-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathindex.txt
1317 lines (1194 loc) · 92.5 KB
/
index.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
[section] :- ANNUAL REPORTS
NIST SP 800-203 | NIST-ITL Cybersecurity Program Annual Report
NIST SP 800-195 | NIST-ITL Cybersecurity Program Annual Report
NIST SP 800-182 | Computer Security Division 2015 Annual Report
NIST SP 800-176 | Computer Security Division 2014 Annual Report
NIST SP 800-170 | Computer Security Division 2013 Annual Report
NIST SP 800-165 | Computer Security Division 2012 Annual Report
NIST IR 7816 | Computer Security Division 2011 Annual Report
NIST IR 7751 | Computer Security Division 2010 Annual Report
NIST IR 7653 | Computer Security Division 2009 Annual Report
NIST IR 7536 | Computer Security Division 2008 Annual Report
NIST IR 7442 | Computer Security Division - 2007 Annual Report
NIST IR 7399 | Computer Security Division - 2006 Annual Report
NIST IR 7285 | Computer Security Division - 2005 Annual Report
NIST IR 7219 | Computer Security Division - 2004 Annual Report
NIST IR 7111 | Computer Security Division - 2003 Annual Report
[section] :- AUDIT & ACCOUNTABILITY
FIPS 200 | Minimum Security Requirements for Federal Information and Information Systems
FIPS 199 | Standards for Security Categorization of Federal Information and Information Systems
FIPS 191 | Guideline for The Analysis of Local Area Network Security
FIPS 140 | Security Requirements for Cryptographic Modules
SP 800-94 | Guide to Intrusion Detection and Prevention Systems (IDPS)
SP 800-92 | Guide to Computer Security Log Management
SP 800-68 Rev. 1 | Guide to Securing Microsoft Windows XP Systems for IT Professionals
SP 800-55 Rev 1 | Performance Measurement Guide for Information Security
SP 800-55 | Security Metrics Guide for Information Technology Systems
SP 800-53A | Guide for Assessing the Security Controls in Federal Information Systems
SP 800-53 Rev 3 | Recommended Security Controls for Federal Information Systems and Organizations
SP 800-50 | Building an Information Technology Security Awareness and Training Program
SP 800-115 | Technical Guide to Information Security Testing and Assessment
SP 800-41 | Guidelines on Firewalls and Firewall Policy
SP 800-37 | Guidelines for the Security Certification and Accreditation of Federal Information Technology Systems
SP 800-30 | Risk Management Guide for Information Technology Systems
SP 800-18 Rev 1 | Guide for Developing Security Plans for Information Systems
SP 800-16 | Information Technology Security Training Requirements: A Role- and Performance-Based Model
NIST IR 7358 | Program Review for Information Security Management Assistance (PRISMA)
NIST IR 7316 | Assessment of Access Control Systems
NIST IR 7284 | Personal Identity Verification Card Management Report
NIST IR 7275 | Specification for the Extensible Configuration Checklist Description Format (XCCDF) Version 1.1.4
NIST IR 6981 | Policy Expression and Enforcement for Handheld Devices
January 2007 | Security Controls For Information Systems: Revised Guidelines Issued By NIST - ITL Security Bulletin
October 2006 | Log Management: Using Computer And Network Records To Improve Information Security - ITL Security Bulletin
March 2006 | Minimum Security Requirements For Federal Information And Information Systems: Federal Information Processing Standard (FIPS) 200 Approved By The Secretary Of Commerce
January 2006 | Testing And Validation Of Personal Identity Verification (PIV) Components And Subsystems For Conformance To Federal Information Processing Standard 201
August 2005 | Implementation Of FIPS 201, Personal Identity Verification (PIV) Of Federal Employees And Contractors
May 2005 | Recommended Security Controls For Federal Information Systems: Guidance For Selecting Cost-Effective Controls Using A Risk-Based Process
November 2004 | Understanding the New NIST Standards and Guidelines Required by FISMA: How Three Mandated Documents are Changing the Dynamic of Information Security for the Federal Government
March 2004 | Federal Information Processing Standard (FIPS) 199, Standards For Security Categorization Of Federal Information And Information Systems
August 2003 | IT Security Metrics
June 2003 | ASSET: Security Assessment Tool For Federal Agencies
January 2002 | Guidelines on Firewalls and Firewall Policy
September 2001 | Security Self-Assessment Guide for Information Technology Systems
February 2000 | Guideline for Implementing Cryptography in the Federal Government
[section] :- AUTHENTICATION
FIPS 198 | The Keyed-Hash Message Authentication Code (HMAC)
FIPS 196 | Entity Authentication Using Public Key Cryptography
FIPS 190 | Guideline for the Use of Advanced Authentication Technology Alternatives
FIPS 186 | Digital Signature Standard (DSS)
FIPS 181 | Automated Password Generator
FIPS 180 | Secure Hash Standard (SHS)
SP 800-124 | Guidelines on Cell Phone and PDA Security
SP 800-121 | Guide To Bluetooth Security
SP 800-116 | A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
SP 800-114 | User's Guide to Securing External Devices for Telework and Remote Access
SP 800-113 | Guide to SSL VPNs
SP 800-104 | A Scheme for PIV Visual Card Topography
SP 800-89 | Recommendation for Obtaining Assurances for Digital Signature Applications
SP 800-78 | Cryptographic Algorithms and Key Sizes for Personal Identity Verification
SP 800-73 | Interfaces for Personal Identity Verification
SP 800-63 Rev 1 | Electronic Authentication Guide
SP 800-57 | Recommendation on Key Management
SP 800-53 Rev 3 | Recommended Security Controls for Federal Information Systems and Organizations
SP 800-38D | Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC
SP 800-38C | Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality
SP 800-38B | Recommendation for Block Cipher Modes of Operation: The RMAC Authentication Mode
SP 800-38A | Recommendation for Block Cipher Modes of Operation - Methods and Techniques
SP 800-32 | Introduction to Public Key Technology and the Federal PKI Infrastructure
SP 800-25 | Federal Agency Use of Public Key Technology for Digital Signatures and Authentication
SP 800-21 Rev 2 | Guideline for Implementing Cryptography in the Federal Government
SP 800-17 | Modes of Operation Validation System (MOVS): Requirements and Procedures
NIST IR 7452 | Secure Biometric Match-on-Card Feasibility Report
NIST IR 7290 | Fingerprint Identification and Mobile Handheld Devices: An Overview and Implementation
NIST IR 7206 | Smart Cards and Mobile Device Authentication: An Overview and Implementation
NIST IR 7200 | Proximity Beacons and Mobile Handheld Devices: Overview and Implementation
NIST IR 7046 | Framework for Multi-Mode Authentication: Overview and Implementation Guide
NIST IR 7030 | Picture Password: A Visual Login Technique for Mobile Devices
April 2007 | Securing Wireless Networks - ITL Security Bulletin
February 2007 | Intrusion Detection And Prevention Systems - ITL Security Bulletin
May 2006 | An Update On Cryptographic Standards, Guidelines, And Testing Requirements – ITL Security Bulletin
September 2005 | Biometric Technologies: Helping To Protect Information And Automated Transactions In Information Technology Systems
July 2005 | Protecting Sensitive Information That Is Transmitted Across Networks: NIST Guidance For Selecting And Using Transport Layer Security Implementations
August 2004 | Electronic Authentication: Guidance For Selecting Secure Techniques
March 2003 | Security For Wireless Networks And Devices
May 2001 | Biometrics - Technologies for Highly Secure Personal Authentication
March 2001 | An Introduction to IPsec (Internet Protocol Security)
[section] :- AWARENESS & TRAINING
SP 800-66 Rev 1 | An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
SP 800-53 Rev 3 | Recommended Security Controls for Federal Information Systems and Organizations
SP 800-50 | Building an Information Technology Security Awareness and Training Program
SP 800-46 Rev 1 | Security for Telecommuting and Broadband Communications
SP 800-16 | Information Technology Security Training Requirements: A Role- and Performance-Based Model
NIST IR 7359 | Information Security Guide For Government Executives
NIST IR 7284 | Personal Identity Verification Card Management Report
November 2006 | Guide To Securing Computers Using Windows XP Home Edition - ITL Security Bulletin
October 2003 | Information Technology Security Awareness, Training, Education, and Certification
November 2002 | Security For Telecommuting And Broadband Communications
[section] :- BIOMETRICS
FIPS 201 | Personal Identity Verification for Federal Employees and Contractors
SP 800-116 | A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
SP 800-76 | Biometric Data Specification for Personal Identity Verification
SP 800-73 | Interfaces for Personal Identity Verification
NIST IR 7452 | Secure Biometric Match-on-Card Feasibility Report
