Draft
|
SP-No.
|
Title
|
Release
|
Revised
|
File size
|
Draft
|
SP800-79
|
Guidelines
for the Certification and Accreditation of PIV Card Issuing Organizations
Document
|
|
|
582KB
|
|
SP800-78
|
Cryptographic
Algorithms and Key Sizes for Personal Identity Verification
|
2005.04
|
|
200KB
|
Draft
|
SP800-77
|
Guide
to IPsec VPNs
|
|
|
1.45MB
|
Draft
|
SP800-76
|
Biometric
Data Specification for Personal Identity Verification
|
|
|
235KB
|
|
SP800-73
|
Interfaces
for Personal Identity Verification
|
2005.04
|
|
860KB
|
|
SP800-72
|
Guidelines
on PDA Forensics
|
2004.11
|
|
1.12MB
|
Draft
|
SP800-70
|
The
NIST Security Configuration Checklists Program
|
2005.05
|
|
3.2MB
|
Draft
|
SP800-68
|
Guidance
for Securing Microsoft Windows XP Systems for IT Professionals: A NIST
Security Configuration Checklist
|
|
|
811KB
|
|
SP800-67
|
Recommendation
for the Triple Data Encryption Algorithm (TDEA Block Cipher),
|
2004.05
|
|
960KB
|
|
SP800-66
|
An
Introductory Resource Guide for Implementing the Health Insurance Portability
and Accountability Act (HIPAA Security Rule),
|
2005.03
|
|
1,725KB
|
|
SP800-65
|
Integrating
Security into the Capital Planning and Investment Control Process,
|
2005.01
|
|
4.05MB
|
|
SP800-64
|
Security
Considerations in the Information System Development Life Cycle,
|
2003.10
|
2004.06
|
1,083KB
|
|
SP800-63
|
Electronic
Authentication Guideline: Recommendations of the National Institute of
Standards and Technology,
|
2004.06
|
2004.11
|
217KB
|
|
SP800-61
|
Computer
Security Incident Handling Guide,
|
2004.01
|
|
2.71MB
|
|
SP800-60
|
Guide
for Mapping Types of Information and Information Systems to Security
Categories, Volume I
|
2004.06
|
|
444KB
|
|
SP800-60
|
Guide
for Mapping Types of Information and Information Systems to Security
Categories, Volume II
|
2004.06
|
|
2,003KB
|
|
SP800-59
|
Guideline
for Identifying an Information System as a National Security System,
|
2003.08
|
|
95.5KB
|
|
SP800-58
|
Security
Considerations for Voice Over IP Systems,
|
2005.01
|
|
1.24MB
|
Draft
|
SP800-57
|
Recommendation
on Key Management Part 1 (General)
|
|
|
471KB
|
Draft
|
SP800-57
|
Recommendation
on Key Management Part 2 (Best Practices for Key Management Organizations)
|
|
|
319KB
|
Draft
|
SP800-56
|
Recommendation
for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography
|
|
|
834KB
|
|
SP800-55
|
Security
Metrics Guide for Information Technology Systems,
|
2003.07
|
|
569KB
|
Draft
|
SP800-53A
|
Guide for
Assessing the Security Controls in Federal Information Systems
|
|
|
2,148KB
|
|
SP800-53
|
Recommended
Security Controls for Federal Information Systems,
|
2005.02
|
|
1,817KB
|
|
SP800-53
|
Annex
1: Consolidated Security Controls-Low Baseline
|
2005.02
|
|
419KB
|
|
SP800-53
|
Annex
2: Consolidated Security Controls-Moderate Baseline
|
2005.04
|
|
634KB
|
|
SP800-53
|
Annex
3: Consolidated Security Controls-High Baseline
|
2005.04
|
|
689KB
|
|
SP800-52
|
Guidelines
for the Selection and Use of Transport Layer Security (TLS) Implementations
|
2005.06
|
|
325KB
|
|
SP800-51
|
Use
of the Common Vulnerabilities and Exposures (CVE Vulnerability Naming Scheme)
|
2002.09
|
|
204KB
|
|
SP800-50
|
Building
an Information Technology Security Awareness and Training Program,
|
2003.10
|
|
4,131KB
|
|
SP800-49
|
Federal
S/MIME V3 Client Profile,
|
2002.11
|
|
151KB
|
|
SP800-48
|
Wireless
Network Security: 802.11, Bluetooth, and Handheld Devices,
|
2002.11
|
|
1,027KB
|
|
SP800-47
|
Security
Guide for Interconnecting Information Technology Systems,
|
2002.08
|
|
729KB
|
|
SP800-46
|
Security
for Telecommuting and Broadband Communications,
|
2002.08
|
|
3,779KB
|
|
SP800-45
|
Guidelines
on Electronic Mail Security,
|
2002.09
|
|
1,098KB
|
|
SP800-44
|
Guidelines
on Securing Public Web Servers,
|
2002.09
|
|
2,183KB
|
|
SP800-43
|
Systems Administration Guidance for Windows 2000 Professional,
|
2002.11
|
|
|
|
SP800-43
|
Systems
Administration Guidance for Windows 2000 Professional document and security
templates, version R1.2.3
|
2002.11
|
|
2,947KB
|
|
SP800-43
|
Systems Administration
Guidance for Windows 2000 Professional document.
|
2002.11
|
|
2,927KB
|
|
SP800-42
|
Guideline
on Network Security Testing,
|
2003.10
|
|
1,554KB
|
|
SP800-41
|
Guidelines
on Firewalls and Firewall Policy,
|
2002.01
|
|
1,180KB
|
|
SP800-40
|
Procedures
for Handling Security Patches,
|
2002.08
|
|
3,773KB
|
|
SP800-38C
|
Recommendation
for Block Cipher Modes of Operation: the CCM Mode for Authentication and
Confidentiality,
|
2004.05
|
|
104KB
|
|
SP800-38B
|
Recommendation
for Block Cipher Modes of Operation: The CMAC Mode for Authentication
|
2005.05
|
|
180KB
|
|
SP800-38A
|
Recommendation
for Block Cipher Modes of Operation - Methods and Techniques,
|
2001.12
|
|
225KB
|
|
SP800-37
|
Guide
for the Security Certification and Accreditation of Federal Information
Systems,
|
2004.05
|
|
738KB
|
|
SP800-36
|
Guide
to Selecting Information Security Products,
|
2003.10
|
|
464KB
|
|
SP800-35
|
Guide
to Information Technology Security Services,
|
2003.10
|
|
2,920KB
|
|
SP800-34
|
Contingency
Planning Guide for Information Technology Systems,
|
2002.06
|
|
1,937KB
|
|
SP800-33
|
Underlying
Technical Models for Information Technology Security,
|
2001.12
|
|
453KB
|
|
SP800-32
|
Introduction
to Public Key Technology and the Federal PKI Infrastructure,
|
2001.02
|
|
256KB
|
|
SP800-31
|
Intrusion
Detection Systems (IDS),
|
2001.11
|
|
851KB
|
|
SP800-30
|
Risk
Management Guide for Information Technology Systems,
|
2002.07
|
|
479KB
|
|
SP800-29
|
A
Comparison of the Security Requirements for Cryptographic Modules in FIPS
140-1 and FIPS 140-2,
|
2001.06
|
|
274KB
|
|
SP800-28
|
Guidelines
on Active Content and Mobile Code,
|
2001.10
|
|
498KB
|
|
SP800-27
|
Engineering
Principles for Information Technology Security (A Baseline for Achieving
Security, Revision A),
|
2004.06
|
|
291KB
|
|
SP800-26
|
Security
Self-Assessment Guide for Information Technology Systems,
|
2001.11
|
|
1,522KB
|
|
SP800-26
|
Revised
NIST SP 800-26 System Questionnaire with NIST SP 800-53 References and
Associated Security Control Mappings
|
2005.04
|
|
484KB
|
|
SP800-25
|
Federal
Agency Use of Public Key Technology for Digital Signatures and
Authentication,
|
2000.10
|
|
130KB
|
|
SP800-24
|
PBX
Vulnerability Analysis: Finding Holes in Your PBX Before Someone Else Does,
|
2000.08
|
|
225KB
|
|
SP800-23
|
Guideline
to Federal Organizations on Security Assurance and Acquisition/Use of
Tested/Evaluated Products,
|
2000.08
|
|
837KB
|
|
SP800-22
|
A
Statistical Test Suite for Random and Pseudorandom Number Generators for
Cryptographic Applications,
|
2000.08
|
2001.05
|
1,422KB
|
|
SP800-21
|
Guideline
for Implementing Cryptography in the Federal Government,
|
1999.11
|
|
612KB
|
|
SP800-20
|
Modes
of Operation Validation System for the Triple Data Encryption Algorithm
(TMOVS: Requirements and Procedures)
|
1999.10
|
2001.04
|
1,246KB
|
|
SP800-19
|
Mobile
Agent Security,
|
1999.10
|
|
136KB
|
|
SP800-18
|
Guide
for Developing Security Plans for Information Technology Systems,
|
1998.12
|
|
306KB
|
|
SP800-18
|
Letter
from CIO Council Security Committee
|
|
|
31KB
|
|
SP800-17
|
Modes
of Operation Validation System (MOVS: Requirements and Procedures,
|
1998.02
|
|
406KB
|
|
SP800-16
|
Information Technology Security Training Requirements: A Role-
and Performance-Based Model (supersedes NIST Spec. Pub. 500-172),
|
1998.04
|
|
|
|
SP800-16
|
Pt. 1
- document
|
|
|
845KB
|
|
SP800-16
|
Pt.
2 - Appendix A-D
|
|
|
96KB
|
|
SP800-16
|
Part
3 - Appendix E:
|
|
|
374KB
|
|
SP800-15
|
Minimum
Interoperability Specification for PKI Components (MISPC, Version 1),
|
1997.09
|
|
278KB
|
|
SP800-14
|
Generally
Accepted Principles and Practices for Securing Information Technology
Systems,
|
1996.09
|
|
188KB
|
|
SP800-13
|
Telecommunications
Security Guidelines for Telecommunications Management Network,
|
1995.10
|
|
217KB
|
|
SP800-12
|
An
Introduction to Computer Security: The NIST Handbook,
|
1995.10
|
|
1,685KB
|
Comments