National Vulnerability Database
Small Business Cybersecurity (NIST Guides)
Xilinx VITIS Security/Cryptography Library
800-137 Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations
800-137A Assessing Information Security Continuous Monitoring (ISCM) Programs: Developing an ISCM Program Assessment
800-86 Guide to Integrating Forensic Techniques into Incident Response
800-83 R.1 Guide to Malware Incident Prevention and Handling for Desktops and Laptops
800-82 R.3 Guide to Operational Technology (OT) Security
800-82 R.2 Guide to Industrial Control Systems (ICS) Security
800-61 R.2 Computer Security Incident Handling Guide
800-55 R.2 Performance Measurement Guide for Information Security
800-55 R.1 Performance Measurement Guide for Information Security
800-53 R.5 Security and Privacy Controls for Information Systems and Organizations
800-53B Control Baselines for Information Systems and Organizations
800-53A R.5 Assessing Security and Privacy Controls in Information Systems and Organizations
800-50 Building an Information Technology Security Awareness and Training Program
800-97: Wireless Network Security: 802.11, Bluetooth, and Handheld Devices
800-41 R.1 Guidelines on Firewalls and Firewall Policy
800-35 Guide to Selecting Information Technology
800-34 R.1 Contingency Planning Guide for Federal Information Systems
800-30 R.1 Guide for Conducting Risk Assessments
800-209 Security Guidelines for Storage Infrastructure
800-207 Zero Trust Architecture
800-205 Attribute Considerations for Access Control Systems
800-189 Resilient Interdomain Traffic Exchange: BGP Security and DDoS Mitigation
800-186 Recommendations for Discrete Logarithm-based Cryptography: Elliptic Curve Domain Parameters
800-184 Guide for Cybersecurity Event Recovery
800-162 Guide to Attribute Based Access Control (ABAC) Definition and Considerations
800-137 Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations
800-137A Assessing Information Security Continuous Monitoring (ISCM) Programs: Developing an ISCM Program Assessment
800-86 Guide to Integrating Forensic Techniques into Incident Response
800-83 R.1 Guide to Malware Incident Prevention and Handling for Desktops and Laptops
800-82 R.3 Guide to Operational Technology (OT) Security
800-82 R.2 Guide to Industrial Control Systems (ICS) Security
800-61 R.2 Computer Security Incident Handling Guide
800-55 R.2 Performance Measurement Guide for Information Security
800-55 R.1 Performance Measurement Guide for Information Security
800-53 R.5 Security and Privacy Controls for Information Systems and Organizations
800-53B Control Baselines for Information Systems and Organizations
800-53A R.5 Assessing Security and Privacy Controls in Information Systems and Organizations
800-50 Building an Information Technology Security Awareness and Training Program
800-97: Wireless Network Security: 802.11, Bluetooth, and Handheld Devices
800-41 R.1 Guidelines on Firewalls and Firewall Policy
800-35 Guide to Selecting Information Technology
800-34 R.1 Contingency Planning Guide for Federal Information Systems
800-30 R.1 Guide for Conducting Risk Assessments
800-186 Recommendations for Discrete Logarithm-based Cryptography: Elliptic Curve Domain Parameters
800-175B Rev. 1 Guideline for Using Cryptographic Standards in the Federal Government: Cryptographic Mechanisms
800-175A Guideline for Using Cryptographic Standards in the Federal Government: Directives, Mandates and Policies
800-152 A Profile for U.S. Federal Cryptographic Key Management Systems (CKMS)
800-140F Rev. 1 CMVP Approved Non-Invasive Attack Mitigation Test Metrics: CMVP Validation Authority Updates to ISO/IEC 24759
800-140F CMVP Approved Non-Invasive Attack Mitigation Test Metrics: CMVP Validation Authority Updates to ISO/IEC 24759
800-140E CMVP Approved Authentication Mechanisms: CMVP Validation Authority Requirements for ISO/IEC 19790 Annex E and ISO/IEC 24579 Section 6.17
800-140D Rev. 2 Cryptographic Module Validation Program (CMVP)-Approved Sensitive Security Parameter Generation and Establishment Methods: CMVP Validation Authority Updates to ISO/IEC 24759
800-140C Rev. 2 Cryptographic Module Validation Program (CMVP)-Approved Security Functions: CMVP Validation Authority Updates to ISO/IEC 24759
800-140B Rev. 1 CMVP Security Policy Requirements: CMVP Validation Authority Updates to ISO/IEC 24759 and ISO/IEC 19790 Annex B
800-140B CMVP Security Policy Requirements: CMVP Validation Authority Updates to ISO/IEC 24759 and ISO/IEC 19790 Annex B
800-140A CMVP Documentation Requirements: CMVP Validation Authority Updates to ISO/IEC 24759
800-140 FIPS 140-3 Derived Test Requirements (DTR): CMVP Validation Authority Updates to ISO/IEC 24759
800-135 Rev. 1 Recommendation for Existing Application-Specific Key Derivation Functions
800-133 Rev. 2 Recommendation for Cryptographic Key Generation
800-131A Rev. 2 Transitioning the Use of Cryptographic Algorithms and Key Lengths
800-130 A Framework for Designing Cryptographic Key Management Systems
800-57 Part 3 Rev. 1 Recommendation for Key Management, Part 3: Application-Specific Key Management Guidance
800-57 Part 2 Rev. 1 Recommendation for Key Management: Part 2 – Best Practices for Key Management Organizations
800-57 Part 1 Rev. 5 Recommendation for Key Management: Part 1 – General
800-56C Rev. 2 Recommendation for Key-Derivation Methods in Key-Establishment Schemes
800-56B Rev. 2 Recommendation for Pair-Wise Key-Establishment Using Integer Factorization Cryptography
800-56A Rev. 3 Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography
All rights reserved. CyberDefenceDynamics
© 2013-2024
We need your consent to load the translations
We use a third-party service to translate the website content that may collect data about your activity. Please review the details in the privacy policy and accept the service to view the translations.