NIST IR 7290 | Fingerprint Identification and Mobile Handheld Devices: An Overview and Implementation
NIST IR 7284 | Personal Identity Verification Card Management Report
NIST IR 7206 | Smart Cards and Mobile Device Authentication: An Overview and Implementation
NIST IR 7056 | Card Technology Development and Gap Analysis Interagency Report
NIST IR 6887 | Government Smart Card Interoperability Specification (GSC-IS), v2.1
NIST IR 6529-A | Common Biometric Exchange File Format (CBEFF)
September 2005 | Biometric Technologies: Helping To Protect Information And Automated Transactions In Information Technology Systems
August 2005 | Implementation Of FIPS 201, Personal Identity Verification (PIV) Of Federal Employees And Contractors
March 2005 | Personal Identity Verification (PIV) Of Federal Employees And Contractors: Federal Information Processing Standard (FIPS) 201
July 2002 | Overview: The Government Smart Card Interoperability Specification
May 2001 | Biometrics - Technologies for Highly Secure Personal Authentication
[section] :- CERTIFICATION & ACCREDITATION (C&A)
FIPS 200 | Minimum Security Requirements for Federal Information and Information Systems
FIPS 199 | Standards for Security Categorization of Federal Information and Information Systems
FIPS 191 | Guideline for The Analysis of Local Area Network Security
SP 800-115 | Technical Guide to Information Security Testing and Assessment
SP 800-88 | Media Sanitization Guide
SP 800-84 | Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities
SP 800-60 Rev 1 | Guide for Mapping Types of Information and Information Systems to Security Categories: (2 Volumes) - Volume 1: Guide Volume 2: Appendices
SP 800-59 | Guideline for Identifying an Information System as a National Security System
SP 800-55 Rev 1 | Performance Measurement Guide for Information Security
SP 800-55 | Security Metrics Guide for Information Technology Systems
SP 800-53A | Guide for Assessing the Security Controls in Federal Information Systems
SP 800-53 Rev 3 | Recommended Security Controls for Federal Information Systems and Organizations
SP 800-47 | Security Guide for Interconnecting Information Technology Systems
SP 800-37 | Guidelines for the Security Certification and Accreditation of Federal Information Technology Systems
SP 800-34 | Contingency Planning Guide for Information Technology Systems
SP 800-30 | Risk Management Guide for Information Technology Systems
SP 800-23 | Guideline to Federal Organizations on Security Assurance and Acquisition/Use of Tested/Evaluated Products
SP 800-18 Rev 1 | Guide for Developing Security Plans for Information Systems
December 2006 | Maintaining Effective Information Technology (IT) Security Through Test, Training, And Exercise Programs – ITL Security Bulletin
March 2006 | Minimum Security Requirements For Federal Information And Information Systems: Federal Information Processing Standard (FIPS) 200 Approved By The Secretary Of Commerce
May 2005 | Recommended Security Controls For Federal Information Systems: Guidance For Selecting Cost-Effective Controls Using A Risk-Based Process
November 2004 | Understanding the New NIST Standards and Guidelines Required by FISMA: How Three Mandated Documents are Changing the Dynamic of Information Security for the Federal Government
July 2004 | Guide For Mapping Types Of Information And Information Systems To Security Categories
May 2004 | Guide For The Security Certification And Accreditation Of Federal Information Systems
March 2004 | Federal Information Processing Standard (FIPS) 199, Standards For Security Categorization Of Federal Information And Information Systems
August 2003 | IT Security Metrics
June 2003 | ASSET: Security Assessment Tool For Federal Agencies
February 2003 | Secure Interconnections for Information Technology Systems
[section] :- COMMUNICATIONS & WIRELESS
FIPS 140 | Security Requirements for Cryptographic Modules
SP 800-124 | Guidelines on Cell Phone and PDA Security
SP 800-121 | Guide To Bluetooth Security
SP 800-115 | Technical Guide to Information Security Testing and Assessment
SP 800-114 | User’s Guide to Securing External Devices for Telework and Remote Access
SP 800-113 | Guide to SSL VPNs
SP 800-101 | Guidelines on Cell Phone Forensics
SP 800-98 | Guidelines for Securing Radio Frequency Identification (RFID) Systems
SP 800-82 | Guide to Industrial Control Systems (ICS) Security
SP 800-81 | Secure Domain Name System (DNS) Deployment Guide
SP 800-77 | Guide to IPsec VPNs
SP 800-58 | Security Considerations for Voice Over IP Systems
SP 800-54 | Border Gateway Protocol Security
SP 800-53 Rev 3 | Recommended Security Controls for Federal Information Systems and Organizations
SP 800-52 | Guidelines on the Selection and Use of Transport Layer Security
SP 800-48 Rev 1 | Wireless Network Security: 802.11, Bluetooth, and Handheld Devices
SP 800-46 Rev 1 | Security for Telecommuting and Broadband Communications
SP 800-45 Rev 2 | Guidelines on Electronic Mail Security
SP 800-41 | Guidelines on Firewalls and Firewall Policy
SP 800-24 | PBX Vulnerability Analysis: Finding Holes in Your PBX Before Someone Else Does
NIST IR 7452 | Secure Biometric Match-on-Card Feasibility Report
NIST IR 7387 | Cell Phone Forensic Tools: An Overview and Analysis Update
NIST IR 7206 | Smart Cards and Mobile Device Authentication: An Overview and Implementation
NIST IR 7046 | Framework for Multi-Mode Authentication: Overview and Implementation Guide
July 2007 | Border Gateway Protocol Security – ITL Security Bulletin
June 2007 | Forensic Techniques for Cell Phones – ITL Security Bulletin
May 2007 | Securing Radio Frequency Identification (RFID) Systems - ITL Security Bulletin
April 2007 | Securing Wireless Networks – ITL Security Bulletin
March 2007 | Improving The Security Of Electronic Mail: Updated Guidelines Issued By NIST – ITL Security Bulletin
June 2006 | Domain Name System (DNS) Services: NIST Recommendations For Secure Deployment – ITL Security Bulletin
April 2006 | Protecting Sensitive Information Transmitted in Public Networks – ITL Security Bulletin
October 2004 | Securing Voice Over Internet Protocol (IP) Networks
March 2003 | Security For Wireless Networks And Devices
January 2003 | Security Of Electronic Mail
November 2002 | Security For Telecommuting And Broadband Communications
January 2002 | Guidelines on Firewalls and Firewall Policy
March 2001 | An Introduction to IPsec (Internet Protocol Security)
August 2000 | Security for Private Branch Exchange Systems
[section] :- CONTINGENCY PLANNING
SP 800-84 | Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities
SP 800-46 Rev 1 | Security for Telecommuting and Broadband Communications
SP 800-53 Rev 3 | Recommended Security Controls for Federal Information Systems and Organizations
SP 800-34 | Contingency Planning Guide for Information Technology Systems
December 2006 | Maintaining Effective Information Technology (IT) Security Through Test, Training, And Exercise Programs – ITL Security Bulletin
January 2004 | Computer Security Incidents: Assessing, Managing, And Controlling The Risks
June 2002 | Contingency Planning Guide For Information Technology Systems
April 2002 | Techniques for System and Data Recovery
[section] :- CRYPTOGRAPHY
FIPS 198 | The Keyed-Hash Message Authentication Code (HMAC)
FIPS 197 | Advanced Encryption Standard
FIPS 196 | Entity Authentication Using Public Key Cryptography
FIPS 190 | Guideline for the Use of Advanced Authentication Technology Alternatives
FIPS 186 | Digital Signature Standard (DSS)
FIPS 185 | Escrowed Encryption Standard
FIPS 181 | Automated Password Generator
FIPS 180 | Secure Hash Standard (SHS)
FIPS 140 | Security Requirements for Cryptographic Modules
SP 800-116 | A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
SP 800-113 | Guide to SSL VPNs
SP 800-111 | Guide to Storage Encryption Technologies for End User Devices
SP 800-90 | Recommendation for Random Number Generation Using Deterministic Random Bit Generators
SP 800-78 | Cryptographic Algorithms and Key Sizes for Personal Identity Verification
SP 800-73 | Interfaces for Personal Identity Verification
SP 800-67 1.1 | Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher
SP 800-57 | Recommendation on Key Management
SP 800-56A | Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography
SP 800-53 Rev 3 | Recommended Security Controls for Federal Information Systems and Organizations
SP 800-52 | Guidelines on the Selection and Use of Transport Layer Security
SP 800-49 | Federal S/MIME V3 Client Profile
SP 800-38D | Recommendation for Block Cipher Modes of Operation:Galois/Counter Mode (CGM) and GMAC
SP 800-38C | Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality
SP 800-38B | Recommendation for Block Cipher Modes of Operation: The RMAC Authentication Mode
SP 800-38A | Recommendation for Block Cipher Modes of Operation - Methods and Techniques
SP 800-32 | Introduction to Public Key Technology and the Federal PKI Infrastructure
