- Home
- Government
- Agencies & Services List P - Z
- Technology
- Security
- For Governments & Professionals
- Full Resource List for IT Professionals
Full Resource List for IT Professionals
- SP 800-165 (PDF): 2012 Computer Security Division Annual Report
- SP 800-100 (PDF): Information Security Handbook: A Guide for Managers
- SP 800-65: Revision 1 DRAFT Recommendations for Integrating Information Security into the Capital Planning and Investment Control Process (CPIC)
- SP 800-65 (PDF): Integrating IT Security into the Capital Planning and Investment Control Process
- SP 800-64 (PDF): Revision 2 Security Considerations in the System Development Life Cycle
- SP 800-55 (PDF): Revision 1 Performance Measurement Guide for Information Security
- SP 800-50 (PDF): Building an Information Technology Security Awareness and Training Program
- SP 800-39 (PDF): Managing Information Security Risk: Organization, Mission, and Information System View
- SP 800-33 (PDF): Underlying Technical Models for Information Technology Security
- SP 800-16: Rev. 1 DRAFT Information Security Training Requirements: A Role- and Performance-Based Model
- SP 800-16 (PDF): Information Technology Security Training Requirements: A Role- and Performance-Based Model
- SP 800-14 (PDF): Generally Accepted Principles and Practices for Securing Information Technology Systems
- SP 800-13 (PDF): Telecommunications Security Guidelines for Telecommunications Management Network
- SP 800-12 (PDF): An Introduction to Computer Security: The NIST Handbook
- SP 800-24 (PDF): PBX Vulnerability Analysis: Finding Holes in Your PBX Before Someone Else Does
- SP 800-61 (PDF): Revision 2 Computer Security Incident Handling Guide
- SP 800-72 (PDF): Guidelines on PDA Forensics
- SP 800-83 (PDF): Revision 1 Guide to Malware Incident Prevention and Handling for Desktops and Laptops
- SP 800-86 (PDF): Guide to Integrating Forensic Techniques into Incident Response
- SP 800-92 (PDF): Guide to Computer Security Log Management
- SP 800-93 (PDF): Guide to Intrusion Detection and Prevention Systems (IDPS)
- SP 800-94: Revision 1 DRAFT Guide to Intrusion Detection and Prevention Systems (IDPS)
- SP 800-101 (PDF): Guidelines on Cell Phone Forensics
- SP 800-101 (PDF): Revision 1 DRAFT Guidelines on Mobile Device Forensics
- SP 800-137 (PDF): Information Security Continuous Monitoring for Federal Information Systems and Organizations
- SP 800-161: DRAFT Supply Chain Risk Management Practices for Federal Information Systems and Organizations
- SP 800-145 (PDF): The NIST Definition of Cloud Computing
- SP 800-142 (PDF): Practical Combinatorial Testing
- SP 800-125 (PDF): Guide to Security for Full Virtualization Technologies
- SP 800-124 (PDF): Revision 1 Guidelines for Managing the Security of Mobile Devices in the Enterprise
- SP 800-123 (PDF): Guide to General Server Security
- SP 800-121 (PDF): Revision 1 Guide to Bluetooth Security
- SP 800-117: Revision 1 DRAFT Guide to Adopting and Using the Security Content Automation Protocol (SCAP) Version 1.2
- SP 800-117 (PDF): Guide to Adopting and Using the Security Content Automation Protocol (SCAP) Version 1.0
- SP 800-115 (PDF): Technical Guide to Information Security Testing and Assessment
- SP 800-88 Revision 1 (PDF): DRAFT Guidelines for Media Sanitization
- SP 800-88 (PDF): Guidelines for Media Sanitization
- SP 800-87 Rev 1 (PDF): Codes for Identification of Federal and Federally-Assisted Organizations
- SP 800-85 B-1 (PDF): DRAFT PIV Data Model Conformance Test Guidelines
- SP 800-85 B (PDF): PIV Data Model Test Guidelines
- SP 800-85 A-2 (PDF): PIV Card Application and Middleware Interface Test Guidelines (SP800-73-3 Compliance)
- SP 800-84 (PDF): Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities
- SP 800-82 Revision 1 (PDF): Guide to Industrial Control Systems (ICS) Security
- SP 800-82 (PDF): Guide to Industrial Control Systems (ICS) Security
- SP 800-66 Rev 1 (PDF): An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
- SP 800-60 Revision 1 (PDF): Guide for Mapping Types of Information and Information Systems to Security Categories
- SP 800-60 Revision 1 (PDF): Appendices Guide for Mapping Types of Information and Information Systems to Security Categories
- SP 800-59 (PDF): Guideline for Identifying an Information System as a National Security System
- SP 800-37 Revision 1 (PDF): Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach
- SP 800-34 Revision 1 (PDF): Contingency Planning Guide for Federal Information Systems
- SP 800-30 Revision 1 (PDF): Guide for Conducting Risk Assessments
- SP 800-27 Revision A (PDF): Engineering Principles for Information Technology Security (A Baseline for Achieving Security)
- SP 800-23 (PDF): Guidelines to Federal Organizations on Security Assurance and Acquisition/Use of Tested/Evaluated Products
- SP 800-18 Revision 1 (PDF): Guide for Developing Security Plans for Federal Information Systems
- SP 800-164: DRAFT Guidelines on Hardware-Rooted Security in Mobile Devices
- SP 800-162: DRAFT Guide to Attribute Based Access Control (ABAC) Definition and Considerations
- SP 800-155: DRAFT BIOS Integrity Measurement Guidelines
- SP 800-153 (PDF): Guidelines for Securing Wireless Local Area Networks (WLANs)
- SP 800-152: DRAFT A Profile for U. S Federal Cryptographic Key Management Systems (CKMS)
- SP 800-147 B: DRAFT BIOS Protection Guidelines for Servers
- SP 800-147 (PDF): Basic Input/Output System (BIOS) Protection Guidelines
- SP 800-146 (PDF): Cloud Computing Synopsis and Recommendations
- SP 800-144 (PDF): Guidelines on Security and Privacy in Public Cloud Computing
- SP 800-135 (PDF): Revision 1 Recommendation for Existing Application-Specific Key Derivation Functions
- SP 800-133: Recommendation for Cryptographic Key Generation
- SP 800-132 (PDF): Recommendation for Password-Based Key Derivation Part 1: Storage Applications
- SP 800-131 (PDF): A Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths
- SP 800-130 (PDF): A Framework for Designing Cryptographic Key Management Systems
- SP 800-128 (PDF): Guide for Security-Focused Configuration Management of Information Systems
- SP 800-127 (PDF): Guide to Securing WiMAX Wireless Communications
- SP 800-126 Revision 2 (PDF): The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.2
- SP 800-126 Revision 1 (PDF): The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.1
- SP 800-126 (PDF): The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.0
- SP 800-122 (PDF): Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)
- SP 800-120 (PDF): Recommendation for EAP Methods Used in Wireless Network Access Authentication
- SP 800-119 (PDF): Guidelines for the Secure Deployment of IPv6
- SP 800-118: DRAFT Guide to Enterprise Password Management
- SP 800-116 (PDF): A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
- SP 800-114 (PDF): User's Guide to Securing External Devices for Telework and Remote Access
- SP 800-113 (PDF): Guide to SSL VPNs
- SP 800-111 (PDF): Guide to Storage Encryption Technologies for End User Devices
- SP 800-108 (PDF): Recommendation for Key Derivation Using Pseudorandom Functions
- SP 800-107 (PDF): Revision 1 Recommendation for Applications Using Approved Hash Algorithms
- SP 800-106 (PDF): Randomized Hashing for Digital Signatures
- SP 800-104 (PDF): A Scheme for PIV Visual Card Topography
- SP 800-103: DRAFT An Ontology of Identity Credentials, Part I: Background and Formulation
- SP 800-102 (PDF): Recommendation for Digital Signature Timeliness
- SP 800-98 (PDF): Guidelines for Securing Radio Frequency Identification (RFID) Systems
- SP 800-97 (PDF): Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i
- SP 800-96 (PDF): PIV Card to Reader Interoperability Guidelines
- SP 800-95 (PDF): Guide to Secure Web Services
- SP 800-90 (PDF): A Recommendation for Random Number Generation Using Deterministic Random Bit Generators
- SP 800-90: A Rev 1 B and C DRAFT Draft SP 800-90 Series: Random Bit Generators
- SP 800-89 (PDF): Recommendation for Obtaining Assurances for Digital Signature Applications
- SP 800-81 Revision 1 (PDF): Secure Domain Name System (DNS) Deployment Guide
- SP 800-79 -1 (PDF): Guidelines for the Accreditation of Personal Identity Verification (PIV) Card Issuers (PCI's)
- SP 800-78 -4 (PDF): DRAFT Cryptographic Algorithms and Key Sizes for Personal Identity Verification
- SP 800-78 -3 (PDF): Cryptographic Algorithms and Key Sizes for Personal Identification Verification (PIV)
- SP 800-77 (PDF): Guide to IPsec VPNs
- SP 800-76 -2 (PDF): Biometric Specifications for Personal Identity Verification
- SP 800-76 -1 (PDF): Biometric Data Specification for Personal Identity Verification
- SP 800-73 -4 : DRAFT Interfaces for Personal Identity Verification (3 Parts)
- SP 800-73 -3 (PDF): Part 1 Interfaces for Personal Identity Verification (4 Parts)
- SP 800-73 -3 (PDF): Part 2 Interfaces for Personal Identity Verification (4 Parts)
- SP 800-73 -3 (PDF): Part 3 Interfaces for Personal Identity Verification (4 Parts)
- SP 800-73 -3 (PDF): Part 4 Interfaces for Personal Identity Verification (4 Parts)
- SP 800-70 Revision 2 (PDF): National Checklist Program for IT Products: Guidelines for Checklist Users and Developers
- SP 800-69: Guidance for Securing Microsoft Windows XP Home Edition: A NIST Security Configuration Checklist
- SP 800-68 Revision 1: Guide to Securing Microsoft Windows XP Systems for IT Professionals
- SP 800-67 Revision 1 (PDF): Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher
- SP 800-63 -2 (PDF): Electronic Authentication Guideline
- SP 800-63 -1 : Electronic Authentication Guideline
- SP 800-58 (PDF): Security Considerations for Voice Over IP Systems
- SP 800-57 Part 1 (PDF): Recommendation for Key Management: Part 1: General (Revision 3)
- SP 800-57 Part 2 (PDF): Recommendation for Key Management: Part 2: Best Practices for Key Management Organization
- SP 800-57 Part 3 (PDF): Recommendation for Key Management, Part 3 Application-Specific Key Management Guidance
- SP 800-56 A Revision 2 (PDF): Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography
- SP 800-56 B (PDF): Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptography
- SP 800-56 C (PDF): Recommendation for Key Derivation through Extraction-then-Expansion
- SP 800-54 (PDF): Border Gateway Protocol Security
- SP 800-53 Revision 4 : Security and Privacy Controls for Federal Information Systems and Organizations
- SP 800-53 Revision 3 (PDF): Recommended Security Controls for Federal Information Systems and Organizations
- SP 800-53 A Revision 1 (PDF): Guide for Assessing the Security Controls in Federal Information Systems and Organizations, Building Effective Security Assessment Plans
- SP 800-51 Revision 1 (PDF): Guide to Using Vulnerability Naming Schemes
- SP 800-49 (PDF): Federal S/MIME V3 Client Profile
- SP 800-48 Revision 1 (PDF): Guide to Securing Legacy IEEE 802.11 Wireless Networks
- SP 800-47 (PDF): Security Guide for Interconnecting Information Technology Systems
- SP 800-46 Revision 1 (PDF): Guide to Enterprise Telework and Remote Access Security
- SP 800-45 Version 2 (PDF): Guidelines on Electronic Mail Security
- SP 800-44 Version 2 (PDF): Guidelines on Securing Public Web Servers
- SP 800-43: Systems Administration Guidance for Windows 2000 Professional System
- SP 800-41 Revision 1 (PDF): Guidelines on Firewalls and Firewall Policy
- SP 800-40 Revision 3 (PDF): Guide to Enterprise Patch Management Technologies
- SP 800-40 (PDF): Version 2.0 Creating a Patch and Vulnerability Management Program
- SP 800-38 (PDF): A Recommendation for Block Cipher Modes of Operation - Methods and Techniques
- SP 800-38 A - Addendum (PDF): Recommendation for Block Cipher Modes of Operation: Three Variants of Ciphertext Stealing for CBC Mode
- SP 800-38 B (PDF): Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication
- SP 800-38 C (PDF): Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality
- SP 800-38 D (PDF): Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC
- SP 800-38 E (PDF): Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices
- SP 800-38 F: Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping
- SP 800-38 G: DRAFT Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption
- SP 800-36 (PDF): Guide to Selecting Information Technology Security Products
- SP 800-35 (PDF): Guide to Information Technology Security Services
- SP 800-32 (PDF): Introduction to Public Key Technology and the Federal PKI Infrastructure
- SP 800-29 (PDF): A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2
- SP 800-28 (PDF): Version 2 Guidelines on Active Content and Mobile Code
- SP 800-25 (PDF): Federal Agency Use of Public Key Technology for Digital Signatures and Authentication
- SP 800-22 Revision 1a (PDF): A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
- SP 800-21 (PDF): 2nd edition Guideline for Implementing Cryptography in the Federal Government
- SP 800-20 (PDF): Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS): Requirements and Procedures
- SP 800-19 (PDF): Mobile Agent Security
- SP 800-17 (PDF): Modes of Operation Validation System (MOVS): Requirements and Procedures
- SP 800-15 (PDF): MISPC Minimum Interoperability Specification for PKI Components, Version 1