0% found this document useful (0 votes)
254 views57 pages

NIST Technical Publications List

The document provides a list of recent technical publications from NIST on topics related to cybersecurity. It includes the titles, authors, dates of publication and download links for several reports published in 2023 and 2022. The list contains publications covering a wide range of technical guidelines and recommendations for secure systems and practices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
254 views57 pages

NIST Technical Publications List

The document provides a list of recent technical publications from NIST on topics related to cybersecurity. It includes the titles, authors, dates of publication and download links for several reports published in 2023 and 2022. The list contains publications covering a wide range of technical guidelines and recommendations for secure systems and practices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 57

24/7/23, 22:48 NIST Technical Publications List

NIST Website About NIST usnistgov on GitHub

NIST Technical Series Publication List

SP800
Title: Recommendations for Federal Vulnerability Disclosure Guidelines 
Date Published: 2023
Authors: Kim B Schaffer
Report Number: NIST SP 800-216
doi:10.6028/NIST.SP.800-216
Download PDF | Download Citation

Title: Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations 


Date Published: 2023
Authors: Ron Ross
Report Number: NIST SP 800-171r3 ipd
doi:10.6028/NIST.SP.800-171r3.ipd
Download PDF | Download Citation

Title: Guidelines for Managing the Security of Mobile Devices in the Enterprise 


Date Published: 2023
Authors: Murugiah Souppaya
Report Number: NIST SP 800-124r2
doi:10.6028/NIST.SP.800-124r2
Download PDF | Download Citation

Title: 2022 Cybersecurity and Privacy Annual Report 


Date Published: 2023
Authors: Patrick O’Reilly
Report Number: NIST SP 800-225
doi:10.6028/NIST.SP.800-225
Download PDF | Download Citation

Title: Automated Secure Configuration Guidance from the macOS Security Compliance Project (mSCP) 
Date Published: 2023
Authors: Mark Trapnell

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 1/57
24/7/23, 22:48 NIST Technical Publications List
Report Number: NIST SP 800-219r1 ipd
doi:10.6028/NIST.SP.800-219r1.ipd
Download PDF | Download Citation

Title: NIST Cloud Computing Forensic Reference Architecture 


Date Published: 2023
Authors: Martin Herman
Report Number: NIST SP 800-201 ipd
doi:10.6028/NIST.SP.800-201.ipd
Download PDF | Download Citation

Title: Guidelines for Personal Identity Verification (PIV) Federation 


Date Published: 2023
Authors: Hildegard Ferraiolo
Report Number: NIST SP 800-217 ipd
doi:10.6028/NIST.SP.800-217.ipd
Download PDF | Download Citation

Title: Guidelines for Derived Personal Identity Verification (PIV) Credentials 


Date Published: 2023
Authors: Hildegard Ferraiolo
Report Number: NIST SP 800-157r1 ipd
doi:10.6028/NIST.SP.800-157r1.ipd
Download PDF | Download Citation

Title: De-Identifying Government Data Sets 


Date Published: 2022
Authors: Simson Garfnkel
Report Number: NIST SP 800-188 3pd
doi:10.6028/NIST.SP.800-188.3pd
Download PDF | Download Citation

Title: Guide to a secure enterprise network landscape 


Date Published: November 2022
Authors: Ramaswamy Chandramouli
Report Number: NIST SP 800-215
doi:10.6028/NIST.SP.800-215
Download PDF | Download Citation

Title: Performance Measurement Guide for Information Security 


Date Published: 2022
Authors: Katherine Schroeder
Report Number: NIST SP 800-055r2 iwd
doi:10.6028/NIST.SP.800-55r2.iwd
Download PDF | Download Citation

Title: Engineering trustworthy secure systems 


Date Published: November 2022
Authors: Ron Ross, Mark Winstead, Michael McEvilley
Report Number: NIST SP 800-160v1r1

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 2/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-160v1r1
Download PDF | Download Citation

Title: Digital Identity Guidelines: Federation and Assertions


Date Published: 2022
Authors: David Temoshok
Report Number: NIST SP 800-63C-4 ipd
doi:10.6028/NIST.SP.800-63C-4.ipd
Download PDF | Download Citation

Title: Digital Identity Guidelines: Authentication and Lifecycle Management


Date Published: 2022
Authors: David Temoshok
Report Number: NIST SP 800-63B-4 ipd
doi:10.6028/NIST.SP.800-63B-4.ipd
Download PDF | Download Citation

Title: Digital Identity Guidelines 


Date Published: 2022
Authors: David Temoshok
Report Number: NIST SP 800-063-4 ipd
doi:10.6028/NIST.SP.800-63-4.ipd
Download PDF | Download Citation

Title: Digital Identity Guidelines: Enrollment and Identity Proofing


Date Published: 2022
Authors: David Temoshok
Report Number: NIST SP 800-63A-4 ipd
doi:10.6028/NIST.SP.800-63A-4.ipd
Download PDF | Download Citation

Title: CMVP Security Policy Requirements: CMVP Validation Authority Updates to ISO/IEC 24759 and ISO/IEC 19790 Annex B
Date Published: 2022
Authors: David Hawes
Report Number: NIST SP 800-140Br1 2pd
doi:10.6028/NIST.SP.800-140Br1.2pd
Download PDF | Download Citation

Title: Recommendations for Discrete Logarithm-based Cryptography: Elliptic Curve Domain Parameters


Date Published: 2022
Authors: Dustin Moody
Report Number: NIST SP 800-186
doi:10.6028/NIST.SP.800-186
Download PDF | Download Citation

Title: Recommendation for Random Bit Generator (RBG) Constructions 


Date Published: 2022
Authors: Elaine Barker
Report Number: NIST SP 800-90C 3pd

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 3/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-90C.3pd
Download PDF | Download Citation

Title: 2021 cybersecurity and privacy annual report 


Date Published: September 2022
Authors: Patrick O'Reilly, Kristina Rigopoulos, Larry Feldman, Greg Witte
Report Number: NIST SP 800-220
doi:10.6028/NIST.SP.800-220
Download PDF | Download Citation

Title: Recommendation for key derivation using pseudorandom functions 


Date Published: August 2022
Authors: Lily Chen
Report Number: NIST SP 800-108r1
doi:10.6028/NIST.SP.800-108r1
Download PDF | Download Citation

Title: Guide to Secure Enterprise Network Access Landscape 


Date Published: August 2022
Authors: Ramaswamy Chandramouli
Report Number: NIST SP 800-215 ipd
doi:10.6028/NIST.SP.800-215.ipd
Download PDF | Download Citation

Title: High Performance Computing (HPC) Security: Architecture and Security Posture


Date Published: 2022
Authors: Yang Guo
Report Number: NIST SP 800-223 ipd
doi:10.6028/NIST.SP.800-223.ipd
Download PDF | Download Citation

Title: Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule: A Cybersecurity Resource Guide
Date Published: 2022
Authors: Jeffrey A Marron
Report Number: NIST SP 800-66r2 ipd
doi:10.6028/NIST.SP.800-66r2.ipd
Download PDF | Download Citation

Title: Information and Communications Technology (ICT) Risk Outcomes: A Framework for Integrating ICT Risk Management Programs with the Enterprise Risk Portfolio
Date Published: 2022
Authors: Stephen Quinn
Report Number: NIST SP 800-221A ipd
doi:10.6028/NIST.SP.800-221A.ipd
Download PDF | Download Citation

Title: Enterprise Impact of Information and Communications Technology Risk: Governing and Managing ICT Risk Programs Within an Enterprise Risk Portfolio
Date Published: 2022
Authors: Stephen Quinn
Report Number: NIST SP 800-221 ipd

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 4/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-221.ipd
Download PDF | Download Citation

Title: Engineering Trustworthy Secure Systems 


Date Published: 2022
Authors: Ron Ross
Report Number: NIST SP 800-160v1r1 fpd
doi:10.6028/NIST.SP.800-160v1r1.fpd
Download PDF | Download Citation

Title: Automated secure configuration guidance from the macOS Security Compliance Project (mSCP) 
Date Published: June 2022
Authors: Mark Trapnell, Eric Trapnell, Murugiah Souppaya, Bob Gendler, Karen Scarfone
Report Number: NIST SP 800-219
doi:10.6028/NIST.SP.800-219
Download PDF | Download Citation

Title: CMVP Approved Security Functions: CMVP Validation Authority Updates to ISO/IEC 24759


Date Published: 2022
Authors: Kim B Schaffer
Report Number: NIST SP 800-140Cr1
doi:10.6028/NIST.SP.800-140Cr1
Download PDF | Download Citation

Title: CMVP approved security functions : CMVP validation authority updates to ISOIEC 24759
Date Published: May 2022
Authors: Kim Schaffer, Alexander Calis
Report Number: NIST SP 800-140Cr1
doi:10.6028/NIST.SP.800-140Cr1
Download PDF | Download Citation

Title: CMVP Approved Sensitive Security Parameter Generation and Establishment Methods: CMVP Validation Authority Updates to ISO/IEC 24759
Date Published: 2022
Authors: Kim B Schaffer
Report Number: NIST SP 800-140Dr1
doi:10.6028/NIST.SP.800-140Dr1
Download PDF | Download Citation

Title: CMVP approved sensitive security parameter generation and establishment methods : CMVP validation authority updates to ISOIEC 24759
Date Published: May 2022
Authors: Kim Schaffer, Alexander Calis
Report Number: NIST SP 800-140Dr1
doi:10.6028/NIST.SP.800-140Dr1
Download PDF | Download Citation

Title: CMVP Security Policy Requirements: CMVP Validation Authority Updates to ISO/IEC 24759 and ISO/IEC 19790 Annex B 
Date Published: May 2022
Authors: David Hawes, Alexander Calis, Roy Crombie
Report Number: NIST SP 800-140Br1 ipd

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 5/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-140Br1.ipd
Download PDF | Download Citation

Title: Workforce framework for cybersecurity (NICE Framework) (Ukranian translation) 


Date Published: May 2022
Authors: Rodney Petersen, Danielle Santos, Matthew C Smith, Karen A Wetzel, Greg Witte
Report Number: NIST SP 800-181r1.ukr
doi:10.6028/NIST.SP.800-181r1.ukr
Download PDF | Download Citation

Title: National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework (Ukrainian translation) 
Date Published: May 2022
Authors: William Newhouse, Stephanie Keith, Benjamin Scribner, Greg Witte
Report Number: NIST SP 800-181.ukr
doi:10.6028/NIST.SP.800-181.ukr
Download PDF | Download Citation

Title: Workforce framework for cybersecurity (NICE Framework) (Slovak translation) 


Date Published: May 2022
Authors: Rodney Petersen, Danielle Santos, Matthew C Smith, Karen A Wetzel, Greg Witte
Report Number: NIST SP 800-181r1.slo
doi:10.6028/NIST.SP.800-181r1.slo
Download PDF | Download Citation

Title: Cybersecurity supply chain risk management for systems and organizations 


Date Published: May 2022
Authors: Jon Boyens, Angela Smith, Nadya Bartol, Kris Winkler, Alex Holbrook, Matthew Fallon
Report Number: NIST SP 800-161r1
doi:10.6028/NIST.SP.800-161r1
Download PDF | Download Citation

Title: Guide to enterprise patch management planning : preventive maintenance for technology


Date Published: April 2022
Authors: Murugiah Souppaya, Karen Scarfone
Report Number: NIST SP 800-40r4
doi:10.6028/NIST.SP.800-40r4
Download PDF | Download Citation

Title: Assessing Enhanced Security Requirements for Controlled Unclassified Information 


Date Published: March 2022
Authors: Ron Ross, Victoria Pillitteri, Kelley Dempsey
Report Number: NIST SP 800-172A
doi:10.6028/NIST.SP.800-172A
Download PDF | Download Citation

Title: Assessing enhanced security requirements for controlled unclassified information 


Date Published: March 2022
Authors: Ron Ross, Victoria Pillitteri, Kelley Dempsey
Report Number: NIST SP 800-172A

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 6/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-172A
Download PDF | Download Citation

Title: Implementation of DevSecOps for a Microservices-based Application with Service Mesh 


Date Published: March 2022
Authors: Ramaswamy Chandramouli
Report Number: NIST SP 800-204C
doi:10.6028/NIST.SP.800-204C
Download PDF | Download Citation

Title: Implementation of DevSecOps for a microservices-based application with service mesh 


Date Published: March 2022
Authors: Ramaswamy Chandramouli
Report Number: NIST SP 800-204C
doi:10.6028/NIST.SP.800-204C
Download PDF | Download Citation

Title: Automated Secure Configuration Guidance from the macOS Security Compliance Project (mSCP) 
Date Published: February 2022
Authors: Mark Trapnell, Eric Trapnell, Murugiah Souppaya, Bob Gendler, Karen Scarfone
Report Number: NIST SP 800-219-draft
doi:10.6028/NIST.SP.800-219-draft
Download PDF | Download Citation

Title: Workforce framework for cybersecurity (NICE Framework) (Portuguese translation) 


Date Published: May 2022
Authors: Rodney Petersen, Danielle Santos, Matthew C Smith, Karen A Wetzel, Greg Witte
Report Number: NIST SP 800-181r1pt
doi:10.6028/NIST.SP.800-181r1pt
Download PDF | Download Citation

Title: Workforce framework for cybersecurity (NICE Framework) (Spanish translation) 


Date Published: February 2022
Authors: Rodney Petersen, Danielle Santos, Matthew C Smith, Karen A Wetzel, Greg Witte
Report Number: NIST SP 800-181r1es
doi:10.6028/NIST.SP.800-181r1es
Download PDF | Download Citation

Title: National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework (Ukrainian translation) 
Date Published: February 2022
Authors: William Newhouse, Stephanie Keith, Benjamin Scribner, Greg Witte
Report Number: NIST SP 800-181pt
doi:10.6028/NIST.SP.800-181pt
Download PDF | Download Citation

Title: National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework (Ukrainian translation) 
Date Published: February 2022
Authors: William Newhouse, Stephanie Keith, Benjamin Scribner, Greg Witte
Report Number: NIST SP 800-181es

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 7/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-181es
Download PDF | Download Citation

Title: CMVP Approved Sensitive Security Parameter Generation and Establishment Methods: CMVP Validation Authority Updates to ISO/IEC 24759 
Date Published: February 2022
Authors: Kim Schaffer
Report Number: NIST SP 800-140Dr1-draft2
doi:10.6028/NIST.SP.800-140Dr1-draft2
Download PDF | Download Citation

Title: CMVP Approved Security Functions: CMVP Validation Authority Updates to ISO/IEC 24759 
Date Published: February 2022
Authors: Kim Schaffer
Report Number: NIST SP 800-140Cr1-draft2
doi:10.6028/NIST.SP.800-140Cr1-draft2
Download PDF | Download Citation

Title: Secure Software Development Framework (SSDF) version 1.1 : recommendations for mitigating the risk of software vulnerabilities
Date Published: February 2022
Authors: Murugiah Souppaya, Karen Scarfone, Donna Dodson
Report Number: NIST SP 800-218
doi:10.6028/NIST.SP.800-218
Download PDF | Download Citation

Title: Assessing Security and Privacy Controls in Information Systems and Organizations 


Date Published: January 2022
Authors: 
Report Number: NIST SP 800-53Ar5
doi:10.6028/NIST.SP.800-53Ar5
Download PDF | Download Citation

Title: Assessing security and privacy controls in information systems and organizations 


Date Published: January 2022
Authors: 
Report Number: NIST SP 800-53Ar5
doi:10.6028/NIST.SP.800-53Ar5
Download PDF | Download Citation

Title: Developing cyber-resilient systems : a systems security engineering approach


Date Published: December 2021
Authors: Ron Ross, Victoria Pillitteri, Richard Graubart, Deborah Bodeau, Rosalie McQuaid
Report Number: NIST SP 800-160v2r1
doi:10.6028/NIST.SP.800-160v2r1
Download PDF | Download Citation

Title: IoT Device Cybersecurity Guidance for the Federal Government IoT Device Cybersecurity Requirement Catalog
Date Published: November 2021
Authors: Michael Fagan, Katerina Megas, Jeffrey Marron, Kevin Brady, Barbara Cuthill, Rebecca Herold, David Lemire, Brad Hoehn
Report Number: NIST SP 800-213A

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 8/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-213A
Download PDF | Download Citation

Title: IoT device cybersecurity guidance for the federal government : IoT device cybersecurity requirement catalog
Date Published: November 2021
Authors: Michael Fagan, Katerina Megas, Jeffrey Marron, Eric Link, Kevin Brady, Barbara Cuthill, Rebecca Herold, David Lemire, Brad Hoehn
Report Number: NIST SP 800-213A
doi:10.6028/NIST.SP.800-213A
Download PDF | Download Citation

Title: IoT device cybersecurity guidance for the federal government : establishing IoT device cybersecurity requirements
Date Published: November 2021
Authors: Michael Fagan, Jeffrey Marron, Kevin Brady, Barbara Cuthill, Katerina Megas, Rebecca Herold
Report Number: NIST SP 800-213
doi:10.6028/NIST.SP.800-213
Download PDF | Download Citation

Title: 2020 cybersecurity and privacy annual report 


Date Published: September 2021
Authors: Patrick O'Reilly, Kristina Rigopoulos, Larry Feldman, Greg Witte
Report Number: NIST SP 800-214
doi:10.6028/NIST.SP.800-214
Download PDF | Download Citation

Title: Attribute-based Access Control for Microservices-based Applications Using a Service Mesh 


Date Published: August 2021
Authors: Ramaswamy Chandramouli, Zack Butcher, Aradhna Chetal
Report Number: NIST SP 800-204B
doi:10.6028/NIST.SP.800-204B
Download PDF | Download Citation

Title: Attribute-based access control for microservices-based applications using a service mesh 


Date Published: August 2021
Authors: Ramaswamy Chandramouli, Zack Butcher, Aradhna Chetal
Report Number: NIST SP 800-204B
doi:10.6028/NIST.SP.800-204B
Download PDF | Download Citation

Title: Enhanced Security Requirements for Protecting Controlled Unclassified Information: A Supplement to NIST Special Publication 800-171 A Supplement to NIST Special
Publication 800-171
Date Published: January 2021
Authors: RON ROSS, VICTORIA PILLITTERI, GARY GUISSANIE, RYAN WAGNER, RICHARD GRAUBART, DEB BODEAU
Report Number: NIST SP 800-172
doi:10.6028/NIST.SP.800-172
Download PDF | Download Citation

Title: Workforce Framework for Cybersecurity (NICE Framework) 


Date Published: November 2020
Authors: Rodney Petersen, Danielle Santos, Matthew C. Smith, Karen A. Wetzel, Greg Witte
Report Number: NIST SP 800-181r1

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 9/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-181r1
Download PDF | Download Citation

Title: Control Baselines for Information Systems and Organizations 


Date Published: October 2020
Authors: 
Report Number: NIST SP 800-53B
doi:10.6028/NIST.SP.800-53B
Download PDF | Download Citation

Title: Recommendation for Stateful Hash-Based Signature Schemes 


Date Published: October 2020
Authors: David A. Cooper, Daniel C. Apon, Quynh H. Dang, Michael S. Davidson, Morris J. Dworkin, Carl A. Miller
Report Number: NIST SP 800-208
doi:10.6028/NIST.SP.800-208
Download PDF | Download Citation

Title: Security Guidelines for Storage Infrastructure 


Date Published: October 2020
Authors: Ramaswamy Chandramouli, Doron Pinhas
Report Number: NIST SP 800-209
doi:10.6028/NIST.SP.800-209
Download PDF | Download Citation

Title: Security and Privacy Controls for Information Systems and Organizations 


Date Published: September 2020
Authors: 
Report Number: NIST SP 800-53r5
doi:10.6028/NIST.SP.800-53r5
Download PDF | Download Citation

Title: 2019 NIST/ITL Cybersecurity Program Annual Report 


Date Published: August 2020
Authors: Patrick O’Reilly, Kristina Rigopoulos, Larry Feldman, Greg Witte
Report Number: NIST SP 800-211
doi:10.6028/NIST.SP.800-211
Download PDF | Download Citation

Title: Recommendation for Key-Derivation Methods in Key-Establishment Schemes 


Date Published: August 2020
Authors: Elaine Barker, Lily Chen, Richard Davis
Report Number: NIST SP 800-56Cr2
doi:10.6028/NIST.SP.800-56Cr2
Download PDF | Download Citation

Title: Zero Trust Architecture 


Date Published: August 2020
Authors: Scott Rose, Oliver Borchert, Stu Mitchell, Sean Connelly
Report Number: NIST SP 800-207

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 10/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-207
Download PDF | Download Citation

Title: General access control guidance for cloud systems 


Date Published: July 2020
Authors: Vincent C Hu, Michaela Iorga, Wei Bao, Ang Li, Qinghua Li, Antonios Gouglidis
Report Number: NIST SP 800-210
doi:10.6028/NIST.SP.800-210
Download PDF | Download Citation

Title: Guide to IPsec VPNs 


Date Published: June 2020
Authors: Elaine Barker, Quynh Dang, Sheila Frankel, Karen Scarfone, Paul Wouters
Report Number: NIST SP 800-77r1
doi:10.6028/NIST.SP.800-77r1
Download PDF | Download Citation

Title: Recommendation for cryptographic key generation 


Date Published: June 2020
Authors: Elaine Barker, Allen Roginsky, Richard Davis
Report Number: NIST SP 800-133r2
doi:10.6028/NIST.SP.800-133r2
Download PDF | Download Citation

Title: Building secure microservices-based applications using service-mesh architecture 


Date Published: May 2020
Authors: Ramaswamy Chandramouli, Zack Butcher
Report Number: NIST SP 800-204A
doi:10.6028/NIST.SP.800-204a
Download PDF | Download Citation

Title: Assessing Information Security Continuous Monitoring (ISCM) Programs: Developing an ISCM Program Assessment 
Date Published: May 2020
Authors: Kelley Dempsey, Victoria Yan Pillitteri, Chad Baer, Robert Niemeyer, Ron Rudman, Susan Urban
Report Number: NIST SP 800-137A
doi:10.6028/NIST.SP.800-137A
Download PDF | Download Citation

Title: Recommendation for key management: part 1 - general


Date Published: May 2020
Authors: Elaine Barker
Report Number: NIST SP 800-57pt1r5
doi:10.6028/NIST.SP.800-57pt1r5
Download PDF | Download Citation

Title: Guideline for using cryptographic standards in the federal government: cryptographic mechanisms


Date Published: March 2020
Authors: Elaine Barker
Report Number: NIST SP 800-175Br1

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 11/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-175Br1
Download PDF | Download Citation

Title: FIPS 140-3 derived test requirements (DTR): CMVP validation authority updates to ISOIEC 24759
Date Published: March 2020
Authors: Kim Schaffer
Report Number: NIST SP 800-140
doi:10.6028/NIST.SP.800-140
Download PDF | Download Citation

Title: CMVP documentation requirements: CMVP validation authority updates to ISOIEC 24759


Date Published: March 2020
Authors: Kim Schaffer
Report Number: NIST SP 800-140A
doi:10.6028/NIST.SP.800-140A
Download PDF | Download Citation

Title: CMVP security policy requirements: CMVP validation authority updates to ISOIEC 24759 and ISOIEC 19790 Annex B
Date Published: March 2020
Authors: Kim Schaffer
Report Number: NIST SP 800-140B
doi:10.6028/NIST.SP.800-140B
Download PDF | Download Citation

Title: CMVP approved security functions: CMVP validation authority updates to ISOIEC 24759


Date Published: March 2020
Authors: Kim Schaffer
Report Number: NIST SP 800-140C
doi:10.6028/NIST.SP.800-140C
Download PDF | Download Citation

Title: CMVP approved sensitive parameter generation and establishment methods: CMVP validation authority updates to ISOIEC 24759:2014(E)
Date Published: March 2020
Authors: Kim Schaffer
Report Number: NIST SP 800-140D
doi:10.6028/NIST.SP.800-140D
Download PDF | Download Citation

Title: CMVP approved authentication mechanisms: CMVP validation authority requirements for ISOIEC 19790:2012 Annex E and ISOIEC 24579:2017
Date Published: March 2020
Authors: Kim Schaffer
Report Number: NIST SP 800-140E
doi:10.6028/NIST.SP.800-140E
Download PDF | Download Citation

Title: CMVP approved non-invasive attack mitigation test metrics: CMVP validation authority updates to ISOIEC 24759:2014(E)
Date Published: March 2020
Authors: Kim Schaffer
Report Number: NIST SP 800-140F

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 12/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-140F
Download PDF | Download Citation

Title: CMVP approved security functions: CMVP validation authority updates to ISOIEC 24759


Date Published: March 2020
Authors: Kim Schaffer
Report Number: NIST SP 800-140C
doi:10.6028/NIST.SP.800-140C
Download PDF | Download Citation

Title: CMVP approved sensitive parameter generation and establishment methods: CMVP validation authority updates to ISOIEC 24759:2014(E)
Date Published: March 2020
Authors: Kim Schaffer
Report Number: NIST SP 800-140D
doi:10.6028/NIST.SP.800-140D
Download PDF | Download Citation

Title: NIST/ITL Cybersecurity Program: Annual Report 2018 


Date Published: March 2020
Authors: Patrick O'Reilly, Kristina Rigopoulos, Larry Feldman, Greg Witte
Report Number: NIST SP 800-206
doi:10.6028/NIST.SP.800-206
Download PDF | Download Citation

Title: Protecting controlled unclassified information in nonfederal systems and organizations 


Date Published: February 2020
Authors: Ron Ross, Victoria Pillitteri, Kelley Dempsey, Mark Riddle, Gary Guissanie
Report Number: NIST SP 800-171r2
doi:10.6028/NIST.SP.800-171r2
Download PDF | Download Citation

Title: Resilient interdomain traffic exchange: BGP security and DDos mitigation


Date Published: December 2019
Authors: Kotikalapudi Sriram, Doug Montgomery
Report Number: NIST SP 800-189
doi:10.6028/NIST.SP.800-189
Download PDF | Download Citation

Title: Developing cyber resilient systems: a systems security engineering approach


Date Published: November 2019
Authors: Ron Ross, Victoria Pillitteri, Richard Graubart, Deborah Bodeau, Rosalie McQuaid
Report Number: NIST SP 800-160v2
doi:10.6028/NIST.SP.800-160v2
Download PDF | Download Citation

Title: Guide for security-focused configuration management of information systems 


Date Published: August 2011
Authors: Arnold Johnson, Kelley Dempsey, Ron Ross, Sarbari Gupta, Dennis Bailey
Report Number: NIST SP 800-128-2011

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 13/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-128-2011
Download PDF | Download Citation

Title: Guidelines for the selection, configuration, and use of Transport Layer Security (TLS) implementations 
Date Published: August 2019
Authors: Kerry A McKay, David A Cooper
Report Number: NIST SP 800-52r2
doi:10.6028/NIST.SP.800-52r2
Download PDF | Download Citation

Title: Security strategies for microservices-based application systems 


Date Published: August 2019
Authors: Ramaswamy Chandramouli
Report Number: NIST SP 800-204
doi:10.6028/NIST.SP.800-204
Download PDF | Download Citation

Title: Recommendation for cryptographic key generation 


Date Published: June 2021
Authors: Elaine Barker, Allen Roginsky
Report Number: NIST SP 800-133r1
doi:10.6028/NIST.SP.800-133r1
Download PDF | Download Citation

Title: Attribute considerations for access control systems 


Date Published: June 2019
Authors: Vincent C Hu, David F Ferraiolo, D Richard Kuhn
Report Number: NIST SP 800-205
doi:10.6028/NIST.SP.800-205
Download PDF | Download Citation

Title: Recommendation for key management: part 2 -- best practices for key management organizations
Date Published: May 2019
Authors: Elaine Barker, William C Barker
Report Number: NIST SP 800-57pt2r1
doi:10.6028/NIST.SP.800-57pt2r1
Download PDF | Download Citation

Title: Vetting the security of mobile applications 


Date Published: April 2019
Authors: Michael Ogata, Josh Franklin, Jeffrey Voas, Vincent Sritapan, Stephen Quirolgico
Report Number: NIST SP 800-163r1
doi:10.6028/NIST.SP.800-163r1
Download PDF | Download Citation

Title: Transitioning the use of cryptographic algorithms and key lengths 


Date Published: March 2019
Authors: Elaine Barker, Allen Roginsky
Report Number: NIST SP 800-131Ar2

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 14/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-131Ar2
Download PDF | Download Citation

Title: Recommendation for pair-wise key establishment using integer factorization cryptography 


Date Published: March 2019
Authors: Elaine Barker, Lily Chen, Allen Roginsky, Apostol Vassilev, Richard Davis, Scott Simon
Report Number: NIST SP 800-56Br2
doi:10.6028/NIST.SP.800-56Br2
Download PDF | Download Citation

Title: Trustworthy email 
Date Published: February 2019
Authors: Scott Rose, J Stephen Nightingale, Simson Garfinkel, Ramaswamy Chandramouli
Report Number: NIST SP 800-177r1
doi:10.6028/NIST.SP.800-177r1
Download PDF | Download Citation

Title: Risk management framework for information systems and organizations: a system life cycle approach for security and privacy
Date Published: December 2018
Authors: 
Report Number: NIST SP 800-37r2
doi:10.6028/NIST.SP.800-37r2
Download PDF | Download Citation

Title: Guidelines for the use of PIV credentials in facility access 


Date Published: June 2018
Authors: Hildegard Ferraiolo, Ketan Mehta, Nabil Ghadiali, Jason Mohler, Vincent Johnson, Steven Brady
Report Number: NIST SP 800-116r1
doi:10.6028/NIST.SP.800-116r1
Download PDF | Download Citation

Title: Security recommendations for server-based hypervisor platforms 


Date Published: June 2018
Authors: Ramaswamy Chandramouli
Report Number: NIST SP 800-125Ar1
doi:10.6028/NIST.SP.800-125Ar1
Download PDF | Download Citation

Title: Assessing security requirements for controlled unclassified information 


Date Published: June 2018
Authors: Ross Ron, Demspey Kelley, Pilliterri Victoria
Report Number: NIST SP 800-171A
doi:10.6028/NIST.SP.800-171A
Download PDF | Download Citation

Title: Quick start guide for populating mobile test devices 


Date Published: May 2018
Authors: Rick Ayers, Benjamin Livelsberger, Barbara Guttman
Report Number: NIST SP 800-202

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 15/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-202
Download PDF | Download Citation

Title: Platform firmware resiliency guidelines 


Date Published: May 2018
Authors: Andrew Regenscheid
Report Number: NIST SP 800-193
doi:10.6028/NIST.SP.800-193
Download PDF | Download Citation

Title: Codes for the identification of federal and federally-assisted organizations 


Date Published: April 2018
Authors: Hildegard Ferraiolo
Report Number: NIST SP 800-87r2
doi:10.6028/NIST.SP.800-87r2
Download PDF | Download Citation

Title: Recommendation for pair-wise key-establishment schemes using discrete logarithm cryptography 


Date Published: April 2018
Authors: Elaine Barker, Lily Chen, Allen Roginsky, Apostol Vassilev, Richard Davis
Report Number: NIST SP 800-56Ar3
doi:10.6028/NIST.SP.800-56Ar3
Download PDF | Download Citation

Title: Recommendation for key-derivation methods in key-establishment schemes 


Date Published: April 2018
Authors: Elaine Barker, Lily Chen, Richard Davis
Report Number: NIST SP 800-56Cr1
doi:10.6028/NIST.SP.800-56Cr1
Download PDF | Download Citation

Title: Systems security engineering: considerations for a multidisciplinary approach in the engineering of trustworthy secure systems, volume 1 
Date Published: March 2018
Authors: Ron Ross, Michael McEvilley, Janet Carrier Oren
Report Number: NIST SP 800-160v1
doi:10.6028/NIST.SP.800-160v1
Download PDF | Download Citation

Title: National checklist program for IT products - guidelines for checklist users and developers 
Date Published: February 2018
Authors: Stephen D Quinn, Murugiah Souppaya, Melanie Cook, Karen Scarfone
Report Number: NIST SP 800-70r4
doi:10.6028/NIST.SP.800-70r4
Download PDF | Download Citation

Title: SCAP 1.3 component specification version updates: an annex to NIST special publication 800-126 revision 3 
Date Published: February 2018
Authors: Harold Booth, David Waltermire, Lee Badger, Melanie Cook, Stephen D Quinn, Karen Scarfone
Report Number: NIST SP 800-126A

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 16/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-126A
Download PDF | Download Citation

Title: The technical specification for the security content automation protocol (SCAP) version 1.3 
Date Published: February 2018
Authors: David Waltermire, Stephen Quinn, Harold Booth, Karen Scarfone, Dragos Prisaca
Report Number: NIST SP 800-126r3
doi:10.6028/NIST.SP.800-126r3
Download PDF | Download Citation

Title: Security recommendations for hypervisor deployment on servers 


Date Published: January 2018
Authors: Ramaswamy Chandramouli
Report Number: NIST SP 800-125A
doi:10.6028/NIST.SP.800-125A
Download PDF | Download Citation

Title: Recommendation for the entropy sources used for random bit generation 
Date Published: January 2018
Authors: Meltem Sönmez Turan, Elaine Barker, John Kelsey, Kerry A McKay, Mary L Baish, Mike Boyle
Report Number: NIST SP 800-90b
doi:10.6028/NIST.SP.800-90B
Download PDF | Download Citation

Title: Guide to LTE security 


Date Published: December 2017
Authors: Jeffrey Cichonski, Joshua M Franklin, Michael Bartock
Report Number: NIST SP 800-187
doi:10.6028/NIST.SP.800-187
Download PDF | Download Citation

Title: Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher 
Date Published: November 2017
Authors: Elaine Barker, Nicky Mouha
Report Number: NIST SP 800-67r2
doi:10.6028/NIST.SP.800-67r2
Download PDF | Download Citation

Title: 2016 NIST/ITL cybersecurity program: annual report 


Date Published: September 2017
Authors: Patrick O'Reilly, Kristina Rigopoulos, Larry Feldman, Greg Witte
Report Number: NIST SP 800-195
doi:10.6028/NIST.SP.800-195
Download PDF | Download Citation

Title: Application container security guide 


Date Published: September 2017
Authors: Murugiah Souppaya, John Morello, Karen Scarfone
Report Number: NIST SP 800-190

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 17/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-190
Download PDF | Download Citation

Title: National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework 


Date Published: August 2017
Authors: William Newhouse, Stephanie Keith, Benjamin Scribner, Greg Witte
Report Number: NIST SP 800-181
doi:10.6028/NIST.SP.800-181
Download PDF | Download Citation

Title: Verification and test methods for access control policiesmodels 


Date Published: June 2017
Authors: Vincent C Hu, Rick Kuhn, Dylan Yaga
Report Number: NIST SP 800-192
doi:10.6028/NIST.SP.800-192
Download PDF | Download Citation

Title: An introduction to information security 


Date Published: June 2017
Authors: Michael Nieles, Kelley Dempsey, Victoria Yan Pillitteri
Report Number: NIST SP 800-12r1
doi:10.6028/NIST.SP.800-12r1
Download PDF | Download Citation

Title: Digital identity guidelines: revision 3 


Date Published: June 2017
Authors: Paul A Grassi, Michael E Garcia, James L Fenton
Report Number: NIST SP 800-63-3
doi:10.6028/NIST.SP.800-63-3
Download PDF | Download Citation

Title: Digital identity guidelines: enrollment and identity proofing 


Date Published: June 2017
Authors: Paul A Grassi, James L Fenton, Naomi B Lefkovitz, Jamie M Danker, Yee-Yin Choong, Kristen K Greene, Mary F Theofanos
Report Number: NIST SP 800-63a
doi:10.6028/NIST.SP.800-63a
Download PDF | Download Citation

Title: Digital identity guidelines: authentication and lifecycle management 


Date Published: June 2017
Authors: Paul A Grassi, James L Fenton, Elaine M Newton, Ray A Perlner, Andrew R Regenscheid, William E Burr, Justin P Richer, Naomi B Lefkovitz, Jamie
M Danker, Yee-Yin Choong, Kristen K Greene, Mary F Theofanos
Report Number: NIST SP 800-63b
doi:10.6028/NIST.SP.800-63b
Download PDF | Download Citation

Title: Digital identity guidelines: federation and assertions 


Date Published: June 2017
Authors: Paul A Grassi, Justin P Richer, Sarah K Squire, James L Fenton, Ellen M Nadeau, Naomi B Lefkovitz, Jamie M Danker, Yee-Yin Choong, Kristen K Greene, Mary
F Theofanos
Report Number: NIST SP 800-63c

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 18/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-63c
Download PDF | Download Citation

Title: Guide to bluetooth security 


Date Published: May 2017
Authors: John Padgette, John Bahr, Mayank Batra, Marcel Holtmann, Rhonda Smithbey, Lily Chen, Karen Scarfone
Report Number: NIST SP 800-121r2
doi:10.6028/NIST.SP.800-121r2
Download PDF | Download Citation

Title: SHA-3 derived functions: cSHAKE, KMAC, TupleHash and ParallelHash 


Date Published: December 2016
Authors: John Kelsey, Shu-jen Change, Ray Perlner
Report Number: NIST SP 800-185
doi:10.6028/NIST.SP.800-185
Download PDF | Download Citation

Title: Guide for cybersecurity event recovery 


Date Published: December 2016
Authors: Michael Bartock, Jeffrey Cichonski, Murugiah Souppaya, Matthew Smith, Greg Witte, Karen Scarfone
Report Number: NIST SP 800-184
doi:10.6028/NIST.SP.800-184
Download PDF | Download Citation

Title: Protecting controlled unclassified information in nonfederal systems and organizations 


Date Published: December 2016
Authors: Ron Ross, Patrick Viscuso, Gary Guissanie, Kelley Dempsey, Mark Riddle
Report Number: NIST SP 800-171r1
doi:10.6028/NIST.SP.800-171r1
Download PDF | Download Citation

Title: Guide to securing Apple OS X 10.10 systems for IT professionals: a NIST security configuration checklist 
Date Published: December 2016
Authors: Lee Badger, Murugiah Souppaya, Mark Trapnell, Eric Trapnell, Dylan Yaga, Karen Scarfone
Report Number: NIST SP 800-179
doi:10.6028/NIST.SP.800-179
Download PDF | Download Citation

Title: Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems 
Date Published: November 2016
Authors: Ron Ross, Michael McEvilley, Janet Carrier Oren
Report Number: NIST SP 800-160
doi:10.6028/NIST.SP.800-160
Download PDF | Download Citation

Title: Recommendation for block cipher modes of operation : the CMAC mode for authentication
Date Published: 2005
Authors: M J Dworkin
Report Number: NIST SP 800-38b-2005

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 19/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-38b-2005
Download PDF | Download Citation

Title: Guide to Cyber Threat Information Sharing 


Date Published: October 2016
Authors: Christopher S. Johnson, Mark Lee Badger, David A. Waltermire, Julie Snyder, Clem Skorupka
Report Number: NIST SP 800-150
doi:10.6028/NIST.SP.800-150
Download PDF | Download Citation

Title: A Comparison of Attribute Based Access Control (ABAC) Standards for Data Service Applications 
Date Published: October 2016
Authors: David F. Ferraiolo, Ramaswamy Chandramouli, Vincent C. Hu, D. Richard R. Kuhn
Report Number: NIST SP 800-178
doi:10.6028/NIST.SP.800-178
Download PDF | Download Citation

Title: Trustworthy Email 
Date Published: September 2016
Authors: Scott W. Rose, Stephen J. Nightingale, Simson L. Garfinkel, Ramaswamy Chandramouli
Report Number: NIST SP 800-177
doi:10.6028/NIST.SP.800-177
Download PDF | Download Citation

Title: Guideline for Using Cryptographic Standards in the Federal Government: Directives, Mandates and Policies 
Date Published: August 2016
Authors: Elaine B. Barker, William C. Barker
Report Number: NIST SP 800-175A
doi:10.6028/NIST.SP.800-175A
Download PDF | Download Citation

Title: Guideline for Using Cryptographic Standards in the Federal Government: Cryptographic Mechanisms 
Date Published: August 2016
Authors: Elaine B. Barker
Report Number: NIST SP 800-175B
doi:10.6028/NIST.SP.800-175B
Download PDF | Download Citation

Title: Computer Security Division 2015 Annual Report 


Date Published: August 2016
Authors: Patrick D O'Reilly, Greg A Witte, Larry Feldman
Report Number: NIST SP 800-182
doi:10.6028/NIST.SP.800-182
Download PDF | Download Citation

Title: User's Guide to Telework and Bring Your Own Device (BYOD) Security 
Date Published: July 2016
Authors: Murugiah P Souppaya, Karen A Scarfone
Report Number: NIST SP 800-114r1

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 20/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-114r1
Download PDF | Download Citation

Title: Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security 
Date Published: July 2016
Authors: Murugiah P Souppaya, Karen A Scarfone
Report Number: NIST SP 800-46r2
doi:10.6028/NIST.SP.800-46r2
Download PDF | Download Citation

Title: Networks of 'things' 
Date Published: 2016
Authors: Jeffrey M Voas
Report Number: NIST SP 800-183
doi:10.6028/NIST.SP.800-183
Download PDF | Download Citation

Title: Derived PIV Application and Data Model Test Guidelines 


Date Published: June 2016
Authors: David Cooper, Hildegard Ferraiolo, Ramaswamy Chandramouli, Nabil Ghadiali, Jason Mohler, Steven Brady
Report Number: NIST SP 800-166
doi:10.6028/NIST.SP.800-166
Download PDF | Download Citation

Title: Representation of PIV Chain-of-Trust for Import and Export 


Date Published: May 2016
Authors: Hildegard Ferraiolo, Ramaswamy Chandramouli, Ketan Mehta, Jason Mohler, Stephen Skordinski, Steven Brady
Report Number: NIST SP 800-156
doi:10.6028/NIST.SP.800-156
Download PDF | Download Citation

Title: PIV Card Application and Middleware Interface Test Guidelines (SP 800-73-4 compliance) 
Date Published: April 2016
Authors: David A. Cooper, Hildegard Ferraiolo, Ramaswamy Chandramouli, Jason Mohler
Report Number: NIST SP 800-85A-4
doi:10.6028/NIST.SP.800-85A-4
Download PDF | Download Citation

Title: Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption 
Date Published: March 2016
Authors: Morris Dworkin
Report Number: NIST SP 800-38G
doi:10.6028/NIST.SP.800-38G
Download PDF | Download Citation

Title: Secure Virtual Network Configuration for Virtual Machine (VM) Protection 


Date Published: March 2016
Authors: Ramaswamy Chandramouli
Report Number: NIST SP 800-125B

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 21/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-125B
Download PDF | Download Citation

Title: Recommendation for Key Management Part 1: General 


Date Published: January 2016
Authors: Elaine Barker
Report Number: NIST SP 800-57pt1r4
doi:10.6028/NIST.SP.800-57pt1r4
Download PDF | Download Citation

Title: National Checklist Program for IT Products – Guidelines for Checklist Users and Developers 
Date Published: December 2015
Authors: Stephen D. Quinn, Murugiah Souppaya, Melanie Cook, Karen A. Scarfone
Report Number: NIST SP 800-70r3
doi:10.6028/NIST.SP.800-70r3
Download PDF | Download Citation

Title: Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths 
Date Published: November 2015
Authors: Elaine B. Barker, Allen L. Roginsky
Report Number: NIST SP 800-131Ar1
doi:10.6028/NIST.SP.800-131Ar1
Download PDF | Download Citation

Title: The technical specification for the Security Content Automation Protocol (SCAP) : SCAP version 1.0
Date Published: 2009
Authors: S D Quinn, D A Waltermire, C S Johnson, K A Scarfone, J F Banghart
Report Number: NIST SP 800-126
doi:10.6028/NIST.SP.800-126
Download PDF | Download Citation

Title: The technical specification for the Security Content Automation Protocol (SCAP) : SCAP version 1.1
Date Published: 2011
Authors: D A Waltermire, S D Quinn, K A Scarfone
Report Number: NIST SP 800-126r1
doi:10.6028/NIST.SP.800-126r1
Download PDF | Download Citation

Title: The technical specification for the Security Content Automation Protocol (SCAP) : SCAP version 1.2
Date Published: 2011
Authors: D A Waltermire, S D Quinn, K A Scarfone, A M Halbardier
Report Number: NIST SP 800-126r2
doi:10.6028/NIST.SP.800-126r2
Download PDF | Download Citation

Title: Guide to securing WiMAX wireless communications 


Date Published: 2010
Authors: K A Scarfone, C Tibbs, M Sexton
Report Number: NIST SP 800-127

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 22/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-127
Download PDF | Download Citation

Title: Guide for security-focused configuration management of information systems 


Date Published: October 2019
Authors: Arnold Johnson, Kelley Dempsey, Ron Ross, Sarbari Gupta, Dennis Bailey
Report Number: NIST SP 800-128
doi:10.6028/NIST.SP.800-128
Download PDF | Download Citation

Title: Transitions : recommendation for transitioning the use of cryptographic algorithms and key lengths
Date Published: 2011
Authors: E B Barker, A L Roginsky
Report Number: NIST SP 800-131a
doi:10.6028/NIST.SP.800-131a
Download PDF | Download Citation

Title: Recommendation for password-based key derivation : part 1: storage applications


Date Published: 2010
Authors: M S Turan, E B Barker, W E Burr, L Chen
Report Number: NIST SP 800-132
doi:10.6028/NIST.SP.800-132
Download PDF | Download Citation

Title: Recommendation for existing application-specific key derivation functions 


Date Published: 2010
Authors: Q H Dang
Report Number: NIST SP 800-135
doi:10.6028/NIST.SP.800-135
Download PDF | Download Citation

Title: Recommendation for existing application-specific key derivation functions 


Date Published: 2011
Authors: Q H Dang
Report Number: NIST SP 800-135r1
doi:10.6028/NIST.SP.800-135r1
Download PDF | Download Citation

Title: Information Security Continuous Monitoring (ISCM) for federal information systems and organizations 
Date Published: 2011
Authors: K L Dempsey, N S Chawla, L A Johnson, R Johnston, A C Jones, A D Orebaugh, M A Scholl, K M Stine
Report Number: NIST SP 800-137
doi:10.6028/NIST.SP.800-137
Download PDF | Download Citation

Title: Practical combinatorial testing 


Date Published: 2010
Authors: D R Kuhn, R N Kacker, Y Lei
Report Number: NIST SP 800-142

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 23/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-142
Download PDF | Download Citation

Title: Guidelines on security and privacy in public cloud computing 


Date Published: 2011
Authors: W Jansen, T Grance
Report Number: NIST SP 800-144
doi:10.6028/NIST.SP.800-144
Download PDF | Download Citation

Title: The NIST definition of cloud computing 


Date Published: 2011
Authors: P M Mell, T Grance
Report Number: NIST SP 800-145
doi:10.6028/NIST.SP.800-145
Download PDF | Download Citation

Title: Cloud computing synopsis and recommendations 


Date Published: 2012
Authors: M L Badger, T Grance, R Patt-Corner, J Voas
Report Number: NIST SP 800-146
doi:10.6028/NIST.SP.800-146
Download PDF | Download Citation

Title: BIOS protection guidelines 


Date Published: 2011
Authors: D A Cooper, W T Polk, A R Regenscheid, M P Souppaya
Report Number: NIST SP 800-147
doi:10.6028/NIST.SP.800-147
Download PDF | Download Citation

Title: Guidelines for securing Wireless Local Area Networks (WLANs) 


Date Published: 2012
Authors: M P Souppaya, K A Scarfone
Report Number: NIST SP 800-153
doi:10.6028/NIST.SP.800-153
Download PDF | Download Citation

Title: Guide for developing security plans for federal information systems 


Date Published: 2006
Authors: M Swanson, J Hash, P Bowen
Report Number: NIST SP 800-18r1
doi:10.6028/NIST.SP.800-18r1
Download PDF | Download Citation

Title: Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS) : requirements and procedures
Date Published: 2012
Authors: S S Keller
Report Number: NIST SP 800-20

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 24/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-20
Download PDF | Download Citation

Title: Guideline for implementing cryptography in the federal government 


Date Published: 2005 Home View All Reports Filter by Series Raw Data Back to Top
Authors: E B Barker, W C Barker, A Lee
Report Number: NIST SP 800-21e2
doi:10.6028/NIST.SP.800-21e2
Download PDF | Download Citation

Title: A statistical test suite for random and pseudorandom number generators for cryptographic applications 
Date Published: 2010
Authors: L E Bassham, A L Rukhin, J Soto, J R Nechvatal, M E Smid, E B Barker, S D Leigh, M Levenson, M Vangel, D L Banks, N A Heckert, J F Dray, S Vo
Report Number: NIST SP 800-22r1a
doi:10.6028/NIST.SP.800-22r1a
Download PDF | Download Citation

Title: Engineering principles for information technology security (a baseline for achieving security), revision a 
Date Published: 2004
Authors: G Stoneburner, C Hayden, A Feringa
Report Number: NIST SP 800-27ra
doi:10.6028/NIST.SP.800-27ra
Download PDF | Download Citation

Title: Guidelines on active content and mobile code 


Date Published: 2001
Authors: W Jansen
Report Number: NIST SP 800-28
doi:10.6028/NIST.SP.800-28
Download PDF | Download Citation

Title: Guidelines on active content and mobile code 


Date Published: 2008
Authors: W Jansen, T Winograd, K A Scarfone
Report Number: NIST SP 800-28ver2
doi:10.6028/NIST.SP.800-28ver2
Download PDF | Download Citation

Title: Guide for conducting risk assessments 


Date Published: 2012
Authors: 
Report Number: NIST SP 800-30r1
doi:10.6028/NIST.SP.800-30r1
Download PDF | Download Citation

Title: Introduction to public key technology and the federal PKI infrastructure 


Date Published: 2001
Authors: D R Kuhn, V Hu, W T Polk, Shu-Jen H Chang
Report Number: NIST SP 800-32

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 25/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-32
Download PDF | Download Citation

Title: Contingency planning guide for federal information systems 


Date Published: 2010
Authors: M Swanson, P Bowen, A W Phillips, D Gallup, D Lynes
Report Number: NIST SP 800-34r1
doi:10.6028/NIST.SP.800-34r1
Download PDF | Download Citation

Title: Guide to information technology security services 


Date Published: 2003
Authors: T Grance, J Hash, M Stevens, K O'Neal, N Bartol
Report Number: NIST SP 800-35
doi:10.6028/NIST.SP.800-35
Download PDF | Download Citation

Title: Guide to selecting information technology security products 


Date Published: 2003
Authors: T Grance, M Stevens, M Myers
Report Number: NIST SP 800-36
doi:10.6028/NIST.SP.800-36
Download PDF | Download Citation

Title: Guide for the security certification and accreditation of federal information systems 
Date Published: 2004
Authors: R Ross, M Swanson, G Stoneburner, S Katzke, L A Johnson
Report Number: NIST SP 800-37
doi:10.6028/NIST.SP.800-37
Download PDF | Download Citation

Title: Recommendation for block cipher modes of operation : methods and techniques


Date Published: 2001
Authors: M J Dworkin
Report Number: NIST SP 800-38a
doi:10.6028/NIST.SP.800-38a
Download PDF | Download Citation

Title: Recommendation for block cipher modes of operation : three variants of ciphertext stealing for CBC mode
Date Published: 2010
Authors: M J Dworkin
Report Number: NIST SP 800-38a-add
doi:10.6028/NIST.SP.800-38a-add
Download PDF | Download Citation

Title: Recommendation for block cipher modes of operation : the CMAC mode for authentication
Date Published: 2016
Authors: M J Dworkin
Report Number: NIST SP 800-38b

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 26/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-38b
Download PDF | Download Citation

Title: Recommendation for block cipher modes of operation : the CCM mode for authentication and confidentiality
Date Published: 2007
Authors: M J Dworkin
Report Number: NIST SP 800-38c
doi:10.6028/NIST.SP.800-38c
Download PDF | Download Citation

Title: Recommendation for block cipher modes of operation : GaloisCounter Mode (GCM) and GMAC
Date Published: 2007
Authors: M J Dworkin
Report Number: NIST SP 800-38d
doi:10.6028/NIST.SP.800-38d
Download PDF | Download Citation

Title: Recommendation for block cipher modes of operation : the XTS-AES mode for confidentiality on storage devices
Date Published: 2010
Authors: M J Dworkin
Report Number: NIST SP 800-38e
doi:10.6028/NIST.SP.800-38e
Download PDF | Download Citation

Title: Managing information security risk : organization, mission, and information system view
Date Published: 2011
Authors: 
Report Number: NIST SP 800-39
doi:10.6028/NIST.SP.800-39
Download PDF | Download Citation

Title: Procedures for handling security patches 


Date Published: 2002
Authors: P M Mell, M C Tracy
Report Number: NIST SP 800-40
doi:10.6028/NIST.SP.800-40
Download PDF | Download Citation

Title: Creating a patch and vulnerability management program 


Date Published: 2005
Authors: P M Mell, T Bergeron, D Henning
Report Number: NIST SP 800-40ver2
doi:10.6028/NIST.SP.800-40ver2
Download PDF | Download Citation

Title: Guidelines on firewalls and firewall policy 


Date Published: 2009
Authors: K A Scarfone, P Hoffman
Report Number: NIST SP 800-41r1

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 27/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-41r1
Download PDF | Download Citation

Title: Guideline on network security testing 


Date Published: 2003
Authors: J P Wack, M C Tracy, M P Souppaya
Report Number: NIST SP 800-42
doi:10.6028/NIST.SP.800-42
Download PDF | Download Citation

Title: Systems administration guidance for securing Windows 2000 Professional system 


Date Published: 2002
Authors: M P Souppaya, A B Harris, M McLarnon, N Selimis
Report Number: NIST SP 800-43
doi:10.6028/NIST.SP.800-43
Download PDF | Download Citation

Title: Guidelines on securing public web servers 


Date Published: 2002
Authors: M C Tracy, W Jansen, M McLarnon
Report Number: NIST SP 800-44
doi:10.6028/NIST.SP.800-44
Download PDF | Download Citation

Title: Volume I : guide for mapping types of information and information systems to security categories
Date Published: 2008
Authors: Kevin Stine, Rich Kissel, William C Barker, Jim Fahlsing, Jessica Gulick
Report Number: NIST SP 800-60v1r1
doi:10.6028/NIST.SP.800-60v1r1
Download PDF | Download Citation

Title: Volume II : appendices to guide for mapping types of information and information systems to security categories
Date Published: 2008
Authors: Kevin Stine, Rich Kissel, William C Barker, Annabelle Lee, Jim Fahlsing
Report Number: NIST SP 800-60v2r1
doi:10.6028/NIST.SP.800-60v2r1
Download PDF | Download Citation

Title: Recommendation for the triple data encryption algorithm (TDEA) block cipher 
Date Published: 2004
Authors: W C Barker
Report Number: NIST SP 800-67ver1
doi:10.6028/NIST.SP.800-67ver1
Download PDF | Download Citation

Title: Interfaces for personal identity verification : end-point PIV card application namespace, data model and representation
Date Published: 2010
Authors: R Chandramouli, D A Cooper, J F Dray, H Ferraiolo, S B Guthery, W I MacGregor, K Mehta
Report Number: NIST SP 800-73-3

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 28/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-73-3
Download PDF | Download Citation

Title: Recommendation for random number generation using deterministic random bit generators (revised) 
Date Published: 2007
Authors: E B Barker, J M Kelsey
Report Number: NIST SP 800-90r
doi:10.6028/NIST.SP.800-90r
Download PDF | Download Citation

Title: Guide to Application Whitelisting 


Date Published: October 2015
Authors: Adam Sedgewick, Murugiah P. Souppaya, Karen A. Scarfone
Report Number: NIST SP 800-167
doi:10.6028/NIST.SP.800-167
Download PDF | Download Citation

Title: A Profile for U. S. Federal Cryptographic Key Management Systems 


Date Published: October 2015
Authors: Elaine B. Barker, Miles Smid, Dennis Branstad
Report Number: NIST SP 800-152
doi:10.6028/NIST.SP.800-152
Download PDF | Download Citation

Title: Computer Security Division 2014 Annual Report 


Date Published: April 2015
Authors: Patrick D. O'Reilly, Gregory A. Witte, Larry Feldman
Report Number: NIST SP 800-176
doi:10.6028/NIST.SP.800-176
Download PDF | Download Citation

Title: Guidelines for the Authorization of Personal Identity Verification Card Issuers (PCI) and Derived PIV Credential Issuers (DPCI) 
Date Published: July 2015
Authors: Hildegard Ferraiolo, Ramaswamy Chandramouli, Nabil Ghadiali, Jason Mohler, Scott Shorter
Report Number: NIST SP 800-79-2
doi:10.6028/NIST.SP.800-79-2
Download PDF | Download Citation

Title: Recommendation for Random Number Generation Using Deterministic Random Bit Generators 
Date Published: June 2015
Authors: Elaine B. Barker, John M. Kelsey
Report Number: NIST SP 800-90Ar1
doi:10.6028/NIST.SP.800-90Ar1
Download PDF | Download Citation

Title: Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations 


Date Published: June 2015
Authors: Ronald S. Ross, Kelley L. Dempsey, Patrick Viscuso, Mark Riddle, Gary Guissanie
Report Number: NIST SP 800-171

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 29/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-171
Download PDF | Download Citation

Title: Bibliography of selected computer security publications : January 1980-October 1989


Date Published: 1990
Authors: Lawrence E, III Bassham
Report Number: NIST SP 800-1
doi:10.6028/NIST.SP.800-1
Download PDF | Download Citation

Title: Keeping your site comfortably secure : an introduction to Internet firewalls


Date Published: 1994
Authors: John P Wack, Lisa J Carnahan
Report Number: NIST SP 800-10
doi:10.6028/NIST.SP.800-10
Download PDF | Download Citation

Title: Information security handbook : a guide for managers


Date Published: 2006
Authors: P Bowen, J Hash, M Wilson
Report Number: NIST SP 800-100
doi:10.6028/NIST.SP.800-100
Download PDF | Download Citation

Title: Guidelines on cell phone forensics 


Date Published: 2007
Authors: W Jansen, R P Ayers
Report Number: NIST SP 800-101
doi:10.6028/NIST.SP.800-101
Download PDF | Download Citation

Title: Recommendation for digital signature timeliness 


Date Published: 2009
Authors: E B Barker
Report Number: NIST SP 800-102
doi:10.6028/NIST.SP.800-102
Download PDF | Download Citation

Title: A scheme for PIV visual card topography 


Date Published: 2007
Authors: W I MacGregor, T Schwarzhoff, K Mehta
Report Number: NIST SP 800-104
doi:10.6028/NIST.SP.800-104
Download PDF | Download Citation

Title: Randomized hashing for digital signatures 


Date Published: 2009
Authors: Q H Dang
Report Number: NIST SP 800-106

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 30/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-106
Download PDF | Download Citation

Title: Recommendation for applications using approved hash algorithms 


Date Published: 2009
Authors: Q H Dang
Report Number: NIST SP 800-107
doi:10.6028/NIST.SP.800-107
Download PDF | Download Citation

Title: Recommendation for applications using approved hash algorithms 


Date Published: 2012
Authors: Q H Dang
Report Number: NIST SP 800-107r1
doi:10.6028/NIST.SP.800-107r1
Download PDF | Download Citation

Title: The impact of the FCC's Open Network Architecture on NSNP telecommunications security 
Date Published: 1995
Authors: Karen Olsen, John Tebbutt
Report Number: NIST SP 800-11
doi:10.6028/NIST.SP.800-11
Download PDF | Download Citation

Title: Guide to storage encryption technologies for end user devices 


Date Published: 2007
Authors: K A Scarfone, M P Souppaya, M Sexton
Report Number: NIST SP 800-111
doi:10.6028/NIST.SP.800-111
Download PDF | Download Citation

Title: Guide to SSL VPNs 


Date Published: 2008
Authors: S E Frankel, P Hoffman, A D Orebaugh, R Park
Report Number: NIST SP 800-113
doi:10.6028/NIST.SP.800-113
Download PDF | Download Citation

Title: User's guide to securing external devices for telework and remote access 
Date Published: 2007
Authors: K A Scarfone, M P Souppaya
Report Number: NIST SP 800-114
doi:10.6028/NIST.SP.800-114
Download PDF | Download Citation

Title: Technical guide to information security testing and assessment. 


Date Published: 2008
Authors: K A Scarfone, M P Souppaya, A Cody, A D Orebaugh
Report Number: NIST SP 800-115

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 31/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-115
Download PDF | Download Citation

Title: A recommendation for the use of PIV credentials in Physical Access Control Systems (PACS) 
Date Published: 2008
Authors: W I MacGregor, K Mehta, D A Cooper, K A Scarfone
Report Number: NIST SP 800-116
doi:10.6028/NIST.SP.800-116
Download PDF | Download Citation

Title: Guide to adopting and using the Security Content Automation Protocol (SCAP) version 1.0 
Date Published: 2010
Authors: S D Quinn, K A Scarfone, M Barrett, C S Johnson
Report Number: NIST SP 800-117
doi:10.6028/NIST.SP.800-117
Download PDF | Download Citation

Title: Guidelines for the secure deployment of IPv6 


Date Published: 2010
Authors: S E Frankel, R Graveman, J Pearce, M Rooks
Report Number: NIST SP 800-119
doi:10.6028/NIST.SP.800-119
Download PDF | Download Citation

Title: An introduction to computer security : the NIST handbook


Date Published: 1995
Authors: Barbara Guttman, Edward Roback
Report Number: NIST SP 800-12
doi:10.6028/NIST.SP.800-12
Download PDF | Download Citation

Title: Recommendation for EAP methods used in wireless network access authentication 


Date Published: 2009
Authors: K Hoeper, L Chen
Report Number: NIST SP 800-120
doi:10.6028/NIST.SP.800-120
Download PDF | Download Citation

Title: Guide to bluetooth security 


Date Published: 2008
Authors: K A Scarfone, J Padgette
Report Number: NIST SP 800-121
doi:10.6028/NIST.SP.800-121
Download PDF | Download Citation

Title: Guide to bluetooth security 


Date Published: 2012
Authors: J Padgette, K A Scarfone, L Chen
Report Number: NIST SP 800-121r1

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 32/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-121r1
Download PDF | Download Citation

Title: Guide to protecting the confidentiality of Personally Identifiable Information (PII) 


Date Published: 2010
Authors: E McCallister, T Grance, K A Scarfone
Report Number: NIST SP 800-122
doi:10.6028/NIST.SP.800-122
Download PDF | Download Citation

Title: Guide to general server security 


Date Published: 2008
Authors: K A Scarfone, W Jansen, M Tracy
Report Number: NIST SP 800-123
doi:10.6028/NIST.SP.800-123
Download PDF | Download Citation

Title: Guide to security for full virtualization technologies 


Date Published: 2011
Authors: K A Scarfone, M P Souppaya, P Hoffman
Report Number: NIST SP 800-125
doi:10.6028/NIST.SP.800-125
Download PDF | Download Citation

Title: Telecommunications security guidelines for telecommunications management network 


Date Published: 1995
Authors: John Kimmins, Charles Dinkel, Dale Walters
Report Number: NIST SP 800-13
doi:10.6028/NIST.SP.800-13
Download PDF | Download Citation

Title: Generally accepted principles and practices for securing information technology systems 
Date Published: 1996
Authors: Marianne Swanson, Barbara Guttman
Report Number: NIST SP 800-14
doi:10.6028/NIST.SP.800-14
Download PDF | Download Citation

Title: Minimum interoperability specification for PKI components (MISPC) 


Date Published: 1998
Authors: William Burr, Donna Dodson, Noel Nazario, Timothy Polk
Report Number: NIST SP 800-15
doi:10.6028/NIST.SP.800-15
Download PDF | Download Citation

Title: Information technology security training requirements : a role- and performance-based model
Date Published: 1998
Authors: Mark Wilson, Dorothea E de Zafra, Sadie I Pitcher, John D Tressler, John B Ippolito
Report Number: NIST SP 800-16

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 33/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-16
Download PDF | Download Citation

Title: Modes of Operation Validation System (MOVS) : requirements and procedures


Date Published: 1998
Authors: Sharon Keller, Miles Smid
Report Number: NIST SP 800-17
doi:10.6028/NIST.SP.800-17
Download PDF | Download Citation

Title: Guide for developing security plans for information technology systems 


Date Published: 1998
Authors: Marianne Swanson
Report Number: NIST SP 800-18
doi:10.6028/NIST.SP.800-18
Download PDF | Download Citation

Title: Mobile agent security 


Date Published: 1999
Authors: Wayne Jansen, Tom Karygiannis
Report Number: NIST SP 800-19
doi:10.6028/NIST.SP.800-19
Download PDF | Download Citation

Title: Public-key cryptography 
Date Published: 1991
Authors: James Nechvatal
Report Number: NIST SP 800-2
doi:10.6028/NIST.SP.800-2
Download PDF | Download Citation

Title: Guideline for implementing cryptography in the federal government 


Date Published: 1999
Authors: Annabelle Lee
Report Number: NIST SP 800-21
doi:10.6028/NIST.SP.800-21
Download PDF | Download Citation

Title: A statistical test suite for random and pseudorandom number generators for cryptographic applications 
Date Published: 2000
Authors: Andrew Rukhin, Juan Sota, James Nechvatal, Miles Smid, Elaine Barker, Stefan Leigh, Mark Levenson, Mark Vangel, David Banks, Alan Heckert, James Dray, San Vo
Report Number: NIST SP 800-22
doi:10.6028/NIST.SP.800-22
Download PDF | Download Citation

Title: Guidelines to federal organizations on security assurance and acquisitionuse of testedevaluated products 


Date Published: 2000
Authors: Edward A Roback
Report Number: NIST SP 800-23

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 34/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-23
Download PDF | Download Citation

Title: PBX vulnerability analysis : finding holes in your PBX before someone else does
Date Published: 2001
Authors: D Richard Kuhn
Report Number: NIST SP 800-24
doi:10.6028/NIST.SP.800-24
Download PDF | Download Citation

Title: Federal agency use of public key technology for digital signatures and authentication 
Date Published: 2000
Authors: Kathy Lyons-Burke
Report Number: NIST SP 800-25
doi:10.6028/NIST.SP.800-25
Download PDF | Download Citation

Title: Security self-assessment guide for information technology systems 


Date Published: 2001
Authors: Marianne Swanson
Report Number: NIST SP 800-26
doi:10.6028/NIST.SP.800-26
Download PDF | Download Citation

Title: Engineering principles for information technology security (a baseline for achieving security) : recommendations of the National Institute of Standards and Technology
Date Published: 2001
Authors: Gary Stoneburner, Clark Hayden, Alexis Feringa
Report Number: NIST SP 800-27
doi:10.6028/NIST.SP.800-27
Download PDF | Download Citation

Title: A comparison of the security requirements for cryptographic modules in FIPS 140-1 and FIPS 140-2 
Date Published: 2001
Authors: Ray Snouffer, Annabelle Lee, Arch Oldehoeft
Report Number: NIST SP 800-29
doi:10.6028/NIST.SP.800-29
Download PDF | Download Citation

Title: Establishing a computer security incident response capability (CSIRC) 


Date Published: 1991
Authors: John P Wack
Report Number: NIST SP 800-3
doi:10.6028/NIST.SP.800-3
Download PDF | Download Citation

Title: Risk management guide for information technology systems : recommendations of the National Institute of Standards and Technology
Date Published: 2002
Authors: Gary Stoneburner, Alice Goguen, Alexis Feringa
Report Number: NIST SP 800-30

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 35/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-30
Download PDF | Download Citation

Title: Intrusion detection systems 


Date Published: 2001
Authors: Rebecca Bace, Peter Mell
Report Number: NIST SP 800-31
doi:10.6028/NIST.SP.800-31
Download PDF | Download Citation

Title: Underlying technical models for information technology security : recommendations of the National Institute of Standards and Technology
Date Published: 2001
Authors: Gary Stoneburner
Report Number: NIST SP 800-33
doi:10.6028/NIST.SP.800-33
Download PDF | Download Citation

Title: Contingency planning guide for information technology systems : recommendations of the National Institute of Standards and Technology
Date Published: 2002
Authors: Marianne Swanson, Amy Wohl, Lucinda Pope, Tim Grance, Joan Hash, Ray Thomas
Report Number: NIST SP 800-34
doi:10.6028/NIST.SP.800-34
Download PDF | Download Citation

Title: Computer security considerations in federal procurements : a guide for procurement initiators, contracting officers, and computer security officials
Date Published: 1992
Authors: Barbara Guttman
Report Number: NIST SP 800-4
doi:10.6028/NIST.SP.800-4
Download PDF | Download Citation

Title: Guidelines on firewalls and firewall policy : recommendations of the National Institute of Standards and Technology
Date Published: 2002
Authors: John Wack, Ken Cutler, Jamie Pole
Report Number: NIST SP 800-41
doi:10.6028/NIST.SP.800-41
Download PDF | Download Citation

Title: Guidelines on securing public web servers 


Date Published: 2007
Authors: M C Tracy, W Jansen, K A Scarfone, T Winograd
Report Number: NIST SP 800-44ver2
doi:10.6028/NIST.SP.800-44ver2
Download PDF | Download Citation

Title: Guidelines on electronic mail security 


Date Published: 2002
Authors: M C Tracy, W Jansen, S Bisker
Report Number: NIST SP 800-45

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 36/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-45
Download PDF | Download Citation

Title: Guidelines on electronic mail security 


Date Published: 2007
Authors: M C Tracy, W Jansen, K A Scarfone, J Butterfield
Report Number: NIST SP 800-45ver2
doi:10.6028/NIST.SP.800-45ver2
Download PDF | Download Citation

Title: Security for telecommuting and broadband communications : recommendations of the National Institute of Standards and Technology
Date Published: 2002
Authors: D Richard Kuhn, Miles C Tracy, Sheila E Frankel
Report Number: NIST SP 800-46
doi:10.6028/NIST.SP.800-46
Download PDF | Download Citation

Title: Guide to enterprise telework and remote access security 


Date Published: 2009
Authors: K A Scarfone, P Hoffman, M P Souppaya
Report Number: NIST SP 800-46r1
doi:10.6028/NIST.SP.800-46r1
Download PDF | Download Citation

Title: Security guide for interconnecting information technology systems 


Date Published: 2002
Authors: T Grance, J Hash, S Peck, J Smith, K Korow-Diks
Report Number: NIST SP 800-47
doi:10.6028/NIST.SP.800-47
Download PDF | Download Citation

Title: Wireless security : 802.11, bluetooth and handheld devices


Date Published: 2002
Authors: A T Karygiannis, L Owens
Report Number: NIST SP 800-48
doi:10.6028/NIST.SP.800-48
Download PDF | Download Citation

Title: Guide to securing legacy IEEE 802.11 wireless networks 


Date Published: 2008
Authors: K A Scarfone, D Dicoi, M Sexton, C Tibbs
Report Number: NIST SP 800-48r1
doi:10.6028/NIST.SP.800-48r1
Download PDF | Download Citation

Title: Federal SMIME V3 client profile 


Date Published: 2002
Authors: C M Chernick
Report Number: NIST SP 800-49

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 37/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-49
Download PDF | Download Citation

Title: A guide to the selection of anti-virus tools and techniques 


Date Published: 1992
Authors: W Timothy Polk, Lawrence E, III Bassham
Report Number: NIST SP 800-5
doi:10.6028/NIST.SP.800-5
Download PDF | Download Citation

Title: Building an Information Technology Security Awareness and Training Program 


Date Published: 2003
Authors: M Wilson, J Hash
Report Number: NIST SP 800-50
doi:10.6028/NIST.SP.800-50
Download PDF | Download Citation

Title: Use of the Common Vulnerabilities and Exposures (CVE) vulnerability naming scheme 
Date Published: 2002
Authors: P Mell, T Grance
Report Number: NIST SP 800-51
doi:10.6028/NIST.SP.800-51
Download PDF | Download Citation

Title: Guide to using vulnerability naming schemes 


Date Published: 2011
Authors: D A Waltermire, K A Scarfone
Report Number: NIST SP 800-51r1
doi:10.6028/NIST.SP.800-51r1
Download PDF | Download Citation

Title: Guidelines for the selection, configuration, and use of Transport Layer Security (TLS) implementations 
Date Published: 2005
Authors: C M Chernick, C, III Edington, M J Fanto, R Rosenthal
Report Number: NIST SP 800-52
doi:10.6028/NIST.SP.800-52
Download PDF | Download Citation

Title: Recommended security controls for federal information systems and organizations 


Date Published: 2005
Authors: R Ross, S Katzke, L A Johnson, M Swanson, G Stoneburner, G Rogers, A Lee
Report Number: NIST SP 800-53
doi:10.6028/NIST.SP.800-53
Download PDF | Download Citation

Title: Guide for assessing the security controls in federal information systems and organizations : building effective security assessment plans
Date Published: 2008
Authors: R Ross, L A Johnson, S Katzke, P Toth, G Stoneburner, G Rogers
Report Number: NIST SP 800-53a

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 38/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-53a
Download PDF | Download Citation

Title: Guide for assessing the security controls in federal information systems and organizations : building effective security assessment plans
Date Published: 2010
Authors: 
Report Number: NIST SP 800-53ar1
doi:10.6028/NIST.SP.800-53ar1
Download PDF | Download Citation

Title: Recommended security controls for federal information systems and organizations 


Date Published: 2006
Authors: R Ross, S Katzke, L A Johnson, M Swanson, G Stoneburner, G Rogers
Report Number: NIST SP 800-53r1
doi:10.6028/NIST.SP.800-53r1
Download PDF | Download Citation

Title: Recommended security controls for federal information systems and organizations 


Date Published: 2007
Authors: R Ross, S Katzke, L A Johnson, M Swanson, G Stoneburner, G Rogers
Report Number: NIST SP 800-53r2
doi:10.6028/NIST.SP.800-53r2
Download PDF | Download Citation

Title: Recommended security controls for federal information systems and organizations 


Date Published: 2009
Authors: 
Report Number: NIST SP 800-53r3
doi:10.6028/NIST.SP.800-53r3
Download PDF | Download Citation

Title: Border gateway protocol security 


Date Published: 2007
Authors: D R Kuhn, K Sriram, D C Montgomery
Report Number: NIST SP 800-54
doi:10.6028/NIST.SP.800-54
Download PDF | Download Citation

Title: Security metrics guide for information technology systems 


Date Published: 2003
Authors: M Swanson, N Bartol, J Sabato, J Hash, L Graffo
Report Number: NIST SP 800-55
doi:10.6028/NIST.SP.800-55
Download PDF | Download Citation

Title: Performance measurement guide for information security 


Date Published: 2008
Authors: E Chew, M Swanson, K M Stine, N Bartol, A Brown, W Robinson
Report Number: NIST SP 800-55r1

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 39/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-55r1
Download PDF | Download Citation

Title: Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography 
Date Published: 2006
Authors: 
Report Number: NIST SP 800-56a
doi:10.6028/NIST.SP.800-56a
Download PDF | Download Citation

Title: Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography 
Date Published: 2007
Authors: E B Barker, D Johnson, M E Smid
Report Number: NIST SP 800-56ar
doi:10.6028/NIST.SP.800-56ar
Download PDF | Download Citation

Title: Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography 
Date Published: 2009
Authors: E B Barker, L Chen, A R Regenscheid, M E Smid
Report Number: NIST SP 800-56b
doi:10.6028/NIST.SP.800-56b
Download PDF | Download Citation

Title: Recommendation for key derivation through extraction-then-expansion 


Date Published: 2011
Authors: L Chen
Report Number: NIST SP 800-56c
doi:10.6028/NIST.SP.800-56c
Download PDF | Download Citation

Title: Recommendation for key management, part 1 : general


Date Published: 2005
Authors: E B Barker, W C Barker, W E Burr, W T Polk, M E Smid
Report Number: NIST SP 800-57p1
doi:10.6028/NIST.SP.800-57p1
Download PDF | Download Citation

Title: Recommendation for key management, part 1 : general (revised)


Date Published: 2006
Authors: E B Barker, W C Barker, W E Burr, W T Polk, M E Smid
Report Number: NIST SP 800-57p1r2006
doi:10.6028/NIST.SP.800-57p1r2006
Download PDF | Download Citation

Title: Recommendation for key management, part 1 : general (revised)


Date Published: 2007
Authors: E B Barker, W C Barker, W E Burr, W T Polk, M E Smid
Report Number: NIST SP 800-57p1r2007

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 40/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-57p1r2007
Download PDF | Download Citation

Title: Recommendation for key management, part 1 : general (revision 3)


Date Published: 2012
Authors: E B Barker, W C Barker, W E Burr, W T Polk, M E Smid
Report Number: NIST SP 800-57p1r3
doi:10.6028/NIST.SP.800-57p1r3
Download PDF | Download Citation

Title: Recommendation for key management, part 2 : best practices for key management organization
Date Published: 2005
Authors: E B Barker, W C Barker, W E Burr, W T Polk, M E Smid
Report Number: NIST SP 800-57p2
doi:10.6028/NIST.SP.800-57p2
Download PDF | Download Citation

Title: Recommendation for key management, part 3 : application-specific key management guidance


Date Published: 2009
Authors: E B Barker, W E Burr, A C Jones, W T Polk, S W Rose, M E Smid, Q H Dang
Report Number: NIST SP 800-57p3
doi:10.6028/NIST.SP.800-57p3
Download PDF | Download Citation

Title: Security considerations for Voice Over IP Systems 


Date Published: 2005
Authors: D R Kuhn, T J Walsh, S Fries
Report Number: NIST SP 800-58
doi:10.6028/NIST.SP.800-58
Download PDF | Download Citation

Title: Guideline for identifying an information system as a national security system 


Date Published: 2003
Authors: W C Barker
Report Number: NIST SP 800-59
doi:10.6028/NIST.SP.800-59
Download PDF | Download Citation

Title: Automated tools for testing computer system vulnerability 


Date Published: 1992
Authors: W Timothy Polk
Report Number: NIST SP 800-6
doi:10.6028/NIST.SP.800-6
Download PDF | Download Citation

Title: Volume I : guide for mapping types of information and information systems to security categories
Date Published: 2004
Authors: William C Barker
Report Number: NIST SP 800-60ver2v1

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 41/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-60ver2v1
Download PDF | Download Citation

Title: Volume II : appendices to guide for mapping types of information and information systems to security categories
Date Published: 2004
Authors: William C Barker, Annabelle Lee
Report Number: NIST SP 800-60ver2v2
doi:10.6028/NIST.SP.800-60ver2v2
Download PDF | Download Citation

Title: Computer security incident handling guide 


Date Published: 2004
Authors: T Grance, K A Kent, B Kim
Report Number: NIST SP 800-61
doi:10.6028/NIST.SP.800-61
Download PDF | Download Citation

Title: Computer security incident handling guide 


Date Published: 2008
Authors: K A Scarfone, T Grance, K Masone
Report Number: NIST SP 800-61r1
doi:10.6028/NIST.SP.800-61r1
Download PDF | Download Citation

Title: Electronic authentication guideline 


Date Published: 2011
Authors: W E Burr, D F Dodson, E M Newton, R A Perlner, W T Polk, S Gupta, E A Nabbus
Report Number: NIST SP 800-63-1
doi:10.6028/NIST.SP.800-63-1
Download PDF | Download Citation

Title: Electronic authentication guideline 


Date Published: 2004
Authors: W E Burr, D F Dodson, W T Polk
Report Number: NIST SP 800-63v1.0.1
doi:10.6028/NIST.SP.800-63v1.0.1
Download PDF | Download Citation

Title: Electronic authentication guideline 


Date Published: 2006
Authors: W E Burr, D F Dodson, W T Polk
Report Number: NIST SP 800-63v1.0.2
doi:10.6028/NIST.SP.800-63v1.0.2
Download PDF | Download Citation

Title: Security considerations in the information system development life cycle 


Date Published: 2003
Authors: T Grance, J Hash, M Stevens
Report Number: NIST SP 800-64

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 42/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-64
Download PDF | Download Citation

Title: Security considerations in the information system development life cycle 


Date Published: 2004
Authors: T Grance, J Hash, M Stevens
Report Number: NIST SP 800-64r1
doi:10.6028/NIST.SP.800-64r1
Download PDF | Download Citation

Title: Security considerations in the system development life cycle 


Date Published: 2008
Authors: R Kissel, K M Stine, M A Scholl, H Rossman, J Fahlsing, J Gulick
Report Number: NIST SP 800-64r2
doi:10.6028/NIST.SP.800-64r2
Download PDF | Download Citation

Title: Integrating IT Security into the Capital Planning and Investment Control Process 
Date Published: 2005
Authors: J Hash, N Bartol, H Rollins, W Robinson, J Abeles, S Batdorff
Report Number: NIST SP 800-65
doi:10.6028/NIST.SP.800-65
Download PDF | Download Citation

Title: An introductory resource guide for implementing the Health Insurance Portability and Accountability Act (HIPAA) security rule 
Date Published: 2005
Authors: J Hash, P Bowen, L A Johnson, C D Smith, D I Steingberg
Report Number: NIST SP 800-66
doi:10.6028/NIST.SP.800-66
Download PDF | Download Citation

Title: An introductory resource guide for implementing the Health Insurance Portability and Accountability Act (HIPAA) security rule 
Date Published: 2008
Authors: M A Scholl, K M Stine, J Hash, P Bowen, L A Johnson, C D Smith, D I Steinberg
Report Number: NIST SP 800-66r1
doi:10.6028/NIST.SP.800-66r1
Download PDF | Download Citation

Title: Recommendation for the triple data encryption algorithm (TDEA) block cipher 
Date Published: 2012
Authors: W C Barker, E B Barker
Report Number: NIST SP 800-67r1
doi:10.6028/NIST.SP.800-67r1
Download PDF | Download Citation

Title: Guidance for securing Microsoft Windows XP for IT Professionals : a NIST security configuration checklist : recommendations of the National Institute of Standards and
Technology
Date Published: 2005
Authors: Murugia Souppaya, Karen Kent, Paul M Johnson
Report Number: NIST SP 800-68

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 43/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-68
Download PDF | Download Citation

Title: Guide to securing Microsoft Windows XP Systems for IT Professionals : a NIST security configuration checklist
Date Published: 2008
Authors: K A Scarfone, M P Souppaya, P M Johnson
Report Number: NIST SP 800-68r1
doi:10.6028/NIST.SP.800-68r1
Download PDF | Download Citation

Title: Guidance for securing Microsoft Windows XP Home Edition : a NIST security configuration checklist
Date Published: 2006
Authors: K Kent, M P Souppaya, J Connor
Report Number: NIST SP 800-69
doi:10.6028/NIST.SP.800-69
Download PDF | Download Citation

Title: Security in open systems 


Date Published: 1994
Authors: John Barkley
Report Number: NIST SP 800-7
doi:10.6028/NIST.SP.800-7
Download PDF | Download Citation

Title: Security configuration checklists program for IT products : guidance for checklists users and developers
Date Published: 2005
Authors: Murugiah Souppaya, John P Wack, Karen Kent
Report Number: NIST SP 800-70
doi:10.6028/NIST.SP.800-70
Download PDF | Download Citation

Title: National checklist program for IT products : guidelines for checklist users and developers
Date Published: 2009
Authors: S D Quinn, K A Scarfone, M P Souppaya
Report Number: NIST SP 800-70r1
doi:10.6028/NIST.SP.800-70r1
Download PDF | Download Citation

Title: National checklist program for IT products : guidelines for checklist users and developers
Date Published: 2011
Authors: S D Quinn, M P Souppaya, M Cook, K A Scarfone
Report Number: NIST SP 800-70r2
doi:10.6028/NIST.SP.800-70r2
Download PDF | Download Citation

Title: Guidelines on PDA forensics 


Date Published: 2004
Authors: W Jansen, R P Ayers
Report Number: NIST SP 800-72

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 44/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-72
Download PDF | Download Citation

Title: Interfaces for personal identity verification 


Date Published: 2005
Authors: J F Dray, S Guthery, T Schwarzhoff
Report Number: NIST SP 800-73
doi:10.6028/NIST.SP.800-73
Download PDF | Download Citation

Title: Interfaces for personal identity verification 


Date Published: 2006
Authors: J F Dray, S Guthery, T Schwarzhoff
Report Number: NIST SP 800-73-1
doi:10.6028/NIST.SP.800-73-1
Download PDF | Download Citation

Title: Interfaces for personal identity verification 


Date Published: 2008
Authors: R Chandramouli, J F Dray, H Ferraiolo, S B Guthery, W I MacGregor, K Mehta
Report Number: NIST SP 800-73-2
doi:10.6028/NIST.SP.800-73-2
Download PDF | Download Citation

Title: Biometric data specification for personal identity verification 


Date Published: 2005
Authors: C L Wilson, P J Grother, R Chandramouli
Report Number: NIST SP 800-76
doi:10.6028/NIST.SP.800-76
Download PDF | Download Citation

Title: Biometric data specification for personal identity verification 


Date Published: 2007
Authors: C L Wilson, P J Grother, R Chandramouli
Report Number: NIST SP 800-76-1
doi:10.6028/NIST.SP.800-76-1
Download PDF | Download Citation

Title: Guide to IPsec VPNs 


Date Published: 2005
Authors: S E Frankel, K Kent, R Lewkowski, A D Orebaugh, R W Ritchey, S R Sharma
Report Number: NIST SP 800-77
doi:10.6028/NIST.SP.800-77
Download PDF | Download Citation

Title: Cryptographic algorithms and key sizes for personal identity verification 


Date Published: 2005
Authors: W T Polk, D F Dodson, W E Burr
Report Number: NIST SP 800-78

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 45/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-78
Download PDF | Download Citation

Title: Cryptographic algorithms and key sizes for personal identity verification 


Date Published: 2007
Authors: W T Polk, D F Dodson, W E Burr
Report Number: NIST SP 800-78-1
doi:10.6028/NIST.SP.800-78-1
Download PDF | Download Citation

Title: Cryptographic algorithms and key sizes for personal identity verification 


Date Published: 2010
Authors: W T Polk, D F Dodson, W E Burr
Report Number: NIST SP 800-78-2
doi:10.6028/NIST.SP.800-78-2
Download PDF | Download Citation

Title: Cryptographic algorithms and key sizes for personal identity verification 


Date Published: 2010
Authors: W T Polk, D F Dodson, W E Burr, H Ferraiolo, D A Cooper
Report Number: NIST SP 800-78-3
doi:10.6028/NIST.SP.800-78-3
Download PDF | Download Citation

Title: Guidelines for the certification and accreditation of PIV card issuing organizations 
Date Published: 2005
Authors: D K Branstad, A Clay, J Hash
Report Number: NIST SP 800-79
doi:10.6028/NIST.SP.800-79
Download PDF | Download Citation

Title: Guidelines for the Authorization of Personal Identity Verification Card Issuers (PCI) and Derived PIV Credential Issuers (DPCI) 
Date Published: June 2008
Authors: Ramaswamy Chandramouli, Dennis Bailey, Nabil Ghadiali, Dennis Branstad
Report Number: NIST SP 800-79-1
doi:10.6028/NIST.SP.800-79-1
Download PDF | Download Citation

Title: Security issues in the database language SQL 


Date Published: 1993
Authors: W Timothy Polk, Lawrence E, III Bassham
Report Number: NIST SP 800-8
doi:10.6028/NIST.SP.800-8
Download PDF | Download Citation

Title: Secure Domain Name System (DNS) deployment guide 


Date Published: 2006
Authors: R Chandramouli, S W Rose
Report Number: NIST SP 800-81

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 46/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-81
Download PDF | Download Citation

Title: Secure Domain Name System (DNS) deployment guide 


Date Published: 2010
Authors: R Chandramouli, S W Rose
Report Number: NIST SP 800-81r1
doi:10.6028/NIST.SP.800-81r1
Download PDF | Download Citation

Title: Guide to malware incident prevention and handling 


Date Published: 2005
Authors: P Mell, K A Kent, J Nusbaum
Report Number: NIST SP 800-83
doi:10.6028/NIST.SP.800-83
Download PDF | Download Citation

Title: Guide to test, training, and exercise programs for IT plans and capabilities 
Date Published: 2006
Authors: T Grance, T Nolan, K Burke, R Dudley, G White, T Good
Report Number: NIST SP 800-84
doi:10.6028/NIST.SP.800-84
Download PDF | Download Citation

Title: PIV middleware and on-card application conformance test guidance (SP 800-73 compliance) 
Date Published: 2005
Authors: R Chandramouli, L Eyuboglu, K Mehta
Report Number: NIST SP 800-85
doi:10.6028/NIST.SP.800-85
Download PDF | Download Citation

Title: PIV card application and middleware interface test guidelines (SP800-73 compliance) 
Date Published: 2006
Authors: R Chandramouli, L Eyuboglu, K Mehta
Report Number: NIST SP 800-85a
doi:10.6028/NIST.SP.800-85a
Download PDF | Download Citation

Title: PIV card application and middleware interface test guidelines (SP800-73-2 compliance) 
Date Published: 2009
Authors: 
Report Number: NIST SP 800-85a-1
doi:10.6028/NIST.SP.800-85a-1
Download PDF | Download Citation

Title: PIV card application and middleware interface test guidelines (SP800-73-3 compliance) 
Date Published: 2010
Authors: R Chandramouli, H Ferraiolo, K Mehta
Report Number: NIST SP 800-85a-2

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 47/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-85a-2
Download PDF | Download Citation

Title: PIV data model test guidelines 


Date Published: 2006
Authors: R Chandramouli, K Mehta, P A Uzamere II, D Simon, N Ghadiali, A P Founds
Report Number: NIST SP 800-85b
doi:10.6028/NIST.SP.800-85b
Download PDF | Download Citation

Title: Guide to integrating forensic techniques into incident response 


Date Published: 2006
Authors: K Kent, S Chevalier, T Grance, H Dang
Report Number: NIST SP 800-86
doi:10.6028/NIST.SP.800-86
Download PDF | Download Citation

Title: Codes for identification of federal and federally-assisted organizations 


Date Published: 2008
Authors: W C Barker, H Ferraiolo
Report Number: NIST SP 800-87r1
doi:10.6028/NIST.SP.800-87r1
Download PDF | Download Citation

Title: Codes for the identification of federal and federally assisted organizations version 1.0 
Date Published: 2005
Authors: W C Barker, H Ferraiolo
Report Number: NIST SP 800-87ver1
doi:10.6028/NIST.SP.800-87ver1
Download PDF | Download Citation

Title: Codes for the identification of federal and federally assisted organizations 


Date Published: 2006
Authors: W C Barker, H Ferraiolo
Report Number: NIST SP 800-87ver1e2006
doi:10.6028/NIST.SP.800-87ver1e2006
Download PDF | Download Citation

Title: Codes for the identification of federal and federally assisted organizations 


Date Published: 2007
Authors: W C Barker, H Ferraiolo
Report Number: NIST SP 800-87ver1e2007
doi:10.6028/NIST.SP.800-87ver1e2007
Download PDF | Download Citation

Title: Guidelines for media sanitization 


Date Published: 2006
Authors: R Kissel, M A Scholl, S Skolochenko, X Li
Report Number: NIST SP 800-88

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 48/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-88
Download PDF | Download Citation

Title: Recommendation for obtaining assurances for digital signature applications 


Date Published: 2006
Authors: E B Barker
Report Number: NIST SP 800-89
doi:10.6028/NIST.SP.800-89
Download PDF | Download Citation

Title: Good security practices for electronic commerce, including electronic data interchange 
Date Published: 1993
Authors: Roy G Saltman
Report Number: NIST SP 800-9
doi:10.6028/NIST.SP.800-9
Download PDF | Download Citation

Title: Recommendation for random number generation using deterministic random bit generators (revised) 
Date Published: 2007
Authors: E B Barker, J M Kelsey
Report Number: NIST SP 800-90
doi:10.6028/NIST.SP.800-90
Download PDF | Download Citation

Title: Recommendation for random number generation using deterministic random bit generators 
Date Published: 2012
Authors: E B Barker, J M Kelsey
Report Number: NIST SP 800-90a
doi:10.6028/NIST.SP.800-90a
Download PDF | Download Citation

Title: Guide to computer security log management 


Date Published: 2006
Authors: K Kent, M P Souppaya
Report Number: NIST SP 800-92
doi:10.6028/NIST.SP.800-92
Download PDF | Download Citation

Title: Guide to Intrusion Detection and Prevention Systems (IDPS) 


Date Published: 2007
Authors: K A Scarfone, P M Mell
Report Number: NIST SP 800-94
doi:10.6028/NIST.SP.800-94
Download PDF | Download Citation

Title: Guide to secure web services 


Date Published: 2007
Authors: A Singhal, T Winograd, K A Scarfone
Report Number: NIST SP 800-95

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 49/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-95
Download PDF | Download Citation

Title: PIV card to reader interoperability guidelines 


Date Published: 2006
Authors: J F Dray, A Giles, M Kelley, R Chandramouli
Report Number: NIST SP 800-96
doi:10.6028/NIST.SP.800-96
Download PDF | Download Citation

Title: Establishing wireless robust security networks : a guide to IEEE 802.11i


Date Published: 2007
Authors: S E Frankel, B Eydt, L Owens, K A Scarfone
Report Number: NIST SP 800-97
doi:10.6028/NIST.SP.800-97
Download PDF | Download Citation

Title: Guidelines for securing Radio Frequency Identification (RFID) systems 


Date Published: 2007
Authors: A T Karygiannis, B Eydt, G Barber, L Bunn, T Phillips
Report Number: NIST SP 800-98
doi:10.6028/NIST.SP.800-98
Download PDF | Download Citation

Title: Recommendation for key derivation using pseudorandom functions (revised) 


Date Published: 2009
Authors: L Chen
Report Number: NIST SP 800-108
doi:10.6028/NIST.SP.800-108
Download PDF | Download Citation

Title: Guide to Industrial Control Systems (ICS) Security 


Date Published: June 2015
Authors: Keith Stouffer, Victoria Pillitteri, Suzanne Lightman, Marshall Abrams, Adam Hahn
Report Number: NIST SP 800-82r2
doi:10.6028/NIST.SP.800-82r2
Download PDF | Download Citation

Title: Interfaces for Personal Identity Verification 


Date Published: May 2015
Authors: David A. Cooper, Hildegard Ferraiolo, Ketan L. Mehta, Salvatore Francomacaro, Ramaswamy Chandramouli, Jason Mohler
Report Number: NIST SP 800-73-4
doi:10.6028/NIST.SP.800-73-4
Download PDF | Download Citation

Title: Cryptographic Algorithms and Key Sizes for Personal Identity Verification 


Date Published: May 2015
Authors: William T. Polk, Donna F. Dodson, William Burr, Salvatore Francomacaro, David A. Cooper
Report Number: NIST SP 800-78-4

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 50/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-78-4
Download PDF | Download Citation

Title: Supply Chain Risk Management Practices for Federal Information Systems and Organizations 
Date Published: April 2015
Authors: Jon M. Boyens, Celia Paulsen, Rama Moorthy, Nadya Bartol
Report Number: NIST SP 800-161
doi:10.6028/NIST.SP.800-161
Download PDF | Download Citation

Title: Vetting the Security of Mobile Applications 


Date Published: January 2015
Authors: Steve Quirolgico, Jeffrey Voas, Tom Karygiannis, Christoph Michael, Karen Scarfone
Report Number: NIST SP 800-163
doi:10.6028/NIST.SP.800-163
Download PDF | Download Citation

Title: Recommendation for Key Management Part 3: Application-Specific Key Management Guidance 


Date Published: January 2015
Authors: Elaine B. Barker, Quynh H. Dang
Report Number: NIST SP 800-57Pt3r1
doi:10.6028/NIST.SP.800-57Pt3r1
Download PDF | Download Citation

Title: Guidelines for Derived Personal Identity Verification (PIV) Credentials 


Date Published: December 2014
Authors: Hildegard Ferraiolo, David Cooper, Salvatore Francomacaro, Andrew Regenscheid, Jason Mohler, Sarbari Gupta, William Burr
Report Number: NIST SP 800-157
doi:10.6028/NIST.SP.800-157
Download PDF | Download Citation

Title: Guidelines for Media Sanitization 


Date Published: December 2014
Authors: Richard Kissel, Andrew Regenscheid, Matthew Scholl, Kevin Stine
Report Number: NIST SP 800-88r1
doi:10.6028/NIST.SP.800-88r1
Download PDF | Download Citation

Title: Assessing Security and Privacy Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans
Date Published: December 2014
Authors: Ronald S. Ross
Report Number: NIST SP 800-53Ar4
doi:10.6028/NIST.SP.800-53Ar4
Download PDF | Download Citation

Title: Assessing Security and Privacy Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans
Date Published: December 2014
Authors: Ronald S. Ross
Report Number: NIST SP 800-53Ar4

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 51/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-53Ar4
Download PDF | Download Citation

Title: Recommendation for Pair-Wise Key-Establishment Schemes Using Integer Factorization Cryptography 


Date Published: October 2014
Authors: Elaine Barker, Lily Chen, Dustin Moody
Report Number: NIST SP 800-56Br1
doi:10.6028/NIST.SP.800-56Br1
Download PDF | Download Citation

Title: A Framework for Designing Cryptographic Key Management Systems 


Date Published: August 2013
Authors: Elaine Barker, Miles Smid, Dennis Branstad, Santosh Chokhani
Report Number: NIST SP 800-130
doi:10.6028/NIST.SP.800-130
Download PDF | Download Citation

Title: Computer Security Division 2013 annual report 


Date Published: June 2014
Authors: Patrick O'Reilly, Lorie Richards
Report Number: NIST SP 800-170
doi:10.6028/NIST.SP.800-170
Download PDF | Download Citation

Title: BIOS Protection Guidelines for Servers 


Date Published: January 2008
Authors: Andrew Regenscheid
Report Number: NIST SP 800-147B
doi:10.6028/NIST.SP.800-147B
Download PDF | Download Citation

Title: Guidelines on Cell Phone and PDA Security 


Date Published: October 2008
Authors: Wayne Jansen, Karen Scarfone
Report Number: NIST SP 800-124
doi:10.6028/NIST.SP.800-124
Download PDF | Download Citation

Title: Guide to Attribute Based Access Control (ABAC) Definition and Considerations 


Date Published: January 2014
Authors: Vincent C. Hu, David Ferraiolo, Rick Kuhn, Adam Schnitzer, Kenneth Sandlin, Robert Miller, Karen Scarfone
Report Number: NIST SP 800-162
doi:10.6028/NIST.SP.800-162
Download PDF | Download Citation

Title: Computer Security Division 2012 Annual Report 


Date Published: June 2013
Authors: Patrick O'Reilly, Lorie Richards
Report Number: NIST SP 800-165

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 52/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-165
Download PDF | Download Citation

Title: Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography 
Date Published: May 2013
Authors: Elaine Barker, Lily Chen, Allen Roginsky, Miles Smid
Report Number: NIST SP 800-56Ar2
doi:10.6028/NIST.SP.800-56Ar2
Download PDF | Download Citation

Title: Biometric Specifications for Personal Identity Verification 


Date Published: July 2013
Authors: Patrick Grother, Wayne Salamon, Ramaswamy Chandramouli
Report Number: NIST SP 800-76-2
doi:10.6028/NIST.SP.800-76-2
Download PDF | Download Citation

Title: Guide to Malware Incident Prevention and Handling for Desktops and Laptops 
Date Published: July 2013
Authors: Murugiah Souppaya, Karen Scarfone
Report Number: NIST SP 800-83r1
doi:10.6028/NIST.SP.800-83r1
Download PDF | Download Citation

Title: Guide to Enterprise Patch Management Technologies 


Date Published: July 2013
Authors: Murugiah Souppaya, Karen Scarfone
Report Number: NIST SP 800-40r3
doi:10.6028/NIST.SP.800-40r3
Download PDF | Download Citation

Title: Approximate matching : definition and terminology 


Date Published: May 2014
Authors: Frank Breitinger, Barbara Guttman, Michael McCarrin, Vassil Roussev, Douglas White
Report Number: NIST SP 800-168
doi:10.6028/NIST.SP.800-168
Download PDF | Download Citation

Title: Guidelines for Managing the Security of Mobile Devices in the Enterprise 


Date Published: June 2013
Authors: Murugiah Souppaya, Karen Scarfone
Report Number: NIST SP 800-124r1
doi:10.6028/NIST.SP.800-124r1
Download PDF | Download Citation

Title: Guide for applying the risk management framework to federal information systems : a security life cycle approach 
Date Published: June 2014
Authors: 
Report Number: NIST SP 800-37r1

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 53/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-37r1
Download PDF | Download Citation

Title: Guidelines on mobile device forensics 


Date Published: May 2014
Authors: Rick Ayers, Sam Brothers, Wayne Jansen
Report Number: NIST SP 800-101r1
doi:10.6028/NIST.SP.800-101r1
Download PDF | Download Citation

Title: Guidelines for the selection, configuration, and use of transport layer security (TLS) implementations 
Date Published: April 2014
Authors: Tim Polk, Kerry McKay, Santosh Chokhani
Report Number: NIST SP 800-52r1
doi:10.6028/NIST.SP.800-52r1
Download PDF | Download Citation

Title: Computer Security Incident Handling Guide : Recommendations of the National Institute of Standards and Technology 
Date Published: August 2012
Authors: Paul Cichonski, Tom Millar, Tim Grance, Karen Scarfone
Report Number: NIST SP 800-61r2
doi:10.6028/NIST.SP.800-61r2
Download PDF | Download Citation

Title: Electronic Authentication Guideline 


Date Published: November 2013
Authors: William E. Burr, Donna F. Dodson, Elaine M. Newton, Ray A. Perlner, W. Timothy Polk, Sarbari Gupta, Ebad A. Nabbus
Report Number: NIST SP 800-63-2
doi:10.6028/NIST.SP.800-63-2
Download PDF | Download Citation

Title: Secure Domain Name System (DNS) Deployment Guide 


Date Published: September 2013
Authors: Ramaswamy Chandramouli, Scott Rose
Report Number: NIST SP 800-81-2
doi:10.6028/NIST.SP.800-81-2
Download PDF | Download Citation

Title: Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control systems (DCS), and other control
system configurations such as Programmable Logic Controllers (PLC) : recommendations of the National Institute of Standards and Technology, Computer security 
Date Published: June 2011
Authors: Keith Stouffer, Joe Falco, Karen Scarfone
Report Number: NIST SP 800-82
doi:10.6028/NIST.SP.800-82
Download PDF | Download Citation

Title: Guide to Industrial Control Systems (ICS) Security : Supervisory Control and Data Acquisition (SCADA) Systems, Distributed Control Systems (DCS), and Other Control
System Configurations such as Programmable Logic Controllers (PLC) 
Date Published: May 2013
Authors: Keith Stouffer, Joe Falco, Karen Scarfone
Report Number: NIST SP 800-82r1

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 54/57
24/7/23, 22:48 NIST Technical Publications List
doi:10.6028/NIST.SP.800-82r1
Download PDF | Download Citation

Title: Security and Privacy Controls for Federal Information Systems and Organizations 
Date Published: April 2013
Authors: 
Report Number: NIST SP 800-53r4
doi:10.6028/NIST.SP.800-53r4
Download PDF | Download Citation

Title: Recommendation for Cryptographic Key Generation 


Date Published: December 2012
Authors: Elaine Barker, Allen Roginsky
Report Number: NIST SP 800-133
doi:10.6028/NIST.SP.800-133
Download PDF | Download Citation

Title: Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping (SP 800-38F)
Date Published: December 2012
Authors: Morris J. Dworkin
Report Number: NIST SP 800-38F
doi:10.6028/NIST.SP.800-38F
Download PDF | Download Citation

Filter by Series
Trustworthy and Responsible AI
Advanced Manufacturing Series
Basic Radio Propagation Predictions Series
Building and Housing Reports
Building Materials and Structures Reports
Building Science Series
Central Radio Propagation Laboratory Reports
CRPL Ionospheric Data
CRPL Ionospheric Predictions
CRPL Solar-Geophysical Data
Circulars
Consumer Information Series
Commercial Standards
Commercial Standards Monthly
Cybersecurity White Papers

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 55/57
24/7/23, 22:48 NIST Technical Publications List
Data Collection Instruments and Best Practices
Economic Analysis Briefs
Federal Information Processing Standards Publications
Grant/Contractor Reports
Handbooks
Hydraulic Research in the United States
Interservice Radio Propagation Laboratory
Letter Circular
Monographs
Miscellaneous Publications
National Construction Safety Team Act Reports
National Standard Reference Data Series
NISTIRs (Interagency/Internal Reports)
Office of Weights and Measures White Papers
Photographic Circulars
NBS Reports
Special Interior Ballistics Studies
Special Publications (General)
SP 250: Calibration Services

SP 260: Standard Reference Materials


SP 300: Precision Measurement and Calibration
SP 400: Semiconductor Measurement Technology
SP 480: Law Enforcement Technology
SP 500: Computer Systems Technology
SP 700: Industrial Measurement Series
SP 800: Computer Security Series
SP 823: Integrated Services Digital Network Series
SP 960: NIST Recommended Practice Guides
SP 1200: Protocols
SP 1500: Working Group Papers
SP 1800: NIST Cybersecurity Practice Guides
SP 1900: Cyber-Physical Systems
SP 2000: Standards Coordination
SP 2100: Conference Proceedings
SP 2200: Legal Metrology
Technical Information on Building Materials
Technical Notes

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 56/57
24/7/23, 22:48 NIST Technical Publications List
Technology Transfer Brief
Voting Technology Series

Privacy Policy | Security Notice | Accessibility Statement

https://pages.nist.gov/NIST-Tech-Pubs/SP800.html 57/57

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy