-sm-120">The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-120">2/14/2018</strong> <br/> Status: <span id="pub-status-sm-120">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-120"> <span id="download-value-120-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-126r3">SP 800-126 Rev. 3 (DOI)</a>; </span> <span id="download-value-120-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-126r3.pdf">Local Download</a>; </span> <span id="download-value-120-2"> <a href="https://web.archive.org/web/20220708182845/https://scap.nist.gov/">SCAP project</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-120"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-120"> 2/14/2018 </td> </tr> <tr id="result-121"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-121">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-121"> 800-126 Rev. 2</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-126/rev-2/final" id="pub-title-link-121">The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.2</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-121">SP 800-126 Rev. 2</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-126/rev-2/final" class="mobile-pub-title" id="pub-title-link-sm-121">The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.2</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-121">3/19/2012</strong> <br/> Status: <span id="pub-status-sm-121">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-121"> <span id="download-value-121-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-126r2">SP 800-126 Rev. 2 (DOI)</a>; </span> <span id="download-value-121-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-126r2.pdf">Local Download</a>; </span> <span id="download-value-121-2"> <a href="https://web.archive.org/web/20220708182845/https://scap.nist.gov/">SCAP Project</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-121"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-121"> 3/19/2012 </td> </tr> <tr id="result-122"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-122">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-122"> 800-126A</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-126a/final" id="pub-title-link-122">SCAP 1.3 Component Specification Version Updates: An Annex to NIST Special Publication 800-126 Revision 3</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-122">SP 800-126A</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-126a/final" class="mobile-pub-title" id="pub-title-link-sm-122">SCAP 1.3 Component Specification Version Updates: An Annex to NIST Special Publication 800-126 Revision 3</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-122">2/14/2018</strong> <br/> Status: <span id="pub-status-sm-122">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-122"> <span id="download-value-122-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-126A">SP 800-126A (DOI)</a>; </span> <span id="download-value-122-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-126A.pdf">Local Download</a>; </span> <span id="download-value-122-2"> <a href="https://web.archive.org/web/20220708182845/https://scap.nist.gov/">SCAP project</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-122"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-122"> 2/14/2018 </td> </tr> <tr id="result-123"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-123">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-123"> 800-126 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-126/rev-1/final" id="pub-title-link-123">The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.1</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-123">SP 800-126 Rev. 1</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-126/rev-1/final" class="mobile-pub-title" id="pub-title-link-sm-123">The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.1</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-123">2/25/2011</strong> <br/> Status: <span id="pub-status-sm-123">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-123"> <span id="download-value-123-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-126r1">SP 800-126 Rev. 1 (DOI)</a>; </span> <span id="download-value-123-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-126r1.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-123"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-123"> 2/25/2011 </td> </tr> <tr id="result-124"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-124">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-124"> 800-125B</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-125b/final" id="pub-title-link-124">Secure Virtual Network Configuration for Virtual Machine (VM) Protection</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-124">SP 800-125B</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-125b/final" class="mobile-pub-title" id="pub-title-link-sm-124">Secure Virtual Network Configuration for Virtual Machine (VM) Protection</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-124">3/07/2016</strong> <br/> Status: <span id="pub-status-sm-124">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-124"> <span id="download-value-124-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-125B">SP 800-125B (DOI)</a>; </span> <span id="download-value-124-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-125B.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-124"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-124"> 3/07/2016 </td> </tr> <tr id="result-125"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-125">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-125"> 800-125A Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-125a/rev-1/final" id="pub-title-link-125">Security Recommendations for Server-based Hypervisor Platforms</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-125">SP 800-125A Rev. 1</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-125a/rev-1/final" class="mobile-pub-title" id="pub-title-link-sm-125">Security Recommendations for Server-based Hypervisor Platforms</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-125">6/07/2018</strong> <br/> Status: <span id="pub-status-sm-125">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-125"> <span id="download-value-125-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-125Ar1">SP 800-125A Rev. 1 (DOI)</a>; </span> <span id="download-value-125-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-125Ar1.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-125"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-125"> 6/07/2018 </td> </tr> <tr id="result-126"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-126">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-126"> 800-125</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-125/final" id="pub-title-link-126">Guide to Security for Full Virtualization Technologies</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-126">SP 800-125</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-125/final" class="mobile-pub-title" id="pub-title-link-sm-126">Guide to Security for Full Virtualization Technologies</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-126">1/28/2011</strong> <br/> Status: <span id="pub-status-sm-126">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-126"> <span id="download-value-126-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-125">SP 800-125 (DOI)</a>; </span> <span id="download-value-126-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-125.pdf">Local Download</a>; </span> <span id="download-value-126-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/news-events/news/2011/02/nist-issues-final-version-full-virtualization-security-guidelines">Press Release</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-126"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-126"> 1/28/2011 </td> </tr> <tr id="result-127"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-127">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-127"> 800-124 Rev. 2</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-124/rev-2/draft" id="pub-title-link-127">Guidelines for Managing the Security of Mobile Devices in the Enterprise</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-127">SP 800-124 Rev. 2 (Draft)</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-124/rev-2/draft" class="mobile-pub-title" id="pub-title-link-sm-127">Guidelines for Managing the Security of Mobile Devices in the Enterprise</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-127">3/24/2020</strong> <br/> Status: <span id="pub-status-sm-127">Draft</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-127"> <span id="download-value-127-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-124r2-draft">SP 800-124 Rev. 2 (Draft) (DOI)</a>; </span> <span id="download-value-127-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-124r2-draft.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-127"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-127"> 3/24/2020 </td> </tr> <tr id="result-128"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-128">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-128"> 800-124 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-124/rev-1/final" id="pub-title-link-128">Guidelines for Managing the Security of Mobile Devices in the Enterprise</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-128">SP 800-124 Rev. 1</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-124/rev-1/final" class="mobile-pub-title" id="pub-title-link-sm-128">Guidelines for Managing the Security of Mobile Devices in the Enterprise</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-128">6/21/2013</strong> <br/> Status: <span id="pub-status-sm-128">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-128"> <span id="download-value-128-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-124r1">SP 800-124 Rev. 1 (DOI)</a>; </span> <span id="download-value-128-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-124r1.pdf">Local Download</a>; </span> <span id="download-value-128-2"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-124/rev-1/final/documents/sp800_124_r1.epub">SP 800-124 Rev. 1 (EPUB)</a>; </span> <span id="download-value-128-3"> <a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/news-events/news/2013/06/revised-security-guidelines-provide-strategy-government-mobile-device">Press Release</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-128"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-128"> 6/21/2013 </td> </tr> <tr id="result-129"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-129">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-129"> 800-123</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-123/final" id="pub-title-link-129">Guide to General Server Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-129">SP 800-123</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-123/final" class="mobile-pub-title" id="pub-title-link-sm-129">Guide to General Server Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-129">7/25/2008</strong> <br/> Status: <span id="pub-status-sm-129">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-129"> <span id="download-value-129-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-123">SP 800-123 (DOI)</a>; </span> <span id="download-value-129-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-123.pdf">Local Download</a>; </span> <span id="download-value-129-2"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-123/final/documents/sp800_123.epub">SP 800-123 (EPUB)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-129"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-129"> 7/25/2008 </td> </tr> <tr id="result-130"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-130">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-130"> 800-122</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-122/final" id="pub-title-link-130">Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-130">SP 800-122</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-122/final" class="mobile-pub-title" id="pub-title-link-sm-130">Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-130">4/06/2010</strong> <br/> Status: <span id="pub-status-sm-130">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-130"> <span id="download-value-130-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-122">SP 800-122 (DOI)</a>; </span> <span id="download-value-130-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-122.pdf">Local Download</a>; </span> <span id="download-value-130-2"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-122/final/documents/sp800_122.epub">SP 800-122 (EPUB)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-130"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-130"> 4/06/2010 </td> </tr> <tr id="result-131"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-131">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-131"> 800-121 Rev. 2</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-121/rev-2/final" id="pub-title-link-131">Guide to Bluetooth Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-131">SP 800-121 Rev. 2</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-121/rev-2/final" class="mobile-pub-title" id="pub-title-link-sm-131">Guide to Bluetooth Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-131">1/19/2022</strong> <br/> Status: <span id="pub-status-sm-131">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-131"> <span id="download-value-131-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-121r2-upd1">SP 800-121 Rev. 2 (DOI)</a>; </span> <span id="download-value-131-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-121r2-upd1.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-131"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-131"> 1/19/2022 </td> </tr> <tr id="result-132"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-132">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-132"> 800-119</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-119/final" id="pub-title-link-132">Guidelines for the Secure Deployment of IPv6</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-132">SP 800-119</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-119/final" class="mobile-pub-title" id="pub-title-link-sm-132">Guidelines for the Secure Deployment of IPv6</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-132">12/29/2010</strong> <br/> Status: <span id="pub-status-sm-132">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-132"> <span id="download-value-132-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-119">SP 800-119 (DOI)</a>; </span> <span id="download-value-132-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-119.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-132"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-132"> 12/29/2010 </td> </tr> <tr id="result-133"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-133">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-133"> 800-116 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-116/rev-1/final" id="pub-title-link-133">Guidelines for the Use of PIV Credentials in Facility Access</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-133">SP 800-116 Rev. 1</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-116/rev-1/final" class="mobile-pub-title" id="pub-title-link-sm-133">Guidelines for the Use of PIV Credentials in Facility Access</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-133">6/29/2018</strong> <br/> Status: <span id="pub-status-sm-133">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-133"> <span id="download-value-133-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-116r1">SP 800-116 Rev. 1 (DOI)</a>; </span> <span id="download-value-133-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-116r1.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-133"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-133"> 6/29/2018 </td> </tr> <tr id="result-134"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-134">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-134"> 800-115</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-115/final" id="pub-title-link-134">Technical Guide to Information Security Testing and Assessment</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-134">SP 800-115</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-115/final" class="mobile-pub-title" id="pub-title-link-sm-134">Technical Guide to Information Security Testing and Assessment</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-134">9/30/2008</strong> <br/> Status: <span id="pub-status-sm-134">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-134"> <span id="download-value-134-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-115">SP 800-115 (DOI)</a>; </span> <span id="download-value-134-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-115.pdf">Local Download</a>; </span> <span id="download-value-134-2"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-115/final/documents/sp800_115.epub">SP 800-115 (EPUB)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-134"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-134"> 9/30/2008 </td> </tr> <tr id="result-135"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-135">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-135"> 800-114 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-114/rev-1/final" id="pub-title-link-135">User&#39;s Guide to Telework and Bring Your Own Device (BYOD) Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-135">SP 800-114 Rev. 1</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-114/rev-1/final" class="mobile-pub-title" id="pub-title-link-sm-135">User&#39;s Guide to Telework and Bring Your Own Device (BYOD) Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-135">7/29/2016</strong> <br/> Status: <span id="pub-status-sm-135">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-135"> <span id="download-value-135-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-114r1">SP 800-114 Rev. 1 (DOI)</a>; </span> <span id="download-value-135-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-114r1.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-135"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-135"> 7/29/2016 </td> </tr> <tr id="result-136"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-136">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-136"> 800-113</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-113/final" id="pub-title-link-136">Guide to SSL VPNs</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-136">SP 800-113</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-113/final" class="mobile-pub-title" id="pub-title-link-sm-136">Guide to SSL VPNs</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-136">7/01/2008</strong> <br/> Status: <span id="pub-status-sm-136">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-136"> <span id="download-value-136-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-113">SP 800-113 (DOI)</a>; </span> <span id="download-value-136-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-113.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-136"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-136"> 7/01/2008 </td> </tr> <tr id="result-137"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-137">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-137"> 800-111</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-111/final" id="pub-title-link-137">Guide to Storage Encryption Technologies for End User Devices</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-137">SP 800-111</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-111/final" class="mobile-pub-title" id="pub-title-link-sm-137">Guide to Storage Encryption Technologies for End User Devices</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-137">11/15/2007</strong> <br/> Status: <span id="pub-status-sm-137">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-137"> <span id="download-value-137-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-111">SP 800-111 (DOI)</a>; </span> <span id="download-value-137-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-111.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-137"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-137"> 11/15/2007 </td> </tr> <tr id="result-138"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-138">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-138"> 800-108 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-108/rev-1/draft" id="pub-title-link-138">Recommendation for Key Derivation Using Pseudorandom Functions</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-138">SP 800-108 Rev. 1 (Draft)</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-108/rev-1/draft" class="mobile-pub-title" id="pub-title-link-sm-138">Recommendation for Key Derivation Using Pseudorandom Functions</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-138">10/18/2021</strong> <br/> Status: <span id="pub-status-sm-138">Draft</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-138"> <span id="download-value-138-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-108r1-draft">SP 800-108 Rev. 1 (Draft) (DOI)</a>; </span> <span id="download-value-138-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-108r1-draft.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-138"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-138"> 10/18/2021 </td> </tr> <tr id="result-139"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-139">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-139"> 800-108</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-108/final" id="pub-title-link-139">Recommendation for Key Derivation Using Pseudorandom Functions (Revised)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-139">SP 800-108</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-108/final" class="mobile-pub-title" id="pub-title-link-sm-139">Recommendation for Key Derivation Using Pseudorandom Functions (Revised)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-139">10/01/2009</strong> <br/> Status: <span id="pub-status-sm-139">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-139"> <span id="download-value-139-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-108">SP 800-108 (DOI)</a>; </span> <span id="download-value-139-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-108.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-139"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-139"> 10/01/2009 </td> </tr> <tr id="result-140"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-140">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-140"> 800-107 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-107/rev-1/final" id="pub-title-link-140">Recommendation for Applications Using Approved Hash Algorithms</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-140">SP 800-107 Rev. 1</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-107/rev-1/final" class="mobile-pub-title" id="pub-title-link-sm-140">Recommendation for Applications Using Approved Hash Algorithms</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-140">8/24/2012</strong> <br/> Status: <span id="pub-status-sm-140">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-140"> <span id="download-value-140-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-107r1">SP 800-107 Rev. 1 (DOI)</a>; </span> <span id="download-value-140-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-107r1.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-140"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-140"> 8/24/2012 </td> </tr> <tr id="result-141"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-141">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-141"> 800-106</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-106/final" id="pub-title-link-141">Randomized Hashing for Digital Signatures</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-141">SP 800-106</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-106/final" class="mobile-pub-title" id="pub-title-link-sm-141">Randomized Hashing for Digital Signatures</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-141">2/25/2009</strong> <br/> Status: <span id="pub-status-sm-141">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-141"> <span id="download-value-141-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-106">SP 800-106 (DOI)</a>; </span> <span id="download-value-141-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-106.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-141"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-141"> 2/25/2009 </td> </tr> <tr id="result-142"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-142">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-142"> 800-102</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-102/final" id="pub-title-link-142">Recommendation for Digital Signature Timeliness</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-142">SP 800-102</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-102/final" class="mobile-pub-title" id="pub-title-link-sm-142">Recommendation for Digital Signature Timeliness</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-142">9/23/2009</strong> <br/> Status: <span id="pub-status-sm-142">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-142"> <span id="download-value-142-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-102">SP 800-102 (DOI)</a>; </span> <span id="download-value-142-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-102.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-142"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-142"> 9/23/2009 </td> </tr> <tr id="result-143"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-143">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-143"> 800-101 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-101/rev-1/final" id="pub-title-link-143">Guidelines on Mobile Device Forensics</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-143">SP 800-101 Rev. 1</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-101/rev-1/final" class="mobile-pub-title" id="pub-title-link-sm-143">Guidelines on Mobile Device Forensics</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-143">5/15/2014</strong> <br/> Status: <span id="pub-status-sm-143">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-143"> <span id="download-value-143-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-101r1">SP 800-101 Rev. 1 (DOI)</a>; </span> <span id="download-value-143-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-101r1.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-143"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-143"> 5/15/2014 </td> </tr> <tr id="result-144"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-144">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-144"> 800-100</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-100/final" id="pub-title-link-144">Information Security Handbook: A Guide for Managers</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-144">SP 800-100</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-100/final" class="mobile-pub-title" id="pub-title-link-sm-144">Information Security Handbook: A Guide for Managers</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-144">3/07/2007</strong> <br/> Status: <span id="pub-status-sm-144">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-144"> <span id="download-value-144-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-100">SP 800-100 (DOI)</a>; </span> <span id="download-value-144-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-100.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-144"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-144"> 3/07/2007 </td> </tr> <tr id="result-145"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-145">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-145"> 800-98</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-98/final" id="pub-title-link-145">Guidelines for Securing Radio Frequency Identification (RFID) Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-145">SP 800-98</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-98/final" class="mobile-pub-title" id="pub-title-link-sm-145">Guidelines for Securing Radio Frequency Identification (RFID) Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-145">4/06/2007</strong> <br/> Status: <span id="pub-status-sm-145">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-145"> <span id="download-value-145-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-98">SP 800-98 (DOI)</a>; </span> <span id="download-value-145-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-98.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-145"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-145"> 4/06/2007 </td> </tr> <tr id="result-146"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-146">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-146"> 800-97</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-97/final" id="pub-title-link-146">Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-146">SP 800-97</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-97/final" class="mobile-pub-title" id="pub-title-link-sm-146">Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-146">2/07/2007</strong> <br/> Status: <span id="pub-status-sm-146">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-146"> <span id="download-value-146-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-97">SP 800-97 (DOI)</a>; </span> <span id="download-value-146-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-97.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-146"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-146"> 2/07/2007 </td> </tr> <tr id="result-147"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-147">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-147"> 800-96</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-96/final" id="pub-title-link-147">PIV Card to Reader Interoperability Guidelines</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-147">SP 800-96</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-96/final" class="mobile-pub-title" id="pub-title-link-sm-147">PIV Card to Reader Interoperability Guidelines</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-147">12/29/2006</strong> <br/> Status: <span id="pub-status-sm-147">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-147"> <span id="download-value-147-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-96">SP 800-96 (DOI)</a>; </span> <span id="download-value-147-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-96.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-147"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-147"> 12/29/2006 </td> </tr> <tr id="result-148"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-148">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-148"> 800-95</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-95/final" id="pub-title-link-148">Guide to Secure Web Services</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-148">SP 800-95</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-95/final" class="mobile-pub-title" id="pub-title-link-sm-148">Guide to Secure Web Services</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-148">8/29/2007</strong> <br/> Status: <span id="pub-status-sm-148">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-148"> <span id="download-value-148-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-95">SP 800-95 (DOI)</a>; </span> <span id="download-value-148-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-95.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-148"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-148"> 8/29/2007 </td> </tr> <tr id="result-149"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-149">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-149"> 800-94 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-94/rev-1/draft" id="pub-title-link-149">Guide to Intrusion Detection and Prevention Systems (IDPS)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-149">SP 800-94 Rev. 1 (Draft)</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-94/rev-1/draft" class="mobile-pub-title" id="pub-title-link-sm-149">Guide to Intrusion Detection and Prevention Systems (IDPS)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-149">7/25/2012</strong> <br/> Status: <span id="pub-status-sm-149">Draft</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-149"> <span id="download-value-149-0"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-94/rev-1/draft/documents/draft_sp800-94-rev1.pdf">Draft SP 800-94 Rev. 1</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-149"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-149"> 7/25/2012 </td> </tr> <tr id="result-150"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-150">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-150"> 800-94</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-94/final" id="pub-title-link-150">Guide to Intrusion Detection and Prevention Systems (IDPS)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-150">SP 800-94</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-94/final" class="mobile-pub-title" id="pub-title-link-sm-150">Guide to Intrusion Detection and Prevention Systems (IDPS)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-150">2/20/2007</strong> <br/> Status: <span id="pub-status-sm-150">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-150"> <span id="download-value-150-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-94">SP 800-94 (DOI)</a>; </span> <span id="download-value-150-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-94.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-150"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-150"> 2/20/2007 </td> </tr> <tr id="result-151"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-151">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-151"> 800-92</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-92/final" id="pub-title-link-151">Guide to Computer Security Log Management</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-151">SP 800-92</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-92/final" class="mobile-pub-title" id="pub-title-link-sm-151">Guide to Computer Security Log Management</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-151">9/13/2006</strong> <br/> Status: <span id="pub-status-sm-151">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-151"> <span id="download-value-151-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-92">SP 800-92 (DOI)</a>; </span> <span id="download-value-151-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-92.pdf">Local Download</a>; </span> <span id="download-value-151-2"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-92/final/documents/sp800_92.epub">SP 800-92 (EPUB)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-151"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-151"> 9/13/2006 </td> </tr> <tr id="result-152"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-152">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-152"> 800-90C</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-90c/draft" id="pub-title-link-152">Recommendation for Random Bit Generator (RBG) Constructions</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-152">SP 800-90C (Draft)</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-90c/draft" class="mobile-pub-title" id="pub-title-link-sm-152">Recommendation for Random Bit Generator (RBG) Constructions</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-152">4/13/2016</strong> <br/> Status: <span id="pub-status-sm-152">Draft</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-152"> <span id="download-value-152-0"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-90c/draft/documents/sp800_90c_second_draft.pdf">Second Draft SP 800-90C</a>; </span> <span id="download-value-152-1"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-90c/draft/documents/sp800_90c_second_draft_comment_template.docx">Comment Template</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-152"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-152"> 4/13/2016 </td> </tr> <tr id="result-153"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-153">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-153"> 800-90B</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-90b/final" id="pub-title-link-153">Recommendation for the Entropy Sources Used for Random Bit Generation</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-153">SP 800-90B</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-90b/final" class="mobile-pub-title" id="pub-title-link-sm-153">Recommendation for the Entropy Sources Used for Random Bit Generation</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-153">1/10/2018</strong> <br/> Status: <span id="pub-status-sm-153">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-153"> <span id="download-value-153-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-90B">SP 800-90B (DOI)</a>; </span> <span id="download-value-153-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90B.pdf">Local Download</a>; </span> <span id="download-value-153-2"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media//Publications/sp/800-90b/draft/documents/sp800-90b_second_draft.pdf">2nd Draft SP 800-90B</a>; </span> <span id="download-value-153-3"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-90b/draft/documents/Comments-received-SP800-90B-May2016.pdf">Comments received on 2nd Draft</a>; </span> <span id="download-value-153-4"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-90b/final/documents/sp800-90B-changes-2nd-draft-to-final-summary.pdf">Summary of Changes (from 2nd Draft to Final)</a>; </span> <span id="download-value-153-5"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-90b/final/documents/sp800-90B-changes-2nd-draft-to-final-markup.pdf">Markup of Changes (from 2nd Draft to Final)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-153"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-153"> 1/10/2018 </td> </tr> <tr id="result-154"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-154">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-154"> 800-90A Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-90a/rev-1/final" id="pub-title-link-154">Recommendation for Random Number Generation Using Deterministic Random Bit Generators</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-154">SP 800-90A Rev. 1</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-90a/rev-1/final" class="mobile-pub-title" id="pub-title-link-sm-154">Recommendation for Random Number Generation Using Deterministic Random Bit Generators</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-154">6/24/2015</strong> <br/> Status: <span id="pub-status-sm-154">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-154"> <span id="download-value-154-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-90Ar1">SP 800-90A Rev. 1 (DOI)</a>; </span> <span id="download-value-154-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf">Local Download</a>; </span> <span id="download-value-154-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/news-events/news/2015/06/nist-revises-key-computer-security-publication-random-number-generation">Press Release</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-154"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-154"> 6/24/2015 </td> </tr> <tr id="result-155"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-155">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-155"> 800-89</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-89/final" id="pub-title-link-155">Recommendation for Obtaining Assurances for Digital Signature Applications</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-155">SP 800-89</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-89/final" class="mobile-pub-title" id="pub-title-link-sm-155">Recommendation for Obtaining Assurances for Digital Signature Applications</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-155">11/30/2006</strong> <br/> Status: <span id="pub-status-sm-155">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-155"> <span id="download-value-155-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-89">SP 800-89 (DOI)</a>; </span> <span id="download-value-155-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-89.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-155"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-155"> 11/30/2006 </td> </tr> <tr id="result-156"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-156">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-156"> 800-88 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-88/rev-1/final" id="pub-title-link-156">Guidelines for Media Sanitization</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-156">SP 800-88 Rev. 1</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-88/rev-1/final" class="mobile-pub-title" id="pub-title-link-sm-156">Guidelines for Media Sanitization</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-156">12/17/2014</strong> <br/> Status: <span id="pub-status-sm-156">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-156"> <span id="download-value-156-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-88r1">SP 800-88 Rev. 1 (DOI)</a>; </span> <span id="download-value-156-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf">Local Download</a>; </span> <span id="download-value-156-2"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-88/rev-1/final/documents/Sample-Certificate-of-Sanitization.docx">Sample "Certificate of Sanitization" from Appendix G</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-156"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-156"> 12/17/2014 </td> </tr> <tr id="result-157"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-157">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-157"> 800-87 Rev. 2</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-87/rev-2/final" id="pub-title-link-157">Codes for Identification of Federal and Federally-Assisted Organizations</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-157">SP 800-87 Rev. 2</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-87/rev-2/final" class="mobile-pub-title" id="pub-title-link-sm-157">Codes for Identification of Federal and Federally-Assisted Organizations</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-157">4/19/2018</strong> <br/> Status: <span id="pub-status-sm-157">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-157"> <span id="download-value-157-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-87r2">SP 800-87 Rev. 2 (DOI)</a>; </span> <span id="download-value-157-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-87r2.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-157"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-157"> 4/19/2018 </td> </tr> <tr id="result-158"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-158">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-158"> 800-86</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-86/final" id="pub-title-link-158">Guide to Integrating Forensic Techniques into Incident Response</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-158">SP 800-86</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-86/final" class="mobile-pub-title" id="pub-title-link-sm-158">Guide to Integrating Forensic Techniques into Incident Response</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-158">9/01/2006</strong> <br/> Status: <span id="pub-status-sm-158">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-158"> <span id="download-value-158-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-86">SP 800-86 (DOI)</a>; </span> <span id="download-value-158-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-86.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-158"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-158"> 9/01/2006 </td> </tr> <tr id="result-159"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-159">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-159"> 800-85B-4</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-85b/4/draft" id="pub-title-link-159">PIV Data Model Test Guidelines</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-159">SP 800-85B-4 (Draft)</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-85b/4/draft" class="mobile-pub-title" id="pub-title-link-sm-159">PIV Data Model Test Guidelines</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-159">8/06/2014</strong> <br/> Status: <span id="pub-status-sm-159">Draft</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-159"> <span id="download-value-159-0"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-85b/4/draft/documents/sp800_85b-4_draft.pdf">Draft SP 800-85B-4</a>; </span> <span id="download-value-159-1"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-85b/4/draft/documents/sp800_85b-4_draft_comment_template.xls">Comment Template</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-159"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-159"> 8/06/2014 </td> </tr> <tr id="result-160"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-160">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-160"> 800-85B</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-85b/final" id="pub-title-link-160">PIV Data Model Test Guidelines</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-160">SP 800-85B</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-85b/final" class="mobile-pub-title" id="pub-title-link-sm-160">PIV Data Model Test Guidelines</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-160">7/31/2006</strong> <br/> Status: <span id="pub-status-sm-160">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-160"> <span id="download-value-160-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-85B">SP 800-85B (DOI)</a>; </span> <span id="download-value-160-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-85b.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-160"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-160"> 7/31/2006 </td> </tr> <tr id="result-161"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-161">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-161"> 800-85A-4</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-85a/4/final" id="pub-title-link-161">PIV Card Application and Middleware Interface Test Guidelines (SP 800-73-4 Compliance)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-161">SP 800-85A-4</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-85a/4/final" class="mobile-pub-title" id="pub-title-link-sm-161">PIV Card Application and Middleware Interface Test Guidelines (SP 800-73-4 Compliance)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-161">4/13/2016</strong> <br/> Status: <span id="pub-status-sm-161">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-161"> <span id="download-value-161-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-85A-4">SP 800-85A-4 (DOI)</a>; </span> <span id="download-value-161-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-85A-4.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-161"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-161"> 4/13/2016 </td> </tr> <tr id="result-162"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-162">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-162"> 800-84</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-84/final" id="pub-title-link-162">Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-162">SP 800-84</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-84/final" class="mobile-pub-title" id="pub-title-link-sm-162">Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-162">9/21/2006</strong> <br/> Status: <span id="pub-status-sm-162">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-162"> <span id="download-value-162-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-84">SP 800-84 (DOI)</a>; </span> <span id="download-value-162-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-84.pdf">Local Download</a>; </span> <span id="download-value-162-2"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-84/final/documents/sp800_84.epub">SP 800-84 (EPUB)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-162"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-162"> 9/21/2006 </td> </tr> <tr id="result-163"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-163">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-163"> 800-83 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-83/rev-1/final" id="pub-title-link-163">Guide to Malware Incident Prevention and Handling for Desktops and Laptops</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-163">SP 800-83 Rev. 1</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-83/rev-1/final" class="mobile-pub-title" id="pub-title-link-sm-163">Guide to Malware Incident Prevention and Handling for Desktops and Laptops</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-163">7/22/2013</strong> <br/> Status: <span id="pub-status-sm-163">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-163"> <span id="download-value-163-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-83r1">SP 800-83 Rev. 1 (DOI)</a>; </span> <span id="download-value-163-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-83r1.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-163"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-163"> 7/22/2013 </td> </tr> <tr id="result-164"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-164">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-164"> 800-82 Rev. 3</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-82/rev-3/draft" id="pub-title-link-164">Guide to Operational Technology (OT) Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-164">SP 800-82 Rev. 3 (Draft)</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-82/rev-3/draft" class="mobile-pub-title" id="pub-title-link-sm-164">Guide to Operational Technology (OT) Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-164">4/26/2022</strong> <br/> Status: <span id="pub-status-sm-164">Draft</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-164"> <span id="download-value-164-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-82r3.ipd">SP 800-82 Rev. 3 (Draft) (DOI)</a>; </span> <span id="download-value-164-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r3.ipd.pdf">Local Download</a>; </span> <span id="download-value-164-2"> <a href="/web/20220708182845/https://csrc.nist.gov/csrc/media/Publications/sp/800-82/rev-3/draft/documents/sp800-82r3-draft-comment-template.xlsx">Comment template</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-164"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-164"> 4/26/2022 </td> </tr> <tr id="result-165"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-165">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-165"> 800-82 Rev. 2</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-82/rev-2/final" id="pub-title-link-165">Guide to Industrial Control Systems (ICS) Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-165">SP 800-82 Rev. 2</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-82/rev-2/final" class="mobile-pub-title" id="pub-title-link-sm-165">Guide to Industrial Control Systems (ICS) Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-165">6/03/2015</strong> <br/> Status: <span id="pub-status-sm-165">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-165"> <span id="download-value-165-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-82r2">SP 800-82 Rev. 2 (DOI)</a>; </span> <span id="download-value-165-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r2.pdf">Local Download</a>; </span> <span id="download-value-165-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/news-events/news/2015/06/nist-releases-update-industrial-control-systems-security-guide">Press Release</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-165"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-165"> 6/03/2015 </td> </tr> <tr id="result-166"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-166">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-166"> 800-81-2</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-81/2/final" id="pub-title-link-166">Secure Domain Name System (DNS) Deployment Guide</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-166">SP 800-81-2</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-81/2/final" class="mobile-pub-title" id="pub-title-link-sm-166">Secure Domain Name System (DNS) Deployment Guide</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-166">9/18/2013</strong> <br/> Status: <span id="pub-status-sm-166">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-166"> <span id="download-value-166-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-81-2">SP 800-81-2 (DOI)</a>; </span> <span id="download-value-166-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-81-2.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-166"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-166"> 9/18/2013 </td> </tr> <tr id="result-167"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-167">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-167"> 800-79-2</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-79/2/final" id="pub-title-link-167">Guidelines for the Authorization of Personal Identity Verification Card Issuers (PCI) and Derived PIV Credential Issuers (DPCI)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-167">SP 800-79-2</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-79/2/final" class="mobile-pub-title" id="pub-title-link-sm-167">Guidelines for the Authorization of Personal Identity Verification Card Issuers (PCI) and Derived PIV Credential Issuers (DPCI)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-167">7/30/2015</strong> <br/> Status: <span id="pub-status-sm-167">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-167"> <span id="download-value-167-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-79-2">SP 800-79-2 (DOI)</a>; </span> <span id="download-value-167-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-79-2.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-167"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-167"> 7/30/2015 </td> </tr> <tr id="result-168"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-168">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-168"> 800-78-4</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-78/4/final" id="pub-title-link-168">Cryptographic Algorithms and Key Sizes for Personal Identity Verification</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-168">SP 800-78-4</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-78/4/final" class="mobile-pub-title" id="pub-title-link-sm-168">Cryptographic Algorithms and Key Sizes for Personal Identity Verification</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-168">5/29/2015</strong> <br/> Status: <span id="pub-status-sm-168">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-168"> <span id="download-value-168-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-78-4">SP 800-78-4 (DOI)</a>; </span> <span id="download-value-168-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-78-4.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-168"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-168"> 5/29/2015 </td> </tr> <tr id="result-169"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-169">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-169"> 800-77 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-77/rev-1/final" id="pub-title-link-169">Guide to IPsec VPNs</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-169">SP 800-77 Rev. 1</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-77/rev-1/final" class="mobile-pub-title" id="pub-title-link-sm-169">Guide to IPsec VPNs</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-169">6/30/2020</strong> <br/> Status: <span id="pub-status-sm-169">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-169"> <span id="download-value-169-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-77r1">SP 800-77 Rev. 1 (DOI)</a>; </span> <span id="download-value-169-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-77r1.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-169"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-169"> 6/30/2020 </td> </tr> <tr id="result-170"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-170">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-170"> 800-76-2</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-76/2/final" id="pub-title-link-170">Biometric Specifications for Personal Identity Verification</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-170">SP 800-76-2</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-76/2/final" class="mobile-pub-title" id="pub-title-link-sm-170">Biometric Specifications for Personal Identity Verification</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-170">7/11/2013</strong> <br/> Status: <span id="pub-status-sm-170">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-170"> <span id="download-value-170-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-76-2">SP 800-76-2 (DOI)</a>; </span> <span id="download-value-170-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-76-2.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-170"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-170"> 7/11/2013 </td> </tr> <tr id="result-171"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-171">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-171"> 800-73-4</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-73/4/final" id="pub-title-link-171">Interfaces for Personal Identity Verification</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-171">SP 800-73-4</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-73/4/final" class="mobile-pub-title" id="pub-title-link-sm-171">Interfaces for Personal Identity Verification</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-171">2/12/2016</strong> <br/> Status: <span id="pub-status-sm-171">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-171"> <span id="download-value-171-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-73-4">SP 800-73-4 (DOI)</a>; </span> <span id="download-value-171-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-73-4.pdf">Local Download</a>; </span> <span id="download-value-171-2"> <a href="https://web.archive.org/web/20220708182845/http://www.nist.gov/itl/csd/nextgen-pivcard-061615.cfm">Press Release (06-16-2015)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-171"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-171"> 2/12/2016 </td> </tr> <tr id="result-172"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-172">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-172"> 800-72</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-72/final" id="pub-title-link-172">Guidelines on PDA Forensics</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-172">SP 800-72</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-72/final" class="mobile-pub-title" id="pub-title-link-sm-172">Guidelines on PDA Forensics</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-172">11/01/2004</strong> <br/> Status: <span id="pub-status-sm-172">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-172"> <span id="download-value-172-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-72">SP 800-72 (DOI)</a>; </span> <span id="download-value-172-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-72.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-172"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-172"> 11/01/2004 </td> </tr> <tr id="result-173"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-173">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-173"> 800-71</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-71/draft" id="pub-title-link-173">Recommendation for Key Establishment Using Symmetric Block Ciphers</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-173">SP 800-71 (Draft)</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-71/draft" class="mobile-pub-title" id="pub-title-link-sm-173">Recommendation for Key Establishment Using Symmetric Block Ciphers</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-173">7/02/2018</strong> <br/> Status: <span id="pub-status-sm-173">Draft</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-173"> <span id="download-value-173-0"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-71/draft/documents/sp800-71-draft.pdf">Draft SP 800-71</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-173"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-173"> 7/02/2018 </td> </tr> <tr id="result-174"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-174">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-174"> 800-70 Rev. 4</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-70/rev-4/final" id="pub-title-link-174">National Checklist Program for IT Products: Guidelines for Checklist Users and Developers</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-174">SP 800-70 Rev. 4</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-70/rev-4/final" class="mobile-pub-title" id="pub-title-link-sm-174">National Checklist Program for IT Products: Guidelines for Checklist Users and Developers</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-174">2/15/2018</strong> <br/> Status: <span id="pub-status-sm-174">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-174"> <span id="download-value-174-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-70r4">SP 800-70 Rev. 4 (DOI)</a>; </span> <span id="download-value-174-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-70r4.pdf">Local Download</a>; </span> <span id="download-value-174-2"> <a href="https://web.archive.org/web/20220708182845/https://checklists.nist.gov/">National Checklist Program</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-174"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-174"> 2/15/2018 </td> </tr> <tr id="result-175"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-175">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-175"> 800-67 Rev. 2</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-67/rev-2/final" id="pub-title-link-175">Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-175">SP 800-67 Rev. 2</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-67/rev-2/final" class="mobile-pub-title" id="pub-title-link-sm-175">Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-175">11/17/2017</strong> <br/> Status: <span id="pub-status-sm-175">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-175"> <span id="download-value-175-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-67r2">SP 800-67 Rev. 2 (DOI)</a>; </span> <span id="download-value-175-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-67r2.pdf">Local Download</a>; </span> <span id="download-value-175-2"> <a href="https://web.archive.org/web/20220708182845/https://csrc.nist.gov/news/2017/update-to-current-use-and-deprecation-of-tdea">NIST Statement on Current Use and Deprecation of TDEA (7/11/17)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-175"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-175"> 11/17/2017 </td> </tr> <tr id="result-176"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-176">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-176"> 800-66 Rev. 2</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-66/rev-2/draft" id="pub-title-link-176">PRE-DRAFT Call for Comments: Implementing the HIPAA Security Rule</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-176">SP 800-66 Rev. 2 (Draft)</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-66/rev-2/draft" class="mobile-pub-title" id="pub-title-link-sm-176">PRE-DRAFT Call for Comments: Implementing the HIPAA Security Rule</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-176">4/29/2021</strong> <br/> Status: <span id="pub-status-sm-176">Draft</span> </div> <div class="control-value-no-block"> Download: <span id="download-values-176">None available</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-176"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-176"> 4/29/2021 </td> </tr> <tr id="result-177"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-177">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-177"> 800-66 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-66/rev-1/final" id="pub-title-link-177">An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-177">SP 800-66 Rev. 1</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-66/rev-1/final" class="mobile-pub-title" id="pub-title-link-sm-177">An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-177">10/23/2008</strong> <br/> Status: <span id="pub-status-sm-177">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-177"> <span id="download-value-177-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-66r1">SP 800-66 Rev. 1 (DOI)</a>; </span> <span id="download-value-177-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-66r1.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-177"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-177"> 10/23/2008 </td> </tr> <tr id="result-178"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-178">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-178"> 800-63-4</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-63/4/draft" id="pub-title-link-178">PRE-DRAFT Call for Comments: Digital Identity Guidelines</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-178">SP 800-63-4 (Draft)</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-63/4/draft" class="mobile-pub-title" id="pub-title-link-sm-178">PRE-DRAFT Call for Comments: Digital Identity Guidelines</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-178">6/08/2020</strong> <br/> Status: <span id="pub-status-sm-178">Draft</span> </div> <div class="control-value-no-block"> Download: <span id="download-values-178">None available</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-178"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-178"> 6/08/2020 </td> </tr> <tr id="result-179"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-179">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-179"> 800-63-3</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-63/3/final" id="pub-title-link-179">Digital Identity Guidelines</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-179">SP 800-63-3</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-63/3/final" class="mobile-pub-title" id="pub-title-link-sm-179">Digital Identity Guidelines</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-179">3/02/2020</strong> <br/> Status: <span id="pub-status-sm-179">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-179"> <span id="download-value-179-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-63-3">SP 800-63-3 (DOI)</a>; </span> <span id="download-value-179-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63-3.pdf">Local Download</a>; </span> <span id="download-value-179-2"> <a href="https://web.archive.org/web/20220708182845/https://pages.nist.gov/800-63-FAQ/">FAQ</a>; </span> <span id="download-value-179-3"> <a href="https://web.archive.org/web/20220708182845/https://pages.nist.gov/800-63-3/">SP 800-63 (GitHub)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-179"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-179"> 3/02/2020 </td> </tr> <tr id="result-180"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-180">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-180"> 800-63C</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-63c/final" id="pub-title-link-180">Digital Identity Guidelines: Federation and Assertions</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-180">SP 800-63C</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-63c/final" class="mobile-pub-title" id="pub-title-link-sm-180">Digital Identity Guidelines: Federation and Assertions</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-180">3/02/2020</strong> <br/> Status: <span id="pub-status-sm-180">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-180"> <span id="download-value-180-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-63c">SP 800-63C (DOI)</a>; </span> <span id="download-value-180-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63c.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-180"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-180"> 3/02/2020 </td> </tr> <tr id="result-181"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-181">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-181"> 800-63B</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-63b/final" id="pub-title-link-181">Digital Identity Guidelines: Authentication and Lifecycle Management</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-181">SP 800-63B</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-63b/final" class="mobile-pub-title" id="pub-title-link-sm-181">Digital Identity Guidelines: Authentication and Lifecycle Management</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-181">3/02/2020</strong> <br/> Status: <span id="pub-status-sm-181">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-181"> <span id="download-value-181-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-63b">SP 800-63B (DOI)</a>; </span> <span id="download-value-181-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63b.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-181"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-181"> 3/02/2020 </td> </tr> <tr id="result-182"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-182">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-182"> 800-63A</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-63a/final" id="pub-title-link-182">Digital Identity Guidelines: Enrollment and Identity Proofing</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-182">SP 800-63A</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-63a/final" class="mobile-pub-title" id="pub-title-link-sm-182">Digital Identity Guidelines: Enrollment and Identity Proofing</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-182">3/02/2020</strong> <br/> Status: <span id="pub-status-sm-182">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-182"> <span id="download-value-182-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-63a">SP 800-63A (DOI)</a>; </span> <span id="download-value-182-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63a.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-182"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-182"> 3/02/2020 </td> </tr> <tr id="result-183"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-183">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-183"> 800-61 Rev. 2</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-61/rev-2/final" id="pub-title-link-183">Computer Security Incident Handling Guide</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-183">SP 800-61 Rev. 2</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-61/rev-2/final" class="mobile-pub-title" id="pub-title-link-sm-183">Computer Security Incident Handling Guide</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-183">8/06/2012</strong> <br/> Status: <span id="pub-status-sm-183">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-183"> <span id="download-value-183-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-61r2">SP 800-61 Rev. 2 (DOI)</a>; </span> <span id="download-value-183-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf">Local Download</a>; </span> <span id="download-value-183-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/news-events/news/2012/08/updated-nist-guide-how-dealing-computer-security-incidents">Press Release</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-183"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-183"> 8/06/2012 </td> </tr> <tr id="result-184"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-184">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-184"> 800-60 Vol. 2 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-60/vol-2-rev-1/final" id="pub-title-link-184">Guide for Mapping Types of Information and Information Systems to Security Categories: Appendices</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-184">SP 800-60 Vol. 2 Rev. 1</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-60/vol-2-rev-1/final" class="mobile-pub-title" id="pub-title-link-sm-184">Guide for Mapping Types of Information and Information Systems to Security Categories: Appendices</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-184">8/01/2008</strong> <br/> Status: <span id="pub-status-sm-184">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-184"> <span id="download-value-184-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-60v2r1">SP 800-60 Vol. 2 Rev. 1 (DOI)</a>; </span> <span id="download-value-184-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-60v2r1.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-184"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-184"> 8/01/2008 </td> </tr> <tr id="result-185"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-185">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-185"> 800-60 Vol. 1 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-60/vol-1-rev-1/final" id="pub-title-link-185">Guide for Mapping Types of Information and Information Systems to Security Categories</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-185">SP 800-60 Vol. 1 Rev. 1</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-60/vol-1-rev-1/final" class="mobile-pub-title" id="pub-title-link-sm-185">Guide for Mapping Types of Information and Information Systems to Security Categories</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-185">8/01/2008</strong> <br/> Status: <span id="pub-status-sm-185">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-185"> <span id="download-value-185-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-60v1r1">SP 800-60 Vol. 1 Rev. 1 (DOI)</a>; </span> <span id="download-value-185-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-60v1r1.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-185"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-185"> 8/01/2008 </td> </tr> <tr id="result-186"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-186">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-186"> 800-59</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-59/final" id="pub-title-link-186">Guideline for Identifying an Information System as a National Security System</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-186">SP 800-59</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-59/final" class="mobile-pub-title" id="pub-title-link-sm-186">Guideline for Identifying an Information System as a National Security System</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-186">8/20/2003</strong> <br/> Status: <span id="pub-status-sm-186">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-186"> <span id="download-value-186-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-59">SP 800-59 (DOI)</a>; </span> <span id="download-value-186-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-59.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-186"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-186"> 8/20/2003 </td> </tr> <tr id="result-187"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-187">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-187"> 800-58</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-58/final" id="pub-title-link-187">Security Considerations for Voice Over IP Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-187">SP 800-58</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-58/final" class="mobile-pub-title" id="pub-title-link-sm-187">Security Considerations for Voice Over IP Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-187">1/01/2005</strong> <br/> Status: <span id="pub-status-sm-187">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-187"> <span id="download-value-187-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-58">SP 800-58 (DOI)</a>; </span> <span id="download-value-187-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-58.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-187"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-187"> 1/01/2005 </td> </tr> <tr id="result-188"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-188">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-188"> 800-57 Part 3 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-57-part-3/rev-1/final" id="pub-title-link-188">Recommendation for Key Management, Part 3: Application-Specific Key Management Guidance</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-188">SP 800-57 Part 3 Rev. 1</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-57-part-3/rev-1/final" class="mobile-pub-title" id="pub-title-link-sm-188">Recommendation for Key Management, Part 3: Application-Specific Key Management Guidance</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-188">1/22/2015</strong> <br/> Status: <span id="pub-status-sm-188">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-188"> <span id="download-value-188-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-57pt3r1">SP 800-57 Part 3 Rev. 1 (DOI)</a>; </span> <span id="download-value-188-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57Pt3r1.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-188"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-188"> 1/22/2015 </td> </tr> <tr id="result-189"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-189">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-189"> 800-57 Part 2 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-57-part-2/rev-1/final" id="pub-title-link-189">Recommendation for Key Management: Part 2 – Best Practices for Key Management Organizations</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-189">SP 800-57 Part 2 Rev. 1</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-57-part-2/rev-1/final" class="mobile-pub-title" id="pub-title-link-sm-189">Recommendation for Key Management: Part 2 – Best Practices for Key Management Organizations</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-189">5/23/2019</strong> <br/> Status: <span id="pub-status-sm-189">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-189"> <span id="download-value-189-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-57pt2r1">SP 800-57 Part 2 Rev. 1 (DOI)</a>; </span> <span id="download-value-189-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt2r1.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-189"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-189"> 5/23/2019 </td> </tr> <tr id="result-190"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-190">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-190"> 800-57 Part 1 Rev. 5</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-57-part-1/rev-5/final" id="pub-title-link-190">Recommendation for Key Management: Part 1 – General</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-190">SP 800-57 Part 1 Rev. 5</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-57-part-1/rev-5/final" class="mobile-pub-title" id="pub-title-link-sm-190">Recommendation for Key Management: Part 1 – General</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-190">5/04/2020</strong> <br/> Status: <span id="pub-status-sm-190">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-190"> <span id="download-value-190-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-57pt1r5">SP 800-57 Part 1 Rev. 5 (DOI)</a>; </span> <span id="download-value-190-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-190"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-190"> 5/04/2020 </td> </tr> <tr id="result-191"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-191">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-191"> 800-56C Rev. 2</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-56c/rev-2/final" id="pub-title-link-191">Recommendation for Key-Derivation Methods in Key-Establishment Schemes</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-191">SP 800-56C Rev. 2</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-56c/rev-2/final" class="mobile-pub-title" id="pub-title-link-sm-191">Recommendation for Key-Derivation Methods in Key-Establishment Schemes</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-191">8/18/2020</strong> <br/> Status: <span id="pub-status-sm-191">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-191"> <span id="download-value-191-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-56Cr2">SP 800-56C Rev. 2 (DOI)</a>; </span> <span id="download-value-191-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Cr2.pdf">Local Download</a>; </span> <span id="download-value-191-2"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-56c/rev-2/draft/documents/sp800-56Cr2-draft-comments-received.pdf">Comments received on Draft SP 800-56C Rev. 2</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-191"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-191"> 8/18/2020 </td> </tr> <tr id="result-192"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-192">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-192"> 800-56B Rev. 2</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-56b/rev-2/final" id="pub-title-link-192">Recommendation for Pair-Wise Key-Establishment Using Integer Factorization Cryptography</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-192">SP 800-56B Rev. 2</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-56b/rev-2/final" class="mobile-pub-title" id="pub-title-link-sm-192">Recommendation for Pair-Wise Key-Establishment Using Integer Factorization Cryptography</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-192">3/21/2019</strong> <br/> Status: <span id="pub-status-sm-192">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-192"> <span id="download-value-192-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-56Br2">SP 800-56B Rev. 2 (DOI)</a>; </span> <span id="download-value-192-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Br2.pdf">Local Download</a>; </span> <span id="download-value-192-2"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media//Publications/sp/800-56b/rev-2/draft/documents/sp800-56Br2-draft-comments-received.pdf">Comments received on Draft SP 800-56B Rev. 2 (July 2018)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-192"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-192"> 3/21/2019 </td> </tr> <tr id="result-193"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-193">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-193"> 800-56A Rev. 3</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-56a/rev-3/final" id="pub-title-link-193">Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-193">SP 800-56A Rev. 3</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-56a/rev-3/final" class="mobile-pub-title" id="pub-title-link-sm-193">Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-193">4/16/2018</strong> <br/> Status: <span id="pub-status-sm-193">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-193"> <span id="download-value-193-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-56Ar3">SP 800-56A Rev. 3 (DOI)</a>; </span> <span id="download-value-193-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar3.pdf">Local Download</a>; </span> <span id="download-value-193-2"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-56a/rev-3/draft/documents/sp800-56ar3-draft-comments-received.pdf">Comments received on Draft SP 800-56A Rev. 3</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-193"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-193"> 4/16/2018 </td> </tr> <tr id="result-194"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-194">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-194"> 800-55 Rev. 2</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-55/rev-2/draft" id="pub-title-link-194">PRE-DRAFT Call for Comments: Performance Measurement Guide for Information Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-194">SP 800-55 Rev. 2 (Draft)</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-55/rev-2/draft" class="mobile-pub-title" id="pub-title-link-sm-194">PRE-DRAFT Call for Comments: Performance Measurement Guide for Information Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-194">9/24/2020</strong> <br/> Status: <span id="pub-status-sm-194">Draft</span> </div> <div class="control-value-no-block"> Download: <span id="download-values-194">None available</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-194"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-194"> 9/24/2020 </td> </tr> <tr id="result-195"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-195">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-195"> 800-55 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-55/rev-1/final" id="pub-title-link-195">Performance Measurement Guide for Information Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-195">SP 800-55 Rev. 1</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-55/rev-1/final" class="mobile-pub-title" id="pub-title-link-sm-195">Performance Measurement Guide for Information Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-195">7/16/2008</strong> <br/> Status: <span id="pub-status-sm-195">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-195"> <span id="download-value-195-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-55r1">SP 800-55 Rev. 1 (DOI)</a>; </span> <span id="download-value-195-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-55r1.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-195"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-195"> 7/16/2008 </td> </tr> <tr id="result-196"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-196">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-196"> 800-53 Rev. 5</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final" id="pub-title-link-196">Security and Privacy Controls for Information Systems and Organizations</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-196">SP 800-53 Rev. 5</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final" class="mobile-pub-title" id="pub-title-link-sm-196">Security and Privacy Controls for Information Systems and Organizations</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-196">12/10/2020</strong> <br/> Status: <span id="pub-status-sm-196">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-196"> <span id="download-value-196-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-53r5">SP 800-53 Rev. 5 (DOI)</a>; </span> <span id="download-value-196-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf">Local Download</a>; </span> <span id="download-value-196-2"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-53/rev-5/final/documents/sp800-53r5-control-catalog.xlsx">Control Catalog (spreadsheet)</a>; </span> <span id="download-value-196-3"> <a href="/web/20220708182845/https://csrc.nist.gov/csrc/media/Publications/sp/800-53/rev-5/final/documents/sp800-53r4-to-r5-comparison-workbook.xlsx">Analysis of updates between 800-53 Rev. 5 and Rev. 4, by MITRE Corp. for ODNI</a>; </span> <span id="download-value-196-4"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-53/rev-5/final/documents/sp800-53r4-appj-to-r5-comparison.xlsx">Mapping: Appendix J Privacy Controls (Rev. 4) to Rev. 5</a>; </span> <span id="download-value-196-5"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-53/rev-5/final/documents/csf-pf-to-sp800-53r5-mappings.xlsx">Mappings: Cybersecurity Framework and Privacy Framework to Rev. 5</a>; </span> <span id="download-value-196-6"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-53/rev-5/final/documents/sp800-53r5-to-iso-27001-mapping.docx">Mapping: Rev. 5 to ISO/IEC 27001</a>; </span> <span id="download-value-196-7"> <a href="https://web.archive.org/web/20220708182845/https://github.com/usnistgov/oscal-content/tree/master/nist.gov/SP800-53">OSCAL Version of Rev. 5 controls</a>; </span> <span id="download-value-196-8"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-53/rev-5/final/documents/sp800-53-collaboration-index-template.xlsx">Control Collaboration Index Template</a>; </span> <span id="download-value-196-9"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-53/rev-5/final/documents/sp800-53-collaboration-index-template.docx">Control Collaboration Index Template</a>; </span> <span id="download-value-196-10"> <a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/blogs/cybersecurity-insights/next-generation-security-and-privacy-controls-protecting-nations">Blog post</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-196"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-196"> 12/10/2020 </td> </tr> <tr id="result-197"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-197">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-197"> 800-53B</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-53b/final" id="pub-title-link-197">Control Baselines for Information Systems and Organizations</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-197">SP 800-53B</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-53b/final" class="mobile-pub-title" id="pub-title-link-sm-197">Control Baselines for Information Systems and Organizations</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-197">12/10/2020</strong> <br/> Status: <span id="pub-status-sm-197">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-197"> <span id="download-value-197-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-53B">SP 800-53B (DOI)</a>; </span> <span id="download-value-197-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53B.pdf">Local Download</a>; </span> <span id="download-value-197-2"> <a href="/web/20220708182845/https://csrc.nist.gov/csrc/media/Publications/sp/800-53b/final/documents/sp800-53b-control-baselines.xlsx">Control Baselines spreadsheet</a>; </span> <span id="download-value-197-3"> <a href="https://web.archive.org/web/20220708182845/https://csrc.nist.gov/projects/risk-management/scor">Security Control Overlay Repository (SCOR)</a>; </span> <span id="download-value-197-4"> <a href="https://web.archive.org/web/20220708182845/https://pages.nist.gov/OSCAL/">OSCAL [an OSCAL version of 800-53B is in development]</a>; </span> <span id="download-value-197-5"> <a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/news-events/news/2020/10/nist-offers-quick-start-guide-its-security-and-privacy-safeguards-catalog">NIST news article</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-197"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-197"> 12/10/2020 </td> </tr> <tr id="result-198"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-198">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-198"> 800-53A Rev. 5</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-53a/rev-5/final" id="pub-title-link-198">Assessing Security and Privacy Controls in Information Systems and Organizations</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-198">SP 800-53A Rev. 5</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-53a/rev-5/final" class="mobile-pub-title" id="pub-title-link-sm-198">Assessing Security and Privacy Controls in Information Systems and Organizations</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-198">1/25/2022</strong> <br/> Status: <span id="pub-status-sm-198">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-198"> <span id="download-value-198-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-53Ar5">SP 800-53A Rev. 5 (DOI)</a>; </span> <span id="download-value-198-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53Ar5.pdf">Local Download</a>; </span> <span id="download-value-198-2"> <a href="/web/20220708182845/https://csrc.nist.gov/csrc/media/Publications/sp/800-53a/rev-5/final/documents/sp800-53ar5-potential-updates.xlsx">Potential updates [3-30-2022]</a>; </span> <span id="download-value-198-3"> <a href="/web/20220708182845/https://csrc.nist.gov/csrc/media/Publications/sp/800-53a/rev-5/final/documents/sp800-53ar5-assessment-procedures.xlsx">Download Spreadsheet</a>; </span> <span id="download-value-198-4"> <a href="/web/20220708182845/https://csrc.nist.gov/csrc/media/Publications/sp/800-53a/rev-5/final/documents/sp800-53ar5-assessment-procedures.txt">Download Plain Text</a>; </span> <span id="download-value-198-5"> <a href="/web/20220708182845/https://csrc.nist.gov/csrc/media/Publications/sp/800-53a/rev-5/final/documents/sp800-53ar5-assessment-procedures.csv">Download CSV</a>; </span> <span id="download-value-198-6"> <a href="/web/20220708182845/https://csrc.nist.gov/csrc/media/Publications/sp/800-53a/rev-5/final/documents/README-for-CSV-sp800-53ar5-assessment-procedures.txt">README for CSV</a>; </span> <span id="download-value-198-7"> <a href="https://web.archive.org/web/20220708182845/https://github.com/usnistgov/oscal-content/tree/master/nist.gov/SP800-53">OSCAL GitHub</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-198"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-198"> 1/25/2022 </td> </tr> <tr id="result-199"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-199">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-199"> 800-53A Rev. 4</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-53a/rev-4/final" id="pub-title-link-199">Assessing Security and Privacy Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-199">SP 800-53A Rev. 4</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-53a/rev-4/final" class="mobile-pub-title" id="pub-title-link-sm-199">Assessing Security and Privacy Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-199">12/18/2014</strong> <br/> Status: <span id="pub-status-sm-199">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-199"> <span id="download-value-199-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-53Ar4">SP 800-53A Rev. 4 (DOI)</a>; </span> <span id="download-value-199-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53Ar4.pdf">Local Download</a>; </span> <span id="download-value-199-2"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-53a/rev-4/final/documents/sp800_53a_r4_errata_12_18_2014.docx">Word version of SP 800-53A Rev. 4 (12-18-2014)</a>; </span> <span id="download-value-199-3"> <a href="/web/20220708182845/https://csrc.nist.gov/projects/risk-management/sp800-53-controls/downloads">Downloads (XML, CSV)</a>; </span> <span id="download-value-199-4"> <a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/news-events/news/2014/12/nist-issues-new-revision-guide-assessing-information-security-safeguards">Press Release</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-199"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-199"> 12/18/2014 </td> </tr> <tr id="result-200"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-200">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-200"> 800-52 Rev. 2</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-52/rev-2/final" id="pub-title-link-200">Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-200">SP 800-52 Rev. 2</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-52/rev-2/final" class="mobile-pub-title" id="pub-title-link-sm-200">Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-200">8/29/2019</strong> <br/> Status: <span id="pub-status-sm-200">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-200"> <span id="download-value-200-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-52r2">SP 800-52 Rev. 2 (DOI)</a>; </span> <span id="download-value-200-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r2.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-200"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-200"> 8/29/2019 </td> </tr> <tr id="result-201"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-201">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-201"> 800-51 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-51/rev-1/final" id="pub-title-link-201">Guide to Using Vulnerability Naming Schemes</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-201">SP 800-51 Rev. 1</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-51/rev-1/final" class="mobile-pub-title" id="pub-title-link-sm-201">Guide to Using Vulnerability Naming Schemes</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-201">2/25/2011</strong> <br/> Status: <span id="pub-status-sm-201">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-201"> <span id="download-value-201-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-51r1">SP 800-51 Rev. 1 (DOI)</a>; </span> <span id="download-value-201-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-51r1.pdf">Local Download</a>; </span> <span id="download-value-201-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/news-events/news/2011/03/two-new-scap-documents-help-improve-automating-computer-security-management">Press Release</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-201"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-201"> 2/25/2011 </td> </tr> <tr id="result-202"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-202">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-202"> 800-50 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-50/rev-1/draft" id="pub-title-link-202">PRE-DRAFT Call for Comments: Building a Cybersecurity and Privacy Awareness and Training Program</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-202">SP 800-50 Rev. 1 (Draft)</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-50/rev-1/draft" class="mobile-pub-title" id="pub-title-link-sm-202">PRE-DRAFT Call for Comments: Building a Cybersecurity and Privacy Awareness and Training Program</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-202">9/21/2021</strong> <br/> Status: <span id="pub-status-sm-202">Draft</span> </div> <div class="control-value-no-block"> Download: <span id="download-values-202">None available</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-202"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-202"> 9/21/2021 </td> </tr> <tr id="result-203"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-203">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-203"> 800-50</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-50/final" id="pub-title-link-203">Building an Information Technology Security Awareness and Training Program</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-203">SP 800-50</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-50/final" class="mobile-pub-title" id="pub-title-link-sm-203">Building an Information Technology Security Awareness and Training Program</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-203">10/01/2003</strong> <br/> Status: <span id="pub-status-sm-203">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-203"> <span id="download-value-203-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-50">SP 800-50 (DOI)</a>; </span> <span id="download-value-203-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-50.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-203"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-203"> 10/01/2003 </td> </tr> <tr id="result-204"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-204">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-204"> 800-49</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-49/final" id="pub-title-link-204">Federal S/MIME V3 Client Profile</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-204">SP 800-49</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-49/final" class="mobile-pub-title" id="pub-title-link-sm-204">Federal S/MIME V3 Client Profile</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-204">11/05/2002</strong> <br/> Status: <span id="pub-status-sm-204">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-204"> <span id="download-value-204-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-49">SP 800-49 (DOI)</a>; </span> <span id="download-value-204-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-49.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-204"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-204"> 11/05/2002 </td> </tr> <tr id="result-205"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-205">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-205"> 800-47 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-47/rev-1/final" id="pub-title-link-205">Managing the Security of Information Exchanges</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-205">SP 800-47 Rev. 1</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-47/rev-1/final" class="mobile-pub-title" id="pub-title-link-sm-205">Managing the Security of Information Exchanges</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-205">7/20/2021</strong> <br/> Status: <span id="pub-status-sm-205">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-205"> <span id="download-value-205-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-47r1">SP 800-47 Rev. 1 (DOI)</a>; </span> <span id="download-value-205-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-47r1.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-205"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-205"> 7/20/2021 </td> </tr> <tr id="result-206"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-206">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-206"> 800-46 Rev. 3</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-46/rev-3/draft" id="pub-title-link-206">PRE-DRAFT Call for Comments: Guide to Enterprise Telework Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-206">SP 800-46 Rev. 3 (Draft)</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-46/rev-3/draft" class="mobile-pub-title" id="pub-title-link-sm-206">PRE-DRAFT Call for Comments: Guide to Enterprise Telework Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-206">9/10/2020</strong> <br/> Status: <span id="pub-status-sm-206">Draft</span> </div> <div class="control-value-no-block"> Download: <span id="download-values-206">None available</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-206"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-206"> 9/10/2020 </td> </tr> <tr id="result-207"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-207">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-207"> 800-46 Rev. 2</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-46/rev-2/final" id="pub-title-link-207">Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-207">SP 800-46 Rev. 2</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-46/rev-2/final" class="mobile-pub-title" id="pub-title-link-sm-207">Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-207">7/29/2016</strong> <br/> Status: <span id="pub-status-sm-207">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-207"> <span id="download-value-207-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-46r2">SP 800-46 Rev. 2 (DOI)</a>; </span> <span id="download-value-207-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-46r2.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-207"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-207"> 7/29/2016 </td> </tr> <tr id="result-208"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-208">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-208"> 800-45 Version 2</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-45/version-2/final" id="pub-title-link-208">Guidelines on Electronic Mail Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-208">SP 800-45 Version 2</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-45/version-2/final" class="mobile-pub-title" id="pub-title-link-sm-208">Guidelines on Electronic Mail Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-208">2/20/2007</strong> <br/> Status: <span id="pub-status-sm-208">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-208"> <span id="download-value-208-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-45ver2">SP 800-45 Version 2 (DOI)</a>; </span> <span id="download-value-208-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-45ver2.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-208"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-208"> 2/20/2007 </td> </tr> <tr id="result-209"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-209">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-209"> 800-44 Version 2</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-44/version-2/final" id="pub-title-link-209">Guidelines on Securing Public Web Servers</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-209">SP 800-44 Version 2</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-44/version-2/final" class="mobile-pub-title" id="pub-title-link-sm-209">Guidelines on Securing Public Web Servers</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-209">10/09/2007</strong> <br/> Status: <span id="pub-status-sm-209">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-209"> <span id="download-value-209-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-44ver2">SP 800-44 Version 2 (DOI)</a>; </span> <span id="download-value-209-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-44ver2.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-209"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-209"> 10/09/2007 </td> </tr> <tr id="result-210"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-210">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-210"> 800-41 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-41/rev-1/final" id="pub-title-link-210">Guidelines on Firewalls and Firewall Policy</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-210">SP 800-41 Rev. 1</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-41/rev-1/final" class="mobile-pub-title" id="pub-title-link-sm-210">Guidelines on Firewalls and Firewall Policy</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-210">9/28/2009</strong> <br/> Status: <span id="pub-status-sm-210">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-210"> <span id="download-value-210-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-41r1">SP 800-41 Rev. 1 (DOI)</a>; </span> <span id="download-value-210-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-41r1.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-210"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-210"> 9/28/2009 </td> </tr> <tr id="result-211"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-211">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-211"> 800-40 Rev. 4</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-40/rev-4/final" id="pub-title-link-211">Guide to Enterprise Patch Management Planning: Preventive Maintenance for Technology</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-211">SP 800-40 Rev. 4</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-40/rev-4/final" class="mobile-pub-title" id="pub-title-link-sm-211">Guide to Enterprise Patch Management Planning: Preventive Maintenance for Technology</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-211">4/06/2022</strong> <br/> Status: <span id="pub-status-sm-211">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-211"> <span id="download-value-211-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-40r4">SP 800-40 Rev. 4 (DOI)</a>; </span> <span id="download-value-211-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-40r4.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-211"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-211"> 4/06/2022 </td> </tr> <tr id="result-212"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-212">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-212"> 800-39</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-39/final" id="pub-title-link-212">Managing Information Security Risk: Organization, Mission, and Information System View</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-212">SP 800-39</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-39/final" class="mobile-pub-title" id="pub-title-link-sm-212">Managing Information Security Risk: Organization, Mission, and Information System View</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-212">3/01/2011</strong> <br/> Status: <span id="pub-status-sm-212">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-212"> <span id="download-value-212-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-39">SP 800-39 (DOI)</a>; </span> <span id="download-value-212-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-39.pdf">Local Download</a>; </span> <span id="download-value-212-2"> <a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/news-events/news/2011/03/new-publication-fundamentally-changes-federal-information-security-risk">Press Release</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-212"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-212"> 3/01/2011 </td> </tr> <tr id="result-213"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-213">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-213"> 800-38G Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-38g/rev-1/draft" id="pub-title-link-213">Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-213">SP 800-38G Rev. 1 (Draft)</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-38g/rev-1/draft" class="mobile-pub-title" id="pub-title-link-sm-213">Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-213">2/28/2019</strong> <br/> Status: <span id="pub-status-sm-213">Draft</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-213"> <span id="download-value-213-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-38Gr1-draft">SP 800-38G Rev. 1 (Draft) (DOI)</a>; </span> <span id="download-value-213-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38Gr1-draft.pdf">Local Download</a>; </span> <span id="download-value-213-2"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-38g/rev-1/draft/documents/sp800-38gr1-draft-comments-received.pdf">Comments received</a>; </span> <span id="download-value-213-3"> <a href="/web/20220708182845/https://csrc.nist.gov/csrc/media/projects/block-cipher-techniques/documents/bcm/proposed-modes/ffx/ffx-voltage-ip.pdf">Letter of Assurance (from Voltage Security; since acquired by HP, Inc.)</a>; </span> <span id="download-value-213-4"> <a href="/web/20220708182845/https://csrc.nist.gov/projects/block-cipher-techniques">Block Cipher Techniques project</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-213"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-213"> 2/28/2019 </td> </tr> <tr id="result-214"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-214">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-214"> 800-38G</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-38g/final" id="pub-title-link-214">Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-214">SP 800-38G</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-38g/final" class="mobile-pub-title" id="pub-title-link-sm-214">Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-214">3/29/2016</strong> <br/> Status: <span id="pub-status-sm-214">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-214"> <span id="download-value-214-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-38G">SP 800-38G (DOI)</a>; </span> <span id="download-value-214-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38G.pdf">Local Download</a>; </span> <span id="download-value-214-2"> <a href="/web/20220708182845/https://csrc.nist.gov/csrc/media/projects/block-cipher-techniques/documents/bcm/proposed-modes/ffx/ffx-voltage-ip.pdf">Letter of Assurance (from Voltage Security; since acquired by HP, Inc.)</a>; </span> <span id="download-value-214-3"> <a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/news-events/news/2016/03/new-nist-security-standard-can-protect-credit-cards-health-information">Press Release</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-214"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-214"> 3/29/2016 </td> </tr> <tr id="result-215"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-215">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-215"> 800-38F</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-38f/final" id="pub-title-link-215">Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-215">SP 800-38F</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-38f/final" class="mobile-pub-title" id="pub-title-link-sm-215">Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-215">12/13/2012</strong> <br/> Status: <span id="pub-status-sm-215">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-215"> <span id="download-value-215-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-38F">SP 800-38F (DOI)</a>; </span> <span id="download-value-215-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38F.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-215"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-215"> 12/13/2012 </td> </tr> <tr id="result-216"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-216">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-216"> 800-38E</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-38e/final" id="pub-title-link-216">Recommendation for Block Cipher Modes of Operation: the XTS-AES Mode for Confidentiality on Storage Devices</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-216">SP 800-38E</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-38e/final" class="mobile-pub-title" id="pub-title-link-sm-216">Recommendation for Block Cipher Modes of Operation: the XTS-AES Mode for Confidentiality on Storage Devices</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-216">1/18/2010</strong> <br/> Status: <span id="pub-status-sm-216">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-216"> <span id="download-value-216-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-38E">SP 800-38E (DOI)</a>; </span> <span id="download-value-216-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38e.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-216"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-216"> 1/18/2010 </td> </tr> <tr id="result-217"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-217">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-217"> 800-38D</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-38d/final" id="pub-title-link-217">Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-217">SP 800-38D</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-38d/final" class="mobile-pub-title" id="pub-title-link-sm-217">Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-217">11/28/2007</strong> <br/> Status: <span id="pub-status-sm-217">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-217"> <span id="download-value-217-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-38D">SP 800-38D (DOI)</a>; </span> <span id="download-value-217-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-217"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-217"> 11/28/2007 </td> </tr> <tr id="result-218"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-218">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-218"> 800-38C</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-38c/final" id="pub-title-link-218">Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-218">SP 800-38C</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-38c/final" class="mobile-pub-title" id="pub-title-link-sm-218">Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-218">7/20/2007</strong> <br/> Status: <span id="pub-status-sm-218">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-218"> <span id="download-value-218-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-38C">SP 800-38C (DOI)</a>; </span> <span id="download-value-218-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38c.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-218"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-218"> 7/20/2007 </td> </tr> <tr id="result-219"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-219">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-219"> 800-38B</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-38b/final" id="pub-title-link-219">Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-219">SP 800-38B</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-38b/final" class="mobile-pub-title" id="pub-title-link-sm-219">Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-219">10/06/2016</strong> <br/> Status: <span id="pub-status-sm-219">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-219"> <span id="download-value-219-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-38B">SP 800-38B (DOI)</a>; </span> <span id="download-value-219-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38B.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-219"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-219"> 10/06/2016 </td> </tr> <tr id="result-220"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-220">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-220"> 800-38A Addendum</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-38a/addendum/final" id="pub-title-link-220">Recommendation for Block Cipher Modes of Operation: Three Variants of Ciphertext Stealing for CBC Mode</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-220">SP 800-38A Addendum</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-38a/addendum/final" class="mobile-pub-title" id="pub-title-link-sm-220">Recommendation for Block Cipher Modes of Operation: Three Variants of Ciphertext Stealing for CBC Mode</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-220">10/21/2010</strong> <br/> Status: <span id="pub-status-sm-220">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-220"> <span id="download-value-220-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-38A-Add">SP 800-38A Addendum (DOI)</a>; </span> <span id="download-value-220-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a-add.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-220"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-220"> 10/21/2010 </td> </tr> <tr id="result-221"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-221">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-221"> 800-38A</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-38a/final" id="pub-title-link-221">Recommendation for Block Cipher Modes of Operation: Methods and Techniques</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-221">SP 800-38A</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-38a/final" class="mobile-pub-title" id="pub-title-link-sm-221">Recommendation for Block Cipher Modes of Operation: Methods and Techniques</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-221">12/01/2001</strong> <br/> Status: <span id="pub-status-sm-221">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-221"> <span id="download-value-221-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-38A">SP 800-38A (DOI)</a>; </span> <span id="download-value-221-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-221"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-221"> 12/01/2001 </td> </tr> <tr id="result-222"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-222">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-222"> 800-37 Rev. 2</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-37/rev-2/final" id="pub-title-link-222">Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-222">SP 800-37 Rev. 2</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-37/rev-2/final" class="mobile-pub-title" id="pub-title-link-sm-222">Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-222">12/20/2018</strong> <br/> Status: <span id="pub-status-sm-222">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-222"> <span id="download-value-222-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-37r2">SP 800-37 Rev. 2 (DOI)</a>; </span> <span id="download-value-222-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r2.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-222"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-222"> 12/20/2018 </td> </tr> <tr id="result-223"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-223">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-223"> 800-35</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-35/final" id="pub-title-link-223">Guide to Information Technology Security Services</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-223">SP 800-35</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-35/final" class="mobile-pub-title" id="pub-title-link-sm-223">Guide to Information Technology Security Services</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-223">10/09/2003</strong> <br/> Status: <span id="pub-status-sm-223">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-223"> <span id="download-value-223-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-35">SP 800-35 (DOI)</a>; </span> <span id="download-value-223-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-35.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-223"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-223"> 10/09/2003 </td> </tr> <tr id="result-224"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-224">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-224"> 800-34 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-34/rev-1/final" id="pub-title-link-224">Contingency Planning Guide for Federal Information Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-224">SP 800-34 Rev. 1</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-34/rev-1/final" class="mobile-pub-title" id="pub-title-link-sm-224">Contingency Planning Guide for Federal Information Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-224">11/11/2010</strong> <br/> Status: <span id="pub-status-sm-224">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-224"> <span id="download-value-224-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-34r1">SP 800-34 Rev. 1 (DOI)</a>; </span> <span id="download-value-224-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-34r1.pdf">Local Download</a>; </span> <span id="download-value-224-2"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-34/rev-1/final/documents/sp800-34-rev1_bia_template.docx">Business Impact Analysis (BIA) Template</a>; </span> <span id="download-value-224-3"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-34/rev-1/final/documents/sp800-34-rev1_cp_template_low_impact_system.docx">Contingency Planning: Low Impact System Template</a>; </span> <span id="download-value-224-4"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-34/rev-1/final/documents/sp800-34-rev1_cp_template_moderate_impact_system.docx">Contingency Planning: Moderate Impact System Template</a>; </span> <span id="download-value-224-5"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-34/rev-1/final/documents/sp800-34-rev1_cp_template_high_impact_system.docx">Contingency Planning: High Impact System Template</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-224"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-224"> 11/11/2010 </td> </tr> <tr id="result-225"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-225">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-225"> 800-30 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-30/rev-1/final" id="pub-title-link-225">Guide for Conducting Risk Assessments</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-225">SP 800-30 Rev. 1</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-30/rev-1/final" class="mobile-pub-title" id="pub-title-link-sm-225">Guide for Conducting Risk Assessments</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-225">9/17/2012</strong> <br/> Status: <span id="pub-status-sm-225">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-225"> <span id="download-value-225-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-30r1">SP 800-30 Rev. 1 (DOI)</a>; </span> <span id="download-value-225-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-30r1.pdf">Local Download</a>; </span> <span id="download-value-225-2"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-30/rev-1/final/documents/sp800_30_r1.epub">SP 800-30 Rev. 1 (EPUB)</a>; </span> <span id="download-value-225-3"> <a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/news-events/news/2012/09/new-nist-publication-provides-guidance-computer-security-risk-assessments">Press Release</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-225"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-225"> 9/17/2012 </td> </tr> <tr id="result-226"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-226">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-226"> 800-28 Version 2</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-28/version-2/final" id="pub-title-link-226">Guidelines on Active Content and Mobile Code</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-226">SP 800-28 Version 2</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-28/version-2/final" class="mobile-pub-title" id="pub-title-link-sm-226">Guidelines on Active Content and Mobile Code</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-226">3/07/2008</strong> <br/> Status: <span id="pub-status-sm-226">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-226"> <span id="download-value-226-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-28ver2">SP 800-28 Version 2 (DOI)</a>; </span> <span id="download-value-226-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-28ver2.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-226"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-226"> 3/07/2008 </td> </tr> <tr id="result-227"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-227">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-227"> 800-22 Rev. 1a</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-22/rev-1a/final" id="pub-title-link-227">A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-227">SP 800-22 Rev. 1a</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-22/rev-1a/final" class="mobile-pub-title" id="pub-title-link-sm-227">A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-227">4/30/2010</strong> <br/> Status: <span id="pub-status-sm-227">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-227"> <span id="download-value-227-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-22r1a">SP 800-22 Rev. 1a (DOI)</a>; </span> <span id="download-value-227-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-22r1a.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-227"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-227"> 4/30/2010 </td> </tr> <tr id="result-228"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-228">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-228"> 800-18 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-18/rev-1/final" id="pub-title-link-228">Guide for Developing Security Plans for Federal Information Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-228">SP 800-18 Rev. 1</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-18/rev-1/final" class="mobile-pub-title" id="pub-title-link-sm-228">Guide for Developing Security Plans for Federal Information Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-228">2/24/2006</strong> <br/> Status: <span id="pub-status-sm-228">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-228"> <span id="download-value-228-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-18r1">SP 800-18 Rev. 1 (DOI)</a>; </span> <span id="download-value-228-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-18r1.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-228"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-228"> 2/24/2006 </td> </tr> <tr id="result-229"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-229">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-229"> 800-16 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-16/rev-1/draft" id="pub-title-link-229">A Role-Based Model for Federal Information Technology/Cybersecurity Training (3rd Draft)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-229">SP 800-16 Rev. 1 (Draft)</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-16/rev-1/draft" class="mobile-pub-title" id="pub-title-link-sm-229">A Role-Based Model for Federal Information Technology/Cybersecurity Training (3rd Draft)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-229">3/14/2014</strong> <br/> Status: <span id="pub-status-sm-229">Draft</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-229"> <span id="download-value-229-0"> <a href="/web/20220708182845/https://csrc.nist.gov/CSRC/media/Publications/sp/800-16/rev-1/draft/documents/sp800_16_rev1_3rd-draft.pdf">Draft SP 800-16 Rev. 1 (3rd draft)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-229"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-229"> 3/14/2014 </td> </tr> <tr id="result-230"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-230">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-230"> 800-16</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-16/final" id="pub-title-link-230">Information Technology Security Training Requirements: a Role- and Performance-Based Model</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-230">SP 800-16</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-16/final" class="mobile-pub-title" id="pub-title-link-sm-230">Information Technology Security Training Requirements: a Role- and Performance-Based Model</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-230">4/01/1998</strong> <br/> Status: <span id="pub-status-sm-230">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-230"> <span id="download-value-230-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-16">SP 800-16 (DOI)</a>; </span> <span id="download-value-230-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-16.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-230"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-230"> 4/01/1998 </td> </tr> <tr id="result-231"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-231">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-231"> 800-12 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-12/rev-1/final" id="pub-title-link-231">An Introduction to Information Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-231">SP 800-12 Rev. 1</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/800-12/rev-1/final" class="mobile-pub-title" id="pub-title-link-sm-231">An Introduction to Information Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-231">6/22/2017</strong> <br/> Status: <span id="pub-status-sm-231">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-231"> <span id="download-value-231-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.800-12r1">SP 800-12 Rev. 1 (DOI)</a>; </span> <span id="download-value-231-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-12r1.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-231"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-231"> 6/22/2017 </td> </tr> <tr id="result-232"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-232">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-232"> 500-325</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/500-325/final" id="pub-title-link-232">Fog Computing Conceptual Model</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-232">SP 500-325</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/500-325/final" class="mobile-pub-title" id="pub-title-link-sm-232">Fog Computing Conceptual Model</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-232">3/14/2018</strong> <br/> Status: <span id="pub-status-sm-232">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-232"> <span id="download-value-232-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.500-325">SP 500-325 (DOI)</a>; </span> <span id="download-value-232-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.500-325.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-232"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-232"> 3/14/2018 </td> </tr> <tr id="result-233"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-233">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-233"> 500-320</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/500-320/final" id="pub-title-link-233">Report of the Workshop on Software Measures and Metrics to Reduce Security Vulnerabilities (SwMM-RSV)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-233">SP 500-320</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/500-320/final" class="mobile-pub-title" id="pub-title-link-sm-233">Report of the Workshop on Software Measures and Metrics to Reduce Security Vulnerabilities (SwMM-RSV)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-233">11/10/2016</strong> <br/> Status: <span id="pub-status-sm-233">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-233"> <span id="download-value-233-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.500-320">SP 500-320 (DOI)</a>; </span> <span id="download-value-233-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.500-320.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-233"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-233"> 11/10/2016 </td> </tr> <tr id="result-234"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-234">SP</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-234"> 500-304</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/500-304/final" id="pub-title-link-234">Conformance Testing Methodology Framework for ANSI/NIST-ITL 1-2011 Update: 2013, Data Format for the Interchange of Fingerprint, Facial &amp; Other Biometric Information</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-234">SP 500-304</span><br/> <a href="/web/20220708182845/https://csrc.nist.gov/publications/detail/sp/500-304/final" class="mobile-pub-title" id="pub-title-link-sm-234">Conformance Testing Methodology Framework for ANSI/NIST-ITL 1-2011 Update: 2013, Data Format for the Interchange of Fingerprint, Facial &amp; Other Biometric Information</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-234">6/24/2015</strong> <br/> Status: <span id="pub-status-sm-234">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-234"> <span id="download-value-234-0"> <a href="https://web.archive.org/web/20220708182845/https://doi.org/10.6028/NIST.SP.500-304">SP 500-304 (DOI)</a>; </span> <span id="download-value-234-1"> <a href="https://web.archive.org/web/20220708182845/https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.500-304.pdf">Local Download</a>; </span> <span id="download-value-234-2"> <a href="https://web.archive.org/web/20220708182845/http://www.nist.gov/itl/csd/biometrics/ansi-nist.cfm">BioCTS homepage</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-234"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-234"> 6/24/2015 </td> </tr> </tbody> </table> <div class="row bottom-pagination-area"> <p class="text-center"> <span class="pagination-links" id="bottom-pagination-container" data-total-pages="0" data-min-page="1" data-max-page="0" data-current-page="1" data-show-first="False" data-show-last="True"></span> </p> </div> <div> <span class="pull-right"> <a href="/web/20220708182845/https://csrc.nist.gov/publications/search" id="view-all-pubs-link">View All Publications</a> </span> </div> <div id="publications-quicklinks-sm" class="bs-callout bs-callout-subnav hidden-md hidden-lg"> <h4>Current Publications <i class="fa fa-bolt"></i></h4> <ul> <li> <strong> NIST Series Pubs <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-series-pubs-tooltip"></i> </strong> <ul> <li><a href="/web/20220708182845/https://csrc.nist.gov/publications/final-pubs" id="quick-link-final-sm">Final Pubs</a></li> <li><a href="/web/20220708182845/https://csrc.nist.gov/publications/drafts-open-for-comment" id="quick-links-comments-sm">Drafts Open for Comment</a></li> <li><a href="/web/20220708182845/https://csrc.nist.gov/publications/draft-pubs" id="quick-link-draft-sm">All Public Drafts</a></li> <li> <strong> View By Series <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-view-series-pubs-tooltip"></i> </strong> <ul> <li><a href="/web/20220708182845/https://csrc.nist.gov/publications/fips" id="quick-link-fips-sm">FIPS</a></li> <li><a href="/web/20220708182845/https://csrc.nist.gov/publications/sp800" id="quick-link-sp-800-sm">SP 800 series</a></li> <li><a href="/web/20220708182845/https://csrc.nist.gov/publications/sp" id="quick-link-sp-sm">All SP series</a></li> <li><a href="/web/20220708182845/https://csrc.nist.gov/publications/nistir" id="quick-link-nistir-sm">NISTIRs</a></li> <li><a href="/web/20220708182845/https://csrc.nist.gov/publications/itl-bulletin" id="quick-link-itl-bul-sm">ITL Bulletins</a></li> </ul> </li> </ul> </li> <li> <strong> Other Pubs <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-other-pubs-tooltip"></i> </strong> <ul> <li><a href="/web/20220708182845/https://csrc.nist.gov/publications/white-paper" id="quick-link-white-papers-sm">White Papers</a></li> <li><a href="/web/20220708182845/https://csrc.nist.gov/publications/journal-article" id="quick-link-journal-articles-sm">Journal Articles</a></li> <li><a href="/web/20220708182845/https://csrc.nist.gov/publications/conference-paper" id="quick-link-conference-papers-sm">Conference Papers</a></li> <li><a href="/web/20220708182845/https://csrc.nist.gov/publications/book" id="quick-link-books-sm">Books</a></li> </ul> </li> </ul> <span style="display: none;" id="nist-series-pubs-tooltip"> <strong>Final:</strong> <em>Current list of all published NIST cybersecurity documents.</em> Does not include "Withdrawn" documents. Includes FIPS, Special Publications, NISTIRs, ITL Bulletins, and NIST Cybersecurity White Papers.<br/> <br/> <strong>Public Drafts:</strong> <em>Current list of all draft NIST cybersecurity documents--they are typically posted for public comment.</em> "Current" public drafts are the latest draft versions that have not yet been published as "Final." </span> <span style="display: none;" id="nist-view-series-pubs-tooltip"> <strong>FIPS:</strong> <em>Current Federal Information Processing Standard Publications (FIPS).</em> Includes current (Final and Draft) FIPS.<br/> <br/> <strong>SP 800 Series:</strong> <em>Current NIST Special Publication (SP) 800 series publications, which focus on Computer/Information Security.</em> Includes current (Final and Draft) SP 800 pubs.<br/> <br/> <strong>All SP Series:</strong> <em> Current NIST Special Publications (SP), including SP 800 (Computer/Information Security) and SP 1800 (Cybersecurity Practice Guides) pubs. Also includes SP 500 (Computer Systems Technology) pubs related to cybersecurity and privacy. </em> Includes current (Final and Draft) NIST Special Publications.<br/> <br/> <strong>NISTIRs:</strong> <em>Current list of NIST Interagency or Internal Reports (NISTIR) related to cybersecurity and privacy.</em> Includes current (Final and Draft) NISTIRs.<br/> <br/> <strong>ITL Bulletins:</strong> Current list of NIST Information Technology Laboratory (ITL) Bulletins. </span> <span style="display: none;" id="nist-other-pubs-tooltip"> <strong>White Papers:</strong> <em> Consists of NIST Cybersecurity White Papers; NCCoE Project Descriptions, Building Blocks and Use Cases; and other NIST-authored papers that are not part of a formal series. </em> Includes current (Final and Draft) papers.<br/> <br/> <strong>Journal Articles:</strong> NIST-authored articles published in external journals and in the NIST Journal of Research (JRES).<br/> <br/> <strong>Conference Papers:</strong> NIST-authored conference papers related to cybersecurity and privacy.<br/> <br/> <strong>Books:</strong> NIST-authored books, book sections, and encyclopedia entries related to cybersecurity and privacy. </span> </div> </div> </div> </div> <div id="footer-pusher"></div> </div> <footer id="footer"> <div class="container"> <div class="row"> <div class="col-sm-6"> <span class="hidden-xs"> <a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/" title="National Institute of Standards and Technology" rel="home" target="_blank" class="footer-nist-logo" id="footer-nist-logo-link"> <img src="/web/20220708182845im_/https://csrc.nist.gov/CSRC/Media/images/logo_rev.png" alt="National Institute of Standards and Technology logo" id="footer-nist-logo"/> </a> </span> <div class="row footer-contact-container"> <div class="col-sm-12" id="footer-address"> <strong>HEADQUARTERS</strong><br> 100 Bureau Drive<br> Gaithersburg, MD 20899 </div> </div> </div> <div class="col-sm-6"> <ul class="social-list text-right" style="display: block;"> <li class="field-item service-twitter list-horiz"> <a href="https://web.archive.org/web/20220708182845/https://twitter.com/NISTCyber" class="social-btn social-btn--large extlink ext" id="footer-social-twitter-link"> <i class="fa fa-twitter fa-fw"><span class="element-invisible">twitter</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-facebook list-horiz"> <a href="https://web.archive.org/web/20220708182845/https://www.facebook.com/NIST" class="social-btn social-btn--large extlink ext" id="footer-social-facebook-link"> <i class="fa fa-facebook fa-fw"><span class="element-invisible">facebook</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-linkedin list-horiz"> <a href="https://web.archive.org/web/20220708182845/https://www.linkedin.com/company/nist" class="social-btn social-btn--large extlink ext" id="footer-social-linkedin-link"> <i class="fa fa-linkedin fa-fw"><span class="element-invisible">linkedin</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-instagram list-horiz"> <a href="https://web.archive.org/web/20220708182845/https://www.instagram.com/usnistgov/" class="social-btn social-btn--large extlink ext" id="footer-social-instagram-link"> <i class="fa fa-instagram fa-fw"><span class="element-invisible">instagram</span></i> <span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-youtube list-horiz"> <a href="https://web.archive.org/web/20220708182845/https://www.youtube.com/user/USNISTGOV" class="social-btn social-btn--large extlink ext" id="footer-social-youtube-link"> <i class="fa fa-youtube fa-fw"><span class="element-invisible">youtube</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-rss list-horiz"> <a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/news-events/nist-rss-feeds" class="social-btn social-btn--large extlink" id="footer-social-rss-link"> <i class="fa fa-rss fa-fw"><span class="element-invisible">rss</span></i> </a> </li> <li class="field-item service-govdelivery list-horiz last"> <a href="https://web.archive.org/web/20220708182845/https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3" class="social-btn social-btn--large extlink ext" title="Subscribe to CSRC and publication updates, and other NIST cybersecurity news" id="footer-social-govdelivery-link"> <i class="fa fa-envelope fa-fw"><span class="element-invisible">govdelivery</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> </ul> <p class="text-right"> Want updates about CSRC and our publications? <a href="https://web.archive.org/web/20220708182845/https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3" class="btn btn-lg btn-info" style="background-color: #12659c!important; border-color: #12659c!important;" id="footer-subscribe-link">Subscribe</a> </p> </div> </div> <div class="row hidden-sm hidden-md hidden-lg"> <div class="col-sm-12"> <a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/" title="National Institute of Standards and Technology" rel="home" target="_blank" class="footer-nist-logo" id="footer-bottom-nist-logo-link"> <img src="/web/20220708182845im_/https://csrc.nist.gov/CSRC/Media/images/logo_rev.png" alt="National Institute of Standards and Technology logo" id="footer-bottom-nist-logo"/> </a> </div> </div> <div class="row"> <div class="col-sm-6"> <p> <a href="https://web.archive.org/web/20220708182845/mailto:webmaster-csrc@nist.gov?subject=CSRC Inquiry" id="footer-webmaster-link">Webmaster</a> | <a href="/web/20220708182845/https://csrc.nist.gov/about/contact" id="footer-contact-us-link">Contact Us</a> | <a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/about-nist/our-organization" style="display: inline-block;" id="footer-org-link">Our Other Offices</a> </p> </div> <div class="col-sm-6"> <span class="pull-right text-right"> Contact CSRC Webmaster: <a href="https://web.archive.org/web/20220708182845/mailto:webmaster-csrc@nist.gov?subject=CSRC Inquiry" style="display: inline-block;" id="footer-info-webmaster-link">webmaster-csrc@nist.gov</a> </span> </div> </div> <div class="row"> <div class="footer-bottom-links-container" id="footer-bottom-links-container"> <ul> <li><a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/privacy-policy">Site Privacy</a></li> <li><a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/oism/accessibility">Accessibility</a></li> <li><a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/privacy">Privacy Program</a></li> <li><a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/oism/copyrights">Copyrights</a></li> <li><a href="https://web.archive.org/web/20220708182845/https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a></li> <li><a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a></li> <li><a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/foia">FOIA</a></li> <li><a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/environmental-policy-statement">Environmental Policy</a></li> <li><a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a></li> <li><a href="https://web.archive.org/web/20220708182845/https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a></li> <li><a href="https://web.archive.org/web/20220708182845/https://www.commerce.gov/">Commerce.gov</a></li> <li><a href="https://web.archive.org/web/20220708182845/https://www.science.gov/">Science.gov</a></li> <li><a href="https://web.archive.org/web/20220708182845/https://www.usa.gov/">USA.gov</a></li> <li><a href="https://web.archive.org/web/20220708182845/https://vote.gov/">Vote.gov</a></li> </ul> </div> </div> </div> </footer> <script type="text/javascript" src="/web/20220708182845js_/https://csrc.nist.gov/dist/js/quick-collapse.js"></script> <script type="text/javascript" src="/web/20220708182845js_/https://csrc.nist.gov/dist/app.bundle.js"></script> <!-- reCAPTCHA v3 --> <script defer src="https://web.archive.org/web/20220708182845js_/https://www.google.com/recaptcha/api.js?render=6LcQo40UAAAAAJpAj4X-i-WfOzdbu6d7j7kKryDS"></script> </body> </html> <!-- FILE ARCHIVED ON 18:28:45 Jul 08, 2022 AND RETRIEVED FROM THE INTERNET ARCHIVE ON 09:26:11 Nov 24, 2024. JAVASCRIPT APPENDED BY WAYBACK MACHINE, COPYRIGHT INTERNET ARCHIVE. ALL OTHER CONTENT MAY ALSO BE PROTECTED BY COPYRIGHT (17 U.S.C. SECTION 108(a)(3)). --> <!-- playback timings (ms): captures_list: 0.687 exclusion.robots: 0.032 exclusion.robots.policy: 0.019 esindex: 0.012 cdx.remote: 6.164 LoadShardBlock: 190.553 (3) PetaboxLoader3.datanode: 96.559 (4) PetaboxLoader3.resolve: 176.071 (3) load_resource: 152.639 -->

Pages: 1 2 3 4 5 6 7 8 9 10