Useful Cyber Security Related URLs.

Other connectivity CDD finds really useful...(accompanying the NIST security policy)

Mitre Att&ck

NCSC

National Vulnerability Database

Hacker News

Dark Reading

Small Business Cybersecurity (NIST Guides)

Xilinx VITIS Security/Cryptography Library

800-137          Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations 
800-137A       Assessing Information Security Continuous Monitoring (ISCM) Programs: Developing an ISCM Program Assessment 
800-86            Guide to Integrating Forensic Techniques into Incident Response 
800-83 R.1     Guide to Malware Incident Prevention and Handling for Desktops and Laptops  
800-82 R.3     Guide to Operational Technology (OT) Security 
800-82 R.2     Guide to Industrial Control Systems (ICS) Security 
800-61 R.2     Computer Security Incident Handling Guide 
800-55 R.2     Performance Measurement Guide for Information Security 
800-55 R.1     Performance Measurement Guide for Information Security 
800-53 R.5     Security and Privacy Controls for Information Systems and Organizations 
800-53B         Control Baselines for Information Systems and Organizations 
800-53A R.5  Assessing Security and Privacy Controls in Information Systems and Organizations 
800-50            Building an Information Technology Security Awareness and Training Program 
ƒ800-97:           Wireless Network Security: 802.11, Bluetooth, and Handheld Devices
800-41 R.1     Guidelines on Firewalls and Firewall Policy 
800-35            Guide to Selecting Information Technology
800-34 R.1     Contingency Planning Guide for Federal Information Systems 
800-30 R.1     Guide for Conducting Risk Assessments 

800-209          Security Guidelines for Storage Infrastructure
800-207          Zero Trust Architecture 
800-205          Attribute Considerations for Access Control Systems  
800-189          Resilient Interdomain Traffic Exchange: BGP Security and DDoS Mitigation 
800-186          Recommendations for Discrete Logarithm-based Cryptography: Elliptic Curve Domain Parameters 
800-184          Guide for Cybersecurity Event Recovery 
800-162          Guide to Attribute Based Access Control (ABAC) Definition and Considerations 
800-137          Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations 
800-137A       Assessing Information Security Continuous Monitoring (ISCM) Programs: Developing an ISCM Program Assessment 
800-86            Guide to Integrating Forensic Techniques into Incident Response 
800-83 R.1     Guide to Malware Incident Prevention and Handling for Desktops and Laptops  
800-82 R.3     Guide to Operational Technology (OT) Security 
800-82 R.2     Guide to Industrial Control Systems (ICS) Security 
800-61 R.2     Computer Security Incident Handling Guide 
800-55 R.2     Performance Measurement Guide for Information Security 
800-55 R.1     Performance Measurement Guide for Information Security 
800-53 R.5     Security and Privacy Controls for Information Systems and Organizations 
800-53B         Control Baselines for Information Systems and Organizations 
800-53A R.5  Assessing Security and Privacy Controls in Information Systems and Organizations 
800-50            Building an Information Technology Security Awareness and Training Program 
ƒ800-97:           Wireless Network Security: 802.11, Bluetooth, and Handheld Devices
800-41 R.1     Guidelines on Firewalls and Firewall Policy 
800-35            Guide to Selecting Information Technology
800-34 R.1     Contingency Planning Guide for Federal Information Systems 
800-30 R.1     Guide for Conducting Risk Assessments 
 
 800-186             Recommendations for Discrete Logarithm-based Cryptography: Elliptic Curve Domain Parameters
800-175B Rev. 1 Guideline for Using Cryptographic Standards in the Federal Government: Cryptographic Mechanisms 
800-175A            Guideline for Using Cryptographic Standards in the Federal Government: Directives, Mandates and Policies 
800-152 A           Profile for U.S. Federal Cryptographic Key Management Systems (CKMS) 
800-140F Rev. 1 CMVP Approved Non-Invasive Attack Mitigation Test Metrics: CMVP Validation Authority Updates to ISO/IEC 24759 
800-140F            CMVP Approved Non-Invasive Attack Mitigation Test Metrics: CMVP Validation Authority Updates to ISO/IEC 24759 
800-140E           CMVP Approved Authentication Mechanisms: CMVP Validation Authority Requirements for ISO/IEC 19790 Annex E and ISO/IEC 24579 Section 6.17 
800-140D Rev. 2 Cryptographic Module Validation Program (CMVP)-Approved Sensitive Security Parameter Generation and Establishment Methods: CMVP Validation Authority Updates to ISO/IEC 24759 
800-140C Rev. 2 Cryptographic Module Validation Program (CMVP)-Approved Security Functions: CMVP Validation Authority Updates to ISO/IEC 24759 
800-140B Rev. 1 CMVP Security Policy Requirements: CMVP Validation Authority Updates to ISO/IEC 24759 and ISO/IEC 19790 Annex B 
800-140B           CMVP Security Policy Requirements: CMVP Validation Authority Updates to ISO/IEC 24759 and ISO/IEC 19790 Annex B 
800-140A           CMVP Documentation Requirements: CMVP Validation Authority Updates to ISO/IEC 24759 
800-140             FIPS 140-3 Derived Test Requirements (DTR): CMVP Validation Authority Updates to ISO/IEC 24759 
800-135 Rev. 1 Recommendation for Existing Application-Specific Key Derivation Functions 
800-133 Rev. 2 Recommendation for Cryptographic Key Generation 
800-131A Rev. 2 Transitioning the Use of Cryptographic Algorithms and Key Lengths 
800-130 A        Framework for Designing Cryptographic Key Management Systems 
800-57             Part 3 Rev. 1 Recommendation for Key Management, Part 3: Application-Specific Key Management Guidance 
800-57            Part 2 Rev. 1 Recommendation for Key Management: Part 2 – Best Practices for Key Management Organizations 
800-57            Part 1 Rev. 5 Recommendation for Key Management: Part 1 – General 
800-56C         Rev. 2 Recommendation for Key-Derivation Methods in Key-Establishment Schemes 
800-56B         Rev. 2 Recommendation for Pair-Wise Key-Establishment Using Integer Factorization Cryptography 
800-56A         Rev. 3 Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography 

 

All rights reserved. CyberDefenceDynamics 

© 2013-2024

We need your consent to load the translations

We use a third-party service to translate the website content that may collect data about your activity. Please review the details in the privacy policy and accept the service to view the translations.