NIST Technical Publications List
NIST Technical Publications List
SP800
Title: Recommendations for Federal Vulnerability Disclosure Guidelines
Date Published: 2023
Authors: Kim B Schaffer
Report Number: NIST SP 800-216
doi:10.6028/NIST.SP.800-216
Download PDF | Download Citation
Title: Automated Secure Configuration Guidance from the macOS Security Compliance Project (mSCP)
Date Published: 2023
Authors: Mark Trapnell
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 1/57
24/7/23, 22:48 NIST Technical Publications List
Report Number: NIST SP 800-219r1 ipd
doi:10.6028/NIST.SP.800-219r1.ipd
Download PDF | Download Citation
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 2/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-160v1r1
Download PDF | Download Citation
Title: CMVP Security Policy Requirements: CMVP Validation Authority Updates to ISO/IEC 24759 and ISO/IEC 19790 Annex B
Date Published: 2022
Authors: David Hawes
Report Number: NIST SP 800-140Br1 2pd
doi:10.6028/NIST.SP.800-140Br1.2pd
Download PDF | Download Citation
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 3/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-90C.3pd
Download PDF | Download Citation
Title: Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule: A Cybersecurity Resource Guide
Date Published: 2022
Authors: Jeffrey A Marron
Report Number: NIST SP 800-66r2 ipd
doi:10.6028/NIST.SP.800-66r2.ipd
Download PDF | Download Citation
Title: Information and Communications Technology (ICT) Risk Outcomes: A Framework for Integrating ICT Risk Management Programs with the Enterprise Risk Portfolio
Date Published: 2022
Authors: Stephen Quinn
Report Number: NIST SP 800-221A ipd
doi:10.6028/NIST.SP.800-221A.ipd
Download PDF | Download Citation
Title: Enterprise Impact of Information and Communications Technology Risk: Governing and Managing ICT Risk Programs Within an Enterprise Risk Portfolio
Date Published: 2022
Authors: Stephen Quinn
Report Number: NIST SP 800-221 ipd
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 4/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-221.ipd
Download PDF | Download Citation
Title: Automated secure configuration guidance from the macOS Security Compliance Project (mSCP)
Date Published: June 2022
Authors: Mark Trapnell, Eric Trapnell, Murugiah Souppaya, Bob Gendler, Karen Scarfone
Report Number: NIST SP 800-219
doi:10.6028/NIST.SP.800-219
Download PDF | Download Citation
Title: CMVP approved security functions : CMVP validation authority updates to ISOIEC 24759
Date Published: May 2022
Authors: Kim Schaffer, Alexander Calis
Report Number: NIST SP 800-140Cr1
doi:10.6028/NIST.SP.800-140Cr1
Download PDF | Download Citation
Title: CMVP Approved Sensitive Security Parameter Generation and Establishment Methods: CMVP Validation Authority Updates to ISO/IEC 24759
Date Published: 2022
Authors: Kim B Schaffer
Report Number: NIST SP 800-140Dr1
doi:10.6028/NIST.SP.800-140Dr1
Download PDF | Download Citation
Title: CMVP approved sensitive security parameter generation and establishment methods : CMVP validation authority updates to ISOIEC 24759
Date Published: May 2022
Authors: Kim Schaffer, Alexander Calis
Report Number: NIST SP 800-140Dr1
doi:10.6028/NIST.SP.800-140Dr1
Download PDF | Download Citation
Title: CMVP Security Policy Requirements: CMVP Validation Authority Updates to ISO/IEC 24759 and ISO/IEC 19790 Annex B
Date Published: May 2022
Authors: David Hawes, Alexander Calis, Roy Crombie
Report Number: NIST SP 800-140Br1 ipd
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 5/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-140Br1.ipd
Download PDF | Download Citation
Title: National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework (Ukrainian translation)
Date Published: May 2022
Authors: William Newhouse, Stephanie Keith, Benjamin Scribner, Greg Witte
Report Number: NIST SP 800-181.ukr
doi:10.6028/NIST.SP.800-181.ukr
Download PDF | Download Citation
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 6/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-172A
Download PDF | Download Citation
Title: Automated Secure Configuration Guidance from the macOS Security Compliance Project (mSCP)
Date Published: February 2022
Authors: Mark Trapnell, Eric Trapnell, Murugiah Souppaya, Bob Gendler, Karen Scarfone
Report Number: NIST SP 800-219-draft
doi:10.6028/NIST.SP.800-219-draft
Download PDF | Download Citation
Title: National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework (Ukrainian translation)
Date Published: February 2022
Authors: William Newhouse, Stephanie Keith, Benjamin Scribner, Greg Witte
Report Number: NIST SP 800-181pt
doi:10.6028/NIST.SP.800-181pt
Download PDF | Download Citation
Title: National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework (Ukrainian translation)
Date Published: February 2022
Authors: William Newhouse, Stephanie Keith, Benjamin Scribner, Greg Witte
Report Number: NIST SP 800-181es
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 7/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-181es
Download PDF | Download Citation
Title: CMVP Approved Sensitive Security Parameter Generation and Establishment Methods: CMVP Validation Authority Updates to ISO/IEC 24759
Date Published: February 2022
Authors: Kim Schaffer
Report Number: NIST SP 800-140Dr1-draft2
doi:10.6028/NIST.SP.800-140Dr1-draft2
Download PDF | Download Citation
Title: CMVP Approved Security Functions: CMVP Validation Authority Updates to ISO/IEC 24759
Date Published: February 2022
Authors: Kim Schaffer
Report Number: NIST SP 800-140Cr1-draft2
doi:10.6028/NIST.SP.800-140Cr1-draft2
Download PDF | Download Citation
Title: Secure Software Development Framework (SSDF) version 1.1 : recommendations for mitigating the risk of software vulnerabilities
Date Published: February 2022
Authors: Murugiah Souppaya, Karen Scarfone, Donna Dodson
Report Number: NIST SP 800-218
doi:10.6028/NIST.SP.800-218
Download PDF | Download Citation
Title: IoT Device Cybersecurity Guidance for the Federal Government IoT Device Cybersecurity Requirement Catalog
Date Published: November 2021
Authors: Michael Fagan, Katerina Megas, Jeffrey Marron, Kevin Brady, Barbara Cuthill, Rebecca Herold, David Lemire, Brad Hoehn
Report Number: NIST SP 800-213A
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 8/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-213A
Download PDF | Download Citation
Title: IoT device cybersecurity guidance for the federal government : IoT device cybersecurity requirement catalog
Date Published: November 2021
Authors: Michael Fagan, Katerina Megas, Jeffrey Marron, Eric Link, Kevin Brady, Barbara Cuthill, Rebecca Herold, David Lemire, Brad Hoehn
Report Number: NIST SP 800-213A
doi:10.6028/NIST.SP.800-213A
Download PDF | Download Citation
Title: IoT device cybersecurity guidance for the federal government : establishing IoT device cybersecurity requirements
Date Published: November 2021
Authors: Michael Fagan, Jeffrey Marron, Kevin Brady, Barbara Cuthill, Katerina Megas, Rebecca Herold
Report Number: NIST SP 800-213
doi:10.6028/NIST.SP.800-213
Download PDF | Download Citation
Title: Enhanced Security Requirements for Protecting Controlled Unclassified Information: A Supplement to NIST Special Publication 800-171 A Supplement to NIST Special
Publication 800-171
Date Published: January 2021
Authors: RON ROSS, VICTORIA PILLITTERI, GARY GUISSANIE, RYAN WAGNER, RICHARD GRAUBART, DEB BODEAU
Report Number: NIST SP 800-172
doi:10.6028/NIST.SP.800-172
Download PDF | Download Citation
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 9/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-181r1
Download PDF | Download Citation
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 10/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-207
Download PDF | Download Citation
Title: Assessing Information Security Continuous Monitoring (ISCM) Programs: Developing an ISCM Program Assessment
Date Published: May 2020
Authors: Kelley Dempsey, Victoria Yan Pillitteri, Chad Baer, Robert Niemeyer, Ron Rudman, Susan Urban
Report Number: NIST SP 800-137A
doi:10.6028/NIST.SP.800-137A
Download PDF | Download Citation
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 11/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-175Br1
Download PDF | Download Citation
Title: FIPS 140-3 derived test requirements (DTR): CMVP validation authority updates to ISOIEC 24759
Date Published: March 2020
Authors: Kim Schaffer
Report Number: NIST SP 800-140
doi:10.6028/NIST.SP.800-140
Download PDF | Download Citation
Title: CMVP security policy requirements: CMVP validation authority updates to ISOIEC 24759 and ISOIEC 19790 Annex B
Date Published: March 2020
Authors: Kim Schaffer
Report Number: NIST SP 800-140B
doi:10.6028/NIST.SP.800-140B
Download PDF | Download Citation
Title: CMVP approved sensitive parameter generation and establishment methods: CMVP validation authority updates to ISOIEC 24759:2014(E)
Date Published: March 2020
Authors: Kim Schaffer
Report Number: NIST SP 800-140D
doi:10.6028/NIST.SP.800-140D
Download PDF | Download Citation
Title: CMVP approved authentication mechanisms: CMVP validation authority requirements for ISOIEC 19790:2012 Annex E and ISOIEC 24579:2017
Date Published: March 2020
Authors: Kim Schaffer
Report Number: NIST SP 800-140E
doi:10.6028/NIST.SP.800-140E
Download PDF | Download Citation
Title: CMVP approved non-invasive attack mitigation test metrics: CMVP validation authority updates to ISOIEC 24759:2014(E)
Date Published: March 2020
Authors: Kim Schaffer
Report Number: NIST SP 800-140F
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 12/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-140F
Download PDF | Download Citation
Title: CMVP approved sensitive parameter generation and establishment methods: CMVP validation authority updates to ISOIEC 24759:2014(E)
Date Published: March 2020
Authors: Kim Schaffer
Report Number: NIST SP 800-140D
doi:10.6028/NIST.SP.800-140D
Download PDF | Download Citation
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 13/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-128-2011
Download PDF | Download Citation
Title: Guidelines for the selection, configuration, and use of Transport Layer Security (TLS) implementations
Date Published: August 2019
Authors: Kerry A McKay, David A Cooper
Report Number: NIST SP 800-52r2
doi:10.6028/NIST.SP.800-52r2
Download PDF | Download Citation
Title: Recommendation for key management: part 2 -- best practices for key management organizations
Date Published: May 2019
Authors: Elaine Barker, William C Barker
Report Number: NIST SP 800-57pt2r1
doi:10.6028/NIST.SP.800-57pt2r1
Download PDF | Download Citation
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 14/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-131Ar2
Download PDF | Download Citation
Title: Trustworthy email
Date Published: February 2019
Authors: Scott Rose, J Stephen Nightingale, Simson Garfinkel, Ramaswamy Chandramouli
Report Number: NIST SP 800-177r1
doi:10.6028/NIST.SP.800-177r1
Download PDF | Download Citation
Title: Risk management framework for information systems and organizations: a system life cycle approach for security and privacy
Date Published: December 2018
Authors:
Report Number: NIST SP 800-37r2
doi:10.6028/NIST.SP.800-37r2
Download PDF | Download Citation
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 15/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-202
Download PDF | Download Citation
Title: Systems security engineering: considerations for a multidisciplinary approach in the engineering of trustworthy secure systems, volume 1
Date Published: March 2018
Authors: Ron Ross, Michael McEvilley, Janet Carrier Oren
Report Number: NIST SP 800-160v1
doi:10.6028/NIST.SP.800-160v1
Download PDF | Download Citation
Title: National checklist program for IT products - guidelines for checklist users and developers
Date Published: February 2018
Authors: Stephen D Quinn, Murugiah Souppaya, Melanie Cook, Karen Scarfone
Report Number: NIST SP 800-70r4
doi:10.6028/NIST.SP.800-70r4
Download PDF | Download Citation
Title: SCAP 1.3 component specification version updates: an annex to NIST special publication 800-126 revision 3
Date Published: February 2018
Authors: Harold Booth, David Waltermire, Lee Badger, Melanie Cook, Stephen D Quinn, Karen Scarfone
Report Number: NIST SP 800-126A
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 16/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-126A
Download PDF | Download Citation
Title: The technical specification for the security content automation protocol (SCAP) version 1.3
Date Published: February 2018
Authors: David Waltermire, Stephen Quinn, Harold Booth, Karen Scarfone, Dragos Prisaca
Report Number: NIST SP 800-126r3
doi:10.6028/NIST.SP.800-126r3
Download PDF | Download Citation
Title: Recommendation for the entropy sources used for random bit generation
Date Published: January 2018
Authors: Meltem Sönmez Turan, Elaine Barker, John Kelsey, Kerry A McKay, Mary L Baish, Mike Boyle
Report Number: NIST SP 800-90b
doi:10.6028/NIST.SP.800-90B
Download PDF | Download Citation
Title: Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher
Date Published: November 2017
Authors: Elaine Barker, Nicky Mouha
Report Number: NIST SP 800-67r2
doi:10.6028/NIST.SP.800-67r2
Download PDF | Download Citation
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 17/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-190
Download PDF | Download Citation
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 18/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-63c
Download PDF | Download Citation
Title: Guide to securing Apple OS X 10.10 systems for IT professionals: a NIST security configuration checklist
Date Published: December 2016
Authors: Lee Badger, Murugiah Souppaya, Mark Trapnell, Eric Trapnell, Dylan Yaga, Karen Scarfone
Report Number: NIST SP 800-179
doi:10.6028/NIST.SP.800-179
Download PDF | Download Citation
Title: Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems
Date Published: November 2016
Authors: Ron Ross, Michael McEvilley, Janet Carrier Oren
Report Number: NIST SP 800-160
doi:10.6028/NIST.SP.800-160
Download PDF | Download Citation
Title: Recommendation for block cipher modes of operation : the CMAC mode for authentication
Date Published: 2005
Authors: M J Dworkin
Report Number: NIST SP 800-38b-2005
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 19/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-38b-2005
Download PDF | Download Citation
Title: A Comparison of Attribute Based Access Control (ABAC) Standards for Data Service Applications
Date Published: October 2016
Authors: David F. Ferraiolo, Ramaswamy Chandramouli, Vincent C. Hu, D. Richard R. Kuhn
Report Number: NIST SP 800-178
doi:10.6028/NIST.SP.800-178
Download PDF | Download Citation
Title: Trustworthy Email
Date Published: September 2016
Authors: Scott W. Rose, Stephen J. Nightingale, Simson L. Garfinkel, Ramaswamy Chandramouli
Report Number: NIST SP 800-177
doi:10.6028/NIST.SP.800-177
Download PDF | Download Citation
Title: Guideline for Using Cryptographic Standards in the Federal Government: Directives, Mandates and Policies
Date Published: August 2016
Authors: Elaine B. Barker, William C. Barker
Report Number: NIST SP 800-175A
doi:10.6028/NIST.SP.800-175A
Download PDF | Download Citation
Title: Guideline for Using Cryptographic Standards in the Federal Government: Cryptographic Mechanisms
Date Published: August 2016
Authors: Elaine B. Barker
Report Number: NIST SP 800-175B
doi:10.6028/NIST.SP.800-175B
Download PDF | Download Citation
Title: User's Guide to Telework and Bring Your Own Device (BYOD) Security
Date Published: July 2016
Authors: Murugiah P Souppaya, Karen A Scarfone
Report Number: NIST SP 800-114r1
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 20/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-114r1
Download PDF | Download Citation
Title: Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security
Date Published: July 2016
Authors: Murugiah P Souppaya, Karen A Scarfone
Report Number: NIST SP 800-46r2
doi:10.6028/NIST.SP.800-46r2
Download PDF | Download Citation
Title: Networks of 'things'
Date Published: 2016
Authors: Jeffrey M Voas
Report Number: NIST SP 800-183
doi:10.6028/NIST.SP.800-183
Download PDF | Download Citation
Title: PIV Card Application and Middleware Interface Test Guidelines (SP 800-73-4 compliance)
Date Published: April 2016
Authors: David A. Cooper, Hildegard Ferraiolo, Ramaswamy Chandramouli, Jason Mohler
Report Number: NIST SP 800-85A-4
doi:10.6028/NIST.SP.800-85A-4
Download PDF | Download Citation
Title: Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption
Date Published: March 2016
Authors: Morris Dworkin
Report Number: NIST SP 800-38G
doi:10.6028/NIST.SP.800-38G
Download PDF | Download Citation
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 21/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-125B
Download PDF | Download Citation
Title: National Checklist Program for IT Products – Guidelines for Checklist Users and Developers
Date Published: December 2015
Authors: Stephen D. Quinn, Murugiah Souppaya, Melanie Cook, Karen A. Scarfone
Report Number: NIST SP 800-70r3
doi:10.6028/NIST.SP.800-70r3
Download PDF | Download Citation
Title: Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths
Date Published: November 2015
Authors: Elaine B. Barker, Allen L. Roginsky
Report Number: NIST SP 800-131Ar1
doi:10.6028/NIST.SP.800-131Ar1
Download PDF | Download Citation
Title: The technical specification for the Security Content Automation Protocol (SCAP) : SCAP version 1.0
Date Published: 2009
Authors: S D Quinn, D A Waltermire, C S Johnson, K A Scarfone, J F Banghart
Report Number: NIST SP 800-126
doi:10.6028/NIST.SP.800-126
Download PDF | Download Citation
Title: The technical specification for the Security Content Automation Protocol (SCAP) : SCAP version 1.1
Date Published: 2011
Authors: D A Waltermire, S D Quinn, K A Scarfone
Report Number: NIST SP 800-126r1
doi:10.6028/NIST.SP.800-126r1
Download PDF | Download Citation
Title: The technical specification for the Security Content Automation Protocol (SCAP) : SCAP version 1.2
Date Published: 2011
Authors: D A Waltermire, S D Quinn, K A Scarfone, A M Halbardier
Report Number: NIST SP 800-126r2
doi:10.6028/NIST.SP.800-126r2
Download PDF | Download Citation
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 22/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-127
Download PDF | Download Citation
Title: Transitions : recommendation for transitioning the use of cryptographic algorithms and key lengths
Date Published: 2011
Authors: E B Barker, A L Roginsky
Report Number: NIST SP 800-131a
doi:10.6028/NIST.SP.800-131a
Download PDF | Download Citation
Title: Information Security Continuous Monitoring (ISCM) for federal information systems and organizations
Date Published: 2011
Authors: K L Dempsey, N S Chawla, L A Johnson, R Johnston, A C Jones, A D Orebaugh, M A Scholl, K M Stine
Report Number: NIST SP 800-137
doi:10.6028/NIST.SP.800-137
Download PDF | Download Citation
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 23/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-142
Download PDF | Download Citation
Title: Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS) : requirements and procedures
Date Published: 2012
Authors: S S Keller
Report Number: NIST SP 800-20
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 24/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-20
Download PDF | Download Citation
Title: A statistical test suite for random and pseudorandom number generators for cryptographic applications
Date Published: 2010
Authors: L E Bassham, A L Rukhin, J Soto, J R Nechvatal, M E Smid, E B Barker, S D Leigh, M Levenson, M Vangel, D L Banks, N A Heckert, J F Dray, S Vo
Report Number: NIST SP 800-22r1a
doi:10.6028/NIST.SP.800-22r1a
Download PDF | Download Citation
Title: Engineering principles for information technology security (a baseline for achieving security), revision a
Date Published: 2004
Authors: G Stoneburner, C Hayden, A Feringa
Report Number: NIST SP 800-27ra
doi:10.6028/NIST.SP.800-27ra
Download PDF | Download Citation
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 25/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-32
Download PDF | Download Citation
Title: Guide for the security certification and accreditation of federal information systems
Date Published: 2004
Authors: R Ross, M Swanson, G Stoneburner, S Katzke, L A Johnson
Report Number: NIST SP 800-37
doi:10.6028/NIST.SP.800-37
Download PDF | Download Citation
Title: Recommendation for block cipher modes of operation : three variants of ciphertext stealing for CBC mode
Date Published: 2010
Authors: M J Dworkin
Report Number: NIST SP 800-38a-add
doi:10.6028/NIST.SP.800-38a-add
Download PDF | Download Citation
Title: Recommendation for block cipher modes of operation : the CMAC mode for authentication
Date Published: 2016
Authors: M J Dworkin
Report Number: NIST SP 800-38b
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 26/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-38b
Download PDF | Download Citation
Title: Recommendation for block cipher modes of operation : the CCM mode for authentication and confidentiality
Date Published: 2007
Authors: M J Dworkin
Report Number: NIST SP 800-38c
doi:10.6028/NIST.SP.800-38c
Download PDF | Download Citation
Title: Recommendation for block cipher modes of operation : GaloisCounter Mode (GCM) and GMAC
Date Published: 2007
Authors: M J Dworkin
Report Number: NIST SP 800-38d
doi:10.6028/NIST.SP.800-38d
Download PDF | Download Citation
Title: Recommendation for block cipher modes of operation : the XTS-AES mode for confidentiality on storage devices
Date Published: 2010
Authors: M J Dworkin
Report Number: NIST SP 800-38e
doi:10.6028/NIST.SP.800-38e
Download PDF | Download Citation
Title: Managing information security risk : organization, mission, and information system view
Date Published: 2011
Authors:
Report Number: NIST SP 800-39
doi:10.6028/NIST.SP.800-39
Download PDF | Download Citation
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 27/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-41r1
Download PDF | Download Citation
Title: Volume I : guide for mapping types of information and information systems to security categories
Date Published: 2008
Authors: Kevin Stine, Rich Kissel, William C Barker, Jim Fahlsing, Jessica Gulick
Report Number: NIST SP 800-60v1r1
doi:10.6028/NIST.SP.800-60v1r1
Download PDF | Download Citation
Title: Volume II : appendices to guide for mapping types of information and information systems to security categories
Date Published: 2008
Authors: Kevin Stine, Rich Kissel, William C Barker, Annabelle Lee, Jim Fahlsing
Report Number: NIST SP 800-60v2r1
doi:10.6028/NIST.SP.800-60v2r1
Download PDF | Download Citation
Title: Recommendation for the triple data encryption algorithm (TDEA) block cipher
Date Published: 2004
Authors: W C Barker
Report Number: NIST SP 800-67ver1
doi:10.6028/NIST.SP.800-67ver1
Download PDF | Download Citation
Title: Interfaces for personal identity verification : end-point PIV card application namespace, data model and representation
Date Published: 2010
Authors: R Chandramouli, D A Cooper, J F Dray, H Ferraiolo, S B Guthery, W I MacGregor, K Mehta
Report Number: NIST SP 800-73-3
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 28/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-73-3
Download PDF | Download Citation
Title: Recommendation for random number generation using deterministic random bit generators (revised)
Date Published: 2007
Authors: E B Barker, J M Kelsey
Report Number: NIST SP 800-90r
doi:10.6028/NIST.SP.800-90r
Download PDF | Download Citation
Title: Guidelines for the Authorization of Personal Identity Verification Card Issuers (PCI) and Derived PIV Credential Issuers (DPCI)
Date Published: July 2015
Authors: Hildegard Ferraiolo, Ramaswamy Chandramouli, Nabil Ghadiali, Jason Mohler, Scott Shorter
Report Number: NIST SP 800-79-2
doi:10.6028/NIST.SP.800-79-2
Download PDF | Download Citation
Title: Recommendation for Random Number Generation Using Deterministic Random Bit Generators
Date Published: June 2015
Authors: Elaine B. Barker, John M. Kelsey
Report Number: NIST SP 800-90Ar1
doi:10.6028/NIST.SP.800-90Ar1
Download PDF | Download Citation
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 29/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-171
Download PDF | Download Citation
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 30/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-106
Download PDF | Download Citation
Title: The impact of the FCC's Open Network Architecture on NSNP telecommunications security
Date Published: 1995
Authors: Karen Olsen, John Tebbutt
Report Number: NIST SP 800-11
doi:10.6028/NIST.SP.800-11
Download PDF | Download Citation
Title: User's guide to securing external devices for telework and remote access
Date Published: 2007
Authors: K A Scarfone, M P Souppaya
Report Number: NIST SP 800-114
doi:10.6028/NIST.SP.800-114
Download PDF | Download Citation
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 31/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-115
Download PDF | Download Citation
Title: A recommendation for the use of PIV credentials in Physical Access Control Systems (PACS)
Date Published: 2008
Authors: W I MacGregor, K Mehta, D A Cooper, K A Scarfone
Report Number: NIST SP 800-116
doi:10.6028/NIST.SP.800-116
Download PDF | Download Citation
Title: Guide to adopting and using the Security Content Automation Protocol (SCAP) version 1.0
Date Published: 2010
Authors: S D Quinn, K A Scarfone, M Barrett, C S Johnson
Report Number: NIST SP 800-117
doi:10.6028/NIST.SP.800-117
Download PDF | Download Citation
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 32/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-121r1
Download PDF | Download Citation
Title: Generally accepted principles and practices for securing information technology systems
Date Published: 1996
Authors: Marianne Swanson, Barbara Guttman
Report Number: NIST SP 800-14
doi:10.6028/NIST.SP.800-14
Download PDF | Download Citation
Title: Information technology security training requirements : a role- and performance-based model
Date Published: 1998
Authors: Mark Wilson, Dorothea E de Zafra, Sadie I Pitcher, John D Tressler, John B Ippolito
Report Number: NIST SP 800-16
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 33/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-16
Download PDF | Download Citation
Title: Public-key cryptography
Date Published: 1991
Authors: James Nechvatal
Report Number: NIST SP 800-2
doi:10.6028/NIST.SP.800-2
Download PDF | Download Citation
Title: A statistical test suite for random and pseudorandom number generators for cryptographic applications
Date Published: 2000
Authors: Andrew Rukhin, Juan Sota, James Nechvatal, Miles Smid, Elaine Barker, Stefan Leigh, Mark Levenson, Mark Vangel, David Banks, Alan Heckert, James Dray, San Vo
Report Number: NIST SP 800-22
doi:10.6028/NIST.SP.800-22
Download PDF | Download Citation
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 34/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-23
Download PDF | Download Citation
Title: PBX vulnerability analysis : finding holes in your PBX before someone else does
Date Published: 2001
Authors: D Richard Kuhn
Report Number: NIST SP 800-24
doi:10.6028/NIST.SP.800-24
Download PDF | Download Citation
Title: Federal agency use of public key technology for digital signatures and authentication
Date Published: 2000
Authors: Kathy Lyons-Burke
Report Number: NIST SP 800-25
doi:10.6028/NIST.SP.800-25
Download PDF | Download Citation
Title: Engineering principles for information technology security (a baseline for achieving security) : recommendations of the National Institute of Standards and Technology
Date Published: 2001
Authors: Gary Stoneburner, Clark Hayden, Alexis Feringa
Report Number: NIST SP 800-27
doi:10.6028/NIST.SP.800-27
Download PDF | Download Citation
Title: A comparison of the security requirements for cryptographic modules in FIPS 140-1 and FIPS 140-2
Date Published: 2001
Authors: Ray Snouffer, Annabelle Lee, Arch Oldehoeft
Report Number: NIST SP 800-29
doi:10.6028/NIST.SP.800-29
Download PDF | Download Citation
Title: Risk management guide for information technology systems : recommendations of the National Institute of Standards and Technology
Date Published: 2002
Authors: Gary Stoneburner, Alice Goguen, Alexis Feringa
Report Number: NIST SP 800-30
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 35/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-30
Download PDF | Download Citation
Title: Underlying technical models for information technology security : recommendations of the National Institute of Standards and Technology
Date Published: 2001
Authors: Gary Stoneburner
Report Number: NIST SP 800-33
doi:10.6028/NIST.SP.800-33
Download PDF | Download Citation
Title: Contingency planning guide for information technology systems : recommendations of the National Institute of Standards and Technology
Date Published: 2002
Authors: Marianne Swanson, Amy Wohl, Lucinda Pope, Tim Grance, Joan Hash, Ray Thomas
Report Number: NIST SP 800-34
doi:10.6028/NIST.SP.800-34
Download PDF | Download Citation
Title: Computer security considerations in federal procurements : a guide for procurement initiators, contracting officers, and computer security officials
Date Published: 1992
Authors: Barbara Guttman
Report Number: NIST SP 800-4
doi:10.6028/NIST.SP.800-4
Download PDF | Download Citation
Title: Guidelines on firewalls and firewall policy : recommendations of the National Institute of Standards and Technology
Date Published: 2002
Authors: John Wack, Ken Cutler, Jamie Pole
Report Number: NIST SP 800-41
doi:10.6028/NIST.SP.800-41
Download PDF | Download Citation
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 36/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-45
Download PDF | Download Citation
Title: Security for telecommuting and broadband communications : recommendations of the National Institute of Standards and Technology
Date Published: 2002
Authors: D Richard Kuhn, Miles C Tracy, Sheila E Frankel
Report Number: NIST SP 800-46
doi:10.6028/NIST.SP.800-46
Download PDF | Download Citation
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 37/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-49
Download PDF | Download Citation
Title: Use of the Common Vulnerabilities and Exposures (CVE) vulnerability naming scheme
Date Published: 2002
Authors: P Mell, T Grance
Report Number: NIST SP 800-51
doi:10.6028/NIST.SP.800-51
Download PDF | Download Citation
Title: Guidelines for the selection, configuration, and use of Transport Layer Security (TLS) implementations
Date Published: 2005
Authors: C M Chernick, C, III Edington, M J Fanto, R Rosenthal
Report Number: NIST SP 800-52
doi:10.6028/NIST.SP.800-52
Download PDF | Download Citation
Title: Guide for assessing the security controls in federal information systems and organizations : building effective security assessment plans
Date Published: 2008
Authors: R Ross, L A Johnson, S Katzke, P Toth, G Stoneburner, G Rogers
Report Number: NIST SP 800-53a
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 38/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-53a
Download PDF | Download Citation
Title: Guide for assessing the security controls in federal information systems and organizations : building effective security assessment plans
Date Published: 2010
Authors:
Report Number: NIST SP 800-53ar1
doi:10.6028/NIST.SP.800-53ar1
Download PDF | Download Citation
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 39/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-55r1
Download PDF | Download Citation
Title: Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography
Date Published: 2006
Authors:
Report Number: NIST SP 800-56a
doi:10.6028/NIST.SP.800-56a
Download PDF | Download Citation
Title: Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography
Date Published: 2007
Authors: E B Barker, D Johnson, M E Smid
Report Number: NIST SP 800-56ar
doi:10.6028/NIST.SP.800-56ar
Download PDF | Download Citation
Title: Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography
Date Published: 2009
Authors: E B Barker, L Chen, A R Regenscheid, M E Smid
Report Number: NIST SP 800-56b
doi:10.6028/NIST.SP.800-56b
Download PDF | Download Citation
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 40/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-57p1r2007
Download PDF | Download Citation
Title: Recommendation for key management, part 2 : best practices for key management organization
Date Published: 2005
Authors: E B Barker, W C Barker, W E Burr, W T Polk, M E Smid
Report Number: NIST SP 800-57p2
doi:10.6028/NIST.SP.800-57p2
Download PDF | Download Citation
Title: Volume I : guide for mapping types of information and information systems to security categories
Date Published: 2004
Authors: William C Barker
Report Number: NIST SP 800-60ver2v1
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 41/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-60ver2v1
Download PDF | Download Citation
Title: Volume II : appendices to guide for mapping types of information and information systems to security categories
Date Published: 2004
Authors: William C Barker, Annabelle Lee
Report Number: NIST SP 800-60ver2v2
doi:10.6028/NIST.SP.800-60ver2v2
Download PDF | Download Citation
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 42/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-64
Download PDF | Download Citation
Title: Integrating IT Security into the Capital Planning and Investment Control Process
Date Published: 2005
Authors: J Hash, N Bartol, H Rollins, W Robinson, J Abeles, S Batdorff
Report Number: NIST SP 800-65
doi:10.6028/NIST.SP.800-65
Download PDF | Download Citation
Title: An introductory resource guide for implementing the Health Insurance Portability and Accountability Act (HIPAA) security rule
Date Published: 2005
Authors: J Hash, P Bowen, L A Johnson, C D Smith, D I Steingberg
Report Number: NIST SP 800-66
doi:10.6028/NIST.SP.800-66
Download PDF | Download Citation
Title: An introductory resource guide for implementing the Health Insurance Portability and Accountability Act (HIPAA) security rule
Date Published: 2008
Authors: M A Scholl, K M Stine, J Hash, P Bowen, L A Johnson, C D Smith, D I Steinberg
Report Number: NIST SP 800-66r1
doi:10.6028/NIST.SP.800-66r1
Download PDF | Download Citation
Title: Recommendation for the triple data encryption algorithm (TDEA) block cipher
Date Published: 2012
Authors: W C Barker, E B Barker
Report Number: NIST SP 800-67r1
doi:10.6028/NIST.SP.800-67r1
Download PDF | Download Citation
Title: Guidance for securing Microsoft Windows XP for IT Professionals : a NIST security configuration checklist : recommendations of the National Institute of Standards and
Technology
Date Published: 2005
Authors: Murugia Souppaya, Karen Kent, Paul M Johnson
Report Number: NIST SP 800-68
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 43/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-68
Download PDF | Download Citation
Title: Guide to securing Microsoft Windows XP Systems for IT Professionals : a NIST security configuration checklist
Date Published: 2008
Authors: K A Scarfone, M P Souppaya, P M Johnson
Report Number: NIST SP 800-68r1
doi:10.6028/NIST.SP.800-68r1
Download PDF | Download Citation
Title: Guidance for securing Microsoft Windows XP Home Edition : a NIST security configuration checklist
Date Published: 2006
Authors: K Kent, M P Souppaya, J Connor
Report Number: NIST SP 800-69
doi:10.6028/NIST.SP.800-69
Download PDF | Download Citation
Title: Security configuration checklists program for IT products : guidance for checklists users and developers
Date Published: 2005
Authors: Murugiah Souppaya, John P Wack, Karen Kent
Report Number: NIST SP 800-70
doi:10.6028/NIST.SP.800-70
Download PDF | Download Citation
Title: National checklist program for IT products : guidelines for checklist users and developers
Date Published: 2009
Authors: S D Quinn, K A Scarfone, M P Souppaya
Report Number: NIST SP 800-70r1
doi:10.6028/NIST.SP.800-70r1
Download PDF | Download Citation
Title: National checklist program for IT products : guidelines for checklist users and developers
Date Published: 2011
Authors: S D Quinn, M P Souppaya, M Cook, K A Scarfone
Report Number: NIST SP 800-70r2
doi:10.6028/NIST.SP.800-70r2
Download PDF | Download Citation
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 44/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-72
Download PDF | Download Citation
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 45/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-78
Download PDF | Download Citation
Title: Guidelines for the certification and accreditation of PIV card issuing organizations
Date Published: 2005
Authors: D K Branstad, A Clay, J Hash
Report Number: NIST SP 800-79
doi:10.6028/NIST.SP.800-79
Download PDF | Download Citation
Title: Guidelines for the Authorization of Personal Identity Verification Card Issuers (PCI) and Derived PIV Credential Issuers (DPCI)
Date Published: June 2008
Authors: Ramaswamy Chandramouli, Dennis Bailey, Nabil Ghadiali, Dennis Branstad
Report Number: NIST SP 800-79-1
doi:10.6028/NIST.SP.800-79-1
Download PDF | Download Citation
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 46/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-81
Download PDF | Download Citation
Title: Guide to test, training, and exercise programs for IT plans and capabilities
Date Published: 2006
Authors: T Grance, T Nolan, K Burke, R Dudley, G White, T Good
Report Number: NIST SP 800-84
doi:10.6028/NIST.SP.800-84
Download PDF | Download Citation
Title: PIV middleware and on-card application conformance test guidance (SP 800-73 compliance)
Date Published: 2005
Authors: R Chandramouli, L Eyuboglu, K Mehta
Report Number: NIST SP 800-85
doi:10.6028/NIST.SP.800-85
Download PDF | Download Citation
Title: PIV card application and middleware interface test guidelines (SP800-73 compliance)
Date Published: 2006
Authors: R Chandramouli, L Eyuboglu, K Mehta
Report Number: NIST SP 800-85a
doi:10.6028/NIST.SP.800-85a
Download PDF | Download Citation
Title: PIV card application and middleware interface test guidelines (SP800-73-2 compliance)
Date Published: 2009
Authors:
Report Number: NIST SP 800-85a-1
doi:10.6028/NIST.SP.800-85a-1
Download PDF | Download Citation
Title: PIV card application and middleware interface test guidelines (SP800-73-3 compliance)
Date Published: 2010
Authors: R Chandramouli, H Ferraiolo, K Mehta
Report Number: NIST SP 800-85a-2
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 47/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-85a-2
Download PDF | Download Citation
Title: Codes for the identification of federal and federally assisted organizations version 1.0
Date Published: 2005
Authors: W C Barker, H Ferraiolo
Report Number: NIST SP 800-87ver1
doi:10.6028/NIST.SP.800-87ver1
Download PDF | Download Citation
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 48/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-88
Download PDF | Download Citation
Title: Good security practices for electronic commerce, including electronic data interchange
Date Published: 1993
Authors: Roy G Saltman
Report Number: NIST SP 800-9
doi:10.6028/NIST.SP.800-9
Download PDF | Download Citation
Title: Recommendation for random number generation using deterministic random bit generators (revised)
Date Published: 2007
Authors: E B Barker, J M Kelsey
Report Number: NIST SP 800-90
doi:10.6028/NIST.SP.800-90
Download PDF | Download Citation
Title: Recommendation for random number generation using deterministic random bit generators
Date Published: 2012
Authors: E B Barker, J M Kelsey
Report Number: NIST SP 800-90a
doi:10.6028/NIST.SP.800-90a
Download PDF | Download Citation
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 49/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-95
Download PDF | Download Citation
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 50/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-78-4
Download PDF | Download Citation
Title: Supply Chain Risk Management Practices for Federal Information Systems and Organizations
Date Published: April 2015
Authors: Jon M. Boyens, Celia Paulsen, Rama Moorthy, Nadya Bartol
Report Number: NIST SP 800-161
doi:10.6028/NIST.SP.800-161
Download PDF | Download Citation
Title: Assessing Security and Privacy Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans
Date Published: December 2014
Authors: Ronald S. Ross
Report Number: NIST SP 800-53Ar4
doi:10.6028/NIST.SP.800-53Ar4
Download PDF | Download Citation
Title: Assessing Security and Privacy Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans
Date Published: December 2014
Authors: Ronald S. Ross
Report Number: NIST SP 800-53Ar4
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 51/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-53Ar4
Download PDF | Download Citation
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 52/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-165
Download PDF | Download Citation
Title: Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography
Date Published: May 2013
Authors: Elaine Barker, Lily Chen, Allen Roginsky, Miles Smid
Report Number: NIST SP 800-56Ar2
doi:10.6028/NIST.SP.800-56Ar2
Download PDF | Download Citation
Title: Guide to Malware Incident Prevention and Handling for Desktops and Laptops
Date Published: July 2013
Authors: Murugiah Souppaya, Karen Scarfone
Report Number: NIST SP 800-83r1
doi:10.6028/NIST.SP.800-83r1
Download PDF | Download Citation
Title: Guide for applying the risk management framework to federal information systems : a security life cycle approach
Date Published: June 2014
Authors:
Report Number: NIST SP 800-37r1
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 53/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-37r1
Download PDF | Download Citation
Title: Guidelines for the selection, configuration, and use of transport layer security (TLS) implementations
Date Published: April 2014
Authors: Tim Polk, Kerry McKay, Santosh Chokhani
Report Number: NIST SP 800-52r1
doi:10.6028/NIST.SP.800-52r1
Download PDF | Download Citation
Title: Computer Security Incident Handling Guide : Recommendations of the National Institute of Standards and Technology
Date Published: August 2012
Authors: Paul Cichonski, Tom Millar, Tim Grance, Karen Scarfone
Report Number: NIST SP 800-61r2
doi:10.6028/NIST.SP.800-61r2
Download PDF | Download Citation
Title: Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control systems (DCS), and other control
system configurations such as Programmable Logic Controllers (PLC) : recommendations of the National Institute of Standards and Technology, Computer security
Date Published: June 2011
Authors: Keith Stouffer, Joe Falco, Karen Scarfone
Report Number: NIST SP 800-82
doi:10.6028/NIST.SP.800-82
Download PDF | Download Citation
Title: Guide to Industrial Control Systems (ICS) Security : Supervisory Control and Data Acquisition (SCADA) Systems, Distributed Control Systems (DCS), and Other Control
System Configurations such as Programmable Logic Controllers (PLC)
Date Published: May 2013
Authors: Keith Stouffer, Joe Falco, Karen Scarfone
Report Number: NIST SP 800-82r1
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 54/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-82r1
Download PDF | Download Citation
Title: Security and Privacy Controls for Federal Information Systems and Organizations
Date Published: April 2013
Authors:
Report Number: NIST SP 800-53r4
doi:10.6028/NIST.SP.800-53r4
Download PDF | Download Citation
Title: Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping (SP 800-38F)
Date Published: December 2012
Authors: Morris J. Dworkin
Report Number: NIST SP 800-38F
doi:10.6028/NIST.SP.800-38F
Download PDF | Download Citation
Filter by Series
Trustworthy and Responsible AI
Advanced Manufacturing Series
Basic Radio Propagation Predictions Series
Building and Housing Reports
Building Materials and Structures Reports
Building Science Series
Central Radio Propagation Laboratory Reports
CRPL Ionospheric Data
CRPL Ionospheric Predictions
CRPL Solar-Geophysical Data
Circulars
Consumer Information Series
Commercial Standards
Commercial Standards Monthly
Cybersecurity White Papers
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 55/57
24/7/23, 22:48 NIST Technical Publications List
Data Collection Instruments and Best Practices
Economic Analysis Briefs
Federal Information Processing Standards Publications
Grant/Contractor Reports
Handbooks
Hydraulic Research in the United States
Interservice Radio Propagation Laboratory
Letter Circular
Monographs
Miscellaneous Publications
National Construction Safety Team Act Reports
National Standard Reference Data Series
NISTIRs (Interagency/Internal Reports)
Office of Weights and Measures White Papers
Photographic Circulars
NBS Reports
Special Interior Ballistics Studies
Special Publications (General)
SP 250: Calibration Services
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 56/57
24/7/23, 22:48 NIST Technical Publications List
Technology Transfer Brief
Voting Technology Series
https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 57/57