SP 800-25 | Federal Agency Use of Public Key Technology for Digital Signatures and Authentication
SP 800-22 Rev 1 | A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
SP 800-21 Rev 2 | Guideline for Implementing Cryptography in the Federal Government
SP 800-17 | Modes of Operation Validation System (MOVS): Requirements and Procedures
SP 800-15 Rev 1 | Minimum Interoperability Specification for PKI Components (MISPC), Version 1
NIST IR 7452 | Secure Biometric Match-on-Card Feasibility Report
NIST IR 7206 | Smart Cards and Mobile Device Authentication: An Overview and Implementation
NIST IR 7046 | Framework for Multi-Mode Authentication: Overview and Implementation Guide
May 2006 | An Update On Cryptographic Standards, Guidelines, And Testing Requirements – ITL Security Bulletin
September 2002 | Cryptographic Standards and Guidelines: A Status Report
December 2000 | A Statistical Test Suite For Random And Pseudorandom Number Generators For Cryptographic Applications
February 2000 | Guideline for Implementing Cryptography in the Federal Government
[section] :- DIGITAL SIGNATURES
FIPS 198 | The Keyed-Hash Message Authentication Code (HMAC)
FIPS 186 | Digital Signature Standard (DSS)
FIPS 180 | Secure Hash Standard (SHS)
FIPS 140 | Security Requirements for Cryptographic Modules
SP 800-107 | Recommendation for Applications Using Approved Hash Algorithms
SP 800-106 | Randomized Hashing for Digital Signatures
SP 800-78 | Cryptographic Algorithms and Key Sizes for Personal Identity Verification
SP 800-63 Rev 1 | Electronic Authentication Guideline
SP 800-57 | Recommendation on Key Management
SP 800-52 | Guidelines on the Selection and Use of Transport Layer Security
SP 800-49 | Federal S/MIME V3 Client Profile
SP 800-32 | Introduction to Public Key Technology and the Federal PKI Infrastructure
SP 800-25 | Federal Agency Use of Public Key Technology for Digital Signatures and Authentication
SP 800-21 Rev 2 | Guideline for Implementing Cryptography in the Federal Government
SP 800-15 | Minimum Interoperability Specification for PKI Components (MISPC), Version 1
NIST IR 7313 | 5th Annual PKI R&D Workshop “Making PKI Easy to Use” Proceedings
May 2006 | An Update On Cryptographic Standards, Guidelines, And Testing Requirements – ITL Security Bulletin
February 2000 | Guideline for Implementing Cryptography in the Federal Government
[section] :- FORENSICS
SP 800-101 | Guidelines on Cell Phone Forensics
SP 800-94 | Guide to Intrusion Detection and Prevention Systems (IDPS)
SP 800-88 | Guidelines for Media Sanitization
SP 800-86 | Guide to Integrating Forensic Techniques into Incident Response
SP 800-72 | Guidelines on PDA Forensics
NIST IR 7516 | Forensic Filtering of Cell Phone Protocols
NIST IR 7387 | Cell Phone Forensic Tools: An Overview and Analysis Update
NIST IR 7250 | Cell Phone Forensic Tools: An Overview and Analysis
NIST IR 7100 | PDA Forensic Tools: An Overview and Analysis
June 2007 | Forensic Techniques for Cell Phones – ITL Security Bulletin
February 2007 | Intrusion Detection And Prevention Systems – ITL Security Bulletin
September 2006 | Forensic Techniques: Helping Organizations Improve Their Responses To Information Security Incidents
November 2001 | Computer Forensics Guidance
[section] :- GENERAL IT SECURITY
FIPS 200 | Minimum Security Requirements for Federal Information and Information Systems
SP 800-123 | Guide to General Server Security
SP 800-116 | A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
SP 800-114 | User’s Guide to Securing External Devices for Telework and Remote Access
SP 800-111 | Guide to Storage Encryption Technologies for End User Devices
SP 800-100 | Information Security Handbook: A Guide for Managers
SP 800-95 | Guide to Secure Web Services
SP 800-88 | Guidelines for Media Sanitization
SP 800-64 Rev 2 | Security Considerations in the Information System Development Life Cycle
SP 800-63 Rev 1 | Electronic Authentication Guideline
SP 800-53 Rev 3 | Recommended Security Controls for Federal Information Systems and Organizations
SP 800-48 | Guide to Securing Legacy IEEE 802.11 Wireless Networks
SP 800-47 | Security Guide for Interconnecting Information Technology Systems
SP 800-44 | Guidelines on Securing Public Web Servers
SP 800-33 | Underlying Technical Models for Information Technology Security
SP 800-27 Rev A | Engineering Principles for Information Technology Security (A Baseline for Achieving Security)
SP 800-14 | Generally Accepted Principles and Practices for Securing Information Technology Systems
SP 800-12 | An Introduction to Computer Security: The NIST Handbook
NIST IR 7435 | The Common Vulnerability Scoring System (CVSS) and its Applicability to Federal Agency Systems
NIST IR 7359 | Information Security Guide For Government Executives
NIST IR 7358 | Program Review for Information Security Management Assistance (PRISMA)
NIST IR 7298 | Glossary of Key Information Security Terms
October 2008 | Keeping Information Technology (It) System Servers Secure: A General Guide To Good Practices
April 2007 | Securing Wireless Networks – ITL Security Bulletin
November 2006 | Guide To Securing Computers Using Windows XP Home Edition – ITL Security Bulletin
March 2006 | Minimum Security Requirements For Federal Information And Information Systems: Federal Information Processing Standard (FIPS) 200 Approved By The Secretary Of Commerce - ITL Security Bulletin
[section] :- INCIDENT RESPONSE
SP 800-101 | Guidelines on Cell Phone Forensics
SP 800-94 | Guide to Intrusion Detection and Prevention Systems (IDPS)
SP 800-86 | Guide to Integrating Forensic Techniques into Incident Response
SP 800-84 | Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities
SP 800-83 | Guide to Malware Incident Prevention and Handling
SP 800-61 Rev | Computer Security Incident Handling Guide
SP 800-53 Rev 3 | Recommended Security Controls for Federal Information Systems and Organizations
SP 800-51 | Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme
SP 800-40 Rev | Creating a Patch and Vulnerability Management Program
NIST IR 7387 | Cell Phone Forensic Tools: An Overview and Analysis Update
NIST IR 7250 | Cell Phone Forensic Tools: An Overview and Analysis
NIST IR 7100 | PDA Forensic Tools: An Overview and Analysis
NIST IR 6981 | Policy Expression and Enforcement for Handheld Devices
NIST IR 6416 | Applying Mobile Agents to Intrusion Detection and Response
June 2007 | Forensic Techniques for Cell Phones – ITL Security Bulletin
February 2007 | Intrusion Detection And Prevention Systems – ITL Security Bulletin
December 2006 | Maintaining Effective Information Technology (IT) Security Through Test, Training, And Exercise Programs – ITL Security Bulletin
September 2006 | Forensic Techniques: Helping Organizations Improve Their Responses To Information Security Incidents
February 2006 | Creating A Program To Manage Security Patches And Vulnerabilities: NIST Recommendations For Improving System Security
December 2005 | Preventing And Handling Malware Incidents: How To Protect Information Technology Systems From Malicious Code And Software
October 2005 | National Vulnerability Database: Helping Information Technology System Users And Developers Find Current Information About Cyber Security Vulnerabilities
January 2004 | Computer Security Incidents: Assessing, Managing, And Controlling The Risks
October 2002 | Security Patches And The CVE Vulnerability Naming Scheme: Tools To Address Computer System Vulnerabilities
April 2002 | Techniques for System and Data Recovery
November 2001 | Computer Forensics Guidance
[section] :- MAINTENANCE
FIPS 191 | Guideline for The Analysis of Local Area Network Security
FIPS 188 | Standard Security Labels for Information Transfer
SP 800-123 | Guide to General Server Security
SP 800-88 | Media Sanitization Guide
SP 800-84 | Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities
SP 800-83 | Guide to Malware Incident Prevention and Handling
SP 800-70 | Security Configuration Checklists Program for IT Products
SP 800-69 | Guidance for Securing Microsoft Windows XP Home Edition: a NIST Security Configuration Checklist
SP 800-68 Rev 1 | Guidance for Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist
SP 800-55 | Security Metrics Guide for Information Technology Systems
SP 800-53 Rev 3 | Recommended Security Controls for Federal Information Systems and Organizations
SP 800-51 | Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme
SP 800-44 | Guidelines on Securing Public Web Servers
SP 800-43 | Systems Administration Guidance for Securing Microsoft Windows 2000 Professional System
SP 800-41 | Guidelines on Firewalls and Firewall Policy
SP 800-40 Rev 2 | Creating a Patch and Vulnerability Management Program
SP 800-31 | Intrusion Detection Systems (IDS)
SP 800-24 | PBX Vulnerability Analysis: Finding Holes in Your PBX Before Someone Else Does
NIST IR 7284 | Personal Identity Verification Card Management Report
NIST IR 7275 | Specification for the Extensible Configuration Checklist Description Format (XCCDF)
NIST IR 6985 | COTS Security Protection Profile - Operating Systems (CSPP-OS) (Worked Example Applying Guidance of NISTIR-6462, CSPP)
NIST IR 6462 | CSPP - Guidance for COTS Security Protection Profiles
December 2006 | Maintaining Effective Information Technology (IT) Security Through Test, Training, And Exercise Programs – ITL Security Bulletin
November 2006 | Guide To Securing Computers Using Windows XP Home Edition – ITL Security Bulletin
August 2006 | Protecting Sensitive Information Processed And Stored In Information Technology (IT) Systems - ITL Security Bulletin
February 2006 | Creating A Program To Manage Security Patches And Vulnerabilities: NIST Recommendations For Improving System Security – ITL Security Bulletin
December 2005 | Preventing And Handling Malware Incidents: How To Protect Information Technology Systems From Malicious Code And Software – ITL Security Bulletin
November 2005 | Securing Microsoft Windows XP Systems: NIST Recommendations For Using A Security Configuration Checklist – ITL Security Bulletin
October 2005 | National Vulnerability Database: Helping Information Technology System Users And Developers Find Current Information About Cyber Security Vulnerabilities – ITL Security Bulletin
October 2004 | Securing Voice Over Internet Protocol (IP) Networks – ITL Security Bulletin
January 2004 | Computer Security Incidents: Assessing, Managing, And Controlling The Risks – ITL Security Bulletin
November 2003 | Network Security Testing – ITL Security Bulletin
December 2002 | Security of Public Web Servers – ITL Security Bulletin
October 2002 | Security Patches And The CVE Vulnerability Naming Scheme: Tools To Address Computer System Vulnerabilities – ITL Security Bulletin
January 2002 | Guidelines on Firewalls and Firewall Policy – ITL Security Bulletin
[section] :- PERSONAL IDENTITY VERIFICATION (PIV)
FIPS 201 | Personal Identity Verification for Federal Employees and Contractors
SP 800-116 | A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
SP 800-104 | A Scheme for PIV Visual Card Topography
SP 800-85B | PIV Data Model Test Guidelines
SP 800-85A | PIV Card Application and Middleware Interface Test Guidelines (SP 800-73 compliance)
SP 800-79 | Guidelines for the Accreditation of Personal Identity Verification (PIV) Card Issuers (PCI’s)
SP 800-78 | Cryptographic Algorithms and Key Sizes for Personal Identity Verification
SP 800-76 | Biometric Data Specification for Personal Identity Verification
SP 800-73 | Interfaces for Personal Identity Verification
SP 800-63 Rev 1 | Electronic Authentication Guideline
NIST IR 7452 | Secure Biometric Match-on-Card Feasibility Report
NIST IR 7337 | Personal Identity Verification Demonstration Summary
NIST IR 7313 | 5th Annual PKI R&D Workshop “Making PKI Easy to Use” Proceedings
NIST IR 7284 | Personal Identity Verification Card Management Report
January 2006 | Testing And Validation Of Personal Identity Verification (PIV) Components And Subsystems For Conformance To Federal Information Processing Standard 201 – ITL Security Bulletin
August 2005 | Implementation Of FIPS 201, Personal Identity Verification (PIV) Of Federal Employees And Contractors – ITL Security Bulletin
March 2005 | Personal Identity Verification (PIV) Of Federal Employees And Contractors: Federal Information Processing Standard (FIPS) 201 – ITL Security Bulletin
[section] :- PKI
FIPS 196 | Entity Authentication Using Public Key Cryptography
FIPS 140 | Security Requirements for Cryptographic Modules
SP 800-116 | A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
SP 800-89 | Recommendation for Obtaining Assurances for Digital Signature Applications
SP 800-78 | Cryptographic Algorithms and Key Sizes for Personal Identity Verification
SP 800-76 | Biometric Data Specification for Personal Identity Verification
SP 800-73 | Interfaces for Personal Identity Verification
SP 800-63 Rev 1 | Electronic Authentication Guideline
SP 800-57 | Recommendation on Key Management
SP 800-32 | Introduction to Public Key Technology and the Federal PKI Infrastructure
SP 800-25 | Federal Agency Use of Public Key Technology for Digital Signatures and Authentication
SP 800-15 | Minimum Interoperability Specification for PKI Components (MISPC), Version 1
NIST IR 7452 | Secure Biometric Match-on-Card Feasibility Report
NIST IR 7313 | 5th Annual PKI R&D Workshop “Making PKI Easy to Use” Proceedings
[section] :- PLANNING
FIPS 200 | Minimum Security Requirements for Federal Information and Information Systems
FIPS 199 | Standards for Security Categorization of Federal Information and Information Systems
FIPS 191 | Guideline for The Analysis of Local Area Network Security
FIPS 188 | Standard Security Labels for Information Transfer
FIPS 140 | Security Requirements for Cryptographic Modules
SP 800-123 | Guide to General Server Security
SP 800-113 | Guide to SSL VPNs
SP 800-100 | Information Security Handbook: A Guide for Managers
SP 800-98 | Guidelines for Securing Radio Frequency Identification (RFID) Systems
SP 800-95 | Guide to Secure Web Services
SP 800-94 | Guide to Intrusion Detection and Prevention Systems (IDPS)
SP 800-81 | Secure Domain Name System (DNS) Deployment Guide
SP 800-57 | Recommendation on Key Management
SP 800-55 Rev | Performance Measurement Guide for Information Security
SP 800-54 | Border Gateway Protocol Security
SP 800-53 Rev | Recommended Security Controls for Federal Information Systems and Organizations
SP 800-48 | Guide to Securing Legacy IEEE 802.11 Wireless Networks
SP 800-47 | Security Guide for Interconnecting Information Technology Systems
SP 800-44 | Guidelines on Securing Public Web Servers
SP 800-43 | Systems Administration Guidance for Securing Microsoft Windows 2000 Professional System
SP 800-41 | Guidelines on Firewalls and Firewall Policy
SP 800-40 Ver. 2 | Creating a Patch and Vulnerability Management Program
SP 800-37 | Guidelines for the Security Certification and Accreditation of Federal Information Technology Systems
SP 800-36 | Guide to Selecting Information Technology Security Products
SP 800-35 | Guide to Information Technology Security Services
SP 800-33 | Underlying Technical Models for Information Technology Security
SP 800-32 | Introduction to Public Key Technology and the Federal PKI Infrastructure
SP 800-31 | Intrusion Detection Systems (IDS)
SP 800-30 | Risk Management Guide for Information Technology Systems
SP 800-27 Rev A | Engineering Principles for Information Technology Security (A Baseline for Achieving Security)
SP 800-25 | Federal Agency Use of Public Key Technology for Digital Signatures and Authentication
SP 800-21 Rev 2 | Guideline for Implementing Cryptography in the Federal Government
SP 800-19 | Mobile Agent Security
SP 800-18 Rev 1 | Guide for Developing Security Plans for Information Systems
NIST IR 7359 | Information Security Guide For Government Executives
NIST IR 7358 | Program Review for Information Security Management Assistance (PRISMA)
NIST IR 7316 | Assessment of Access Control Systems
NIST IR 7284 | Personal Identity Verification Card Management Report
NIST IR 6985 | COTS Security Protection Profile - Operating Systems (CSPP-OS) (Worked Example Applying Guidance of NISTIR-6462, CSPP)
NIST IR 6981 | Policy Expression and Enforcement for Handheld Devices
NIST IR 6887 | Government Smart Card Interoperability Specification (GSC-IS), v2.1
NIST IR 6462 | CSPP - Guidance for COTS Security Protection Profiles
October 2008 | Keeping Information Technology (IT) System Servers Secure: A General Guide To Good Practices
July 2007 | Border Gateway Protocol Security – ITL Security Bulletin
May 2007 | Securing Radio Frequency Identification (RFID) Systems – ITL Security Bulletin
April 2007 | Securing Wireless Networks – ITL Security Bulletin
February 2007 | Intrusion Detection And Prevention Systems – ITL Bulletin
November 2006 | Guide To Securing Computers Using Windows XP Home Edition – ITL Bulletin
June 2006 | Domain Name System (DNS) Services: NIST Recommendations For Secure Deployment – ITL Bulletin
May 2006 | An Update On Cryptographic Standards, Guidelines, And Testing Requirements – ITL Security Bulletin
March 2006 | Minimum Security Requirements For Federal Information And Information Systems: Federal Information Processing Standard (FIPS) 200 Approved By The Secretary Of Commerce – ITL Security Bulletin
February 2006 | Creating A Program To Manage Security Patches And Vulnerabilities: NIST Recommendations For Improving System Security – ITL Security Bulletin
January 2006 | Testing And Validation Of Personal Identity Verification (PIV) Components And Subsystems For Conformance To Federal Information Processing Standard 201 – ITL Security Bulletin
December 2005 | Preventing And Handling Malware Incidents: How To Protect Information Technology Systems From Malicious Code And Software – ITL Security Bulletin
November 2005 | Securing Microsoft Windows XP Systems: NIST Recommendations For Using A Security Configuration Checklist – ITL Security Bulletin
August 2005 | Implementation Of FIPS 201, Personal Identity Verification (PIV) Of Federal Employees And Contractors – ITL Security Bulletin
July 2005 | Protecting Sensitive Information That Is Transmitted Across Networks: NIST Guidance For Selecting And Using Transport Layer Security Implementations – ITL Security Bulletin
June 2005 | NIST’s Security Configuration Checklists Program For IT Products – ITL Security Bulletin
May 2005 | Recommended Security Controls For Federal Information Systems: Guidance For Selecting Cost-Effective Controls Using A Risk-Based Process – ITL Security Bulletin
January 2005 | Integrating It Security Into The Capital Planning And Investment Control Process – ITL Security Bulletin
November 2004 | Understanding the New NIST Standards and Guidelines Required by FISMA: How Three Mandated Documents are Changing the Dynamic of Information Security for the Federal Government – ITL Security Bulletin
July 2004 | Guide For Mapping Types Of Information And Information Systems To Security Categories – ITL Security Bulletin
May 2004 | Guide For The Security Certification And Accreditation Of Federal Information Systems – ITL Security Bulletin
March 2004 | Federal Information Processing Standard (FIPS) 199, Standards For Security Categorization Of Federal Information And Information Systems – ITL Security Bulletin
February 2003 | Secure Interconnections for Information Technology Systems – ITL Security Bulletin
December 2002 | Security of Public Web Servers – ITL Security Bulletin
July 2002 | Overview: The Government Smart Card Interoperability Specification – ITL Security Bulletin
February 2002 | Risk Management Guidance For Information Technology Systems – ITL Security Bulletin
January 2002 | Guidelines on Firewalls and Firewall Policy – ITL Security Bulletin
February 2000 | Guideline for Implementing Cryptography in the Federal Government – ITL Security Bulletin
April 1999 | Guide for Developing Security Plans for Information Technology Systems – ITL Security Bulletin
[section] :- RESEARCH
SP 800-124 | Guidelines on Cell Phone and PDA Security
SP 800-101 | Guidelines on Cell Phone Forensics
SP 800-95 | Guide to Secure Web Services
NIST IR 7539 | Symmetric Key Injection onto Smart Cards
NIST IR 7516 | Forensic Filtering of Cell Phone Protocols
NIST IR 7387 | Cell Phone Forensic Tools: An Overview and Analysis Update
NIST IR 7224 | 4th Annual PKI R&D Workshop: Multiple Paths to Trust -- Proceedings
NIST IR 7200 | Proximity Beacons and Mobile Handheld Devices: Overview and Implementation
NIST IR 7056 | Card Technology Development and Gap Analysis Interagency Report
NIST IR 7007 | An Overview of Issues in Testing Intrusion Detection Systems
NIST IR 6068 | Report on the TMACH Experiment
NIST IR 5810 | The TMACH Experiment Phase 1 - Preliminary Developmental Evaluation
NIST IR 5788 | Public Key Infrastructure Invitational Workshop September 28, 1995, MITRE Corporation, McLean, Virginia
June 2007 | Forensic Techniques for Cell Phones – ITL Bulletin
July 2003 | Testing Intrusion Detection Systems – ITL Bulletin
[section] :- RISK ASSESSMENT
FIPS 199 | Standards for Security Categorization of Federal Information and Information Systems
FIPS 191 | Guideline for The Analysis of Local Area Network Security
SP 800-116 | A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
SP 800-115 | Technical Guide to Information Security Testing and Assessment
SP 800-88 | Guidelines for Media Sanitization
SP 800-84 | Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities
SP 800-60 Rev 1 | Guide for Mapping Types of Information and Information Systems to Security Categories
SP 800-53 Rev | Recommended Security Controls for Federal Information Systems and Organizations
SP 800-51 | Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme
SP 800-48 Rev 1 | Wireless Network Security: 802.11, Bluetooth, and Handheld Devices
SP 800-47 | Security Guide for Interconnecting Information Technology Systems
SP 800-40 Ver. 2 | Creating a Patch and Vulnerability Management Program
SP 800-37 | Guidelines for the Security Certification and Accreditation of Federal Information Technology Systems
SP 800-30 | Risk Management Guide for Information Technology Systems
SP 800-28 Rev 2 | Guidelines on Active Content and Mobile Code
SP 800-23 | Guideline to Federal Organizations on Security Assurance and Acquisition/Use of Tested/Evaluated Products
SP 800-21 Rev 2 | Guideline for Implementing Cryptography in the Federal Government
SP 800-19 | Mobile Agent Security
NIST IR 7316 | Assessment of Access Control Systems
NIST IR 6981 | Policy Expression and Enforcement for Handheld Devices
December 2006 | Maintaining Effective Information Technology (IT) Security Through Test, Training, And Exercise Programs – ITL Bulletin
May 2006 | An Update On Cryptographic Standards, Guidelines, And Testing Requirements– ITL Bulletin
February 2006 | Creating A Program To Manage Security Patches And Vulnerabilities: NIST Recommendations For Improving System Security – ITL Bulletin
October 2005 | National Vulnerability Database: Helping Information Technology System Users And Developers Find Current Information About Cyber Security Vulnerabilities – ITL Bulletin
May 2005 | Recommended Security Controls For Federal Information Systems: Guidance For Selecting Cost-Effective Controls Using A Risk-Based Process – ITL Bulletin
July 2004 | Guide For Mapping Types Of Information And Information Systems To Security Categories – ITL Bulletin
May 2004 | Guide For The Security Certification And Accreditation Of Federal Information Systems – ITL Bulletin
March 2004 | Federal Information Processing Standard (FIPS) 199, Standards For Security Categorization Of Federal Information And Information Systems – ITL Bulletin
January 2004 | Computer Security Incidents: Assessing, Managing, And Controlling The Risks – ITL Bulletin
November 2003 | Network Security Testing – ITL Bulletin
February 2003 | Secure Interconnections for Information Technology Systems – ITL Bulletin
October 2002 | Security Patches And The CVE Vulnerability Naming Scheme: Tools To Address Computer System Vulnerabilities – ITL Bulletin
February 2002 | Risk Management Guidance For Information Technology Systems – ITL Bulletin
September 2001 | Security Self-Assessment Guide for Information Technology Systems – ITL Bulletin
[section] :- SERVICES & ACQUISITIONS
FIPS 201 | Personal Identity Verification for Federal Employees and Contractors
FIPS 140 | Security Requirements for Cryptographic Modules
SP 800-124 | Guidelines on Cell Phone and PDA Security
SP 800-121 | Guide to Bluetooth Security
SP 800-115 | Technical Guide to Information Security Testing and Assessment
SP 800-101 | Guidelines on Cell Phone Forensics
SP 800-97 | Guide to IEEE 802.11i: Robust Security Networks
SP 800-85B | PIV Data Model Test Guidelines
SP 800-85A | PIV Card Application and Middleware Interface Test Guidelines (SP 800-73 compliance)
SP 800-79 | Guidelines for the Accreditation of Personal Identity Verification (PIV) Card Issuers (PCI's)
SP 800-78 | Cryptographic Algorithms and Key Sizes for Personal Identity Verification
SP 800-76 | Biometric Data Specification for Personal Identity Verification
SP 800-73 | Interfaces for Personal Identity Verification
SP 800-70 | Security Configuration Checklists Program for IT Products
SP 800-66 Rev 1 | An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
SP 800-65 | Integrating Security into the Capital Planning and Investment Control Process
SP 800-58 | Security Considerations for Voice Over IP Systems
SP 800-53 Rev | Recommended Security Controls for Federal Information Systems and Organizations
SP 800-48 Rev 1 | Wireless Network Security: 802.11, Bluetooth, and Handheld Devices
SP 800-36 | Guide to Selecting Information Technology Security Products
SP 800-35 | Guide to Information Technology Security Services
SP 800-25 | Federal Agency Use of Public Key Technology for Digital Signatures and Authentication
SP 800-21 Rev 2 | Guideline for Implementing Cryptography in the Federal Government
SP 800-15 | Minimum Interoperability Specification for PKI Components (MISPC), Version 1
NIST IR 7387 | Cell Phone Forensic Tools: An Overview and Analysis Update
NIST IR 7313 | 5th Annual PKI R&D Workshop “Making PKI Easy to Use” Proceedings
NIST IR 7284 | Personal Identity Verification Card Management Report
NIST IR 7250 | Cell Phone Forensic Tools: An Overview and Analysis
NIST IR 7100 | PDA Forensic Tools: An Overview and Analysis
NIST IR 6887 | Government Smart Card Interoperability Specification (GSC-IS), v2.1
February 2008 | Federal Desktop Core Configuration (FDCC): Improving Security For Windows Desktop Operating Systems – ITL Bulletin
June 2007 | Forensic Techniques for Cell Phones – ITL Bulletin
April 2007 | Securing Wireless Networks – ITL Bulletin
May 2006 | An Update On Cryptographic Standards, Guidelines, And Testing Requirements – ITL Bulletin
January 2006 | Testing And Validation Of Personal Identity Verification (PIV) Components And Subsystems For Conformance To Federal Information Processing Standard 201 – ITL Bulletin
August 2005 | Implementation Of FIPS 201, Personal Identity Verification (PIV) Of Federal Employees And Contractors – ITL Bulletin
June 2005 | NIST’s Security Configuration Checklists Program For IT Products – ITL Bulletin
March 2005 | Personal Identity Verification (PIV) Of Federal Employees And Contractors: Federal Information Processing Standard (FIPS) 201 – ITL Bulletin
January 2005 | Integrating It Security Into The Capital Planning And Investment Control Process – ITL Bulletin
October 2004 | Securing Voice Over Internet Protocol (IP) Networks – ITL Bulletin
June 2004 | Information Technology Security Services: How To Select, Implement, And Manage – ITL Bulletin
April 2004 | Selecting Information Technology Security Products – ITL Bulletin July 2002 Overview: The Government Smart Card Interoperability Specification – ITL Bulletin
February 2000 | Guideline for Implementing Cryptography in the Federal Government – ITL Bulletin
[section] :- SMART CARDS
FIPS 201 | Personal Identity Verification for Federal Employees and Contractors
SP 800-116 | A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
SP 800-104 | A Scheme for PIV Visual Card Topography
SP 800-85A | PIV Card Application and Middleware Interface Test Guidelines (SP 800-73 compliance)
SP 800-78 | Cryptographic Algorithms and Key Sizes for Personal Identity Verification
SP 800-73 | Interfaces for Personal Identity Verification
NIST IR 7539 | Symmetric Key Injection onto Smart Cards
NIST IR 7452 | Secure Biometric Match-on-Card Feasibility Report
NIST IR 7313 | 5th Annual PKI R&D Workshop “Making PKI Easy to Use” Proceedings
NIST IR 7284 | Personal Identity Verification Card Management Report
NIST IR 7206 | Smart Cards and Mobile Device Authentication: An Overview and Implementation
NIST IR 7056 | Card Technology Development and Gap Analysis Interagency Report
NIST IR 6887 | Government Smart Card Interoperability Specification (GSC-IS), v2.1
January 2006 | Testing And Validation Of Personal Identity Verification (PIV) Components And Subsystems For Conformance To Federal Information Processing Standard 201
August 2005 | Implementation Of FIPS 201, Personal Identity Verification (PIV) Of Federal Employees And Contractors
March 2005 | Personal Identity Verification (PIV) Of Federal Employees And Contractors: Federal Information Processing Standard (FIPS) 201
July 2002 | Overview: The Government Smart Card Interoperability Specification
[section] :- VIRUSES & MALWARE
SP 800-124 | Guidelines on Cell Phone and PDA Security
SP 800-83 | Guide to Malware Incident Prevention and Handling
SP 800-61 | Computer Security Incident Handling Guide
SP 800-53 Rev | Recommended Security Controls for Federal Information Systems and Organizations
SP 800-46 Rev | Guide to Enterprise Telework and Remote Access Security
SP 800-28 Rev 2 | Guidelines on Active Content and Mobile Code
SP 800-19 | Mobile Agent Security
NIST IR 7435 | The Common Vulnerability Scoring System (CVSS) and its Applicability to Federal Agency Systems
[section] :- HISTORICAL ARCHIVES
SP 800-29 | A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2
SP 800-13 | Telecommunications Security Guidelines for Telecommunications Management Network
NIST IR 6483 | Randomness Testing of the Advanced Encryption Standard Finalist Candidates1
NIST IR 6390 | Randomness Testing of the Advanced Encryption Standard Candidate Algorithms
NIST IR 5495 | Computer Security Training & Awareness Course Compendium
NIST IR 5472 | A Head Start on Assurance Proceedings of an Invitational Workshop on Information Technology (IT) Assurance and Trustworthiness
NIST IR 5308 | General Procedures for Registering Computer Security Objects
NIST IR 5283 | Security of SQL-Based Implementations of Product Data Exchange Using Step
NIST IR 5234 | Report of the NIST Workshop on Digital Signature Certificate Management, December 10-11, 1992
NIST IR 5232 | Report of the NSF/NIST Workshop on NSFNET/NREN Security, July 6-7, 1992
NIST IR 5153 | Minimum Security Requirements for Multi-User Operating Systems
NIST IR 4976 | Assessing Federal and Commercial Information Security Needs
NIST IR 4939 | Threat Assessment of Malicious Code and External Attacks
NIST IR 4774 | A Review of U.S. and European Security Evaluation Criteria
NIST IR 4749 | Sample Statements of Work for Federal Computer Security Services: For use In-House or Contracting Out
NIST IR 4734 | Foundations of a Security Policy for use of the National Research and Educational Network
July 2001 | A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2
October 2000 | An Overview Of The Common Criteria Evaluation And Validation Scheme
July 2000 | Identifying Critical Patches With ICat
June 2000 | Mitigating Emerging Hacker Threats
December 1999 | Operating System Security: Adding to the Arsenal of Security Techniques
November 1999 | Acquiring and Deploying Intrusion Detection Systems
September 1999 | Securing Web Servers
August 1999 | The Advanced Encryption Standard: A Status Report
May 1999 | Computer Attacks: What They Are and How to Defend Against Them
February 1999 | Enhancements to Data Encryption and Digital Signature Federal Standards
January 1999 | Secure Web-Based Access to High Performance Computing Resources
November 1998 | Common Criteria: Launching the International Standard
September 1998 | Cryptography Standards and Infrastructures for the Twenty-First Century
June 1998 | Training for Information Technology Security: Evaluating the Effectiveness of Results-Based Learning
April 1998 | Training Requirements for Information Technology Security: An Introduction to Results-Based Learning
March 1998 | Management of Risks in Information Systems: Practices of Successful Organizations
February 1998 | Information Security and the World Wide Web (WWW)
November 1997 | Internet Electronic Mail
July 1997 | Public Key Infrastructure Technology
April 1997 | Security Considerations In Computer Support And Operations
March 1997 | Audit Trails
February 1997 | Advanced Encryption Standard
January 1997 | Security Issues for Telecommuting
October 1996 | Generally Accepted System Security Principles (GSSPs): Guidance On Securing Information Technology (IT) Systems
August 1996 | Implementation Issues for Cryptography
June 1996 | Information Security Policies For Changing Information Technology Environments
May 1996 | The World Wide Web: Managing Security Risks
February 1996 | Human/Computer Interface Security Issue
September 1995 | Preparing for Contingencies and Disasters
August 1995 | FIPS 140-1: A Framework for Cryptographic Standards
February 1995 | The Data Encryption Standard: An Update
November 1994 | Digital Signature Standard
May 1994 | Reducing the Risks of Internet Connection and Use
March 1994 | Threats to Computer Systems: An Overview
January 1994 | Computer Security Policy
November 1993 | People: An Important Asset in Computer Security
August 1993 | Security Program Management
July 1993 | Connecting to the Internet: Security Considerations
May 1993 | Security Issues in Public Access Systems
November 1992 | Sensitivity of Information
October 1992 | Disposition of Sensitive Automated Information
February 1992 | Establishing a Computer Security Incident Handling Capability
November 1991 | Advanced Authentication Technology
February 1991 | Computer Security Roles of NIST and NSA
August 1990 | Computer Virus Attacks
[section] :- ACCESS CONTROL
FIPS 201 | Personal Identity Verification for Federal Employees and Contractors
FIPS 200 | Minimum Security Requirements for Federal Information and Information Systems
FIPS 188 | Standard Security Labels for Information Transfer
SP 800-124 | Guidelines on Cell Phone and PDA Security
SP 800-123 | Guide to General Server Security
SP 800-121 | Guide to Bluetooth Security
SP 800-116 | A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
SP 800-114 | User's Guide to Securing External Devices for Telework and Remote Access
SP 800-113 | Guide to SSL VPNs
SP 800-104 | A Scheme for PIV Visual Card Topography
SP 800-100 | Information Security Handbook: A Guide for Managers
SP 800-97 | Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i
SP 800-96 | PIV Card / Reader Interoperability Guidelines
SP 800-87 | Codes for the Identification of Federal and Federally-Assisted Organizations
SP 800-83 | Guide to Malware Incident Prevention and Handling
SP 800-81 | Secure Domain Name System (DNS) Deployment Guide
SP 800-78 | Cryptographic Algorithms and Key Sizes for Personal Identity Verification
SP 800-77 | Guide to IPSec VPNs
SP 800-76 | Biometric Data Specification for Personal Identity Verification
SP 800-73 | Interfaces for Personal Identity Verification
SP 800-68 Rev 1 | Guide to Securing Microsoft Windows XP Systems for IT Professionals
SP 800-66 Rev 1 | An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
SP 800-63 Rev 1 | Electronic Authentication Guideline
SP 800-58 | Security Considerations for Voice Over IP Systems
SP 800-57 | Recommendation for Key Management—Part 2: Best Practices for Key Management Organization
SP 800-53 Rev 3 | Recommended Security Controls for Federal Information Systems and Organizations
SP 800-48 Rev 1 | Guide to Securing Legacy IEEE 802.11 Wireless Networks
SP 800-46 Rev 1 | Guide to Enterprise Telework and Remote Access Security
SP 800-45 Rev 2 | Guidelines on Electronic Mail Security
SP 800-44 | Guidelines on Securing Public Web Servers
SP 800-43 | Systems Administration Guidance for Securing Microsoft Windows 2000 Professional System
SP 800-41 | Guidelines on Firewalls and Firewall Policy
SP 800-36 | Guide to Selecting Information Technology Security Products
SP 800-28 Rev 2 | Guidelines on Active Content and Mobile Code
SP 800-24 | PBX Vulnerability Analysis: Finding Holes in Your PBX Before Someone Else Does
SP 800-19 | Mobile Agent Security
SP 800-14 | Generally Accepted Principles and Practices for Securing Information Technology Systems
SP 800-12 | An Introduction to Computer Security: The NIST Handbook
[section] :- AUDIT & ACCOUNTABILITY
FIPS 200 | Minimum Security Requirements for Federal Information and Information Systems
FIPS 198 | The Keyed-Hash Message Authentication Code (HMAC)
SP 800-123 | Guide to General Server Security
SP 800-115 | Technical Guide to Information Security Testing and Assessment
SP 800-100 | Information Security Handbook: A Guide for Managers
SP 800-94 | Guide to Intrusion Detection and Prevention Systems (IDPS)
SP 800-92 | Guide to Computer Security Log Management
SP 800-89 | Recommendation for Obtaining Assurances for Digital Signature Applications
SP 800-86 | Guide to Integrating Forensic Techniques into Incident Response
SP 800-83 | Guide to Malware Incident Prevention and Handling
SP 800-72 | Guidelines on PDA Forensics
SP 800-68 Rev 1 | Guide to Securing Microsoft Windows XP Systems for IT Professional
SP 800-66 Rev 1 | An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
SP 800-57 | Recommendation on Key Management
SP 800-53 Rev 3 | Recommended Security Controls for Federal Information Systems and Organizations
SP 800-52 | Guidelines on the Selection and Use of Transport Layer Security
SP 800-49 | Federal S/MIME V3 Client Profile
SP 800-45 | Guidelines on Electronic Mail Security
SP 800-44 | Guidelines on Securing Public Web Servers
SP 800-19 | Mobile Agent Security
SP 800-14 | Generally Accepted Principles and Practices for Securing Information Technology Systems
SP 800-12 | An Introduction to Computer Security: The NIST Handbook
[section] :- AWARENESS & TRAINING
FIPS 200 | Minimum Security Requirements for Federal Information and Information Systems
SP 800-100 | Information Security Handbook: A Guide for Managers
SP 800-66 Rev 1 | An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
SP 800-53 Rev 3 | Recommended Security Controls for Federal Information Systems and Organizations
SP 800-50 | Building an Information Technology Security Awareness and Training Program
SP 800-40 Rev 2 | Creating a Patch and Vulnerability Management Program
SP 800-16 | Information Technology Security Training Requirements: A Role- and Performance-Based Model
SP 800-14 | Generally Accepted Principles and Practices for Securing Information Technology Systems
SP 800-12 | An Introduction to Computer Security: The NIST Handbook
[section] :- CERTIFICATION, ACCREDITATION, & SECURITY ASSESSMENTS
FIPS 200 | Minimum Security Requirements for Federal Information and Information Systems
SP 800-115 | Technical Guide to Information Security Testing and Assessment
SP 800-100 | Information Security Handbook: A Guide for Managers
SP 800-85B | PIV Data Model Test Guidelines
SP 800-85A | PIV Card Application and Middleware Interface Test Guidelines
SP 800-79 | Guidelines for the Certification and Accreditation of PIV Card Issuing Organizations
SP 800-76 | Biometric Data Specification for Personal Identity Verification
SP 800-66 Rev 1 | An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
SP 800-65 Rev 1 | Integrating Security into the Capital Planning and Investment Control Process
SP 800-55 Rev 1 | Performance Measurement Guide for Information Security
SP 800-53 Rev 3 | Recommended Security Controls for Federal Information Systems and Organizations
SP 800-53A | Guide for Assessing the Security Controls in Federal Information Systems
SP 800-47 | Security Guide for Interconnecting Information Technology Systems
SP 800-37 | Guidelines for the Security Certification and Accreditation of Federal Information Technology Systems
SP 800-36 | Guide to Selecting Information Technology Security Products
SP 800-35 | Guide to Information Technology Security Services
SP 800-30 | Risk Management Guide for Information Technology Systems
SP 800-23 | Guideline to Federal Organizations on Security Assurance and Acquisition/Use of Tested/Evaluated Products
SP 800-22 Rev 1 | A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
SP 800-20 | Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS): Requirements and Procedures
SP 800-18 Rev 1 | Guide for Developing Security Plans for Information Systems
SP 800-17 | Modes of Operation Validation System (MOVS): Requirements and Procedures
SP 800-14 | Generally Accepted Principles and Practices for Securing Information Technology Systems
SP 800-12 | An Introduction to Computer Security: The NIST Handbook
[section] :- CONFIGURATION MANAGEMENT
FIPS 200 | Minimum Security Requirements for Federal Information and Information Systems
SP 800-124 | Guidelines on Cell Phone and PDA Security
SP 800-123 | Guide to General Server Security
SP 800-121 | Guide to Bluetooth Security
SP 800-114 | User's Guide to Securing External Devices for Telework and Remote Access
SP 800-111 | Guide to Storage Encryption Technologies for End User Devices
SP 800-100 | Information Security Handbook: A Guide for Managers
SP 800-86 | Guide to Integrating Forensic Techniques into Incident Response
SP 800-83 | Guide to Malware Incident Prevention and Handling
SP 800-81 | Secure Domain Name System (DNS) Deployment Guide
SP 800-70 | Security Configuration Checklists Program for IT Products
SP 800-68 Rev 1 | Guide to Securing Microsoft Windows XP Systems for IT Professionals
SP 800-55 Rev 1 | Performance Measurement Guide for Information Security
SP 800-54 | Border Gateway Protocol Security
SP 800-53 Rev 3 | Recommended Security Controls for Federal Information Systems and Organizations
SP 800-48 Rev 1 | Guide to Securing Legacy IEEE 802.11 Wireless Networks
SP 800-46 Rev 1 | Guide to Enterprise Telework and Remote Access Security
SP 800-45 | Guidelines on Electronic Mail Security
SP 800-44 | Guidelines on Securing Public Web Servers SP 800-43 Systems Administration Guidance for Securing Microsoft Windows 2000 Professional System
SP 800-40 | Creating a Patch and Vulnerability Management Program
SP 800-37 | Guidelines for the Security Certification and Accreditation of Federal Information Technology Systems
SP 800-35 | Guide to Information Technology Security Services
SP 800-14 | Generally Accepted Principles and Practices for Securing Information Technology Systems
SP 800-12 | An Introduction to Computer Security: The NIST Handbook
[section] :- CONTINGENCY PLANNING
FIPS 200 | Minimum Security Requirements for Federal Information and Information Systems
SP 800-100 | Information Security Handbook: A Guide for Managers
SP 800-86 | Guide to Integrating Forensic Techniques into Incident Response
SP 800-83 | Guide to Malware Incident Prevention and Handling
SP 800-81 | Secure Domain Name System (DNS) Deployment Guide
SP 800-66 Rev 1 | An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
SP 800-57 | Recommendation on Key Management
SP 800-53 Rev 3 | Recommended Security Controls for Federal Information Systems and Organizations
SP 800-50 | Building an Information Technology Security Awareness and Training Program
SP 800-46 Rev 1 | Guide to Enterprise Telework and Remote Access Security
SP 800-45 | Guidelines on Electronic Mail Security
SP 800-44 | Guidelines on Securing Public Web Servers
SP 800-43 | Systems Administration Guidance for Securing Microsoft Windows 2000 Professional System
SP 800-41 | Guidelines on Firewalls and Firewall Policy
SP 800-34 | Contingency Planning Guide for Information Technology Systems
SP 800-25 | Federal Agency Use of Public Key Technology for Digital Signatures and Authentication
SP 800-24 | PBX Vulnerability Analysis: Finding Holes in Your PBX Before Someone Else Does
SP 800-21 Rev 2 | Guideline for Implementing Cryptography in the Federal Government
SP 800-14 | Generally Accepted Principles and Practices for Securing Information Technology Systems
SP 800-13 | Telecommunications Security Guidelines for Telecommunications Management Network
SP 800-12 | An Introduction to Computer Security: The NIST Handbook
[section] :- IDENTIFICATION AND AUTHENTICATION
FIPS 201 | Personal Identity Verification for Federal Employees and Contractors
FIPS 200 | Minimum Security Requirements for Federal Information and Information Systems
FIPS 190 | Guideline for the Use of Advanced Authentication Technology Alternatives
FIPS 140 | Security Requirements for Cryptographic Modules
SP 800-124 | Guidelines on Cell Phone and PDA Security
SP 800-123 | Guide to General Server Security
SP 800-121 | Guide to Bluetooth Security
SP 800-116 | A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
SP 800-113 | Guide to SSL VPNs
SP 800-107 | Recommendation for Applications Using Approved Hash Algorithms
SP 800-106 | Randomized Hashing for Digital Signatures
SP 800-104 | A Scheme for PIV Visual Card Topography
SP 800-100 | Information Security Handbook: A Guide for Managers
SP 800-98 | Guidelines for Securing Radio Frequency Identification (RFID) Systems
SP 800-97 | Guide to IEEE 802.11i: Robust Security Networks
SP 800-96 | PIV Card / Reader Interoperability Guidelines
SP 800-87 Rev 1 | Codes for the Identification of Federal and Federally-Assisted Organizations
SP 800-86 | Guide to Integrating Forensic Techniques into Incident Response
SP 800-81 | Secure Domain Name System (DNS) Deployment Guide
SP 800-78 | Cryptographic Algorithms and Key Sizes for Personal Identity Verification
SP 800-77 | Guide to IPSec VPNs
SP 800-76 | Biometric Data Specification for Personal Identity Verification
SP 800-73 | Interfaces for Personal Identity Verification
SP 800-72 | Guidelines on PDA Forensics
SP 800-68 Rev 1 | Guide to Securing Microsoft Windows XP Systems for IT Professionals:
SP 800-66 Rev 1 | An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
SP 800-63 Rev 1 | Electronic Authentication Guide
SP 800-53 Rev 3 | Recommended Security Controls for Federal Information Systems and Organizations
SP 800-52 | Guidelines on the Selection and Use of Transport Layer Security
SP 800-48 Rev 1 | Wireless Network Security: 802.11, Bluetooth, and Handheld Devices
SP 800-46 Rev 1 | Guide to Securing Legacy IEEE 802.11 Wireless Networks
SP 800-45 | Guidelines on Electronic Mail Security
SP 800-44 | Guidelines on Securing Public Web Servers
SP 800-36 | Guide to Selecting Information Technology Security Products
SP 800-32 | Introduction to Public Key Technology and the Federal PKI Infrastructure
SP 800-25 | Federal Agency Use of Public Key Technology for Digital Signatures and Authentication
SP 800-24 | PBX Vulnerability Analysis: Finding Holes in Your PBX Before Someone Else Does
SP 800-14 | Generally Accepted Principles and Practices for Securing Information Technology Systems
SP 800-12 | An Introduction to Computer Security: The NIST Handbook
[section] :- INCIDENT RESPONSE
FIPS 200 | Minimum Security Requirements for Federal Information and Information Systems
SP 800-123 | Guide to General Server Security
SP 800-101 | Guidelines on Cell Phone Forensics
SP 800-100 | Information Security Handbook: A Guide for Managers
SP 800-94 | Guide to Intrusion Detection and Prevention Systems (IDPS)
SP 800-92 | Guide to Computer Security Log Management
SP 800-83 | Guide to Malware Incident Prevention and Handling
SP 800-66 Rev 1 | An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
SP 800-61 Rev 1 | Computer Security Incident Handling Guide
SP 800-53 Rev 3 | Recommended Security Controls for Federal Information Systems and Organizations
SP 800-50 | Building an Information Technology Security Awareness and Training Program
SP 800-36 | Guide to Selecting Information Technology Security Products
SP 800-21 Rev 2 | Guideline for Implementing Cryptography in the Federal Government
SP 800-14 | Generally Accepted Principles and Practices for Securing Information Technology Systems
SP 800-12 | An Introduction to Computer Security: The NIST Handbook
[section] :- MAINTENANCE
FIPS 200 | Minimum Security Requirements for Federal Information and Information Systems
SP 800-123 | Guide to General Server Security
SP 800-100 | Information Security Handbook: A Guide for Managers
SP 800-88 | Media Sanitization Guide
SP 800-77 | Guide to IPSec VPNs
SP 800-55 Rev 1 | Performance Measurement Guide for Information Security
SP 800-53 Rev 3 | Recommended Security Controls for Federal Information Systems and Organizations
SP 800-34 | Contingency Planning Guide for Information Technology Systems
SP 800-24 | PBX Vulnerability Analysis: Finding Holes in Your PBX Before Someone Else Does
SP 800-14 | Generally Accepted Principles and Practices for Securing Information Technology Systems
SP 800-12 | An Introduction to Computer Security: The NIST Handbook
[section] :- MEDIA PROTECTION
FIPS 200 | Minimum Security Requirements for Federal Information and Information Systems
SP 800-111 | Guide to Storage Encryption Technologies for End User Devices
SP 800-100 | Information Security Handbook: A Guide for Managers
SP 800-92 | Guide to Computer Security Log Management
SP 800-88 | Media Sanitization Guide
SP 800-86 | Guide to Integrating Forensic Techniques into Incident Response
SP 800-72 | Guidelines on PDA Forensics
SP 800-66 Rev 1 | An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
SP 800-57 | Recommendation on Key Management
SP 800-53 Rev 3 | Recommended Security Controls for Federal Information Systems and Organizations
SP 800-46 Rev 1 | Guide to Enterprise Telework and Remote Access Security
SP 800-36 | Guide to Selecting Information Technology Security Products
SP 800-24 | PBX Vulnerability Analysis: Finding Holes in Your PBX Before Someone Else Does
SP 800-14 | Generally Accepted Principles and Practices for Securing Information Technology Systems
SP 800-12 | An Introduction to Computer Security: The NIST Handbook
[section] :- PERSONNEL SECURITY
FIPS 200 | Minimum Security Requirements for Federal Information and Information Systems
SP 800-116 | A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
SP 800-104 | A Scheme for PIV Visual Card Topography
SP 800-100 | Information Security Handbook: A Guide for Managers
SP 800-66 Rev 1 | An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
SP 800-63 Rev 1 | Electronic Authentication Guide
SP 800-53 Rev 3 | Recommended Security Controls for Federal Information Systems and Organizations
SP 800-14 | Generally Accepted Principles and Practices for Securing Information Technology Systems
SP 800-12 | An Introduction to Computer Security: The NIST Handbook
[section] :- PHYSICAL & ENVIRONMENTAL PROTECTION
FIPS 200 | Minimum Security Requirements for Federal Information and Information Systems
SP 800-123 | Guide to General Server Security
SP 800-116 | A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
SP 800-104 | A Scheme for PIV Visual Card Topography
SP 800-100 | Information Security Handbook: A Guide for Managers
SP 800-98 | Guidelines for Securing Radio Frequency Identification (RFID) Systems
SP 800-96 | PIV Card / Reader Interoperability Guidelines
SP 800-92 | Guide to Computer Security Log Management
SP 800-86 | Guide to Integrating Forensic Techniques into Incident Response
SP 800-78 | Cryptographic Algorithms and Key Sizes for Personal Identity Verification
SP 800-76 | Biometric Data Specification for Personal Identity Verification
SP 800-73 | Interfaces for Personal Identity Verification
SP 800-66 Rev 1 | An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA)
[section] :- SECURITY RULE
SP 800-58 | Security Considerations for Voice Over IP Systems
SP 800-53 Rev 3 | Recommended Security Controls for Federal Information Systems and Organizations
SP 800-24 | PBX Vulnerability Analysis: Finding Holes in Your PBX Before Someone Else Does
SP 800-14 | Generally Accepted Principles and Practices for Securing Information Technology Systems
SP 800-12 | An Introduction to Computer Security: The NIST Handbook
[section] :- PLANNING
FIPS 201 | Personal Identity Verification for Federal Employees and Contractors
FIPS 200 | Minimum Security Requirements for Federal Information and Information Systems
FIPS 199 | Standards for Security Categorization of Federal Information and Information Systems
SP 800-123 | Guide to General Server Security
SP 800-121 | Guide to Bluetooth Security
SP 800-116 | A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
SP 800-113 | Guide to SSL VPNs
SP 800-101 | Guidelines on Cell Phone Forensics
SP 800-100 | Information Security Handbook: A Guide for Managers
SP 800-95 | Guide to Secure Web Services
SP 800-94 | Guide to Intrusion Detection and Prevention Systems (IDPS)
SP 800-89 | Recommendation for Obtaining Assurances for Digital Signature Applications
SP 800-81 | Secure Domain Name System (DNS) Deployment Guide
SP 800-66 Rev 1 | An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule