Standard Topic Search
1 2
Publication NumberStandard NameIndustry StandardPublication Date
USGCB-MicrosoftThe United States Government Configuration Baseline (USGCB) - Microsoft ContentUSGCB04/20/2015
SP 1800-5NIST Cybersecurity Practice Guide SP 1800-5, IT Asset Management (Draft)NIST11/02/2015
SP 1800-1NIST Cybersecurity Practice Guide SP 1800-1, Securing Electronic Health Records on Mobile Devices (Draft)NIST07/28/2015
SP 800-190NIST SP 800-190 Application Container Security GuideNIST09/25/2017
SP 800-184NIST SP 800-184 Guide for Cybersecurity Event RecoveryNIST12/22/2016
SP 800-179NIST SP 800-179 Guide to Securing Apple OS X 10.10 Systems for IT Professionals: A NIST Security Configuration ChecklistNIST12/12/2016
SP 800-177NIST SP 800-177 Revision 1, Trustworthy EmailNIST09/07/2016
SP 800-167NIST SP 800-167 Guide to Application WhitelistingNIST10/30/2015
SP 800-164 DraftNIST SP 800-164 Draft Guidelines on Hardware- Rooted Security in Mobile Devices (Draft)NIST10/31/2012
SP 800-163NIST SP 800-163 Vetting the Security of Mobile ApplicationsNIST01/26/2015
SP 800-162NIST SP 800-162 Guide to Attribute Based Access Control (ABAC) Definition and ConsiderationsNIST01/21/2014
SP 800-161NIST SP 800-161 Supply Chain Risk Management Practices for Federal Information Systems and OrganizationsNIST04/09/2015
SP 800-157NIST SP 800-157 Guidelines for Derived Personal Identity Verification (PIV) CredentialsNIST12/19/2014
SP 800-153NIST SP 800-153 Guidelines for Securing Wireless Local Area Networks (WLANs)NIST02/21/2012
SP 800-152NIST SP 800-152 A Profile for U.S. Federal Cryptographic Key Management SystemsNIST10/31/2015
SP 800-147NIST SP 800-147 Basic Input/Output System (BIOS) Protection GuidelinesNIST04/01/2011
SP 800-146NIST Cloud Computing Synopsis and RecommendationsNIST05/29/2012
SP 800-145The NIST Definition of Cloud ComputingNIST09/01/2011
SP 800-144NIST Guidelines on Security and Privacy in Public Cloud ComputingNIST12/09/2011
SP 800-137NIST Information Security Continuous Monitoring for Federal Information Systems and OrganizationsNIST09/01/2011
SP 800-133NIST Recommendation for Cryptographic Key GenerationNIST11/16/2012
SP 800-130NIST SP 800-130 A Framework for Designing Cryptographic Key Management SystemsNIST08/16/2013
SP 800-128NIST Guide for Security-Focused Configuration Management of Information SystemsNIST08/01/2011
SP 800-125BNIST SP 800-125B Secure Virtual Network Configuration for Virtual Machine (VM) ProtectionNIST03/07/2016
SP 800-125NIST Guide to Security for Full Virtualization TechnologiesNIST01/01/2011
SP 800-124 Rev. 1NIST SP 800-124 r1 Guidelines for Managing and Securing Mobile Devices in the EnterpriseNIST06/24/2013
SP 800-123NIST Guide to General Server SecurityNIST07/01/2008
SP 800-122NIST Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)NIST04/01/2010
SP 800-121 Rev. 2NIST Guide to Bluetooth SecurityNIST05/08/2017
SP 800-119NIST Guidelines for the Secure Deployment of IPv6NIST12/01/2010
SP 800-115NIST Technical Guide to Information Security Testing and AssessmentNIST09/01/2008
SP 800-114 Rev. 1NIST SP 800-114 Revision 1, User's Guide to Telework and Bring Your Own Device (BYOD) SecurityNIST08/05/2016
SP 800-113NIST Guide to SSL VPNsNIST07/01/2008
