0% found this document useful (0 votes)
52 views4 pages

NIST Reference Documents

Uploaded by

lm
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views4 pages

NIST Reference Documents

Uploaded by

lm
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd

revision

number

volume

draft
part
sub
12 1
32
35
37 2
38 E
39
41 1
52 2
53 5
57 1 5
57 2 1
57 3 1
60 1 1
61 2
63 3
63 A
63 B
63 C
64 2
71 X
78 4
86
88 1
92
102
106
107 1
111
115
122
123
125
125 A 1
125 B
126 3
128
131 A 2
133 2
137
140
142
147
147 B
150
154 X
160 1 1 X
160 2 1 X
161
171 2
175 A
175 B 1
180 X
181 1
184
190
192
193
207
210
213 X
218 X
title
An Introduction to Information Security
Introduction to Public Key Technology and the Federal PKI Infrastructure
Guide to Information Technology Security Services
Risk Management Framework for Information Systems and Organizations
Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices
Managing Information Security Risk
Guidelines on Firewalls and Firewall Policy
Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations
Security and Privacy Controls for Information Systems and Organizations
Recommendation for Key Management: Part 1 - General
Recommendation for Key Management: Part 2 - Best Practices for Key Management Organizations
Recommendation for Key Management: Part 3 - Application-Specific Key Management Guidance
Guide for Mapping Types of Information and Information Systems to Security Categories
Computer Security Incident Handling Guide
Digital Identity Guidelines
Digital Identity Guidelines: Enrollment and Identity Proofing
Digital Identity Guidelines: Authentication and Lifecycle Management
Digital Identity Guidelines: Federation and Assertions
Security Considerations in the System Development Life Cycle
Recommendation for Key Establishment Using Symmetric Block Ciphers
Cryptographic Algorithms and Key Sizes for Personal Identity Verification
Guide to Integrating Forensic Techniques into Incident Response
Guidelines for Media Sanitization
Guide to Computer Security Log Management
Recommendation for Digital Signature Timeliness
Randomized Hashing for Digital Signatures
Recommendation for Applications Using Approved Hash Algorithms
Guide to Storage Encryption Technologies for End User Devices
Technical Guide to Information Security Testing and Assessment
Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)
Guide to General Server Security
Guide to Security for Full Virtualization Technologies
Security Recommendations for Server-based Hypervisor Platforms
Secure Virtual Network Configuration for Virtual Machine (VM) Protection
The Technical Specification for the Security Content Automation Protocol (SCAP)
Guide for Security-Focused Configuration Management of Information Systems
Transitioning the Use of Cryptographic Algorithms and Key Lengths
Recommendation for Cryptographic Key Generation
Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations
FIPS 140-3 Derived Test Requirements (DTR): CMVP Validation Authority Updates to ISO/IEC 2
Practical Combinatorial Testing
BIOS Protection Guidelines
BIOS Protection Guidelines for Servers
Guide to Cyber Threat Information Sharing
Guide to Data-Centric System Threat Modeling
Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Sec
Developing Cyber Resilient Systems: A Systems Security Engineering Approach
Supply Chain Risk Management Practices for Federal Information Systems and Organizations
Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
Guideline for Using Cryptographic Standards in the Federal Government: Directives, Mandates and Policies
Guideline for Using Cryptographic Standards in the Federal Government: Cryptographic Mechanisms
NIST Definition of Microservices, Application Containers and System Virtual Machines
Workforce Framework for Cybersecurity (NICE Framework)
Guide for Cybersecurity Event Recovery
Application Container Security Guide
Verification and Test Methods for Access Control Policies/Models
Platform Firmware Resiliency Guidelines
Zero Trust Architecture
General Access Control Guidance for Cloud Systems
IoT Device Cybersecurity Guidance for the Federal Government: Establishing IoT Device Cybersecurity Requirements
Mitigating the Risk of Software Vulnerabilities by Adopting a Secure Software Development Framework (SSDF)

You might also like