SP 800-111NIST Guide to Storage Encryption Technologies for End User DevicesNIST11/01/2007
SP 800-107NIST SP 800-107 Revision 1 Recommendation for Applications Using Approved Hash AlgorithmsNIST08/24/2012
SP 800-106NIST Randomized Hashing for Digital SignaturesNIST02/01/2009
SP 800-101NIST SP 800-101 Rev.1 Guidelines on Mobile Device ForensicsNIST05/28/2014
SP 800-100NIST Information Security Handbook: A Guide for ManagersNIST10/01/2006
SP 800-97NIST Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11iNIST02/01/2007
SP 800-95NIST Guide to Secure Web ServicesNIST08/01/2007
SP 800-94NIST Guide to Intrusion Detection and Prevention Systems (IDPS)NIST02/01/2007
SP 800-92NIST Guide to Computer Security Log ManagementNIST09/01/2006
SP 800-88 Rev. 1NIST SP 800-88 Revision 1 Guidelines to Media SanitizationNIST12/18/2014
SP 800-86NIST Guide to Integrating Forensic Techniques into Incident ResponseNIST08/01/2006
SP 800-83 Rev.1NIST SP 800-83 Guide to Malware Incident Prevention and Handling for Desktops and LaptopsNIST07/25/2013
SP 800-82 Rev. 2NIST SP 800-82 Revision 2 Guide to Industrial Control Systems (ICS) SecurityNIST08/12/2015
SP 800-81 Rev. 2NIST Secure Domain Name System (DNS) Deployment GuideNIST09/24/2013
SP 800-79-2NIST 800-79-2, Guidelines for the Authorization of Personal Identity Verification Card Issuers (PCI) and Derived PIV Credential Issuers (DPCI)NIST07/30/2015
SP 800-78-4NIST SP 800-78-4, Cryptographic Algorithms and Key Sizes for Personal Identity VerificationNIST06/01/2015
SP 800-77NIST Guide to IPsec VPNsNIST12/01/2005
SP 800-76-2NIST SP 800-76-2 Biometric Data Specification for Personal Identity VerificationNIST07/12/2013
SP 800-73-4NIST SP 800-73-4, Interfaces for Personal Identity VerificationNIST06/01/2015
SP 800-70 Rev. 3NIST National Checklist Program for IT Products: Guidelines for Checklist Users and DevelopersNIST12/10/2015
SP 800-67 Rev. 2 (DRAFT)DRAFT NIST SP 800-67 Rev. 2 Recommendation Revision 2 for the Triple Data Encryption Algorithm (TDEA) Block CipherNIST07/11/2017
SP 800-67 Rev. 1NIST SP 800-67 Rev. 1 Recommendation for the Triple Data Encryption Algorithm (TDEA) Block CipherNIST01/01/2012
SP 800-66 Rev 1An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security RuleNIST10/01/2008
SP 800-64 rev. 2NIST Security Considerations in the System Development Life CycleNIST10/01/2008
SP 800-63-3NIST SP 800-63-3 Electronic Authentication GuidelineNIST06/22/2017
SP 800-61 Rev. 2NIST SP 800-61 Rev. 2 Computer Security Incident Handling GuideNIST08/01/2012
SP 800-60 vol 2NIST Appendices to Guide for Mapping Types of Information and Information Systems to Security CategoriesNIST08/01/2008
SP 800-60 vol 1NIST Guide for Mapping Types of Information and Information Systems to Security CategoriesNIST08/01/2008
SP 800-58NIST Security Considerations for Voice Over IP SystemsNIST01/01/2005
SP 800-57 Part 3 Rev. 1NIST Recommendation for Key Management: Part 3 Application-Specific Key Management GuidanceNIST01/23/2015
SP 800-57 Part 2NIST Recommendation for Key Management: Part 2: Best Practices for Key Management OrganizationNIST08/01/2005
SP 800-57 Part 1NIST Recommendation for Key Management - Part 1: General (Revision 4)NIST01/28/2016
SP 800-56A Rev. 2NIST SP 800-56A r2 Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm CryptographyNIST06/12/2013
SP 800-55 Rev. 1NIST Performance Measurement Guide for Information SecurityNIST07/01/2008
SP 800-54NIST Border Gateway Protocol SecurityNIST07/01/2007
SP 800-53 Rev. 4NIST Security and Privacy Controls for Federal Information Systems and OrganizationsNIST04/30/2013
SP 800-52r1NIST Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) ImplementationsNIST04/27/2014
SP 800-50NIST Building an Information Technology Security Awareness and Training ProgramNIST10/01/2003
SP 800-48 Rev. 1NIST Guide to Securing Legacy IEEE 802.11 Wireless NetworksNIST07/01/2008
SP 800-46 Rev. 2NIST SP 800-46 Revision 2, Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) SecurityNIST08/05/2016
SP 800-45 Version 2NIST Guidelines on Electronic Mail SecurityNIST02/01/2007
SP 800-44 Version 2NIST Guidelines on Securing Public Web ServersNIST09/01/2007
SP 800-41 Rev. 1NIST Guidelines on Firewalls and Firewall PolicyNIST09/01/2009
SP 800-40 Rev. 3NIST SP 800-40 Rev. 3 Guide to Enterprise Patch Management TechnologiesNIST07/25/2013
SP 800-39Managing Information Security Risk: Organization, Mission, and Information System ViewNIST03/01/2011
SP 800-37 Rev. 1NIST SP 800-37 Revision 1 Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle ApproachNIST06/05/2014
SP 800-36NIST SP 800-36 Guide to Selecting Information Technology Security ProductsNIST10/01/2003
SP 800-35NIST SP 800-35 Guide to Information Technology Security ServicesNIST10/01/2003
SP 800-30 Rev.1NIST SP 800-30 Revision 1 Guide for Conducting Risk AssessmentsNIST09/18/2012
SP 800-28 Version 2NIST SP 800-28 Version 2 Guidelines on Active Content and Mobile CodeNIST03/01/2008
SP 800-21 2nd editionNIST Guideline for Implementing Cryptography in the Federal GovernmentNIST12/01/2005
SP 800-16 Rev. 1NIST DRAFT Information Security Training Requirements: A Role and Performance-Based ModelNIST03/14/2014
SP 800-13NIST Telecommunications Security Guidelines for Telecommunications Management NetworkNIST10/01/1995
SP 800-12NIST SP 800-12 Revision 1, An Introduction to Information SecurityNIST06/01/2017
PCI-DSS v3.2PCI DSS (PCI Data Security Standard)PCI04/28/2016
PCI-DSS PenTesting_v1.0Information Supplement: PCI DSS Penetration Testing GuidancePCI03/29/2015
PCI-DSS MobilePayment_v2Information Supplement: PCI DSS Mobile Payment GuidelinesPCI02/14/2013
PCI-DSS eCommerce_v2.0Information Supplement: PCI DSS eCommerce Security GuidelinesPCI01/31/2013
PCI-DSS Cloud_v2.0Information Supplement: PCI DSS Cloud Computing GuidelinesPCI02/07/2013
PCI-CardProd_Physical v1.0PCI Card Production Physical Security Requirements v1.0PCI05/09/2013
PCI-CardProd_Logical v1.0PCI Card Production Logical Security Requirements v1.0PCI05/09/2013
PA-DSS v3.2PA DSS (Payment Application Data Security Standard)PCI05/27/2016
NISTIR 7298 Rev. 2NISTIR 7298 Revision 2 Glossary of Key Information Security TermsNIST06/21/2013
ITL December 2010Securing WiMAX Wireless CommunicationsITL12/01/2010
ITL December 2008Guide To Information Security Testing And AssessmentITL12/01/2008
ITL November 2010The Exchange Of Health Information: Designing A Security Architecture To Provide Information Security And PrivacyITL11/01/2010
ITL November 2009Cybersecurity Fundamentals For Small Business OwnersITL11/01/2009
1 2