+ ANNUAL REPORTS
* [IR 7111]+4 – Computer Security Division 2003 Annual Report
* [IR 7219]+4 – Computer Security Division 2004 Annual Report
* [IR 7285]+4 – Computer Security Division 2005 Annual Report
* [IR 7399]+3 – Computer Security Division 2006 Annual Report
* [IR 7442]+3 – Computer Security Division 2007 Annual Report
* [IR 7536]+3 – Computer Security Division 2008 Annual Report
* [IR 7653]+3 – Computer Security Division 2009 Annual Report
* [IR 7751]+4 – Computer Security Division 2010 Annual Report
* [IR 7816]+3 – Computer Security Division 2011 Annual Report
* [SP 800-165]+1 – Computer Security Division 2012 Annual Report
* [SP 800-170]+1 – Computer Security Division 2013 Annual Report
* [SP 800-176]+1 – Computer Security Division 2014 Annual Report
* [SP 800-182]+1 – Computer Security Division 2015 Annual Report
* [SP 800-195]+1 – NIST-ITL Cybersecurity Program Annual Report
* [SP 800-203]+1 – NIST-ITL Cybersecurity Program Annual Report
+ AUDIT & ACCOUNTABILITY
* [August 2003]+3 – IT Security Metrics
* [August 2005]+9 – Implementation Of FIPS 201, Personal Identity Verification (PIV) Of Federal Employees And Contractors
* [FIPS 140]+285 – Security Requirements for Cryptographic Modules
· * NIST SB 2001-07 A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2.pdf
· * NIST SP 800-029 A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2, 2001-06.pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex A, 2001-05.pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex D, 2001-05.pdf
· * NIST FIPS 140-2 Security requirements for Cryptographic Modules, Annex D; Approved Key Establishment Techniques, 2001-03 (2009 Minor Edits).pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex B; Approved Protection Profiles, 2001-03 (2009 Minor Edits).pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex A; Approved Security Functions, 2001-03 (2009 Minor Edits) .pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex C; Approved Random Number Generators, 2001-03 (2009 Minor Edits).pdf
· * NIST FIPS 140-2 Security Reqs for Cryptographic Modules, 2001-03.pdf
· * NIST FIPS 140-2 Implementation Guidance for FIPS PUB 140-2 and the CMVP, 2010-08-03.pdf
· * NIST SB 1995-08 FIPS 140-1; A Framework for Cryptographic Standards.txt
· * fips140-3-final-draft-2007-comments-resolutions.pdf
· * FIPS_140-3 Final_Draft_2007.pdf
· * fips140_2_chng2_20021203.epub
· * fips140_2_chng2_20021203.epub
· * NewFIPS1402LogoForm.pdf
· * FIPS1402LogoForm.pdf
· * FIPS1403LogoForm.pdf
· * fips140-3-sections-submitted-for-comments.pdf
· * FIPS140ConsolidatedCertApr2017.pdf
· * FIPS140ConsolidatedCertMar2017.pdf
· * fips140consolidatedcertlist0034.pdf
· * FIPS1402DTR.pdf
· * FIPS140ConsolidatedCertJan2018.pdf
· * FIPS140ConsolidatedCertOct2017.pdf
· * FIPS140ConsolidatedCertAug2018.pdf
· * fips140consolidatedcertlist0053.pdf
· * FIPS140ConsolidatedCertList0008.pdf
· * FIPS 140-3 IG.pdf
· * FIPS140ConsolidatedCertSept2016.pdf
· * FIPS140ConsolidatedCertList0034.pdf
· * FIPS140ConsolidatedCertList0054.pdf
· * fips140consolidatedcertlist0042.pdf
· * FIPS140ConsolidatedCertList0052.pdf
· * FIPS1402LogoForm.pdf
· * FIPS140ConsolidatedCertApril2016.pdf
· * FIPS140ConsolidatedCertList0041.pdf
· * FIPS140ConsolidatedCertList0048.pdf
· * FIPS140ConsolidatedCertList0028.pdf
· * FIPS140ConsolidatedCertOct2018.pdf
· * FIPS140ConsolidatedCertNov2019.pdf
· * FIPS140ConsolidatedCertMarch2016.pdf
· * FIPS140ConsolidatedCertList0026.pdf
· * FIPS140ConsolidatedCertMay2016.pdf
· * FIPS140ConsolidatedCertList0057.pdf
· * FIPS140ConsolidatedCertList0035.pdf
· * FIPS1401LogoForm.pdf
· * fips140consolidatedcertlist0046.pdf
· * FIPS140ConsolidatedCertList0024.pdf
· * FIPS140ConsolidatedCertList0049.pdf
· * FIPS 140-3 IG.pdf
· * FIPS140ConsolidatedCertSept2017.pdf
· * FIPS140ConsolidatedCertOct2015.pdf
· * FIPS140ConsolidatedCertJuly2016.pdf
· * fips140consolidatedcertoct2016.pdf
· * FIPS-140-2-CMVP Management Manual 09-09-2021.pdf
· * fips140consolidatedcertdec2015.pdf
· * fips1402logoform.pdf
· * FIPS140ConsolidatedCertJan2017.pdf
· * fips140consolidatedcertlist0038.pdf
· * FIPS_140-3_sections_submitted_for_comments.pdf
· * FIPS140ConsolidatedCertDec2015.pdf
· * FIPS140ConsolidatedCertList0046.pdf
· * FIPS140ConsolidatedCertList0053.pdf
· * FIPS140ConsolidatedCertFeb2016.pdf
· * fips140consolidatedcertjune2016.pdf
· * NIST and ISO End User License Agreement.pdf
· * FIPS140ConsolidatedCertJune2017.pdf
· * FIPS140ConsolidatedCertDec2016.pdf
· * fips140consolidatedcertlist0026.pdf
· * FIPS140ConsolidatedCertList0042.pdf
· * FIPS140ConsolidatedCertJuly2017.pdf
· * FIPS140ConsolidatedCertNov2016.pdf
· * nist and iso end user license agreement.pdf
· * fips140consolidatedcertsept2017.pdf
· * fips140consolidatedcertmarch2016.pdf
· * fips140consolidatedcertsept2016.pdf
· * FIPS140ConsolidatedCertList0023.pdf
· * FIPS140ConsolidatedCertList0011.pdf
· * FIPS140ConsolidatedCertList0038.pdf
· * FIPS1402IG.pdf
· * FIPS140ConsolidatedCertList0045.pdf
· * FIPS140ConsolidatedCertOct2016.pdf
· * FIPS140ConsolidatedCertJune2016.pdf
· * FIPS140ConsolidatedCertList0020.pdf
· * FIPS140ConsolidatedCertList0032.pdf
· * fips140consolidatedcertmay2017.pdf
· * FIPS140ConsolidatedCertAug2016.pdf
· * FIPS140ConsolidatedCertNov2017.pdf
· * FIPS140ConsolidatedCertMay2017.pdf
· * FIPS140-2-ConsolidatedMarch2018.pdf
· * FIPS140ConsolidatedCertDec2017.pdf
· * fips140consolidatedcertlist0057.pdf
· * FIPS1403SoftSecWork.pdf
· * FIPS140ConsolidatedCertList0050.pdf
· * fips1402ig.pdf
· * fips140consolidatedcertlist0045.pdf
· * FIPS1402IG.pdf
· * fips-140-2-cmvp management manual 09-09-2021.pdf
· * FIPS140ConsolidatedCertJan2016.pdf
· * fips140consolidatedcertlist0011.pdf
· * fips140consolidatedcertmay2016.pdf
· * fips140consolidatedcertnov2019.pdf
· * FIPS140ConsolidatedCertFeb2017.pdf
· * FIPS_140-3_sections_submitted_for_comments.pdf
· * Draft FIPS-140-3-CMVP Management Manual v1.1 07-13-2022.pdf
· * Draft FIPS-140-3-CMVP Management Manual 09-18-2020.pdf
· * fips1402.pdf
· * fips1401.pdf
· * physecpre18.pdf
· * CMVP2604.pdf
· * CMVP2606.pdf
· * FIPS140ConsolidatedCertApr2017.pdf
· * day2_mar24_fips-140-quo-vadis_nist-csd.pdf
· * FIPS140ConsolidatedCertMar2017.pdf
· * fips140consolidatedcertapr2017.pdf
· * physecpaper13.pdf
· * physecpaper12.pdf
· * physecpaper10.pdf
· * physecpaper11.pdf
· * physecpaper16.pdf
· * physecpaper14.pdf
· * physecpaper14.pdf
· * physecpaper17.pdf
· * physecpaper18.pdf
· * physecpaper19.pdf
· * physecpaper12.pdf
· * FIPS140ConsolidatedCertList0032.pdf
· * FIPS140ConsolidatedCertList0040.pdf
· * FIPS140ConsolidatedCertList0031.pdf
· * FIPS140ConsolidatedCertList0034.pdf
· * physecpaper08.pdf
· * FIPS140ConsolidatedCertList0037.pdf
· * fips140consolidatedcertlist0017.pdf
· * FIPS140ConsolidatedCertList0009.pdf
· * physecpaper06.pdf
· * physecpaper09.pdf
· * FIPS140ConsolidatedCertList0035.pdf
· * FIPS140ConsolidatedCertList0015.pdf
· * FIPS140ConsolidatedCertList0051.pdf
· * FIPS140ConsolidatedCertJune2016.pdf
· * physecpaper07.pdf
· * fips140consolidatedcertlist0019.pdf
· * fips1401ig.pdf
· * FIPS140ConsolidatedCertList0013.pdf
· * FIPS140ConsolidatedCertList0007.pdf
· * FIPS140ConsolidatedCertList0023.pdf
· * FIPS140ConsolidatedCertNov2015.pdf
· * FIPS1402DTR.pdf
· * Jan12-2005-FR-FIPS1403-Notice.pdf
· * FIPS140ConsolidatedCertList0003.pdf
· * FIPS140ConsolidatedCertList0042.pdf
· * FIPS140ConsolidatedCertList0002.pdf
· * FIPS140ConsolidatedCertSept2016.pdf
· * physecpaper08.pdf
· * FIPS140ConsolidatedCertMay2016.pdf
· * FIPS140ConsolidatedCertMay2017.pdf
· * fips1402ig.pdf
· * 1401testA.pdf
· * FIPS140ConsolidatedCertList0030.pdf
· * FIPS140ConsolidatedCertList0036.pdf
· * FIPS140ConsolidatedCertList0017.pdf
· * fips140consolidatedcertmay2016.pdf
· * FIPS140ConsolidatedCertList0038.pdf
· * FIPS140ConsolidatedCertList0004.pdf
· * FIPS140ConsolidatedCertDec2015.pdf
· * FIPS140ConsolidatedCertList0014.pdf
· * FIPS140ConsolidatedCertList0012.pdf
· * FIPS140ConsolidatedCertList0010.pdf
· * FIPS140ConsolidatedCertList0029.pdf
· * FIPS140ConsolidatedCertList0001.pdf
· * fips140consolidatedcertaug2016.pdf
· * FIPS140ConsolidatedCertList0021.pdf
· * FIPS140ConsolidatedCertList0048.pdf
· * frn-2015-19743-comments-received.pdf
· * FIPS140ConsolidatedCertList0006.pdf
· * FIPS140ConsolidatedCertMarch2016.pdf
· * ispab-ltr-to-NIST-on-FIPS_140-2-ISO_20160420.pdf
· * FIPS140ConsolidatedCertList0033.pdf
· * FIPS140ConsolidatedCertList0008.pdf
· * physecpaper03.pdf
· * FIPS140ConsolidatedCertJuly2016.pdf
· * fips140consolidatedcertmay2017.pdf
· * fips140-3_non-invasive2.pdf
· * FIPS140ConsolidatedCertList0046.pdf
· * physecpaper03.pdf
· * FIPS140ConsolidatedCertList0020.pdf
· * FIPS140ConsolidatedCertList0055.pdf
· * FIPS140ConsolidatedCertList0024.pdf
· * fips140consolidatedcertnov2015.pdf
· * 1401test.pdf
· * FIPS140ConsolidatedCertList0005.pdf
· * ispab-ltr-to-NIST-on-FIPS_140-2-ISO_20160420.pdf
· * FIPS140ConsolidatedCertList0027.pdf
· * FIPS140ConsolidatedCertApril2016.pdf
· * FIPS140ConsolidatedCertOct2015.pdf
· * fips1402DTR.pdf
· * FIPS140ConsolidatedCertFeb2017.pdf
· * FIPS140ConsolidatedCertList0044.pdf
· * FIPS140ConsolidatedCertList0054.pdf
· * physecpaper05.pdf
· * FIPS140ConsolidatedCertAug2017.pdf
· * physecpaper02.pdf
· * FIPS1402IG.pdf
· * FIPS140ConsolidatedCertList0041.pdf
· * FIPS140ConsolidatedCertList0019.pdf
· * 140-2flow.pdf
· * FIPS140ConsolidatedCertList0053.pdf
· * FIPS140ConsolidatedCertList0045.pdf
· * FIPS140ConsolidatedCertList0049.pdf
· * fips140-3_non-invasive1.pdf
· * fips140consolidatedcertlist0024.pdf
· * FIPS140ConsolidatedCertList0039.pdf
· * physecpaper04.pdf
· * FIPS140ConsolidatedCertJune2017.pdf
· * physecpaper01.pdf
· * FIPS140ConsolidatedCertJuly2017.pdf
· * FIPS140ConsolidatedCertOct2016.pdf
· * FIPS140ConsolidatedCertList0026.pdf
· * fips140consolidatedcertdec2016.pdf
· * fips140consolidatedcertlist0042.pdf
· * FIPS140ConsolidatedCertJan2016.pdf
· * FIPS140ConsolidatedCertFeb2016.pdf
· * fips140consolidatedcertjan2017.pdf
· * FIPS140ConsolidatedCertList0052.pdf
· * FIPS140ConsolidatedCertList0047.pdf
· * FIPS140ConsolidatedCertJan2017.pdf
· * FIPS1401IG.pdf
· * FIPS140ConsolidatedCertList0056.pdf
· * FIPS140ConsolidatedCertList0028.pdf
· * FIPS140ConsolidatedCertList0018.pdf
· * fips-140_response.pdf
· * FIPS140ConsolidatedCertList0025.pdf
· * ispab-ltr-to-nist-on-fips_140-2-iso_20160420.pdf
· * FIPS140ConsolidatedCertList0022.pdf
· * FIPS140ConsolidatedCertList0050.pdf
· * FIPS140ConsolidatedCertList0016.pdf
· * FIPS140ConsolidatedCertList0011.pdf
· * FIPS140ConsolidatedCertDec2016.pdf
· * FIPS140ConsolidatedCertNov2016.pdf
· * FIPS140ConsolidatedCertList0043.pdf
· * FIPS140ConsolidatedCertList0057.pdf
· * FIPS140ConsolidatedCertAug2016.pdf
· * fips140-3-draft-2009.pdf
· * fips1403Draft.pdf
· * revised-draft-fips140-3_PDF-zip_document-annexA-to-annexG.zip
· * fips140-3-draft-2009-comments-resolutions.pdf
· * fips1403draft.pdf
· * fips1402annexc.pdf
· * PublicComments_FIPS140-3Draft2.pdf
· * fips1402annexa.pdf
· * fips1402annexd.pdf
· * fips1402annexb.pdf
· * CommentsFIPS140-3_draft1.pdf
· * day2_mar24_fips-140-quo-vadis_nist-csd.pdf
· * day1_research_100-150.pdf
· * day1_research_100-150.pdf
· * physecpre01.pdf
· * Jean_Campbell-FIPS_140-3_-_Looking_over_the_horizon(3).pdf
· * physecpre02.pdf
· * physecpre17.pdf
· * physecpre04.pdf
· * CMVP2603.pdf
· * noninvasive-attack-testing_cscace-hsakane.pdf
· * noninvasive-attack-testing_cscace-hsakane.pdf
· * physecpre09.pdf
· * physecpre05.pdf
· * CMVP 140-3 MM Comments Template.docx
· * fips140_2_chng2_20021203.epub
· * physecpre10.ppt
· * physecpre10.ppt
· * physecpre06.ppt
· * physecpre16.ppt
· * physecpre03.ppt
· * physecpre18.ppt
· * physecpre07.ppt
· * physecpre11.ppt
· * physecpre17.ppt
· * physecpre08.ppt
· * physecpre12.ppt
· * physecpre15.ppt
· * physecpre14.ppt
· * physecpre15.ppt
· * physecpre14.ppt
· * physecpre13.ppt
* [FIPS 191]+1 – Guideline for The Analysis of Local Area Network Security
* [FIPS 198]+8 – The Keyed-Hash Message Authentication Code (HMAC)
* [FIPS 199]+7 – Standards for Security Categorization of Federal Information and Information Systems
* [FIPS 200]+2 – Minimum Security Requirements for Federal Information and Information Systems
* [February 2000]+14 – Guideline for Implementing Cryptography in the Federal Government – ITL Bulletin
* [January 2002]+7 – Guidelines on Firewalls and Firewall Policy – ITL Security Bulletin
* [January 2006]+3 – Testing And Validation Of Personal Identity Verification (PIV) Components And Subsystems For Conformance To Federal Information Processing Standard 201
* [January 2007]+4 – Security Controls For Information Systems: Revised Guidelines Issued By NIST - ITL Security Bulletin
* [June 2003]+33 – ASSET: Security Assessment Tool For Federal Agencies
* [March 2004]+13 – Federal Information Processing Standard (FIPS) 199, Standards For Security Categorization Of Federal Information And Information Systems – ITL Bulletin
* [March 2006]+19 – Minimum Security Requirements For Federal Information And Information Systems: Federal Information Processing Standard (FIPS) 200 Approved By The Secretary Of Commerce – ITL Security Bulletin
* [May 2005] – Recommended Security Controls For Federal Information Systems: Guidance For Selecting Cost-Effective Controls Using A Risk-Based Process – ITL Bulletin
* [IR 6981]+2 – Policy Expression and Enforcement for Handheld Devices
* [IR 7275]+13 – Specification for the Extensible Configuration Checklist Description Format (XCCDF)
* [IR 7284]+2 – Personal Identity Verification Card Management Report
* [IR 7316]+3 – Assessment of Access Control Systems
* [IR 7358]+4 – Program Review for Information Security Management Assistance (PRISMA)
* [November 2004]+5 – Understanding the New NIST Standards and Guidelines Required by FISMA: How Three Mandated Documents are Changing the Dynamic of Information Security for the Federal Government – ITL Security Bulletin
* [October 2006]+2 – Log Management: Using Computer And Network Records To Improve Information Security - ITL Security Bulletin
* [SP 800-100]+1 – Information Security Handbook: A Guide for Managers
* [SP 800-115]+7 – Technical Guide to Information Security Testing and Assessment
* [SP 800-12]+23 – An Introduction to Computer Security: The NIST Handbook
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, 1995-10.pdf
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 2, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 1, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 5, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 4, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 3, 1995-10.ps
· * derived-piv-nist-sp1800-12b-v2.pdf
· * derived-piv-nist-sp1800-12a-v2.pdf
· * derived-piv-nist-sp1800-12c-v2.pdf
· * derived-piv-nist-sp1800-12-v2.pdf
· * derived-piv-nist-sp1800-12-draft.pdf
· * derived-piv-nist-sp1800-12c-draft.pdf
· * derived-piv-nist-sp1800-12a-draft.pdf
· * derived-piv-nist-sp1800-12b-draft.pdf
· * NIST.SP.800-12r1.pdf
· * NIST.SP.1800-12.pdf
· * nistspecialpublication800-12.pdf
· * 800-12_4.ps
· * 800-12_5.ps
· * 800-12_1.ps
· * 800-12_2.ps
· * 800-12_3.ps
· * sp800_12_r1_draft.pdf
* [SP 800-123]+7 – Guide to General Server Security
* [SP 800-14]+8 – Generally Accepted Principles and Practices for Securing Information Technology Systems
* [SP 800-16]+28 – Information Technology Security Training Requirements: A Role- and Performance-Based Model
* [SP 800-18r1]+11 – Guide for Developing Security Plans for Information Systems
* [SP 800-19]+4 – Mobile Agent Security
* [SP 800-30]+12 – Risk Management Guide for Information Technology Systems
* [SP 800-37]+39 – Guide for Security Certification and Accreditation of Federal Information Systems
* [SP 800-41]+5 – Guidelines on Firewalls and Firewall Policy
* [SP 800-44]+3 – Guidelines on Securing Public Web Servers
* [SP 800-45]+3 – Guidelines on Electronic Mail Security
* [SP 800-49]+2 – Federal S/MIME V3 Client Profile
* [SP 800-50]+5 – Building an Information Technology Security Awareness and Training Program
* [SP 800-52]+14 – Guidelines on the Selection and Use of Transport Layer Security
* [SP 800-53r3]+235 – Recommended Security Controls for Federal Information Systems and Organizations
· * NIST SP 800-053Ar4 Assessing Security and Privacy Controls in Federal Information Systems and Organizations; Building Effective Assessment Plans, 2014-12-18 (Final).pdf
· * NIST SP 800-053r2 Recommended Security Controls for Fed Info Systems, 2007-12 (final).pdf
· * alt-SP800-53-rev3-final_updated-errata_05-01-2010.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r2 to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r3FPD to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 2 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 1 (Errata), 2010-05-01.pdf
· * NIST SP 800-053Ar1 Guide for Assessing the Security Controls in Federal Information Systems and Organizations, 2010-06-29.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2013-05-07.pdf
· * NIST SP 800-053r5 Security and Privacy Controls for Information Systems and Organizations, 2017-08-15 (Draft).pdf
· * NIST SP 800-053r4_final_word_errata_01_22_2015.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations Controls (Errata), 2014-01-15.xml
· * NIST SP 800-053A Guide for Assessing the Security Controls in Fed Info Systems, 2008-06.pdf
· * NIST SP 800-053r5-draft-controls-markup.pdf
· * alt-SP800-53r4.pdf
· * alt-SP800-53Ar4.pdf
· * alt-SP800-53.pdf
· * alt-SP800-53r5-draft.pdf
· * NIST SP 800-053r5-draft-baselines-markup.pdf
· * NIST SP 800-053-controls.xml
· * NIST SP 800-053a_r4_errata_12_18_2014.docx
· * sp800-53A-rev1-final.pdf
· * 800-53-rev1-final-clean-sz.pdf
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53r4_summary.pdf
· * NIST.SP.800-53r4.pdf
· * nist.sp.800-53ar4.pdf
· * NIST.SP.800-53Ar4.pdf
· * nist.sp.800-53r4.pdf
· * nistspecialpublication800-53r3.pdf
· * nistspecialpublication800-53r2.pdf
· * nistspecialpublication800-53r1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53a.pdf
· * nistspecialpublication800-53a.pdf
· * NIST.SP.800-53r5.pdf
· * nistspecialpublication800-53.pdf
· * nist.sp.800-53r5.pdf
· * NIST.SP.800-53Ar5.pdf
· * NIST.SP.800-53B.pdf
· * 800-53-rev1-annex3-sz.pdf
· * 800-53-rev1-annex2-sz.pdf
· * 800-53-rev1-annex1-sz.pdf
· * NIST.SP.800-53r5-draft.pdf
· * nist.sp.800-53r5-draft.pdf
· * NIST.SP.800-53Ar5-draft.pdf
· * NIST.SP.800-53B-draft.pdf
· * sp800_53a_r4_errata_12_18_2014.docx
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * DOJ_CSAM_Planning_for_Implementing_SP-800-53_Rev5_FINAL.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * apply-sp-800-53-ics-final-22aug06.pdf
· * NIST_SP_800-53_Comment_Site_User_Guide_FINAL_8Sept2021.pdf
· * ics-in-sp800-53_final_21mar07.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * ics-in-sp800-53_final_21Mar07.pdf
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53-collaboration-index-template.docx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53-collaboration-index-template.xlsx
· * sp800-53r5-control-catalog.xlsx
· * sp800-53-collaboration-index-template.docx
· * sp800-53-collaboration-index-template.xlsx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-control-catalog.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * OLIR_review_800-213A_to_800-53_rev5_final.xlsx
· * Federal_Cybersecurity_Privacy_Forum_2Dec2021_NIST_SP800-53update.pdf
· * Federal_Cybersecurity_and_Privacy_Forum_15Feb2022_What_Is_New_SP800-53ARevision5.pdf
· * Federal_Cybersecurity_Privacy_Professionals_Forum_2Dec2021_FedRAMP_NIST800-53_Rev5.pdf
· * cybersecurity-innovation-forum_01-28-2014.pdf
· * ePACS Overlay_v1_SP800-53rev5-April2021.pdf
· * FPKI Overlay-v1-SP800-53rev5-April2021.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * 2.4 - Main - DOJ Adopting OSCAL to Deliver Lastest NIST SP 800-53 Controls.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * sp800-53-rev4-ipd.pdf
· * RMF 2.0 Deep Dive 5-15-18 v3 - Kelley Dempsey Naomi Lefkovitz.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * update-draft-800-53r5-v2.pdf
· * sp800_53_r4_appendix_g_markup_draft2.pdf
· * sp800_53a_r4_draft.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_f_markup_draft2.pdf
· * sp800-53-rev4-ipd.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_d_markup_draft2.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * Day_1_AM2_SCRM_Controls_Jon_Boyens.pdf
· * 800-53-for-ICS_KEMA.pdf
· * sp800-53r5-draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft-fpd-summary-of-significant-changes.pdf
· * sp800-53r5-draft-fpd-faq.pdf
· * sp800-53r5-draft.pdf
· * 800-53-Rev4_announcement.pdf
· * 1.5 - Main - SP800-53 Empowered by OSCAL_28Feb2022.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * appxi_800-53-rev1-augmented_15may07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP_800-53B_derived-OSCAL.pdf
· * sp_800-53_v5_1-derived-oscal.pdf
· * SP_800-53_v5_1-derived-OSCAL.pdf
· * sp800_53a_r4_draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft.pdf
· * 800-53-for-ICS_KEMA.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * sp800-53r5-fpd-controls.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * 800-53 automation workflow.pdf
· * 800-53-rev4-controls.csv
· * 800-53-rev4-controls.xml
· * 800-53-rev3-controls.xml
· * 800-53-rev3-controls.csv
· * SP800-177-Rev-1-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_LOW-baseline_profile_load.csv
· * NIST_SP-800-53_rev5-derived-OSCAL.xlsx
· * SP800-161-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_PRIVACY-baseline_profile_load.csv
· * NIST_SP-800-53_rev5_MODERATE-baseline_profile_load.csv
· * SP800-82-Rev-2-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_catalog_load.csv
· * NIST_SP-800-53_rev5_HIGH-baseline_profile_load.csv
· * sp800-53r5-draft-fpd-comparison-with-rev4.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-draft-fpd-comment-template.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53ar5-draft-comment-template.xlsx
· * sp800-53ar5-draft-comment-template.xlsx
· * stig-mapping-to-nist-800-53.xlsx
· * 800-53a-rev4-objectives.csv
· * 800-53a-rev4-objectives.xml
· * 800-53A-rev3-objectives.xml
· * SP800-53-control-comment-template.xlsx
· * WIP_800_53_Rev_5_to_Framework_v_1_1.xlsx
· * sp80053-focal-elements.csv
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * sp80053-focal-details.csv
· * SP_800-53_v5_1_XML.xml
· * NIST_SP-800-53B-derived-OSCAL.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * NIST SP 800-53B-Jan2022.xlsx
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * 800_53_rev_4_focal_document_template.xlsx
· * 800_53_Rev_4_Focal_Document_Template.xlsx
· * WIP_Framework_v_1_1_to_800_53_Rev5.xlsx
· * WIP_800_53_Rev_4_to_Framework_v_1_1.xlsx
· * sp800-53B-draft-comment-template.xlsx
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
* [SP 800-53A]+79 – Guide for Assessing the Security Controls in Federal Information Systems
* [SP 800-55]+8 – Security Metrics Guide for Information Technology Systems
* [SP 800-55r1]+8 – Performance Measurement Guide for Information Security
* [SP 800-57]+46 – Recommendation on Key Management
· * NIST SP 800-057 Part 3r1 Recommendation for Key Management, Part 3; Application-Specific Key Management Guidance, 2015-01-22 (Final).pdf
· * NIST SP 800-057 Part 2 Recommendation for Key Management, Part 2; Best Practices for Key Management Organization, 2005-08-25 (Final).pdf
· * NIST SP 800-057 Recommendation for Key Management, Part 1; 2005-08 (updated March 9, 2007).pdf
· * NIST SP 800-057 Recommendation for Key Management, Part 2; 2005-08 (updated March 9, 2007).pdf
· * NIST SP 800-057 Recommendation for Key Management; Part 3 Key Management, 2007-03.pdf
· * NIST SP 800-057 Part 2r1 Recommendation for Key Management, Part 2; Best Practices for Key Management Organizations (2nd Draft), 2018-11-20 (Draft).pdf
· * NIST SP 800-057pt1r4_commentsreceived.pdf
· * alt-SP800-57part1rev4.pdf
· * alt-SP800-57part1rev3_general.pdf
· * NIST SP 800-057-pt2-draft-comments-received-apr2005.pdf
· * alt-SP800-57part3rev1.pdf
· * alt-SP800-57part2.pdf
· * sp800-57pt1r4_comments_received.pdf
· * nistspecialpublication800-57p1r3.pdf
· * nistspecialpublication800-57p1r2006.pdf
· * nistspecialpublication800-57p1r2007.pdf
· * nist.sp.800-57pt3r1.pdf
· * NIST.SP.800-57pt2r1.pdf
· * NIST.SP.800-57Pt3r1.pdf
· * sp800-57-Part1-revised2_Mar08-2007.pdf
· * nistspecialpublication800-57p2.pdf
· * NIST.SP.800-57pt1r5.pdf
· * nist.sp.800-57pt1r5.pdf
· * nistspecialpublication800-57p3.pdf
· * nistspecialpublication800-57p1.pdf
· * sp800-57_part1_rev3_general.pdf
· * NIST.SP.800-57pt1r5-draft.pdf
· * SP800-57-Part2.pdf
· * sp800-57pt1r4_comments_received.pdf
· * sp800-57pt1r4_draft_track_changes_from_rev3_to_rev4.pdf
· * sp800-57p1r4_draft.pdf
· * sp800-57-pt2-draft-comments-received-apr2005.pdf
· * sp800_57_pt3_r1_draft.pdf
· * SP80057TranPlan.pdf
· * SP80057TranPlan.pdf
· * sp800_57_pt3_r1_draft.pdf
· * CommentsSP800-57-1.pdf
· * Draft_SP800-57-Part1-Rev3_May2011.pdf
· * sp800-57-pt1-draft-apr2005-comments.pdf
· * sp800-57-pt1-draft-apr2005.pdf
· * sp800-57pt2-r1-draft.pdf
· * sp800-57pt2-r1-draft.pdf
· * sp800-57pt2-r1-draft2.pdf
· * sp800-57-pt1-draft-Jan2003.pdf
· * sp800-57-pt1-draft-Jan2003-comments.pdf
· * CommentsSP800-57Part2.pdf
* [SP 800-66r1]+9 – An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act Security Rule
* [SP 800-68r1]+6 – Guide to Securing Microsoft Windows XP Systems for IT Professionals
* [SP 800-68 Rev. 1]+6 – Guide to Securing Microsoft Windows XP Systems for IT Professionals
* [SP 800-72]+3 – Guidelines on PDA Forensics
* [SP 800-83]+7 – Guide to Malware Incident Prevention and Handling
* [SP 800-86]+2 – Guide to Integrating Forensic Techniques into Incident Response
* [SP 800-89]+2 – Recommendation for Obtaining Assurances for Digital Signature Applications
* [SP 800-92]+8 – Guide to Computer Security Log Management
* [SP 800-94]+7 – Guide to Intrusion Detection and Prevention Systems (IDPS)
* [September 2001] – Security Self-Assessment Guide for Information Technology Systems – ITL Bulletin
+ AUTHENTICATION
* [April 2007]+1 – Securing Wireless Networks – ITL Bulletin
* [August 2004]+3 – Electronic Authentication: Guidance For Selecting Secure Techniques
* [FIPS 180]+24 – Secure Hash Standard (SHS)
* [FIPS 181]+1 – Automated Password Generator
* [FIPS 186]+25 – Digital Signature Standard (DSS)
* [FIPS 190]+1 – Guideline for the Use of Advanced Authentication Technology Alternatives
* [FIPS 196]+2 – Entity Authentication Using Public Key Cryptography
* [FIPS 198]+8 – The Keyed-Hash Message Authentication Code (HMAC)
* [February 2007]+13 – Intrusion Detection And Prevention Systems – ITL Bulletin
* [July 2005]+2 – Protecting Sensitive Information That Is Transmitted Across Networks: NIST Guidance For Selecting And Using Transport Layer Security Implementations – ITL Security Bulletin
* [March 2001]+15 – An Introduction to IPsec (Internet Protocol Security)
* [March 2003]+26 – Security For Wireless Networks And Devices
* [May 2001]+3 – Biometrics - Technologies for Highly Secure Personal Authentication
* [May 2006]+8 – An Update On Cryptographic Standards, Guidelines, And Testing Requirements – ITL Bulletin
* [IR 7030]+2 – Picture Password: A Visual Login Technique for Mobile Devices
* [IR 7046]+2 – Framework for Multi-Mode Authentication: Overview and Implementation Guide
* [IR 7200]+1 – Proximity Beacons and Mobile Handheld Devices: Overview and Implementation
* [IR 7206]+1 – Smart Cards and Mobile Device Authentication: An Overview and Implementation
* [IR 7290]+2 – Fingerprint Identification and Mobile Handheld Devices: An Overview and Implementation
* [IR 7452]+2 – Secure Biometric Match-on-Card Feasibility Report
* [SP 800-104] – A Scheme for PIV Visual Card Topography
* [SP 800-113]+2 – Guide to SSL VPNs
* [SP 800-114]+7 – User's Guide to Securing External Devices for Telework and Remote Access
* [SP 800-116]+12 – A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
* [SP 800-121]+15 – Guide to Bluetooth Security
* [SP 800-124]+11 – Guidelines on Cell Phone and PDA Security
* [SP 800-17]+10 – Modes of Operation Validation System (MOVS): Requirements and Procedures
* [SP 800-21r2]+5 – Guideline for Implementing Cryptography in the Federal Government
* [SP 800-25]+5 – Federal Agency Use of Public Key Technology for Digital Signatures and Authentication
* [SP 800-32]+4 – Introduction to Public Key Technology and the Federal PKI Infrastructure
* [SP 800-38A]+10 – Recommendation for Block Cipher Modes of Operation - Methods and Techniques
* [SP 800-38B]+5 – Recommendation for Block Cipher Modes of Operation: The RMAC Authentication Mode
* [SP 800-38C]+7 – Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality
* [SP 800-38D]+9 – Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) for Confidentiality and Authentication
* [SP 800-53r3]+235 – Recommended Security Controls for Federal Information Systems and Organizations
· * NIST SP 800-053Ar4 Assessing Security and Privacy Controls in Federal Information Systems and Organizations; Building Effective Assessment Plans, 2014-12-18 (Final).pdf
· * NIST SP 800-053r2 Recommended Security Controls for Fed Info Systems, 2007-12 (final).pdf
· * alt-SP800-53-rev3-final_updated-errata_05-01-2010.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r2 to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r3FPD to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 2 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 1 (Errata), 2010-05-01.pdf
· * NIST SP 800-053Ar1 Guide for Assessing the Security Controls in Federal Information Systems and Organizations, 2010-06-29.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2013-05-07.pdf
· * NIST SP 800-053r5 Security and Privacy Controls for Information Systems and Organizations, 2017-08-15 (Draft).pdf
· * NIST SP 800-053r4_final_word_errata_01_22_2015.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations Controls (Errata), 2014-01-15.xml
· * NIST SP 800-053A Guide for Assessing the Security Controls in Fed Info Systems, 2008-06.pdf
· * NIST SP 800-053r5-draft-controls-markup.pdf
· * alt-SP800-53r4.pdf
· * alt-SP800-53Ar4.pdf
· * alt-SP800-53.pdf
· * alt-SP800-53r5-draft.pdf
· * NIST SP 800-053r5-draft-baselines-markup.pdf
· * NIST SP 800-053-controls.xml
· * NIST SP 800-053a_r4_errata_12_18_2014.docx
· * sp800-53A-rev1-final.pdf
· * 800-53-rev1-final-clean-sz.pdf
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53r4_summary.pdf
· * NIST.SP.800-53r4.pdf
· * nist.sp.800-53ar4.pdf
· * NIST.SP.800-53Ar4.pdf
· * nist.sp.800-53r4.pdf
· * nistspecialpublication800-53r3.pdf
· * nistspecialpublication800-53r2.pdf
· * nistspecialpublication800-53r1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53a.pdf
· * nistspecialpublication800-53a.pdf
· * NIST.SP.800-53r5.pdf
· * nistspecialpublication800-53.pdf
· * nist.sp.800-53r5.pdf
· * NIST.SP.800-53Ar5.pdf
· * NIST.SP.800-53B.pdf
· * 800-53-rev1-annex3-sz.pdf
· * 800-53-rev1-annex2-sz.pdf
· * 800-53-rev1-annex1-sz.pdf
· * NIST.SP.800-53r5-draft.pdf
· * nist.sp.800-53r5-draft.pdf
· * NIST.SP.800-53Ar5-draft.pdf
· * NIST.SP.800-53B-draft.pdf
· * sp800_53a_r4_errata_12_18_2014.docx
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * DOJ_CSAM_Planning_for_Implementing_SP-800-53_Rev5_FINAL.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * apply-sp-800-53-ics-final-22aug06.pdf
· * NIST_SP_800-53_Comment_Site_User_Guide_FINAL_8Sept2021.pdf
· * ics-in-sp800-53_final_21mar07.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * ics-in-sp800-53_final_21Mar07.pdf
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53-collaboration-index-template.docx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53-collaboration-index-template.xlsx
· * sp800-53r5-control-catalog.xlsx
· * sp800-53-collaboration-index-template.docx
· * sp800-53-collaboration-index-template.xlsx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-control-catalog.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * OLIR_review_800-213A_to_800-53_rev5_final.xlsx
· * Federal_Cybersecurity_Privacy_Forum_2Dec2021_NIST_SP800-53update.pdf
· * Federal_Cybersecurity_and_Privacy_Forum_15Feb2022_What_Is_New_SP800-53ARevision5.pdf
· * Federal_Cybersecurity_Privacy_Professionals_Forum_2Dec2021_FedRAMP_NIST800-53_Rev5.pdf
· * cybersecurity-innovation-forum_01-28-2014.pdf
· * ePACS Overlay_v1_SP800-53rev5-April2021.pdf
· * FPKI Overlay-v1-SP800-53rev5-April2021.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * 2.4 - Main - DOJ Adopting OSCAL to Deliver Lastest NIST SP 800-53 Controls.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * sp800-53-rev4-ipd.pdf
· * RMF 2.0 Deep Dive 5-15-18 v3 - Kelley Dempsey Naomi Lefkovitz.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * update-draft-800-53r5-v2.pdf
· * sp800_53_r4_appendix_g_markup_draft2.pdf
· * sp800_53a_r4_draft.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_f_markup_draft2.pdf
· * sp800-53-rev4-ipd.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_d_markup_draft2.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * Day_1_AM2_SCRM_Controls_Jon_Boyens.pdf
· * 800-53-for-ICS_KEMA.pdf
· * sp800-53r5-draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft-fpd-summary-of-significant-changes.pdf
· * sp800-53r5-draft-fpd-faq.pdf
· * sp800-53r5-draft.pdf
· * 800-53-Rev4_announcement.pdf
· * 1.5 - Main - SP800-53 Empowered by OSCAL_28Feb2022.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * appxi_800-53-rev1-augmented_15may07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP_800-53B_derived-OSCAL.pdf
· * sp_800-53_v5_1-derived-oscal.pdf
· * SP_800-53_v5_1-derived-OSCAL.pdf
· * sp800_53a_r4_draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft.pdf
· * 800-53-for-ICS_KEMA.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * sp800-53r5-fpd-controls.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * 800-53 automation workflow.pdf
· * 800-53-rev4-controls.csv
· * 800-53-rev4-controls.xml
· * 800-53-rev3-controls.xml
· * 800-53-rev3-controls.csv
· * SP800-177-Rev-1-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_LOW-baseline_profile_load.csv
· * NIST_SP-800-53_rev5-derived-OSCAL.xlsx
· * SP800-161-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_PRIVACY-baseline_profile_load.csv
· * NIST_SP-800-53_rev5_MODERATE-baseline_profile_load.csv
· * SP800-82-Rev-2-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_catalog_load.csv
· * NIST_SP-800-53_rev5_HIGH-baseline_profile_load.csv
· * sp800-53r5-draft-fpd-comparison-with-rev4.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-draft-fpd-comment-template.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53ar5-draft-comment-template.xlsx
· * sp800-53ar5-draft-comment-template.xlsx
· * stig-mapping-to-nist-800-53.xlsx
· * 800-53a-rev4-objectives.csv
· * 800-53a-rev4-objectives.xml
· * 800-53A-rev3-objectives.xml
· * SP800-53-control-comment-template.xlsx
· * WIP_800_53_Rev_5_to_Framework_v_1_1.xlsx
· * sp80053-focal-elements.csv
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * sp80053-focal-details.csv
· * SP_800-53_v5_1_XML.xml
· * NIST_SP-800-53B-derived-OSCAL.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * NIST SP 800-53B-Jan2022.xlsx
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * 800_53_rev_4_focal_document_template.xlsx
· * 800_53_Rev_4_Focal_Document_Template.xlsx
· * WIP_Framework_v_1_1_to_800_53_Rev5.xlsx
· * WIP_800_53_Rev_4_to_Framework_v_1_1.xlsx
· * sp800-53B-draft-comment-template.xlsx
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
* [SP 800-57]+46 – Recommendation on Key Management
· * NIST SP 800-057 Part 3r1 Recommendation for Key Management, Part 3; Application-Specific Key Management Guidance, 2015-01-22 (Final).pdf
· * NIST SP 800-057 Part 2 Recommendation for Key Management, Part 2; Best Practices for Key Management Organization, 2005-08-25 (Final).pdf
· * NIST SP 800-057 Recommendation for Key Management, Part 1; 2005-08 (updated March 9, 2007).pdf
· * NIST SP 800-057 Recommendation for Key Management, Part 2; 2005-08 (updated March 9, 2007).pdf
· * NIST SP 800-057 Recommendation for Key Management; Part 3 Key Management, 2007-03.pdf
· * NIST SP 800-057 Part 2r1 Recommendation for Key Management, Part 2; Best Practices for Key Management Organizations (2nd Draft), 2018-11-20 (Draft).pdf
· * NIST SP 800-057pt1r4_commentsreceived.pdf
· * alt-SP800-57part1rev4.pdf
· * alt-SP800-57part1rev3_general.pdf
· * NIST SP 800-057-pt2-draft-comments-received-apr2005.pdf
· * alt-SP800-57part3rev1.pdf
· * alt-SP800-57part2.pdf
· * sp800-57pt1r4_comments_received.pdf
· * nistspecialpublication800-57p1r3.pdf
· * nistspecialpublication800-57p1r2006.pdf
· * nistspecialpublication800-57p1r2007.pdf
· * nist.sp.800-57pt3r1.pdf
· * NIST.SP.800-57pt2r1.pdf
· * NIST.SP.800-57Pt3r1.pdf
· * sp800-57-Part1-revised2_Mar08-2007.pdf
· * nistspecialpublication800-57p2.pdf
· * NIST.SP.800-57pt1r5.pdf
· * nist.sp.800-57pt1r5.pdf
· * nistspecialpublication800-57p3.pdf
· * nistspecialpublication800-57p1.pdf
· * sp800-57_part1_rev3_general.pdf
· * NIST.SP.800-57pt1r5-draft.pdf
· * SP800-57-Part2.pdf
· * sp800-57pt1r4_comments_received.pdf
· * sp800-57pt1r4_draft_track_changes_from_rev3_to_rev4.pdf
· * sp800-57p1r4_draft.pdf
· * sp800-57-pt2-draft-comments-received-apr2005.pdf
· * sp800_57_pt3_r1_draft.pdf
· * SP80057TranPlan.pdf
· * SP80057TranPlan.pdf
· * sp800_57_pt3_r1_draft.pdf
· * CommentsSP800-57-1.pdf
· * Draft_SP800-57-Part1-Rev3_May2011.pdf
· * sp800-57-pt1-draft-apr2005-comments.pdf
· * sp800-57-pt1-draft-apr2005.pdf
· * sp800-57pt2-r1-draft.pdf
· * sp800-57pt2-r1-draft.pdf
· * sp800-57pt2-r1-draft2.pdf
· * sp800-57-pt1-draft-Jan2003.pdf
· * sp800-57-pt1-draft-Jan2003-comments.pdf
· * CommentsSP800-57Part2.pdf
* [SP 800-63r1]+42 – Electronic Authentication Guideline
* [SP 800-73]+44 – Interfaces for Personal Identity Verification
* [SP 800-78]+20 – Cryptographic Algorithms and Key Sizes for Personal Identity Verification
* [SP 800-89]+2 – Recommendation for Obtaining Assurances for Digital Signature Applications
* [September 2005]+13 – Biometric Technologies: Helping To Protect Information And Automated Transactions In Information Technology Systems
+ AWARENESS & TRAINING
* [FIPS 200]+2 – Minimum Security Requirements for Federal Information and Information Systems
* [IR 7284]+2 – Personal Identity Verification Card Management Report
* [IR 7359]+3 – Information Security Guide For Government Executives
* [November 2002]+3 – Security For Telecommuting And Broadband Communications
* [November 2006]+2 – Guide To Securing Computers Using Windows XP Home Edition – ITL Bulletin
* [October 2003]+6 – Information Technology Security Awareness, Training, Education, and Certification
* [SP 800-100]+1 – Information Security Handbook: A Guide for Managers
* [SP 800-12]+23 – An Introduction to Computer Security: The NIST Handbook
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, 1995-10.pdf
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 2, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 1, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 5, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 4, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 3, 1995-10.ps
· * derived-piv-nist-sp1800-12b-v2.pdf
· * derived-piv-nist-sp1800-12a-v2.pdf
· * derived-piv-nist-sp1800-12c-v2.pdf
· * derived-piv-nist-sp1800-12-v2.pdf
· * derived-piv-nist-sp1800-12-draft.pdf
· * derived-piv-nist-sp1800-12c-draft.pdf
· * derived-piv-nist-sp1800-12a-draft.pdf
· * derived-piv-nist-sp1800-12b-draft.pdf
· * NIST.SP.800-12r1.pdf
· * NIST.SP.1800-12.pdf
· * nistspecialpublication800-12.pdf
· * 800-12_4.ps
· * 800-12_5.ps
· * 800-12_1.ps
· * 800-12_2.ps
· * 800-12_3.ps
· * sp800_12_r1_draft.pdf
* [SP 800-14]+8 – Generally Accepted Principles and Practices for Securing Information Technology Systems
* [SP 800-16]+28 – Information Technology Security Training Requirements: A Role- and Performance-Based Model
* [SP 800-40r2]+11 – Creating a Patch and Vulnerability Management Program
* [SP 800-46r1]+10 – Security for Telecommuting and Broadband Communications
* [SP 800-50]+5 – Building an Information Technology Security Awareness and Training Program
* [SP 800-53r3]+235 – Recommended Security Controls for Federal Information Systems and Organizations
· * NIST SP 800-053Ar4 Assessing Security and Privacy Controls in Federal Information Systems and Organizations; Building Effective Assessment Plans, 2014-12-18 (Final).pdf
· * NIST SP 800-053r2 Recommended Security Controls for Fed Info Systems, 2007-12 (final).pdf
· * alt-SP800-53-rev3-final_updated-errata_05-01-2010.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r2 to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r3FPD to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 2 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 1 (Errata), 2010-05-01.pdf
· * NIST SP 800-053Ar1 Guide for Assessing the Security Controls in Federal Information Systems and Organizations, 2010-06-29.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2013-05-07.pdf
· * NIST SP 800-053r5 Security and Privacy Controls for Information Systems and Organizations, 2017-08-15 (Draft).pdf
· * NIST SP 800-053r4_final_word_errata_01_22_2015.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations Controls (Errata), 2014-01-15.xml
· * NIST SP 800-053A Guide for Assessing the Security Controls in Fed Info Systems, 2008-06.pdf
· * NIST SP 800-053r5-draft-controls-markup.pdf
· * alt-SP800-53r4.pdf
· * alt-SP800-53Ar4.pdf
· * alt-SP800-53.pdf
· * alt-SP800-53r5-draft.pdf
· * NIST SP 800-053r5-draft-baselines-markup.pdf
· * NIST SP 800-053-controls.xml
· * NIST SP 800-053a_r4_errata_12_18_2014.docx
· * sp800-53A-rev1-final.pdf
· * 800-53-rev1-final-clean-sz.pdf
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53r4_summary.pdf
· * NIST.SP.800-53r4.pdf
· * nist.sp.800-53ar4.pdf
· * NIST.SP.800-53Ar4.pdf
· * nist.sp.800-53r4.pdf
· * nistspecialpublication800-53r3.pdf
· * nistspecialpublication800-53r2.pdf
· * nistspecialpublication800-53r1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53a.pdf
· * nistspecialpublication800-53a.pdf
· * NIST.SP.800-53r5.pdf
· * nistspecialpublication800-53.pdf
· * nist.sp.800-53r5.pdf
· * NIST.SP.800-53Ar5.pdf
· * NIST.SP.800-53B.pdf
· * 800-53-rev1-annex3-sz.pdf
· * 800-53-rev1-annex2-sz.pdf
· * 800-53-rev1-annex1-sz.pdf
· * NIST.SP.800-53r5-draft.pdf
· * nist.sp.800-53r5-draft.pdf
· * NIST.SP.800-53Ar5-draft.pdf
· * NIST.SP.800-53B-draft.pdf
· * sp800_53a_r4_errata_12_18_2014.docx
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * DOJ_CSAM_Planning_for_Implementing_SP-800-53_Rev5_FINAL.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * apply-sp-800-53-ics-final-22aug06.pdf
· * NIST_SP_800-53_Comment_Site_User_Guide_FINAL_8Sept2021.pdf
· * ics-in-sp800-53_final_21mar07.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * ics-in-sp800-53_final_21Mar07.pdf
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53-collaboration-index-template.docx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53-collaboration-index-template.xlsx
· * sp800-53r5-control-catalog.xlsx
· * sp800-53-collaboration-index-template.docx
· * sp800-53-collaboration-index-template.xlsx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-control-catalog.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * OLIR_review_800-213A_to_800-53_rev5_final.xlsx
· * Federal_Cybersecurity_Privacy_Forum_2Dec2021_NIST_SP800-53update.pdf
· * Federal_Cybersecurity_and_Privacy_Forum_15Feb2022_What_Is_New_SP800-53ARevision5.pdf
· * Federal_Cybersecurity_Privacy_Professionals_Forum_2Dec2021_FedRAMP_NIST800-53_Rev5.pdf
· * cybersecurity-innovation-forum_01-28-2014.pdf
· * ePACS Overlay_v1_SP800-53rev5-April2021.pdf
· * FPKI Overlay-v1-SP800-53rev5-April2021.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * 2.4 - Main - DOJ Adopting OSCAL to Deliver Lastest NIST SP 800-53 Controls.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * sp800-53-rev4-ipd.pdf
· * RMF 2.0 Deep Dive 5-15-18 v3 - Kelley Dempsey Naomi Lefkovitz.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * update-draft-800-53r5-v2.pdf
· * sp800_53_r4_appendix_g_markup_draft2.pdf
· * sp800_53a_r4_draft.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_f_markup_draft2.pdf
· * sp800-53-rev4-ipd.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_d_markup_draft2.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * Day_1_AM2_SCRM_Controls_Jon_Boyens.pdf
· * 800-53-for-ICS_KEMA.pdf
· * sp800-53r5-draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft-fpd-summary-of-significant-changes.pdf
· * sp800-53r5-draft-fpd-faq.pdf
· * sp800-53r5-draft.pdf
· * 800-53-Rev4_announcement.pdf
· * 1.5 - Main - SP800-53 Empowered by OSCAL_28Feb2022.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * appxi_800-53-rev1-augmented_15may07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP_800-53B_derived-OSCAL.pdf
· * sp_800-53_v5_1-derived-oscal.pdf
· * SP_800-53_v5_1-derived-OSCAL.pdf
· * sp800_53a_r4_draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft.pdf
· * 800-53-for-ICS_KEMA.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * sp800-53r5-fpd-controls.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * 800-53 automation workflow.pdf
· * 800-53-rev4-controls.csv
· * 800-53-rev4-controls.xml
· * 800-53-rev3-controls.xml
· * 800-53-rev3-controls.csv
· * SP800-177-Rev-1-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_LOW-baseline_profile_load.csv
· * NIST_SP-800-53_rev5-derived-OSCAL.xlsx
· * SP800-161-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_PRIVACY-baseline_profile_load.csv
· * NIST_SP-800-53_rev5_MODERATE-baseline_profile_load.csv
· * SP800-82-Rev-2-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_catalog_load.csv
· * NIST_SP-800-53_rev5_HIGH-baseline_profile_load.csv
· * sp800-53r5-draft-fpd-comparison-with-rev4.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-draft-fpd-comment-template.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53ar5-draft-comment-template.xlsx
· * sp800-53ar5-draft-comment-template.xlsx
· * stig-mapping-to-nist-800-53.xlsx
· * 800-53a-rev4-objectives.csv
· * 800-53a-rev4-objectives.xml
· * 800-53A-rev3-objectives.xml
· * SP800-53-control-comment-template.xlsx
· * WIP_800_53_Rev_5_to_Framework_v_1_1.xlsx
· * sp80053-focal-elements.csv
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * sp80053-focal-details.csv
· * SP_800-53_v5_1_XML.xml
· * NIST_SP-800-53B-derived-OSCAL.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * NIST SP 800-53B-Jan2022.xlsx
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * 800_53_rev_4_focal_document_template.xlsx
· * 800_53_Rev_4_Focal_Document_Template.xlsx
· * WIP_Framework_v_1_1_to_800_53_Rev5.xlsx
· * WIP_800_53_Rev_4_to_Framework_v_1_1.xlsx
· * sp800-53B-draft-comment-template.xlsx
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
* [SP 800-66r1]+9 – An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act Security Rule
+ BIOMETRICS
* [August 2005]+9 – Implementation Of FIPS 201, Personal Identity Verification (PIV) Of Federal Employees And Contractors
* [FIPS 201]+374 – Personal Identity Verification for Federal Employees and Contractors
* [July 2002]+4 – Overview: The Government Smart Card Interoperability Specification
* [March 2005]+13 – Personal Identity Verification (PIV) Of Federal Employees And Contractors: Federal Information Processing Standard (FIPS) 201
* [May 2001]+3 – Biometrics - Technologies for Highly Secure Personal Authentication
* [IR 6529-A]+2 – Common Biometric Exchange File Format (CBEFF)
* [IR 6887]+2 – Government Smart Card Interoperability Specification (GSC-IS), v2.1
* [IR 7056]+2 – Card Technology Development and Gap Analysis Interagency Report
* [IR 7206]+1 – Smart Cards and Mobile Device Authentication: An Overview and Implementation
* [IR 7284]+2 – Personal Identity Verification Card Management Report
* [IR 7290]+2 – Fingerprint Identification and Mobile Handheld Devices: An Overview and Implementation
* [IR 7452]+2 – Secure Biometric Match-on-Card Feasibility Report
* [SP 800-116]+12 – A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
* [SP 800-73]+44 – Interfaces for Personal Identity Verification
* [SP 800-76]+16 – Biometric Data Specification for Personal Identity Verification
* [September 2005]+13 – Biometric Technologies: Helping To Protect Information And Automated Transactions In Information Technology Systems
+ CERTIFICATION & ACCREDITATION (C&A)
* [August 2003]+3 – IT Security Metrics
* [December 2006]+24 – Maintaining Effective Information Technology (IT) Security Through Test, Training, And Exercise Programs – ITL Bulletin
* [FIPS 191]+1 – Guideline for The Analysis of Local Area Network Security
* [FIPS 199]+7 – Standards for Security Categorization of Federal Information and Information Systems
* [FIPS 200]+2 – Minimum Security Requirements for Federal Information and Information Systems
* [February 2003]+1 – Secure Interconnections for Information Technology Systems – ITL Bulletin
* [July 2004] – Guide For Mapping Types Of Information And Information Systems To Security Categories – ITL Bulletin
* [June 2003]+33 – ASSET: Security Assessment Tool For Federal Agencies
* [March 2004]+13 – Federal Information Processing Standard (FIPS) 199, Standards For Security Categorization Of Federal Information And Information Systems – ITL Bulletin
* [March 2006]+19 – Minimum Security Requirements For Federal Information And Information Systems: Federal Information Processing Standard (FIPS) 200 Approved By The Secretary Of Commerce – ITL Security Bulletin
* [May 2004]+4 – Guide For The Security Certification And Accreditation Of Federal Information Systems – ITL Bulletin
* [May 2005] – Recommended Security Controls For Federal Information Systems: Guidance For Selecting Cost-Effective Controls Using A Risk-Based Process – ITL Bulletin
* [November 2004]+5 – Understanding the New NIST Standards and Guidelines Required by FISMA: How Three Mandated Documents are Changing the Dynamic of Information Security for the Federal Government – ITL Security Bulletin
* [SP 800-115]+7 – Technical Guide to Information Security Testing and Assessment
* [SP 800-18r1]+11 – Guide for Developing Security Plans for Information Systems
* [SP 800-23]+3 – Guideline to Federal Organizations on Security Assurance and Acquisition/Use of Tested/Evaluated Products
* [SP 800-30]+12 – Risk Management Guide for Information Technology Systems
* [SP 800-34]+22 – Contingency Planning Guide for Information Technology Systems
* [SP 800-37]+39 – Guide for Security Certification and Accreditation of Federal Information Systems
* [SP 800-47]+4 – Security Guide for Interconnecting Information Technology Systems
* [SP 800-53r3]+235 – Recommended Security Controls for Federal Information Systems and Organizations
· * NIST SP 800-053Ar4 Assessing Security and Privacy Controls in Federal Information Systems and Organizations; Building Effective Assessment Plans, 2014-12-18 (Final).pdf
· * NIST SP 800-053r2 Recommended Security Controls for Fed Info Systems, 2007-12 (final).pdf
· * alt-SP800-53-rev3-final_updated-errata_05-01-2010.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r2 to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r3FPD to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 2 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 1 (Errata), 2010-05-01.pdf
· * NIST SP 800-053Ar1 Guide for Assessing the Security Controls in Federal Information Systems and Organizations, 2010-06-29.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2013-05-07.pdf
· * NIST SP 800-053r5 Security and Privacy Controls for Information Systems and Organizations, 2017-08-15 (Draft).pdf
· * NIST SP 800-053r4_final_word_errata_01_22_2015.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations Controls (Errata), 2014-01-15.xml
· * NIST SP 800-053A Guide for Assessing the Security Controls in Fed Info Systems, 2008-06.pdf
· * NIST SP 800-053r5-draft-controls-markup.pdf
· * alt-SP800-53r4.pdf
· * alt-SP800-53Ar4.pdf
· * alt-SP800-53.pdf
· * alt-SP800-53r5-draft.pdf
· * NIST SP 800-053r5-draft-baselines-markup.pdf
· * NIST SP 800-053-controls.xml
· * NIST SP 800-053a_r4_errata_12_18_2014.docx
· * sp800-53A-rev1-final.pdf
· * 800-53-rev1-final-clean-sz.pdf
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53r4_summary.pdf
· * NIST.SP.800-53r4.pdf
· * nist.sp.800-53ar4.pdf
· * NIST.SP.800-53Ar4.pdf
· * nist.sp.800-53r4.pdf
· * nistspecialpublication800-53r3.pdf
· * nistspecialpublication800-53r2.pdf
· * nistspecialpublication800-53r1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53a.pdf
· * nistspecialpublication800-53a.pdf
· * NIST.SP.800-53r5.pdf
· * nistspecialpublication800-53.pdf
· * nist.sp.800-53r5.pdf
· * NIST.SP.800-53Ar5.pdf
· * NIST.SP.800-53B.pdf
· * 800-53-rev1-annex3-sz.pdf
· * 800-53-rev1-annex2-sz.pdf
· * 800-53-rev1-annex1-sz.pdf
· * NIST.SP.800-53r5-draft.pdf
· * nist.sp.800-53r5-draft.pdf
· * NIST.SP.800-53Ar5-draft.pdf
· * NIST.SP.800-53B-draft.pdf
· * sp800_53a_r4_errata_12_18_2014.docx
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * DOJ_CSAM_Planning_for_Implementing_SP-800-53_Rev5_FINAL.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * apply-sp-800-53-ics-final-22aug06.pdf
· * NIST_SP_800-53_Comment_Site_User_Guide_FINAL_8Sept2021.pdf
· * ics-in-sp800-53_final_21mar07.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * ics-in-sp800-53_final_21Mar07.pdf
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53-collaboration-index-template.docx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53-collaboration-index-template.xlsx
· * sp800-53r5-control-catalog.xlsx
· * sp800-53-collaboration-index-template.docx
· * sp800-53-collaboration-index-template.xlsx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-control-catalog.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * OLIR_review_800-213A_to_800-53_rev5_final.xlsx
· * Federal_Cybersecurity_Privacy_Forum_2Dec2021_NIST_SP800-53update.pdf
· * Federal_Cybersecurity_and_Privacy_Forum_15Feb2022_What_Is_New_SP800-53ARevision5.pdf
· * Federal_Cybersecurity_Privacy_Professionals_Forum_2Dec2021_FedRAMP_NIST800-53_Rev5.pdf
· * cybersecurity-innovation-forum_01-28-2014.pdf
· * ePACS Overlay_v1_SP800-53rev5-April2021.pdf
· * FPKI Overlay-v1-SP800-53rev5-April2021.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * 2.4 - Main - DOJ Adopting OSCAL to Deliver Lastest NIST SP 800-53 Controls.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * sp800-53-rev4-ipd.pdf
· * RMF 2.0 Deep Dive 5-15-18 v3 - Kelley Dempsey Naomi Lefkovitz.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * update-draft-800-53r5-v2.pdf
· * sp800_53_r4_appendix_g_markup_draft2.pdf
· * sp800_53a_r4_draft.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_f_markup_draft2.pdf
· * sp800-53-rev4-ipd.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_d_markup_draft2.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * Day_1_AM2_SCRM_Controls_Jon_Boyens.pdf
· * 800-53-for-ICS_KEMA.pdf
· * sp800-53r5-draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft-fpd-summary-of-significant-changes.pdf
· * sp800-53r5-draft-fpd-faq.pdf
· * sp800-53r5-draft.pdf
· * 800-53-Rev4_announcement.pdf
· * 1.5 - Main - SP800-53 Empowered by OSCAL_28Feb2022.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * appxi_800-53-rev1-augmented_15may07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP_800-53B_derived-OSCAL.pdf
· * sp_800-53_v5_1-derived-oscal.pdf
· * SP_800-53_v5_1-derived-OSCAL.pdf
· * sp800_53a_r4_draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft.pdf
· * 800-53-for-ICS_KEMA.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * sp800-53r5-fpd-controls.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * 800-53 automation workflow.pdf
· * 800-53-rev4-controls.csv
· * 800-53-rev4-controls.xml
· * 800-53-rev3-controls.xml
· * 800-53-rev3-controls.csv
· * SP800-177-Rev-1-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_LOW-baseline_profile_load.csv
· * NIST_SP-800-53_rev5-derived-OSCAL.xlsx
· * SP800-161-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_PRIVACY-baseline_profile_load.csv
· * NIST_SP-800-53_rev5_MODERATE-baseline_profile_load.csv
· * SP800-82-Rev-2-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_catalog_load.csv
· * NIST_SP-800-53_rev5_HIGH-baseline_profile_load.csv
· * sp800-53r5-draft-fpd-comparison-with-rev4.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-draft-fpd-comment-template.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53ar5-draft-comment-template.xlsx
· * sp800-53ar5-draft-comment-template.xlsx
· * stig-mapping-to-nist-800-53.xlsx
· * 800-53a-rev4-objectives.csv
· * 800-53a-rev4-objectives.xml
· * 800-53A-rev3-objectives.xml
· * SP800-53-control-comment-template.xlsx
· * WIP_800_53_Rev_5_to_Framework_v_1_1.xlsx
· * sp80053-focal-elements.csv
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * sp80053-focal-details.csv
· * SP_800-53_v5_1_XML.xml
· * NIST_SP-800-53B-derived-OSCAL.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * NIST SP 800-53B-Jan2022.xlsx
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * 800_53_rev_4_focal_document_template.xlsx
· * 800_53_Rev_4_Focal_Document_Template.xlsx
· * WIP_Framework_v_1_1_to_800_53_Rev5.xlsx
· * WIP_800_53_Rev_4_to_Framework_v_1_1.xlsx
· * sp800-53B-draft-comment-template.xlsx
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
* [SP 800-53A]+79 – Guide for Assessing the Security Controls in Federal Information Systems
* [SP 800-55]+8 – Security Metrics Guide for Information Technology Systems
* [SP 800-55r1]+8 – Performance Measurement Guide for Information Security
* [SP 800-59]+3 – Guideline for Identifying an Information System as a National Security System
* [SP 800-60r1]+17 – Guide for Mapping Types of Information and Information Systems to Security Categories
* [SP 800-84]+8 – Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities
* [SP 800-88]+8 – Media Sanitization Guide
+ COMMUNICATIONS & WIRELESS
* [April 2006]+2 – Protecting Sensitive Information Transmitted in Public Networks – ITL Security Bulletin
* [April 2007]+1 – Securing Wireless Networks – ITL Bulletin
* [August 2000]+14 – Security for Private Branch Exchange Systems
* [FIPS 140]+285 – Security Requirements for Cryptographic Modules
· * NIST SB 2001-07 A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2.pdf
· * NIST SP 800-029 A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2, 2001-06.pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex A, 2001-05.pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex D, 2001-05.pdf
· * NIST FIPS 140-2 Security requirements for Cryptographic Modules, Annex D; Approved Key Establishment Techniques, 2001-03 (2009 Minor Edits).pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex B; Approved Protection Profiles, 2001-03 (2009 Minor Edits).pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex A; Approved Security Functions, 2001-03 (2009 Minor Edits) .pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex C; Approved Random Number Generators, 2001-03 (2009 Minor Edits).pdf
· * NIST FIPS 140-2 Security Reqs for Cryptographic Modules, 2001-03.pdf
· * NIST FIPS 140-2 Implementation Guidance for FIPS PUB 140-2 and the CMVP, 2010-08-03.pdf
· * NIST SB 1995-08 FIPS 140-1; A Framework for Cryptographic Standards.txt
· * fips140-3-final-draft-2007-comments-resolutions.pdf
· * FIPS_140-3 Final_Draft_2007.pdf
· * fips140_2_chng2_20021203.epub
· * fips140_2_chng2_20021203.epub
· * NewFIPS1402LogoForm.pdf
· * FIPS1402LogoForm.pdf
· * FIPS1403LogoForm.pdf
· * fips140-3-sections-submitted-for-comments.pdf
· * FIPS140ConsolidatedCertApr2017.pdf
· * FIPS140ConsolidatedCertMar2017.pdf
· * fips140consolidatedcertlist0034.pdf
· * FIPS1402DTR.pdf
· * FIPS140ConsolidatedCertJan2018.pdf
· * FIPS140ConsolidatedCertOct2017.pdf
· * FIPS140ConsolidatedCertAug2018.pdf
· * fips140consolidatedcertlist0053.pdf
· * FIPS140ConsolidatedCertList0008.pdf
· * FIPS 140-3 IG.pdf
· * FIPS140ConsolidatedCertSept2016.pdf
· * FIPS140ConsolidatedCertList0034.pdf
· * FIPS140ConsolidatedCertList0054.pdf
· * fips140consolidatedcertlist0042.pdf
· * FIPS140ConsolidatedCertList0052.pdf
· * FIPS1402LogoForm.pdf
· * FIPS140ConsolidatedCertApril2016.pdf
· * FIPS140ConsolidatedCertList0041.pdf
· * FIPS140ConsolidatedCertList0048.pdf
· * FIPS140ConsolidatedCertList0028.pdf
· * FIPS140ConsolidatedCertOct2018.pdf
· * FIPS140ConsolidatedCertNov2019.pdf
· * FIPS140ConsolidatedCertMarch2016.pdf
· * FIPS140ConsolidatedCertList0026.pdf
· * FIPS140ConsolidatedCertMay2016.pdf
· * FIPS140ConsolidatedCertList0057.pdf
· * FIPS140ConsolidatedCertList0035.pdf
· * FIPS1401LogoForm.pdf
· * fips140consolidatedcertlist0046.pdf
· * FIPS140ConsolidatedCertList0024.pdf
· * FIPS140ConsolidatedCertList0049.pdf
· * FIPS 140-3 IG.pdf
· * FIPS140ConsolidatedCertSept2017.pdf
· * FIPS140ConsolidatedCertOct2015.pdf
· * FIPS140ConsolidatedCertJuly2016.pdf
· * fips140consolidatedcertoct2016.pdf
· * FIPS-140-2-CMVP Management Manual 09-09-2021.pdf
· * fips140consolidatedcertdec2015.pdf
· * fips1402logoform.pdf
· * FIPS140ConsolidatedCertJan2017.pdf
· * fips140consolidatedcertlist0038.pdf
· * FIPS_140-3_sections_submitted_for_comments.pdf
· * FIPS140ConsolidatedCertDec2015.pdf
· * FIPS140ConsolidatedCertList0046.pdf
· * FIPS140ConsolidatedCertList0053.pdf
· * FIPS140ConsolidatedCertFeb2016.pdf
· * fips140consolidatedcertjune2016.pdf
· * NIST and ISO End User License Agreement.pdf
· * FIPS140ConsolidatedCertJune2017.pdf
· * FIPS140ConsolidatedCertDec2016.pdf
· * fips140consolidatedcertlist0026.pdf
· * FIPS140ConsolidatedCertList0042.pdf
· * FIPS140ConsolidatedCertJuly2017.pdf
· * FIPS140ConsolidatedCertNov2016.pdf
· * nist and iso end user license agreement.pdf
· * fips140consolidatedcertsept2017.pdf
· * fips140consolidatedcertmarch2016.pdf
· * fips140consolidatedcertsept2016.pdf
· * FIPS140ConsolidatedCertList0023.pdf
· * FIPS140ConsolidatedCertList0011.pdf
· * FIPS140ConsolidatedCertList0038.pdf
· * FIPS1402IG.pdf
· * FIPS140ConsolidatedCertList0045.pdf
· * FIPS140ConsolidatedCertOct2016.pdf
· * FIPS140ConsolidatedCertJune2016.pdf
· * FIPS140ConsolidatedCertList0020.pdf
· * FIPS140ConsolidatedCertList0032.pdf
· * fips140consolidatedcertmay2017.pdf
· * FIPS140ConsolidatedCertAug2016.pdf
· * FIPS140ConsolidatedCertNov2017.pdf
· * FIPS140ConsolidatedCertMay2017.pdf
· * FIPS140-2-ConsolidatedMarch2018.pdf
· * FIPS140ConsolidatedCertDec2017.pdf
· * fips140consolidatedcertlist0057.pdf
· * FIPS1403SoftSecWork.pdf
· * FIPS140ConsolidatedCertList0050.pdf
· * fips1402ig.pdf
· * fips140consolidatedcertlist0045.pdf
· * FIPS1402IG.pdf
· * fips-140-2-cmvp management manual 09-09-2021.pdf
· * FIPS140ConsolidatedCertJan2016.pdf
· * fips140consolidatedcertlist0011.pdf
· * fips140consolidatedcertmay2016.pdf
· * fips140consolidatedcertnov2019.pdf
· * FIPS140ConsolidatedCertFeb2017.pdf
· * FIPS_140-3_sections_submitted_for_comments.pdf
· * Draft FIPS-140-3-CMVP Management Manual v1.1 07-13-2022.pdf
· * Draft FIPS-140-3-CMVP Management Manual 09-18-2020.pdf
· * fips1402.pdf
· * fips1401.pdf
· * physecpre18.pdf
· * CMVP2604.pdf
· * CMVP2606.pdf
· * FIPS140ConsolidatedCertApr2017.pdf
· * day2_mar24_fips-140-quo-vadis_nist-csd.pdf
· * FIPS140ConsolidatedCertMar2017.pdf
· * fips140consolidatedcertapr2017.pdf
· * physecpaper13.pdf
· * physecpaper12.pdf
· * physecpaper10.pdf
· * physecpaper11.pdf
· * physecpaper16.pdf
· * physecpaper14.pdf
· * physecpaper14.pdf
· * physecpaper17.pdf
· * physecpaper18.pdf
· * physecpaper19.pdf
· * physecpaper12.pdf
· * FIPS140ConsolidatedCertList0032.pdf
· * FIPS140ConsolidatedCertList0040.pdf
· * FIPS140ConsolidatedCertList0031.pdf
· * FIPS140ConsolidatedCertList0034.pdf
· * physecpaper08.pdf
· * FIPS140ConsolidatedCertList0037.pdf
· * fips140consolidatedcertlist0017.pdf
· * FIPS140ConsolidatedCertList0009.pdf
· * physecpaper06.pdf
· * physecpaper09.pdf
· * FIPS140ConsolidatedCertList0035.pdf
· * FIPS140ConsolidatedCertList0015.pdf
· * FIPS140ConsolidatedCertList0051.pdf
· * FIPS140ConsolidatedCertJune2016.pdf
· * physecpaper07.pdf
· * fips140consolidatedcertlist0019.pdf
· * fips1401ig.pdf
· * FIPS140ConsolidatedCertList0013.pdf
· * FIPS140ConsolidatedCertList0007.pdf
· * FIPS140ConsolidatedCertList0023.pdf
· * FIPS140ConsolidatedCertNov2015.pdf
· * FIPS1402DTR.pdf
· * Jan12-2005-FR-FIPS1403-Notice.pdf
· * FIPS140ConsolidatedCertList0003.pdf
· * FIPS140ConsolidatedCertList0042.pdf
· * FIPS140ConsolidatedCertList0002.pdf
· * FIPS140ConsolidatedCertSept2016.pdf
· * physecpaper08.pdf
· * FIPS140ConsolidatedCertMay2016.pdf
· * FIPS140ConsolidatedCertMay2017.pdf
· * fips1402ig.pdf
· * 1401testA.pdf
· * FIPS140ConsolidatedCertList0030.pdf
· * FIPS140ConsolidatedCertList0036.pdf
· * FIPS140ConsolidatedCertList0017.pdf
· * fips140consolidatedcertmay2016.pdf
· * FIPS140ConsolidatedCertList0038.pdf
· * FIPS140ConsolidatedCertList0004.pdf
· * FIPS140ConsolidatedCertDec2015.pdf
· * FIPS140ConsolidatedCertList0014.pdf
· * FIPS140ConsolidatedCertList0012.pdf
· * FIPS140ConsolidatedCertList0010.pdf
· * FIPS140ConsolidatedCertList0029.pdf
· * FIPS140ConsolidatedCertList0001.pdf
· * fips140consolidatedcertaug2016.pdf
· * FIPS140ConsolidatedCertList0021.pdf
· * FIPS140ConsolidatedCertList0048.pdf
· * frn-2015-19743-comments-received.pdf
· * FIPS140ConsolidatedCertList0006.pdf
· * FIPS140ConsolidatedCertMarch2016.pdf
· * ispab-ltr-to-NIST-on-FIPS_140-2-ISO_20160420.pdf
· * FIPS140ConsolidatedCertList0033.pdf
· * FIPS140ConsolidatedCertList0008.pdf
· * physecpaper03.pdf
· * FIPS140ConsolidatedCertJuly2016.pdf
· * fips140consolidatedcertmay2017.pdf
· * fips140-3_non-invasive2.pdf
· * FIPS140ConsolidatedCertList0046.pdf
· * physecpaper03.pdf
· * FIPS140ConsolidatedCertList0020.pdf
· * FIPS140ConsolidatedCertList0055.pdf
· * FIPS140ConsolidatedCertList0024.pdf
· * fips140consolidatedcertnov2015.pdf
· * 1401test.pdf
· * FIPS140ConsolidatedCertList0005.pdf
· * ispab-ltr-to-NIST-on-FIPS_140-2-ISO_20160420.pdf
· * FIPS140ConsolidatedCertList0027.pdf
· * FIPS140ConsolidatedCertApril2016.pdf
· * FIPS140ConsolidatedCertOct2015.pdf
· * fips1402DTR.pdf
· * FIPS140ConsolidatedCertFeb2017.pdf
· * FIPS140ConsolidatedCertList0044.pdf
· * FIPS140ConsolidatedCertList0054.pdf
· * physecpaper05.pdf
· * FIPS140ConsolidatedCertAug2017.pdf
· * physecpaper02.pdf
· * FIPS1402IG.pdf
· * FIPS140ConsolidatedCertList0041.pdf
· * FIPS140ConsolidatedCertList0019.pdf
· * 140-2flow.pdf
· * FIPS140ConsolidatedCertList0053.pdf
· * FIPS140ConsolidatedCertList0045.pdf
· * FIPS140ConsolidatedCertList0049.pdf
· * fips140-3_non-invasive1.pdf
· * fips140consolidatedcertlist0024.pdf
· * FIPS140ConsolidatedCertList0039.pdf
· * physecpaper04.pdf
· * FIPS140ConsolidatedCertJune2017.pdf
· * physecpaper01.pdf
· * FIPS140ConsolidatedCertJuly2017.pdf
· * FIPS140ConsolidatedCertOct2016.pdf
· * FIPS140ConsolidatedCertList0026.pdf
· * fips140consolidatedcertdec2016.pdf
· * fips140consolidatedcertlist0042.pdf
· * FIPS140ConsolidatedCertJan2016.pdf
· * FIPS140ConsolidatedCertFeb2016.pdf
· * fips140consolidatedcertjan2017.pdf
· * FIPS140ConsolidatedCertList0052.pdf
· * FIPS140ConsolidatedCertList0047.pdf
· * FIPS140ConsolidatedCertJan2017.pdf
· * FIPS1401IG.pdf
· * FIPS140ConsolidatedCertList0056.pdf
· * FIPS140ConsolidatedCertList0028.pdf
· * FIPS140ConsolidatedCertList0018.pdf
· * fips-140_response.pdf
· * FIPS140ConsolidatedCertList0025.pdf
· * ispab-ltr-to-nist-on-fips_140-2-iso_20160420.pdf
· * FIPS140ConsolidatedCertList0022.pdf
· * FIPS140ConsolidatedCertList0050.pdf
· * FIPS140ConsolidatedCertList0016.pdf
· * FIPS140ConsolidatedCertList0011.pdf
· * FIPS140ConsolidatedCertDec2016.pdf
· * FIPS140ConsolidatedCertNov2016.pdf
· * FIPS140ConsolidatedCertList0043.pdf
· * FIPS140ConsolidatedCertList0057.pdf
· * FIPS140ConsolidatedCertAug2016.pdf
· * fips140-3-draft-2009.pdf
· * fips1403Draft.pdf
· * revised-draft-fips140-3_PDF-zip_document-annexA-to-annexG.zip
· * fips140-3-draft-2009-comments-resolutions.pdf
· * fips1403draft.pdf
· * fips1402annexc.pdf
· * PublicComments_FIPS140-3Draft2.pdf
· * fips1402annexa.pdf
· * fips1402annexd.pdf
· * fips1402annexb.pdf
· * CommentsFIPS140-3_draft1.pdf
· * day2_mar24_fips-140-quo-vadis_nist-csd.pdf
· * day1_research_100-150.pdf
· * day1_research_100-150.pdf
· * physecpre01.pdf
· * Jean_Campbell-FIPS_140-3_-_Looking_over_the_horizon(3).pdf
· * physecpre02.pdf
· * physecpre17.pdf
· * physecpre04.pdf
· * CMVP2603.pdf
· * noninvasive-attack-testing_cscace-hsakane.pdf
· * noninvasive-attack-testing_cscace-hsakane.pdf
· * physecpre09.pdf
· * physecpre05.pdf
· * CMVP 140-3 MM Comments Template.docx
· * fips140_2_chng2_20021203.epub
· * physecpre10.ppt
· * physecpre10.ppt
· * physecpre06.ppt
· * physecpre16.ppt
· * physecpre03.ppt
· * physecpre18.ppt
· * physecpre07.ppt
· * physecpre11.ppt
· * physecpre17.ppt
· * physecpre08.ppt
· * physecpre12.ppt
· * physecpre15.ppt
· * physecpre14.ppt
· * physecpre15.ppt
· * physecpre14.ppt
· * physecpre13.ppt
* [January 2002]+7 – Guidelines on Firewalls and Firewall Policy – ITL Security Bulletin
* [January 2003]+5 – Security Of Electronic Mail
* [July 2007]+5 – Border Gateway Protocol Security – ITL Security Bulletin
* [June 2006]+18 – Domain Name System (DNS) Services: NIST Recommendations For Secure Deployment – ITL Bulletin
* [June 2007]+18 – Forensic Techniques for Cell Phones – ITL Bulletin
* [March 2001]+15 – An Introduction to IPsec (Internet Protocol Security)
* [March 2003]+26 – Security For Wireless Networks And Devices
* [March 2007]+17 – Improving The Security Of Electronic Mail: Updated Guidelines Issued By NIST – ITL Security Bulletin
* [May 2007]+3 – Securing Radio Frequency Identification (RFID) Systems – ITL Security Bulletin
* [IR 7046]+2 – Framework for Multi-Mode Authentication: Overview and Implementation Guide
* [IR 7206]+1 – Smart Cards and Mobile Device Authentication: An Overview and Implementation
* [IR 7387]+2 – Cell Phone Forensic Tools: An Overview and Analysis Update
* [IR 7452]+2 – Secure Biometric Match-on-Card Feasibility Report
* [November 2002]+3 – Security For Telecommuting And Broadband Communications
* [October 2004]+2 – Securing Voice Over Internet Protocol (IP) Networks – ITL Bulletin
* [SP 800-101]+5 – Guidelines on Cell Phone Forensics
* [SP 800-113]+2 – Guide to SSL VPNs
* [SP 800-114]+7 – User's Guide to Securing External Devices for Telework and Remote Access
* [SP 800-115]+7 – Technical Guide to Information Security Testing and Assessment
* [SP 800-121]+15 – Guide to Bluetooth Security
* [SP 800-124]+11 – Guidelines on Cell Phone and PDA Security
* [SP 800-24]+3 – PBX Vulnerability Analysis: Finding Holes in Your PBX Before Someone Else Does
* [SP 800-41]+5 – Guidelines on Firewalls and Firewall Policy
* [SP 800-45r2]+3 – Guidelines on Electronic Mail Security
* [SP 800-46r1]+10 – Security for Telecommuting and Broadband Communications
* [SP 800-48r1]+4 – Guide to Securing Legacy IEEE 802.11 Wireless Networks
* [SP 800-52]+14 – Guidelines on the Selection and Use of Transport Layer Security
* [SP 800-53r3]+235 – Recommended Security Controls for Federal Information Systems and Organizations
· * NIST SP 800-053Ar4 Assessing Security and Privacy Controls in Federal Information Systems and Organizations; Building Effective Assessment Plans, 2014-12-18 (Final).pdf
· * NIST SP 800-053r2 Recommended Security Controls for Fed Info Systems, 2007-12 (final).pdf
· * alt-SP800-53-rev3-final_updated-errata_05-01-2010.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r2 to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r3FPD to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 2 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 1 (Errata), 2010-05-01.pdf
· * NIST SP 800-053Ar1 Guide for Assessing the Security Controls in Federal Information Systems and Organizations, 2010-06-29.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2013-05-07.pdf
· * NIST SP 800-053r5 Security and Privacy Controls for Information Systems and Organizations, 2017-08-15 (Draft).pdf
· * NIST SP 800-053r4_final_word_errata_01_22_2015.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations Controls (Errata), 2014-01-15.xml
· * NIST SP 800-053A Guide for Assessing the Security Controls in Fed Info Systems, 2008-06.pdf
· * NIST SP 800-053r5-draft-controls-markup.pdf
· * alt-SP800-53r4.pdf
· * alt-SP800-53Ar4.pdf
· * alt-SP800-53.pdf
· * alt-SP800-53r5-draft.pdf
· * NIST SP 800-053r5-draft-baselines-markup.pdf
· * NIST SP 800-053-controls.xml
· * NIST SP 800-053a_r4_errata_12_18_2014.docx
· * sp800-53A-rev1-final.pdf
· * 800-53-rev1-final-clean-sz.pdf
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53r4_summary.pdf
· * NIST.SP.800-53r4.pdf
· * nist.sp.800-53ar4.pdf
· * NIST.SP.800-53Ar4.pdf
· * nist.sp.800-53r4.pdf
· * nistspecialpublication800-53r3.pdf
· * nistspecialpublication800-53r2.pdf
· * nistspecialpublication800-53r1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53a.pdf
· * nistspecialpublication800-53a.pdf
· * NIST.SP.800-53r5.pdf
· * nistspecialpublication800-53.pdf
· * nist.sp.800-53r5.pdf
· * NIST.SP.800-53Ar5.pdf
· * NIST.SP.800-53B.pdf
· * 800-53-rev1-annex3-sz.pdf
· * 800-53-rev1-annex2-sz.pdf
· * 800-53-rev1-annex1-sz.pdf
· * NIST.SP.800-53r5-draft.pdf
· * nist.sp.800-53r5-draft.pdf
· * NIST.SP.800-53Ar5-draft.pdf
· * NIST.SP.800-53B-draft.pdf
· * sp800_53a_r4_errata_12_18_2014.docx
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * DOJ_CSAM_Planning_for_Implementing_SP-800-53_Rev5_FINAL.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * apply-sp-800-53-ics-final-22aug06.pdf
· * NIST_SP_800-53_Comment_Site_User_Guide_FINAL_8Sept2021.pdf
· * ics-in-sp800-53_final_21mar07.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * ics-in-sp800-53_final_21Mar07.pdf
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53-collaboration-index-template.docx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53-collaboration-index-template.xlsx
· * sp800-53r5-control-catalog.xlsx
· * sp800-53-collaboration-index-template.docx
· * sp800-53-collaboration-index-template.xlsx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-control-catalog.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * OLIR_review_800-213A_to_800-53_rev5_final.xlsx
· * Federal_Cybersecurity_Privacy_Forum_2Dec2021_NIST_SP800-53update.pdf
· * Federal_Cybersecurity_and_Privacy_Forum_15Feb2022_What_Is_New_SP800-53ARevision5.pdf
· * Federal_Cybersecurity_Privacy_Professionals_Forum_2Dec2021_FedRAMP_NIST800-53_Rev5.pdf
· * cybersecurity-innovation-forum_01-28-2014.pdf
· * ePACS Overlay_v1_SP800-53rev5-April2021.pdf
· * FPKI Overlay-v1-SP800-53rev5-April2021.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * 2.4 - Main - DOJ Adopting OSCAL to Deliver Lastest NIST SP 800-53 Controls.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * sp800-53-rev4-ipd.pdf
· * RMF 2.0 Deep Dive 5-15-18 v3 - Kelley Dempsey Naomi Lefkovitz.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * update-draft-800-53r5-v2.pdf
· * sp800_53_r4_appendix_g_markup_draft2.pdf
· * sp800_53a_r4_draft.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_f_markup_draft2.pdf
· * sp800-53-rev4-ipd.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_d_markup_draft2.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * Day_1_AM2_SCRM_Controls_Jon_Boyens.pdf
· * 800-53-for-ICS_KEMA.pdf
· * sp800-53r5-draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft-fpd-summary-of-significant-changes.pdf
· * sp800-53r5-draft-fpd-faq.pdf
· * sp800-53r5-draft.pdf
· * 800-53-Rev4_announcement.pdf
· * 1.5 - Main - SP800-53 Empowered by OSCAL_28Feb2022.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * appxi_800-53-rev1-augmented_15may07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP_800-53B_derived-OSCAL.pdf
· * sp_800-53_v5_1-derived-oscal.pdf
· * SP_800-53_v5_1-derived-OSCAL.pdf
· * sp800_53a_r4_draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft.pdf
· * 800-53-for-ICS_KEMA.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * sp800-53r5-fpd-controls.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * 800-53 automation workflow.pdf
· * 800-53-rev4-controls.csv
· * 800-53-rev4-controls.xml
· * 800-53-rev3-controls.xml
· * 800-53-rev3-controls.csv
· * SP800-177-Rev-1-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_LOW-baseline_profile_load.csv
· * NIST_SP-800-53_rev5-derived-OSCAL.xlsx
· * SP800-161-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_PRIVACY-baseline_profile_load.csv
· * NIST_SP-800-53_rev5_MODERATE-baseline_profile_load.csv
· * SP800-82-Rev-2-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_catalog_load.csv
· * NIST_SP-800-53_rev5_HIGH-baseline_profile_load.csv
· * sp800-53r5-draft-fpd-comparison-with-rev4.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-draft-fpd-comment-template.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53ar5-draft-comment-template.xlsx
· * sp800-53ar5-draft-comment-template.xlsx
· * stig-mapping-to-nist-800-53.xlsx
· * 800-53a-rev4-objectives.csv
· * 800-53a-rev4-objectives.xml
· * 800-53A-rev3-objectives.xml
· * SP800-53-control-comment-template.xlsx
· * WIP_800_53_Rev_5_to_Framework_v_1_1.xlsx
· * sp80053-focal-elements.csv
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * sp80053-focal-details.csv
· * SP_800-53_v5_1_XML.xml
· * NIST_SP-800-53B-derived-OSCAL.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * NIST SP 800-53B-Jan2022.xlsx
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * 800_53_rev_4_focal_document_template.xlsx
· * 800_53_Rev_4_Focal_Document_Template.xlsx
· * WIP_Framework_v_1_1_to_800_53_Rev5.xlsx
· * WIP_800_53_Rev_4_to_Framework_v_1_1.xlsx
· * sp800-53B-draft-comment-template.xlsx
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
* [SP 800-54]+2 – Border Gateway Protocol Security
* [SP 800-58]+2 – Security Considerations for Voice Over IP Systems
* [SP 800-77]+4 – Guide to IPSec VPNs
* [SP 800-81]+6 – Secure Domain Name System (DNS) Deployment Guide
* [SP 800-82]+11 – Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control System Security
* [SP 800-98]+2 – Guidelines for Securing Radio Frequency Identification (RFID) Systems
+ CONTINGENCY PLANNING
* [April 2002]+2 – Techniques for System and Data Recovery
* [December 2006]+24 – Maintaining Effective Information Technology (IT) Security Through Test, Training, And Exercise Programs – ITL Bulletin
* [FIPS 200]+2 – Minimum Security Requirements for Federal Information and Information Systems
* [January 2004]+2 – Computer Security Incidents: Assessing, Managing, And Controlling The Risks – ITL Bulletin
* [June 2002]+18 – Contingency Planning Guide For Information Technology Systems
* [SP 800-100]+1 – Information Security Handbook: A Guide for Managers
* [SP 800-12]+23 – An Introduction to Computer Security: The NIST Handbook
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, 1995-10.pdf
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 2, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 1, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 5, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 4, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 3, 1995-10.ps
· * derived-piv-nist-sp1800-12b-v2.pdf
· * derived-piv-nist-sp1800-12a-v2.pdf
· * derived-piv-nist-sp1800-12c-v2.pdf
· * derived-piv-nist-sp1800-12-v2.pdf
· * derived-piv-nist-sp1800-12-draft.pdf
· * derived-piv-nist-sp1800-12c-draft.pdf
· * derived-piv-nist-sp1800-12a-draft.pdf
· * derived-piv-nist-sp1800-12b-draft.pdf
· * NIST.SP.800-12r1.pdf
· * NIST.SP.1800-12.pdf
· * nistspecialpublication800-12.pdf
· * 800-12_4.ps
· * 800-12_5.ps
· * 800-12_1.ps
· * 800-12_2.ps
· * 800-12_3.ps
· * sp800_12_r1_draft.pdf
* [SP 800-13]+6 – Telecommunications Security Guidelines for Telecommunications Management Network
* [SP 800-14]+8 – Generally Accepted Principles and Practices for Securing Information Technology Systems
* [SP 800-21r2]+5 – Guideline for Implementing Cryptography in the Federal Government
* [SP 800-24]+3 – PBX Vulnerability Analysis: Finding Holes in Your PBX Before Someone Else Does
* [SP 800-25]+5 – Federal Agency Use of Public Key Technology for Digital Signatures and Authentication
* [SP 800-34]+22 – Contingency Planning Guide for Information Technology Systems
* [SP 800-41]+5 – Guidelines on Firewalls and Firewall Policy
* [SP 800-43]+1 – Systems Administration Guidance for Securing Microsoft Windows 2000 Professional System
* [SP 800-44]+3 – Guidelines on Securing Public Web Servers
* [SP 800-45]+3 – Guidelines on Electronic Mail Security
* [SP 800-46r1]+10 – Security for Telecommuting and Broadband Communications
* [SP 800-50]+5 – Building an Information Technology Security Awareness and Training Program
* [SP 800-53r3]+235 – Recommended Security Controls for Federal Information Systems and Organizations
· * NIST SP 800-053Ar4 Assessing Security and Privacy Controls in Federal Information Systems and Organizations; Building Effective Assessment Plans, 2014-12-18 (Final).pdf
· * NIST SP 800-053r2 Recommended Security Controls for Fed Info Systems, 2007-12 (final).pdf
· * alt-SP800-53-rev3-final_updated-errata_05-01-2010.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r2 to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r3FPD to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 2 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 1 (Errata), 2010-05-01.pdf
· * NIST SP 800-053Ar1 Guide for Assessing the Security Controls in Federal Information Systems and Organizations, 2010-06-29.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2013-05-07.pdf
· * NIST SP 800-053r5 Security and Privacy Controls for Information Systems and Organizations, 2017-08-15 (Draft).pdf
· * NIST SP 800-053r4_final_word_errata_01_22_2015.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations Controls (Errata), 2014-01-15.xml
· * NIST SP 800-053A Guide for Assessing the Security Controls in Fed Info Systems, 2008-06.pdf
· * NIST SP 800-053r5-draft-controls-markup.pdf
· * alt-SP800-53r4.pdf
· * alt-SP800-53Ar4.pdf
· * alt-SP800-53.pdf
· * alt-SP800-53r5-draft.pdf
· * NIST SP 800-053r5-draft-baselines-markup.pdf
· * NIST SP 800-053-controls.xml
· * NIST SP 800-053a_r4_errata_12_18_2014.docx
· * sp800-53A-rev1-final.pdf
· * 800-53-rev1-final-clean-sz.pdf
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53r4_summary.pdf
· * NIST.SP.800-53r4.pdf
· * nist.sp.800-53ar4.pdf
· * NIST.SP.800-53Ar4.pdf
· * nist.sp.800-53r4.pdf
· * nistspecialpublication800-53r3.pdf
· * nistspecialpublication800-53r2.pdf
· * nistspecialpublication800-53r1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53a.pdf
· * nistspecialpublication800-53a.pdf
· * NIST.SP.800-53r5.pdf
· * nistspecialpublication800-53.pdf
· * nist.sp.800-53r5.pdf
· * NIST.SP.800-53Ar5.pdf
· * NIST.SP.800-53B.pdf
· * 800-53-rev1-annex3-sz.pdf
· * 800-53-rev1-annex2-sz.pdf
· * 800-53-rev1-annex1-sz.pdf
· * NIST.SP.800-53r5-draft.pdf
· * nist.sp.800-53r5-draft.pdf
· * NIST.SP.800-53Ar5-draft.pdf
· * NIST.SP.800-53B-draft.pdf
· * sp800_53a_r4_errata_12_18_2014.docx
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * DOJ_CSAM_Planning_for_Implementing_SP-800-53_Rev5_FINAL.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * apply-sp-800-53-ics-final-22aug06.pdf
· * NIST_SP_800-53_Comment_Site_User_Guide_FINAL_8Sept2021.pdf
· * ics-in-sp800-53_final_21mar07.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * ics-in-sp800-53_final_21Mar07.pdf
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53-collaboration-index-template.docx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53-collaboration-index-template.xlsx
· * sp800-53r5-control-catalog.xlsx
· * sp800-53-collaboration-index-template.docx
· * sp800-53-collaboration-index-template.xlsx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-control-catalog.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * OLIR_review_800-213A_to_800-53_rev5_final.xlsx
· * Federal_Cybersecurity_Privacy_Forum_2Dec2021_NIST_SP800-53update.pdf
· * Federal_Cybersecurity_and_Privacy_Forum_15Feb2022_What_Is_New_SP800-53ARevision5.pdf
· * Federal_Cybersecurity_Privacy_Professionals_Forum_2Dec2021_FedRAMP_NIST800-53_Rev5.pdf
· * cybersecurity-innovation-forum_01-28-2014.pdf
· * ePACS Overlay_v1_SP800-53rev5-April2021.pdf
· * FPKI Overlay-v1-SP800-53rev5-April2021.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * 2.4 - Main - DOJ Adopting OSCAL to Deliver Lastest NIST SP 800-53 Controls.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * sp800-53-rev4-ipd.pdf
· * RMF 2.0 Deep Dive 5-15-18 v3 - Kelley Dempsey Naomi Lefkovitz.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * update-draft-800-53r5-v2.pdf
· * sp800_53_r4_appendix_g_markup_draft2.pdf
· * sp800_53a_r4_draft.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_f_markup_draft2.pdf
· * sp800-53-rev4-ipd.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_d_markup_draft2.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * Day_1_AM2_SCRM_Controls_Jon_Boyens.pdf
· * 800-53-for-ICS_KEMA.pdf
· * sp800-53r5-draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft-fpd-summary-of-significant-changes.pdf
· * sp800-53r5-draft-fpd-faq.pdf
· * sp800-53r5-draft.pdf
· * 800-53-Rev4_announcement.pdf
· * 1.5 - Main - SP800-53 Empowered by OSCAL_28Feb2022.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * appxi_800-53-rev1-augmented_15may07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP_800-53B_derived-OSCAL.pdf
· * sp_800-53_v5_1-derived-oscal.pdf
· * SP_800-53_v5_1-derived-OSCAL.pdf
· * sp800_53a_r4_draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft.pdf
· * 800-53-for-ICS_KEMA.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * sp800-53r5-fpd-controls.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * 800-53 automation workflow.pdf
· * 800-53-rev4-controls.csv
· * 800-53-rev4-controls.xml
· * 800-53-rev3-controls.xml
· * 800-53-rev3-controls.csv
· * SP800-177-Rev-1-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_LOW-baseline_profile_load.csv
· * NIST_SP-800-53_rev5-derived-OSCAL.xlsx
· * SP800-161-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_PRIVACY-baseline_profile_load.csv
· * NIST_SP-800-53_rev5_MODERATE-baseline_profile_load.csv
· * SP800-82-Rev-2-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_catalog_load.csv
· * NIST_SP-800-53_rev5_HIGH-baseline_profile_load.csv
· * sp800-53r5-draft-fpd-comparison-with-rev4.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-draft-fpd-comment-template.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53ar5-draft-comment-template.xlsx
· * sp800-53ar5-draft-comment-template.xlsx
· * stig-mapping-to-nist-800-53.xlsx
· * 800-53a-rev4-objectives.csv
· * 800-53a-rev4-objectives.xml
· * 800-53A-rev3-objectives.xml
· * SP800-53-control-comment-template.xlsx
· * WIP_800_53_Rev_5_to_Framework_v_1_1.xlsx
· * sp80053-focal-elements.csv
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * sp80053-focal-details.csv
· * SP_800-53_v5_1_XML.xml
· * NIST_SP-800-53B-derived-OSCAL.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * NIST SP 800-53B-Jan2022.xlsx
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * 800_53_rev_4_focal_document_template.xlsx
· * 800_53_Rev_4_Focal_Document_Template.xlsx
· * WIP_Framework_v_1_1_to_800_53_Rev5.xlsx
· * WIP_800_53_Rev_4_to_Framework_v_1_1.xlsx
· * sp800-53B-draft-comment-template.xlsx
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
* [SP 800-57]+46 – Recommendation on Key Management
· * NIST SP 800-057 Part 3r1 Recommendation for Key Management, Part 3; Application-Specific Key Management Guidance, 2015-01-22 (Final).pdf
· * NIST SP 800-057 Part 2 Recommendation for Key Management, Part 2; Best Practices for Key Management Organization, 2005-08-25 (Final).pdf
· * NIST SP 800-057 Recommendation for Key Management, Part 1; 2005-08 (updated March 9, 2007).pdf
· * NIST SP 800-057 Recommendation for Key Management, Part 2; 2005-08 (updated March 9, 2007).pdf
· * NIST SP 800-057 Recommendation for Key Management; Part 3 Key Management, 2007-03.pdf
· * NIST SP 800-057 Part 2r1 Recommendation for Key Management, Part 2; Best Practices for Key Management Organizations (2nd Draft), 2018-11-20 (Draft).pdf
· * NIST SP 800-057pt1r4_commentsreceived.pdf
· * alt-SP800-57part1rev4.pdf
· * alt-SP800-57part1rev3_general.pdf
· * NIST SP 800-057-pt2-draft-comments-received-apr2005.pdf
· * alt-SP800-57part3rev1.pdf
· * alt-SP800-57part2.pdf
· * sp800-57pt1r4_comments_received.pdf
· * nistspecialpublication800-57p1r3.pdf
· * nistspecialpublication800-57p1r2006.pdf
· * nistspecialpublication800-57p1r2007.pdf
· * nist.sp.800-57pt3r1.pdf
· * NIST.SP.800-57pt2r1.pdf
· * NIST.SP.800-57Pt3r1.pdf
· * sp800-57-Part1-revised2_Mar08-2007.pdf
· * nistspecialpublication800-57p2.pdf
· * NIST.SP.800-57pt1r5.pdf
· * nist.sp.800-57pt1r5.pdf
· * nistspecialpublication800-57p3.pdf
· * nistspecialpublication800-57p1.pdf
· * sp800-57_part1_rev3_general.pdf
· * NIST.SP.800-57pt1r5-draft.pdf
· * SP800-57-Part2.pdf
· * sp800-57pt1r4_comments_received.pdf
· * sp800-57pt1r4_draft_track_changes_from_rev3_to_rev4.pdf
· * sp800-57p1r4_draft.pdf
· * sp800-57-pt2-draft-comments-received-apr2005.pdf
· * sp800_57_pt3_r1_draft.pdf
· * SP80057TranPlan.pdf
· * SP80057TranPlan.pdf
· * sp800_57_pt3_r1_draft.pdf
· * CommentsSP800-57-1.pdf
· * Draft_SP800-57-Part1-Rev3_May2011.pdf
· * sp800-57-pt1-draft-apr2005-comments.pdf
· * sp800-57-pt1-draft-apr2005.pdf
· * sp800-57pt2-r1-draft.pdf
· * sp800-57pt2-r1-draft.pdf
· * sp800-57pt2-r1-draft2.pdf
· * sp800-57-pt1-draft-Jan2003.pdf
· * sp800-57-pt1-draft-Jan2003-comments.pdf
· * CommentsSP800-57Part2.pdf
* [SP 800-66r1]+9 – An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act Security Rule
* [SP 800-81]+6 – Secure Domain Name System (DNS) Deployment Guide
* [SP 800-83]+7 – Guide to Malware Incident Prevention and Handling
* [SP 800-84]+8 – Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities
* [SP 800-86]+2 – Guide to Integrating Forensic Techniques into Incident Response
+ CRYPTOGRAPHY
* [December 2000]+19 – A Statistical Test Suite For Random And Pseudorandom Number Generators For Cryptographic Applications
* [FIPS 140]+285 – Security Requirements for Cryptographic Modules
· * NIST SB 2001-07 A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2.pdf
· * NIST SP 800-029 A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2, 2001-06.pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex A, 2001-05.pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex D, 2001-05.pdf
· * NIST FIPS 140-2 Security requirements for Cryptographic Modules, Annex D; Approved Key Establishment Techniques, 2001-03 (2009 Minor Edits).pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex B; Approved Protection Profiles, 2001-03 (2009 Minor Edits).pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex A; Approved Security Functions, 2001-03 (2009 Minor Edits) .pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex C; Approved Random Number Generators, 2001-03 (2009 Minor Edits).pdf
· * NIST FIPS 140-2 Security Reqs for Cryptographic Modules, 2001-03.pdf
· * NIST FIPS 140-2 Implementation Guidance for FIPS PUB 140-2 and the CMVP, 2010-08-03.pdf
· * NIST SB 1995-08 FIPS 140-1; A Framework for Cryptographic Standards.txt
· * fips140-3-final-draft-2007-comments-resolutions.pdf
· * FIPS_140-3 Final_Draft_2007.pdf
· * fips140_2_chng2_20021203.epub
· * fips140_2_chng2_20021203.epub
· * NewFIPS1402LogoForm.pdf
· * FIPS1402LogoForm.pdf
· * FIPS1403LogoForm.pdf
· * fips140-3-sections-submitted-for-comments.pdf
· * FIPS140ConsolidatedCertApr2017.pdf
· * FIPS140ConsolidatedCertMar2017.pdf
· * fips140consolidatedcertlist0034.pdf
· * FIPS1402DTR.pdf
· * FIPS140ConsolidatedCertJan2018.pdf
· * FIPS140ConsolidatedCertOct2017.pdf
· * FIPS140ConsolidatedCertAug2018.pdf
· * fips140consolidatedcertlist0053.pdf
· * FIPS140ConsolidatedCertList0008.pdf
· * FIPS 140-3 IG.pdf
· * FIPS140ConsolidatedCertSept2016.pdf
· * FIPS140ConsolidatedCertList0034.pdf
· * FIPS140ConsolidatedCertList0054.pdf
· * fips140consolidatedcertlist0042.pdf
· * FIPS140ConsolidatedCertList0052.pdf
· * FIPS1402LogoForm.pdf
· * FIPS140ConsolidatedCertApril2016.pdf
· * FIPS140ConsolidatedCertList0041.pdf
· * FIPS140ConsolidatedCertList0048.pdf
· * FIPS140ConsolidatedCertList0028.pdf
· * FIPS140ConsolidatedCertOct2018.pdf
· * FIPS140ConsolidatedCertNov2019.pdf
· * FIPS140ConsolidatedCertMarch2016.pdf
· * FIPS140ConsolidatedCertList0026.pdf
· * FIPS140ConsolidatedCertMay2016.pdf
· * FIPS140ConsolidatedCertList0057.pdf
· * FIPS140ConsolidatedCertList0035.pdf
· * FIPS1401LogoForm.pdf
· * fips140consolidatedcertlist0046.pdf
· * FIPS140ConsolidatedCertList0024.pdf
· * FIPS140ConsolidatedCertList0049.pdf
· * FIPS 140-3 IG.pdf
· * FIPS140ConsolidatedCertSept2017.pdf
· * FIPS140ConsolidatedCertOct2015.pdf
· * FIPS140ConsolidatedCertJuly2016.pdf
· * fips140consolidatedcertoct2016.pdf
· * FIPS-140-2-CMVP Management Manual 09-09-2021.pdf
· * fips140consolidatedcertdec2015.pdf
· * fips1402logoform.pdf
· * FIPS140ConsolidatedCertJan2017.pdf
· * fips140consolidatedcertlist0038.pdf
· * FIPS_140-3_sections_submitted_for_comments.pdf
· * FIPS140ConsolidatedCertDec2015.pdf
· * FIPS140ConsolidatedCertList0046.pdf
· * FIPS140ConsolidatedCertList0053.pdf
· * FIPS140ConsolidatedCertFeb2016.pdf
· * fips140consolidatedcertjune2016.pdf
· * NIST and ISO End User License Agreement.pdf
· * FIPS140ConsolidatedCertJune2017.pdf
· * FIPS140ConsolidatedCertDec2016.pdf
· * fips140consolidatedcertlist0026.pdf
· * FIPS140ConsolidatedCertList0042.pdf
· * FIPS140ConsolidatedCertJuly2017.pdf
· * FIPS140ConsolidatedCertNov2016.pdf
· * nist and iso end user license agreement.pdf
· * fips140consolidatedcertsept2017.pdf
· * fips140consolidatedcertmarch2016.pdf
· * fips140consolidatedcertsept2016.pdf
· * FIPS140ConsolidatedCertList0023.pdf
· * FIPS140ConsolidatedCertList0011.pdf
· * FIPS140ConsolidatedCertList0038.pdf
· * FIPS1402IG.pdf
· * FIPS140ConsolidatedCertList0045.pdf
· * FIPS140ConsolidatedCertOct2016.pdf
· * FIPS140ConsolidatedCertJune2016.pdf
· * FIPS140ConsolidatedCertList0020.pdf
· * FIPS140ConsolidatedCertList0032.pdf
· * fips140consolidatedcertmay2017.pdf
· * FIPS140ConsolidatedCertAug2016.pdf
· * FIPS140ConsolidatedCertNov2017.pdf
· * FIPS140ConsolidatedCertMay2017.pdf
· * FIPS140-2-ConsolidatedMarch2018.pdf
· * FIPS140ConsolidatedCertDec2017.pdf
· * fips140consolidatedcertlist0057.pdf
· * FIPS1403SoftSecWork.pdf
· * FIPS140ConsolidatedCertList0050.pdf
· * fips1402ig.pdf
· * fips140consolidatedcertlist0045.pdf
· * FIPS1402IG.pdf
· * fips-140-2-cmvp management manual 09-09-2021.pdf
· * FIPS140ConsolidatedCertJan2016.pdf
· * fips140consolidatedcertlist0011.pdf
· * fips140consolidatedcertmay2016.pdf
· * fips140consolidatedcertnov2019.pdf
· * FIPS140ConsolidatedCertFeb2017.pdf
· * FIPS_140-3_sections_submitted_for_comments.pdf
· * Draft FIPS-140-3-CMVP Management Manual v1.1 07-13-2022.pdf
· * Draft FIPS-140-3-CMVP Management Manual 09-18-2020.pdf
· * fips1402.pdf
· * fips1401.pdf
· * physecpre18.pdf
· * CMVP2604.pdf
· * CMVP2606.pdf
· * FIPS140ConsolidatedCertApr2017.pdf
· * day2_mar24_fips-140-quo-vadis_nist-csd.pdf
· * FIPS140ConsolidatedCertMar2017.pdf
· * fips140consolidatedcertapr2017.pdf
· * physecpaper13.pdf
· * physecpaper12.pdf
· * physecpaper10.pdf
· * physecpaper11.pdf
· * physecpaper16.pdf
· * physecpaper14.pdf
· * physecpaper14.pdf
· * physecpaper17.pdf
· * physecpaper18.pdf
· * physecpaper19.pdf
· * physecpaper12.pdf
· * FIPS140ConsolidatedCertList0032.pdf
· * FIPS140ConsolidatedCertList0040.pdf
· * FIPS140ConsolidatedCertList0031.pdf
· * FIPS140ConsolidatedCertList0034.pdf
· * physecpaper08.pdf
· * FIPS140ConsolidatedCertList0037.pdf
· * fips140consolidatedcertlist0017.pdf
· * FIPS140ConsolidatedCertList0009.pdf
· * physecpaper06.pdf
· * physecpaper09.pdf
· * FIPS140ConsolidatedCertList0035.pdf
· * FIPS140ConsolidatedCertList0015.pdf
· * FIPS140ConsolidatedCertList0051.pdf
· * FIPS140ConsolidatedCertJune2016.pdf
· * physecpaper07.pdf
· * fips140consolidatedcertlist0019.pdf
· * fips1401ig.pdf
· * FIPS140ConsolidatedCertList0013.pdf
· * FIPS140ConsolidatedCertList0007.pdf
· * FIPS140ConsolidatedCertList0023.pdf
· * FIPS140ConsolidatedCertNov2015.pdf
· * FIPS1402DTR.pdf
· * Jan12-2005-FR-FIPS1403-Notice.pdf
· * FIPS140ConsolidatedCertList0003.pdf
· * FIPS140ConsolidatedCertList0042.pdf
· * FIPS140ConsolidatedCertList0002.pdf
· * FIPS140ConsolidatedCertSept2016.pdf
· * physecpaper08.pdf
· * FIPS140ConsolidatedCertMay2016.pdf
· * FIPS140ConsolidatedCertMay2017.pdf
· * fips1402ig.pdf
· * 1401testA.pdf
· * FIPS140ConsolidatedCertList0030.pdf
· * FIPS140ConsolidatedCertList0036.pdf
· * FIPS140ConsolidatedCertList0017.pdf
· * fips140consolidatedcertmay2016.pdf
· * FIPS140ConsolidatedCertList0038.pdf
· * FIPS140ConsolidatedCertList0004.pdf
· * FIPS140ConsolidatedCertDec2015.pdf
· * FIPS140ConsolidatedCertList0014.pdf
· * FIPS140ConsolidatedCertList0012.pdf
· * FIPS140ConsolidatedCertList0010.pdf
· * FIPS140ConsolidatedCertList0029.pdf
· * FIPS140ConsolidatedCertList0001.pdf
· * fips140consolidatedcertaug2016.pdf
· * FIPS140ConsolidatedCertList0021.pdf
· * FIPS140ConsolidatedCertList0048.pdf
· * frn-2015-19743-comments-received.pdf
· * FIPS140ConsolidatedCertList0006.pdf
· * FIPS140ConsolidatedCertMarch2016.pdf
· * ispab-ltr-to-NIST-on-FIPS_140-2-ISO_20160420.pdf
· * FIPS140ConsolidatedCertList0033.pdf
· * FIPS140ConsolidatedCertList0008.pdf
· * physecpaper03.pdf
· * FIPS140ConsolidatedCertJuly2016.pdf
· * fips140consolidatedcertmay2017.pdf
· * fips140-3_non-invasive2.pdf
· * FIPS140ConsolidatedCertList0046.pdf
· * physecpaper03.pdf
· * FIPS140ConsolidatedCertList0020.pdf
· * FIPS140ConsolidatedCertList0055.pdf
· * FIPS140ConsolidatedCertList0024.pdf
· * fips140consolidatedcertnov2015.pdf
· * 1401test.pdf
· * FIPS140ConsolidatedCertList0005.pdf
· * ispab-ltr-to-NIST-on-FIPS_140-2-ISO_20160420.pdf
· * FIPS140ConsolidatedCertList0027.pdf
· * FIPS140ConsolidatedCertApril2016.pdf
· * FIPS140ConsolidatedCertOct2015.pdf
· * fips1402DTR.pdf
· * FIPS140ConsolidatedCertFeb2017.pdf
· * FIPS140ConsolidatedCertList0044.pdf
· * FIPS140ConsolidatedCertList0054.pdf
· * physecpaper05.pdf
· * FIPS140ConsolidatedCertAug2017.pdf
· * physecpaper02.pdf
· * FIPS1402IG.pdf
· * FIPS140ConsolidatedCertList0041.pdf
· * FIPS140ConsolidatedCertList0019.pdf
· * 140-2flow.pdf
· * FIPS140ConsolidatedCertList0053.pdf
· * FIPS140ConsolidatedCertList0045.pdf
· * FIPS140ConsolidatedCertList0049.pdf
· * fips140-3_non-invasive1.pdf
· * fips140consolidatedcertlist0024.pdf
· * FIPS140ConsolidatedCertList0039.pdf
· * physecpaper04.pdf
· * FIPS140ConsolidatedCertJune2017.pdf
· * physecpaper01.pdf
· * FIPS140ConsolidatedCertJuly2017.pdf
· * FIPS140ConsolidatedCertOct2016.pdf
· * FIPS140ConsolidatedCertList0026.pdf
· * fips140consolidatedcertdec2016.pdf
· * fips140consolidatedcertlist0042.pdf
· * FIPS140ConsolidatedCertJan2016.pdf
· * FIPS140ConsolidatedCertFeb2016.pdf
· * fips140consolidatedcertjan2017.pdf
· * FIPS140ConsolidatedCertList0052.pdf
· * FIPS140ConsolidatedCertList0047.pdf
· * FIPS140ConsolidatedCertJan2017.pdf
· * FIPS1401IG.pdf
· * FIPS140ConsolidatedCertList0056.pdf
· * FIPS140ConsolidatedCertList0028.pdf
· * FIPS140ConsolidatedCertList0018.pdf
· * fips-140_response.pdf
· * FIPS140ConsolidatedCertList0025.pdf
· * ispab-ltr-to-nist-on-fips_140-2-iso_20160420.pdf
· * FIPS140ConsolidatedCertList0022.pdf
· * FIPS140ConsolidatedCertList0050.pdf
· * FIPS140ConsolidatedCertList0016.pdf
· * FIPS140ConsolidatedCertList0011.pdf
· * FIPS140ConsolidatedCertDec2016.pdf
· * FIPS140ConsolidatedCertNov2016.pdf
· * FIPS140ConsolidatedCertList0043.pdf
· * FIPS140ConsolidatedCertList0057.pdf
· * FIPS140ConsolidatedCertAug2016.pdf
· * fips140-3-draft-2009.pdf
· * fips1403Draft.pdf
· * revised-draft-fips140-3_PDF-zip_document-annexA-to-annexG.zip
· * fips140-3-draft-2009-comments-resolutions.pdf
· * fips1403draft.pdf
· * fips1402annexc.pdf
· * PublicComments_FIPS140-3Draft2.pdf
· * fips1402annexa.pdf
· * fips1402annexd.pdf
· * fips1402annexb.pdf
· * CommentsFIPS140-3_draft1.pdf
· * day2_mar24_fips-140-quo-vadis_nist-csd.pdf
· * day1_research_100-150.pdf
· * day1_research_100-150.pdf
· * physecpre01.pdf
· * Jean_Campbell-FIPS_140-3_-_Looking_over_the_horizon(3).pdf
· * physecpre02.pdf
· * physecpre17.pdf
· * physecpre04.pdf
· * CMVP2603.pdf
· * noninvasive-attack-testing_cscace-hsakane.pdf
· * noninvasive-attack-testing_cscace-hsakane.pdf
· * physecpre09.pdf
· * physecpre05.pdf
· * CMVP 140-3 MM Comments Template.docx
· * fips140_2_chng2_20021203.epub
· * physecpre10.ppt
· * physecpre10.ppt
· * physecpre06.ppt
· * physecpre16.ppt
· * physecpre03.ppt
· * physecpre18.ppt
· * physecpre07.ppt
· * physecpre11.ppt
· * physecpre17.ppt
· * physecpre08.ppt
· * physecpre12.ppt
· * physecpre15.ppt
· * physecpre14.ppt
· * physecpre15.ppt
· * physecpre14.ppt
· * physecpre13.ppt
* [FIPS 180]+24 – Secure Hash Standard (SHS)
* [FIPS 181]+1 – Automated Password Generator
* [FIPS 185]+2 – Escrowed Encryption Standard
* [FIPS 186]+25 – Digital Signature Standard (DSS)
* [FIPS 190]+1 – Guideline for the Use of Advanced Authentication Technology Alternatives
* [FIPS 196]+2 – Entity Authentication Using Public Key Cryptography
* [FIPS 197]+8 – Advanced Encryption Standard
* [FIPS 198]+8 – The Keyed-Hash Message Authentication Code (HMAC)
* [February 2000]+14 – Guideline for Implementing Cryptography in the Federal Government – ITL Bulletin
* [May 2006]+8 – An Update On Cryptographic Standards, Guidelines, And Testing Requirements – ITL Bulletin
* [IR 7046]+2 – Framework for Multi-Mode Authentication: Overview and Implementation Guide
* [IR 7206]+1 – Smart Cards and Mobile Device Authentication: An Overview and Implementation
* [IR 7452]+2 – Secure Biometric Match-on-Card Feasibility Report
* [SP 800-111]+2 – Guide to Storage Encryption Technologies for End User Devices
* [SP 800-113]+2 – Guide to SSL VPNs
* [SP 800-116]+12 – A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
* [SP 800-15r1]+7 – Minimum Interoperability Specification for PKI Components (MISPC), Version 1
* [SP 800-17]+10 – Modes of Operation Validation System (MOVS): Requirements and Procedures
* [SP 800-21r2]+5 – Guideline for Implementing Cryptography in the Federal Government
* [SP 800-22r1]+12 – A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
* [SP 800-25]+5 – Federal Agency Use of Public Key Technology for Digital Signatures and Authentication
* [SP 800-32]+4 – Introduction to Public Key Technology and the Federal PKI Infrastructure
* [SP 800-38A]+10 – Recommendation for Block Cipher Modes of Operation - Methods and Techniques
* [SP 800-38B]+5 – Recommendation for Block Cipher Modes of Operation: The RMAC Authentication Mode
* [SP 800-38C]+7 – Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality
* [SP 800-38D]+9 – Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) for Confidentiality and Authentication
* [SP 800-49]+2 – Federal S/MIME V3 Client Profile
* [SP 800-52]+14 – Guidelines on the Selection and Use of Transport Layer Security
* [SP 800-53r3]+235 – Recommended Security Controls for Federal Information Systems and Organizations
· * NIST SP 800-053Ar4 Assessing Security and Privacy Controls in Federal Information Systems and Organizations; Building Effective Assessment Plans, 2014-12-18 (Final).pdf
· * NIST SP 800-053r2 Recommended Security Controls for Fed Info Systems, 2007-12 (final).pdf
· * alt-SP800-53-rev3-final_updated-errata_05-01-2010.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r2 to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r3FPD to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 2 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 1 (Errata), 2010-05-01.pdf
· * NIST SP 800-053Ar1 Guide for Assessing the Security Controls in Federal Information Systems and Organizations, 2010-06-29.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2013-05-07.pdf
· * NIST SP 800-053r5 Security and Privacy Controls for Information Systems and Organizations, 2017-08-15 (Draft).pdf
· * NIST SP 800-053r4_final_word_errata_01_22_2015.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations Controls (Errata), 2014-01-15.xml
· * NIST SP 800-053A Guide for Assessing the Security Controls in Fed Info Systems, 2008-06.pdf
· * NIST SP 800-053r5-draft-controls-markup.pdf
· * alt-SP800-53r4.pdf
· * alt-SP800-53Ar4.pdf
· * alt-SP800-53.pdf
· * alt-SP800-53r5-draft.pdf
· * NIST SP 800-053r5-draft-baselines-markup.pdf
· * NIST SP 800-053-controls.xml
· * NIST SP 800-053a_r4_errata_12_18_2014.docx
· * sp800-53A-rev1-final.pdf
· * 800-53-rev1-final-clean-sz.pdf
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53r4_summary.pdf
· * NIST.SP.800-53r4.pdf
· * nist.sp.800-53ar4.pdf
· * NIST.SP.800-53Ar4.pdf
· * nist.sp.800-53r4.pdf
· * nistspecialpublication800-53r3.pdf
· * nistspecialpublication800-53r2.pdf
· * nistspecialpublication800-53r1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53a.pdf
· * nistspecialpublication800-53a.pdf
· * NIST.SP.800-53r5.pdf
· * nistspecialpublication800-53.pdf
· * nist.sp.800-53r5.pdf
· * NIST.SP.800-53Ar5.pdf
· * NIST.SP.800-53B.pdf
· * 800-53-rev1-annex3-sz.pdf
· * 800-53-rev1-annex2-sz.pdf
· * 800-53-rev1-annex1-sz.pdf
· * NIST.SP.800-53r5-draft.pdf
· * nist.sp.800-53r5-draft.pdf
· * NIST.SP.800-53Ar5-draft.pdf
· * NIST.SP.800-53B-draft.pdf
· * sp800_53a_r4_errata_12_18_2014.docx
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * DOJ_CSAM_Planning_for_Implementing_SP-800-53_Rev5_FINAL.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * apply-sp-800-53-ics-final-22aug06.pdf
· * NIST_SP_800-53_Comment_Site_User_Guide_FINAL_8Sept2021.pdf
· * ics-in-sp800-53_final_21mar07.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * ics-in-sp800-53_final_21Mar07.pdf
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53-collaboration-index-template.docx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53-collaboration-index-template.xlsx
· * sp800-53r5-control-catalog.xlsx
· * sp800-53-collaboration-index-template.docx
· * sp800-53-collaboration-index-template.xlsx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-control-catalog.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * OLIR_review_800-213A_to_800-53_rev5_final.xlsx
· * Federal_Cybersecurity_Privacy_Forum_2Dec2021_NIST_SP800-53update.pdf
· * Federal_Cybersecurity_and_Privacy_Forum_15Feb2022_What_Is_New_SP800-53ARevision5.pdf
· * Federal_Cybersecurity_Privacy_Professionals_Forum_2Dec2021_FedRAMP_NIST800-53_Rev5.pdf
· * cybersecurity-innovation-forum_01-28-2014.pdf
· * ePACS Overlay_v1_SP800-53rev5-April2021.pdf
· * FPKI Overlay-v1-SP800-53rev5-April2021.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * 2.4 - Main - DOJ Adopting OSCAL to Deliver Lastest NIST SP 800-53 Controls.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * sp800-53-rev4-ipd.pdf
· * RMF 2.0 Deep Dive 5-15-18 v3 - Kelley Dempsey Naomi Lefkovitz.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * update-draft-800-53r5-v2.pdf
· * sp800_53_r4_appendix_g_markup_draft2.pdf
· * sp800_53a_r4_draft.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_f_markup_draft2.pdf
· * sp800-53-rev4-ipd.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_d_markup_draft2.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * Day_1_AM2_SCRM_Controls_Jon_Boyens.pdf
· * 800-53-for-ICS_KEMA.pdf
· * sp800-53r5-draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft-fpd-summary-of-significant-changes.pdf
· * sp800-53r5-draft-fpd-faq.pdf
· * sp800-53r5-draft.pdf
· * 800-53-Rev4_announcement.pdf
· * 1.5 - Main - SP800-53 Empowered by OSCAL_28Feb2022.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * appxi_800-53-rev1-augmented_15may07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP_800-53B_derived-OSCAL.pdf
· * sp_800-53_v5_1-derived-oscal.pdf
· * SP_800-53_v5_1-derived-OSCAL.pdf
· * sp800_53a_r4_draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft.pdf
· * 800-53-for-ICS_KEMA.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * sp800-53r5-fpd-controls.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * 800-53 automation workflow.pdf
· * 800-53-rev4-controls.csv
· * 800-53-rev4-controls.xml
· * 800-53-rev3-controls.xml
· * 800-53-rev3-controls.csv
· * SP800-177-Rev-1-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_LOW-baseline_profile_load.csv
· * NIST_SP-800-53_rev5-derived-OSCAL.xlsx
· * SP800-161-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_PRIVACY-baseline_profile_load.csv
· * NIST_SP-800-53_rev5_MODERATE-baseline_profile_load.csv
· * SP800-82-Rev-2-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_catalog_load.csv
· * NIST_SP-800-53_rev5_HIGH-baseline_profile_load.csv
· * sp800-53r5-draft-fpd-comparison-with-rev4.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-draft-fpd-comment-template.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53ar5-draft-comment-template.xlsx
· * sp800-53ar5-draft-comment-template.xlsx
· * stig-mapping-to-nist-800-53.xlsx
· * 800-53a-rev4-objectives.csv
· * 800-53a-rev4-objectives.xml
· * 800-53A-rev3-objectives.xml
· * SP800-53-control-comment-template.xlsx
· * WIP_800_53_Rev_5_to_Framework_v_1_1.xlsx
· * sp80053-focal-elements.csv
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * sp80053-focal-details.csv
· * SP_800-53_v5_1_XML.xml
· * NIST_SP-800-53B-derived-OSCAL.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * NIST SP 800-53B-Jan2022.xlsx
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * 800_53_rev_4_focal_document_template.xlsx
· * 800_53_Rev_4_Focal_Document_Template.xlsx
· * WIP_Framework_v_1_1_to_800_53_Rev5.xlsx
· * WIP_800_53_Rev_4_to_Framework_v_1_1.xlsx
· * sp800-53B-draft-comment-template.xlsx
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
* [SP 800-56A]+23 – Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography
* [SP 800-57]+46 – Recommendation on Key Management
· * NIST SP 800-057 Part 3r1 Recommendation for Key Management, Part 3; Application-Specific Key Management Guidance, 2015-01-22 (Final).pdf
· * NIST SP 800-057 Part 2 Recommendation for Key Management, Part 2; Best Practices for Key Management Organization, 2005-08-25 (Final).pdf
· * NIST SP 800-057 Recommendation for Key Management, Part 1; 2005-08 (updated March 9, 2007).pdf
· * NIST SP 800-057 Recommendation for Key Management, Part 2; 2005-08 (updated March 9, 2007).pdf
· * NIST SP 800-057 Recommendation for Key Management; Part 3 Key Management, 2007-03.pdf
· * NIST SP 800-057 Part 2r1 Recommendation for Key Management, Part 2; Best Practices for Key Management Organizations (2nd Draft), 2018-11-20 (Draft).pdf
· * NIST SP 800-057pt1r4_commentsreceived.pdf
· * alt-SP800-57part1rev4.pdf
· * alt-SP800-57part1rev3_general.pdf
· * NIST SP 800-057-pt2-draft-comments-received-apr2005.pdf
· * alt-SP800-57part3rev1.pdf
· * alt-SP800-57part2.pdf
· * sp800-57pt1r4_comments_received.pdf
· * nistspecialpublication800-57p1r3.pdf
· * nistspecialpublication800-57p1r2006.pdf
· * nistspecialpublication800-57p1r2007.pdf
· * nist.sp.800-57pt3r1.pdf
· * NIST.SP.800-57pt2r1.pdf
· * NIST.SP.800-57Pt3r1.pdf
· * sp800-57-Part1-revised2_Mar08-2007.pdf
· * nistspecialpublication800-57p2.pdf
· * NIST.SP.800-57pt1r5.pdf
· * nist.sp.800-57pt1r5.pdf
· * nistspecialpublication800-57p3.pdf
· * nistspecialpublication800-57p1.pdf
· * sp800-57_part1_rev3_general.pdf
· * NIST.SP.800-57pt1r5-draft.pdf
· * SP800-57-Part2.pdf
· * sp800-57pt1r4_comments_received.pdf
· * sp800-57pt1r4_draft_track_changes_from_rev3_to_rev4.pdf
· * sp800-57p1r4_draft.pdf
· * sp800-57-pt2-draft-comments-received-apr2005.pdf
· * sp800_57_pt3_r1_draft.pdf
· * SP80057TranPlan.pdf
· * SP80057TranPlan.pdf
· * sp800_57_pt3_r1_draft.pdf
· * CommentsSP800-57-1.pdf
· * Draft_SP800-57-Part1-Rev3_May2011.pdf
· * sp800-57-pt1-draft-apr2005-comments.pdf
· * sp800-57-pt1-draft-apr2005.pdf
· * sp800-57pt2-r1-draft.pdf
· * sp800-57pt2-r1-draft.pdf
· * sp800-57pt2-r1-draft2.pdf
· * sp800-57-pt1-draft-Jan2003.pdf
· * sp800-57-pt1-draft-Jan2003-comments.pdf
· * CommentsSP800-57Part2.pdf
* [SP 800-67 1.1]+7 – Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher
* [SP 800-73]+44 – Interfaces for Personal Identity Verification
* [SP 800-78]+20 – Cryptographic Algorithms and Key Sizes for Personal Identity Verification
* [SP 800-90]+52 – Recommendation for Random Number Generation Using Deterministic Random Bit Generators
* [September 2002]+15 – Cryptographic Standards and Guidelines: A Status Report
+ DIGITAL SIGNATURES
* [FIPS 140]+285 – Security Requirements for Cryptographic Modules
· * NIST SB 2001-07 A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2.pdf
· * NIST SP 800-029 A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2, 2001-06.pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex A, 2001-05.pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex D, 2001-05.pdf
· * NIST FIPS 140-2 Security requirements for Cryptographic Modules, Annex D; Approved Key Establishment Techniques, 2001-03 (2009 Minor Edits).pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex B; Approved Protection Profiles, 2001-03 (2009 Minor Edits).pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex A; Approved Security Functions, 2001-03 (2009 Minor Edits) .pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex C; Approved Random Number Generators, 2001-03 (2009 Minor Edits).pdf
· * NIST FIPS 140-2 Security Reqs for Cryptographic Modules, 2001-03.pdf
· * NIST FIPS 140-2 Implementation Guidance for FIPS PUB 140-2 and the CMVP, 2010-08-03.pdf
· * NIST SB 1995-08 FIPS 140-1; A Framework for Cryptographic Standards.txt
· * fips140-3-final-draft-2007-comments-resolutions.pdf
· * FIPS_140-3 Final_Draft_2007.pdf
· * fips140_2_chng2_20021203.epub
· * fips140_2_chng2_20021203.epub
· * NewFIPS1402LogoForm.pdf
· * FIPS1402LogoForm.pdf
· * FIPS1403LogoForm.pdf
· * fips140-3-sections-submitted-for-comments.pdf
· * FIPS140ConsolidatedCertApr2017.pdf
· * FIPS140ConsolidatedCertMar2017.pdf
· * fips140consolidatedcertlist0034.pdf
· * FIPS1402DTR.pdf
· * FIPS140ConsolidatedCertJan2018.pdf
· * FIPS140ConsolidatedCertOct2017.pdf
· * FIPS140ConsolidatedCertAug2018.pdf
· * fips140consolidatedcertlist0053.pdf
· * FIPS140ConsolidatedCertList0008.pdf
· * FIPS 140-3 IG.pdf
· * FIPS140ConsolidatedCertSept2016.pdf
· * FIPS140ConsolidatedCertList0034.pdf
· * FIPS140ConsolidatedCertList0054.pdf
· * fips140consolidatedcertlist0042.pdf
· * FIPS140ConsolidatedCertList0052.pdf
· * FIPS1402LogoForm.pdf
· * FIPS140ConsolidatedCertApril2016.pdf
· * FIPS140ConsolidatedCertList0041.pdf
· * FIPS140ConsolidatedCertList0048.pdf
· * FIPS140ConsolidatedCertList0028.pdf
· * FIPS140ConsolidatedCertOct2018.pdf
· * FIPS140ConsolidatedCertNov2019.pdf
· * FIPS140ConsolidatedCertMarch2016.pdf
· * FIPS140ConsolidatedCertList0026.pdf
· * FIPS140ConsolidatedCertMay2016.pdf
· * FIPS140ConsolidatedCertList0057.pdf
· * FIPS140ConsolidatedCertList0035.pdf
· * FIPS1401LogoForm.pdf
· * fips140consolidatedcertlist0046.pdf
· * FIPS140ConsolidatedCertList0024.pdf
· * FIPS140ConsolidatedCertList0049.pdf
· * FIPS 140-3 IG.pdf
· * FIPS140ConsolidatedCertSept2017.pdf
· * FIPS140ConsolidatedCertOct2015.pdf
· * FIPS140ConsolidatedCertJuly2016.pdf
· * fips140consolidatedcertoct2016.pdf
· * FIPS-140-2-CMVP Management Manual 09-09-2021.pdf
· * fips140consolidatedcertdec2015.pdf
· * fips1402logoform.pdf
· * FIPS140ConsolidatedCertJan2017.pdf
· * fips140consolidatedcertlist0038.pdf
· * FIPS_140-3_sections_submitted_for_comments.pdf
· * FIPS140ConsolidatedCertDec2015.pdf
· * FIPS140ConsolidatedCertList0046.pdf
· * FIPS140ConsolidatedCertList0053.pdf
· * FIPS140ConsolidatedCertFeb2016.pdf
· * fips140consolidatedcertjune2016.pdf
· * NIST and ISO End User License Agreement.pdf
· * FIPS140ConsolidatedCertJune2017.pdf
· * FIPS140ConsolidatedCertDec2016.pdf
· * fips140consolidatedcertlist0026.pdf
· * FIPS140ConsolidatedCertList0042.pdf
· * FIPS140ConsolidatedCertJuly2017.pdf
· * FIPS140ConsolidatedCertNov2016.pdf
· * nist and iso end user license agreement.pdf
· * fips140consolidatedcertsept2017.pdf
· * fips140consolidatedcertmarch2016.pdf
· * fips140consolidatedcertsept2016.pdf
· * FIPS140ConsolidatedCertList0023.pdf
· * FIPS140ConsolidatedCertList0011.pdf
· * FIPS140ConsolidatedCertList0038.pdf
· * FIPS1402IG.pdf
· * FIPS140ConsolidatedCertList0045.pdf
· * FIPS140ConsolidatedCertOct2016.pdf
· * FIPS140ConsolidatedCertJune2016.pdf
· * FIPS140ConsolidatedCertList0020.pdf
· * FIPS140ConsolidatedCertList0032.pdf
· * fips140consolidatedcertmay2017.pdf
· * FIPS140ConsolidatedCertAug2016.pdf
· * FIPS140ConsolidatedCertNov2017.pdf
· * FIPS140ConsolidatedCertMay2017.pdf
· * FIPS140-2-ConsolidatedMarch2018.pdf
· * FIPS140ConsolidatedCertDec2017.pdf
· * fips140consolidatedcertlist0057.pdf
· * FIPS1403SoftSecWork.pdf
· * FIPS140ConsolidatedCertList0050.pdf
· * fips1402ig.pdf
· * fips140consolidatedcertlist0045.pdf
· * FIPS1402IG.pdf
· * fips-140-2-cmvp management manual 09-09-2021.pdf
· * FIPS140ConsolidatedCertJan2016.pdf
· * fips140consolidatedcertlist0011.pdf
· * fips140consolidatedcertmay2016.pdf
· * fips140consolidatedcertnov2019.pdf
· * FIPS140ConsolidatedCertFeb2017.pdf
· * FIPS_140-3_sections_submitted_for_comments.pdf
· * Draft FIPS-140-3-CMVP Management Manual v1.1 07-13-2022.pdf
· * Draft FIPS-140-3-CMVP Management Manual 09-18-2020.pdf
· * fips1402.pdf
· * fips1401.pdf
· * physecpre18.pdf
· * CMVP2604.pdf
· * CMVP2606.pdf
· * FIPS140ConsolidatedCertApr2017.pdf
· * day2_mar24_fips-140-quo-vadis_nist-csd.pdf
· * FIPS140ConsolidatedCertMar2017.pdf
· * fips140consolidatedcertapr2017.pdf
· * physecpaper13.pdf
· * physecpaper12.pdf
· * physecpaper10.pdf
· * physecpaper11.pdf
· * physecpaper16.pdf
· * physecpaper14.pdf
· * physecpaper14.pdf
· * physecpaper17.pdf
· * physecpaper18.pdf
· * physecpaper19.pdf
· * physecpaper12.pdf
· * FIPS140ConsolidatedCertList0032.pdf
· * FIPS140ConsolidatedCertList0040.pdf
· * FIPS140ConsolidatedCertList0031.pdf
· * FIPS140ConsolidatedCertList0034.pdf
· * physecpaper08.pdf
· * FIPS140ConsolidatedCertList0037.pdf
· * fips140consolidatedcertlist0017.pdf
· * FIPS140ConsolidatedCertList0009.pdf
· * physecpaper06.pdf
· * physecpaper09.pdf
· * FIPS140ConsolidatedCertList0035.pdf
· * FIPS140ConsolidatedCertList0015.pdf
· * FIPS140ConsolidatedCertList0051.pdf
· * FIPS140ConsolidatedCertJune2016.pdf
· * physecpaper07.pdf
· * fips140consolidatedcertlist0019.pdf
· * fips1401ig.pdf
· * FIPS140ConsolidatedCertList0013.pdf
· * FIPS140ConsolidatedCertList0007.pdf
· * FIPS140ConsolidatedCertList0023.pdf
· * FIPS140ConsolidatedCertNov2015.pdf
· * FIPS1402DTR.pdf
· * Jan12-2005-FR-FIPS1403-Notice.pdf
· * FIPS140ConsolidatedCertList0003.pdf
· * FIPS140ConsolidatedCertList0042.pdf
· * FIPS140ConsolidatedCertList0002.pdf
· * FIPS140ConsolidatedCertSept2016.pdf
· * physecpaper08.pdf
· * FIPS140ConsolidatedCertMay2016.pdf
· * FIPS140ConsolidatedCertMay2017.pdf
· * fips1402ig.pdf
· * 1401testA.pdf
· * FIPS140ConsolidatedCertList0030.pdf
· * FIPS140ConsolidatedCertList0036.pdf
· * FIPS140ConsolidatedCertList0017.pdf
· * fips140consolidatedcertmay2016.pdf
· * FIPS140ConsolidatedCertList0038.pdf
· * FIPS140ConsolidatedCertList0004.pdf
· * FIPS140ConsolidatedCertDec2015.pdf
· * FIPS140ConsolidatedCertList0014.pdf
· * FIPS140ConsolidatedCertList0012.pdf
· * FIPS140ConsolidatedCertList0010.pdf
· * FIPS140ConsolidatedCertList0029.pdf
· * FIPS140ConsolidatedCertList0001.pdf
· * fips140consolidatedcertaug2016.pdf
· * FIPS140ConsolidatedCertList0021.pdf
· * FIPS140ConsolidatedCertList0048.pdf
· * frn-2015-19743-comments-received.pdf
· * FIPS140ConsolidatedCertList0006.pdf
· * FIPS140ConsolidatedCertMarch2016.pdf
· * ispab-ltr-to-NIST-on-FIPS_140-2-ISO_20160420.pdf
· * FIPS140ConsolidatedCertList0033.pdf
· * FIPS140ConsolidatedCertList0008.pdf
· * physecpaper03.pdf
· * FIPS140ConsolidatedCertJuly2016.pdf
· * fips140consolidatedcertmay2017.pdf
· * fips140-3_non-invasive2.pdf
· * FIPS140ConsolidatedCertList0046.pdf
· * physecpaper03.pdf
· * FIPS140ConsolidatedCertList0020.pdf
· * FIPS140ConsolidatedCertList0055.pdf
· * FIPS140ConsolidatedCertList0024.pdf
· * fips140consolidatedcertnov2015.pdf
· * 1401test.pdf
· * FIPS140ConsolidatedCertList0005.pdf
· * ispab-ltr-to-NIST-on-FIPS_140-2-ISO_20160420.pdf
· * FIPS140ConsolidatedCertList0027.pdf
· * FIPS140ConsolidatedCertApril2016.pdf
· * FIPS140ConsolidatedCertOct2015.pdf
· * fips1402DTR.pdf
· * FIPS140ConsolidatedCertFeb2017.pdf
· * FIPS140ConsolidatedCertList0044.pdf
· * FIPS140ConsolidatedCertList0054.pdf
· * physecpaper05.pdf
· * FIPS140ConsolidatedCertAug2017.pdf
· * physecpaper02.pdf
· * FIPS1402IG.pdf
· * FIPS140ConsolidatedCertList0041.pdf
· * FIPS140ConsolidatedCertList0019.pdf
· * 140-2flow.pdf
· * FIPS140ConsolidatedCertList0053.pdf
· * FIPS140ConsolidatedCertList0045.pdf
· * FIPS140ConsolidatedCertList0049.pdf
· * fips140-3_non-invasive1.pdf
· * fips140consolidatedcertlist0024.pdf
· * FIPS140ConsolidatedCertList0039.pdf
· * physecpaper04.pdf
· * FIPS140ConsolidatedCertJune2017.pdf
· * physecpaper01.pdf
· * FIPS140ConsolidatedCertJuly2017.pdf
· * FIPS140ConsolidatedCertOct2016.pdf
· * FIPS140ConsolidatedCertList0026.pdf
· * fips140consolidatedcertdec2016.pdf
· * fips140consolidatedcertlist0042.pdf
· * FIPS140ConsolidatedCertJan2016.pdf
· * FIPS140ConsolidatedCertFeb2016.pdf
· * fips140consolidatedcertjan2017.pdf
· * FIPS140ConsolidatedCertList0052.pdf
· * FIPS140ConsolidatedCertList0047.pdf
· * FIPS140ConsolidatedCertJan2017.pdf
· * FIPS1401IG.pdf
· * FIPS140ConsolidatedCertList0056.pdf
· * FIPS140ConsolidatedCertList0028.pdf
· * FIPS140ConsolidatedCertList0018.pdf
· * fips-140_response.pdf
· * FIPS140ConsolidatedCertList0025.pdf
· * ispab-ltr-to-nist-on-fips_140-2-iso_20160420.pdf
· * FIPS140ConsolidatedCertList0022.pdf
· * FIPS140ConsolidatedCertList0050.pdf
· * FIPS140ConsolidatedCertList0016.pdf
· * FIPS140ConsolidatedCertList0011.pdf
· * FIPS140ConsolidatedCertDec2016.pdf
· * FIPS140ConsolidatedCertNov2016.pdf
· * FIPS140ConsolidatedCertList0043.pdf
· * FIPS140ConsolidatedCertList0057.pdf
· * FIPS140ConsolidatedCertAug2016.pdf
· * fips140-3-draft-2009.pdf
· * fips1403Draft.pdf
· * revised-draft-fips140-3_PDF-zip_document-annexA-to-annexG.zip
· * fips140-3-draft-2009-comments-resolutions.pdf
· * fips1403draft.pdf
· * fips1402annexc.pdf
· * PublicComments_FIPS140-3Draft2.pdf
· * fips1402annexa.pdf
· * fips1402annexd.pdf
· * fips1402annexb.pdf
· * CommentsFIPS140-3_draft1.pdf
· * day2_mar24_fips-140-quo-vadis_nist-csd.pdf
· * day1_research_100-150.pdf
· * day1_research_100-150.pdf
· * physecpre01.pdf
· * Jean_Campbell-FIPS_140-3_-_Looking_over_the_horizon(3).pdf
· * physecpre02.pdf
· * physecpre17.pdf
· * physecpre04.pdf
· * CMVP2603.pdf
· * noninvasive-attack-testing_cscace-hsakane.pdf
· * noninvasive-attack-testing_cscace-hsakane.pdf
· * physecpre09.pdf
· * physecpre05.pdf
· * CMVP 140-3 MM Comments Template.docx
· * fips140_2_chng2_20021203.epub
· * physecpre10.ppt
· * physecpre10.ppt
· * physecpre06.ppt
· * physecpre16.ppt
· * physecpre03.ppt
· * physecpre18.ppt
· * physecpre07.ppt
· * physecpre11.ppt
· * physecpre17.ppt
· * physecpre08.ppt
· * physecpre12.ppt
· * physecpre15.ppt
· * physecpre14.ppt
· * physecpre15.ppt
· * physecpre14.ppt
· * physecpre13.ppt
* [FIPS 180]+24 – Secure Hash Standard (SHS)
* [FIPS 186]+25 – Digital Signature Standard (DSS)
* [FIPS 198]+8 – The Keyed-Hash Message Authentication Code (HMAC)
* [February 2000]+14 – Guideline for Implementing Cryptography in the Federal Government – ITL Bulletin
* [May 2006]+8 – An Update On Cryptographic Standards, Guidelines, And Testing Requirements – ITL Bulletin
* [IR 7313]+1 – 5th Annual PKI R&D Workshop “Making PKI Easy to Use” Proceedings
* [SP 800-106]+4 – Randomized Hashing for Digital Signatures
* [SP 800-107]+8 – Recommendation for Applications Using Approved Hash Algorithms
* [SP 800-15]+7 – Minimum Interoperability Specification for PKI Components (MISPC), Version 1
* [SP 800-21r2]+5 – Guideline for Implementing Cryptography in the Federal Government
* [SP 800-25]+5 – Federal Agency Use of Public Key Technology for Digital Signatures and Authentication
* [SP 800-32]+4 – Introduction to Public Key Technology and the Federal PKI Infrastructure
* [SP 800-49]+2 – Federal S/MIME V3 Client Profile
* [SP 800-52]+14 – Guidelines on the Selection and Use of Transport Layer Security
* [SP 800-57]+46 – Recommendation on Key Management
· * NIST SP 800-057 Part 3r1 Recommendation for Key Management, Part 3; Application-Specific Key Management Guidance, 2015-01-22 (Final).pdf
· * NIST SP 800-057 Part 2 Recommendation for Key Management, Part 2; Best Practices for Key Management Organization, 2005-08-25 (Final).pdf
· * NIST SP 800-057 Recommendation for Key Management, Part 1; 2005-08 (updated March 9, 2007).pdf
· * NIST SP 800-057 Recommendation for Key Management, Part 2; 2005-08 (updated March 9, 2007).pdf
· * NIST SP 800-057 Recommendation for Key Management; Part 3 Key Management, 2007-03.pdf
· * NIST SP 800-057 Part 2r1 Recommendation for Key Management, Part 2; Best Practices for Key Management Organizations (2nd Draft), 2018-11-20 (Draft).pdf
· * NIST SP 800-057pt1r4_commentsreceived.pdf
· * alt-SP800-57part1rev4.pdf
· * alt-SP800-57part1rev3_general.pdf
· * NIST SP 800-057-pt2-draft-comments-received-apr2005.pdf
· * alt-SP800-57part3rev1.pdf
· * alt-SP800-57part2.pdf
· * sp800-57pt1r4_comments_received.pdf
· * nistspecialpublication800-57p1r3.pdf
· * nistspecialpublication800-57p1r2006.pdf
· * nistspecialpublication800-57p1r2007.pdf
· * nist.sp.800-57pt3r1.pdf
· * NIST.SP.800-57pt2r1.pdf
· * NIST.SP.800-57Pt3r1.pdf
· * sp800-57-Part1-revised2_Mar08-2007.pdf
· * nistspecialpublication800-57p2.pdf
· * NIST.SP.800-57pt1r5.pdf
· * nist.sp.800-57pt1r5.pdf
· * nistspecialpublication800-57p3.pdf
· * nistspecialpublication800-57p1.pdf
· * sp800-57_part1_rev3_general.pdf
· * NIST.SP.800-57pt1r5-draft.pdf
· * SP800-57-Part2.pdf
· * sp800-57pt1r4_comments_received.pdf
· * sp800-57pt1r4_draft_track_changes_from_rev3_to_rev4.pdf
· * sp800-57p1r4_draft.pdf
· * sp800-57-pt2-draft-comments-received-apr2005.pdf
· * sp800_57_pt3_r1_draft.pdf
· * SP80057TranPlan.pdf
· * SP80057TranPlan.pdf
· * sp800_57_pt3_r1_draft.pdf
· * CommentsSP800-57-1.pdf
· * Draft_SP800-57-Part1-Rev3_May2011.pdf
· * sp800-57-pt1-draft-apr2005-comments.pdf
· * sp800-57-pt1-draft-apr2005.pdf
· * sp800-57pt2-r1-draft.pdf
· * sp800-57pt2-r1-draft.pdf
· * sp800-57pt2-r1-draft2.pdf
· * sp800-57-pt1-draft-Jan2003.pdf
· * sp800-57-pt1-draft-Jan2003-comments.pdf
· * CommentsSP800-57Part2.pdf
* [SP 800-63r1]+42 – Electronic Authentication Guideline
* [SP 800-78]+20 – Cryptographic Algorithms and Key Sizes for Personal Identity Verification
+ FORENSICS
* [February 2007]+13 – Intrusion Detection And Prevention Systems – ITL Bulletin
* [June 2007]+18 – Forensic Techniques for Cell Phones – ITL Bulletin
* [IR 7100]+2 – PDA Forensic Tools: An Overview and Analysis
* [IR 7250]+1 – Cell Phone Forensic Tools: An Overview and Analysis
* [IR 7387]+2 – Cell Phone Forensic Tools: An Overview and Analysis Update
* [IR 7516]+1 – Forensic Filtering of Cell Phone Protocols
* [November 2001]+3 – Computer Forensics Guidance
* [SP 800-101]+5 – Guidelines on Cell Phone Forensics
* [SP 800-72]+3 – Guidelines on PDA Forensics
* [SP 800-86]+2 – Guide to Integrating Forensic Techniques into Incident Response
* [SP 800-88]+8 – Media Sanitization Guide
* [SP 800-94]+7 – Guide to Intrusion Detection and Prevention Systems (IDPS)
* [September 2006]+26 – Forensic Techniques: Helping Organizations Improve Their Responses To Information Security Incidents
· * NIST SP 800-092 Guide to Computer Security Log Management, 2006-09-13 (Final).pdf
· * NIST SP 800-086 Guide to Integrating Forensic Techniques into Incident Response, 2006-09-01 (Final).pdf
· * NIST SP 800-084 Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities, 2006-09-21 (Final).pdf
· * NIST SP 800-092 Guide to Computer Security Log Management, 2006-09-13 (Final).epub
· * NIST SP 800-084 Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities, 2006-09-21 (Final).epub
· * NIST SP 800-092 Guide to Computer Security Log Management, 2006-09.pdf
· * NIST SP 800-084 Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities, 2006-09.pdf
· * NIST SP 800-088r1 Guidelines for Media Sanitization, 2006-09.pdf
· * NIST IR 7316 Assessment of Access Control Systems, 2006-09.pdf
· * NIST SP 800-096 PIV Card-Reader Interoperability Guidelines, 2006-09.pdf
· * ISPAB-minutes-Sept2006-final.pdf
· * itlbul2006-09.pdf
· * GregG-ISPAB-Sept2006.pdf
· * TeresaN-ISPAB-Sept2006.pdf
· * JohnS-ISPAB-Sept2006.pdf
· * GregG-ISPAB-Sept2006.pdf
· * JoanneMcN-ISPAB-Sept2006.pdf
· * CurtB-ISPAB-Sept2006.pdf
· * TeresaN-ISPAB-Sept2006.pdf
· * JohnS-ISPAB-Sept2006.pdf
· * LeslieR-ISPAB-Sept2006.pdf
· * CurtB-ISPAB-Sept2006.pdf
· * JoanneMcN-ISPAB-Sept2006.pdf
· * DavidT-ISPAB-Sept2006.pdf
· * LeslieR-ISPAB-Sept2006.pdf
· * DavidT-ISPAB-Sept2006.pdf
+ GENERAL IT SECURITY
* [April 2007]+1 – Securing Wireless Networks – ITL Bulletin
* [FIPS 200]+2 – Minimum Security Requirements for Federal Information and Information Systems
* [March 2006]+19 – Minimum Security Requirements For Federal Information And Information Systems: Federal Information Processing Standard (FIPS) 200 Approved By The Secretary Of Commerce – ITL Security Bulletin
* [IR 7298]+12 – Glossary of Key Information Security Terms
* [IR 7358]+4 – Program Review for Information Security Management Assistance (PRISMA)
* [IR 7359]+3 – Information Security Guide For Government Executives
* [IR 7435]+2 – The Common Vulnerability Scoring System (CVSS) and its Applicability to Federal Agency Systems
* [November 2006]+2 – Guide To Securing Computers Using Windows XP Home Edition – ITL Bulletin
* [October 2008]+9 – Keeping Information Technology (IT) System Servers Secure: A General Guide To Good Practices
* [SP 800-100]+1 – Information Security Handbook: A Guide for Managers
* [SP 800-111]+2 – Guide to Storage Encryption Technologies for End User Devices
* [SP 800-114]+7 – User's Guide to Securing External Devices for Telework and Remote Access
* [SP 800-116]+12 – A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
* [SP 800-12]+23 – An Introduction to Computer Security: The NIST Handbook
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, 1995-10.pdf
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 2, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 1, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 5, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 4, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 3, 1995-10.ps
· * derived-piv-nist-sp1800-12b-v2.pdf
· * derived-piv-nist-sp1800-12a-v2.pdf
· * derived-piv-nist-sp1800-12c-v2.pdf
· * derived-piv-nist-sp1800-12-v2.pdf
· * derived-piv-nist-sp1800-12-draft.pdf
· * derived-piv-nist-sp1800-12c-draft.pdf
· * derived-piv-nist-sp1800-12a-draft.pdf
· * derived-piv-nist-sp1800-12b-draft.pdf
· * NIST.SP.800-12r1.pdf
· * NIST.SP.1800-12.pdf
· * nistspecialpublication800-12.pdf
· * 800-12_4.ps
· * 800-12_5.ps
· * 800-12_1.ps
· * 800-12_2.ps
· * 800-12_3.ps
· * sp800_12_r1_draft.pdf
* [SP 800-123]+7 – Guide to General Server Security
* [SP 800-14]+8 – Generally Accepted Principles and Practices for Securing Information Technology Systems
* [SP 800-27rA]+2 – Engineering Principles for Information Technology Security (A Baseline for Achieving Security)
* [SP 800-33]+1 – Underlying Technical Models for Information Technology Security
* [SP 800-44]+3 – Guidelines on Securing Public Web Servers
* [SP 800-47]+4 – Security Guide for Interconnecting Information Technology Systems
* [SP 800-48]+4 – Guide to Securing Legacy IEEE 802.11 Wireless Networks
* [SP 800-53r3]+235 – Recommended Security Controls for Federal Information Systems and Organizations
· * NIST SP 800-053Ar4 Assessing Security and Privacy Controls in Federal Information Systems and Organizations; Building Effective Assessment Plans, 2014-12-18 (Final).pdf
· * NIST SP 800-053r2 Recommended Security Controls for Fed Info Systems, 2007-12 (final).pdf
· * alt-SP800-53-rev3-final_updated-errata_05-01-2010.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r2 to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r3FPD to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 2 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 1 (Errata), 2010-05-01.pdf
· * NIST SP 800-053Ar1 Guide for Assessing the Security Controls in Federal Information Systems and Organizations, 2010-06-29.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2013-05-07.pdf
· * NIST SP 800-053r5 Security and Privacy Controls for Information Systems and Organizations, 2017-08-15 (Draft).pdf
· * NIST SP 800-053r4_final_word_errata_01_22_2015.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations Controls (Errata), 2014-01-15.xml
· * NIST SP 800-053A Guide for Assessing the Security Controls in Fed Info Systems, 2008-06.pdf
· * NIST SP 800-053r5-draft-controls-markup.pdf
· * alt-SP800-53r4.pdf
· * alt-SP800-53Ar4.pdf
· * alt-SP800-53.pdf
· * alt-SP800-53r5-draft.pdf
· * NIST SP 800-053r5-draft-baselines-markup.pdf
· * NIST SP 800-053-controls.xml
· * NIST SP 800-053a_r4_errata_12_18_2014.docx
· * sp800-53A-rev1-final.pdf
· * 800-53-rev1-final-clean-sz.pdf
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53r4_summary.pdf
· * NIST.SP.800-53r4.pdf
· * nist.sp.800-53ar4.pdf
· * NIST.SP.800-53Ar4.pdf
· * nist.sp.800-53r4.pdf
· * nistspecialpublication800-53r3.pdf
· * nistspecialpublication800-53r2.pdf
· * nistspecialpublication800-53r1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53a.pdf
· * nistspecialpublication800-53a.pdf
· * NIST.SP.800-53r5.pdf
· * nistspecialpublication800-53.pdf
· * nist.sp.800-53r5.pdf
· * NIST.SP.800-53Ar5.pdf
· * NIST.SP.800-53B.pdf
· * 800-53-rev1-annex3-sz.pdf
· * 800-53-rev1-annex2-sz.pdf
· * 800-53-rev1-annex1-sz.pdf
· * NIST.SP.800-53r5-draft.pdf
· * nist.sp.800-53r5-draft.pdf
· * NIST.SP.800-53Ar5-draft.pdf
· * NIST.SP.800-53B-draft.pdf
· * sp800_53a_r4_errata_12_18_2014.docx
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * DOJ_CSAM_Planning_for_Implementing_SP-800-53_Rev5_FINAL.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * apply-sp-800-53-ics-final-22aug06.pdf
· * NIST_SP_800-53_Comment_Site_User_Guide_FINAL_8Sept2021.pdf
· * ics-in-sp800-53_final_21mar07.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * ics-in-sp800-53_final_21Mar07.pdf
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53-collaboration-index-template.docx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53-collaboration-index-template.xlsx
· * sp800-53r5-control-catalog.xlsx
· * sp800-53-collaboration-index-template.docx
· * sp800-53-collaboration-index-template.xlsx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-control-catalog.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * OLIR_review_800-213A_to_800-53_rev5_final.xlsx
· * Federal_Cybersecurity_Privacy_Forum_2Dec2021_NIST_SP800-53update.pdf
· * Federal_Cybersecurity_and_Privacy_Forum_15Feb2022_What_Is_New_SP800-53ARevision5.pdf
· * Federal_Cybersecurity_Privacy_Professionals_Forum_2Dec2021_FedRAMP_NIST800-53_Rev5.pdf
· * cybersecurity-innovation-forum_01-28-2014.pdf
· * ePACS Overlay_v1_SP800-53rev5-April2021.pdf
· * FPKI Overlay-v1-SP800-53rev5-April2021.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * 2.4 - Main - DOJ Adopting OSCAL to Deliver Lastest NIST SP 800-53 Controls.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * sp800-53-rev4-ipd.pdf
· * RMF 2.0 Deep Dive 5-15-18 v3 - Kelley Dempsey Naomi Lefkovitz.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * update-draft-800-53r5-v2.pdf
· * sp800_53_r4_appendix_g_markup_draft2.pdf
· * sp800_53a_r4_draft.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_f_markup_draft2.pdf
· * sp800-53-rev4-ipd.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_d_markup_draft2.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * Day_1_AM2_SCRM_Controls_Jon_Boyens.pdf
· * 800-53-for-ICS_KEMA.pdf
· * sp800-53r5-draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft-fpd-summary-of-significant-changes.pdf
· * sp800-53r5-draft-fpd-faq.pdf
· * sp800-53r5-draft.pdf
· * 800-53-Rev4_announcement.pdf
· * 1.5 - Main - SP800-53 Empowered by OSCAL_28Feb2022.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * appxi_800-53-rev1-augmented_15may07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP_800-53B_derived-OSCAL.pdf
· * sp_800-53_v5_1-derived-oscal.pdf
· * SP_800-53_v5_1-derived-OSCAL.pdf
· * sp800_53a_r4_draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft.pdf
· * 800-53-for-ICS_KEMA.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * sp800-53r5-fpd-controls.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * 800-53 automation workflow.pdf
· * 800-53-rev4-controls.csv
· * 800-53-rev4-controls.xml
· * 800-53-rev3-controls.xml
· * 800-53-rev3-controls.csv
· * SP800-177-Rev-1-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_LOW-baseline_profile_load.csv
· * NIST_SP-800-53_rev5-derived-OSCAL.xlsx
· * SP800-161-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_PRIVACY-baseline_profile_load.csv
· * NIST_SP-800-53_rev5_MODERATE-baseline_profile_load.csv
· * SP800-82-Rev-2-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_catalog_load.csv
· * NIST_SP-800-53_rev5_HIGH-baseline_profile_load.csv
· * sp800-53r5-draft-fpd-comparison-with-rev4.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-draft-fpd-comment-template.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53ar5-draft-comment-template.xlsx
· * sp800-53ar5-draft-comment-template.xlsx
· * stig-mapping-to-nist-800-53.xlsx
· * 800-53a-rev4-objectives.csv
· * 800-53a-rev4-objectives.xml
· * 800-53A-rev3-objectives.xml
· * SP800-53-control-comment-template.xlsx
· * WIP_800_53_Rev_5_to_Framework_v_1_1.xlsx
· * sp80053-focal-elements.csv
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * sp80053-focal-details.csv
· * SP_800-53_v5_1_XML.xml
· * NIST_SP-800-53B-derived-OSCAL.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * NIST SP 800-53B-Jan2022.xlsx
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * 800_53_rev_4_focal_document_template.xlsx
· * 800_53_Rev_4_Focal_Document_Template.xlsx
· * WIP_Framework_v_1_1_to_800_53_Rev5.xlsx
· * WIP_800_53_Rev_4_to_Framework_v_1_1.xlsx
· * sp800-53B-draft-comment-template.xlsx
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
* [SP 800-63r1]+42 – Electronic Authentication Guideline
* [SP 800-64r2]+5 – Security Considerations in the Information System Development Life Cycle
* [SP 800-88]+8 – Media Sanitization Guide
* [SP 800-95]+2 – Guide to Secure Web Services
+ INCIDENT RESPONSE
* [April 2002]+2 – Techniques for System and Data Recovery
* [December 2005]+17 – Preventing And Handling Malware Incidents: How To Protect Information Technology Systems From Malicious Code And Software
* [December 2006]+24 – Maintaining Effective Information Technology (IT) Security Through Test, Training, And Exercise Programs – ITL Bulletin
* [FIPS 200]+2 – Minimum Security Requirements for Federal Information and Information Systems
* [February 2006]+5 – Creating A Program To Manage Security Patches And Vulnerabilities: NIST Recommendations For Improving System Security – ITL Bulletin
* [February 2007]+13 – Intrusion Detection And Prevention Systems – ITL Bulletin
* [January 2004]+2 – Computer Security Incidents: Assessing, Managing, And Controlling The Risks – ITL Bulletin
* [June 2007]+18 – Forensic Techniques for Cell Phones – ITL Bulletin
* [IR 6416] – Applying Mobile Agents to Intrusion Detection and Response
* [IR 6981]+2 – Policy Expression and Enforcement for Handheld Devices
* [IR 7100]+2 – PDA Forensic Tools: An Overview and Analysis
* [IR 7250]+1 – Cell Phone Forensic Tools: An Overview and Analysis
* [IR 7387]+2 – Cell Phone Forensic Tools: An Overview and Analysis Update
* [November 2001]+3 – Computer Forensics Guidance
* [October 2002]+3 – Security Patches And The CVE Vulnerability Naming Scheme: Tools To Address Computer System Vulnerabilities – ITL Bulletin
* [October 2005]+2 – National Vulnerability Database: Helping Information Technology System Users And Developers Find Current Information About Cyber Security Vulnerabilities – ITL Bulletin
* [SP 800-100]+1 – Information Security Handbook: A Guide for Managers
* [SP 800-101]+5 – Guidelines on Cell Phone Forensics
* [SP 800-12]+23 – An Introduction to Computer Security: The NIST Handbook
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, 1995-10.pdf
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 2, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 1, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 5, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 4, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 3, 1995-10.ps
· * derived-piv-nist-sp1800-12b-v2.pdf
· * derived-piv-nist-sp1800-12a-v2.pdf
· * derived-piv-nist-sp1800-12c-v2.pdf
· * derived-piv-nist-sp1800-12-v2.pdf
· * derived-piv-nist-sp1800-12-draft.pdf
· * derived-piv-nist-sp1800-12c-draft.pdf
· * derived-piv-nist-sp1800-12a-draft.pdf
· * derived-piv-nist-sp1800-12b-draft.pdf
· * NIST.SP.800-12r1.pdf
· * NIST.SP.1800-12.pdf
· * nistspecialpublication800-12.pdf
· * 800-12_4.ps
· * 800-12_5.ps
· * 800-12_1.ps
· * 800-12_2.ps
· * 800-12_3.ps
· * sp800_12_r1_draft.pdf
* [SP 800-123]+7 – Guide to General Server Security
* [SP 800-14]+8 – Generally Accepted Principles and Practices for Securing Information Technology Systems
* [SP 800-21r2]+5 – Guideline for Implementing Cryptography in the Federal Government
* [SP 800-36]+1 – Guide to Selecting Information Technology Security Products
* [SP 800-40 Rev]+11 – Creating a Patch and Vulnerability Management Program
* [SP 800-50]+5 – Building an Information Technology Security Awareness and Training Program
* [SP 800-51]+4 – Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme [subsection] :- Annual public report on activities undertaken in the previous year
* [SP 800-53r3]+235 – Recommended Security Controls for Federal Information Systems and Organizations
· * NIST SP 800-053Ar4 Assessing Security and Privacy Controls in Federal Information Systems and Organizations; Building Effective Assessment Plans, 2014-12-18 (Final).pdf
· * NIST SP 800-053r2 Recommended Security Controls for Fed Info Systems, 2007-12 (final).pdf
· * alt-SP800-53-rev3-final_updated-errata_05-01-2010.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r2 to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r3FPD to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 2 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 1 (Errata), 2010-05-01.pdf
· * NIST SP 800-053Ar1 Guide for Assessing the Security Controls in Federal Information Systems and Organizations, 2010-06-29.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2013-05-07.pdf
· * NIST SP 800-053r5 Security and Privacy Controls for Information Systems and Organizations, 2017-08-15 (Draft).pdf
· * NIST SP 800-053r4_final_word_errata_01_22_2015.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations Controls (Errata), 2014-01-15.xml
· * NIST SP 800-053A Guide for Assessing the Security Controls in Fed Info Systems, 2008-06.pdf
· * NIST SP 800-053r5-draft-controls-markup.pdf
· * alt-SP800-53r4.pdf
· * alt-SP800-53Ar4.pdf
· * alt-SP800-53.pdf
· * alt-SP800-53r5-draft.pdf
· * NIST SP 800-053r5-draft-baselines-markup.pdf
· * NIST SP 800-053-controls.xml
· * NIST SP 800-053a_r4_errata_12_18_2014.docx
· * sp800-53A-rev1-final.pdf
· * 800-53-rev1-final-clean-sz.pdf
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53r4_summary.pdf
· * NIST.SP.800-53r4.pdf
· * nist.sp.800-53ar4.pdf
· * NIST.SP.800-53Ar4.pdf
· * nist.sp.800-53r4.pdf
· * nistspecialpublication800-53r3.pdf
· * nistspecialpublication800-53r2.pdf
· * nistspecialpublication800-53r1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53a.pdf
· * nistspecialpublication800-53a.pdf
· * NIST.SP.800-53r5.pdf
· * nistspecialpublication800-53.pdf
· * nist.sp.800-53r5.pdf
· * NIST.SP.800-53Ar5.pdf
· * NIST.SP.800-53B.pdf
· * 800-53-rev1-annex3-sz.pdf
· * 800-53-rev1-annex2-sz.pdf
· * 800-53-rev1-annex1-sz.pdf
· * NIST.SP.800-53r5-draft.pdf
· * nist.sp.800-53r5-draft.pdf
· * NIST.SP.800-53Ar5-draft.pdf
· * NIST.SP.800-53B-draft.pdf
· * sp800_53a_r4_errata_12_18_2014.docx
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * DOJ_CSAM_Planning_for_Implementing_SP-800-53_Rev5_FINAL.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * apply-sp-800-53-ics-final-22aug06.pdf
· * NIST_SP_800-53_Comment_Site_User_Guide_FINAL_8Sept2021.pdf
· * ics-in-sp800-53_final_21mar07.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * ics-in-sp800-53_final_21Mar07.pdf
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53-collaboration-index-template.docx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53-collaboration-index-template.xlsx
· * sp800-53r5-control-catalog.xlsx
· * sp800-53-collaboration-index-template.docx
· * sp800-53-collaboration-index-template.xlsx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-control-catalog.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * OLIR_review_800-213A_to_800-53_rev5_final.xlsx
· * Federal_Cybersecurity_Privacy_Forum_2Dec2021_NIST_SP800-53update.pdf
· * Federal_Cybersecurity_and_Privacy_Forum_15Feb2022_What_Is_New_SP800-53ARevision5.pdf
· * Federal_Cybersecurity_Privacy_Professionals_Forum_2Dec2021_FedRAMP_NIST800-53_Rev5.pdf
· * cybersecurity-innovation-forum_01-28-2014.pdf
· * ePACS Overlay_v1_SP800-53rev5-April2021.pdf
· * FPKI Overlay-v1-SP800-53rev5-April2021.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * 2.4 - Main - DOJ Adopting OSCAL to Deliver Lastest NIST SP 800-53 Controls.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * sp800-53-rev4-ipd.pdf
· * RMF 2.0 Deep Dive 5-15-18 v3 - Kelley Dempsey Naomi Lefkovitz.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * update-draft-800-53r5-v2.pdf
· * sp800_53_r4_appendix_g_markup_draft2.pdf
· * sp800_53a_r4_draft.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_f_markup_draft2.pdf
· * sp800-53-rev4-ipd.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_d_markup_draft2.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * Day_1_AM2_SCRM_Controls_Jon_Boyens.pdf
· * 800-53-for-ICS_KEMA.pdf
· * sp800-53r5-draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft-fpd-summary-of-significant-changes.pdf
· * sp800-53r5-draft-fpd-faq.pdf
· * sp800-53r5-draft.pdf
· * 800-53-Rev4_announcement.pdf
· * 1.5 - Main - SP800-53 Empowered by OSCAL_28Feb2022.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * appxi_800-53-rev1-augmented_15may07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP_800-53B_derived-OSCAL.pdf
· * sp_800-53_v5_1-derived-oscal.pdf
· * SP_800-53_v5_1-derived-OSCAL.pdf
· * sp800_53a_r4_draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft.pdf
· * 800-53-for-ICS_KEMA.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * sp800-53r5-fpd-controls.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * 800-53 automation workflow.pdf
· * 800-53-rev4-controls.csv
· * 800-53-rev4-controls.xml
· * 800-53-rev3-controls.xml
· * 800-53-rev3-controls.csv
· * SP800-177-Rev-1-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_LOW-baseline_profile_load.csv
· * NIST_SP-800-53_rev5-derived-OSCAL.xlsx
· * SP800-161-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_PRIVACY-baseline_profile_load.csv
· * NIST_SP-800-53_rev5_MODERATE-baseline_profile_load.csv
· * SP800-82-Rev-2-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_catalog_load.csv
· * NIST_SP-800-53_rev5_HIGH-baseline_profile_load.csv
· * sp800-53r5-draft-fpd-comparison-with-rev4.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-draft-fpd-comment-template.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53ar5-draft-comment-template.xlsx
· * sp800-53ar5-draft-comment-template.xlsx
· * stig-mapping-to-nist-800-53.xlsx
· * 800-53a-rev4-objectives.csv
· * 800-53a-rev4-objectives.xml
· * 800-53A-rev3-objectives.xml
· * SP800-53-control-comment-template.xlsx
· * WIP_800_53_Rev_5_to_Framework_v_1_1.xlsx
· * sp80053-focal-elements.csv
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * sp80053-focal-details.csv
· * SP_800-53_v5_1_XML.xml
· * NIST_SP-800-53B-derived-OSCAL.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * NIST SP 800-53B-Jan2022.xlsx
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * 800_53_rev_4_focal_document_template.xlsx
· * 800_53_Rev_4_Focal_Document_Template.xlsx
· * WIP_Framework_v_1_1_to_800_53_Rev5.xlsx
· * WIP_800_53_Rev_4_to_Framework_v_1_1.xlsx
· * sp800-53B-draft-comment-template.xlsx
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
* [SP 800-61 Rev]+10 – Computer Security Incident Handling Guide
* [SP 800-61r1]+10 – Computer Security Incident Handling Guide
* [SP 800-66r1]+9 – An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act Security Rule
* [SP 800-83]+7 – Guide to Malware Incident Prevention and Handling
* [SP 800-84]+8 – Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities
* [SP 800-86]+2 – Guide to Integrating Forensic Techniques into Incident Response
* [SP 800-92]+8 – Guide to Computer Security Log Management
* [SP 800-94]+7 – Guide to Intrusion Detection and Prevention Systems (IDPS)
* [September 2006]+26 – Forensic Techniques: Helping Organizations Improve Their Responses To Information Security Incidents
· * NIST SP 800-092 Guide to Computer Security Log Management, 2006-09-13 (Final).pdf
· * NIST SP 800-086 Guide to Integrating Forensic Techniques into Incident Response, 2006-09-01 (Final).pdf
· * NIST SP 800-084 Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities, 2006-09-21 (Final).pdf
· * NIST SP 800-092 Guide to Computer Security Log Management, 2006-09-13 (Final).epub
· * NIST SP 800-084 Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities, 2006-09-21 (Final).epub
· * NIST SP 800-092 Guide to Computer Security Log Management, 2006-09.pdf
· * NIST SP 800-084 Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities, 2006-09.pdf
· * NIST SP 800-088r1 Guidelines for Media Sanitization, 2006-09.pdf
· * NIST IR 7316 Assessment of Access Control Systems, 2006-09.pdf
· * NIST SP 800-096 PIV Card-Reader Interoperability Guidelines, 2006-09.pdf
· * ISPAB-minutes-Sept2006-final.pdf
· * itlbul2006-09.pdf
· * GregG-ISPAB-Sept2006.pdf
· * TeresaN-ISPAB-Sept2006.pdf
· * JohnS-ISPAB-Sept2006.pdf
· * GregG-ISPAB-Sept2006.pdf
· * JoanneMcN-ISPAB-Sept2006.pdf
· * CurtB-ISPAB-Sept2006.pdf
· * TeresaN-ISPAB-Sept2006.pdf
· * JohnS-ISPAB-Sept2006.pdf
· * LeslieR-ISPAB-Sept2006.pdf
· * CurtB-ISPAB-Sept2006.pdf
· * JoanneMcN-ISPAB-Sept2006.pdf
· * DavidT-ISPAB-Sept2006.pdf
· * LeslieR-ISPAB-Sept2006.pdf
· * DavidT-ISPAB-Sept2006.pdf
+ MAINTENANCE
* [August 2006]+2 – Protecting Sensitive Information Processed And Stored In Information Technology (IT) Systems - ITL Security Bulletin
* [December 2002]+28 – Security of Public Web Servers – ITL Security Bulletin
* [December 2005]+17 – Preventing And Handling Malware Incidents: How To Protect Information Technology Systems From Malicious Code And Software
* [December 2006]+24 – Maintaining Effective Information Technology (IT) Security Through Test, Training, And Exercise Programs – ITL Bulletin
* [FIPS 188]+5 – Standard Security Labels for Information Transfer
* [FIPS 191]+1 – Guideline for The Analysis of Local Area Network Security
* [FIPS 200]+2 – Minimum Security Requirements for Federal Information and Information Systems
* [February 2006]+5 – Creating A Program To Manage Security Patches And Vulnerabilities: NIST Recommendations For Improving System Security – ITL Bulletin
* [January 2002]+7 – Guidelines on Firewalls and Firewall Policy – ITL Security Bulletin
* [January 2004]+2 – Computer Security Incidents: Assessing, Managing, And Controlling The Risks – ITL Bulletin
* [IR 6462]+3 – CSPP - Guidance for COTS Security Protection Profiles
* [IR 6985]+2 – COTS Security Protection Profile - Operating Systems (CSPP-OS) (Worked Example Applying Guidance of NISTIR-6462, CSPP)
* [IR 7275]+13 – Specification for the Extensible Configuration Checklist Description Format (XCCDF)
* [IR 7284]+2 – Personal Identity Verification Card Management Report
* [November 2003]+2 – Network Security Testing – ITL Bulletin
* [November 2005]+2 – Securing Microsoft Windows XP Systems: NIST Recommendations For Using A Security Configuration Checklist – ITL Security Bulletin
* [November 2006]+2 – Guide To Securing Computers Using Windows XP Home Edition – ITL Bulletin
* [October 2002]+3 – Security Patches And The CVE Vulnerability Naming Scheme: Tools To Address Computer System Vulnerabilities – ITL Bulletin
* [October 2004]+2 – Securing Voice Over Internet Protocol (IP) Networks – ITL Bulletin
* [October 2005]+2 – National Vulnerability Database: Helping Information Technology System Users And Developers Find Current Information About Cyber Security Vulnerabilities – ITL Bulletin
* [SP 800-100]+1 – Information Security Handbook: A Guide for Managers
* [SP 800-12]+23 – An Introduction to Computer Security: The NIST Handbook
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, 1995-10.pdf
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 2, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 1, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 5, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 4, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 3, 1995-10.ps
· * derived-piv-nist-sp1800-12b-v2.pdf
· * derived-piv-nist-sp1800-12a-v2.pdf
· * derived-piv-nist-sp1800-12c-v2.pdf
· * derived-piv-nist-sp1800-12-v2.pdf
· * derived-piv-nist-sp1800-12-draft.pdf
· * derived-piv-nist-sp1800-12c-draft.pdf
· * derived-piv-nist-sp1800-12a-draft.pdf
· * derived-piv-nist-sp1800-12b-draft.pdf
· * NIST.SP.800-12r1.pdf
· * NIST.SP.1800-12.pdf
· * nistspecialpublication800-12.pdf
· * 800-12_4.ps
· * 800-12_5.ps
· * 800-12_1.ps
· * 800-12_2.ps
· * 800-12_3.ps
· * sp800_12_r1_draft.pdf
* [SP 800-123]+7 – Guide to General Server Security
* [SP 800-14]+8 – Generally Accepted Principles and Practices for Securing Information Technology Systems
* [SP 800-24]+3 – PBX Vulnerability Analysis: Finding Holes in Your PBX Before Someone Else Does
* [SP 800-31]+1 – Intrusion Detection Systems (IDS)
* [SP 800-34]+22 – Contingency Planning Guide for Information Technology Systems
* [SP 800-40r2]+11 – Creating a Patch and Vulnerability Management Program
* [SP 800-41]+5 – Guidelines on Firewalls and Firewall Policy
* [SP 800-43]+1 – Systems Administration Guidance for Securing Microsoft Windows 2000 Professional System
* [SP 800-44]+3 – Guidelines on Securing Public Web Servers
* [SP 800-51]+4 – Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme [subsection] :- Annual public report on activities undertaken in the previous year
* [SP 800-53r3]+235 – Recommended Security Controls for Federal Information Systems and Organizations
· * NIST SP 800-053Ar4 Assessing Security and Privacy Controls in Federal Information Systems and Organizations; Building Effective Assessment Plans, 2014-12-18 (Final).pdf
· * NIST SP 800-053r2 Recommended Security Controls for Fed Info Systems, 2007-12 (final).pdf
· * alt-SP800-53-rev3-final_updated-errata_05-01-2010.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r2 to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r3FPD to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 2 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 1 (Errata), 2010-05-01.pdf
· * NIST SP 800-053Ar1 Guide for Assessing the Security Controls in Federal Information Systems and Organizations, 2010-06-29.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2013-05-07.pdf
· * NIST SP 800-053r5 Security and Privacy Controls for Information Systems and Organizations, 2017-08-15 (Draft).pdf
· * NIST SP 800-053r4_final_word_errata_01_22_2015.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations Controls (Errata), 2014-01-15.xml
· * NIST SP 800-053A Guide for Assessing the Security Controls in Fed Info Systems, 2008-06.pdf
· * NIST SP 800-053r5-draft-controls-markup.pdf
· * alt-SP800-53r4.pdf
· * alt-SP800-53Ar4.pdf
· * alt-SP800-53.pdf
· * alt-SP800-53r5-draft.pdf
· * NIST SP 800-053r5-draft-baselines-markup.pdf
· * NIST SP 800-053-controls.xml
· * NIST SP 800-053a_r4_errata_12_18_2014.docx
· * sp800-53A-rev1-final.pdf
· * 800-53-rev1-final-clean-sz.pdf
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53r4_summary.pdf
· * NIST.SP.800-53r4.pdf
· * nist.sp.800-53ar4.pdf
· * NIST.SP.800-53Ar4.pdf
· * nist.sp.800-53r4.pdf
· * nistspecialpublication800-53r3.pdf
· * nistspecialpublication800-53r2.pdf
· * nistspecialpublication800-53r1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53a.pdf
· * nistspecialpublication800-53a.pdf
· * NIST.SP.800-53r5.pdf
· * nistspecialpublication800-53.pdf
· * nist.sp.800-53r5.pdf
· * NIST.SP.800-53Ar5.pdf
· * NIST.SP.800-53B.pdf
· * 800-53-rev1-annex3-sz.pdf
· * 800-53-rev1-annex2-sz.pdf
· * 800-53-rev1-annex1-sz.pdf
· * NIST.SP.800-53r5-draft.pdf
· * nist.sp.800-53r5-draft.pdf
· * NIST.SP.800-53Ar5-draft.pdf
· * NIST.SP.800-53B-draft.pdf
· * sp800_53a_r4_errata_12_18_2014.docx
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * DOJ_CSAM_Planning_for_Implementing_SP-800-53_Rev5_FINAL.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * apply-sp-800-53-ics-final-22aug06.pdf
· * NIST_SP_800-53_Comment_Site_User_Guide_FINAL_8Sept2021.pdf
· * ics-in-sp800-53_final_21mar07.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * ics-in-sp800-53_final_21Mar07.pdf
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53-collaboration-index-template.docx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53-collaboration-index-template.xlsx
· * sp800-53r5-control-catalog.xlsx
· * sp800-53-collaboration-index-template.docx
· * sp800-53-collaboration-index-template.xlsx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-control-catalog.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * OLIR_review_800-213A_to_800-53_rev5_final.xlsx
· * Federal_Cybersecurity_Privacy_Forum_2Dec2021_NIST_SP800-53update.pdf
· * Federal_Cybersecurity_and_Privacy_Forum_15Feb2022_What_Is_New_SP800-53ARevision5.pdf
· * Federal_Cybersecurity_Privacy_Professionals_Forum_2Dec2021_FedRAMP_NIST800-53_Rev5.pdf
· * cybersecurity-innovation-forum_01-28-2014.pdf
· * ePACS Overlay_v1_SP800-53rev5-April2021.pdf
· * FPKI Overlay-v1-SP800-53rev5-April2021.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * 2.4 - Main - DOJ Adopting OSCAL to Deliver Lastest NIST SP 800-53 Controls.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * sp800-53-rev4-ipd.pdf
· * RMF 2.0 Deep Dive 5-15-18 v3 - Kelley Dempsey Naomi Lefkovitz.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * update-draft-800-53r5-v2.pdf
· * sp800_53_r4_appendix_g_markup_draft2.pdf
· * sp800_53a_r4_draft.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_f_markup_draft2.pdf
· * sp800-53-rev4-ipd.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_d_markup_draft2.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * Day_1_AM2_SCRM_Controls_Jon_Boyens.pdf
· * 800-53-for-ICS_KEMA.pdf
· * sp800-53r5-draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft-fpd-summary-of-significant-changes.pdf
· * sp800-53r5-draft-fpd-faq.pdf
· * sp800-53r5-draft.pdf
· * 800-53-Rev4_announcement.pdf
· * 1.5 - Main - SP800-53 Empowered by OSCAL_28Feb2022.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * appxi_800-53-rev1-augmented_15may07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP_800-53B_derived-OSCAL.pdf
· * sp_800-53_v5_1-derived-oscal.pdf
· * SP_800-53_v5_1-derived-OSCAL.pdf
· * sp800_53a_r4_draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft.pdf
· * 800-53-for-ICS_KEMA.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * sp800-53r5-fpd-controls.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * 800-53 automation workflow.pdf
· * 800-53-rev4-controls.csv
· * 800-53-rev4-controls.xml
· * 800-53-rev3-controls.xml
· * 800-53-rev3-controls.csv
· * SP800-177-Rev-1-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_LOW-baseline_profile_load.csv
· * NIST_SP-800-53_rev5-derived-OSCAL.xlsx
· * SP800-161-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_PRIVACY-baseline_profile_load.csv
· * NIST_SP-800-53_rev5_MODERATE-baseline_profile_load.csv
· * SP800-82-Rev-2-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_catalog_load.csv
· * NIST_SP-800-53_rev5_HIGH-baseline_profile_load.csv
· * sp800-53r5-draft-fpd-comparison-with-rev4.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-draft-fpd-comment-template.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53ar5-draft-comment-template.xlsx
· * sp800-53ar5-draft-comment-template.xlsx
· * stig-mapping-to-nist-800-53.xlsx
· * 800-53a-rev4-objectives.csv
· * 800-53a-rev4-objectives.xml
· * 800-53A-rev3-objectives.xml
· * SP800-53-control-comment-template.xlsx
· * WIP_800_53_Rev_5_to_Framework_v_1_1.xlsx
· * sp80053-focal-elements.csv
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * sp80053-focal-details.csv
· * SP_800-53_v5_1_XML.xml
· * NIST_SP-800-53B-derived-OSCAL.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * NIST SP 800-53B-Jan2022.xlsx
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * 800_53_rev_4_focal_document_template.xlsx
· * 800_53_Rev_4_Focal_Document_Template.xlsx
· * WIP_Framework_v_1_1_to_800_53_Rev5.xlsx
· * WIP_800_53_Rev_4_to_Framework_v_1_1.xlsx
· * sp800-53B-draft-comment-template.xlsx
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
* [SP 800-55]+8 – Security Metrics Guide for Information Technology Systems
* [SP 800-55r1]+8 – Performance Measurement Guide for Information Security
* [SP 800-68r1]+6 – Guide to Securing Microsoft Windows XP Systems for IT Professionals
* [SP 800-69]+4 – Guidance for Securing Microsoft Windows XP Home Edition: a NIST Security Configuration Checklist
* [SP 800-70]+12 – Security Configuration Checklists Program for IT Products
* [SP 800-77]+4 – Guide to IPSec VPNs
* [SP 800-83]+7 – Guide to Malware Incident Prevention and Handling
* [SP 800-84]+8 – Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities
* [SP 800-88]+8 – Media Sanitization Guide
+ PERSONAL IDENTITY VERIFICATION (PIV)
* [August 2005]+9 – Implementation Of FIPS 201, Personal Identity Verification (PIV) Of Federal Employees And Contractors
* [FIPS 201]+374 – Personal Identity Verification for Federal Employees and Contractors
* [January 2006]+3 – Testing And Validation Of Personal Identity Verification (PIV) Components And Subsystems For Conformance To Federal Information Processing Standard 201
* [March 2005]+13 – Personal Identity Verification (PIV) Of Federal Employees And Contractors: Federal Information Processing Standard (FIPS) 201
* [IR 7284]+2 – Personal Identity Verification Card Management Report
* [IR 7313]+1 – 5th Annual PKI R&D Workshop “Making PKI Easy to Use” Proceedings
* [IR 7337]+2 – Personal Identity Verification Demonstration Summary
* [IR 7452]+2 – Secure Biometric Match-on-Card Feasibility Report
* [SP 800-104] – A Scheme for PIV Visual Card Topography
* [SP 800-116]+12 – A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
* [SP 800-63r1]+42 – Electronic Authentication Guideline
* [SP 800-73]+44 – Interfaces for Personal Identity Verification
* [SP 800-76]+16 – Biometric Data Specification for Personal Identity Verification
* [SP 800-78]+20 – Cryptographic Algorithms and Key Sizes for Personal Identity Verification
* [SP 800-79]+10 – Guidelines for the Accreditation of Personal Identity Verification (PIV) Card Issuers (PCI's)
* [SP 800-85A]+17 – PIV Card Application and Middleware Interface Test Guidelines (SP 800-73 compliance)
* [SP 800-85B]+14 – PIV Data Model Test Guidelines
+ PKI
* [FIPS 140]+285 – Security Requirements for Cryptographic Modules
· * NIST SB 2001-07 A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2.pdf
· * NIST SP 800-029 A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2, 2001-06.pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex A, 2001-05.pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex D, 2001-05.pdf
· * NIST FIPS 140-2 Security requirements for Cryptographic Modules, Annex D; Approved Key Establishment Techniques, 2001-03 (2009 Minor Edits).pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex B; Approved Protection Profiles, 2001-03 (2009 Minor Edits).pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex A; Approved Security Functions, 2001-03 (2009 Minor Edits) .pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex C; Approved Random Number Generators, 2001-03 (2009 Minor Edits).pdf
· * NIST FIPS 140-2 Security Reqs for Cryptographic Modules, 2001-03.pdf
· * NIST FIPS 140-2 Implementation Guidance for FIPS PUB 140-2 and the CMVP, 2010-08-03.pdf
· * NIST SB 1995-08 FIPS 140-1; A Framework for Cryptographic Standards.txt
· * fips140-3-final-draft-2007-comments-resolutions.pdf
· * FIPS_140-3 Final_Draft_2007.pdf
· * fips140_2_chng2_20021203.epub
· * fips140_2_chng2_20021203.epub
· * NewFIPS1402LogoForm.pdf
· * FIPS1402LogoForm.pdf
· * FIPS1403LogoForm.pdf
· * fips140-3-sections-submitted-for-comments.pdf
· * FIPS140ConsolidatedCertApr2017.pdf
· * FIPS140ConsolidatedCertMar2017.pdf
· * fips140consolidatedcertlist0034.pdf
· * FIPS1402DTR.pdf
· * FIPS140ConsolidatedCertJan2018.pdf
· * FIPS140ConsolidatedCertOct2017.pdf
· * FIPS140ConsolidatedCertAug2018.pdf
· * fips140consolidatedcertlist0053.pdf
· * FIPS140ConsolidatedCertList0008.pdf
· * FIPS 140-3 IG.pdf
· * FIPS140ConsolidatedCertSept2016.pdf
· * FIPS140ConsolidatedCertList0034.pdf
· * FIPS140ConsolidatedCertList0054.pdf
· * fips140consolidatedcertlist0042.pdf
· * FIPS140ConsolidatedCertList0052.pdf
· * FIPS1402LogoForm.pdf
· * FIPS140ConsolidatedCertApril2016.pdf
· * FIPS140ConsolidatedCertList0041.pdf
· * FIPS140ConsolidatedCertList0048.pdf
· * FIPS140ConsolidatedCertList0028.pdf
· * FIPS140ConsolidatedCertOct2018.pdf
· * FIPS140ConsolidatedCertNov2019.pdf
· * FIPS140ConsolidatedCertMarch2016.pdf
· * FIPS140ConsolidatedCertList0026.pdf
· * FIPS140ConsolidatedCertMay2016.pdf
· * FIPS140ConsolidatedCertList0057.pdf
· * FIPS140ConsolidatedCertList0035.pdf
· * FIPS1401LogoForm.pdf
· * fips140consolidatedcertlist0046.pdf
· * FIPS140ConsolidatedCertList0024.pdf
· * FIPS140ConsolidatedCertList0049.pdf
· * FIPS 140-3 IG.pdf
· * FIPS140ConsolidatedCertSept2017.pdf
· * FIPS140ConsolidatedCertOct2015.pdf
· * FIPS140ConsolidatedCertJuly2016.pdf
· * fips140consolidatedcertoct2016.pdf
· * FIPS-140-2-CMVP Management Manual 09-09-2021.pdf
· * fips140consolidatedcertdec2015.pdf
· * fips1402logoform.pdf
· * FIPS140ConsolidatedCertJan2017.pdf
· * fips140consolidatedcertlist0038.pdf
· * FIPS_140-3_sections_submitted_for_comments.pdf
· * FIPS140ConsolidatedCertDec2015.pdf
· * FIPS140ConsolidatedCertList0046.pdf
· * FIPS140ConsolidatedCertList0053.pdf
· * FIPS140ConsolidatedCertFeb2016.pdf
· * fips140consolidatedcertjune2016.pdf
· * NIST and ISO End User License Agreement.pdf
· * FIPS140ConsolidatedCertJune2017.pdf
· * FIPS140ConsolidatedCertDec2016.pdf
· * fips140consolidatedcertlist0026.pdf
· * FIPS140ConsolidatedCertList0042.pdf
· * FIPS140ConsolidatedCertJuly2017.pdf
· * FIPS140ConsolidatedCertNov2016.pdf
· * nist and iso end user license agreement.pdf
· * fips140consolidatedcertsept2017.pdf
· * fips140consolidatedcertmarch2016.pdf
· * fips140consolidatedcertsept2016.pdf
· * FIPS140ConsolidatedCertList0023.pdf
· * FIPS140ConsolidatedCertList0011.pdf
· * FIPS140ConsolidatedCertList0038.pdf
· * FIPS1402IG.pdf
· * FIPS140ConsolidatedCertList0045.pdf
· * FIPS140ConsolidatedCertOct2016.pdf
· * FIPS140ConsolidatedCertJune2016.pdf
· * FIPS140ConsolidatedCertList0020.pdf
· * FIPS140ConsolidatedCertList0032.pdf
· * fips140consolidatedcertmay2017.pdf
· * FIPS140ConsolidatedCertAug2016.pdf
· * FIPS140ConsolidatedCertNov2017.pdf
· * FIPS140ConsolidatedCertMay2017.pdf
· * FIPS140-2-ConsolidatedMarch2018.pdf
· * FIPS140ConsolidatedCertDec2017.pdf
· * fips140consolidatedcertlist0057.pdf
· * FIPS1403SoftSecWork.pdf
· * FIPS140ConsolidatedCertList0050.pdf
· * fips1402ig.pdf
· * fips140consolidatedcertlist0045.pdf
· * FIPS1402IG.pdf
· * fips-140-2-cmvp management manual 09-09-2021.pdf
· * FIPS140ConsolidatedCertJan2016.pdf
· * fips140consolidatedcertlist0011.pdf
· * fips140consolidatedcertmay2016.pdf
· * fips140consolidatedcertnov2019.pdf
· * FIPS140ConsolidatedCertFeb2017.pdf
· * FIPS_140-3_sections_submitted_for_comments.pdf
· * Draft FIPS-140-3-CMVP Management Manual v1.1 07-13-2022.pdf
· * Draft FIPS-140-3-CMVP Management Manual 09-18-2020.pdf
· * fips1402.pdf
· * fips1401.pdf
· * physecpre18.pdf
· * CMVP2604.pdf
· * CMVP2606.pdf
· * FIPS140ConsolidatedCertApr2017.pdf
· * day2_mar24_fips-140-quo-vadis_nist-csd.pdf
· * FIPS140ConsolidatedCertMar2017.pdf
· * fips140consolidatedcertapr2017.pdf
· * physecpaper13.pdf
· * physecpaper12.pdf
· * physecpaper10.pdf
· * physecpaper11.pdf
· * physecpaper16.pdf
· * physecpaper14.pdf
· * physecpaper14.pdf
· * physecpaper17.pdf
· * physecpaper18.pdf
· * physecpaper19.pdf
· * physecpaper12.pdf
· * FIPS140ConsolidatedCertList0032.pdf
· * FIPS140ConsolidatedCertList0040.pdf
· * FIPS140ConsolidatedCertList0031.pdf
· * FIPS140ConsolidatedCertList0034.pdf
· * physecpaper08.pdf
· * FIPS140ConsolidatedCertList0037.pdf
· * fips140consolidatedcertlist0017.pdf
· * FIPS140ConsolidatedCertList0009.pdf
· * physecpaper06.pdf
· * physecpaper09.pdf
· * FIPS140ConsolidatedCertList0035.pdf
· * FIPS140ConsolidatedCertList0015.pdf
· * FIPS140ConsolidatedCertList0051.pdf
· * FIPS140ConsolidatedCertJune2016.pdf
· * physecpaper07.pdf
· * fips140consolidatedcertlist0019.pdf
· * fips1401ig.pdf
· * FIPS140ConsolidatedCertList0013.pdf
· * FIPS140ConsolidatedCertList0007.pdf
· * FIPS140ConsolidatedCertList0023.pdf
· * FIPS140ConsolidatedCertNov2015.pdf
· * FIPS1402DTR.pdf
· * Jan12-2005-FR-FIPS1403-Notice.pdf
· * FIPS140ConsolidatedCertList0003.pdf
· * FIPS140ConsolidatedCertList0042.pdf
· * FIPS140ConsolidatedCertList0002.pdf
· * FIPS140ConsolidatedCertSept2016.pdf
· * physecpaper08.pdf
· * FIPS140ConsolidatedCertMay2016.pdf
· * FIPS140ConsolidatedCertMay2017.pdf
· * fips1402ig.pdf
· * 1401testA.pdf
· * FIPS140ConsolidatedCertList0030.pdf
· * FIPS140ConsolidatedCertList0036.pdf
· * FIPS140ConsolidatedCertList0017.pdf
· * fips140consolidatedcertmay2016.pdf
· * FIPS140ConsolidatedCertList0038.pdf
· * FIPS140ConsolidatedCertList0004.pdf
· * FIPS140ConsolidatedCertDec2015.pdf
· * FIPS140ConsolidatedCertList0014.pdf
· * FIPS140ConsolidatedCertList0012.pdf
· * FIPS140ConsolidatedCertList0010.pdf
· * FIPS140ConsolidatedCertList0029.pdf
· * FIPS140ConsolidatedCertList0001.pdf
· * fips140consolidatedcertaug2016.pdf
· * FIPS140ConsolidatedCertList0021.pdf
· * FIPS140ConsolidatedCertList0048.pdf
· * frn-2015-19743-comments-received.pdf
· * FIPS140ConsolidatedCertList0006.pdf
· * FIPS140ConsolidatedCertMarch2016.pdf
· * ispab-ltr-to-NIST-on-FIPS_140-2-ISO_20160420.pdf
· * FIPS140ConsolidatedCertList0033.pdf
· * FIPS140ConsolidatedCertList0008.pdf
· * physecpaper03.pdf
· * FIPS140ConsolidatedCertJuly2016.pdf
· * fips140consolidatedcertmay2017.pdf
· * fips140-3_non-invasive2.pdf
· * FIPS140ConsolidatedCertList0046.pdf
· * physecpaper03.pdf
· * FIPS140ConsolidatedCertList0020.pdf
· * FIPS140ConsolidatedCertList0055.pdf
· * FIPS140ConsolidatedCertList0024.pdf
· * fips140consolidatedcertnov2015.pdf
· * 1401test.pdf
· * FIPS140ConsolidatedCertList0005.pdf
· * ispab-ltr-to-NIST-on-FIPS_140-2-ISO_20160420.pdf
· * FIPS140ConsolidatedCertList0027.pdf
· * FIPS140ConsolidatedCertApril2016.pdf
· * FIPS140ConsolidatedCertOct2015.pdf
· * fips1402DTR.pdf
· * FIPS140ConsolidatedCertFeb2017.pdf
· * FIPS140ConsolidatedCertList0044.pdf
· * FIPS140ConsolidatedCertList0054.pdf
· * physecpaper05.pdf
· * FIPS140ConsolidatedCertAug2017.pdf
· * physecpaper02.pdf
· * FIPS1402IG.pdf
· * FIPS140ConsolidatedCertList0041.pdf
· * FIPS140ConsolidatedCertList0019.pdf
· * 140-2flow.pdf
· * FIPS140ConsolidatedCertList0053.pdf
· * FIPS140ConsolidatedCertList0045.pdf
· * FIPS140ConsolidatedCertList0049.pdf
· * fips140-3_non-invasive1.pdf
· * fips140consolidatedcertlist0024.pdf
· * FIPS140ConsolidatedCertList0039.pdf
· * physecpaper04.pdf
· * FIPS140ConsolidatedCertJune2017.pdf
· * physecpaper01.pdf
· * FIPS140ConsolidatedCertJuly2017.pdf
· * FIPS140ConsolidatedCertOct2016.pdf
· * FIPS140ConsolidatedCertList0026.pdf
· * fips140consolidatedcertdec2016.pdf
· * fips140consolidatedcertlist0042.pdf
· * FIPS140ConsolidatedCertJan2016.pdf
· * FIPS140ConsolidatedCertFeb2016.pdf
· * fips140consolidatedcertjan2017.pdf
· * FIPS140ConsolidatedCertList0052.pdf
· * FIPS140ConsolidatedCertList0047.pdf
· * FIPS140ConsolidatedCertJan2017.pdf
· * FIPS1401IG.pdf
· * FIPS140ConsolidatedCertList0056.pdf
· * FIPS140ConsolidatedCertList0028.pdf
· * FIPS140ConsolidatedCertList0018.pdf
· * fips-140_response.pdf
· * FIPS140ConsolidatedCertList0025.pdf
· * ispab-ltr-to-nist-on-fips_140-2-iso_20160420.pdf
· * FIPS140ConsolidatedCertList0022.pdf
· * FIPS140ConsolidatedCertList0050.pdf
· * FIPS140ConsolidatedCertList0016.pdf
· * FIPS140ConsolidatedCertList0011.pdf
· * FIPS140ConsolidatedCertDec2016.pdf
· * FIPS140ConsolidatedCertNov2016.pdf
· * FIPS140ConsolidatedCertList0043.pdf
· * FIPS140ConsolidatedCertList0057.pdf
· * FIPS140ConsolidatedCertAug2016.pdf
· * fips140-3-draft-2009.pdf
· * fips1403Draft.pdf
· * revised-draft-fips140-3_PDF-zip_document-annexA-to-annexG.zip
· * fips140-3-draft-2009-comments-resolutions.pdf
· * fips1403draft.pdf
· * fips1402annexc.pdf
· * PublicComments_FIPS140-3Draft2.pdf
· * fips1402annexa.pdf
· * fips1402annexd.pdf
· * fips1402annexb.pdf
· * CommentsFIPS140-3_draft1.pdf
· * day2_mar24_fips-140-quo-vadis_nist-csd.pdf
· * day1_research_100-150.pdf
· * day1_research_100-150.pdf
· * physecpre01.pdf
· * Jean_Campbell-FIPS_140-3_-_Looking_over_the_horizon(3).pdf
· * physecpre02.pdf
· * physecpre17.pdf
· * physecpre04.pdf
· * CMVP2603.pdf
· * noninvasive-attack-testing_cscace-hsakane.pdf
· * noninvasive-attack-testing_cscace-hsakane.pdf
· * physecpre09.pdf
· * physecpre05.pdf
· * CMVP 140-3 MM Comments Template.docx
· * fips140_2_chng2_20021203.epub
· * physecpre10.ppt
· * physecpre10.ppt
· * physecpre06.ppt
· * physecpre16.ppt
· * physecpre03.ppt
· * physecpre18.ppt
· * physecpre07.ppt
· * physecpre11.ppt
· * physecpre17.ppt
· * physecpre08.ppt
· * physecpre12.ppt
· * physecpre15.ppt
· * physecpre14.ppt
· * physecpre15.ppt
· * physecpre14.ppt
· * physecpre13.ppt
* [FIPS 196]+2 – Entity Authentication Using Public Key Cryptography
* [IR 7313]+1 – 5th Annual PKI R&D Workshop “Making PKI Easy to Use” Proceedings
* [IR 7452]+2 – Secure Biometric Match-on-Card Feasibility Report
* [SP 800-116]+12 – A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
* [SP 800-15]+7 – Minimum Interoperability Specification for PKI Components (MISPC), Version 1
* [SP 800-25]+5 – Federal Agency Use of Public Key Technology for Digital Signatures and Authentication
* [SP 800-32]+4 – Introduction to Public Key Technology and the Federal PKI Infrastructure
* [SP 800-57]+46 – Recommendation on Key Management
· * NIST SP 800-057 Part 3r1 Recommendation for Key Management, Part 3; Application-Specific Key Management Guidance, 2015-01-22 (Final).pdf
· * NIST SP 800-057 Part 2 Recommendation for Key Management, Part 2; Best Practices for Key Management Organization, 2005-08-25 (Final).pdf
· * NIST SP 800-057 Recommendation for Key Management, Part 1; 2005-08 (updated March 9, 2007).pdf
· * NIST SP 800-057 Recommendation for Key Management, Part 2; 2005-08 (updated March 9, 2007).pdf
· * NIST SP 800-057 Recommendation for Key Management; Part 3 Key Management, 2007-03.pdf
· * NIST SP 800-057 Part 2r1 Recommendation for Key Management, Part 2; Best Practices for Key Management Organizations (2nd Draft), 2018-11-20 (Draft).pdf
· * NIST SP 800-057pt1r4_commentsreceived.pdf
· * alt-SP800-57part1rev4.pdf
· * alt-SP800-57part1rev3_general.pdf
· * NIST SP 800-057-pt2-draft-comments-received-apr2005.pdf
· * alt-SP800-57part3rev1.pdf
· * alt-SP800-57part2.pdf
· * sp800-57pt1r4_comments_received.pdf
· * nistspecialpublication800-57p1r3.pdf
· * nistspecialpublication800-57p1r2006.pdf
· * nistspecialpublication800-57p1r2007.pdf
· * nist.sp.800-57pt3r1.pdf
· * NIST.SP.800-57pt2r1.pdf
· * NIST.SP.800-57Pt3r1.pdf
· * sp800-57-Part1-revised2_Mar08-2007.pdf
· * nistspecialpublication800-57p2.pdf
· * NIST.SP.800-57pt1r5.pdf
· * nist.sp.800-57pt1r5.pdf
· * nistspecialpublication800-57p3.pdf
· * nistspecialpublication800-57p1.pdf
· * sp800-57_part1_rev3_general.pdf
· * NIST.SP.800-57pt1r5-draft.pdf
· * SP800-57-Part2.pdf
· * sp800-57pt1r4_comments_received.pdf
· * sp800-57pt1r4_draft_track_changes_from_rev3_to_rev4.pdf
· * sp800-57p1r4_draft.pdf
· * sp800-57-pt2-draft-comments-received-apr2005.pdf
· * sp800_57_pt3_r1_draft.pdf
· * SP80057TranPlan.pdf
· * SP80057TranPlan.pdf
· * sp800_57_pt3_r1_draft.pdf
· * CommentsSP800-57-1.pdf
· * Draft_SP800-57-Part1-Rev3_May2011.pdf
· * sp800-57-pt1-draft-apr2005-comments.pdf
· * sp800-57-pt1-draft-apr2005.pdf
· * sp800-57pt2-r1-draft.pdf
· * sp800-57pt2-r1-draft.pdf
· * sp800-57pt2-r1-draft2.pdf
· * sp800-57-pt1-draft-Jan2003.pdf
· * sp800-57-pt1-draft-Jan2003-comments.pdf
· * CommentsSP800-57Part2.pdf
* [SP 800-63r1]+42 – Electronic Authentication Guideline
* [SP 800-73]+44 – Interfaces for Personal Identity Verification
* [SP 800-76]+16 – Biometric Data Specification for Personal Identity Verification
* [SP 800-78]+20 – Cryptographic Algorithms and Key Sizes for Personal Identity Verification
* [SP 800-89]+2 – Recommendation for Obtaining Assurances for Digital Signature Applications
+ PLANNING
* [April 1999]+2 – Guide for Developing Security Plans for Information Technology Systems – ITL Security Bulletin
* [April 2007]+1 – Securing Wireless Networks – ITL Bulletin
* [August 2005]+9 – Implementation Of FIPS 201, Personal Identity Verification (PIV) Of Federal Employees And Contractors
* [December 2002]+28 – Security of Public Web Servers – ITL Security Bulletin
* [December 2005]+17 – Preventing And Handling Malware Incidents: How To Protect Information Technology Systems From Malicious Code And Software
* [FIPS 140]+285 – Security Requirements for Cryptographic Modules
· * NIST SB 2001-07 A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2.pdf
· * NIST SP 800-029 A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2, 2001-06.pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex A, 2001-05.pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex D, 2001-05.pdf
· * NIST FIPS 140-2 Security requirements for Cryptographic Modules, Annex D; Approved Key Establishment Techniques, 2001-03 (2009 Minor Edits).pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex B; Approved Protection Profiles, 2001-03 (2009 Minor Edits).pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex A; Approved Security Functions, 2001-03 (2009 Minor Edits) .pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex C; Approved Random Number Generators, 2001-03 (2009 Minor Edits).pdf
· * NIST FIPS 140-2 Security Reqs for Cryptographic Modules, 2001-03.pdf
· * NIST FIPS 140-2 Implementation Guidance for FIPS PUB 140-2 and the CMVP, 2010-08-03.pdf
· * NIST SB 1995-08 FIPS 140-1; A Framework for Cryptographic Standards.txt
· * fips140-3-final-draft-2007-comments-resolutions.pdf
· * FIPS_140-3 Final_Draft_2007.pdf
· * fips140_2_chng2_20021203.epub
· * fips140_2_chng2_20021203.epub
· * NewFIPS1402LogoForm.pdf
· * FIPS1402LogoForm.pdf
· * FIPS1403LogoForm.pdf
· * fips140-3-sections-submitted-for-comments.pdf
· * FIPS140ConsolidatedCertApr2017.pdf
· * FIPS140ConsolidatedCertMar2017.pdf
· * fips140consolidatedcertlist0034.pdf
· * FIPS1402DTR.pdf
· * FIPS140ConsolidatedCertJan2018.pdf
· * FIPS140ConsolidatedCertOct2017.pdf
· * FIPS140ConsolidatedCertAug2018.pdf
· * fips140consolidatedcertlist0053.pdf
· * FIPS140ConsolidatedCertList0008.pdf
· * FIPS 140-3 IG.pdf
· * FIPS140ConsolidatedCertSept2016.pdf
· * FIPS140ConsolidatedCertList0034.pdf
· * FIPS140ConsolidatedCertList0054.pdf
· * fips140consolidatedcertlist0042.pdf
· * FIPS140ConsolidatedCertList0052.pdf
· * FIPS1402LogoForm.pdf
· * FIPS140ConsolidatedCertApril2016.pdf
· * FIPS140ConsolidatedCertList0041.pdf
· * FIPS140ConsolidatedCertList0048.pdf
· * FIPS140ConsolidatedCertList0028.pdf
· * FIPS140ConsolidatedCertOct2018.pdf
· * FIPS140ConsolidatedCertNov2019.pdf
· * FIPS140ConsolidatedCertMarch2016.pdf
· * FIPS140ConsolidatedCertList0026.pdf
· * FIPS140ConsolidatedCertMay2016.pdf
· * FIPS140ConsolidatedCertList0057.pdf
· * FIPS140ConsolidatedCertList0035.pdf
· * FIPS1401LogoForm.pdf
· * fips140consolidatedcertlist0046.pdf
· * FIPS140ConsolidatedCertList0024.pdf
· * FIPS140ConsolidatedCertList0049.pdf
· * FIPS 140-3 IG.pdf
· * FIPS140ConsolidatedCertSept2017.pdf
· * FIPS140ConsolidatedCertOct2015.pdf
· * FIPS140ConsolidatedCertJuly2016.pdf
· * fips140consolidatedcertoct2016.pdf
· * FIPS-140-2-CMVP Management Manual 09-09-2021.pdf
· * fips140consolidatedcertdec2015.pdf
· * fips1402logoform.pdf
· * FIPS140ConsolidatedCertJan2017.pdf
· * fips140consolidatedcertlist0038.pdf
· * FIPS_140-3_sections_submitted_for_comments.pdf
· * FIPS140ConsolidatedCertDec2015.pdf
· * FIPS140ConsolidatedCertList0046.pdf
· * FIPS140ConsolidatedCertList0053.pdf
· * FIPS140ConsolidatedCertFeb2016.pdf
· * fips140consolidatedcertjune2016.pdf
· * NIST and ISO End User License Agreement.pdf
· * FIPS140ConsolidatedCertJune2017.pdf
· * FIPS140ConsolidatedCertDec2016.pdf
· * fips140consolidatedcertlist0026.pdf
· * FIPS140ConsolidatedCertList0042.pdf
· * FIPS140ConsolidatedCertJuly2017.pdf
· * FIPS140ConsolidatedCertNov2016.pdf
· * nist and iso end user license agreement.pdf
· * fips140consolidatedcertsept2017.pdf
· * fips140consolidatedcertmarch2016.pdf
· * fips140consolidatedcertsept2016.pdf
· * FIPS140ConsolidatedCertList0023.pdf
· * FIPS140ConsolidatedCertList0011.pdf
· * FIPS140ConsolidatedCertList0038.pdf
· * FIPS1402IG.pdf
· * FIPS140ConsolidatedCertList0045.pdf
· * FIPS140ConsolidatedCertOct2016.pdf
· * FIPS140ConsolidatedCertJune2016.pdf
· * FIPS140ConsolidatedCertList0020.pdf
· * FIPS140ConsolidatedCertList0032.pdf
· * fips140consolidatedcertmay2017.pdf
· * FIPS140ConsolidatedCertAug2016.pdf
· * FIPS140ConsolidatedCertNov2017.pdf
· * FIPS140ConsolidatedCertMay2017.pdf
· * FIPS140-2-ConsolidatedMarch2018.pdf
· * FIPS140ConsolidatedCertDec2017.pdf
· * fips140consolidatedcertlist0057.pdf
· * FIPS1403SoftSecWork.pdf
· * FIPS140ConsolidatedCertList0050.pdf
· * fips1402ig.pdf
· * fips140consolidatedcertlist0045.pdf
· * FIPS1402IG.pdf
· * fips-140-2-cmvp management manual 09-09-2021.pdf
· * FIPS140ConsolidatedCertJan2016.pdf
· * fips140consolidatedcertlist0011.pdf
· * fips140consolidatedcertmay2016.pdf
· * fips140consolidatedcertnov2019.pdf
· * FIPS140ConsolidatedCertFeb2017.pdf
· * FIPS_140-3_sections_submitted_for_comments.pdf
· * Draft FIPS-140-3-CMVP Management Manual v1.1 07-13-2022.pdf
· * Draft FIPS-140-3-CMVP Management Manual 09-18-2020.pdf
· * fips1402.pdf
· * fips1401.pdf
· * physecpre18.pdf
· * CMVP2604.pdf
· * CMVP2606.pdf
· * FIPS140ConsolidatedCertApr2017.pdf
· * day2_mar24_fips-140-quo-vadis_nist-csd.pdf
· * FIPS140ConsolidatedCertMar2017.pdf
· * fips140consolidatedcertapr2017.pdf
· * physecpaper13.pdf
· * physecpaper12.pdf
· * physecpaper10.pdf
· * physecpaper11.pdf
· * physecpaper16.pdf
· * physecpaper14.pdf
· * physecpaper14.pdf
· * physecpaper17.pdf
· * physecpaper18.pdf
· * physecpaper19.pdf
· * physecpaper12.pdf
· * FIPS140ConsolidatedCertList0032.pdf
· * FIPS140ConsolidatedCertList0040.pdf
· * FIPS140ConsolidatedCertList0031.pdf
· * FIPS140ConsolidatedCertList0034.pdf
· * physecpaper08.pdf
· * FIPS140ConsolidatedCertList0037.pdf
· * fips140consolidatedcertlist0017.pdf
· * FIPS140ConsolidatedCertList0009.pdf
· * physecpaper06.pdf
· * physecpaper09.pdf
· * FIPS140ConsolidatedCertList0035.pdf
· * FIPS140ConsolidatedCertList0015.pdf
· * FIPS140ConsolidatedCertList0051.pdf
· * FIPS140ConsolidatedCertJune2016.pdf
· * physecpaper07.pdf
· * fips140consolidatedcertlist0019.pdf
· * fips1401ig.pdf
· * FIPS140ConsolidatedCertList0013.pdf
· * FIPS140ConsolidatedCertList0007.pdf
· * FIPS140ConsolidatedCertList0023.pdf
· * FIPS140ConsolidatedCertNov2015.pdf
· * FIPS1402DTR.pdf
· * Jan12-2005-FR-FIPS1403-Notice.pdf
· * FIPS140ConsolidatedCertList0003.pdf
· * FIPS140ConsolidatedCertList0042.pdf
· * FIPS140ConsolidatedCertList0002.pdf
· * FIPS140ConsolidatedCertSept2016.pdf
· * physecpaper08.pdf
· * FIPS140ConsolidatedCertMay2016.pdf
· * FIPS140ConsolidatedCertMay2017.pdf
· * fips1402ig.pdf
· * 1401testA.pdf
· * FIPS140ConsolidatedCertList0030.pdf
· * FIPS140ConsolidatedCertList0036.pdf
· * FIPS140ConsolidatedCertList0017.pdf
· * fips140consolidatedcertmay2016.pdf
· * FIPS140ConsolidatedCertList0038.pdf
· * FIPS140ConsolidatedCertList0004.pdf
· * FIPS140ConsolidatedCertDec2015.pdf
· * FIPS140ConsolidatedCertList0014.pdf
· * FIPS140ConsolidatedCertList0012.pdf
· * FIPS140ConsolidatedCertList0010.pdf
· * FIPS140ConsolidatedCertList0029.pdf
· * FIPS140ConsolidatedCertList0001.pdf
· * fips140consolidatedcertaug2016.pdf
· * FIPS140ConsolidatedCertList0021.pdf
· * FIPS140ConsolidatedCertList0048.pdf
· * frn-2015-19743-comments-received.pdf
· * FIPS140ConsolidatedCertList0006.pdf
· * FIPS140ConsolidatedCertMarch2016.pdf
· * ispab-ltr-to-NIST-on-FIPS_140-2-ISO_20160420.pdf
· * FIPS140ConsolidatedCertList0033.pdf
· * FIPS140ConsolidatedCertList0008.pdf
· * physecpaper03.pdf
· * FIPS140ConsolidatedCertJuly2016.pdf
· * fips140consolidatedcertmay2017.pdf
· * fips140-3_non-invasive2.pdf
· * FIPS140ConsolidatedCertList0046.pdf
· * physecpaper03.pdf
· * FIPS140ConsolidatedCertList0020.pdf
· * FIPS140ConsolidatedCertList0055.pdf
· * FIPS140ConsolidatedCertList0024.pdf
· * fips140consolidatedcertnov2015.pdf
· * 1401test.pdf
· * FIPS140ConsolidatedCertList0005.pdf
· * ispab-ltr-to-NIST-on-FIPS_140-2-ISO_20160420.pdf
· * FIPS140ConsolidatedCertList0027.pdf
· * FIPS140ConsolidatedCertApril2016.pdf
· * FIPS140ConsolidatedCertOct2015.pdf
· * fips1402DTR.pdf
· * FIPS140ConsolidatedCertFeb2017.pdf
· * FIPS140ConsolidatedCertList0044.pdf
· * FIPS140ConsolidatedCertList0054.pdf
· * physecpaper05.pdf
· * FIPS140ConsolidatedCertAug2017.pdf
· * physecpaper02.pdf
· * FIPS1402IG.pdf
· * FIPS140ConsolidatedCertList0041.pdf
· * FIPS140ConsolidatedCertList0019.pdf
· * 140-2flow.pdf
· * FIPS140ConsolidatedCertList0053.pdf
· * FIPS140ConsolidatedCertList0045.pdf
· * FIPS140ConsolidatedCertList0049.pdf
· * fips140-3_non-invasive1.pdf
· * fips140consolidatedcertlist0024.pdf
· * FIPS140ConsolidatedCertList0039.pdf
· * physecpaper04.pdf
· * FIPS140ConsolidatedCertJune2017.pdf
· * physecpaper01.pdf
· * FIPS140ConsolidatedCertJuly2017.pdf
· * FIPS140ConsolidatedCertOct2016.pdf
· * FIPS140ConsolidatedCertList0026.pdf
· * fips140consolidatedcertdec2016.pdf
· * fips140consolidatedcertlist0042.pdf
· * FIPS140ConsolidatedCertJan2016.pdf
· * FIPS140ConsolidatedCertFeb2016.pdf
· * fips140consolidatedcertjan2017.pdf
· * FIPS140ConsolidatedCertList0052.pdf
· * FIPS140ConsolidatedCertList0047.pdf
· * FIPS140ConsolidatedCertJan2017.pdf
· * FIPS1401IG.pdf
· * FIPS140ConsolidatedCertList0056.pdf
· * FIPS140ConsolidatedCertList0028.pdf
· * FIPS140ConsolidatedCertList0018.pdf
· * fips-140_response.pdf
· * FIPS140ConsolidatedCertList0025.pdf
· * ispab-ltr-to-nist-on-fips_140-2-iso_20160420.pdf
· * FIPS140ConsolidatedCertList0022.pdf
· * FIPS140ConsolidatedCertList0050.pdf
· * FIPS140ConsolidatedCertList0016.pdf
· * FIPS140ConsolidatedCertList0011.pdf
· * FIPS140ConsolidatedCertDec2016.pdf
· * FIPS140ConsolidatedCertNov2016.pdf
· * FIPS140ConsolidatedCertList0043.pdf
· * FIPS140ConsolidatedCertList0057.pdf
· * FIPS140ConsolidatedCertAug2016.pdf
· * fips140-3-draft-2009.pdf
· * fips1403Draft.pdf
· * revised-draft-fips140-3_PDF-zip_document-annexA-to-annexG.zip
· * fips140-3-draft-2009-comments-resolutions.pdf
· * fips1403draft.pdf
· * fips1402annexc.pdf
· * PublicComments_FIPS140-3Draft2.pdf
· * fips1402annexa.pdf
· * fips1402annexd.pdf
· * fips1402annexb.pdf
· * CommentsFIPS140-3_draft1.pdf
· * day2_mar24_fips-140-quo-vadis_nist-csd.pdf
· * day1_research_100-150.pdf
· * day1_research_100-150.pdf
· * physecpre01.pdf
· * Jean_Campbell-FIPS_140-3_-_Looking_over_the_horizon(3).pdf
· * physecpre02.pdf
· * physecpre17.pdf
· * physecpre04.pdf
· * CMVP2603.pdf
· * noninvasive-attack-testing_cscace-hsakane.pdf
· * noninvasive-attack-testing_cscace-hsakane.pdf
· * physecpre09.pdf
· * physecpre05.pdf
· * CMVP 140-3 MM Comments Template.docx
· * fips140_2_chng2_20021203.epub
· * physecpre10.ppt
· * physecpre10.ppt
· * physecpre06.ppt
· * physecpre16.ppt
· * physecpre03.ppt
· * physecpre18.ppt
· * physecpre07.ppt
· * physecpre11.ppt
· * physecpre17.ppt
· * physecpre08.ppt
· * physecpre12.ppt
· * physecpre15.ppt
· * physecpre14.ppt
· * physecpre15.ppt
· * physecpre14.ppt
· * physecpre13.ppt
* [FIPS 188]+5 – Standard Security Labels for Information Transfer
* [FIPS 191]+1 – Guideline for The Analysis of Local Area Network Security
* [FIPS 199]+7 – Standards for Security Categorization of Federal Information and Information Systems
* [FIPS 200]+2 – Minimum Security Requirements for Federal Information and Information Systems
* [FIPS 201]+374 – Personal Identity Verification for Federal Employees and Contractors
* [February 2000]+14 – Guideline for Implementing Cryptography in the Federal Government – ITL Bulletin
* [February 2002]+2 – Risk Management Guidance For Information Technology Systems – ITL Bulletin
* [February 2003]+1 – Secure Interconnections for Information Technology Systems – ITL Bulletin
* [February 2006]+5 – Creating A Program To Manage Security Patches And Vulnerabilities: NIST Recommendations For Improving System Security – ITL Bulletin
* [February 2007]+13 – Intrusion Detection And Prevention Systems – ITL Bulletin
* [January 2002]+7 – Guidelines on Firewalls and Firewall Policy – ITL Security Bulletin
* [January 2005]+11 – Integrating It Security Into The Capital Planning And Investment Control Process – ITL Bulletin
· * NIST SP 800-065 Integrating Security into the Capital Planning and Investment Control Process, 2005-01.pdf
· * NIST SP 800-058 Security Considerations for Voice Over IP Systems, 2005-01-01 (Final).pdf
· * alt-SP800-53-rev3-final_updated-errata_05-01-2010.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r2 to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r3FPD to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 2 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 1 (Errata), 2010-05-01.pdf
· * NIST SP 800-058 Security Considerations for Voice Over IP Systems, 2005-01.pdf
· * itlbul2005-01.pdf
* [January 2006]+3 – Testing And Validation Of Personal Identity Verification (PIV) Components And Subsystems For Conformance To Federal Information Processing Standard 201
* [July 2002]+4 – Overview: The Government Smart Card Interoperability Specification
* [July 2004] – Guide For Mapping Types Of Information And Information Systems To Security Categories – ITL Bulletin
* [July 2005]+2 – Protecting Sensitive Information That Is Transmitted Across Networks: NIST Guidance For Selecting And Using Transport Layer Security Implementations – ITL Security Bulletin
* [July 2007]+5 – Border Gateway Protocol Security – ITL Security Bulletin
* [June 2005]+16 – NIST’s Security Configuration Checklists Program For IT Products – ITL Bulletin
* [June 2006]+18 – Domain Name System (DNS) Services: NIST Recommendations For Secure Deployment – ITL Bulletin
* [March 2004]+13 – Federal Information Processing Standard (FIPS) 199, Standards For Security Categorization Of Federal Information And Information Systems – ITL Bulletin
* [March 2006]+19 – Minimum Security Requirements For Federal Information And Information Systems: Federal Information Processing Standard (FIPS) 200 Approved By The Secretary Of Commerce – ITL Security Bulletin
* [May 2004]+4 – Guide For The Security Certification And Accreditation Of Federal Information Systems – ITL Bulletin
* [May 2005] – Recommended Security Controls For Federal Information Systems: Guidance For Selecting Cost-Effective Controls Using A Risk-Based Process – ITL Bulletin
* [May 2006]+8 – An Update On Cryptographic Standards, Guidelines, And Testing Requirements – ITL Bulletin
* [May 2007]+3 – Securing Radio Frequency Identification (RFID) Systems – ITL Security Bulletin
* [IR 6462]+3 – CSPP - Guidance for COTS Security Protection Profiles
* [IR 6887]+2 – Government Smart Card Interoperability Specification (GSC-IS), v2.1
* [IR 6981]+2 – Policy Expression and Enforcement for Handheld Devices
* [IR 6985]+2 – COTS Security Protection Profile - Operating Systems (CSPP-OS) (Worked Example Applying Guidance of NISTIR-6462, CSPP)
* [IR 7284]+2 – Personal Identity Verification Card Management Report
* [IR 7316]+3 – Assessment of Access Control Systems
* [IR 7358]+4 – Program Review for Information Security Management Assistance (PRISMA)
* [IR 7359]+3 – Information Security Guide For Government Executives
* [November 2004]+5 – Understanding the New NIST Standards and Guidelines Required by FISMA: How Three Mandated Documents are Changing the Dynamic of Information Security for the Federal Government – ITL Security Bulletin
* [November 2005]+2 – Securing Microsoft Windows XP Systems: NIST Recommendations For Using A Security Configuration Checklist – ITL Security Bulletin
* [November 2006]+2 – Guide To Securing Computers Using Windows XP Home Edition – ITL Bulletin
* [October 2008]+9 – Keeping Information Technology (IT) System Servers Secure: A General Guide To Good Practices
* [SP 800-100]+1 – Information Security Handbook: A Guide for Managers
* [SP 800-101]+5 – Guidelines on Cell Phone Forensics
* [SP 800-113]+2 – Guide to SSL VPNs
* [SP 800-116]+12 – A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
* [SP 800-12]+23 – An Introduction to Computer Security: The NIST Handbook
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, 1995-10.pdf
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 2, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 1, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 5, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 4, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 3, 1995-10.ps
· * derived-piv-nist-sp1800-12b-v2.pdf
· * derived-piv-nist-sp1800-12a-v2.pdf
· * derived-piv-nist-sp1800-12c-v2.pdf
· * derived-piv-nist-sp1800-12-v2.pdf
· * derived-piv-nist-sp1800-12-draft.pdf
· * derived-piv-nist-sp1800-12c-draft.pdf
· * derived-piv-nist-sp1800-12a-draft.pdf
· * derived-piv-nist-sp1800-12b-draft.pdf
· * NIST.SP.800-12r1.pdf
· * NIST.SP.1800-12.pdf
· * nistspecialpublication800-12.pdf
· * 800-12_4.ps
· * 800-12_5.ps
· * 800-12_1.ps
· * 800-12_2.ps
· * 800-12_3.ps
· * sp800_12_r1_draft.pdf
* [SP 800-121]+15 – Guide to Bluetooth Security
* [SP 800-123]+7 – Guide to General Server Security
* [SP 800-14]+8 – Generally Accepted Principles and Practices for Securing Information Technology Systems
* [SP 800-18r1]+11 – Guide for Developing Security Plans for Information Systems
* [SP 800-19]+4 – Mobile Agent Security
* [SP 800-21r2]+5 – Guideline for Implementing Cryptography in the Federal Government
* [SP 800-25]+5 – Federal Agency Use of Public Key Technology for Digital Signatures and Authentication
* [SP 800-27rA]+2 – Engineering Principles for Information Technology Security (A Baseline for Achieving Security)
* [SP 800-30]+12 – Risk Management Guide for Information Technology Systems
* [SP 800-31]+1 – Intrusion Detection Systems (IDS)
* [SP 800-32]+4 – Introduction to Public Key Technology and the Federal PKI Infrastructure
* [SP 800-33]+1 – Underlying Technical Models for Information Technology Security
* [SP 800-34]+22 – Contingency Planning Guide for Information Technology Systems
* [SP 800-35]+1 – Guide to Information Technology Security Services
* [SP 800-36]+1 – Guide to Selecting Information Technology Security Products
* [SP 800-37]+39 – Guide for Security Certification and Accreditation of Federal Information Systems
* [SP 800-40 Ver. 2]+11 – Creating a Patch and Vulnerability Management Program
* [SP 800-41]+5 – Guidelines on Firewalls and Firewall Policy
* [SP 800-43]+1 – Systems Administration Guidance for Securing Microsoft Windows 2000 Professional System
* [SP 800-44]+3 – Guidelines on Securing Public Web Servers
* [SP 800-45]+3 – Guidelines on Electronic Mail Security
* [SP 800-47]+4 – Security Guide for Interconnecting Information Technology Systems
* [SP 800-48]+4 – Guide to Securing Legacy IEEE 802.11 Wireless Networks
* [SP 800-48r1]+4 – Guide to Securing Legacy IEEE 802.11 Wireless Networks
* [SP 800-53 Rev]+235 – Recommended Security Controls for Federal Information Systems and Organizations
· * NIST SP 800-053Ar4 Assessing Security and Privacy Controls in Federal Information Systems and Organizations; Building Effective Assessment Plans, 2014-12-18 (Final).pdf
· * NIST SP 800-053r2 Recommended Security Controls for Fed Info Systems, 2007-12 (final).pdf
· * alt-SP800-53-rev3-final_updated-errata_05-01-2010.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r2 to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r3FPD to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 2 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 1 (Errata), 2010-05-01.pdf
· * NIST SP 800-053Ar1 Guide for Assessing the Security Controls in Federal Information Systems and Organizations, 2010-06-29.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2013-05-07.pdf
· * NIST SP 800-053r5 Security and Privacy Controls for Information Systems and Organizations, 2017-08-15 (Draft).pdf
· * NIST SP 800-053r4_final_word_errata_01_22_2015.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations Controls (Errata), 2014-01-15.xml
· * NIST SP 800-053A Guide for Assessing the Security Controls in Fed Info Systems, 2008-06.pdf
· * NIST SP 800-053r5-draft-controls-markup.pdf
· * alt-SP800-53r4.pdf
· * alt-SP800-53Ar4.pdf
· * alt-SP800-53.pdf
· * alt-SP800-53r5-draft.pdf
· * NIST SP 800-053r5-draft-baselines-markup.pdf
· * NIST SP 800-053-controls.xml
· * NIST SP 800-053a_r4_errata_12_18_2014.docx
· * sp800-53A-rev1-final.pdf
· * 800-53-rev1-final-clean-sz.pdf
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53r4_summary.pdf
· * NIST.SP.800-53r4.pdf
· * nist.sp.800-53ar4.pdf
· * NIST.SP.800-53Ar4.pdf
· * nist.sp.800-53r4.pdf
· * nistspecialpublication800-53r3.pdf
· * nistspecialpublication800-53r2.pdf
· * nistspecialpublication800-53r1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53a.pdf
· * nistspecialpublication800-53a.pdf
· * NIST.SP.800-53r5.pdf
· * nistspecialpublication800-53.pdf
· * nist.sp.800-53r5.pdf
· * NIST.SP.800-53Ar5.pdf
· * NIST.SP.800-53B.pdf
· * 800-53-rev1-annex3-sz.pdf
· * 800-53-rev1-annex2-sz.pdf
· * 800-53-rev1-annex1-sz.pdf
· * NIST.SP.800-53r5-draft.pdf
· * nist.sp.800-53r5-draft.pdf
· * NIST.SP.800-53Ar5-draft.pdf
· * NIST.SP.800-53B-draft.pdf
· * sp800_53a_r4_errata_12_18_2014.docx
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * DOJ_CSAM_Planning_for_Implementing_SP-800-53_Rev5_FINAL.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * apply-sp-800-53-ics-final-22aug06.pdf
· * NIST_SP_800-53_Comment_Site_User_Guide_FINAL_8Sept2021.pdf
· * ics-in-sp800-53_final_21mar07.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * ics-in-sp800-53_final_21Mar07.pdf
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53-collaboration-index-template.docx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53-collaboration-index-template.xlsx
· * sp800-53r5-control-catalog.xlsx
· * sp800-53-collaboration-index-template.docx
· * sp800-53-collaboration-index-template.xlsx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-control-catalog.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * OLIR_review_800-213A_to_800-53_rev5_final.xlsx
· * Federal_Cybersecurity_Privacy_Forum_2Dec2021_NIST_SP800-53update.pdf
· * Federal_Cybersecurity_and_Privacy_Forum_15Feb2022_What_Is_New_SP800-53ARevision5.pdf
· * Federal_Cybersecurity_Privacy_Professionals_Forum_2Dec2021_FedRAMP_NIST800-53_Rev5.pdf
· * cybersecurity-innovation-forum_01-28-2014.pdf
· * ePACS Overlay_v1_SP800-53rev5-April2021.pdf
· * FPKI Overlay-v1-SP800-53rev5-April2021.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * 2.4 - Main - DOJ Adopting OSCAL to Deliver Lastest NIST SP 800-53 Controls.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * sp800-53-rev4-ipd.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * RMF 2.0 Deep Dive 5-15-18 v3 - Kelley Dempsey Naomi Lefkovitz.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * update-draft-800-53r5-v2.pdf
· * sp800_53_r4_appendix_g_markup_draft2.pdf
· * sp800_53a_r4_draft.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_f_markup_draft2.pdf
· * sp800-53-rev4-ipd.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_d_markup_draft2.pdf
· * sp800-53r5-draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * sp800-53r5-draft-fpd-summary-of-significant-changes.pdf
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * sp800-53r5-draft-fpd-faq.pdf
· * Day_1_AM2_SCRM_Controls_Jon_Boyens.pdf
· * sp800-53r5-draft.pdf
· * 800-53-for-ICS_KEMA.pdf
· * 800-53-Rev4_announcement.pdf
· * 1.5 - Main - SP800-53 Empowered by OSCAL_28Feb2022.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * appxi_800-53-rev1-augmented_15may07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP_800-53B_derived-OSCAL.pdf
· * sp_800-53_v5_1-derived-oscal.pdf
· * SP_800-53_v5_1-derived-OSCAL.pdf
· * sp800_53a_r4_draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft.pdf
· * 800-53-for-ICS_KEMA.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * sp800-53r5-fpd-controls.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * 800-53 automation workflow.pdf
· * 800-53-rev4-controls.csv
· * 800-53-rev4-controls.xml
· * 800-53-rev3-controls.xml
· * 800-53-rev3-controls.csv
· * SP800-177-Rev-1-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_LOW-baseline_profile_load.csv
· * NIST_SP-800-53_rev5-derived-OSCAL.xlsx
· * SP800-161-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_PRIVACY-baseline_profile_load.csv
· * NIST_SP-800-53_rev5_MODERATE-baseline_profile_load.csv
· * SP800-82-Rev-2-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_catalog_load.csv
· * NIST_SP-800-53_rev5_HIGH-baseline_profile_load.csv
· * sp800-53r5-draft-fpd-comparison-with-rev4.xlsx
· * stig-mapping-to-nist-800-53.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-draft-fpd-comment-template.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53ar5-draft-comment-template.xlsx
· * sp800-53ar5-draft-comment-template.xlsx
· * 800-53a-rev4-objectives.csv
· * 800-53a-rev4-objectives.xml
· * 800-53A-rev3-objectives.xml
· * SP800-53-control-comment-template.xlsx
· * WIP_800_53_Rev_5_to_Framework_v_1_1.xlsx
· * sp80053-focal-elements.csv
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * sp80053-focal-details.csv
· * SP_800-53_v5_1_XML.xml
· * NIST_SP-800-53B-derived-OSCAL.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * NIST SP 800-53B-Jan2022.xlsx
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * 800_53_rev_4_focal_document_template.xlsx
· * 800_53_Rev_4_Focal_Document_Template.xlsx
· * WIP_Framework_v_1_1_to_800_53_Rev5.xlsx
· * WIP_800_53_Rev_4_to_Framework_v_1_1.xlsx
· * sp800-53B-draft-comment-template.xlsx
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
* [SP 800-53r3]+235 – Recommended Security Controls for Federal Information Systems and Organizations
· * NIST SP 800-053Ar4 Assessing Security and Privacy Controls in Federal Information Systems and Organizations; Building Effective Assessment Plans, 2014-12-18 (Final).pdf
· * NIST SP 800-053r2 Recommended Security Controls for Fed Info Systems, 2007-12 (final).pdf
· * alt-SP800-53-rev3-final_updated-errata_05-01-2010.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r2 to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r3FPD to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 2 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 1 (Errata), 2010-05-01.pdf
· * NIST SP 800-053Ar1 Guide for Assessing the Security Controls in Federal Information Systems and Organizations, 2010-06-29.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2013-05-07.pdf
· * NIST SP 800-053r5 Security and Privacy Controls for Information Systems and Organizations, 2017-08-15 (Draft).pdf
· * NIST SP 800-053r4_final_word_errata_01_22_2015.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations Controls (Errata), 2014-01-15.xml
· * NIST SP 800-053A Guide for Assessing the Security Controls in Fed Info Systems, 2008-06.pdf
· * NIST SP 800-053r5-draft-controls-markup.pdf
· * alt-SP800-53r4.pdf
· * alt-SP800-53Ar4.pdf
· * alt-SP800-53.pdf
· * alt-SP800-53r5-draft.pdf
· * NIST SP 800-053r5-draft-baselines-markup.pdf
· * NIST SP 800-053-controls.xml
· * NIST SP 800-053a_r4_errata_12_18_2014.docx
· * sp800-53A-rev1-final.pdf
· * 800-53-rev1-final-clean-sz.pdf
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53r4_summary.pdf
· * NIST.SP.800-53r4.pdf
· * nist.sp.800-53ar4.pdf
· * NIST.SP.800-53Ar4.pdf
· * nist.sp.800-53r4.pdf
· * nistspecialpublication800-53r3.pdf
· * nistspecialpublication800-53r2.pdf
· * nistspecialpublication800-53r1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53a.pdf
· * nistspecialpublication800-53a.pdf
· * NIST.SP.800-53r5.pdf
· * nistspecialpublication800-53.pdf
· * nist.sp.800-53r5.pdf
· * NIST.SP.800-53Ar5.pdf
· * NIST.SP.800-53B.pdf
· * 800-53-rev1-annex3-sz.pdf
· * 800-53-rev1-annex2-sz.pdf
· * 800-53-rev1-annex1-sz.pdf
· * NIST.SP.800-53r5-draft.pdf
· * nist.sp.800-53r5-draft.pdf
· * NIST.SP.800-53Ar5-draft.pdf
· * NIST.SP.800-53B-draft.pdf
· * sp800_53a_r4_errata_12_18_2014.docx
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * DOJ_CSAM_Planning_for_Implementing_SP-800-53_Rev5_FINAL.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * apply-sp-800-53-ics-final-22aug06.pdf
· * NIST_SP_800-53_Comment_Site_User_Guide_FINAL_8Sept2021.pdf
· * ics-in-sp800-53_final_21mar07.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * ics-in-sp800-53_final_21Mar07.pdf
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53-collaboration-index-template.docx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53-collaboration-index-template.xlsx
· * sp800-53r5-control-catalog.xlsx
· * sp800-53-collaboration-index-template.docx
· * sp800-53-collaboration-index-template.xlsx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-control-catalog.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * OLIR_review_800-213A_to_800-53_rev5_final.xlsx
· * Federal_Cybersecurity_Privacy_Forum_2Dec2021_NIST_SP800-53update.pdf
· * Federal_Cybersecurity_and_Privacy_Forum_15Feb2022_What_Is_New_SP800-53ARevision5.pdf
· * Federal_Cybersecurity_Privacy_Professionals_Forum_2Dec2021_FedRAMP_NIST800-53_Rev5.pdf
· * cybersecurity-innovation-forum_01-28-2014.pdf
· * ePACS Overlay_v1_SP800-53rev5-April2021.pdf
· * FPKI Overlay-v1-SP800-53rev5-April2021.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * 2.4 - Main - DOJ Adopting OSCAL to Deliver Lastest NIST SP 800-53 Controls.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * sp800-53-rev4-ipd.pdf
· * RMF 2.0 Deep Dive 5-15-18 v3 - Kelley Dempsey Naomi Lefkovitz.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * update-draft-800-53r5-v2.pdf
· * sp800_53_r4_appendix_g_markup_draft2.pdf
· * sp800_53a_r4_draft.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_f_markup_draft2.pdf
· * sp800-53-rev4-ipd.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_d_markup_draft2.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * Day_1_AM2_SCRM_Controls_Jon_Boyens.pdf
· * 800-53-for-ICS_KEMA.pdf
· * sp800-53r5-draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft-fpd-summary-of-significant-changes.pdf
· * sp800-53r5-draft-fpd-faq.pdf
· * sp800-53r5-draft.pdf
· * 800-53-Rev4_announcement.pdf
· * 1.5 - Main - SP800-53 Empowered by OSCAL_28Feb2022.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * appxi_800-53-rev1-augmented_15may07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP_800-53B_derived-OSCAL.pdf
· * sp_800-53_v5_1-derived-oscal.pdf
· * SP_800-53_v5_1-derived-OSCAL.pdf
· * sp800_53a_r4_draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft.pdf
· * 800-53-for-ICS_KEMA.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * sp800-53r5-fpd-controls.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * 800-53 automation workflow.pdf
· * 800-53-rev4-controls.csv
· * 800-53-rev4-controls.xml
· * 800-53-rev3-controls.xml
· * 800-53-rev3-controls.csv
· * SP800-177-Rev-1-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_LOW-baseline_profile_load.csv
· * NIST_SP-800-53_rev5-derived-OSCAL.xlsx
· * SP800-161-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_PRIVACY-baseline_profile_load.csv
· * NIST_SP-800-53_rev5_MODERATE-baseline_profile_load.csv
· * SP800-82-Rev-2-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_catalog_load.csv
· * NIST_SP-800-53_rev5_HIGH-baseline_profile_load.csv
· * sp800-53r5-draft-fpd-comparison-with-rev4.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-draft-fpd-comment-template.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53ar5-draft-comment-template.xlsx
· * sp800-53ar5-draft-comment-template.xlsx
· * stig-mapping-to-nist-800-53.xlsx
· * 800-53a-rev4-objectives.csv
· * 800-53a-rev4-objectives.xml
· * 800-53A-rev3-objectives.xml
· * SP800-53-control-comment-template.xlsx
· * WIP_800_53_Rev_5_to_Framework_v_1_1.xlsx
· * sp80053-focal-elements.csv
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * sp80053-focal-details.csv
· * SP_800-53_v5_1_XML.xml
· * NIST_SP-800-53B-derived-OSCAL.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * NIST SP 800-53B-Jan2022.xlsx
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * 800_53_rev_4_focal_document_template.xlsx
· * 800_53_Rev_4_Focal_Document_Template.xlsx
· * WIP_Framework_v_1_1_to_800_53_Rev5.xlsx
· * WIP_800_53_Rev_4_to_Framework_v_1_1.xlsx
· * sp800-53B-draft-comment-template.xlsx
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
* [SP 800-54]+2 – Border Gateway Protocol Security
* [SP 800-55 Rev]+8 – Performance Measurement Guide for Information Security
* [SP 800-55r1]+8 – Performance Measurement Guide for Information Security
* [SP 800-57]+46 – Recommendation on Key Management
· * NIST SP 800-057 Part 3r1 Recommendation for Key Management, Part 3; Application-Specific Key Management Guidance, 2015-01-22 (Final).pdf
· * NIST SP 800-057 Part 2 Recommendation for Key Management, Part 2; Best Practices for Key Management Organization, 2005-08-25 (Final).pdf
· * NIST SP 800-057 Recommendation for Key Management, Part 1; 2005-08 (updated March 9, 2007).pdf
· * NIST SP 800-057 Recommendation for Key Management, Part 2; 2005-08 (updated March 9, 2007).pdf
· * NIST SP 800-057 Recommendation for Key Management; Part 3 Key Management, 2007-03.pdf
· * NIST SP 800-057 Part 2r1 Recommendation for Key Management, Part 2; Best Practices for Key Management Organizations (2nd Draft), 2018-11-20 (Draft).pdf
· * NIST SP 800-057pt1r4_commentsreceived.pdf
· * alt-SP800-57part1rev4.pdf
· * alt-SP800-57part1rev3_general.pdf
· * NIST SP 800-057-pt2-draft-comments-received-apr2005.pdf
· * alt-SP800-57part3rev1.pdf
· * alt-SP800-57part2.pdf
· * sp800-57pt1r4_comments_received.pdf
· * nistspecialpublication800-57p1r3.pdf
· * nistspecialpublication800-57p1r2006.pdf
· * nistspecialpublication800-57p1r2007.pdf
· * nist.sp.800-57pt3r1.pdf
· * NIST.SP.800-57pt2r1.pdf
· * NIST.SP.800-57Pt3r1.pdf
· * sp800-57-Part1-revised2_Mar08-2007.pdf
· * nistspecialpublication800-57p2.pdf
· * NIST.SP.800-57pt1r5.pdf
· * nist.sp.800-57pt1r5.pdf
· * nistspecialpublication800-57p3.pdf
· * nistspecialpublication800-57p1.pdf
· * sp800-57_part1_rev3_general.pdf
· * NIST.SP.800-57pt1r5-draft.pdf
· * SP800-57-Part2.pdf
· * sp800-57pt1r4_comments_received.pdf
· * sp800-57pt1r4_draft_track_changes_from_rev3_to_rev4.pdf
· * sp800-57p1r4_draft.pdf
· * sp800-57-pt2-draft-comments-received-apr2005.pdf
· * sp800_57_pt3_r1_draft.pdf
· * SP80057TranPlan.pdf
· * SP80057TranPlan.pdf
· * sp800_57_pt3_r1_draft.pdf
· * CommentsSP800-57-1.pdf
· * Draft_SP800-57-Part1-Rev3_May2011.pdf
· * sp800-57-pt1-draft-apr2005-comments.pdf
· * sp800-57-pt1-draft-apr2005.pdf
· * sp800-57pt2-r1-draft.pdf
· * sp800-57pt2-r1-draft.pdf
· * sp800-57pt2-r1-draft2.pdf
· * sp800-57-pt1-draft-Jan2003.pdf
· * sp800-57-pt1-draft-Jan2003-comments.pdf
· * CommentsSP800-57Part2.pdf
* [SP 800-58]+2 – Security Considerations for Voice Over IP Systems
* [SP 800-64r2]+5 – Security Considerations in the Information System Development Life Cycle
* [SP 800-65]+3 – Integrating IT Security into the Capital Planning and Investment Control Process
* [SP 800-66r1]+9 – An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act Security Rule
* [SP 800-81]+6 – Secure Domain Name System (DNS) Deployment Guide
* [SP 800-89]+2 – Recommendation for Obtaining Assurances for Digital Signature Applications
* [SP 800-94]+7 – Guide to Intrusion Detection and Prevention Systems (IDPS)
* [SP 800-95]+2 – Guide to Secure Web Services
* [SP 800-98]+2 – Guidelines for Securing Radio Frequency Identification (RFID) Systems
+ RESEARCH
* [July 2003]+8 – Testing Intrusion Detection Systems – ITL Bulletin
* [June 2007]+18 – Forensic Techniques for Cell Phones – ITL Bulletin
* [IR 7007]+2 – An Overview of Issues in Testing Intrusion Detection Systems
* [IR 7056]+2 – Card Technology Development and Gap Analysis Interagency Report
* [IR 7200]+1 – Proximity Beacons and Mobile Handheld Devices: Overview and Implementation
* [IR 7224] – 4th Annual PKI R&D Workshop: Multiple Paths to Trust -- Proceedings
* [IR 7387]+2 – Cell Phone Forensic Tools: An Overview and Analysis Update
* [IR 7516]+1 – Forensic Filtering of Cell Phone Protocols
* [IR 7539]+1 – Symmetric Key Injection onto Smart Cards
* [SP 800-101]+5 – Guidelines on Cell Phone Forensics
* [SP 800-124]+11 – Guidelines on Cell Phone and PDA Security
* [SP 800-95]+2 – Guide to Secure Web Services
+ RISK ASSESSMENT
* [December 2006]+24 – Maintaining Effective Information Technology (IT) Security Through Test, Training, And Exercise Programs – ITL Bulletin
* [FIPS 191]+1 – Guideline for The Analysis of Local Area Network Security
* [FIPS 199]+7 – Standards for Security Categorization of Federal Information and Information Systems
* [FIPS 200]+2 – Minimum Security Requirements for Federal Information and Information Systems
* [February 2002]+2 – Risk Management Guidance For Information Technology Systems – ITL Bulletin
* [February 2003]+1 – Secure Interconnections for Information Technology Systems – ITL Bulletin
* [February 2006]+5 – Creating A Program To Manage Security Patches And Vulnerabilities: NIST Recommendations For Improving System Security – ITL Bulletin
* [January 2004]+2 – Computer Security Incidents: Assessing, Managing, And Controlling The Risks – ITL Bulletin
* [July 2004] – Guide For Mapping Types Of Information And Information Systems To Security Categories – ITL Bulletin
* [March 2004]+13 – Federal Information Processing Standard (FIPS) 199, Standards For Security Categorization Of Federal Information And Information Systems – ITL Bulletin
* [May 2004]+4 – Guide For The Security Certification And Accreditation Of Federal Information Systems – ITL Bulletin
* [May 2005] – Recommended Security Controls For Federal Information Systems: Guidance For Selecting Cost-Effective Controls Using A Risk-Based Process – ITL Bulletin
* [May 2006]+8 – An Update On Cryptographic Standards, Guidelines, And Testing Requirements – ITL Bulletin
* [IR 6981]+2 – Policy Expression and Enforcement for Handheld Devices
* [IR 7316]+3 – Assessment of Access Control Systems
* [November 2003]+2 – Network Security Testing – ITL Bulletin
* [October 2002]+3 – Security Patches And The CVE Vulnerability Naming Scheme: Tools To Address Computer System Vulnerabilities – ITL Bulletin
* [October 2005]+2 – National Vulnerability Database: Helping Information Technology System Users And Developers Find Current Information About Cyber Security Vulnerabilities – ITL Bulletin
* [SP 800-100]+1 – Information Security Handbook: A Guide for Managers
* [SP 800-115]+7 – Technical Guide to Information Security Testing and Assessment
* [SP 800-116]+12 – A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
* [SP 800-12]+23 – An Introduction to Computer Security: The NIST Handbook
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, 1995-10.pdf
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 2, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 1, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 5, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 4, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 3, 1995-10.ps
· * derived-piv-nist-sp1800-12b-v2.pdf
· * derived-piv-nist-sp1800-12a-v2.pdf
· * derived-piv-nist-sp1800-12c-v2.pdf
· * derived-piv-nist-sp1800-12-v2.pdf
· * derived-piv-nist-sp1800-12-draft.pdf
· * derived-piv-nist-sp1800-12c-draft.pdf
· * derived-piv-nist-sp1800-12a-draft.pdf
· * derived-piv-nist-sp1800-12b-draft.pdf
· * NIST.SP.800-12r1.pdf
· * NIST.SP.1800-12.pdf
· * nistspecialpublication800-12.pdf
· * 800-12_4.ps
· * 800-12_5.ps
· * 800-12_1.ps
· * 800-12_2.ps
· * 800-12_3.ps
· * sp800_12_r1_draft.pdf
* [SP 800-13]+6 – Telecommunications Security Guidelines for Telecommunications Management Network
* [SP 800-14]+8 – Generally Accepted Principles and Practices for Securing Information Technology Systems
* [SP 800-19]+4 – Mobile Agent Security
* [SP 800-21r2]+5 – Guideline for Implementing Cryptography in the Federal Government
* [SP 800-23]+3 – Guideline to Federal Organizations on Security Assurance and Acquisition/Use of Tested/Evaluated Products
* [SP 800-24]+3 – PBX Vulnerability Analysis: Finding Holes in Your PBX Before Someone Else Does
* [SP 800-25]+5 – Federal Agency Use of Public Key Technology for Digital Signatures and Authentication
* [SP 800-28r2]+2 – Guidelines on Active Content and Mobile Code
* [SP 800-30]+12 – Risk Management Guide for Information Technology Systems
* [SP 800-32]+4 – Introduction to Public Key Technology and the Federal PKI Infrastructure
* [SP 800-34]+22 – Contingency Planning Guide for Information Technology Systems
* [SP 800-36]+1 – Guide to Selecting Information Technology Security Products
* [SP 800-37]+39 – Guide for Security Certification and Accreditation of Federal Information Systems
* [SP 800-40 Ver. 2]+11 – Creating a Patch and Vulnerability Management Program
* [SP 800-44]+3 – Guidelines on Securing Public Web Servers
* [SP 800-45]+3 – Guidelines on Electronic Mail Security
* [SP 800-47]+4 – Security Guide for Interconnecting Information Technology Systems
* [SP 800-48r1]+4 – Guide to Securing Legacy IEEE 802.11 Wireless Networks
* [SP 800-51]+4 – Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme [subsection] :- Annual public report on activities undertaken in the previous year
* [SP 800-53 Rev]+235 – Recommended Security Controls for Federal Information Systems and Organizations
· * NIST SP 800-053Ar4 Assessing Security and Privacy Controls in Federal Information Systems and Organizations; Building Effective Assessment Plans, 2014-12-18 (Final).pdf
· * NIST SP 800-053r2 Recommended Security Controls for Fed Info Systems, 2007-12 (final).pdf
· * alt-SP800-53-rev3-final_updated-errata_05-01-2010.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r2 to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r3FPD to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 2 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 1 (Errata), 2010-05-01.pdf
· * NIST SP 800-053Ar1 Guide for Assessing the Security Controls in Federal Information Systems and Organizations, 2010-06-29.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2013-05-07.pdf
· * NIST SP 800-053r5 Security and Privacy Controls for Information Systems and Organizations, 2017-08-15 (Draft).pdf
· * NIST SP 800-053r4_final_word_errata_01_22_2015.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations Controls (Errata), 2014-01-15.xml
· * NIST SP 800-053A Guide for Assessing the Security Controls in Fed Info Systems, 2008-06.pdf
· * NIST SP 800-053r5-draft-controls-markup.pdf
· * alt-SP800-53r4.pdf
· * alt-SP800-53Ar4.pdf
· * alt-SP800-53.pdf
· * alt-SP800-53r5-draft.pdf
· * NIST SP 800-053r5-draft-baselines-markup.pdf
· * NIST SP 800-053-controls.xml
· * NIST SP 800-053a_r4_errata_12_18_2014.docx
· * sp800-53A-rev1-final.pdf
· * 800-53-rev1-final-clean-sz.pdf
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53r4_summary.pdf
· * NIST.SP.800-53r4.pdf
· * nist.sp.800-53ar4.pdf
· * NIST.SP.800-53Ar4.pdf
· * nist.sp.800-53r4.pdf
· * nistspecialpublication800-53r3.pdf
· * nistspecialpublication800-53r2.pdf
· * nistspecialpublication800-53r1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53a.pdf
· * nistspecialpublication800-53a.pdf
· * NIST.SP.800-53r5.pdf
· * nistspecialpublication800-53.pdf
· * nist.sp.800-53r5.pdf
· * NIST.SP.800-53Ar5.pdf
· * NIST.SP.800-53B.pdf
· * 800-53-rev1-annex3-sz.pdf
· * 800-53-rev1-annex2-sz.pdf
· * 800-53-rev1-annex1-sz.pdf
· * NIST.SP.800-53r5-draft.pdf
· * nist.sp.800-53r5-draft.pdf
· * NIST.SP.800-53Ar5-draft.pdf
· * NIST.SP.800-53B-draft.pdf
· * sp800_53a_r4_errata_12_18_2014.docx
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * DOJ_CSAM_Planning_for_Implementing_SP-800-53_Rev5_FINAL.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * apply-sp-800-53-ics-final-22aug06.pdf
· * NIST_SP_800-53_Comment_Site_User_Guide_FINAL_8Sept2021.pdf
· * ics-in-sp800-53_final_21mar07.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * ics-in-sp800-53_final_21Mar07.pdf
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53-collaboration-index-template.docx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53-collaboration-index-template.xlsx
· * sp800-53r5-control-catalog.xlsx
· * sp800-53-collaboration-index-template.docx
· * sp800-53-collaboration-index-template.xlsx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-control-catalog.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * OLIR_review_800-213A_to_800-53_rev5_final.xlsx
· * Federal_Cybersecurity_Privacy_Forum_2Dec2021_NIST_SP800-53update.pdf
· * Federal_Cybersecurity_and_Privacy_Forum_15Feb2022_What_Is_New_SP800-53ARevision5.pdf
· * Federal_Cybersecurity_Privacy_Professionals_Forum_2Dec2021_FedRAMP_NIST800-53_Rev5.pdf
· * cybersecurity-innovation-forum_01-28-2014.pdf
· * ePACS Overlay_v1_SP800-53rev5-April2021.pdf
· * FPKI Overlay-v1-SP800-53rev5-April2021.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * 2.4 - Main - DOJ Adopting OSCAL to Deliver Lastest NIST SP 800-53 Controls.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * sp800-53-rev4-ipd.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * RMF 2.0 Deep Dive 5-15-18 v3 - Kelley Dempsey Naomi Lefkovitz.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * update-draft-800-53r5-v2.pdf
· * sp800_53_r4_appendix_g_markup_draft2.pdf
· * sp800_53a_r4_draft.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_f_markup_draft2.pdf
· * sp800-53-rev4-ipd.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_d_markup_draft2.pdf
· * sp800-53r5-draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * sp800-53r5-draft-fpd-summary-of-significant-changes.pdf
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * sp800-53r5-draft-fpd-faq.pdf
· * Day_1_AM2_SCRM_Controls_Jon_Boyens.pdf
· * sp800-53r5-draft.pdf
· * 800-53-for-ICS_KEMA.pdf
· * 800-53-Rev4_announcement.pdf
· * 1.5 - Main - SP800-53 Empowered by OSCAL_28Feb2022.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * appxi_800-53-rev1-augmented_15may07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP_800-53B_derived-OSCAL.pdf
· * sp_800-53_v5_1-derived-oscal.pdf
· * SP_800-53_v5_1-derived-OSCAL.pdf
· * sp800_53a_r4_draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft.pdf
· * 800-53-for-ICS_KEMA.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * sp800-53r5-fpd-controls.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * 800-53 automation workflow.pdf
· * 800-53-rev4-controls.csv
· * 800-53-rev4-controls.xml
· * 800-53-rev3-controls.xml
· * 800-53-rev3-controls.csv
· * SP800-177-Rev-1-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_LOW-baseline_profile_load.csv
· * NIST_SP-800-53_rev5-derived-OSCAL.xlsx
· * SP800-161-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_PRIVACY-baseline_profile_load.csv
· * NIST_SP-800-53_rev5_MODERATE-baseline_profile_load.csv
· * SP800-82-Rev-2-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_catalog_load.csv
· * NIST_SP-800-53_rev5_HIGH-baseline_profile_load.csv
· * sp800-53r5-draft-fpd-comparison-with-rev4.xlsx
· * stig-mapping-to-nist-800-53.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-draft-fpd-comment-template.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53ar5-draft-comment-template.xlsx
· * sp800-53ar5-draft-comment-template.xlsx
· * 800-53a-rev4-objectives.csv
· * 800-53a-rev4-objectives.xml
· * 800-53A-rev3-objectives.xml
· * SP800-53-control-comment-template.xlsx
· * WIP_800_53_Rev_5_to_Framework_v_1_1.xlsx
· * sp80053-focal-elements.csv
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * sp80053-focal-details.csv
· * SP_800-53_v5_1_XML.xml
· * NIST_SP-800-53B-derived-OSCAL.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * NIST SP 800-53B-Jan2022.xlsx
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * 800_53_rev_4_focal_document_template.xlsx
· * 800_53_Rev_4_Focal_Document_Template.xlsx
· * WIP_Framework_v_1_1_to_800_53_Rev5.xlsx
· * WIP_800_53_Rev_4_to_Framework_v_1_1.xlsx
· * sp800-53B-draft-comment-template.xlsx
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
* [SP 800-53r3]+235 – Recommended Security Controls for Federal Information Systems and Organizations
· * NIST SP 800-053Ar4 Assessing Security and Privacy Controls in Federal Information Systems and Organizations; Building Effective Assessment Plans, 2014-12-18 (Final).pdf
· * NIST SP 800-053r2 Recommended Security Controls for Fed Info Systems, 2007-12 (final).pdf
· * alt-SP800-53-rev3-final_updated-errata_05-01-2010.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r2 to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r3FPD to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 2 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 1 (Errata), 2010-05-01.pdf
· * NIST SP 800-053Ar1 Guide for Assessing the Security Controls in Federal Information Systems and Organizations, 2010-06-29.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2013-05-07.pdf
· * NIST SP 800-053r5 Security and Privacy Controls for Information Systems and Organizations, 2017-08-15 (Draft).pdf
· * NIST SP 800-053r4_final_word_errata_01_22_2015.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations Controls (Errata), 2014-01-15.xml
· * NIST SP 800-053A Guide for Assessing the Security Controls in Fed Info Systems, 2008-06.pdf
· * NIST SP 800-053r5-draft-controls-markup.pdf
· * alt-SP800-53r4.pdf
· * alt-SP800-53Ar4.pdf
· * alt-SP800-53.pdf
· * alt-SP800-53r5-draft.pdf
· * NIST SP 800-053r5-draft-baselines-markup.pdf
· * NIST SP 800-053-controls.xml
· * NIST SP 800-053a_r4_errata_12_18_2014.docx
· * sp800-53A-rev1-final.pdf
· * 800-53-rev1-final-clean-sz.pdf
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53r4_summary.pdf
· * NIST.SP.800-53r4.pdf
· * nist.sp.800-53ar4.pdf
· * NIST.SP.800-53Ar4.pdf
· * nist.sp.800-53r4.pdf
· * nistspecialpublication800-53r3.pdf
· * nistspecialpublication800-53r2.pdf
· * nistspecialpublication800-53r1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53a.pdf
· * nistspecialpublication800-53a.pdf
· * NIST.SP.800-53r5.pdf
· * nistspecialpublication800-53.pdf
· * nist.sp.800-53r5.pdf
· * NIST.SP.800-53Ar5.pdf
· * NIST.SP.800-53B.pdf
· * 800-53-rev1-annex3-sz.pdf
· * 800-53-rev1-annex2-sz.pdf
· * 800-53-rev1-annex1-sz.pdf
· * NIST.SP.800-53r5-draft.pdf
· * nist.sp.800-53r5-draft.pdf
· * NIST.SP.800-53Ar5-draft.pdf
· * NIST.SP.800-53B-draft.pdf
· * sp800_53a_r4_errata_12_18_2014.docx
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * DOJ_CSAM_Planning_for_Implementing_SP-800-53_Rev5_FINAL.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * apply-sp-800-53-ics-final-22aug06.pdf
· * NIST_SP_800-53_Comment_Site_User_Guide_FINAL_8Sept2021.pdf
· * ics-in-sp800-53_final_21mar07.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * ics-in-sp800-53_final_21Mar07.pdf
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53-collaboration-index-template.docx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53-collaboration-index-template.xlsx
· * sp800-53r5-control-catalog.xlsx
· * sp800-53-collaboration-index-template.docx
· * sp800-53-collaboration-index-template.xlsx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-control-catalog.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * OLIR_review_800-213A_to_800-53_rev5_final.xlsx
· * Federal_Cybersecurity_Privacy_Forum_2Dec2021_NIST_SP800-53update.pdf
· * Federal_Cybersecurity_and_Privacy_Forum_15Feb2022_What_Is_New_SP800-53ARevision5.pdf
· * Federal_Cybersecurity_Privacy_Professionals_Forum_2Dec2021_FedRAMP_NIST800-53_Rev5.pdf
· * cybersecurity-innovation-forum_01-28-2014.pdf
· * ePACS Overlay_v1_SP800-53rev5-April2021.pdf
· * FPKI Overlay-v1-SP800-53rev5-April2021.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * 2.4 - Main - DOJ Adopting OSCAL to Deliver Lastest NIST SP 800-53 Controls.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * sp800-53-rev4-ipd.pdf
· * RMF 2.0 Deep Dive 5-15-18 v3 - Kelley Dempsey Naomi Lefkovitz.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * update-draft-800-53r5-v2.pdf
· * sp800_53_r4_appendix_g_markup_draft2.pdf
· * sp800_53a_r4_draft.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_f_markup_draft2.pdf
· * sp800-53-rev4-ipd.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_d_markup_draft2.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * Day_1_AM2_SCRM_Controls_Jon_Boyens.pdf
· * 800-53-for-ICS_KEMA.pdf
· * sp800-53r5-draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft-fpd-summary-of-significant-changes.pdf
· * sp800-53r5-draft-fpd-faq.pdf
· * sp800-53r5-draft.pdf
· * 800-53-Rev4_announcement.pdf
· * 1.5 - Main - SP800-53 Empowered by OSCAL_28Feb2022.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * appxi_800-53-rev1-augmented_15may07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP_800-53B_derived-OSCAL.pdf
· * sp_800-53_v5_1-derived-oscal.pdf
· * SP_800-53_v5_1-derived-OSCAL.pdf
· * sp800_53a_r4_draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft.pdf
· * 800-53-for-ICS_KEMA.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * sp800-53r5-fpd-controls.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * 800-53 automation workflow.pdf
· * 800-53-rev4-controls.csv
· * 800-53-rev4-controls.xml
· * 800-53-rev3-controls.xml
· * 800-53-rev3-controls.csv
· * SP800-177-Rev-1-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_LOW-baseline_profile_load.csv
· * NIST_SP-800-53_rev5-derived-OSCAL.xlsx
· * SP800-161-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_PRIVACY-baseline_profile_load.csv
· * NIST_SP-800-53_rev5_MODERATE-baseline_profile_load.csv
· * SP800-82-Rev-2-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_catalog_load.csv
· * NIST_SP-800-53_rev5_HIGH-baseline_profile_load.csv
· * sp800-53r5-draft-fpd-comparison-with-rev4.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-draft-fpd-comment-template.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53ar5-draft-comment-template.xlsx
· * sp800-53ar5-draft-comment-template.xlsx
· * stig-mapping-to-nist-800-53.xlsx
· * 800-53a-rev4-objectives.csv
· * 800-53a-rev4-objectives.xml
· * 800-53A-rev3-objectives.xml
· * SP800-53-control-comment-template.xlsx
· * WIP_800_53_Rev_5_to_Framework_v_1_1.xlsx
· * sp80053-focal-elements.csv
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * sp80053-focal-details.csv
· * SP_800-53_v5_1_XML.xml
· * NIST_SP-800-53B-derived-OSCAL.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * NIST SP 800-53B-Jan2022.xlsx
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * 800_53_rev_4_focal_document_template.xlsx
· * 800_53_Rev_4_Focal_Document_Template.xlsx
· * WIP_Framework_v_1_1_to_800_53_Rev5.xlsx
· * WIP_800_53_Rev_4_to_Framework_v_1_1.xlsx
· * sp800-53B-draft-comment-template.xlsx
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
* [SP 800-53A]+79 – Guide for Assessing the Security Controls in Federal Information Systems
* [SP 800-59]+3 – Guideline for Identifying an Information System as a National Security System
* [SP 800-60r1]+17 – Guide for Mapping Types of Information and Information Systems to Security Categories
* [SP 800-63r1]+42 – Electronic Authentication Guideline
* [SP 800-65]+3 – Integrating IT Security into the Capital Planning and Investment Control Process
* [SP 800-66r1]+9 – An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act Security Rule
* [SP 800-83]+7 – Guide to Malware Incident Prevention and Handling
* [SP 800-84]+8 – Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities
* [SP 800-88]+8 – Media Sanitization Guide
* [September 2001] – Security Self-Assessment Guide for Information Technology Systems – ITL Bulletin
+ SERVICES & ACQUISITIONS
* [April 2004]+5 – Selecting Information Technology Security Products – ITL Bulletin July 2002 Overview: The Government Smart Card Interoperability Specification – ITL Bulletin
* [April 2007]+1 – Securing Wireless Networks – ITL Bulletin
* [August 2005]+9 – Implementation Of FIPS 201, Personal Identity Verification (PIV) Of Federal Employees And Contractors
* [FIPS 140]+285 – Security Requirements for Cryptographic Modules
· * NIST SB 2001-07 A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2.pdf
· * NIST SP 800-029 A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2, 2001-06.pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex A, 2001-05.pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex D, 2001-05.pdf
· * NIST FIPS 140-2 Security requirements for Cryptographic Modules, Annex D; Approved Key Establishment Techniques, 2001-03 (2009 Minor Edits).pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex B; Approved Protection Profiles, 2001-03 (2009 Minor Edits).pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex A; Approved Security Functions, 2001-03 (2009 Minor Edits) .pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex C; Approved Random Number Generators, 2001-03 (2009 Minor Edits).pdf
· * NIST FIPS 140-2 Security Reqs for Cryptographic Modules, 2001-03.pdf
· * NIST FIPS 140-2 Implementation Guidance for FIPS PUB 140-2 and the CMVP, 2010-08-03.pdf
· * NIST SB 1995-08 FIPS 140-1; A Framework for Cryptographic Standards.txt
· * fips140-3-final-draft-2007-comments-resolutions.pdf
· * FIPS_140-3 Final_Draft_2007.pdf
· * fips140_2_chng2_20021203.epub
· * fips140_2_chng2_20021203.epub
· * NewFIPS1402LogoForm.pdf
· * FIPS1402LogoForm.pdf
· * FIPS1403LogoForm.pdf
· * fips140-3-sections-submitted-for-comments.pdf
· * FIPS140ConsolidatedCertApr2017.pdf
· * FIPS140ConsolidatedCertMar2017.pdf
· * fips140consolidatedcertlist0034.pdf
· * FIPS1402DTR.pdf
· * FIPS140ConsolidatedCertJan2018.pdf
· * FIPS140ConsolidatedCertOct2017.pdf
· * FIPS140ConsolidatedCertAug2018.pdf
· * fips140consolidatedcertlist0053.pdf
· * FIPS140ConsolidatedCertList0008.pdf
· * FIPS 140-3 IG.pdf
· * FIPS140ConsolidatedCertSept2016.pdf
· * FIPS140ConsolidatedCertList0034.pdf
· * FIPS140ConsolidatedCertList0054.pdf
· * fips140consolidatedcertlist0042.pdf
· * FIPS140ConsolidatedCertList0052.pdf
· * FIPS1402LogoForm.pdf
· * FIPS140ConsolidatedCertApril2016.pdf
· * FIPS140ConsolidatedCertList0041.pdf
· * FIPS140ConsolidatedCertList0048.pdf
· * FIPS140ConsolidatedCertList0028.pdf
· * FIPS140ConsolidatedCertOct2018.pdf
· * FIPS140ConsolidatedCertNov2019.pdf
· * FIPS140ConsolidatedCertMarch2016.pdf
· * FIPS140ConsolidatedCertList0026.pdf
· * FIPS140ConsolidatedCertMay2016.pdf
· * FIPS140ConsolidatedCertList0057.pdf
· * FIPS140ConsolidatedCertList0035.pdf
· * FIPS1401LogoForm.pdf
· * fips140consolidatedcertlist0046.pdf
· * FIPS140ConsolidatedCertList0024.pdf
· * FIPS140ConsolidatedCertList0049.pdf
· * FIPS 140-3 IG.pdf
· * FIPS140ConsolidatedCertSept2017.pdf
· * FIPS140ConsolidatedCertOct2015.pdf
· * FIPS140ConsolidatedCertJuly2016.pdf
· * fips140consolidatedcertoct2016.pdf
· * FIPS-140-2-CMVP Management Manual 09-09-2021.pdf
· * fips140consolidatedcertdec2015.pdf
· * fips1402logoform.pdf
· * FIPS140ConsolidatedCertJan2017.pdf
· * fips140consolidatedcertlist0038.pdf
· * FIPS_140-3_sections_submitted_for_comments.pdf
· * FIPS140ConsolidatedCertDec2015.pdf
· * FIPS140ConsolidatedCertList0046.pdf
· * FIPS140ConsolidatedCertList0053.pdf
· * FIPS140ConsolidatedCertFeb2016.pdf
· * fips140consolidatedcertjune2016.pdf
· * NIST and ISO End User License Agreement.pdf
· * FIPS140ConsolidatedCertJune2017.pdf
· * FIPS140ConsolidatedCertDec2016.pdf
· * fips140consolidatedcertlist0026.pdf
· * FIPS140ConsolidatedCertList0042.pdf
· * FIPS140ConsolidatedCertJuly2017.pdf
· * FIPS140ConsolidatedCertNov2016.pdf
· * nist and iso end user license agreement.pdf
· * fips140consolidatedcertsept2017.pdf
· * fips140consolidatedcertmarch2016.pdf
· * fips140consolidatedcertsept2016.pdf
· * FIPS140ConsolidatedCertList0023.pdf
· * FIPS140ConsolidatedCertList0011.pdf
· * FIPS140ConsolidatedCertList0038.pdf
· * FIPS1402IG.pdf
· * FIPS140ConsolidatedCertList0045.pdf
· * FIPS140ConsolidatedCertOct2016.pdf
· * FIPS140ConsolidatedCertJune2016.pdf
· * FIPS140ConsolidatedCertList0020.pdf
· * FIPS140ConsolidatedCertList0032.pdf
· * fips140consolidatedcertmay2017.pdf
· * FIPS140ConsolidatedCertAug2016.pdf
· * FIPS140ConsolidatedCertNov2017.pdf
· * FIPS140ConsolidatedCertMay2017.pdf
· * FIPS140-2-ConsolidatedMarch2018.pdf
· * FIPS140ConsolidatedCertDec2017.pdf
· * fips140consolidatedcertlist0057.pdf
· * FIPS1403SoftSecWork.pdf
· * FIPS140ConsolidatedCertList0050.pdf
· * fips1402ig.pdf
· * fips140consolidatedcertlist0045.pdf
· * FIPS1402IG.pdf
· * fips-140-2-cmvp management manual 09-09-2021.pdf
· * FIPS140ConsolidatedCertJan2016.pdf
· * fips140consolidatedcertlist0011.pdf
· * fips140consolidatedcertmay2016.pdf
· * fips140consolidatedcertnov2019.pdf
· * FIPS140ConsolidatedCertFeb2017.pdf
· * FIPS_140-3_sections_submitted_for_comments.pdf
· * Draft FIPS-140-3-CMVP Management Manual v1.1 07-13-2022.pdf
· * Draft FIPS-140-3-CMVP Management Manual 09-18-2020.pdf
· * fips1402.pdf
· * fips1401.pdf
· * physecpre18.pdf
· * CMVP2604.pdf
· * CMVP2606.pdf
· * FIPS140ConsolidatedCertApr2017.pdf
· * day2_mar24_fips-140-quo-vadis_nist-csd.pdf
· * FIPS140ConsolidatedCertMar2017.pdf
· * fips140consolidatedcertapr2017.pdf
· * physecpaper13.pdf
· * physecpaper12.pdf
· * physecpaper10.pdf
· * physecpaper11.pdf
· * physecpaper16.pdf
· * physecpaper14.pdf
· * physecpaper14.pdf
· * physecpaper17.pdf
· * physecpaper18.pdf
· * physecpaper19.pdf
· * physecpaper12.pdf
· * FIPS140ConsolidatedCertList0032.pdf
· * FIPS140ConsolidatedCertList0040.pdf
· * FIPS140ConsolidatedCertList0031.pdf
· * FIPS140ConsolidatedCertList0034.pdf
· * physecpaper08.pdf
· * FIPS140ConsolidatedCertList0037.pdf
· * fips140consolidatedcertlist0017.pdf
· * FIPS140ConsolidatedCertList0009.pdf
· * physecpaper06.pdf
· * physecpaper09.pdf
· * FIPS140ConsolidatedCertList0035.pdf
· * FIPS140ConsolidatedCertList0015.pdf
· * FIPS140ConsolidatedCertList0051.pdf
· * FIPS140ConsolidatedCertJune2016.pdf
· * physecpaper07.pdf
· * fips140consolidatedcertlist0019.pdf
· * fips1401ig.pdf
· * FIPS140ConsolidatedCertList0013.pdf
· * FIPS140ConsolidatedCertList0007.pdf
· * FIPS140ConsolidatedCertList0023.pdf
· * FIPS140ConsolidatedCertNov2015.pdf
· * FIPS1402DTR.pdf
· * Jan12-2005-FR-FIPS1403-Notice.pdf
· * FIPS140ConsolidatedCertList0003.pdf
· * FIPS140ConsolidatedCertList0042.pdf
· * FIPS140ConsolidatedCertList0002.pdf
· * FIPS140ConsolidatedCertSept2016.pdf
· * physecpaper08.pdf
· * FIPS140ConsolidatedCertMay2016.pdf
· * FIPS140ConsolidatedCertMay2017.pdf
· * fips1402ig.pdf
· * 1401testA.pdf
· * FIPS140ConsolidatedCertList0030.pdf
· * FIPS140ConsolidatedCertList0036.pdf
· * FIPS140ConsolidatedCertList0017.pdf
· * fips140consolidatedcertmay2016.pdf
· * FIPS140ConsolidatedCertList0038.pdf
· * FIPS140ConsolidatedCertList0004.pdf
· * FIPS140ConsolidatedCertDec2015.pdf
· * FIPS140ConsolidatedCertList0014.pdf
· * FIPS140ConsolidatedCertList0012.pdf
· * FIPS140ConsolidatedCertList0010.pdf
· * FIPS140ConsolidatedCertList0029.pdf
· * FIPS140ConsolidatedCertList0001.pdf
· * fips140consolidatedcertaug2016.pdf
· * FIPS140ConsolidatedCertList0021.pdf
· * FIPS140ConsolidatedCertList0048.pdf
· * frn-2015-19743-comments-received.pdf
· * FIPS140ConsolidatedCertList0006.pdf
· * FIPS140ConsolidatedCertMarch2016.pdf
· * ispab-ltr-to-NIST-on-FIPS_140-2-ISO_20160420.pdf
· * FIPS140ConsolidatedCertList0033.pdf
· * FIPS140ConsolidatedCertList0008.pdf
· * physecpaper03.pdf
· * FIPS140ConsolidatedCertJuly2016.pdf
· * fips140consolidatedcertmay2017.pdf
· * fips140-3_non-invasive2.pdf
· * FIPS140ConsolidatedCertList0046.pdf
· * physecpaper03.pdf
· * FIPS140ConsolidatedCertList0020.pdf
· * FIPS140ConsolidatedCertList0055.pdf
· * FIPS140ConsolidatedCertList0024.pdf
· * fips140consolidatedcertnov2015.pdf
· * 1401test.pdf
· * FIPS140ConsolidatedCertList0005.pdf
· * ispab-ltr-to-NIST-on-FIPS_140-2-ISO_20160420.pdf
· * FIPS140ConsolidatedCertList0027.pdf
· * FIPS140ConsolidatedCertApril2016.pdf
· * FIPS140ConsolidatedCertOct2015.pdf
· * fips1402DTR.pdf
· * FIPS140ConsolidatedCertFeb2017.pdf
· * FIPS140ConsolidatedCertList0044.pdf
· * FIPS140ConsolidatedCertList0054.pdf
· * physecpaper05.pdf
· * FIPS140ConsolidatedCertAug2017.pdf
· * physecpaper02.pdf
· * FIPS1402IG.pdf
· * FIPS140ConsolidatedCertList0041.pdf
· * FIPS140ConsolidatedCertList0019.pdf
· * 140-2flow.pdf
· * FIPS140ConsolidatedCertList0053.pdf
· * FIPS140ConsolidatedCertList0045.pdf
· * FIPS140ConsolidatedCertList0049.pdf
· * fips140-3_non-invasive1.pdf
· * fips140consolidatedcertlist0024.pdf
· * FIPS140ConsolidatedCertList0039.pdf
· * physecpaper04.pdf
· * FIPS140ConsolidatedCertJune2017.pdf
· * physecpaper01.pdf
· * FIPS140ConsolidatedCertJuly2017.pdf
· * FIPS140ConsolidatedCertOct2016.pdf
· * FIPS140ConsolidatedCertList0026.pdf
· * fips140consolidatedcertdec2016.pdf
· * fips140consolidatedcertlist0042.pdf
· * FIPS140ConsolidatedCertJan2016.pdf
· * FIPS140ConsolidatedCertFeb2016.pdf
· * fips140consolidatedcertjan2017.pdf
· * FIPS140ConsolidatedCertList0052.pdf
· * FIPS140ConsolidatedCertList0047.pdf
· * FIPS140ConsolidatedCertJan2017.pdf
· * FIPS1401IG.pdf
· * FIPS140ConsolidatedCertList0056.pdf
· * FIPS140ConsolidatedCertList0028.pdf
· * FIPS140ConsolidatedCertList0018.pdf
· * fips-140_response.pdf
· * FIPS140ConsolidatedCertList0025.pdf
· * ispab-ltr-to-nist-on-fips_140-2-iso_20160420.pdf
· * FIPS140ConsolidatedCertList0022.pdf
· * FIPS140ConsolidatedCertList0050.pdf
· * FIPS140ConsolidatedCertList0016.pdf
· * FIPS140ConsolidatedCertList0011.pdf
· * FIPS140ConsolidatedCertDec2016.pdf
· * FIPS140ConsolidatedCertNov2016.pdf
· * FIPS140ConsolidatedCertList0043.pdf
· * FIPS140ConsolidatedCertList0057.pdf
· * FIPS140ConsolidatedCertAug2016.pdf
· * fips140-3-draft-2009.pdf
· * fips1403Draft.pdf
· * revised-draft-fips140-3_PDF-zip_document-annexA-to-annexG.zip
· * fips140-3-draft-2009-comments-resolutions.pdf
· * fips1403draft.pdf
· * fips1402annexc.pdf
· * PublicComments_FIPS140-3Draft2.pdf
· * fips1402annexa.pdf
· * fips1402annexd.pdf
· * fips1402annexb.pdf
· * CommentsFIPS140-3_draft1.pdf
· * day2_mar24_fips-140-quo-vadis_nist-csd.pdf
· * day1_research_100-150.pdf
· * day1_research_100-150.pdf
· * physecpre01.pdf
· * Jean_Campbell-FIPS_140-3_-_Looking_over_the_horizon(3).pdf
· * physecpre02.pdf
· * physecpre17.pdf
· * physecpre04.pdf
· * CMVP2603.pdf
· * noninvasive-attack-testing_cscace-hsakane.pdf
· * noninvasive-attack-testing_cscace-hsakane.pdf
· * physecpre09.pdf
· * physecpre05.pdf
· * CMVP 140-3 MM Comments Template.docx
· * fips140_2_chng2_20021203.epub
· * physecpre10.ppt
· * physecpre10.ppt
· * physecpre06.ppt
· * physecpre16.ppt
· * physecpre03.ppt
· * physecpre18.ppt
· * physecpre07.ppt
· * physecpre11.ppt
· * physecpre17.ppt
· * physecpre08.ppt
· * physecpre12.ppt
· * physecpre15.ppt
· * physecpre14.ppt
· * physecpre15.ppt
· * physecpre14.ppt
· * physecpre13.ppt
* [FIPS 201]+374 – Personal Identity Verification for Federal Employees and Contractors
* [February 2000]+14 – Guideline for Implementing Cryptography in the Federal Government – ITL Bulletin
* [February 2008] – Federal Desktop Core Configuration (FDCC): Improving Security For Windows Desktop Operating Systems – ITL Bulletin
* [January 2005]+11 – Integrating It Security Into The Capital Planning And Investment Control Process – ITL Bulletin
· * NIST SP 800-065 Integrating Security into the Capital Planning and Investment Control Process, 2005-01.pdf
· * NIST SP 800-058 Security Considerations for Voice Over IP Systems, 2005-01-01 (Final).pdf
· * alt-SP800-53-rev3-final_updated-errata_05-01-2010.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r2 to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r3FPD to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 2 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 1 (Errata), 2010-05-01.pdf
· * NIST SP 800-058 Security Considerations for Voice Over IP Systems, 2005-01.pdf
· * itlbul2005-01.pdf
* [January 2006]+3 – Testing And Validation Of Personal Identity Verification (PIV) Components And Subsystems For Conformance To Federal Information Processing Standard 201
* [June 2004]+16 – Information Technology Security Services: How To Select, Implement, And Manage – ITL Bulletin
* [June 2005]+16 – NIST’s Security Configuration Checklists Program For IT Products – ITL Bulletin
* [June 2007]+18 – Forensic Techniques for Cell Phones – ITL Bulletin
* [March 2005]+13 – Personal Identity Verification (PIV) Of Federal Employees And Contractors: Federal Information Processing Standard (FIPS) 201
* [May 2006]+8 – An Update On Cryptographic Standards, Guidelines, And Testing Requirements – ITL Bulletin
* [IR 6887]+2 – Government Smart Card Interoperability Specification (GSC-IS), v2.1
* [IR 7100]+2 – PDA Forensic Tools: An Overview and Analysis
* [IR 7250]+1 – Cell Phone Forensic Tools: An Overview and Analysis
* [IR 7284]+2 – Personal Identity Verification Card Management Report
* [IR 7313]+1 – 5th Annual PKI R&D Workshop “Making PKI Easy to Use” Proceedings
* [IR 7387]+2 – Cell Phone Forensic Tools: An Overview and Analysis Update
* [October 2004]+2 – Securing Voice Over Internet Protocol (IP) Networks – ITL Bulletin
* [SP 800-101]+5 – Guidelines on Cell Phone Forensics
* [SP 800-115]+7 – Technical Guide to Information Security Testing and Assessment
* [SP 800-121]+15 – Guide to Bluetooth Security
* [SP 800-124]+11 – Guidelines on Cell Phone and PDA Security
* [SP 800-15]+7 – Minimum Interoperability Specification for PKI Components (MISPC), Version 1
* [SP 800-21r2]+5 – Guideline for Implementing Cryptography in the Federal Government
* [SP 800-25]+5 – Federal Agency Use of Public Key Technology for Digital Signatures and Authentication
* [SP 800-35]+1 – Guide to Information Technology Security Services
* [SP 800-36]+1 – Guide to Selecting Information Technology Security Products
* [SP 800-48r1]+4 – Guide to Securing Legacy IEEE 802.11 Wireless Networks
* [SP 800-53 Rev]+235 – Recommended Security Controls for Federal Information Systems and Organizations
· * NIST SP 800-053Ar4 Assessing Security and Privacy Controls in Federal Information Systems and Organizations; Building Effective Assessment Plans, 2014-12-18 (Final).pdf
· * NIST SP 800-053r2 Recommended Security Controls for Fed Info Systems, 2007-12 (final).pdf
· * alt-SP800-53-rev3-final_updated-errata_05-01-2010.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r2 to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r3FPD to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 2 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 1 (Errata), 2010-05-01.pdf
· * NIST SP 800-053Ar1 Guide for Assessing the Security Controls in Federal Information Systems and Organizations, 2010-06-29.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2013-05-07.pdf
· * NIST SP 800-053r5 Security and Privacy Controls for Information Systems and Organizations, 2017-08-15 (Draft).pdf
· * NIST SP 800-053r4_final_word_errata_01_22_2015.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations Controls (Errata), 2014-01-15.xml
· * NIST SP 800-053A Guide for Assessing the Security Controls in Fed Info Systems, 2008-06.pdf
· * NIST SP 800-053r5-draft-controls-markup.pdf
· * alt-SP800-53r4.pdf
· * alt-SP800-53Ar4.pdf
· * alt-SP800-53.pdf
· * alt-SP800-53r5-draft.pdf
· * NIST SP 800-053r5-draft-baselines-markup.pdf
· * NIST SP 800-053-controls.xml
· * NIST SP 800-053a_r4_errata_12_18_2014.docx
· * sp800-53A-rev1-final.pdf
· * 800-53-rev1-final-clean-sz.pdf
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53r4_summary.pdf
· * NIST.SP.800-53r4.pdf
· * nist.sp.800-53ar4.pdf
· * NIST.SP.800-53Ar4.pdf
· * nist.sp.800-53r4.pdf
· * nistspecialpublication800-53r3.pdf
· * nistspecialpublication800-53r2.pdf
· * nistspecialpublication800-53r1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53a.pdf
· * nistspecialpublication800-53a.pdf
· * NIST.SP.800-53r5.pdf
· * nistspecialpublication800-53.pdf
· * nist.sp.800-53r5.pdf
· * NIST.SP.800-53Ar5.pdf
· * NIST.SP.800-53B.pdf
· * 800-53-rev1-annex3-sz.pdf
· * 800-53-rev1-annex2-sz.pdf
· * 800-53-rev1-annex1-sz.pdf
· * NIST.SP.800-53r5-draft.pdf
· * nist.sp.800-53r5-draft.pdf
· * NIST.SP.800-53Ar5-draft.pdf
· * NIST.SP.800-53B-draft.pdf
· * sp800_53a_r4_errata_12_18_2014.docx
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * DOJ_CSAM_Planning_for_Implementing_SP-800-53_Rev5_FINAL.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * apply-sp-800-53-ics-final-22aug06.pdf
· * NIST_SP_800-53_Comment_Site_User_Guide_FINAL_8Sept2021.pdf
· * ics-in-sp800-53_final_21mar07.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * ics-in-sp800-53_final_21Mar07.pdf
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53-collaboration-index-template.docx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53-collaboration-index-template.xlsx
· * sp800-53r5-control-catalog.xlsx
· * sp800-53-collaboration-index-template.docx
· * sp800-53-collaboration-index-template.xlsx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-control-catalog.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * OLIR_review_800-213A_to_800-53_rev5_final.xlsx
· * Federal_Cybersecurity_Privacy_Forum_2Dec2021_NIST_SP800-53update.pdf
· * Federal_Cybersecurity_and_Privacy_Forum_15Feb2022_What_Is_New_SP800-53ARevision5.pdf
· * Federal_Cybersecurity_Privacy_Professionals_Forum_2Dec2021_FedRAMP_NIST800-53_Rev5.pdf
· * cybersecurity-innovation-forum_01-28-2014.pdf
· * ePACS Overlay_v1_SP800-53rev5-April2021.pdf
· * FPKI Overlay-v1-SP800-53rev5-April2021.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * 2.4 - Main - DOJ Adopting OSCAL to Deliver Lastest NIST SP 800-53 Controls.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * sp800-53-rev4-ipd.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * RMF 2.0 Deep Dive 5-15-18 v3 - Kelley Dempsey Naomi Lefkovitz.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * update-draft-800-53r5-v2.pdf
· * sp800_53_r4_appendix_g_markup_draft2.pdf
· * sp800_53a_r4_draft.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_f_markup_draft2.pdf
· * sp800-53-rev4-ipd.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_d_markup_draft2.pdf
· * sp800-53r5-draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * sp800-53r5-draft-fpd-summary-of-significant-changes.pdf
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * sp800-53r5-draft-fpd-faq.pdf
· * Day_1_AM2_SCRM_Controls_Jon_Boyens.pdf
· * sp800-53r5-draft.pdf
· * 800-53-for-ICS_KEMA.pdf
· * 800-53-Rev4_announcement.pdf
· * 1.5 - Main - SP800-53 Empowered by OSCAL_28Feb2022.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * appxi_800-53-rev1-augmented_15may07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP_800-53B_derived-OSCAL.pdf
· * sp_800-53_v5_1-derived-oscal.pdf
· * SP_800-53_v5_1-derived-OSCAL.pdf
· * sp800_53a_r4_draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft.pdf
· * 800-53-for-ICS_KEMA.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * sp800-53r5-fpd-controls.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * 800-53 automation workflow.pdf
· * 800-53-rev4-controls.csv
· * 800-53-rev4-controls.xml
· * 800-53-rev3-controls.xml
· * 800-53-rev3-controls.csv
· * SP800-177-Rev-1-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_LOW-baseline_profile_load.csv
· * NIST_SP-800-53_rev5-derived-OSCAL.xlsx
· * SP800-161-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_PRIVACY-baseline_profile_load.csv
· * NIST_SP-800-53_rev5_MODERATE-baseline_profile_load.csv
· * SP800-82-Rev-2-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_catalog_load.csv
· * NIST_SP-800-53_rev5_HIGH-baseline_profile_load.csv
· * sp800-53r5-draft-fpd-comparison-with-rev4.xlsx
· * stig-mapping-to-nist-800-53.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-draft-fpd-comment-template.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53ar5-draft-comment-template.xlsx
· * sp800-53ar5-draft-comment-template.xlsx
· * 800-53a-rev4-objectives.csv
· * 800-53a-rev4-objectives.xml
· * 800-53A-rev3-objectives.xml
· * SP800-53-control-comment-template.xlsx
· * WIP_800_53_Rev_5_to_Framework_v_1_1.xlsx
· * sp80053-focal-elements.csv
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * sp80053-focal-details.csv
· * SP_800-53_v5_1_XML.xml
· * NIST_SP-800-53B-derived-OSCAL.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * NIST SP 800-53B-Jan2022.xlsx
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * 800_53_rev_4_focal_document_template.xlsx
· * 800_53_Rev_4_Focal_Document_Template.xlsx
· * WIP_Framework_v_1_1_to_800_53_Rev5.xlsx
· * WIP_800_53_Rev_4_to_Framework_v_1_1.xlsx
· * sp800-53B-draft-comment-template.xlsx
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
* [SP 800-58]+2 – Security Considerations for Voice Over IP Systems
* [SP 800-65]+3 – Integrating IT Security into the Capital Planning and Investment Control Process
* [SP 800-66r1]+9 – An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act Security Rule
* [SP 800-70]+12 – Security Configuration Checklists Program for IT Products
* [SP 800-73]+44 – Interfaces for Personal Identity Verification
* [SP 800-76]+16 – Biometric Data Specification for Personal Identity Verification
* [SP 800-78]+20 – Cryptographic Algorithms and Key Sizes for Personal Identity Verification
* [SP 800-79]+10 – Guidelines for the Accreditation of Personal Identity Verification (PIV) Card Issuers (PCI's)
* [SP 800-85A]+17 – PIV Card Application and Middleware Interface Test Guidelines (SP 800-73 compliance)
* [SP 800-85B]+14 – PIV Data Model Test Guidelines
* [SP 800-97]+2 – Guide to IEEE 802.11i: Robust Security Networks
+ SMART CARDS
* [August 2005]+9 – Implementation Of FIPS 201, Personal Identity Verification (PIV) Of Federal Employees And Contractors
* [FIPS 201]+374 – Personal Identity Verification for Federal Employees and Contractors
* [January 2006]+3 – Testing And Validation Of Personal Identity Verification (PIV) Components And Subsystems For Conformance To Federal Information Processing Standard 201
* [July 2002]+4 – Overview: The Government Smart Card Interoperability Specification
* [March 2005]+13 – Personal Identity Verification (PIV) Of Federal Employees And Contractors: Federal Information Processing Standard (FIPS) 201
* [IR 6887]+2 – Government Smart Card Interoperability Specification (GSC-IS), v2.1
* [IR 7056]+2 – Card Technology Development and Gap Analysis Interagency Report
* [IR 7206]+1 – Smart Cards and Mobile Device Authentication: An Overview and Implementation
* [IR 7284]+2 – Personal Identity Verification Card Management Report
* [IR 7313]+1 – 5th Annual PKI R&D Workshop “Making PKI Easy to Use” Proceedings
* [IR 7452]+2 – Secure Biometric Match-on-Card Feasibility Report
* [IR 7539]+1 – Symmetric Key Injection onto Smart Cards
* [SP 800-104] – A Scheme for PIV Visual Card Topography
* [SP 800-116]+12 – A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
* [SP 800-73]+44 – Interfaces for Personal Identity Verification
* [SP 800-78]+20 – Cryptographic Algorithms and Key Sizes for Personal Identity Verification
* [SP 800-85A]+17 – PIV Card Application and Middleware Interface Test Guidelines (SP 800-73 compliance)
+ VIRUSES & MALWARE
* [IR 7435]+2 – The Common Vulnerability Scoring System (CVSS) and its Applicability to Federal Agency Systems
* [SP 800-124]+11 – Guidelines on Cell Phone and PDA Security
* [SP 800-19]+4 – Mobile Agent Security
* [SP 800-28r2]+2 – Guidelines on Active Content and Mobile Code
* [SP 800-46 Rev]+10 – Guide to Enterprise Telework and Remote Access Security
* [SP 800-53 Rev]+235 – Recommended Security Controls for Federal Information Systems and Organizations
· * NIST SP 800-053Ar4 Assessing Security and Privacy Controls in Federal Information Systems and Organizations; Building Effective Assessment Plans, 2014-12-18 (Final).pdf
· * NIST SP 800-053r2 Recommended Security Controls for Fed Info Systems, 2007-12 (final).pdf
· * alt-SP800-53-rev3-final_updated-errata_05-01-2010.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r2 to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r3FPD to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 2 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 1 (Errata), 2010-05-01.pdf
· * NIST SP 800-053Ar1 Guide for Assessing the Security Controls in Federal Information Systems and Organizations, 2010-06-29.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2013-05-07.pdf
· * NIST SP 800-053r5 Security and Privacy Controls for Information Systems and Organizations, 2017-08-15 (Draft).pdf
· * NIST SP 800-053r4_final_word_errata_01_22_2015.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations Controls (Errata), 2014-01-15.xml
· * NIST SP 800-053A Guide for Assessing the Security Controls in Fed Info Systems, 2008-06.pdf
· * NIST SP 800-053r5-draft-controls-markup.pdf
· * alt-SP800-53r4.pdf
· * alt-SP800-53Ar4.pdf
· * alt-SP800-53.pdf
· * alt-SP800-53r5-draft.pdf
· * NIST SP 800-053r5-draft-baselines-markup.pdf
· * NIST SP 800-053-controls.xml
· * NIST SP 800-053a_r4_errata_12_18_2014.docx
· * sp800-53A-rev1-final.pdf
· * 800-53-rev1-final-clean-sz.pdf
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53r4_summary.pdf
· * NIST.SP.800-53r4.pdf
· * nist.sp.800-53ar4.pdf
· * NIST.SP.800-53Ar4.pdf
· * nist.sp.800-53r4.pdf
· * nistspecialpublication800-53r3.pdf
· * nistspecialpublication800-53r2.pdf
· * nistspecialpublication800-53r1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53a.pdf
· * nistspecialpublication800-53a.pdf
· * NIST.SP.800-53r5.pdf
· * nistspecialpublication800-53.pdf
· * nist.sp.800-53r5.pdf
· * NIST.SP.800-53Ar5.pdf
· * NIST.SP.800-53B.pdf
· * 800-53-rev1-annex3-sz.pdf
· * 800-53-rev1-annex2-sz.pdf
· * 800-53-rev1-annex1-sz.pdf
· * NIST.SP.800-53r5-draft.pdf
· * nist.sp.800-53r5-draft.pdf
· * NIST.SP.800-53Ar5-draft.pdf
· * NIST.SP.800-53B-draft.pdf
· * sp800_53a_r4_errata_12_18_2014.docx
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * DOJ_CSAM_Planning_for_Implementing_SP-800-53_Rev5_FINAL.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * apply-sp-800-53-ics-final-22aug06.pdf
· * NIST_SP_800-53_Comment_Site_User_Guide_FINAL_8Sept2021.pdf
· * ics-in-sp800-53_final_21mar07.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * ics-in-sp800-53_final_21Mar07.pdf
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53-collaboration-index-template.docx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53-collaboration-index-template.xlsx
· * sp800-53r5-control-catalog.xlsx
· * sp800-53-collaboration-index-template.docx
· * sp800-53-collaboration-index-template.xlsx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-control-catalog.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * OLIR_review_800-213A_to_800-53_rev5_final.xlsx
· * Federal_Cybersecurity_Privacy_Forum_2Dec2021_NIST_SP800-53update.pdf
· * Federal_Cybersecurity_and_Privacy_Forum_15Feb2022_What_Is_New_SP800-53ARevision5.pdf
· * Federal_Cybersecurity_Privacy_Professionals_Forum_2Dec2021_FedRAMP_NIST800-53_Rev5.pdf
· * cybersecurity-innovation-forum_01-28-2014.pdf
· * ePACS Overlay_v1_SP800-53rev5-April2021.pdf
· * FPKI Overlay-v1-SP800-53rev5-April2021.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * 2.4 - Main - DOJ Adopting OSCAL to Deliver Lastest NIST SP 800-53 Controls.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * sp800-53-rev4-ipd.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * RMF 2.0 Deep Dive 5-15-18 v3 - Kelley Dempsey Naomi Lefkovitz.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * update-draft-800-53r5-v2.pdf
· * sp800_53_r4_appendix_g_markup_draft2.pdf
· * sp800_53a_r4_draft.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_f_markup_draft2.pdf
· * sp800-53-rev4-ipd.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_d_markup_draft2.pdf
· * sp800-53r5-draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * sp800-53r5-draft-fpd-summary-of-significant-changes.pdf
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * sp800-53r5-draft-fpd-faq.pdf
· * Day_1_AM2_SCRM_Controls_Jon_Boyens.pdf
· * sp800-53r5-draft.pdf
· * 800-53-for-ICS_KEMA.pdf
· * 800-53-Rev4_announcement.pdf
· * 1.5 - Main - SP800-53 Empowered by OSCAL_28Feb2022.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * appxi_800-53-rev1-augmented_15may07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP_800-53B_derived-OSCAL.pdf
· * sp_800-53_v5_1-derived-oscal.pdf
· * SP_800-53_v5_1-derived-OSCAL.pdf
· * sp800_53a_r4_draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft.pdf
· * 800-53-for-ICS_KEMA.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * sp800-53r5-fpd-controls.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * 800-53 automation workflow.pdf
· * 800-53-rev4-controls.csv
· * 800-53-rev4-controls.xml
· * 800-53-rev3-controls.xml
· * 800-53-rev3-controls.csv
· * SP800-177-Rev-1-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_LOW-baseline_profile_load.csv
· * NIST_SP-800-53_rev5-derived-OSCAL.xlsx
· * SP800-161-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_PRIVACY-baseline_profile_load.csv
· * NIST_SP-800-53_rev5_MODERATE-baseline_profile_load.csv
· * SP800-82-Rev-2-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_catalog_load.csv
· * NIST_SP-800-53_rev5_HIGH-baseline_profile_load.csv
· * sp800-53r5-draft-fpd-comparison-with-rev4.xlsx
· * stig-mapping-to-nist-800-53.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-draft-fpd-comment-template.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53ar5-draft-comment-template.xlsx
· * sp800-53ar5-draft-comment-template.xlsx
· * 800-53a-rev4-objectives.csv
· * 800-53a-rev4-objectives.xml
· * 800-53A-rev3-objectives.xml
· * SP800-53-control-comment-template.xlsx
· * WIP_800_53_Rev_5_to_Framework_v_1_1.xlsx
· * sp80053-focal-elements.csv
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * sp80053-focal-details.csv
· * SP_800-53_v5_1_XML.xml
· * NIST_SP-800-53B-derived-OSCAL.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * NIST SP 800-53B-Jan2022.xlsx
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * 800_53_rev_4_focal_document_template.xlsx
· * 800_53_Rev_4_Focal_Document_Template.xlsx
· * WIP_Framework_v_1_1_to_800_53_Rev5.xlsx
· * WIP_800_53_Rev_4_to_Framework_v_1_1.xlsx
· * sp800-53B-draft-comment-template.xlsx
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
* [SP 800-61]+10 – Computer Security Incident Handling Guide
* [SP 800-83]+7 – Guide to Malware Incident Prevention and Handling
+ HISTORICAL ARCHIVES
* [April 1997] – Security Considerations In Computer Support And Operations
* [April 1998]+6 – Training Requirements for Information Technology Security: An Introduction to Results-Based Learning
* [August 1990] – Computer Virus Attacks
* [August 1993] – Security Program Management
* [August 1995] – FIPS 140-1: A Framework for Cryptographic Standards
* [August 1996] – Implementation Issues for Cryptography
* [August 1999]+1 – The Advanced Encryption Standard: A Status Report
* [December 1999]+3 – Operating System Security: Adding to the Arsenal of Security Techniques
* [February 1991] – Computer Security Roles of NIST and NSA
* [February 1992]+1 – Establishing a Computer Security Incident Handling Capability
* [February 1995] – The Data Encryption Standard: An Update
* [February 1996] – Human/Computer Interface Security Issue
* [February 1997]+3 – Advanced Encryption Standard
* [February 1998]+3 – Information Security and the World Wide Web (WWW)
* [February 1999]+2 – Enhancements to Data Encryption and Digital Signature Federal Standards
* [January 1994] – Computer Security Policy
* [January 1997] – Security Issues for Telecommuting
* [January 1999] – Secure Web-Based Access to High Performance Computing Resources
* [July 1993] – Connecting to the Internet: Security Considerations
* [July 1997]+1 – Public Key Infrastructure Technology
* [July 2000]+4 – Identifying Critical Patches With ICat
* [July 2001] – A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2
* [June 1996] – Information Security Policies For Changing Information Technology Environments
* [June 1998]+1 – Training for Information Technology Security: Evaluating the Effectiveness of Results-Based Learning
* [June 2000]+19 – Mitigating Emerging Hacker Threats
* [March 1994]+1 – Threats to Computer Systems: An Overview
* [May 1993] – Security Issues in Public Access Systems
* [May 1994] – Reducing the Risks of Internet Connection and Use
* [May 1996] – The World Wide Web: Managing Security Risks
* [IR 4734] – Foundations of a Security Policy for use of the National Research and Educational Network
* [IR 4749] – Sample Statements of Work for Federal Computer Security Services: For use In-House or Contracting Out
* [IR 4774] – A Review of U.S. and European Security Evaluation Criteria
* [IR 4939]+2 – Threat Assessment of Malicious Code and External Attacks
* [IR 4976]+1 – Assessing Federal and Commercial Information Security Needs
* [IR 5153] – Minimum Security Requirements for Multi-User Operating Systems
* [IR 5232] – Report of the NSF/NIST Workshop on NSFNET/NREN Security, July 6-7, 1992
* [IR 5234] – Report of the NIST Workshop on Digital Signature Certificate Management, December 10-11, 1992
* [IR 5308] – General Procedures for Registering Computer Security Objects
* [IR 5472]+2 – A Head Start on Assurance Proceedings of an Invitational Workshop on Information Technology (IT) Assurance and Trustworthiness
* [IR 5495]+1 – Computer Security Training & Awareness Course Compendium
* [IR 6390]+1 – Randomness Testing of the Advanced Encryption Standard Candidate Algorithms
* [IR 6483]+1 – Randomness Testing of the Advanced Encryption Standard Finalist Candidates1
* [November 1991] – Advanced Authentication Technology
* [November 1992]+1 – Sensitivity of Information
* [November 1994]+2 – Digital Signature Standard
* [November 1997]+1 – Internet Electronic Mail
* [November 1998]+1 – Common Criteria: Launching the International Standard
* [November 1999]+1 – Acquiring and Deploying Intrusion Detection Systems
* [October 1992]+2 – Disposition of Sensitive Automated Information
* [October 1996] – Generally Accepted System Security Principles (GSSPs): Guidance On Securing Information Technology (IT) Systems
* [October 2000]+3 – An Overview Of The Common Criteria Evaluation And Validation Scheme
* [SP 800-13]+6 – Telecommunications Security Guidelines for Telecommunications Management Network
* [SP 800-29]+2 – A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2
* [September 1998]+1 – Cryptography Standards and Infrastructures for the Twenty-First Century
* [September 1999]+4 – Securing Web Servers
+ ACCESS CONTROL
* [FIPS 188]+5 – Standard Security Labels for Information Transfer
* [FIPS 200]+2 – Minimum Security Requirements for Federal Information and Information Systems
* [FIPS 201]+374 – Personal Identity Verification for Federal Employees and Contractors
* [SP 800-100]+1 – Information Security Handbook: A Guide for Managers
* [SP 800-104] – A Scheme for PIV Visual Card Topography
* [SP 800-113]+2 – Guide to SSL VPNs
* [SP 800-114]+7 – User's Guide to Securing External Devices for Telework and Remote Access
* [SP 800-116]+12 – A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
* [SP 800-12]+23 – An Introduction to Computer Security: The NIST Handbook
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, 1995-10.pdf
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 2, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 1, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 5, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 4, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 3, 1995-10.ps
· * derived-piv-nist-sp1800-12b-v2.pdf
· * derived-piv-nist-sp1800-12a-v2.pdf
· * derived-piv-nist-sp1800-12c-v2.pdf
· * derived-piv-nist-sp1800-12-v2.pdf
· * derived-piv-nist-sp1800-12-draft.pdf
· * derived-piv-nist-sp1800-12c-draft.pdf
· * derived-piv-nist-sp1800-12a-draft.pdf
· * derived-piv-nist-sp1800-12b-draft.pdf
· * NIST.SP.800-12r1.pdf
· * NIST.SP.1800-12.pdf
· * nistspecialpublication800-12.pdf
· * 800-12_4.ps
· * 800-12_5.ps
· * 800-12_1.ps
· * 800-12_2.ps
· * 800-12_3.ps
· * sp800_12_r1_draft.pdf
* [SP 800-121]+15 – Guide to Bluetooth Security
* [SP 800-123]+7 – Guide to General Server Security
* [SP 800-124]+11 – Guidelines on Cell Phone and PDA Security
* [SP 800-14]+8 – Generally Accepted Principles and Practices for Securing Information Technology Systems
* [SP 800-19]+4 – Mobile Agent Security
* [SP 800-24]+3 – PBX Vulnerability Analysis: Finding Holes in Your PBX Before Someone Else Does
* [SP 800-28r2]+2 – Guidelines on Active Content and Mobile Code
* [SP 800-36]+1 – Guide to Selecting Information Technology Security Products
* [SP 800-41]+5 – Guidelines on Firewalls and Firewall Policy
* [SP 800-43]+1 – Systems Administration Guidance for Securing Microsoft Windows 2000 Professional System
* [SP 800-44]+3 – Guidelines on Securing Public Web Servers
* [SP 800-45r2]+3 – Guidelines on Electronic Mail Security
* [SP 800-46r1]+10 – Security for Telecommuting and Broadband Communications
* [SP 800-48r1]+4 – Guide to Securing Legacy IEEE 802.11 Wireless Networks
* [SP 800-53r3]+235 – Recommended Security Controls for Federal Information Systems and Organizations
· * NIST SP 800-053Ar4 Assessing Security and Privacy Controls in Federal Information Systems and Organizations; Building Effective Assessment Plans, 2014-12-18 (Final).pdf
· * NIST SP 800-053r2 Recommended Security Controls for Fed Info Systems, 2007-12 (final).pdf
· * alt-SP800-53-rev3-final_updated-errata_05-01-2010.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r2 to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r3FPD to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 2 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 1 (Errata), 2010-05-01.pdf
· * NIST SP 800-053Ar1 Guide for Assessing the Security Controls in Federal Information Systems and Organizations, 2010-06-29.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2013-05-07.pdf
· * NIST SP 800-053r5 Security and Privacy Controls for Information Systems and Organizations, 2017-08-15 (Draft).pdf
· * NIST SP 800-053r4_final_word_errata_01_22_2015.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations Controls (Errata), 2014-01-15.xml
· * NIST SP 800-053A Guide for Assessing the Security Controls in Fed Info Systems, 2008-06.pdf
· * NIST SP 800-053r5-draft-controls-markup.pdf
· * alt-SP800-53r4.pdf
· * alt-SP800-53Ar4.pdf
· * alt-SP800-53.pdf
· * alt-SP800-53r5-draft.pdf
· * NIST SP 800-053r5-draft-baselines-markup.pdf
· * NIST SP 800-053-controls.xml
· * NIST SP 800-053a_r4_errata_12_18_2014.docx
· * sp800-53A-rev1-final.pdf
· * 800-53-rev1-final-clean-sz.pdf
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53r4_summary.pdf
· * NIST.SP.800-53r4.pdf
· * nist.sp.800-53ar4.pdf
· * NIST.SP.800-53Ar4.pdf
· * nist.sp.800-53r4.pdf
· * nistspecialpublication800-53r3.pdf
· * nistspecialpublication800-53r2.pdf
· * nistspecialpublication800-53r1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53a.pdf
· * nistspecialpublication800-53a.pdf
· * NIST.SP.800-53r5.pdf
· * nistspecialpublication800-53.pdf
· * nist.sp.800-53r5.pdf
· * NIST.SP.800-53Ar5.pdf
· * NIST.SP.800-53B.pdf
· * 800-53-rev1-annex3-sz.pdf
· * 800-53-rev1-annex2-sz.pdf
· * 800-53-rev1-annex1-sz.pdf
· * NIST.SP.800-53r5-draft.pdf
· * nist.sp.800-53r5-draft.pdf
· * NIST.SP.800-53Ar5-draft.pdf
· * NIST.SP.800-53B-draft.pdf
· * sp800_53a_r4_errata_12_18_2014.docx
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * DOJ_CSAM_Planning_for_Implementing_SP-800-53_Rev5_FINAL.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * apply-sp-800-53-ics-final-22aug06.pdf
· * NIST_SP_800-53_Comment_Site_User_Guide_FINAL_8Sept2021.pdf
· * ics-in-sp800-53_final_21mar07.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * ics-in-sp800-53_final_21Mar07.pdf
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53-collaboration-index-template.docx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53-collaboration-index-template.xlsx
· * sp800-53r5-control-catalog.xlsx
· * sp800-53-collaboration-index-template.docx
· * sp800-53-collaboration-index-template.xlsx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-control-catalog.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * OLIR_review_800-213A_to_800-53_rev5_final.xlsx
· * Federal_Cybersecurity_Privacy_Forum_2Dec2021_NIST_SP800-53update.pdf
· * Federal_Cybersecurity_and_Privacy_Forum_15Feb2022_What_Is_New_SP800-53ARevision5.pdf
· * Federal_Cybersecurity_Privacy_Professionals_Forum_2Dec2021_FedRAMP_NIST800-53_Rev5.pdf
· * cybersecurity-innovation-forum_01-28-2014.pdf
· * ePACS Overlay_v1_SP800-53rev5-April2021.pdf
· * FPKI Overlay-v1-SP800-53rev5-April2021.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * 2.4 - Main - DOJ Adopting OSCAL to Deliver Lastest NIST SP 800-53 Controls.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * sp800-53-rev4-ipd.pdf
· * RMF 2.0 Deep Dive 5-15-18 v3 - Kelley Dempsey Naomi Lefkovitz.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * update-draft-800-53r5-v2.pdf
· * sp800_53_r4_appendix_g_markup_draft2.pdf
· * sp800_53a_r4_draft.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_f_markup_draft2.pdf
· * sp800-53-rev4-ipd.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_d_markup_draft2.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * Day_1_AM2_SCRM_Controls_Jon_Boyens.pdf
· * 800-53-for-ICS_KEMA.pdf
· * sp800-53r5-draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft-fpd-summary-of-significant-changes.pdf
· * sp800-53r5-draft-fpd-faq.pdf
· * sp800-53r5-draft.pdf
· * 800-53-Rev4_announcement.pdf
· * 1.5 - Main - SP800-53 Empowered by OSCAL_28Feb2022.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * appxi_800-53-rev1-augmented_15may07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP_800-53B_derived-OSCAL.pdf
· * sp_800-53_v5_1-derived-oscal.pdf
· * SP_800-53_v5_1-derived-OSCAL.pdf
· * sp800_53a_r4_draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft.pdf
· * 800-53-for-ICS_KEMA.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * sp800-53r5-fpd-controls.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * 800-53 automation workflow.pdf
· * 800-53-rev4-controls.csv
· * 800-53-rev4-controls.xml
· * 800-53-rev3-controls.xml
· * 800-53-rev3-controls.csv
· * SP800-177-Rev-1-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_LOW-baseline_profile_load.csv
· * NIST_SP-800-53_rev5-derived-OSCAL.xlsx
· * SP800-161-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_PRIVACY-baseline_profile_load.csv
· * NIST_SP-800-53_rev5_MODERATE-baseline_profile_load.csv
· * SP800-82-Rev-2-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_catalog_load.csv
· * NIST_SP-800-53_rev5_HIGH-baseline_profile_load.csv
· * sp800-53r5-draft-fpd-comparison-with-rev4.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-draft-fpd-comment-template.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53ar5-draft-comment-template.xlsx
· * sp800-53ar5-draft-comment-template.xlsx
· * stig-mapping-to-nist-800-53.xlsx
· * 800-53a-rev4-objectives.csv
· * 800-53a-rev4-objectives.xml
· * 800-53A-rev3-objectives.xml
· * SP800-53-control-comment-template.xlsx
· * WIP_800_53_Rev_5_to_Framework_v_1_1.xlsx
· * sp80053-focal-elements.csv
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * sp80053-focal-details.csv
· * SP_800-53_v5_1_XML.xml
· * NIST_SP-800-53B-derived-OSCAL.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * NIST SP 800-53B-Jan2022.xlsx
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * 800_53_rev_4_focal_document_template.xlsx
· * 800_53_Rev_4_Focal_Document_Template.xlsx
· * WIP_Framework_v_1_1_to_800_53_Rev5.xlsx
· * WIP_800_53_Rev_4_to_Framework_v_1_1.xlsx
· * sp800-53B-draft-comment-template.xlsx
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
* [SP 800-57]+46 – Recommendation on Key Management
· * NIST SP 800-057 Part 3r1 Recommendation for Key Management, Part 3; Application-Specific Key Management Guidance, 2015-01-22 (Final).pdf
· * NIST SP 800-057 Part 2 Recommendation for Key Management, Part 2; Best Practices for Key Management Organization, 2005-08-25 (Final).pdf
· * NIST SP 800-057 Recommendation for Key Management, Part 1; 2005-08 (updated March 9, 2007).pdf
· * NIST SP 800-057 Recommendation for Key Management, Part 2; 2005-08 (updated March 9, 2007).pdf
· * NIST SP 800-057 Recommendation for Key Management; Part 3 Key Management, 2007-03.pdf
· * NIST SP 800-057 Part 2r1 Recommendation for Key Management, Part 2; Best Practices for Key Management Organizations (2nd Draft), 2018-11-20 (Draft).pdf
· * NIST SP 800-057pt1r4_commentsreceived.pdf
· * alt-SP800-57part1rev4.pdf
· * alt-SP800-57part1rev3_general.pdf
· * NIST SP 800-057-pt2-draft-comments-received-apr2005.pdf
· * alt-SP800-57part3rev1.pdf
· * alt-SP800-57part2.pdf
· * sp800-57pt1r4_comments_received.pdf
· * nistspecialpublication800-57p1r3.pdf
· * nistspecialpublication800-57p1r2006.pdf
· * nistspecialpublication800-57p1r2007.pdf
· * nist.sp.800-57pt3r1.pdf
· * NIST.SP.800-57pt2r1.pdf
· * NIST.SP.800-57Pt3r1.pdf
· * sp800-57-Part1-revised2_Mar08-2007.pdf
· * nistspecialpublication800-57p2.pdf
· * NIST.SP.800-57pt1r5.pdf
· * nist.sp.800-57pt1r5.pdf
· * nistspecialpublication800-57p3.pdf
· * nistspecialpublication800-57p1.pdf
· * sp800-57_part1_rev3_general.pdf
· * NIST.SP.800-57pt1r5-draft.pdf
· * SP800-57-Part2.pdf
· * sp800-57pt1r4_comments_received.pdf
· * sp800-57pt1r4_draft_track_changes_from_rev3_to_rev4.pdf
· * sp800-57p1r4_draft.pdf
· * sp800-57-pt2-draft-comments-received-apr2005.pdf
· * sp800_57_pt3_r1_draft.pdf
· * SP80057TranPlan.pdf
· * SP80057TranPlan.pdf
· * sp800_57_pt3_r1_draft.pdf
· * CommentsSP800-57-1.pdf
· * Draft_SP800-57-Part1-Rev3_May2011.pdf
· * sp800-57-pt1-draft-apr2005-comments.pdf
· * sp800-57-pt1-draft-apr2005.pdf
· * sp800-57pt2-r1-draft.pdf
· * sp800-57pt2-r1-draft.pdf
· * sp800-57pt2-r1-draft2.pdf
· * sp800-57-pt1-draft-Jan2003.pdf
· * sp800-57-pt1-draft-Jan2003-comments.pdf
· * CommentsSP800-57Part2.pdf
* [SP 800-58]+2 – Security Considerations for Voice Over IP Systems
* [SP 800-63r1]+42 – Electronic Authentication Guideline
* [SP 800-66r1]+9 – An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act Security Rule
* [SP 800-68r1]+6 – Guide to Securing Microsoft Windows XP Systems for IT Professionals
* [SP 800-73]+44 – Interfaces for Personal Identity Verification
* [SP 800-76]+16 – Biometric Data Specification for Personal Identity Verification
* [SP 800-77]+4 – Guide to IPSec VPNs
* [SP 800-78]+20 – Cryptographic Algorithms and Key Sizes for Personal Identity Verification
* [SP 800-81]+6 – Secure Domain Name System (DNS) Deployment Guide
* [SP 800-83]+7 – Guide to Malware Incident Prevention and Handling
* [SP 800-87]+6 – Codes for the Identification of Federal and Federally-Assisted Organizations
* [SP 800-96]+2 – PIV Card / Reader Interoperability Guidelines
* [SP 800-97]+2 – Guide to IEEE 802.11i: Robust Security Networks
+ CERTIFICATION, ACCREDITATION, & SECURITY ASSESSMENTS
* [FIPS 200]+2 – Minimum Security Requirements for Federal Information and Information Systems
* [SP 800-100]+1 – Information Security Handbook: A Guide for Managers
* [SP 800-115]+7 – Technical Guide to Information Security Testing and Assessment
* [SP 800-12]+23 – An Introduction to Computer Security: The NIST Handbook
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, 1995-10.pdf
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 2, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 1, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 5, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 4, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 3, 1995-10.ps
· * derived-piv-nist-sp1800-12b-v2.pdf
· * derived-piv-nist-sp1800-12a-v2.pdf
· * derived-piv-nist-sp1800-12c-v2.pdf
· * derived-piv-nist-sp1800-12-v2.pdf
· * derived-piv-nist-sp1800-12-draft.pdf
· * derived-piv-nist-sp1800-12c-draft.pdf
· * derived-piv-nist-sp1800-12a-draft.pdf
· * derived-piv-nist-sp1800-12b-draft.pdf
· * NIST.SP.800-12r1.pdf
· * NIST.SP.1800-12.pdf
· * nistspecialpublication800-12.pdf
· * 800-12_4.ps
· * 800-12_5.ps
· * 800-12_1.ps
· * 800-12_2.ps
· * 800-12_3.ps
· * sp800_12_r1_draft.pdf
* [SP 800-14]+8 – Generally Accepted Principles and Practices for Securing Information Technology Systems
* [SP 800-17]+10 – Modes of Operation Validation System (MOVS): Requirements and Procedures
* [SP 800-18r1]+11 – Guide for Developing Security Plans for Information Systems
* [SP 800-20]+2 – Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS): Requirements and Procedures
* [SP 800-22r1]+12 – A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
* [SP 800-23]+3 – Guideline to Federal Organizations on Security Assurance and Acquisition/Use of Tested/Evaluated Products
* [SP 800-30]+12 – Risk Management Guide for Information Technology Systems
* [SP 800-35]+1 – Guide to Information Technology Security Services
* [SP 800-36]+1 – Guide to Selecting Information Technology Security Products
* [SP 800-37]+39 – Guide for Security Certification and Accreditation of Federal Information Systems
* [SP 800-47]+4 – Security Guide for Interconnecting Information Technology Systems
* [SP 800-53r3]+235 – Recommended Security Controls for Federal Information Systems and Organizations
· * NIST SP 800-053Ar4 Assessing Security and Privacy Controls in Federal Information Systems and Organizations; Building Effective Assessment Plans, 2014-12-18 (Final).pdf
· * NIST SP 800-053r2 Recommended Security Controls for Fed Info Systems, 2007-12 (final).pdf
· * alt-SP800-53-rev3-final_updated-errata_05-01-2010.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r2 to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r3FPD to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 2 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 1 (Errata), 2010-05-01.pdf
· * NIST SP 800-053Ar1 Guide for Assessing the Security Controls in Federal Information Systems and Organizations, 2010-06-29.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2013-05-07.pdf
· * NIST SP 800-053r5 Security and Privacy Controls for Information Systems and Organizations, 2017-08-15 (Draft).pdf
· * NIST SP 800-053r4_final_word_errata_01_22_2015.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations Controls (Errata), 2014-01-15.xml
· * NIST SP 800-053A Guide for Assessing the Security Controls in Fed Info Systems, 2008-06.pdf
· * NIST SP 800-053r5-draft-controls-markup.pdf
· * alt-SP800-53r4.pdf
· * alt-SP800-53Ar4.pdf
· * alt-SP800-53.pdf
· * alt-SP800-53r5-draft.pdf
· * NIST SP 800-053r5-draft-baselines-markup.pdf
· * NIST SP 800-053-controls.xml
· * NIST SP 800-053a_r4_errata_12_18_2014.docx
· * sp800-53A-rev1-final.pdf
· * 800-53-rev1-final-clean-sz.pdf
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53r4_summary.pdf
· * NIST.SP.800-53r4.pdf
· * nist.sp.800-53ar4.pdf
· * NIST.SP.800-53Ar4.pdf
· * nist.sp.800-53r4.pdf
· * nistspecialpublication800-53r3.pdf
· * nistspecialpublication800-53r2.pdf
· * nistspecialpublication800-53r1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53a.pdf
· * nistspecialpublication800-53a.pdf
· * NIST.SP.800-53r5.pdf
· * nistspecialpublication800-53.pdf
· * nist.sp.800-53r5.pdf
· * NIST.SP.800-53Ar5.pdf
· * NIST.SP.800-53B.pdf
· * 800-53-rev1-annex3-sz.pdf
· * 800-53-rev1-annex2-sz.pdf
· * 800-53-rev1-annex1-sz.pdf
· * NIST.SP.800-53r5-draft.pdf
· * nist.sp.800-53r5-draft.pdf
· * NIST.SP.800-53Ar5-draft.pdf
· * NIST.SP.800-53B-draft.pdf
· * sp800_53a_r4_errata_12_18_2014.docx
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * DOJ_CSAM_Planning_for_Implementing_SP-800-53_Rev5_FINAL.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * apply-sp-800-53-ics-final-22aug06.pdf
· * NIST_SP_800-53_Comment_Site_User_Guide_FINAL_8Sept2021.pdf
· * ics-in-sp800-53_final_21mar07.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * ics-in-sp800-53_final_21Mar07.pdf
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53-collaboration-index-template.docx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53-collaboration-index-template.xlsx
· * sp800-53r5-control-catalog.xlsx
· * sp800-53-collaboration-index-template.docx
· * sp800-53-collaboration-index-template.xlsx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-control-catalog.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * OLIR_review_800-213A_to_800-53_rev5_final.xlsx
· * Federal_Cybersecurity_Privacy_Forum_2Dec2021_NIST_SP800-53update.pdf
· * Federal_Cybersecurity_and_Privacy_Forum_15Feb2022_What_Is_New_SP800-53ARevision5.pdf
· * Federal_Cybersecurity_Privacy_Professionals_Forum_2Dec2021_FedRAMP_NIST800-53_Rev5.pdf
· * cybersecurity-innovation-forum_01-28-2014.pdf
· * ePACS Overlay_v1_SP800-53rev5-April2021.pdf
· * FPKI Overlay-v1-SP800-53rev5-April2021.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * 2.4 - Main - DOJ Adopting OSCAL to Deliver Lastest NIST SP 800-53 Controls.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * sp800-53-rev4-ipd.pdf
· * RMF 2.0 Deep Dive 5-15-18 v3 - Kelley Dempsey Naomi Lefkovitz.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * update-draft-800-53r5-v2.pdf
· * sp800_53_r4_appendix_g_markup_draft2.pdf
· * sp800_53a_r4_draft.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_f_markup_draft2.pdf
· * sp800-53-rev4-ipd.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_d_markup_draft2.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * Day_1_AM2_SCRM_Controls_Jon_Boyens.pdf
· * 800-53-for-ICS_KEMA.pdf
· * sp800-53r5-draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft-fpd-summary-of-significant-changes.pdf
· * sp800-53r5-draft-fpd-faq.pdf
· * sp800-53r5-draft.pdf
· * 800-53-Rev4_announcement.pdf
· * 1.5 - Main - SP800-53 Empowered by OSCAL_28Feb2022.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * appxi_800-53-rev1-augmented_15may07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP_800-53B_derived-OSCAL.pdf
· * sp_800-53_v5_1-derived-oscal.pdf
· * SP_800-53_v5_1-derived-OSCAL.pdf
· * sp800_53a_r4_draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft.pdf
· * 800-53-for-ICS_KEMA.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * sp800-53r5-fpd-controls.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * 800-53 automation workflow.pdf
· * 800-53-rev4-controls.csv
· * 800-53-rev4-controls.xml
· * 800-53-rev3-controls.xml
· * 800-53-rev3-controls.csv
· * SP800-177-Rev-1-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_LOW-baseline_profile_load.csv
· * NIST_SP-800-53_rev5-derived-OSCAL.xlsx
· * SP800-161-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_PRIVACY-baseline_profile_load.csv
· * NIST_SP-800-53_rev5_MODERATE-baseline_profile_load.csv
· * SP800-82-Rev-2-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_catalog_load.csv
· * NIST_SP-800-53_rev5_HIGH-baseline_profile_load.csv
· * sp800-53r5-draft-fpd-comparison-with-rev4.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-draft-fpd-comment-template.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53ar5-draft-comment-template.xlsx
· * sp800-53ar5-draft-comment-template.xlsx
· * stig-mapping-to-nist-800-53.xlsx
· * 800-53a-rev4-objectives.csv
· * 800-53a-rev4-objectives.xml
· * 800-53A-rev3-objectives.xml
· * SP800-53-control-comment-template.xlsx
· * WIP_800_53_Rev_5_to_Framework_v_1_1.xlsx
· * sp80053-focal-elements.csv
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * sp80053-focal-details.csv
· * SP_800-53_v5_1_XML.xml
· * NIST_SP-800-53B-derived-OSCAL.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * NIST SP 800-53B-Jan2022.xlsx
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * 800_53_rev_4_focal_document_template.xlsx
· * 800_53_Rev_4_Focal_Document_Template.xlsx
· * WIP_Framework_v_1_1_to_800_53_Rev5.xlsx
· * WIP_800_53_Rev_4_to_Framework_v_1_1.xlsx
· * sp800-53B-draft-comment-template.xlsx
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
* [SP 800-53A]+79 – Guide for Assessing the Security Controls in Federal Information Systems
* [SP 800-55r1]+8 – Performance Measurement Guide for Information Security
* [SP 800-65r1]+3 – Integrating Security into the Capital Planning and Investment Control Process
* [SP 800-66r1]+9 – An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act Security Rule
* [SP 800-76]+16 – Biometric Data Specification for Personal Identity Verification
* [SP 800-79]+10 – Guidelines for the Accreditation of Personal Identity Verification (PIV) Card Issuers (PCI's)
* [SP 800-85A]+17 – PIV Card Application and Middleware Interface Test Guidelines (SP 800-73 compliance)
* [SP 800-85B]+14 – PIV Data Model Test Guidelines
+ CONFIGURATION MANAGEMENT
* [FIPS 200]+2 – Minimum Security Requirements for Federal Information and Information Systems
* [SP 800-100]+1 – Information Security Handbook: A Guide for Managers
* [SP 800-111]+2 – Guide to Storage Encryption Technologies for End User Devices
* [SP 800-114]+7 – User's Guide to Securing External Devices for Telework and Remote Access
* [SP 800-12]+23 – An Introduction to Computer Security: The NIST Handbook
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, 1995-10.pdf
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 2, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 1, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 5, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 4, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 3, 1995-10.ps
· * derived-piv-nist-sp1800-12b-v2.pdf
· * derived-piv-nist-sp1800-12a-v2.pdf
· * derived-piv-nist-sp1800-12c-v2.pdf
· * derived-piv-nist-sp1800-12-v2.pdf
· * derived-piv-nist-sp1800-12-draft.pdf
· * derived-piv-nist-sp1800-12c-draft.pdf
· * derived-piv-nist-sp1800-12a-draft.pdf
· * derived-piv-nist-sp1800-12b-draft.pdf
· * NIST.SP.800-12r1.pdf
· * NIST.SP.1800-12.pdf
· * nistspecialpublication800-12.pdf
· * 800-12_4.ps
· * 800-12_5.ps
· * 800-12_1.ps
· * 800-12_2.ps
· * 800-12_3.ps
· * sp800_12_r1_draft.pdf
* [SP 800-121]+15 – Guide to Bluetooth Security
* [SP 800-123]+7 – Guide to General Server Security
* [SP 800-124]+11 – Guidelines on Cell Phone and PDA Security
* [SP 800-14]+8 – Generally Accepted Principles and Practices for Securing Information Technology Systems
* [SP 800-35]+1 – Guide to Information Technology Security Services
* [SP 800-37]+39 – Guide for Security Certification and Accreditation of Federal Information Systems
* [SP 800-40]+11 – Creating a Patch and Vulnerability Management Program
* [SP 800-44]+3 – Guidelines on Securing Public Web Servers
* [SP 800-45]+3 – Guidelines on Electronic Mail Security
* [SP 800-46r1]+10 – Security for Telecommuting and Broadband Communications
* [SP 800-48r1]+4 – Guide to Securing Legacy IEEE 802.11 Wireless Networks
* [SP 800-53r3]+235 – Recommended Security Controls for Federal Information Systems and Organizations
· * NIST SP 800-053Ar4 Assessing Security and Privacy Controls in Federal Information Systems and Organizations; Building Effective Assessment Plans, 2014-12-18 (Final).pdf
· * NIST SP 800-053r2 Recommended Security Controls for Fed Info Systems, 2007-12 (final).pdf
· * alt-SP800-53-rev3-final_updated-errata_05-01-2010.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r2 to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r3FPD to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 2 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 1 (Errata), 2010-05-01.pdf
· * NIST SP 800-053Ar1 Guide for Assessing the Security Controls in Federal Information Systems and Organizations, 2010-06-29.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2013-05-07.pdf
· * NIST SP 800-053r5 Security and Privacy Controls for Information Systems and Organizations, 2017-08-15 (Draft).pdf
· * NIST SP 800-053r4_final_word_errata_01_22_2015.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations Controls (Errata), 2014-01-15.xml
· * NIST SP 800-053A Guide for Assessing the Security Controls in Fed Info Systems, 2008-06.pdf
· * NIST SP 800-053r5-draft-controls-markup.pdf
· * alt-SP800-53r4.pdf
· * alt-SP800-53Ar4.pdf
· * alt-SP800-53.pdf
· * alt-SP800-53r5-draft.pdf
· * NIST SP 800-053r5-draft-baselines-markup.pdf
· * NIST SP 800-053-controls.xml
· * NIST SP 800-053a_r4_errata_12_18_2014.docx
· * sp800-53A-rev1-final.pdf
· * 800-53-rev1-final-clean-sz.pdf
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53r4_summary.pdf
· * NIST.SP.800-53r4.pdf
· * nist.sp.800-53ar4.pdf
· * NIST.SP.800-53Ar4.pdf
· * nist.sp.800-53r4.pdf
· * nistspecialpublication800-53r3.pdf
· * nistspecialpublication800-53r2.pdf
· * nistspecialpublication800-53r1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53a.pdf
· * nistspecialpublication800-53a.pdf
· * NIST.SP.800-53r5.pdf
· * nistspecialpublication800-53.pdf
· * nist.sp.800-53r5.pdf
· * NIST.SP.800-53Ar5.pdf
· * NIST.SP.800-53B.pdf
· * 800-53-rev1-annex3-sz.pdf
· * 800-53-rev1-annex2-sz.pdf
· * 800-53-rev1-annex1-sz.pdf
· * NIST.SP.800-53r5-draft.pdf
· * nist.sp.800-53r5-draft.pdf
· * NIST.SP.800-53Ar5-draft.pdf
· * NIST.SP.800-53B-draft.pdf
· * sp800_53a_r4_errata_12_18_2014.docx
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * DOJ_CSAM_Planning_for_Implementing_SP-800-53_Rev5_FINAL.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * apply-sp-800-53-ics-final-22aug06.pdf
· * NIST_SP_800-53_Comment_Site_User_Guide_FINAL_8Sept2021.pdf
· * ics-in-sp800-53_final_21mar07.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * ics-in-sp800-53_final_21Mar07.pdf
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53-collaboration-index-template.docx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53-collaboration-index-template.xlsx
· * sp800-53r5-control-catalog.xlsx
· * sp800-53-collaboration-index-template.docx
· * sp800-53-collaboration-index-template.xlsx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-control-catalog.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * OLIR_review_800-213A_to_800-53_rev5_final.xlsx
· * Federal_Cybersecurity_Privacy_Forum_2Dec2021_NIST_SP800-53update.pdf
· * Federal_Cybersecurity_and_Privacy_Forum_15Feb2022_What_Is_New_SP800-53ARevision5.pdf
· * Federal_Cybersecurity_Privacy_Professionals_Forum_2Dec2021_FedRAMP_NIST800-53_Rev5.pdf
· * cybersecurity-innovation-forum_01-28-2014.pdf
· * ePACS Overlay_v1_SP800-53rev5-April2021.pdf
· * FPKI Overlay-v1-SP800-53rev5-April2021.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * 2.4 - Main - DOJ Adopting OSCAL to Deliver Lastest NIST SP 800-53 Controls.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * sp800-53-rev4-ipd.pdf
· * RMF 2.0 Deep Dive 5-15-18 v3 - Kelley Dempsey Naomi Lefkovitz.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * update-draft-800-53r5-v2.pdf
· * sp800_53_r4_appendix_g_markup_draft2.pdf
· * sp800_53a_r4_draft.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_f_markup_draft2.pdf
· * sp800-53-rev4-ipd.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_d_markup_draft2.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * Day_1_AM2_SCRM_Controls_Jon_Boyens.pdf
· * 800-53-for-ICS_KEMA.pdf
· * sp800-53r5-draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft-fpd-summary-of-significant-changes.pdf
· * sp800-53r5-draft-fpd-faq.pdf
· * sp800-53r5-draft.pdf
· * 800-53-Rev4_announcement.pdf
· * 1.5 - Main - SP800-53 Empowered by OSCAL_28Feb2022.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * appxi_800-53-rev1-augmented_15may07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP_800-53B_derived-OSCAL.pdf
· * sp_800-53_v5_1-derived-oscal.pdf
· * SP_800-53_v5_1-derived-OSCAL.pdf
· * sp800_53a_r4_draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft.pdf
· * 800-53-for-ICS_KEMA.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * sp800-53r5-fpd-controls.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * 800-53 automation workflow.pdf
· * 800-53-rev4-controls.csv
· * 800-53-rev4-controls.xml
· * 800-53-rev3-controls.xml
· * 800-53-rev3-controls.csv
· * SP800-177-Rev-1-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_LOW-baseline_profile_load.csv
· * NIST_SP-800-53_rev5-derived-OSCAL.xlsx
· * SP800-161-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_PRIVACY-baseline_profile_load.csv
· * NIST_SP-800-53_rev5_MODERATE-baseline_profile_load.csv
· * SP800-82-Rev-2-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_catalog_load.csv
· * NIST_SP-800-53_rev5_HIGH-baseline_profile_load.csv
· * sp800-53r5-draft-fpd-comparison-with-rev4.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-draft-fpd-comment-template.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53ar5-draft-comment-template.xlsx
· * sp800-53ar5-draft-comment-template.xlsx
· * stig-mapping-to-nist-800-53.xlsx
· * 800-53a-rev4-objectives.csv
· * 800-53a-rev4-objectives.xml
· * 800-53A-rev3-objectives.xml
· * SP800-53-control-comment-template.xlsx
· * WIP_800_53_Rev_5_to_Framework_v_1_1.xlsx
· * sp80053-focal-elements.csv
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * sp80053-focal-details.csv
· * SP_800-53_v5_1_XML.xml
· * NIST_SP-800-53B-derived-OSCAL.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * NIST SP 800-53B-Jan2022.xlsx
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * 800_53_rev_4_focal_document_template.xlsx
· * 800_53_Rev_4_Focal_Document_Template.xlsx
· * WIP_Framework_v_1_1_to_800_53_Rev5.xlsx
· * WIP_800_53_Rev_4_to_Framework_v_1_1.xlsx
· * sp800-53B-draft-comment-template.xlsx
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
* [SP 800-54]+2 – Border Gateway Protocol Security
* [SP 800-55r1]+8 – Performance Measurement Guide for Information Security
* [SP 800-68r1]+6 – Guide to Securing Microsoft Windows XP Systems for IT Professionals
* [SP 800-70]+12 – Security Configuration Checklists Program for IT Products
* [SP 800-81]+6 – Secure Domain Name System (DNS) Deployment Guide
* [SP 800-83]+7 – Guide to Malware Incident Prevention and Handling
* [SP 800-86]+2 – Guide to Integrating Forensic Techniques into Incident Response
+ IDENTIFICATION AND AUTHENTICATION
* [FIPS 140]+285 – Security Requirements for Cryptographic Modules
· * NIST SB 2001-07 A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2.pdf
· * NIST SP 800-029 A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2, 2001-06.pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex A, 2001-05.pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex D, 2001-05.pdf
· * NIST FIPS 140-2 Security requirements for Cryptographic Modules, Annex D; Approved Key Establishment Techniques, 2001-03 (2009 Minor Edits).pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex B; Approved Protection Profiles, 2001-03 (2009 Minor Edits).pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex A; Approved Security Functions, 2001-03 (2009 Minor Edits) .pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex C; Approved Random Number Generators, 2001-03 (2009 Minor Edits).pdf
· * NIST FIPS 140-2 Security Reqs for Cryptographic Modules, 2001-03.pdf
· * NIST FIPS 140-2 Implementation Guidance for FIPS PUB 140-2 and the CMVP, 2010-08-03.pdf
· * NIST SB 1995-08 FIPS 140-1; A Framework for Cryptographic Standards.txt
· * fips140-3-final-draft-2007-comments-resolutions.pdf
· * FIPS_140-3 Final_Draft_2007.pdf
· * fips140_2_chng2_20021203.epub
· * fips140_2_chng2_20021203.epub
· * NewFIPS1402LogoForm.pdf
· * FIPS1402LogoForm.pdf
· * FIPS1403LogoForm.pdf
· * fips140-3-sections-submitted-for-comments.pdf
· * FIPS140ConsolidatedCertApr2017.pdf
· * FIPS140ConsolidatedCertMar2017.pdf
· * fips140consolidatedcertlist0034.pdf
· * FIPS1402DTR.pdf
· * FIPS140ConsolidatedCertJan2018.pdf
· * FIPS140ConsolidatedCertOct2017.pdf
· * FIPS140ConsolidatedCertAug2018.pdf
· * fips140consolidatedcertlist0053.pdf
· * FIPS140ConsolidatedCertList0008.pdf
· * FIPS 140-3 IG.pdf
· * FIPS140ConsolidatedCertSept2016.pdf
· * FIPS140ConsolidatedCertList0034.pdf
· * FIPS140ConsolidatedCertList0054.pdf
· * fips140consolidatedcertlist0042.pdf
· * FIPS140ConsolidatedCertList0052.pdf
· * FIPS1402LogoForm.pdf
· * FIPS140ConsolidatedCertApril2016.pdf
· * FIPS140ConsolidatedCertList0041.pdf
· * FIPS140ConsolidatedCertList0048.pdf
· * FIPS140ConsolidatedCertList0028.pdf
· * FIPS140ConsolidatedCertOct2018.pdf
· * FIPS140ConsolidatedCertNov2019.pdf
· * FIPS140ConsolidatedCertMarch2016.pdf
· * FIPS140ConsolidatedCertList0026.pdf
· * FIPS140ConsolidatedCertMay2016.pdf
· * FIPS140ConsolidatedCertList0057.pdf
· * FIPS140ConsolidatedCertList0035.pdf
· * FIPS1401LogoForm.pdf
· * fips140consolidatedcertlist0046.pdf
· * FIPS140ConsolidatedCertList0024.pdf
· * FIPS140ConsolidatedCertList0049.pdf
· * FIPS 140-3 IG.pdf
· * FIPS140ConsolidatedCertSept2017.pdf
· * FIPS140ConsolidatedCertOct2015.pdf
· * FIPS140ConsolidatedCertJuly2016.pdf
· * fips140consolidatedcertoct2016.pdf
· * FIPS-140-2-CMVP Management Manual 09-09-2021.pdf
· * fips140consolidatedcertdec2015.pdf
· * fips1402logoform.pdf
· * FIPS140ConsolidatedCertJan2017.pdf
· * fips140consolidatedcertlist0038.pdf
· * FIPS_140-3_sections_submitted_for_comments.pdf
· * FIPS140ConsolidatedCertDec2015.pdf
· * FIPS140ConsolidatedCertList0046.pdf
· * FIPS140ConsolidatedCertList0053.pdf
· * FIPS140ConsolidatedCertFeb2016.pdf
· * fips140consolidatedcertjune2016.pdf
· * NIST and ISO End User License Agreement.pdf
· * FIPS140ConsolidatedCertJune2017.pdf
· * FIPS140ConsolidatedCertDec2016.pdf
· * fips140consolidatedcertlist0026.pdf
· * FIPS140ConsolidatedCertList0042.pdf
· * FIPS140ConsolidatedCertJuly2017.pdf
· * FIPS140ConsolidatedCertNov2016.pdf
· * nist and iso end user license agreement.pdf
· * fips140consolidatedcertsept2017.pdf
· * fips140consolidatedcertmarch2016.pdf
· * fips140consolidatedcertsept2016.pdf
· * FIPS140ConsolidatedCertList0023.pdf
· * FIPS140ConsolidatedCertList0011.pdf
· * FIPS140ConsolidatedCertList0038.pdf
· * FIPS1402IG.pdf
· * FIPS140ConsolidatedCertList0045.pdf
· * FIPS140ConsolidatedCertOct2016.pdf
· * FIPS140ConsolidatedCertJune2016.pdf
· * FIPS140ConsolidatedCertList0020.pdf
· * FIPS140ConsolidatedCertList0032.pdf
· * fips140consolidatedcertmay2017.pdf
· * FIPS140ConsolidatedCertAug2016.pdf
· * FIPS140ConsolidatedCertNov2017.pdf
· * FIPS140ConsolidatedCertMay2017.pdf
· * FIPS140-2-ConsolidatedMarch2018.pdf
· * FIPS140ConsolidatedCertDec2017.pdf
· * fips140consolidatedcertlist0057.pdf
· * FIPS1403SoftSecWork.pdf
· * FIPS140ConsolidatedCertList0050.pdf
· * fips1402ig.pdf
· * fips140consolidatedcertlist0045.pdf
· * FIPS1402IG.pdf
· * fips-140-2-cmvp management manual 09-09-2021.pdf
· * FIPS140ConsolidatedCertJan2016.pdf
· * fips140consolidatedcertlist0011.pdf
· * fips140consolidatedcertmay2016.pdf
· * fips140consolidatedcertnov2019.pdf
· * FIPS140ConsolidatedCertFeb2017.pdf
· * FIPS_140-3_sections_submitted_for_comments.pdf
· * Draft FIPS-140-3-CMVP Management Manual v1.1 07-13-2022.pdf
· * Draft FIPS-140-3-CMVP Management Manual 09-18-2020.pdf
· * fips1402.pdf
· * fips1401.pdf
· * physecpre18.pdf
· * CMVP2604.pdf
· * CMVP2606.pdf
· * FIPS140ConsolidatedCertApr2017.pdf
· * day2_mar24_fips-140-quo-vadis_nist-csd.pdf
· * FIPS140ConsolidatedCertMar2017.pdf
· * fips140consolidatedcertapr2017.pdf
· * physecpaper13.pdf
· * physecpaper12.pdf
· * physecpaper10.pdf
· * physecpaper11.pdf
· * physecpaper16.pdf
· * physecpaper14.pdf
· * physecpaper14.pdf
· * physecpaper17.pdf
· * physecpaper18.pdf
· * physecpaper19.pdf
· * physecpaper12.pdf
· * FIPS140ConsolidatedCertList0032.pdf
· * FIPS140ConsolidatedCertList0040.pdf
· * FIPS140ConsolidatedCertList0031.pdf
· * FIPS140ConsolidatedCertList0034.pdf
· * physecpaper08.pdf
· * FIPS140ConsolidatedCertList0037.pdf
· * fips140consolidatedcertlist0017.pdf
· * FIPS140ConsolidatedCertList0009.pdf
· * physecpaper06.pdf
· * physecpaper09.pdf
· * FIPS140ConsolidatedCertList0035.pdf
· * FIPS140ConsolidatedCertList0015.pdf
· * FIPS140ConsolidatedCertList0051.pdf
· * FIPS140ConsolidatedCertJune2016.pdf
· * physecpaper07.pdf
· * fips140consolidatedcertlist0019.pdf
· * fips1401ig.pdf
· * FIPS140ConsolidatedCertList0013.pdf
· * FIPS140ConsolidatedCertList0007.pdf
· * FIPS140ConsolidatedCertList0023.pdf
· * FIPS140ConsolidatedCertNov2015.pdf
· * FIPS1402DTR.pdf
· * Jan12-2005-FR-FIPS1403-Notice.pdf
· * FIPS140ConsolidatedCertList0003.pdf
· * FIPS140ConsolidatedCertList0042.pdf
· * FIPS140ConsolidatedCertList0002.pdf
· * FIPS140ConsolidatedCertSept2016.pdf
· * physecpaper08.pdf
· * FIPS140ConsolidatedCertMay2016.pdf
· * FIPS140ConsolidatedCertMay2017.pdf
· * fips1402ig.pdf
· * 1401testA.pdf
· * FIPS140ConsolidatedCertList0030.pdf
· * FIPS140ConsolidatedCertList0036.pdf
· * FIPS140ConsolidatedCertList0017.pdf
· * fips140consolidatedcertmay2016.pdf
· * FIPS140ConsolidatedCertList0038.pdf
· * FIPS140ConsolidatedCertList0004.pdf
· * FIPS140ConsolidatedCertDec2015.pdf
· * FIPS140ConsolidatedCertList0014.pdf
· * FIPS140ConsolidatedCertList0012.pdf
· * FIPS140ConsolidatedCertList0010.pdf
· * FIPS140ConsolidatedCertList0029.pdf
· * FIPS140ConsolidatedCertList0001.pdf
· * fips140consolidatedcertaug2016.pdf
· * FIPS140ConsolidatedCertList0021.pdf
· * FIPS140ConsolidatedCertList0048.pdf
· * frn-2015-19743-comments-received.pdf
· * FIPS140ConsolidatedCertList0006.pdf
· * FIPS140ConsolidatedCertMarch2016.pdf
· * ispab-ltr-to-NIST-on-FIPS_140-2-ISO_20160420.pdf
· * FIPS140ConsolidatedCertList0033.pdf
· * FIPS140ConsolidatedCertList0008.pdf
· * physecpaper03.pdf
· * FIPS140ConsolidatedCertJuly2016.pdf
· * fips140consolidatedcertmay2017.pdf
· * fips140-3_non-invasive2.pdf
· * FIPS140ConsolidatedCertList0046.pdf
· * physecpaper03.pdf
· * FIPS140ConsolidatedCertList0020.pdf
· * FIPS140ConsolidatedCertList0055.pdf
· * FIPS140ConsolidatedCertList0024.pdf
· * fips140consolidatedcertnov2015.pdf
· * 1401test.pdf
· * FIPS140ConsolidatedCertList0005.pdf
· * ispab-ltr-to-NIST-on-FIPS_140-2-ISO_20160420.pdf
· * FIPS140ConsolidatedCertList0027.pdf
· * FIPS140ConsolidatedCertApril2016.pdf
· * FIPS140ConsolidatedCertOct2015.pdf
· * fips1402DTR.pdf
· * FIPS140ConsolidatedCertFeb2017.pdf
· * FIPS140ConsolidatedCertList0044.pdf
· * FIPS140ConsolidatedCertList0054.pdf
· * physecpaper05.pdf
· * FIPS140ConsolidatedCertAug2017.pdf
· * physecpaper02.pdf
· * FIPS1402IG.pdf
· * FIPS140ConsolidatedCertList0041.pdf
· * FIPS140ConsolidatedCertList0019.pdf
· * 140-2flow.pdf
· * FIPS140ConsolidatedCertList0053.pdf
· * FIPS140ConsolidatedCertList0045.pdf
· * FIPS140ConsolidatedCertList0049.pdf
· * fips140-3_non-invasive1.pdf
· * fips140consolidatedcertlist0024.pdf
· * FIPS140ConsolidatedCertList0039.pdf
· * physecpaper04.pdf
· * FIPS140ConsolidatedCertJune2017.pdf
· * physecpaper01.pdf
· * FIPS140ConsolidatedCertJuly2017.pdf
· * FIPS140ConsolidatedCertOct2016.pdf
· * FIPS140ConsolidatedCertList0026.pdf
· * fips140consolidatedcertdec2016.pdf
· * fips140consolidatedcertlist0042.pdf
· * FIPS140ConsolidatedCertJan2016.pdf
· * FIPS140ConsolidatedCertFeb2016.pdf
· * fips140consolidatedcertjan2017.pdf
· * FIPS140ConsolidatedCertList0052.pdf
· * FIPS140ConsolidatedCertList0047.pdf
· * FIPS140ConsolidatedCertJan2017.pdf
· * FIPS1401IG.pdf
· * FIPS140ConsolidatedCertList0056.pdf
· * FIPS140ConsolidatedCertList0028.pdf
· * FIPS140ConsolidatedCertList0018.pdf
· * fips-140_response.pdf
· * FIPS140ConsolidatedCertList0025.pdf
· * ispab-ltr-to-nist-on-fips_140-2-iso_20160420.pdf
· * FIPS140ConsolidatedCertList0022.pdf
· * FIPS140ConsolidatedCertList0050.pdf
· * FIPS140ConsolidatedCertList0016.pdf
· * FIPS140ConsolidatedCertList0011.pdf
· * FIPS140ConsolidatedCertDec2016.pdf
· * FIPS140ConsolidatedCertNov2016.pdf
· * FIPS140ConsolidatedCertList0043.pdf
· * FIPS140ConsolidatedCertList0057.pdf
· * FIPS140ConsolidatedCertAug2016.pdf
· * fips140-3-draft-2009.pdf
· * fips1403Draft.pdf
· * revised-draft-fips140-3_PDF-zip_document-annexA-to-annexG.zip
· * fips140-3-draft-2009-comments-resolutions.pdf
· * fips1403draft.pdf
· * fips1402annexc.pdf
· * PublicComments_FIPS140-3Draft2.pdf
· * fips1402annexa.pdf
· * fips1402annexd.pdf
· * fips1402annexb.pdf
· * CommentsFIPS140-3_draft1.pdf
· * day2_mar24_fips-140-quo-vadis_nist-csd.pdf
· * day1_research_100-150.pdf
· * day1_research_100-150.pdf
· * physecpre01.pdf
· * Jean_Campbell-FIPS_140-3_-_Looking_over_the_horizon(3).pdf
· * physecpre02.pdf
· * physecpre17.pdf
· * physecpre04.pdf
· * CMVP2603.pdf
· * noninvasive-attack-testing_cscace-hsakane.pdf
· * noninvasive-attack-testing_cscace-hsakane.pdf
· * physecpre09.pdf
· * physecpre05.pdf
· * CMVP 140-3 MM Comments Template.docx
· * fips140_2_chng2_20021203.epub
· * physecpre10.ppt
· * physecpre10.ppt
· * physecpre06.ppt
· * physecpre16.ppt
· * physecpre03.ppt
· * physecpre18.ppt
· * physecpre07.ppt
· * physecpre11.ppt
· * physecpre17.ppt
· * physecpre08.ppt
· * physecpre12.ppt
· * physecpre15.ppt
· * physecpre14.ppt
· * physecpre15.ppt
· * physecpre14.ppt
· * physecpre13.ppt
* [FIPS 190]+1 – Guideline for the Use of Advanced Authentication Technology Alternatives
* [FIPS 200]+2 – Minimum Security Requirements for Federal Information and Information Systems
* [FIPS 201]+374 – Personal Identity Verification for Federal Employees and Contractors
* [SP 800-100]+1 – Information Security Handbook: A Guide for Managers
* [SP 800-104] – A Scheme for PIV Visual Card Topography
* [SP 800-106]+4 – Randomized Hashing for Digital Signatures
* [SP 800-107]+8 – Recommendation for Applications Using Approved Hash Algorithms
* [SP 800-113]+2 – Guide to SSL VPNs
* [SP 800-116]+12 – A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
* [SP 800-12]+23 – An Introduction to Computer Security: The NIST Handbook
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, 1995-10.pdf
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 2, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 1, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 5, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 4, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 3, 1995-10.ps
· * derived-piv-nist-sp1800-12b-v2.pdf
· * derived-piv-nist-sp1800-12a-v2.pdf
· * derived-piv-nist-sp1800-12c-v2.pdf
· * derived-piv-nist-sp1800-12-v2.pdf
· * derived-piv-nist-sp1800-12-draft.pdf
· * derived-piv-nist-sp1800-12c-draft.pdf
· * derived-piv-nist-sp1800-12a-draft.pdf
· * derived-piv-nist-sp1800-12b-draft.pdf
· * NIST.SP.800-12r1.pdf
· * NIST.SP.1800-12.pdf
· * nistspecialpublication800-12.pdf
· * 800-12_4.ps
· * 800-12_5.ps
· * 800-12_1.ps
· * 800-12_2.ps
· * 800-12_3.ps
· * sp800_12_r1_draft.pdf
* [SP 800-121]+15 – Guide to Bluetooth Security
* [SP 800-123]+7 – Guide to General Server Security
* [SP 800-124]+11 – Guidelines on Cell Phone and PDA Security
* [SP 800-14]+8 – Generally Accepted Principles and Practices for Securing Information Technology Systems
* [SP 800-24]+3 – PBX Vulnerability Analysis: Finding Holes in Your PBX Before Someone Else Does
* [SP 800-25]+5 – Federal Agency Use of Public Key Technology for Digital Signatures and Authentication
* [SP 800-32]+4 – Introduction to Public Key Technology and the Federal PKI Infrastructure
* [SP 800-36]+1 – Guide to Selecting Information Technology Security Products
* [SP 800-44]+3 – Guidelines on Securing Public Web Servers
* [SP 800-45]+3 – Guidelines on Electronic Mail Security
* [SP 800-46r1]+10 – Security for Telecommuting and Broadband Communications
* [SP 800-48r1]+4 – Guide to Securing Legacy IEEE 802.11 Wireless Networks
* [SP 800-52]+14 – Guidelines on the Selection and Use of Transport Layer Security
* [SP 800-53r3]+235 – Recommended Security Controls for Federal Information Systems and Organizations
· * NIST SP 800-053Ar4 Assessing Security and Privacy Controls in Federal Information Systems and Organizations; Building Effective Assessment Plans, 2014-12-18 (Final).pdf
· * NIST SP 800-053r2 Recommended Security Controls for Fed Info Systems, 2007-12 (final).pdf
· * alt-SP800-53-rev3-final_updated-errata_05-01-2010.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r2 to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r3FPD to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 2 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 1 (Errata), 2010-05-01.pdf
· * NIST SP 800-053Ar1 Guide for Assessing the Security Controls in Federal Information Systems and Organizations, 2010-06-29.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2013-05-07.pdf
· * NIST SP 800-053r5 Security and Privacy Controls for Information Systems and Organizations, 2017-08-15 (Draft).pdf
· * NIST SP 800-053r4_final_word_errata_01_22_2015.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations Controls (Errata), 2014-01-15.xml
· * NIST SP 800-053A Guide for Assessing the Security Controls in Fed Info Systems, 2008-06.pdf
· * NIST SP 800-053r5-draft-controls-markup.pdf
· * alt-SP800-53r4.pdf
· * alt-SP800-53Ar4.pdf
· * alt-SP800-53.pdf
· * alt-SP800-53r5-draft.pdf
· * NIST SP 800-053r5-draft-baselines-markup.pdf
· * NIST SP 800-053-controls.xml
· * NIST SP 800-053a_r4_errata_12_18_2014.docx
· * sp800-53A-rev1-final.pdf
· * 800-53-rev1-final-clean-sz.pdf
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53r4_summary.pdf
· * NIST.SP.800-53r4.pdf
· * nist.sp.800-53ar4.pdf
· * NIST.SP.800-53Ar4.pdf
· * nist.sp.800-53r4.pdf
· * nistspecialpublication800-53r3.pdf
· * nistspecialpublication800-53r2.pdf
· * nistspecialpublication800-53r1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53a.pdf
· * nistspecialpublication800-53a.pdf
· * NIST.SP.800-53r5.pdf
· * nistspecialpublication800-53.pdf
· * nist.sp.800-53r5.pdf
· * NIST.SP.800-53Ar5.pdf
· * NIST.SP.800-53B.pdf
· * 800-53-rev1-annex3-sz.pdf
· * 800-53-rev1-annex2-sz.pdf
· * 800-53-rev1-annex1-sz.pdf
· * NIST.SP.800-53r5-draft.pdf
· * nist.sp.800-53r5-draft.pdf
· * NIST.SP.800-53Ar5-draft.pdf
· * NIST.SP.800-53B-draft.pdf
· * sp800_53a_r4_errata_12_18_2014.docx
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * DOJ_CSAM_Planning_for_Implementing_SP-800-53_Rev5_FINAL.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * apply-sp-800-53-ics-final-22aug06.pdf
· * NIST_SP_800-53_Comment_Site_User_Guide_FINAL_8Sept2021.pdf
· * ics-in-sp800-53_final_21mar07.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * ics-in-sp800-53_final_21Mar07.pdf
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53-collaboration-index-template.docx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53-collaboration-index-template.xlsx
· * sp800-53r5-control-catalog.xlsx
· * sp800-53-collaboration-index-template.docx
· * sp800-53-collaboration-index-template.xlsx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-control-catalog.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * OLIR_review_800-213A_to_800-53_rev5_final.xlsx
· * Federal_Cybersecurity_Privacy_Forum_2Dec2021_NIST_SP800-53update.pdf
· * Federal_Cybersecurity_and_Privacy_Forum_15Feb2022_What_Is_New_SP800-53ARevision5.pdf
· * Federal_Cybersecurity_Privacy_Professionals_Forum_2Dec2021_FedRAMP_NIST800-53_Rev5.pdf
· * cybersecurity-innovation-forum_01-28-2014.pdf
· * ePACS Overlay_v1_SP800-53rev5-April2021.pdf
· * FPKI Overlay-v1-SP800-53rev5-April2021.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * 2.4 - Main - DOJ Adopting OSCAL to Deliver Lastest NIST SP 800-53 Controls.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * sp800-53-rev4-ipd.pdf
· * RMF 2.0 Deep Dive 5-15-18 v3 - Kelley Dempsey Naomi Lefkovitz.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * update-draft-800-53r5-v2.pdf
· * sp800_53_r4_appendix_g_markup_draft2.pdf
· * sp800_53a_r4_draft.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_f_markup_draft2.pdf
· * sp800-53-rev4-ipd.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_d_markup_draft2.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * Day_1_AM2_SCRM_Controls_Jon_Boyens.pdf
· * 800-53-for-ICS_KEMA.pdf
· * sp800-53r5-draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft-fpd-summary-of-significant-changes.pdf
· * sp800-53r5-draft-fpd-faq.pdf
· * sp800-53r5-draft.pdf
· * 800-53-Rev4_announcement.pdf
· * 1.5 - Main - SP800-53 Empowered by OSCAL_28Feb2022.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * appxi_800-53-rev1-augmented_15may07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP_800-53B_derived-OSCAL.pdf
· * sp_800-53_v5_1-derived-oscal.pdf
· * SP_800-53_v5_1-derived-OSCAL.pdf
· * sp800_53a_r4_draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft.pdf
· * 800-53-for-ICS_KEMA.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * sp800-53r5-fpd-controls.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * 800-53 automation workflow.pdf
· * 800-53-rev4-controls.csv
· * 800-53-rev4-controls.xml
· * 800-53-rev3-controls.xml
· * 800-53-rev3-controls.csv
· * SP800-177-Rev-1-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_LOW-baseline_profile_load.csv
· * NIST_SP-800-53_rev5-derived-OSCAL.xlsx
· * SP800-161-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_PRIVACY-baseline_profile_load.csv
· * NIST_SP-800-53_rev5_MODERATE-baseline_profile_load.csv
· * SP800-82-Rev-2-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_catalog_load.csv
· * NIST_SP-800-53_rev5_HIGH-baseline_profile_load.csv
· * sp800-53r5-draft-fpd-comparison-with-rev4.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-draft-fpd-comment-template.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53ar5-draft-comment-template.xlsx
· * sp800-53ar5-draft-comment-template.xlsx
· * stig-mapping-to-nist-800-53.xlsx
· * 800-53a-rev4-objectives.csv
· * 800-53a-rev4-objectives.xml
· * 800-53A-rev3-objectives.xml
· * SP800-53-control-comment-template.xlsx
· * WIP_800_53_Rev_5_to_Framework_v_1_1.xlsx
· * sp80053-focal-elements.csv
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * sp80053-focal-details.csv
· * SP_800-53_v5_1_XML.xml
· * NIST_SP-800-53B-derived-OSCAL.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * NIST SP 800-53B-Jan2022.xlsx
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * 800_53_rev_4_focal_document_template.xlsx
· * 800_53_Rev_4_Focal_Document_Template.xlsx
· * WIP_Framework_v_1_1_to_800_53_Rev5.xlsx
· * WIP_800_53_Rev_4_to_Framework_v_1_1.xlsx
· * sp800-53B-draft-comment-template.xlsx
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
* [SP 800-63r1]+42 – Electronic Authentication Guideline
* [SP 800-66r1]+9 – An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act Security Rule
* [SP 800-68r1]+6 – Guide to Securing Microsoft Windows XP Systems for IT Professionals
* [SP 800-72]+3 – Guidelines on PDA Forensics
* [SP 800-73]+44 – Interfaces for Personal Identity Verification
* [SP 800-76]+16 – Biometric Data Specification for Personal Identity Verification
* [SP 800-77]+4 – Guide to IPSec VPNs
* [SP 800-78]+20 – Cryptographic Algorithms and Key Sizes for Personal Identity Verification
* [SP 800-81]+6 – Secure Domain Name System (DNS) Deployment Guide
* [SP 800-86]+2 – Guide to Integrating Forensic Techniques into Incident Response
* [SP 800-87r1]+6 – Codes for the Identification of Federal and Federally-Assisted Organizations
* [SP 800-96]+2 – PIV Card / Reader Interoperability Guidelines
* [SP 800-97]+2 – Guide to IEEE 802.11i: Robust Security Networks
* [SP 800-98]+2 – Guidelines for Securing Radio Frequency Identification (RFID) Systems
+ PERSONNEL SECURITY
* [FIPS 200]+2 – Minimum Security Requirements for Federal Information and Information Systems
* [SP 800-100]+1 – Information Security Handbook: A Guide for Managers
* [SP 800-104] – A Scheme for PIV Visual Card Topography
* [SP 800-116]+12 – A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
* [SP 800-12]+23 – An Introduction to Computer Security: The NIST Handbook
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, 1995-10.pdf
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 2, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 1, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 5, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 4, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 3, 1995-10.ps
· * derived-piv-nist-sp1800-12b-v2.pdf
· * derived-piv-nist-sp1800-12a-v2.pdf
· * derived-piv-nist-sp1800-12c-v2.pdf
· * derived-piv-nist-sp1800-12-v2.pdf
· * derived-piv-nist-sp1800-12-draft.pdf
· * derived-piv-nist-sp1800-12c-draft.pdf
· * derived-piv-nist-sp1800-12a-draft.pdf
· * derived-piv-nist-sp1800-12b-draft.pdf
· * NIST.SP.800-12r1.pdf
· * NIST.SP.1800-12.pdf
· * nistspecialpublication800-12.pdf
· * 800-12_4.ps
· * 800-12_5.ps
· * 800-12_1.ps
· * 800-12_2.ps
· * 800-12_3.ps
· * sp800_12_r1_draft.pdf
* [SP 800-14]+8 – Generally Accepted Principles and Practices for Securing Information Technology Systems
* [SP 800-53r3]+235 – Recommended Security Controls for Federal Information Systems and Organizations
· * NIST SP 800-053Ar4 Assessing Security and Privacy Controls in Federal Information Systems and Organizations; Building Effective Assessment Plans, 2014-12-18 (Final).pdf
· * NIST SP 800-053r2 Recommended Security Controls for Fed Info Systems, 2007-12 (final).pdf
· * alt-SP800-53-rev3-final_updated-errata_05-01-2010.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r2 to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r3FPD to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 2 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 1 (Errata), 2010-05-01.pdf
· * NIST SP 800-053Ar1 Guide for Assessing the Security Controls in Federal Information Systems and Organizations, 2010-06-29.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2013-05-07.pdf
· * NIST SP 800-053r5 Security and Privacy Controls for Information Systems and Organizations, 2017-08-15 (Draft).pdf
· * NIST SP 800-053r4_final_word_errata_01_22_2015.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations Controls (Errata), 2014-01-15.xml
· * NIST SP 800-053A Guide for Assessing the Security Controls in Fed Info Systems, 2008-06.pdf
· * NIST SP 800-053r5-draft-controls-markup.pdf
· * alt-SP800-53r4.pdf
· * alt-SP800-53Ar4.pdf
· * alt-SP800-53.pdf
· * alt-SP800-53r5-draft.pdf
· * NIST SP 800-053r5-draft-baselines-markup.pdf
· * NIST SP 800-053-controls.xml
· * NIST SP 800-053a_r4_errata_12_18_2014.docx
· * sp800-53A-rev1-final.pdf
· * 800-53-rev1-final-clean-sz.pdf
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53r4_summary.pdf
· * NIST.SP.800-53r4.pdf
· * nist.sp.800-53ar4.pdf
· * NIST.SP.800-53Ar4.pdf
· * nist.sp.800-53r4.pdf
· * nistspecialpublication800-53r3.pdf
· * nistspecialpublication800-53r2.pdf
· * nistspecialpublication800-53r1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53a.pdf
· * nistspecialpublication800-53a.pdf
· * NIST.SP.800-53r5.pdf
· * nistspecialpublication800-53.pdf
· * nist.sp.800-53r5.pdf
· * NIST.SP.800-53Ar5.pdf
· * NIST.SP.800-53B.pdf
· * 800-53-rev1-annex3-sz.pdf
· * 800-53-rev1-annex2-sz.pdf
· * 800-53-rev1-annex1-sz.pdf
· * NIST.SP.800-53r5-draft.pdf
· * nist.sp.800-53r5-draft.pdf
· * NIST.SP.800-53Ar5-draft.pdf
· * NIST.SP.800-53B-draft.pdf
· * sp800_53a_r4_errata_12_18_2014.docx
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * DOJ_CSAM_Planning_for_Implementing_SP-800-53_Rev5_FINAL.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * apply-sp-800-53-ics-final-22aug06.pdf
· * NIST_SP_800-53_Comment_Site_User_Guide_FINAL_8Sept2021.pdf
· * ics-in-sp800-53_final_21mar07.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * ics-in-sp800-53_final_21Mar07.pdf
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53-collaboration-index-template.docx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53-collaboration-index-template.xlsx
· * sp800-53r5-control-catalog.xlsx
· * sp800-53-collaboration-index-template.docx
· * sp800-53-collaboration-index-template.xlsx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-control-catalog.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * OLIR_review_800-213A_to_800-53_rev5_final.xlsx
· * Federal_Cybersecurity_Privacy_Forum_2Dec2021_NIST_SP800-53update.pdf
· * Federal_Cybersecurity_and_Privacy_Forum_15Feb2022_What_Is_New_SP800-53ARevision5.pdf
· * Federal_Cybersecurity_Privacy_Professionals_Forum_2Dec2021_FedRAMP_NIST800-53_Rev5.pdf
· * cybersecurity-innovation-forum_01-28-2014.pdf
· * ePACS Overlay_v1_SP800-53rev5-April2021.pdf
· * FPKI Overlay-v1-SP800-53rev5-April2021.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * 2.4 - Main - DOJ Adopting OSCAL to Deliver Lastest NIST SP 800-53 Controls.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * sp800-53-rev4-ipd.pdf
· * RMF 2.0 Deep Dive 5-15-18 v3 - Kelley Dempsey Naomi Lefkovitz.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * update-draft-800-53r5-v2.pdf
· * sp800_53_r4_appendix_g_markup_draft2.pdf
· * sp800_53a_r4_draft.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_f_markup_draft2.pdf
· * sp800-53-rev4-ipd.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_d_markup_draft2.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * Day_1_AM2_SCRM_Controls_Jon_Boyens.pdf
· * 800-53-for-ICS_KEMA.pdf
· * sp800-53r5-draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft-fpd-summary-of-significant-changes.pdf
· * sp800-53r5-draft-fpd-faq.pdf
· * sp800-53r5-draft.pdf
· * 800-53-Rev4_announcement.pdf
· * 1.5 - Main - SP800-53 Empowered by OSCAL_28Feb2022.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * appxi_800-53-rev1-augmented_15may07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP_800-53B_derived-OSCAL.pdf
· * sp_800-53_v5_1-derived-oscal.pdf
· * SP_800-53_v5_1-derived-OSCAL.pdf
· * sp800_53a_r4_draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft.pdf
· * 800-53-for-ICS_KEMA.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * sp800-53r5-fpd-controls.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * 800-53 automation workflow.pdf
· * 800-53-rev4-controls.csv
· * 800-53-rev4-controls.xml
· * 800-53-rev3-controls.xml
· * 800-53-rev3-controls.csv
· * SP800-177-Rev-1-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_LOW-baseline_profile_load.csv
· * NIST_SP-800-53_rev5-derived-OSCAL.xlsx
· * SP800-161-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_PRIVACY-baseline_profile_load.csv
· * NIST_SP-800-53_rev5_MODERATE-baseline_profile_load.csv
· * SP800-82-Rev-2-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_catalog_load.csv
· * NIST_SP-800-53_rev5_HIGH-baseline_profile_load.csv
· * sp800-53r5-draft-fpd-comparison-with-rev4.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-draft-fpd-comment-template.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53ar5-draft-comment-template.xlsx
· * sp800-53ar5-draft-comment-template.xlsx
· * stig-mapping-to-nist-800-53.xlsx
· * 800-53a-rev4-objectives.csv
· * 800-53a-rev4-objectives.xml
· * 800-53A-rev3-objectives.xml
· * SP800-53-control-comment-template.xlsx
· * WIP_800_53_Rev_5_to_Framework_v_1_1.xlsx
· * sp80053-focal-elements.csv
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * sp80053-focal-details.csv
· * SP_800-53_v5_1_XML.xml
· * NIST_SP-800-53B-derived-OSCAL.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * NIST SP 800-53B-Jan2022.xlsx
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * 800_53_rev_4_focal_document_template.xlsx
· * 800_53_Rev_4_Focal_Document_Template.xlsx
· * WIP_Framework_v_1_1_to_800_53_Rev5.xlsx
· * WIP_800_53_Rev_4_to_Framework_v_1_1.xlsx
· * sp800-53B-draft-comment-template.xlsx
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
* [SP 800-63r1]+42 – Electronic Authentication Guideline
* [SP 800-66r1]+9 – An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act Security Rule
+ PHYSICAL & ENVIRONMENTAL PROTECTION
* [FIPS 200]+2 – Minimum Security Requirements for Federal Information and Information Systems
* [SP 800-100]+1 – Information Security Handbook: A Guide for Managers
* [SP 800-104] – A Scheme for PIV Visual Card Topography
* [SP 800-116]+12 – A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
* [SP 800-123]+7 – Guide to General Server Security
* [SP 800-66r1]+9 – An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act Security Rule
* [SP 800-73]+44 – Interfaces for Personal Identity Verification
* [SP 800-76]+16 – Biometric Data Specification for Personal Identity Verification
* [SP 800-78]+20 – Cryptographic Algorithms and Key Sizes for Personal Identity Verification
* [SP 800-86]+2 – Guide to Integrating Forensic Techniques into Incident Response
* [SP 800-92]+8 – Guide to Computer Security Log Management
* [SP 800-96]+2 – PIV Card / Reader Interoperability Guidelines
* [SP 800-98]+2 – Guidelines for Securing Radio Frequency Identification (RFID) Systems
+ SECURITY RULE
* [SP 800-12]+23 – An Introduction to Computer Security: The NIST Handbook
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, 1995-10.pdf
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 2, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 1, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 5, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 4, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 3, 1995-10.ps
· * derived-piv-nist-sp1800-12b-v2.pdf
· * derived-piv-nist-sp1800-12a-v2.pdf
· * derived-piv-nist-sp1800-12c-v2.pdf
· * derived-piv-nist-sp1800-12-v2.pdf
· * derived-piv-nist-sp1800-12-draft.pdf
· * derived-piv-nist-sp1800-12c-draft.pdf
· * derived-piv-nist-sp1800-12a-draft.pdf
· * derived-piv-nist-sp1800-12b-draft.pdf
· * NIST.SP.800-12r1.pdf
· * NIST.SP.1800-12.pdf
· * nistspecialpublication800-12.pdf
· * 800-12_4.ps
· * 800-12_5.ps
· * 800-12_1.ps
· * 800-12_2.ps
· * 800-12_3.ps
· * sp800_12_r1_draft.pdf
* [SP 800-14]+8 – Generally Accepted Principles and Practices for Securing Information Technology Systems
* [SP 800-24]+3 – PBX Vulnerability Analysis: Finding Holes in Your PBX Before Someone Else Does
* [SP 800-53r3]+235 – Recommended Security Controls for Federal Information Systems and Organizations
· * NIST SP 800-053Ar4 Assessing Security and Privacy Controls in Federal Information Systems and Organizations; Building Effective Assessment Plans, 2014-12-18 (Final).pdf
· * NIST SP 800-053r2 Recommended Security Controls for Fed Info Systems, 2007-12 (final).pdf
· * alt-SP800-53-rev3-final_updated-errata_05-01-2010.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r2 to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r3FPD to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 2 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 1 (Errata), 2010-05-01.pdf
· * NIST SP 800-053Ar1 Guide for Assessing the Security Controls in Federal Information Systems and Organizations, 2010-06-29.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2013-05-07.pdf
· * NIST SP 800-053r5 Security and Privacy Controls for Information Systems and Organizations, 2017-08-15 (Draft).pdf
· * NIST SP 800-053r4_final_word_errata_01_22_2015.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations Controls (Errata), 2014-01-15.xml
· * NIST SP 800-053A Guide for Assessing the Security Controls in Fed Info Systems, 2008-06.pdf
· * NIST SP 800-053r5-draft-controls-markup.pdf
· * alt-SP800-53r4.pdf
· * alt-SP800-53Ar4.pdf
· * alt-SP800-53.pdf
· * alt-SP800-53r5-draft.pdf
· * NIST SP 800-053r5-draft-baselines-markup.pdf
· * NIST SP 800-053-controls.xml
· * NIST SP 800-053a_r4_errata_12_18_2014.docx
· * sp800-53A-rev1-final.pdf
· * 800-53-rev1-final-clean-sz.pdf
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53r4_summary.pdf
· * NIST.SP.800-53r4.pdf
· * nist.sp.800-53ar4.pdf
· * NIST.SP.800-53Ar4.pdf
· * nist.sp.800-53r4.pdf
· * nistspecialpublication800-53r3.pdf
· * nistspecialpublication800-53r2.pdf
· * nistspecialpublication800-53r1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53a.pdf
· * nistspecialpublication800-53a.pdf
· * NIST.SP.800-53r5.pdf
· * nistspecialpublication800-53.pdf
· * nist.sp.800-53r5.pdf
· * NIST.SP.800-53Ar5.pdf
· * NIST.SP.800-53B.pdf
· * 800-53-rev1-annex3-sz.pdf
· * 800-53-rev1-annex2-sz.pdf
· * 800-53-rev1-annex1-sz.pdf
· * NIST.SP.800-53r5-draft.pdf
· * nist.sp.800-53r5-draft.pdf
· * NIST.SP.800-53Ar5-draft.pdf
· * NIST.SP.800-53B-draft.pdf
· * sp800_53a_r4_errata_12_18_2014.docx
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * DOJ_CSAM_Planning_for_Implementing_SP-800-53_Rev5_FINAL.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * apply-sp-800-53-ics-final-22aug06.pdf
· * NIST_SP_800-53_Comment_Site_User_Guide_FINAL_8Sept2021.pdf
· * ics-in-sp800-53_final_21mar07.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * ics-in-sp800-53_final_21Mar07.pdf
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53-collaboration-index-template.docx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53-collaboration-index-template.xlsx
· * sp800-53r5-control-catalog.xlsx
· * sp800-53-collaboration-index-template.docx
· * sp800-53-collaboration-index-template.xlsx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-control-catalog.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * OLIR_review_800-213A_to_800-53_rev5_final.xlsx
· * Federal_Cybersecurity_Privacy_Forum_2Dec2021_NIST_SP800-53update.pdf
· * Federal_Cybersecurity_and_Privacy_Forum_15Feb2022_What_Is_New_SP800-53ARevision5.pdf
· * Federal_Cybersecurity_Privacy_Professionals_Forum_2Dec2021_FedRAMP_NIST800-53_Rev5.pdf
· * cybersecurity-innovation-forum_01-28-2014.pdf
· * ePACS Overlay_v1_SP800-53rev5-April2021.pdf
· * FPKI Overlay-v1-SP800-53rev5-April2021.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * 2.4 - Main - DOJ Adopting OSCAL to Deliver Lastest NIST SP 800-53 Controls.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * sp800-53-rev4-ipd.pdf
· * RMF 2.0 Deep Dive 5-15-18 v3 - Kelley Dempsey Naomi Lefkovitz.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * update-draft-800-53r5-v2.pdf
· * sp800_53_r4_appendix_g_markup_draft2.pdf
· * sp800_53a_r4_draft.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_f_markup_draft2.pdf
· * sp800-53-rev4-ipd.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_d_markup_draft2.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * Day_1_AM2_SCRM_Controls_Jon_Boyens.pdf
· * 800-53-for-ICS_KEMA.pdf
· * sp800-53r5-draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft-fpd-summary-of-significant-changes.pdf
· * sp800-53r5-draft-fpd-faq.pdf
· * sp800-53r5-draft.pdf
· * 800-53-Rev4_announcement.pdf
· * 1.5 - Main - SP800-53 Empowered by OSCAL_28Feb2022.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * appxi_800-53-rev1-augmented_15may07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP_800-53B_derived-OSCAL.pdf
· * sp_800-53_v5_1-derived-oscal.pdf
· * SP_800-53_v5_1-derived-OSCAL.pdf
· * sp800_53a_r4_draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft.pdf
· * 800-53-for-ICS_KEMA.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * sp800-53r5-fpd-controls.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * 800-53 automation workflow.pdf
· * 800-53-rev4-controls.csv
· * 800-53-rev4-controls.xml
· * 800-53-rev3-controls.xml
· * 800-53-rev3-controls.csv
· * SP800-177-Rev-1-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_LOW-baseline_profile_load.csv
· * NIST_SP-800-53_rev5-derived-OSCAL.xlsx
· * SP800-161-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_PRIVACY-baseline_profile_load.csv
· * NIST_SP-800-53_rev5_MODERATE-baseline_profile_load.csv
· * SP800-82-Rev-2-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_catalog_load.csv
· * NIST_SP-800-53_rev5_HIGH-baseline_profile_load.csv
· * sp800-53r5-draft-fpd-comparison-with-rev4.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-draft-fpd-comment-template.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53ar5-draft-comment-template.xlsx
· * sp800-53ar5-draft-comment-template.xlsx
· * stig-mapping-to-nist-800-53.xlsx
· * 800-53a-rev4-objectives.csv
· * 800-53a-rev4-objectives.xml
· * 800-53A-rev3-objectives.xml
· * SP800-53-control-comment-template.xlsx
· * WIP_800_53_Rev_5_to_Framework_v_1_1.xlsx
· * sp80053-focal-elements.csv
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * sp80053-focal-details.csv
· * SP_800-53_v5_1_XML.xml
· * NIST_SP-800-53B-derived-OSCAL.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * NIST SP 800-53B-Jan2022.xlsx
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * 800_53_rev_4_focal_document_template.xlsx
· * 800_53_Rev_4_Focal_Document_Template.xlsx
· * WIP_Framework_v_1_1_to_800_53_Rev5.xlsx
· * WIP_800_53_Rev_4_to_Framework_v_1_1.xlsx
· * sp800-53B-draft-comment-template.xlsx
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
* [SP 800-58]+2 – Security Considerations for Voice Over IP Systems
+ SYSTEM & COMMUNICATION PROTECTION
* [FIPS 140]+285 – Security Requirements for Cryptographic Modules
· * NIST SB 2001-07 A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2.pdf
· * NIST SP 800-029 A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2, 2001-06.pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex A, 2001-05.pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex D, 2001-05.pdf
· * NIST FIPS 140-2 Security requirements for Cryptographic Modules, Annex D; Approved Key Establishment Techniques, 2001-03 (2009 Minor Edits).pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex B; Approved Protection Profiles, 2001-03 (2009 Minor Edits).pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex A; Approved Security Functions, 2001-03 (2009 Minor Edits) .pdf
· * NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex C; Approved Random Number Generators, 2001-03 (2009 Minor Edits).pdf
· * NIST FIPS 140-2 Security Reqs for Cryptographic Modules, 2001-03.pdf
· * NIST FIPS 140-2 Implementation Guidance for FIPS PUB 140-2 and the CMVP, 2010-08-03.pdf
· * NIST SB 1995-08 FIPS 140-1; A Framework for Cryptographic Standards.txt
· * fips140-3-final-draft-2007-comments-resolutions.pdf
· * FIPS_140-3 Final_Draft_2007.pdf
· * fips140_2_chng2_20021203.epub
· * fips140_2_chng2_20021203.epub
· * NewFIPS1402LogoForm.pdf
· * FIPS1402LogoForm.pdf
· * FIPS1403LogoForm.pdf
· * fips140-3-sections-submitted-for-comments.pdf
· * FIPS140ConsolidatedCertApr2017.pdf
· * FIPS140ConsolidatedCertMar2017.pdf
· * fips140consolidatedcertlist0034.pdf
· * FIPS1402DTR.pdf
· * FIPS140ConsolidatedCertJan2018.pdf
· * FIPS140ConsolidatedCertOct2017.pdf
· * FIPS140ConsolidatedCertAug2018.pdf
· * fips140consolidatedcertlist0053.pdf
· * FIPS140ConsolidatedCertList0008.pdf
· * FIPS 140-3 IG.pdf
· * FIPS140ConsolidatedCertSept2016.pdf
· * FIPS140ConsolidatedCertList0034.pdf
· * FIPS140ConsolidatedCertList0054.pdf
· * fips140consolidatedcertlist0042.pdf
· * FIPS140ConsolidatedCertList0052.pdf
· * FIPS1402LogoForm.pdf
· * FIPS140ConsolidatedCertApril2016.pdf
· * FIPS140ConsolidatedCertList0041.pdf
· * FIPS140ConsolidatedCertList0048.pdf
· * FIPS140ConsolidatedCertList0028.pdf
· * FIPS140ConsolidatedCertOct2018.pdf
· * FIPS140ConsolidatedCertNov2019.pdf
· * FIPS140ConsolidatedCertMarch2016.pdf
· * FIPS140ConsolidatedCertList0026.pdf
· * FIPS140ConsolidatedCertMay2016.pdf
· * FIPS140ConsolidatedCertList0057.pdf
· * FIPS140ConsolidatedCertList0035.pdf
· * FIPS1401LogoForm.pdf
· * fips140consolidatedcertlist0046.pdf
· * FIPS140ConsolidatedCertList0024.pdf
· * FIPS140ConsolidatedCertList0049.pdf
· * FIPS 140-3 IG.pdf
· * FIPS140ConsolidatedCertSept2017.pdf
· * FIPS140ConsolidatedCertOct2015.pdf
· * FIPS140ConsolidatedCertJuly2016.pdf
· * fips140consolidatedcertoct2016.pdf
· * FIPS-140-2-CMVP Management Manual 09-09-2021.pdf
· * fips140consolidatedcertdec2015.pdf
· * fips1402logoform.pdf
· * FIPS140ConsolidatedCertJan2017.pdf
· * fips140consolidatedcertlist0038.pdf
· * FIPS_140-3_sections_submitted_for_comments.pdf
· * FIPS140ConsolidatedCertDec2015.pdf
· * FIPS140ConsolidatedCertList0046.pdf
· * FIPS140ConsolidatedCertList0053.pdf
· * FIPS140ConsolidatedCertFeb2016.pdf
· * fips140consolidatedcertjune2016.pdf
· * NIST and ISO End User License Agreement.pdf
· * FIPS140ConsolidatedCertJune2017.pdf
· * FIPS140ConsolidatedCertDec2016.pdf
· * fips140consolidatedcertlist0026.pdf
· * FIPS140ConsolidatedCertList0042.pdf
· * FIPS140ConsolidatedCertJuly2017.pdf
· * FIPS140ConsolidatedCertNov2016.pdf
· * nist and iso end user license agreement.pdf
· * fips140consolidatedcertsept2017.pdf
· * fips140consolidatedcertmarch2016.pdf
· * fips140consolidatedcertsept2016.pdf
· * FIPS140ConsolidatedCertList0023.pdf
· * FIPS140ConsolidatedCertList0011.pdf
· * FIPS140ConsolidatedCertList0038.pdf
· * FIPS1402IG.pdf
· * FIPS140ConsolidatedCertList0045.pdf
· * FIPS140ConsolidatedCertOct2016.pdf
· * FIPS140ConsolidatedCertJune2016.pdf
· * FIPS140ConsolidatedCertList0020.pdf
· * FIPS140ConsolidatedCertList0032.pdf
· * fips140consolidatedcertmay2017.pdf
· * FIPS140ConsolidatedCertAug2016.pdf
· * FIPS140ConsolidatedCertNov2017.pdf
· * FIPS140ConsolidatedCertMay2017.pdf
· * FIPS140-2-ConsolidatedMarch2018.pdf
· * FIPS140ConsolidatedCertDec2017.pdf
· * fips140consolidatedcertlist0057.pdf
· * FIPS1403SoftSecWork.pdf
· * FIPS140ConsolidatedCertList0050.pdf
· * fips1402ig.pdf
· * fips140consolidatedcertlist0045.pdf
· * FIPS1402IG.pdf
· * fips-140-2-cmvp management manual 09-09-2021.pdf
· * FIPS140ConsolidatedCertJan2016.pdf
· * fips140consolidatedcertlist0011.pdf
· * fips140consolidatedcertmay2016.pdf
· * fips140consolidatedcertnov2019.pdf
· * FIPS140ConsolidatedCertFeb2017.pdf
· * FIPS_140-3_sections_submitted_for_comments.pdf
· * Draft FIPS-140-3-CMVP Management Manual v1.1 07-13-2022.pdf
· * Draft FIPS-140-3-CMVP Management Manual 09-18-2020.pdf
· * fips1402.pdf
· * fips1401.pdf
· * physecpre18.pdf
· * CMVP2604.pdf
· * CMVP2606.pdf
· * FIPS140ConsolidatedCertApr2017.pdf
· * day2_mar24_fips-140-quo-vadis_nist-csd.pdf
· * FIPS140ConsolidatedCertMar2017.pdf
· * fips140consolidatedcertapr2017.pdf
· * physecpaper13.pdf
· * physecpaper12.pdf
· * physecpaper10.pdf
· * physecpaper11.pdf
· * physecpaper16.pdf
· * physecpaper14.pdf
· * physecpaper14.pdf
· * physecpaper17.pdf
· * physecpaper18.pdf
· * physecpaper19.pdf
· * physecpaper12.pdf
· * FIPS140ConsolidatedCertList0032.pdf
· * FIPS140ConsolidatedCertList0040.pdf
· * FIPS140ConsolidatedCertList0031.pdf
· * FIPS140ConsolidatedCertList0034.pdf
· * physecpaper08.pdf
· * FIPS140ConsolidatedCertList0037.pdf
· * fips140consolidatedcertlist0017.pdf
· * FIPS140ConsolidatedCertList0009.pdf
· * physecpaper06.pdf
· * physecpaper09.pdf
· * FIPS140ConsolidatedCertList0035.pdf
· * FIPS140ConsolidatedCertList0015.pdf
· * FIPS140ConsolidatedCertList0051.pdf
· * FIPS140ConsolidatedCertJune2016.pdf
· * physecpaper07.pdf
· * fips140consolidatedcertlist0019.pdf
· * fips1401ig.pdf
· * FIPS140ConsolidatedCertList0013.pdf
· * FIPS140ConsolidatedCertList0007.pdf
· * FIPS140ConsolidatedCertList0023.pdf
· * FIPS140ConsolidatedCertNov2015.pdf
· * FIPS1402DTR.pdf
· * Jan12-2005-FR-FIPS1403-Notice.pdf
· * FIPS140ConsolidatedCertList0003.pdf
· * FIPS140ConsolidatedCertList0042.pdf
· * FIPS140ConsolidatedCertList0002.pdf
· * FIPS140ConsolidatedCertSept2016.pdf
· * physecpaper08.pdf
· * FIPS140ConsolidatedCertMay2016.pdf
· * FIPS140ConsolidatedCertMay2017.pdf
· * fips1402ig.pdf
· * 1401testA.pdf
· * FIPS140ConsolidatedCertList0030.pdf
· * FIPS140ConsolidatedCertList0036.pdf
· * FIPS140ConsolidatedCertList0017.pdf
· * fips140consolidatedcertmay2016.pdf
· * FIPS140ConsolidatedCertList0038.pdf
· * FIPS140ConsolidatedCertList0004.pdf
· * FIPS140ConsolidatedCertDec2015.pdf
· * FIPS140ConsolidatedCertList0014.pdf
· * FIPS140ConsolidatedCertList0012.pdf
· * FIPS140ConsolidatedCertList0010.pdf
· * FIPS140ConsolidatedCertList0029.pdf
· * FIPS140ConsolidatedCertList0001.pdf
· * fips140consolidatedcertaug2016.pdf
· * FIPS140ConsolidatedCertList0021.pdf
· * FIPS140ConsolidatedCertList0048.pdf
· * frn-2015-19743-comments-received.pdf
· * FIPS140ConsolidatedCertList0006.pdf
· * FIPS140ConsolidatedCertMarch2016.pdf
· * ispab-ltr-to-NIST-on-FIPS_140-2-ISO_20160420.pdf
· * FIPS140ConsolidatedCertList0033.pdf
· * FIPS140ConsolidatedCertList0008.pdf
· * physecpaper03.pdf
· * FIPS140ConsolidatedCertJuly2016.pdf
· * fips140consolidatedcertmay2017.pdf
· * fips140-3_non-invasive2.pdf
· * FIPS140ConsolidatedCertList0046.pdf
· * physecpaper03.pdf
· * FIPS140ConsolidatedCertList0020.pdf
· * FIPS140ConsolidatedCertList0055.pdf
· * FIPS140ConsolidatedCertList0024.pdf
· * fips140consolidatedcertnov2015.pdf
· * 1401test.pdf
· * FIPS140ConsolidatedCertList0005.pdf
· * ispab-ltr-to-NIST-on-FIPS_140-2-ISO_20160420.pdf
· * FIPS140ConsolidatedCertList0027.pdf
· * FIPS140ConsolidatedCertApril2016.pdf
· * FIPS140ConsolidatedCertOct2015.pdf
· * fips1402DTR.pdf
· * FIPS140ConsolidatedCertFeb2017.pdf
· * FIPS140ConsolidatedCertList0044.pdf
· * FIPS140ConsolidatedCertList0054.pdf
· * physecpaper05.pdf
· * FIPS140ConsolidatedCertAug2017.pdf
· * physecpaper02.pdf
· * FIPS1402IG.pdf
· * FIPS140ConsolidatedCertList0041.pdf
· * FIPS140ConsolidatedCertList0019.pdf
· * 140-2flow.pdf
· * FIPS140ConsolidatedCertList0053.pdf
· * FIPS140ConsolidatedCertList0045.pdf
· * FIPS140ConsolidatedCertList0049.pdf
· * fips140-3_non-invasive1.pdf
· * fips140consolidatedcertlist0024.pdf
· * FIPS140ConsolidatedCertList0039.pdf
· * physecpaper04.pdf
· * FIPS140ConsolidatedCertJune2017.pdf
· * physecpaper01.pdf
· * FIPS140ConsolidatedCertJuly2017.pdf
· * FIPS140ConsolidatedCertOct2016.pdf
· * FIPS140ConsolidatedCertList0026.pdf
· * fips140consolidatedcertdec2016.pdf
· * fips140consolidatedcertlist0042.pdf
· * FIPS140ConsolidatedCertJan2016.pdf
· * FIPS140ConsolidatedCertFeb2016.pdf
· * fips140consolidatedcertjan2017.pdf
· * FIPS140ConsolidatedCertList0052.pdf
· * FIPS140ConsolidatedCertList0047.pdf
· * FIPS140ConsolidatedCertJan2017.pdf
· * FIPS1401IG.pdf
· * FIPS140ConsolidatedCertList0056.pdf
· * FIPS140ConsolidatedCertList0028.pdf
· * FIPS140ConsolidatedCertList0018.pdf
· * fips-140_response.pdf
· * FIPS140ConsolidatedCertList0025.pdf
· * ispab-ltr-to-nist-on-fips_140-2-iso_20160420.pdf
· * FIPS140ConsolidatedCertList0022.pdf
· * FIPS140ConsolidatedCertList0050.pdf
· * FIPS140ConsolidatedCertList0016.pdf
· * FIPS140ConsolidatedCertList0011.pdf
· * FIPS140ConsolidatedCertDec2016.pdf
· * FIPS140ConsolidatedCertNov2016.pdf
· * FIPS140ConsolidatedCertList0043.pdf
· * FIPS140ConsolidatedCertList0057.pdf
· * FIPS140ConsolidatedCertAug2016.pdf
· * fips140-3-draft-2009.pdf
· * fips1403Draft.pdf
· * revised-draft-fips140-3_PDF-zip_document-annexA-to-annexG.zip
· * fips140-3-draft-2009-comments-resolutions.pdf
· * fips1403draft.pdf
· * fips1402annexc.pdf
· * PublicComments_FIPS140-3Draft2.pdf
· * fips1402annexa.pdf
· * fips1402annexd.pdf
· * fips1402annexb.pdf
· * CommentsFIPS140-3_draft1.pdf
· * day2_mar24_fips-140-quo-vadis_nist-csd.pdf
· * day1_research_100-150.pdf
· * day1_research_100-150.pdf
· * physecpre01.pdf
· * Jean_Campbell-FIPS_140-3_-_Looking_over_the_horizon(3).pdf
· * physecpre02.pdf
· * physecpre17.pdf
· * physecpre04.pdf
· * CMVP2603.pdf
· * noninvasive-attack-testing_cscace-hsakane.pdf
· * noninvasive-attack-testing_cscace-hsakane.pdf
· * physecpre09.pdf
· * physecpre05.pdf
· * CMVP 140-3 MM Comments Template.docx
· * fips140_2_chng2_20021203.epub
· * physecpre10.ppt
· * physecpre10.ppt
· * physecpre06.ppt
· * physecpre16.ppt
· * physecpre03.ppt
· * physecpre18.ppt
· * physecpre07.ppt
· * physecpre11.ppt
· * physecpre17.ppt
· * physecpre08.ppt
· * physecpre12.ppt
· * physecpre15.ppt
· * physecpre14.ppt
· * physecpre15.ppt
· * physecpre14.ppt
· * physecpre13.ppt
* [FIPS 180]+24 – Secure Hash Standard (SHS)
* [FIPS 186]+25 – Digital Signature Standard (DSS)
* [FIPS 190]+1 – Guideline for the Use of Advanced Authentication Technology Alternatives
* [FIPS 197]+8 – Advanced Encryption Standard
* [FIPS 198]+8 – The Keyed-Hash Message Authentication Code (HMAC)
* [FIPS 200]+2 – Minimum Security Requirements for Federal Information and Information Systems
* [FIPS 201]+374 – Personal Identity Verification for Federal Employees and Contractors
* [SP 800-100]+1 – Information Security Handbook: A Guide for Managers
* [SP 800-106]+4 – Randomized Hashing for Digital Signatures
* [SP 800-107]+8 – Recommendation for Applications Using Approved Hash Algorithms
* [SP 800-111]+2 – Guide to Storage Encryption Technologies for End User Devices
* [SP 800-113]+2 – Guide to SSL VPNs
* [SP 800-114]+7 – User's Guide to Securing External Devices for Telework and Remote Access
* [SP 800-115]+7 – Technical Guide to Information Security Testing and Assessment
* [SP 800-12]+23 – An Introduction to Computer Security: The NIST Handbook
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, 1995-10.pdf
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 2, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 1, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 5, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 4, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 3, 1995-10.ps
· * derived-piv-nist-sp1800-12b-v2.pdf
· * derived-piv-nist-sp1800-12a-v2.pdf
· * derived-piv-nist-sp1800-12c-v2.pdf
· * derived-piv-nist-sp1800-12-v2.pdf
· * derived-piv-nist-sp1800-12-draft.pdf
· * derived-piv-nist-sp1800-12c-draft.pdf
· * derived-piv-nist-sp1800-12a-draft.pdf
· * derived-piv-nist-sp1800-12b-draft.pdf
· * NIST.SP.800-12r1.pdf
· * NIST.SP.1800-12.pdf
· * nistspecialpublication800-12.pdf
· * 800-12_4.ps
· * 800-12_5.ps
· * 800-12_1.ps
· * 800-12_2.ps
· * 800-12_3.ps
· * sp800_12_r1_draft.pdf
* [SP 800-121]+15 – Guide to Bluetooth Security
* [SP 800-123]+7 – Guide to General Server Security
* [SP 800-124]+11 – Guidelines on Cell Phone and PDA Security
* [SP 800-14]+8 – Generally Accepted Principles and Practices for Securing Information Technology Systems
* [SP 800-15]+7 – Minimum Interoperability Specification for PKI Components (MISPC), Version 1
* [SP 800-17]+10 – Modes of Operation Validation System (MOVS): Requirements and Procedures
* [SP 800-19]+4 – Mobile Agent Security
* [SP 800-20]+2 – Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS): Requirements and Procedures
* [SP 800-21r2]+5 – Guideline for Implementing Cryptography in the Federal Government
* [SP 800-22r1]+12 – A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
* [SP 800-25]+5 – Federal Agency Use of Public Key Technology for Digital Signatures and Authentication
* [SP 800-28r2]+2 – Guidelines on Active Content and Mobile Code
* [SP 800-29]+2 – A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2
* [SP 800-32]+4 – Introduction to Public Key Technology and the Federal PKI Infrastructure
* [SP 800-36]+1 – Guide to Selecting Information Technology Security Products
* [SP 800-38A]+10 – Recommendation for Block Cipher Modes of Operation - Methods and Techniques
* [SP 800-38B]+5 – Recommendation for Block Cipher Modes of Operation: The RMAC Authentication Mode
* [SP 800-38C]+7 – Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality
* [SP 800-38D]+9 – Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) for Confidentiality and Authentication
* [SP 800-41]+5 – Guidelines on Firewalls and Firewall Policy
* [SP 800-44]+3 – Guidelines on Securing Public Web Servers
* [SP 800-45]+3 – Guidelines on Electronic Mail Security
* [SP 800-46r1]+10 – Security for Telecommuting and Broadband Communications
* [SP 800-49]+2 – Federal S/MIME V3 Client Profile
* [SP 800-52]+14 – Guidelines on the Selection and Use of Transport Layer Security
* [SP 800-53r3]+235 – Recommended Security Controls for Federal Information Systems and Organizations
· * NIST SP 800-053Ar4 Assessing Security and Privacy Controls in Federal Information Systems and Organizations; Building Effective Assessment Plans, 2014-12-18 (Final).pdf
· * NIST SP 800-053r2 Recommended Security Controls for Fed Info Systems, 2007-12 (final).pdf
· * alt-SP800-53-rev3-final_updated-errata_05-01-2010.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r2 to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r3FPD to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 2 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 1 (Errata), 2010-05-01.pdf
· * NIST SP 800-053Ar1 Guide for Assessing the Security Controls in Federal Information Systems and Organizations, 2010-06-29.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2013-05-07.pdf
· * NIST SP 800-053r5 Security and Privacy Controls for Information Systems and Organizations, 2017-08-15 (Draft).pdf
· * NIST SP 800-053r4_final_word_errata_01_22_2015.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations Controls (Errata), 2014-01-15.xml
· * NIST SP 800-053A Guide for Assessing the Security Controls in Fed Info Systems, 2008-06.pdf
· * NIST SP 800-053r5-draft-controls-markup.pdf
· * alt-SP800-53r4.pdf
· * alt-SP800-53Ar4.pdf
· * alt-SP800-53.pdf
· * alt-SP800-53r5-draft.pdf
· * NIST SP 800-053r5-draft-baselines-markup.pdf
· * NIST SP 800-053-controls.xml
· * NIST SP 800-053a_r4_errata_12_18_2014.docx
· * sp800-53A-rev1-final.pdf
· * 800-53-rev1-final-clean-sz.pdf
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53r4_summary.pdf
· * NIST.SP.800-53r4.pdf
· * nist.sp.800-53ar4.pdf
· * NIST.SP.800-53Ar4.pdf
· * nist.sp.800-53r4.pdf
· * nistspecialpublication800-53r3.pdf
· * nistspecialpublication800-53r2.pdf
· * nistspecialpublication800-53r1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53a.pdf
· * nistspecialpublication800-53a.pdf
· * NIST.SP.800-53r5.pdf
· * nistspecialpublication800-53.pdf
· * nist.sp.800-53r5.pdf
· * NIST.SP.800-53Ar5.pdf
· * NIST.SP.800-53B.pdf
· * 800-53-rev1-annex3-sz.pdf
· * 800-53-rev1-annex2-sz.pdf
· * 800-53-rev1-annex1-sz.pdf
· * NIST.SP.800-53r5-draft.pdf
· * nist.sp.800-53r5-draft.pdf
· * NIST.SP.800-53Ar5-draft.pdf
· * NIST.SP.800-53B-draft.pdf
· * sp800_53a_r4_errata_12_18_2014.docx
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * DOJ_CSAM_Planning_for_Implementing_SP-800-53_Rev5_FINAL.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * apply-sp-800-53-ics-final-22aug06.pdf
· * NIST_SP_800-53_Comment_Site_User_Guide_FINAL_8Sept2021.pdf
· * ics-in-sp800-53_final_21mar07.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * ics-in-sp800-53_final_21Mar07.pdf
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53-collaboration-index-template.docx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53-collaboration-index-template.xlsx
· * sp800-53r5-control-catalog.xlsx
· * sp800-53-collaboration-index-template.docx
· * sp800-53-collaboration-index-template.xlsx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-control-catalog.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * OLIR_review_800-213A_to_800-53_rev5_final.xlsx
· * Federal_Cybersecurity_Privacy_Forum_2Dec2021_NIST_SP800-53update.pdf
· * Federal_Cybersecurity_and_Privacy_Forum_15Feb2022_What_Is_New_SP800-53ARevision5.pdf
· * Federal_Cybersecurity_Privacy_Professionals_Forum_2Dec2021_FedRAMP_NIST800-53_Rev5.pdf
· * cybersecurity-innovation-forum_01-28-2014.pdf
· * ePACS Overlay_v1_SP800-53rev5-April2021.pdf
· * FPKI Overlay-v1-SP800-53rev5-April2021.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * 2.4 - Main - DOJ Adopting OSCAL to Deliver Lastest NIST SP 800-53 Controls.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * sp800-53-rev4-ipd.pdf
· * RMF 2.0 Deep Dive 5-15-18 v3 - Kelley Dempsey Naomi Lefkovitz.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * update-draft-800-53r5-v2.pdf
· * sp800_53_r4_appendix_g_markup_draft2.pdf
· * sp800_53a_r4_draft.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_f_markup_draft2.pdf
· * sp800-53-rev4-ipd.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_d_markup_draft2.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * Day_1_AM2_SCRM_Controls_Jon_Boyens.pdf
· * 800-53-for-ICS_KEMA.pdf
· * sp800-53r5-draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft-fpd-summary-of-significant-changes.pdf
· * sp800-53r5-draft-fpd-faq.pdf
· * sp800-53r5-draft.pdf
· * 800-53-Rev4_announcement.pdf
· * 1.5 - Main - SP800-53 Empowered by OSCAL_28Feb2022.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * appxi_800-53-rev1-augmented_15may07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP_800-53B_derived-OSCAL.pdf
· * sp_800-53_v5_1-derived-oscal.pdf
· * SP_800-53_v5_1-derived-OSCAL.pdf
· * sp800_53a_r4_draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft.pdf
· * 800-53-for-ICS_KEMA.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * sp800-53r5-fpd-controls.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * 800-53 automation workflow.pdf
· * 800-53-rev4-controls.csv
· * 800-53-rev4-controls.xml
· * 800-53-rev3-controls.xml
· * 800-53-rev3-controls.csv
· * SP800-177-Rev-1-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_LOW-baseline_profile_load.csv
· * NIST_SP-800-53_rev5-derived-OSCAL.xlsx
· * SP800-161-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_PRIVACY-baseline_profile_load.csv
· * NIST_SP-800-53_rev5_MODERATE-baseline_profile_load.csv
· * SP800-82-Rev-2-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_catalog_load.csv
· * NIST_SP-800-53_rev5_HIGH-baseline_profile_load.csv
· * sp800-53r5-draft-fpd-comparison-with-rev4.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-draft-fpd-comment-template.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53ar5-draft-comment-template.xlsx
· * sp800-53ar5-draft-comment-template.xlsx
· * stig-mapping-to-nist-800-53.xlsx
· * 800-53a-rev4-objectives.csv
· * 800-53a-rev4-objectives.xml
· * 800-53A-rev3-objectives.xml
· * SP800-53-control-comment-template.xlsx
· * WIP_800_53_Rev_5_to_Framework_v_1_1.xlsx
· * sp80053-focal-elements.csv
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * sp80053-focal-details.csv
· * SP_800-53_v5_1_XML.xml
· * NIST_SP-800-53B-derived-OSCAL.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * NIST SP 800-53B-Jan2022.xlsx
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * 800_53_rev_4_focal_document_template.xlsx
· * 800_53_Rev_4_Focal_Document_Template.xlsx
· * WIP_Framework_v_1_1_to_800_53_Rev5.xlsx
· * WIP_800_53_Rev_4_to_Framework_v_1_1.xlsx
· * sp800-53B-draft-comment-template.xlsx
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
* [SP 800-54]+2 – Border Gateway Protocol Security
* [SP 800-56A]+23 – Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography
* [SP 800-57]+46 – Recommendation on Key Management
· * NIST SP 800-057 Part 3r1 Recommendation for Key Management, Part 3; Application-Specific Key Management Guidance, 2015-01-22 (Final).pdf
· * NIST SP 800-057 Part 2 Recommendation for Key Management, Part 2; Best Practices for Key Management Organization, 2005-08-25 (Final).pdf
· * NIST SP 800-057 Recommendation for Key Management, Part 1; 2005-08 (updated March 9, 2007).pdf
· * NIST SP 800-057 Recommendation for Key Management, Part 2; 2005-08 (updated March 9, 2007).pdf
· * NIST SP 800-057 Recommendation for Key Management; Part 3 Key Management, 2007-03.pdf
· * NIST SP 800-057 Part 2r1 Recommendation for Key Management, Part 2; Best Practices for Key Management Organizations (2nd Draft), 2018-11-20 (Draft).pdf
· * NIST SP 800-057pt1r4_commentsreceived.pdf
· * alt-SP800-57part1rev4.pdf
· * alt-SP800-57part1rev3_general.pdf
· * NIST SP 800-057-pt2-draft-comments-received-apr2005.pdf
· * alt-SP800-57part3rev1.pdf
· * alt-SP800-57part2.pdf
· * sp800-57pt1r4_comments_received.pdf
· * nistspecialpublication800-57p1r3.pdf
· * nistspecialpublication800-57p1r2006.pdf
· * nistspecialpublication800-57p1r2007.pdf
· * nist.sp.800-57pt3r1.pdf
· * NIST.SP.800-57pt2r1.pdf
· * NIST.SP.800-57Pt3r1.pdf
· * sp800-57-Part1-revised2_Mar08-2007.pdf
· * nistspecialpublication800-57p2.pdf
· * NIST.SP.800-57pt1r5.pdf
· * nist.sp.800-57pt1r5.pdf
· * nistspecialpublication800-57p3.pdf
· * nistspecialpublication800-57p1.pdf
· * sp800-57_part1_rev3_general.pdf
· * NIST.SP.800-57pt1r5-draft.pdf
· * SP800-57-Part2.pdf
· * sp800-57pt1r4_comments_received.pdf
· * sp800-57pt1r4_draft_track_changes_from_rev3_to_rev4.pdf
· * sp800-57p1r4_draft.pdf
· * sp800-57-pt2-draft-comments-received-apr2005.pdf
· * sp800_57_pt3_r1_draft.pdf
· * SP80057TranPlan.pdf
· * SP80057TranPlan.pdf
· * sp800_57_pt3_r1_draft.pdf
· * CommentsSP800-57-1.pdf
· * Draft_SP800-57-Part1-Rev3_May2011.pdf
· * sp800-57-pt1-draft-apr2005-comments.pdf
· * sp800-57-pt1-draft-apr2005.pdf
· * sp800-57pt2-r1-draft.pdf
· * sp800-57pt2-r1-draft.pdf
· * sp800-57pt2-r1-draft2.pdf
· * sp800-57-pt1-draft-Jan2003.pdf
· * sp800-57-pt1-draft-Jan2003-comments.pdf
· * CommentsSP800-57Part2.pdf
* [SP 800-58]+2 – Security Considerations for Voice Over IP Systems
* [SP 800-66r1]+9 – An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act Security Rule
* [SP 800-67 1.1]+7 – Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher
* [SP 800-68r1]+6 – Guide to Securing Microsoft Windows XP Systems for IT Professionals
* [SP 800-70]+12 – Security Configuration Checklists Program for IT Products
* [SP 800-73]+44 – Interfaces for Personal Identity Verification
* [SP 800-77]+4 – Guide to IPSec VPNs
* [SP 800-78]+20 – Cryptographic Algorithms and Key Sizes for Personal Identity Verification
* [SP 800-81]+6 – Secure Domain Name System (DNS) Deployment Guide
* [SP 800-83]+7 – Guide to Malware Incident Prevention and Handling
* [SP 800-89]+2 – Recommendation for Obtaining Assurances for Digital Signature Applications
* [SP 800-90]+52 – Recommendation for Random Number Generation Using Deterministic Random Bit Generators
* [SP 800-95]+2 – Guide to Secure Web Services
* [SP 800-97]+2 – Guide to IEEE 802.11i: Robust Security Networks
* [SP 800-98]+2 – Guidelines for Securing Radio Frequency Identification (RFID) Systems
+ SYSTEM & SERVICES ACQUISITION
* [FIPS 200]+2 – Minimum Security Requirements for Federal Information and Information Systems
* [SP 800-100]+1 – Information Security Handbook: A Guide for Managers
* [SP 800-101]+5 – Guidelines on Cell Phone Forensics
* [SP 800-115]+7 – Technical Guide to Information Security Testing and Assessment
* [SP 800-12]+23 – An Introduction to Computer Security: The NIST Handbook
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, 1995-10.pdf
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 2, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 1, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 5, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 4, 1995-10.ps
· * NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 3, 1995-10.ps
· * derived-piv-nist-sp1800-12b-v2.pdf
· * derived-piv-nist-sp1800-12a-v2.pdf
· * derived-piv-nist-sp1800-12c-v2.pdf
· * derived-piv-nist-sp1800-12-v2.pdf
· * derived-piv-nist-sp1800-12-draft.pdf
· * derived-piv-nist-sp1800-12c-draft.pdf
· * derived-piv-nist-sp1800-12a-draft.pdf
· * derived-piv-nist-sp1800-12b-draft.pdf
· * NIST.SP.800-12r1.pdf
· * NIST.SP.1800-12.pdf
· * nistspecialpublication800-12.pdf
· * 800-12_4.ps
· * 800-12_5.ps
· * 800-12_1.ps
· * 800-12_2.ps
· * 800-12_3.ps
· * sp800_12_r1_draft.pdf
* [SP 800-121]+15 – Guide to Bluetooth Security
* [SP 800-124]+11 – Guidelines on Cell Phone and PDA Security
* [SP 800-14]+8 – Generally Accepted Principles and Practices for Securing Information Technology Systems
* [SP 800-21r2]+5 – Guideline for Implementing Cryptography in the Federal Government
* [SP 800-23]+3 – Guideline to Federal Organizations on Security Assurance and Acquisition/Use of Tested/Evaluated Products
* [SP 800-27rA]+2 – Engineering Principles for Information Technology Security (A Baseline for Achieving Security)
* [SP 800-30]+12 – Risk Management Guide for Information Technology Systems
* [SP 800-33]+1 – Underlying Technical Models for Information Technology Security
* [SP 800-34]+22 – Contingency Planning Guide for Information Technology Systems
* [SP 800-35]+1 – Guide to Information Technology Security Services
* [SP 800-36]+1 – Guide to Selecting Information Technology Security Products
* [SP 800-48r1]+4 – Guide to Securing Legacy IEEE 802.11 Wireless Networks
* [SP 800-53r3]+235 – Recommended Security Controls for Federal Information Systems and Organizations
· * NIST SP 800-053Ar4 Assessing Security and Privacy Controls in Federal Information Systems and Organizations; Building Effective Assessment Plans, 2014-12-18 (Final).pdf
· * NIST SP 800-053r2 Recommended Security Controls for Fed Info Systems, 2007-12 (final).pdf
· * alt-SP800-53-rev3-final_updated-errata_05-01-2010.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r2 to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r3FPD to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 2 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 1 (Errata), 2010-05-01.pdf
· * NIST SP 800-053Ar1 Guide for Assessing the Security Controls in Federal Information Systems and Organizations, 2010-06-29.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2013-05-07.pdf
· * NIST SP 800-053r5 Security and Privacy Controls for Information Systems and Organizations, 2017-08-15 (Draft).pdf
· * NIST SP 800-053r4_final_word_errata_01_22_2015.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations Controls (Errata), 2014-01-15.xml
· * NIST SP 800-053A Guide for Assessing the Security Controls in Fed Info Systems, 2008-06.pdf
· * NIST SP 800-053r5-draft-controls-markup.pdf
· * alt-SP800-53r4.pdf
· * alt-SP800-53Ar4.pdf
· * alt-SP800-53.pdf
· * alt-SP800-53r5-draft.pdf
· * NIST SP 800-053r5-draft-baselines-markup.pdf
· * NIST SP 800-053-controls.xml
· * NIST SP 800-053a_r4_errata_12_18_2014.docx
· * sp800-53A-rev1-final.pdf
· * 800-53-rev1-final-clean-sz.pdf
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53r4_summary.pdf
· * NIST.SP.800-53r4.pdf
· * nist.sp.800-53ar4.pdf
· * NIST.SP.800-53Ar4.pdf
· * nist.sp.800-53r4.pdf
· * nistspecialpublication800-53r3.pdf
· * nistspecialpublication800-53r2.pdf
· * nistspecialpublication800-53r1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53a.pdf
· * nistspecialpublication800-53a.pdf
· * NIST.SP.800-53r5.pdf
· * nistspecialpublication800-53.pdf
· * nist.sp.800-53r5.pdf
· * NIST.SP.800-53Ar5.pdf
· * NIST.SP.800-53B.pdf
· * 800-53-rev1-annex3-sz.pdf
· * 800-53-rev1-annex2-sz.pdf
· * 800-53-rev1-annex1-sz.pdf
· * NIST.SP.800-53r5-draft.pdf
· * nist.sp.800-53r5-draft.pdf
· * NIST.SP.800-53Ar5-draft.pdf
· * NIST.SP.800-53B-draft.pdf
· * sp800_53a_r4_errata_12_18_2014.docx
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * DOJ_CSAM_Planning_for_Implementing_SP-800-53_Rev5_FINAL.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * apply-sp-800-53-ics-final-22aug06.pdf
· * NIST_SP_800-53_Comment_Site_User_Guide_FINAL_8Sept2021.pdf
· * ics-in-sp800-53_final_21mar07.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * ics-in-sp800-53_final_21Mar07.pdf
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53-collaboration-index-template.docx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53-collaboration-index-template.xlsx
· * sp800-53r5-control-catalog.xlsx
· * sp800-53-collaboration-index-template.docx
· * sp800-53-collaboration-index-template.xlsx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-control-catalog.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * OLIR_review_800-213A_to_800-53_rev5_final.xlsx
· * Federal_Cybersecurity_Privacy_Forum_2Dec2021_NIST_SP800-53update.pdf
· * Federal_Cybersecurity_and_Privacy_Forum_15Feb2022_What_Is_New_SP800-53ARevision5.pdf
· * Federal_Cybersecurity_Privacy_Professionals_Forum_2Dec2021_FedRAMP_NIST800-53_Rev5.pdf
· * cybersecurity-innovation-forum_01-28-2014.pdf
· * ePACS Overlay_v1_SP800-53rev5-April2021.pdf
· * FPKI Overlay-v1-SP800-53rev5-April2021.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * 2.4 - Main - DOJ Adopting OSCAL to Deliver Lastest NIST SP 800-53 Controls.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * sp800-53-rev4-ipd.pdf
· * RMF 2.0 Deep Dive 5-15-18 v3 - Kelley Dempsey Naomi Lefkovitz.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * update-draft-800-53r5-v2.pdf
· * sp800_53_r4_appendix_g_markup_draft2.pdf
· * sp800_53a_r4_draft.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_f_markup_draft2.pdf
· * sp800-53-rev4-ipd.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_d_markup_draft2.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * Day_1_AM2_SCRM_Controls_Jon_Boyens.pdf
· * 800-53-for-ICS_KEMA.pdf
· * sp800-53r5-draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft-fpd-summary-of-significant-changes.pdf
· * sp800-53r5-draft-fpd-faq.pdf
· * sp800-53r5-draft.pdf
· * 800-53-Rev4_announcement.pdf
· * 1.5 - Main - SP800-53 Empowered by OSCAL_28Feb2022.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * appxi_800-53-rev1-augmented_15may07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP_800-53B_derived-OSCAL.pdf
· * sp_800-53_v5_1-derived-oscal.pdf
· * SP_800-53_v5_1-derived-OSCAL.pdf
· * sp800_53a_r4_draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft.pdf
· * 800-53-for-ICS_KEMA.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * sp800-53r5-fpd-controls.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * 800-53 automation workflow.pdf
· * 800-53-rev4-controls.csv
· * 800-53-rev4-controls.xml
· * 800-53-rev3-controls.xml
· * 800-53-rev3-controls.csv
· * SP800-177-Rev-1-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_LOW-baseline_profile_load.csv
· * NIST_SP-800-53_rev5-derived-OSCAL.xlsx
· * SP800-161-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_PRIVACY-baseline_profile_load.csv
· * NIST_SP-800-53_rev5_MODERATE-baseline_profile_load.csv
· * SP800-82-Rev-2-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_catalog_load.csv
· * NIST_SP-800-53_rev5_HIGH-baseline_profile_load.csv
· * sp800-53r5-draft-fpd-comparison-with-rev4.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-draft-fpd-comment-template.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53ar5-draft-comment-template.xlsx
· * sp800-53ar5-draft-comment-template.xlsx
· * stig-mapping-to-nist-800-53.xlsx
· * 800-53a-rev4-objectives.csv
· * 800-53a-rev4-objectives.xml
· * 800-53A-rev3-objectives.xml
· * SP800-53-control-comment-template.xlsx
· * WIP_800_53_Rev_5_to_Framework_v_1_1.xlsx
· * sp80053-focal-elements.csv
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * sp80053-focal-details.csv
· * SP_800-53_v5_1_XML.xml
· * NIST_SP-800-53B-derived-OSCAL.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * NIST SP 800-53B-Jan2022.xlsx
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * 800_53_rev_4_focal_document_template.xlsx
· * 800_53_Rev_4_Focal_Document_Template.xlsx
· * WIP_Framework_v_1_1_to_800_53_Rev5.xlsx
· * WIP_800_53_Rev_4_to_Framework_v_1_1.xlsx
· * sp800-53B-draft-comment-template.xlsx
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
* [SP 800-64r2]+5 – Security Considerations in the Information System Development Life Cycle
* [SP 800-65r1]+3 – Integrating Security into the Capital Planning and Investment Control Process
* [SP 800-66r1]+9 – An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act Security Rule
* [SP 800-76]+16 – Biometric Data Specification for Personal Identity Verification
* [SP 800-83]+7 – Guide to Malware Incident Prevention and Handling
* [SP 800-85A]+17 – PIV Card Application and Middleware Interface Test Guidelines (SP 800-73 compliance)
* [SP 800-85B]+14 – PIV Data Model Test Guidelines
* [SP 800-97]+2 – Guide to IEEE 802.11i: Robust Security Networks
* [SP 800-98]+2 – Guidelines for Securing Radio Frequency Identification (RFID) Systems
+ E-GOVERNMENT ACT OF 2002 [Public Law 107-347]
:: Mandates NIST development of security standards
* [FIPS 199]+7 – Standards for Security Categorization of Federal Information and Information Systems
* [FIPS 200]+2 – Minimum Security Requirements for Federal Information and Information Systems
+ HOMELAND SECURITY PRESIDENTIAL DIRECTIVE-12 (HSPD-12), COMMON IDENTIFICATION STANDARD FOR FEDERAL EMPLOYEES AND CONTRACTORS
:: Establishes a mandatory, Government-wide standard for secure and reliable forms of identification issued by the Federal Government to its employees and contractors
* [August 2005]+9 – Implementation Of FIPS 201, Personal Identity Verification (PIV) Of Federal Employees And Contractors
* [FIPS 201]+374 – Personal Identity Verification for Federal Employees and Contractors
* [January 2006]+3 – Testing And Validation Of Personal Identity Verification (PIV) Components And Subsystems For Conformance To Federal Information Processing Standard 201
* [March 2005]+13 – Personal Identity Verification (PIV) Of Federal Employees And Contractors: Federal Information Processing Standard (FIPS) 201
* [IR 7284]+2 – Personal Identity Verification Card Management Report
* [IR 7337]+2 – Personal Identity Verification Demonstration Summary
* [SP 800-73]+44 – Interfaces for Personal Identity Verification
* [SP 800-76]+16 – Biometric Data Specification for Personal Identity Verification
* [SP 800-78]+20 – Cryptographic Algorithms and Key Sizes for Personal Identity Verification
* [SP 800-79]+10 – Guidelines for the Accreditation of Personal Identity Verification (PIV) Card Issuers (PCI's)
* [SP 800-85A]+17 – PIV Card Application and Middleware Interface Test Guidelines (SP 800-73 compliance)
* [SP 800-85B]+14 – PIV Data Model Test Guidelines
+ OMB CIRCULAR A–11: PREPARATION, SUBMISSION, AND EXECUTION OF THE BUDGET
:: Capital Planning
* [SP 800-55r1]+8 – Performance Measurement Guide for Information Security
* [SP 800-65]+3 – Integrating IT Security into the Capital Planning and Investment Control Process
+ Health Insurance Portability and Accountability Act (HIPAA)
:: Standardize electronic data interchange in health care transactions
* [SP 800-66r1]+9 – An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act Security Rule
+ Homeland Security Presidential Directive-7 (HSPD-7), Critical Infrastructure Identification, Prioritization, and Protection
:: Protect critical infrastructure
* [FIPS 199]+7 – Standards for Security Categorization of Federal Information and Information Systems
* [FIPS 200]+2 – Minimum Security Requirements for Federal Information and Information Systems
* [SP 800-18r1]+11 – Guide for Developing Security Plans for Information Systems
* [SP 800-30]+12 – Risk Management Guide for Information Technology Systems
* [SP 800-37]+39 – Guide for Security Certification and Accreditation of Federal Information Systems
* [SP 800-53r3]+235 – Recommended Security Controls for Federal Information Systems and Organizations
· * NIST SP 800-053Ar4 Assessing Security and Privacy Controls in Federal Information Systems and Organizations; Building Effective Assessment Plans, 2014-12-18 (Final).pdf
· * NIST SP 800-053r2 Recommended Security Controls for Fed Info Systems, 2007-12 (final).pdf
· * alt-SP800-53-rev3-final_updated-errata_05-01-2010.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r2 to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r3FPD to r3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 2 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 3 (Errata), 2010-05-01.pdf
· * NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 1 (Errata), 2010-05-01.pdf
· * NIST SP 800-053Ar1 Guide for Assessing the Security Controls in Federal Information Systems and Organizations, 2010-06-29.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.pdf
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2013-05-07.pdf
· * NIST SP 800-053r5 Security and Privacy Controls for Information Systems and Organizations, 2017-08-15 (Draft).pdf
· * NIST SP 800-053r4_final_word_errata_01_22_2015.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.docx
· * NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations Controls (Errata), 2014-01-15.xml
· * NIST SP 800-053A Guide for Assessing the Security Controls in Fed Info Systems, 2008-06.pdf
· * NIST SP 800-053r5-draft-controls-markup.pdf
· * alt-SP800-53r4.pdf
· * alt-SP800-53Ar4.pdf
· * alt-SP800-53.pdf
· * alt-SP800-53r5-draft.pdf
· * NIST SP 800-053r5-draft-baselines-markup.pdf
· * NIST SP 800-053-controls.xml
· * NIST SP 800-053a_r4_errata_12_18_2014.docx
· * sp800-53A-rev1-final.pdf
· * 800-53-rev1-final-clean-sz.pdf
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53r4_summary.pdf
· * NIST.SP.800-53r4.pdf
· * nist.sp.800-53ar4.pdf
· * NIST.SP.800-53Ar4.pdf
· * nist.sp.800-53r4.pdf
· * nistspecialpublication800-53r3.pdf
· * nistspecialpublication800-53r2.pdf
· * nistspecialpublication800-53r1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53ar1.pdf
· * nistspecialpublication800-53a.pdf
· * nistspecialpublication800-53a.pdf
· * NIST.SP.800-53r5.pdf
· * nistspecialpublication800-53.pdf
· * nist.sp.800-53r5.pdf
· * NIST.SP.800-53Ar5.pdf
· * NIST.SP.800-53B.pdf
· * 800-53-rev1-annex3-sz.pdf
· * 800-53-rev1-annex2-sz.pdf
· * 800-53-rev1-annex1-sz.pdf
· * NIST.SP.800-53r5-draft.pdf
· * nist.sp.800-53r5-draft.pdf
· * NIST.SP.800-53Ar5-draft.pdf
· * NIST.SP.800-53B-draft.pdf
· * sp800_53a_r4_errata_12_18_2014.docx
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * DOJ_CSAM_Planning_for_Implementing_SP-800-53_Rev5_FINAL.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * Apply-SP-800-53-ICS-final-22Aug06.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * apply-sp-800-53-ics-final-22aug06.pdf
· * NIST_SP_800-53_Comment_Site_User_Guide_FINAL_8Sept2021.pdf
· * ics-in-sp800-53_final_21mar07.pdf
· * ICS-in-SP800-53_final_21Mar07.pdf
· * ics-in-sp800-53_final_21Mar07.pdf
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-potential-updates.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-appj-to-r5-comparison.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r4-to-r5-comparison-workbook.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53-collaboration-index-template.docx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53-collaboration-index-template.xlsx
· * sp800-53r5-control-catalog.xlsx
· * sp800-53-collaboration-index-template.docx
· * sp800-53-collaboration-index-template.xlsx
· * csf-pf-to-sp800-53r5-mappings.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53r5-to-iso-27001-mapping.docx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-control-catalog.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800_53a_r4_errata_12_18_2014.docx
· * sp800_53_r4_final_word_errata_01_22_2015.docx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * sp800-53b-control-baselines.xlsx
· * OLIR_review_800-213A_to_800-53_rev5_final.xlsx
· * Federal_Cybersecurity_Privacy_Forum_2Dec2021_NIST_SP800-53update.pdf
· * Federal_Cybersecurity_and_Privacy_Forum_15Feb2022_What_Is_New_SP800-53ARevision5.pdf
· * Federal_Cybersecurity_Privacy_Professionals_Forum_2Dec2021_FedRAMP_NIST800-53_Rev5.pdf
· * cybersecurity-innovation-forum_01-28-2014.pdf
· * ePACS Overlay_v1_SP800-53rev5-April2021.pdf
· * FPKI Overlay-v1-SP800-53rev5-April2021.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * draft_sp800-53-rev5_update-message.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * 2.4 - Main - DOJ Adopting OSCAL to Deliver Lastest NIST SP 800-53 Controls.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * forum_feb2015_dhs_sp800-53-appendix-j.pdf
· * sp800-53-rev4-ipd.pdf
· * RMF 2.0 Deep Dive 5-15-18 v3 - Kelley Dempsey Naomi Lefkovitz.pdf
· * sp800-53r5-draft-controls-markup.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_ltr_omb_sp800-53rev4.pdf
· * ispab_oct2012_rross_sp800-53-rev4.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * ispab_july09-ross_harmonization-sp800-53-rev3.pdf
· * update-draft-800-53r5-v2.pdf
· * sp800_53_r4_appendix_g_markup_draft2.pdf
· * sp800_53a_r4_draft.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_f_markup_draft2.pdf
· * sp800-53-rev4-ipd.pdf
· * sp800_53_r4_draft_fpd.pdf
· * sp800_53_r4_appendix_d_markup_draft2.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * README-for-CSV-sp800-53ar5-assessment-procedures.txt
· * readme-for-csv-sp800-53ar5-assessment-procedures.txt
· * Day_1_AM2_SCRM_Controls_Jon_Boyens.pdf
· * 800-53-for-ICS_KEMA.pdf
· * sp800-53r5-draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft-fpd-summary-of-significant-changes.pdf
· * sp800-53r5-draft-fpd-faq.pdf
· * sp800-53r5-draft.pdf
· * 800-53-Rev4_announcement.pdf
· * 1.5 - Main - SP800-53 Empowered by OSCAL_28Feb2022.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * appxi_800-53-rev1-augmented_15may07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * AppxI_800-53-rev1-augmented_15May07.pdf
· * ICS-Augmentation-Appx-F-800-53-rev1_clean_22jun07.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP800-53_Comment_Site_Infographic.pdf
· * SP_800-53B_derived-OSCAL.pdf
· * sp_800-53_v5_1-derived-oscal.pdf
· * SP_800-53_v5_1-derived-OSCAL.pdf
· * sp800_53a_r4_draft.pdf
· * sp800-53r5-draft-baselines-markup.pdf
· * sp800-53r5-draft.pdf
· * 800-53-for-ICS_KEMA.pdf
· * 800-53-for-ICS_KEMA-BlackWhite.pdf
· * sp800-53r5-fpd-controls.xlsx
· * sp800-53ar5-assessment-procedures.txt
· * sp800-53ar5-assessment-procedures.txt
· * 800-53 automation workflow.pdf
· * 800-53-rev4-controls.csv
· * 800-53-rev4-controls.xml
· * 800-53-rev3-controls.xml
· * 800-53-rev3-controls.csv
· * SP800-177-Rev-1-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_LOW-baseline_profile_load.csv
· * NIST_SP-800-53_rev5-derived-OSCAL.xlsx
· * SP800-161-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_PRIVACY-baseline_profile_load.csv
· * NIST_SP-800-53_rev5_MODERATE-baseline_profile_load.csv
· * SP800-82-Rev-2-to-SP800-53-Rev-4.xlsx
· * NIST_SP-800-53_rev5_catalog_load.csv
· * NIST_SP-800-53_rev5_HIGH-baseline_profile_load.csv
· * sp800-53r5-draft-fpd-comparison-with-rev4.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53r5-draft-fpd-comment-template.xlsx
· * sp800-53ar5-assessment-procedures.csv
· * sp800-53ar5-draft-comment-template.xlsx
· * sp800-53ar5-draft-comment-template.xlsx
· * stig-mapping-to-nist-800-53.xlsx
· * 800-53a-rev4-objectives.csv
· * 800-53a-rev4-objectives.xml
· * 800-53A-rev3-objectives.xml
· * SP800-53-control-comment-template.xlsx
· * WIP_800_53_Rev_5_to_Framework_v_1_1.xlsx
· * sp80053-focal-elements.csv
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * sp80053-focal-details.csv
· * SP_800-53_v5_1_XML.xml
· * NIST_SP-800-53B-derived-OSCAL.xlsx
· * sp800-53ar5-assessment-procedures.xlsx
· * NIST SP 800-53B-Jan2022.xlsx
· * 800_53_Rev_5_Focal_Document_Template.xlsx
· * 800_53_rev_4_focal_document_template.xlsx
· * 800_53_Rev_4_Focal_Document_Template.xlsx
· * WIP_Framework_v_1_1_to_800_53_Rev5.xlsx
· * WIP_800_53_Rev_4_to_Framework_v_1_1.xlsx
· * sp800-53B-draft-comment-template.xlsx
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PS-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SC_Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IR-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_IA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_PL-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_CM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_SA-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_AC-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_PM-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
· * 800-53A-R1_Assessment-Cases_RA-Family_ipd.zip
* [SP 800-59]+3 – Guideline for Identifying an Information System as a National Security System
* [SP 800-60r1]+17 – Guide for Mapping Types of Information and Information Systems to Security Categories
* [SP 800-82]+11 – Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control System Security
* [SP 800-98]+2 – Guidelines for Securing Radio Frequency Identification (RFID) Systems
Partial index sourced from
here,
send us your amendments
here.
Full listing below:
* NIST SB 2012-10 Conducting Information Security-Related Risk Assessments; Updated Guidelines For Comprehensive Risk Management Programs.pdf
* NIST SB 2003-11 Network Security Testing.pdf
* alt-IR7316.pdf
* NIST SP 800-073-4 Interfaces for Personal Identity Verification, 2016-02-12 (Final).pdf
* NIST SP 800-037r2-ipd-rollout-DOJ-20180509.pdf
* NIST IR 7817 A Credential Reliability and Revocation Model for Federated Identities, 2012-11.pdf
* NIST IR 7788.pdf
* NIST IR 7516.pdf
* NIST SP 800-001.pdf
* NIST IR 7290.pdf
* alt-SP800-53r4.pdf
* NIST SP 800-116.pdf
* alt-SP800-94.pdf
* NIST FIPS 140-1 Security Requirements for Cryptographic Modules, 1994-01.pdf
* alt-SP800-146.pdf
* alt-SP800-92.pdf
* NIST SP 800-022 Errata, 2001-05-15.pdf
* NIST SP 800-088r1 Guidelines for Media Sanitization, 2006-09.pdf
* NIST SB 1992-05 An Introduction to Secure Telephone Terminals.txt
* fs-itam-nist-sp1800-5a-draft.pdf
* alt-IR7517-CMSS.pdf
* NIST SP 500-269 Web Application Scanner Functional Specification 1.0, 2007.pdf
* NIST SP 800-111 Guide to Storage Encryption Technologies for End User Devices, 2007-11.pdf
* mf-ics-NIST IR 8219.pdf
* NIST SP 800-038C Recommendation for Block Cipher Modes of Operation; the CCM Mode for Authentication and Confidentiality, 2007-07-20.pdf
* NIST SP 800-171A Assessing Security Requirements for Controlled Unclassified Information, 2018-06.pdf
* alt-SP800-39-final.pdf
* NIST SP 800-195 2016 NIST-ITL Cybersecurity Program Annual Report, 2017-09-28 (Final).pdf
* NIST SP 800-092 Guide to Computer Security Log Management, 2006-09.pdf
* NIST SB 1993-08 Security Program Management.txt
* NIST IR 7823.pdf
* NIST IR 7359.pdf
* NIST SP 800-016 Information Technology Security Training Requirements; A Role- and Performance-Based Model, Appendix A-D, 1998-04.pdf
* NIST SP 800-014 Generally Accepted Principles and Practices for Securing Information Technology Systems, 1996-09.wpd
* NIST SP 500-293d US Government Cloud Computing Technology Roadmap, Volume 1; High-Priority Requirements to Further USG Agency Cloud Computing Adoption, 2011-11-01.pdf.pdf
* NIST SP 800-144 Guidelines on Security and Privacy in Public Cloud Computing, 2011-12-09 (Final).pdf
* hit-ehr-nist-sp1800-1c-draft.pdf
* NIST SP 800-154_draft_comment-template.xls
* NIST SB 2009-08 Revised Catalog Of Security Controls For Federal Information Systems And Organizations, 2009-08.pdf
* NIST SP 800-024 PBX Vulnerability Analysis; Finding Holes in Your PBX Before Someone Else Does, 2000-08.pdf
* NIST SP 800-166 Derived PIV Application and Data Model Test Guidelines, 2016-06-06 (Final).pdf
* NIST SP 800-038A Addendum Recommendation for Block Cipher Modes of Operation; Three Variants of Ciphertext Stealing for CBC Mode, 2010-10-21 (Final).pdf
* NIST SP 800-073-3 Interfaces for PIV; Part 4- The PIV Transitional Interfaces & Data Model Specification, 2010-02.pdf
* NIST SP 800-182 Computer Security Division 2015 Annual Report, 2016-08-10 (Final).pdf
* NIST SB 2008-03 Handling Computer Security Incidents; NIST Issues Updated Guidelines.pdf
* NIST SB 2011-12 Revised Guideline For Electronic Authentication Of Users Helps Organizations Protect The Security Of Their Information Systems.pdf
* alt-SP800-53.pdf
* es-sa-nist-sp1800-7b-draft.pdf
* NIST SB 2011-09 Managing The Configuration Of Information Systems With A Focus On Security.pdf
* alt-nist-csf-to-hipaa-security-rule-crosswalk-02-22-2016-final.pdf
* NIST SB 1990-08 Computer Virus Attacks.txt
* NIST SP 800-126 The Technical Specification for the Security Content Automation Protocol (SCAP); SCAP Version 1.0, 2009-11 (Final).pdf
* NIST IR 7692.pdf
* NIST IR 7816_2011-csd-annual-report_NOT-in-final-layout_approved-for-posting.pdf
* NIST IR 7870.pdf
* NIST SP 800-135 Recommendation for Existing Application-Specific Key Derivation Functions, 2010-12.pdf
* alt-IR7751-2010AnnualReport.pdf
* NIST SB 1999-03 Computer Attacks; What They Are and How to Defend Against Them.pdf
* alt-SP800-60v2r1.pdf
* NIST SB 1998-04 Training Reqs for ITSec; An Introduction to Results-Based Learning.txt
* NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 2, 1995-10.ps
* NIST SB 2004-10 Securing Voice Over Internet Protocol (IP) Networks.pdf
* hit-wip-nist-sp1800-8b.pdf
* derived-piv-nist-sp1800-12b-v2.pdf
* alt-IR7696-CPE-Matching.pdf
* dns-secure-email-sp1800-6-draft.pdf
* NIST IR 6981.pdf
* alt-IR7693-AI.pdf
* NIST SP 800-032 Introduction to Public Key Technology and the Federal PKI Infrastructure, 2001-02-26 (Final).pdf
* NIST IR 8103.pdf
* NIST SP 800-049 Federal S-MIME V3 Client Profile, 2002-11.pdf
* NIST SB 2002-07 Overview; The Government Smart Card Interoperability Specification.pdf
* NIST IR 7316.pdf
* NIST SP 800-035 Guide to Information Technology Security Services, 2003-10-09 (Final).pdf
* NIST FIPS 188 Standard Security Labels for Information Transfer, 1994-09.ps
* NIST SP 800-033 Underlying Technical Models for Information Technology Security, 2001-12.pdf
* NIST SB 1999-02 Enhancements to Data Encryption and Digital Signature Federal Standards.pdf
* NIST IR 7219.pdf
* NIST SB 2008-12 Guide To Information Security Testing And Assessment.pdf
* es-idam-nist-sp1800-2-draft.pdf
* NIST IR 7427.pdf
* NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r2 to r3 (Errata), 2010-05-01.pdf
* NIST SP 800-038A Recommendation for Block Cipher Modes of Operation; Methods and Techniques, 2001-12.pdf
* NIST SP 800-175B Guideline for Using Cryptographic Standards in the Federal Government; Cryptographic Mechanisms, 2016-08-22 (Final).pdf
* NIST SP 800-053r2 Recommended Security Controls for Fed Info Systems, 2007-12 (final).pdf
* mds-nist-sp1800-4-draft.zip
* alt-SP800-30.pdf
* NIST SP 800-117 Guide to Adopting and Using the Security Content Automation Protocol (SCAP) 1.0, 2010-07-27.pdf
* alt-SP800-119.pdf
* NIST SB 2000-06 Mitigating Emerging Hacker Threats.pdf
* cr-mfa-nist-sp1800-17c.pdf
* NIST SP 800-030r1 Guide for Conducting Risk Assessments, 2012-09-17 (Final).epub
* alt-SP800-128.pdf
* NIST SP 800-121r1 Guide to Bluetooth Security, 2012-06-12.pdf
* NIST SB 2002-06 Contingency Planning Guide For Information Technology Systems.pdf
* NIST SP 800-058 Security Considerations for Voice Over IP Systems, 2005-01.pdf
* NIST SP 800-038C Recommendation for Block Cipher Modes of Operation; the CCM Mode for Authentication and Confidentiality, 2007-07-20 (Final).pdf
* NIST SP 500-320.pdf
* hit-ehr-nist-sp1800-1d-draft.pdf
* fs-itam-nist-sp1800-5b.pdf
* NIST IR 7802 Trust Model for Security Automation Data (TMSAD) 1.0, 2011-09.pdf
* NIST SP 800-052r2-draft-comments-received.pdf
* NIST SP 800-037r2 Risk Management Framework for Information Systems and Organizations; A System Life Cycle Approach for Security and Privacy (FPD), 2018-10-02 (Draft).pdf
* NIST IR 7275r3 Specification for the Extensible Config Checklist Description Format (XCCDF) 1.1.4.pdf
* NIST SB 2000-10 An Overview Of The Common Criteria Evaluation And Validation Scheme.pdf
* NIST SP 800-087r1 Codes for the Identification of Federal and Federally-Assisted Organizations, 2008-04.pdf
* NIST SP 800-078-4 Cryptographic Algorithms and Key Sizes for Personal Identity Verification, 2015-05-29 (Final).pdf
* NIST SP 800-052r1 Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations, 2014-04-28 (Final).pdf
* NIST SB 2001-07 A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2.pdf
* NIST SP 800-125Ar1 Security Recommendations for Server-based Hypervisor Platforms, 2018-06-07 (Final).pdf
* NIST SP 800-063-1 Electronic Authentication Guidelines, 2011-12-13.pdf
* NIST IR 7275r3.pdf
* NIST IR 7788 Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs, 2011-08.pdf
* NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex A, 2001-05.pdf
* NIST SB 1994-03 Reducing the Risks of Internet Connection and Use.txt
* alt-SP800-97.pdf
* NIST SP 800-053r4_final_word_errata_01_22_2015.docx
* NIST IR 8054.pdf
* NIST SP 500-268 Source Code Security Analysis Tool Functional Specification 1.0, 2007.pdf
* NIST SP 800-018r1 Guide for Developing Security Plans for Federal Information Systems, 2006-02.pdf
* alt-SP800-83r1.pdf
* NIST SP 800-034r1 Contingency Planning Guide for Federal Information Systems, 2010-11-11 (Final).pdf
* NIST IR 8011-1.pdf
* NIST SP 800-053a_r4_errata_12_18_2014.docx
* NIST SP 800-037r1 Guide for Applying the Risk Management Framework to Federal Information Systems; A Security Life Cycle Approach, 2010-02.pdf
* NIST IR 6981 Policy Expression and Enforcement for Handheld Devices, 2003-04.pdf
* NIST IR 7653 2009 Computer Security Division Annual Report, 2010-03.pdf
* NIST SP 500-167.pdf
* fs-pam-nist-sp1800-18a-draft.pdf
* hit-wip-nist-sp1800-8.pdf
* NIST SP 800-179 Guide to Securing Apple OS X 10.10 Systems for IT Professionals; A NIST Security Configuration Checklist, 2016-12-05 (Final).pdf
* NIST SB 1994-11 Digital Signature Standard.txt
* alt-SP800-81-2.pdf
* NIST SP 800-185 SHA-3 Derived Functions; cSHAKE, KMAC, TupleHash, and ParallelHash, 2016-12-22 (Final).pdf
* NIST IR 7665 Proceedings of the Privilege Management Workshop, September 1-3, 2009, 2010-03.pdf
* NIST IR 5495 Computer Security Training & Awareness Course Compendium, 1994 (2009 Minor Edits).txt
* NIST SB 1996-05 The World Wide Web-Managing Security Risks.txt
* di-nist-sp1800-11b-draft.pdf
* NIST IR 7399 2006 Annual Report; Computer Security Division.pdf
* NIST SP 800-187 Guide to LTE Security, 2017-12-21 (Final).pdf
* alt-SP800-55-rev1.pdf
* NIST SP 800-122 Guide to Protecting the Confidentiality of Personally Identifiable Information (PII), 2010-04-06 (Final).epub
* alt-IR7502-CCSS.pdf
* alt-SP800-153.pdf
* NIST IR 7878 Combinatorial Coverage Measurement, 2012-11-01.pdf
* NIST SP 800-150 Guide to Cyber Threat Information Sharing, 2016-10-04 (Final).pdf
* NIST SP 800-038D Recommendation for Block Cipher Modes of Operation; Galois-Counter Mode (GCM) and GMAC, 2007-11.pdf
* NIST SB 2003-12 Security Considerations in the Information System Development Life Cycle.pdf
* NIST FIPS 188 Standard Security Labels for Information Transfer, 1994-09.txt
* NIST IR 4976 Assessing Federal and Commercial Information Security Needs, 1992-11.txt
* NIST SP 800-121r2 Guide to Bluetooth Security, 2017-05-08 (Final).pdf
* NIST IR 7622.pdf
* NIST SP 1800-6.pdf
* NIST FIPS 201-2.pdf
* alt-SP800-53r5-draft.pdf
* NIST IR 8041.pdf
* alt-NIST.SP.800-184.pdf
* NIST SP 800-034-r1_cp_template_low_impact_system.docx
* NIST SB 1999-12 Operating System Security; Adding to the Arsenal of Security Techniques.txt
* NIST SP 800-160-vol2-comment-template.xlsx
* NIST SB 2009-10 Protecting Information Systems With Firewalls; Revised Guidelines On Firewall Technologies And Policies.pdf
* alt-SP800-48r1.pdf
* NIST SP 800-146 Cloud Computing Synopsis and Recommendations, 2012-05.pdf
* NIST SB 2008-07 Guidelines On Implementing A Secure Sockets Layer (SSL) Virtual Private Network (VPN).pdf
* NIST SP 800-126A SCAP 1.3 Component Specification Version Updates; An Annex to NIST Special Publication 800-126 r3, 2018-02-14 (Final).pdf
* NIST SP 800-114 User’s Guide to Securing External Devices for Telework and Remote Access. November 2007.pdf
* NIST SP 800-068r1.pdf
* NIST SP 800-135r1-informative-note-20160919.pdf
* NIST SP 800-100 InfoSec Handbook; A Guide for Managers, 2006-10 (updated March 9, 2007).pdf
* NIST IR 8176.pdf
* alt-SP800-57part1rev4.pdf
* NIST SP 800-176 Computer Security Division 2014 Annual Report, 2015-08-20 (Final).pdf
* NIST SP 800-053r5-draft-baselines-markup.pdf
* NIST SP 800-048r1 Guide to Securing Legacy IEEE 802.11 Wireless Networks, 2008-07.pdf
* alt-SP800-52r1.pdf
* alt-IR7442-2007AnnualReport.pdf
* NIST SB 1997-04 Security Considerations In Computer Support And Operations.txt
* alt-IR8183.pdf
* NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations, 2015-01-22 (Final).pdf
* NIST SB 2004-01 Computer Security Incidents; Assessing, Managing, And Controlling The Risks.pdf
* NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 1, 1995-10.ps
* NIST IR 7298r2.pdf
* NIST SP 800-133 Recommendation for Cryptographic Key Generation, 2012-12-21 (Final).pdf
* NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 5, 1995-10.ps
* NIST SB 1999-02 Enhancements to Data Encryption and Digital Signature Fed Standards.txt
* NIST SP 800-067v1.1 Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher, 2008-06.pdf
* alt-SP800-21-1_Dec2005.pdf
* psfr-mobile-sso-nist-sp1800-13a-draft.pdf
* alt-IR7695-CPE-Naming.pdf
* NIST SP 800-085B-4 PIV Data Model Test Guidelines, 2014-08-06 (Draft).pdf
* NIST SP 800-180_draft_comment-template.xls
* NIST SP 800-094 Guide to Intrusion Detection and Prevention Systems (IDPS), 2007-02.pdf
* alt-SP800-195-2016AnnualReport.pdf
* alt-SP800-114r1.pdf
* derived-piv-nist-sp1800-12a-v2.pdf
* NIST SP 800-153 Guidelines for Securing Wireless Local Area Networks (WLANs), 2012-02.pdf
* alt-IR7285-2005AnnualReport.pdf
* NIST SB 2000-07 Identifying Critical Patches With ICat.pdf
* NIST FIPS 186-3 Federal Register Notice - Digital Signature Standard (DSS), 2009-06.pdf
* NIST SB 2009-07 Risk Management Framework; Helping Organizations Implement Effective Information Security Programs.pdf
* NIST SP 800-097 Establishing Wireless Robust Security Networks; A Guide to IEEE 802.11i, 2007-02-07 (Final).pdf
* alt-SP800-86.pdf
* NIST FIPS 198a The Keyed-Hash Message Authentication Code (HMAC), 2002-05.pdf
* NIST SP 800-016r1 A Role-Based Model for Federal Information Technology-Cybersecurity Training (3rd Draft), 2014-03-14 (Draft).pdf
* NIST IR 8055.pdf
* NIST SP 800-089 Recommendation for Obtaining Assurances for Digital Signature Applications, 2006-11-30 (Final).pdf
* NIST IR 7657 A Report on the Privilege (Access) Management Workshop, 2010-03.pdf
* hit-ehr-nist-sp1800-1e.pdf
* NIST IR 7007 An Overview of Issues in Testing Intrusion Detection Systems, 2003-06.pdf
* NIST SP 800-160 v2 Systems Security Engineering; Cyber Resiliency Considerations for the Engineering of Trustworthy Secure Systems, 2018-03-21 (Draft).pdf
* NIST SP 800-094r1 Guide to Intrusion Detection and Prevention Systems (IDPS), 2012-07-25 (Draft).pdf
* NIST SB 1998-05 Management of Risks in Information Systems; Practices of Successful Organizations.pdf
* NIST SB 1997-01 Security Issues for Telecommuting.txt
* NIST SP 800-053-controls.xml
* NIST SP 800-036 Guide to Selecting Information Technology Security Products, 2003-10.pdf
* alt-SP800-34-rev1_errata-Nov11-2010.pdf
* NIST SP 800-147 Basic Input-Output System (BIOS) Protection Guidelines, 2011-04.pdf
* alt-IR7692-OCIL.pdf
* NIST IR 7771 Conformance Test Architecture for Biometric Data Interchange Formats - Beta 2.00, 2011-02.pdf
* alt-SP800-41-rev1.pdf
* NIST IR 7536.pdf
* NIST SP 800-034r1 Contingency Planning Guide for Federal Information Systems, 2010-05.pdf
* NIST IR 7966.pdf
* NIST SP 800-170 Computer Security Division 2013 Annual Report, 2014-09-04 (Final).pdf
* NIST SP 800-085A-1 Overview-Summary of Changes from SP-800-85A to SP-800-85A-1, 2009-03.pdf
* NIST SP 500-293d US Government Cloud Computing Technology Roadmap, Volume 3; Technical Considerations for USG Cloud Computing Deployment Decisions, 2011-11-01.pdf
* NIST IR 7358.pdf
* NIST IR 7100 PDA Forensic Tools;An Overview and Analysis, 2004-08.pdf
* NIST SB 1999-01 Secure Web-Based Access to High Performance Computing Resources.txt
* NIST SP 800-107r1 Recommendation for Applications Using Approved Hash Algorithms, 2012-08-24 (Final).pdf
* NIST IR 7977.pdf
* alt-SP800-94r1-draft.pdf
* NIST IR 7693 Specification for Asset Identification 1.1, 2011-06.pdf
* NIST SB 1995-02 The Data Encryption Standard; An Update.txt
* NIST SP 800-032 Introduction to Public Key Technology and the Federal PKI Infrastructure, 2001-02 (2009 Minor Edits).pdf
* NIST SP 800-084 Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities, 2006-09-21 (Final).epub
* NIST SP 800-030 Risk Management Guide for Information Technology Systems, 2002-07.pdf
* NIST FIPS 199 Standards for Security Categorization of Federal Information and Information Systems, 2004-02 (2009 Minor Edits).pdf
* NIST IR 8222-draft.pdf
* NIST IR 7695.pdf
* fs-arm-nist-sp1800-9b-draft.pdf
* NIST SP 800-022r1 A Statistical Test Suite for Random and PseudoRNGs for Cryptographic Apps, 2008-08.pdf
* NIST SP 800-044 Version 2 Guidelines on Securing Public Web Servers, 2007-10-09 (Final).pdf
* NIST SP 800-053r5-draft-controls-markup.pdf
* NIST IR 7337 Personal Identity Verification Demonstration Summary, 2006-08.pdf
* NIST SB 1999-08 The Advanced Encryption Standard; A Status Report.pdf
* alt-IR7864.pdf
* NIST SB 2018-09.pdf
* NIST SB 2006-12 Maintaining Effective Information Technology (IT) Security Through Test, Training, And Exercise Programs.pdf
* NIST SP 800-024.pdf
* NIST SP 800-041r1 Guidelines on Firewalls and Firewall Policy, 2009-09.pdf
* NIST FIPS 140-2 Implementation Guidance for FIPS PUB 140-2 and the CMVP, 2010-08-03.pdf
* NIST SP 800-037r1 Guide for Applying the Risk Management Framework to Federal Information Systems; A Security Life Cycle Approach, Markup r1FPD to r1, 2010-02.pdf
* NIST SP 800-126r2 The Technical Specification for the Security Content Automation Protocol (SCAP) 1.2, 2011-09.pdf
* NIST SP 800-192 Verification and Test Methods for Access Control Policies-Models, 2017-06-27 (Final).pdf
* NIST SB 2005-09 Biometric Technologies; Helping To Protect Info And Automated Transactions In IT Systems.pdf
* NIST SB 1992-11 Sensitivity of Information.txt
* es-sa-nist-sp1800-7c-draft.pdf
* NIST SB 1993-03 Guidance on the Legality of Keystroke Monitoring.txt
* NIST SP 800-085A-2 PIV Card Application and Middleware Interface Test Guidelines (SP800-73-3 Compliance), 2010-07-27.pdf
* NIST IR 7285 2005 Annual Report; Computer Security Division, 2006-02.pdf
* derived-piv-nist-sp1800-12-draft.pdf
* NIST SP 800-056cr1-draft-comments-received.pdf
* alt-SP800-124r1.pdf
* alt-IR7628r1.pdf
* NIST SP 800-128 Guide for Security-Focused Configuration Management of Information Systems, 2011-08-12 (Final).pdf
* NIST IR 4939 Threat Assessment of Malicious Code and External Attacks, 1992-10.txt
* NIST SP 800-058 Security Considerations for Voice Over IP Systems, 2005-01-01 (Final).pdf
* NIST SP 800-127 Guide to Securing WiMAX Wireless Communications, 2010-09.pdf
* alt-IR7946.pdf
* alt-IR7298r2-Glossary.pdf
* NIST SP 800-114r1 User's Guide to Telework and Bring Your Own Device (BYOD) Security, 2016-07-29 (Final).pdf
* NIST SP 800-130 A Framework for Designing Cryptographic Key Management Systems, 2013-08-15 (Final).pdf
* NIST SP 800-090B-May2016-Comments-received.pdf
* alt-IR7904.pdf
* NIST SB 2002-04 Techniques for System and Data Recovery.pdf
* NIST IR 6985 COTS Security Protection Profile - Operating Systems (CSPP-OS) (Example of NIST IR 6462, CSPP), 2003-04.pdf
* NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex D, 2001-05.pdf
* NIST IR 7791 Conformance Test Architecture and Test Suite for ANSI-NIST-ITL 1-2007, 2011-11-18.pdf
* NIST SB 2005-03 PIV Of Federal Employees And Contractors; FIPS 201 Approved By The Secretary Of Commerce.pdf
* alt-FIPS201-2.pdf
* NIST SB 1995-08 FIPS 140-1; A Framework for Cryptographic Standards.txt
* NIST IR 7817 A Credential Reliability and Revocation Model for Federated Identities, 2012-11-30.pdf
* NIST IR 7802.pdf
* NIST IR 7056 Card Technology Development and Gap Analysis Interagency Report, 2004-05.pdf
* NIST SB 2002-01 Guidelines on Firewalls and Firewall Policy.pdf
* NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 2 (Errata), 2010-05-01.pdf
* NIST SP 800-027rA Engineering Principles for Information Technology Security (A Baseline for Achieving Security), 2004-06.pdf
* NIST SP 800-038E Recommendation for Block Cipher Modes of Operation; The XTS-AES Mode for Confidentiality on Storage Devices, 2010-01.pdf
* NIST SP 800-012r1 An Introduction to Information Security, 2017-06-22 (Final).pdf
* NIST SP 1500-004r1 NIST Big Data Interoperability Framework; Volume 4, Security and Privacy Version 2, 2018-06-26 (Final).pdf
* alt-SP800-53-rev3-final_updated-errata_05-01-2010.pdf
* NIST SP 800-131A Transitions; Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths, 2011-01.pdf
* NIST SP 800-102 Recommendation for Digital Signature Timeliness, 2009-09.pdf
* NIST SB 2004-08 Electronic Authentication; Guidance For Selecting Secure Techniques.pdf
* fs-arm-nist-sp1800-9a-draft.pdf
* NIST IR 6985 COTS Security Protection Profile - Operating Systems (CSPP-OS) (Example of NIST IR 6462, CSPP), 2003-04.rtf
* NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.docx
* NIST SB 2005-01 Integrating It Security Into The Capital Planning And Investment Control Process.pdf
* NIST SB 2000-05 Security Implications of Active Content.pdf
* NIST SP 800-072 Guidelines on PDA Forensics, 2004-11.pdf
* NIST SP 800-057 Recommendation for Key Management, Part 1; 2005-08 (updated March 9, 2007).pdf
* NIST IR 7581 System and Network Security Acronyms and Abbreviations, 2009-09.pdf
* alt-SP800-111.pdf
* NIST IR 7751.pdf
* alt-IR8114.pdf
* abac-nist-sp1800-3b-draft.pdf
* NIST SP 800-052r2 Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations (2nd Draft), 2018-10-15 (Draft).pdf
* NIST IR 7427 6th Annual PKI R&D Workshop Apps-Driven PKI Proceedings, 2007-09.pdf
* NIST IR 7030.pdf
* NIST IR 6529-a.pdf
* NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Markup r3FPD to r3 (Errata), 2010-05-01.pdf
* NIST IR 7611 Use of ISO-IEC 24727 - Service Access Layer Interface for Identity (SALII), 2009-08.pdf
* alt-SP800-113.pdf
* NIST SP 800-132 Recommendation for Password-Based Key Derivation; Part 1; Storage Applications, 2010-12-22 (Final).pdf
* NIST SB 2003-02 Secure Interconnections for Information Technology Systems.pdf
* NIST SB 2009-04 The System Development Life Cycle (SDLC).pdf
* alt-SP800-46r2.pdf
* dns-secure-email-nist-sp1800-6b-draft.pdf
* alt-SP800-162.pdf
* NIST SP 800-126r1 Technical Specification for Security Content Automation Protocol (SCAP) 1.1, 2011-02.pdf
* NIST SB 2006-01 Testing And Validation Of PIV Components And Subsystems For Conformance To FIPS-201.pdf
* NIST SB 2004-06 Information Technology Security Services; How To Select, Implement, And Manage.pdf
* NIST SP 800-089 Recommendation for Obtaining Assurances for Digital Signature Applications, 2006-11.pdf
* NIST SP 800-038F Recommendation for Block Cipher Modes of Operation; Methods for Key Wrapping (PRE-PUBLICATION), 2012-12.pdf
* NIST SB 2000-08 Security for Private Branch Exchange Systems.pdf
* NIST SP 800-034-r1_cp_template_moderate_impact_system.docx
* abac-nist-sp1800-3-draft.pdf
* NIST SP 800-131a-r1-draft-jul-2015-comments-resolutions.pdf
* NIST SB 1997-11 Internet Electronic Mail.txt
* NIST IR 8011-2.pdf
* NIST IR 7770.pdf
* dns-secure-email-nist-sp1800-6c.pdf
* NIST SP 800-142 Practical Combinatorial Testing, 2010-10-06.pdf
* NIST SB 2010-04 Guide To Protecting Personally Identifiable Information.pdf
* NIST SP 800-063-3 Digital Identity Guidelines, 2017-12-01 (Final).pdf
* NIST SP 800-163 Vetting the Security of Mobile Applications, 2015-01-26 (Final).pdf
* NIST IR 7284.pdf
* NIST SP 800-162 Guide to Attribute Based Access Control (ABAC) Definition and Considerations, 2014-01-16 (Final).epub
* mds-nist-sp1800-4b-draft.pdf
* NIST IR 6416 Applying Mobile Agents to Intrusion Detection and Response, 1999-10.pdf
* NIST SP 800-165 Computer Security Division 2012 Annual Report, 2013-07-22 (Final).pdf
* es-idam-sp1800-2.zip
* NIST SP 800-087r2 Codes for Identification of Federal and Federally-Assisted Organizations, 2018-04-19 (Final).pdf
* NIST SB 2006-11 Guide To Securing Computers Using Windows XP Home Edition.pdf
* NIST SB 2001-03 Biometrics; Technologies for Highly Secure Personal Authentication.pdf
* NIST SP 800-017 Modes of Operation Validation System (MOVS); Requirements and Procedures, 1998-02.pdf
* NIST SB 2008-10 Keeping IT System Servers Secure; A General Guide To Good Practices.pdf
* NIST SP 800-061r2 Computer Security Incident Handling Guide, 2012-08.pdf
* NIST SB 2008-09 Using Performance Measurements To Evaluate And Strengthen Information System Security.pdf
* alt-SP800-18r1.pdf
* NIST IR 4939 Threat Assessment of Malicious Code and External Attacks, 1992-10.ps
* NIST SB 1997-05 Audit Trails.txt
* NIST SB 1998-04 Training Requirements for Information Technology Security; An Introduction to Results-Based Learning.txt
* NIST SP 800-038E Recommendation for Block Cipher Modes of Operation; the XTS-AES Mode for Confidentiality on Storage Devices, 2010-01-18 (Final).pdf
* NIST IR 7694.pdf
* alt-SP800-182-2015AnnualReport.pdf
* NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 4, 1995-10.ps
* alt-SP800-126r1.pdf
* NIST SP 800-054 Border Gateway Protocol Security, 2007-07-17 (Final).pdf
* NIST SP 800-104 A Scheme for PIV Visual Card Topography, 2007-06.pdf
* NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, 1995-10.pdf
* NIST SP 800-095 Guide to Secure Web Services, 2007-08.pdf
* NIST SB 2010-10 Cyber Security Strategies for the Smart Grid; Protecting the Advanced Digital Infrastructure for Electric Power.pdf
* hit-infusion-pump-nist-sp1800-8b-draft.pdf
* NIST SP 800-145 The NIST Definition of Cloud Computing, 2011-09-28 (Final).epub
* NIST SP 800-146 Cloud Computing Synopsis and Recommendations, 2012-05-29 (Final).pdf
* NIST SP 800-037 Guide for the Security Certification and Accreditation of Fed Info Systems, 2004-03.pdf
* NIST SB 2001-05 An Introduction to IPsec (Internet Protocol Security).pdf
* NIST SB 1998-02 Information Security and the World Wide Web (WWW).pdf
* NIST SP 800-171r1 (2).pdf
* NIST SP 1800-1.pdf
* alt-NIST.SP.800-16 Scanned copy.pdf
* NIST SP 800-090c_second_draft_comment_template.docx
* NIST SB 2005-06 NIST's Security Configuration Checklists Program For IT Products.pdf
* NIST IR 7711.pdf
* psfr-mobile-sso-nist-sp1800-13-draft.pdf
* NIST SB 2000-02 Guideline for Implementing Cryptography in the Federal Government.pdf
* alt-SP800-142-101006.pdf
* NIST SP 1800-2.pdf
* alt-SP800-117.pdf
* NIST SP 800-057pt1r4_commentsreceived.pdf
* NIST SP 800-171r1 Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations, 2018-06-07.pdf
* NIST SP 800-041r1 Guidelines on Firewalls and Firewall Policy, 2009-09-28 (Final).pdf
* sidr-piir-nist-sp1800-14-draft.pdf
* NIST IR 7877.pdf
* NIST SP 800-047 Security Guide for Interconnecting IT Systems, 2002-08.pdf
* NIST IR 7658 Guide to SIMfill Use and Development, 2010-02.pdf
* NIST SP 800-124 Guidelines on Cell Phone and PDA Security, 2008-10.pdf
* NIST SB 2011-05 Using Security Configuration Checklists and the National Checklist Program.pdf
* NIST IR 4749 Sample Statements of Work for Fed Computer Sec Services; In-House or Contracting Out, 1992-06 (2009 Minor Edits).txt
* NIST SP 800-022r1a A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, 2010-04.zip
* NIST SB 2006-03 An Update On Cryptographic Standards, Guidelines, And Testing Requirements.pdf
* NIST SP 500-265.pdf
* NIST SP 800-066r1 An Introductory Resource Guide for Implementing the HIPAA Security Rule, 2008-10.pdf
* alt-IR7698-CPE-Language.pdf
* NIST IR 7628 Guidelines for Smart Grid Cyber Security; Volume 01, 2010-08.pdf
* alt-IR7697-CPE-Dictionary.pdf
* NIST SP 800-113 Guide to SSL VPNs, 2008-07-01 (Final).pdf
* NIST SB 2004-11 Understanding the New NIST Standards and Guidelines Required by FISMA.pdf
* NIST SP 800-152 A Profile for US Federal Cryptographic Key Management Systems (CKMS), 2012-08 (Draft).pdf
* NIST IR 7874 Guidelines for Access Control System Evaluation Metrics, 2012-09.pdf
* NIST IR 7219 2004 Annual Report; Computer Security Division, 2005-04.pdf
* NIST SP 800-040v2 Creating a Patch and Vulnerability Management Program, 2005-11.pdf
* NIST SP 800-184 Guide for Cybersecurity Event Recovery, 2016-12.pdf
* NIST IR 4734 Foundations of a Security Policy for use of the National Research and Educational Network, 1992-02.pdf
* NIST IR 7313 5th Annual PKI R&D Workshop Proceedings; Making PKI Easy to Use, 2006-07.pdf
* NIST SP 500-299 Draft Cloud Computing Security Reference Architecture, 2013-05-15.pdf
* NIST IR 7564.pdf
* NIST SB 1997-11 Internet Electronic Mail.pdf
* NIST SP 800-039 Managing Information Security Risk; Organization, Mission and Information System View, 2010-03.pdf
* NIST SP 800-073-3 Interfaces for PIV; Part 1- End Point PIV Card Application Namespace, Data Model & Representation, 2010-02.pdf
* hit-ehr-nist-sp1800-1b.pdf
* NIST SB 1995-12 An Introduction to Role-Based Access Control.txt
* NIST IR 8074v1.pdf
* NIST SP 800-177r1 Trustworthy Email (2nd Draft), 2017-12-15 (Draft).pdf
* NIST IR 7206.pdf
* NIST IR 6985.pdf
* NIST SP 800-025 Federal Agency Use of Public Key Technology for Digital Signatures and Authentication, 2000-10.doc
* dns-secure-email-nist-sp1800-6c-draft.pdf
* NIST SP 800-188 De-Identifying Government Datasets (2nd Draft), 2016-12-15 (Draft).pdf
* NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 3 (Errata), 2010-05-01.pdf
* NIST SP 800-098 Guidelines for Securing Radio Frequency Identification (RFID) Systems, 2007-04-06 (Final).pdf
* NIST SB 1999-04 Guide for Developing Security Plans for Information Technology Systems.pdf
* NIST IR 7676.pdf
* NIST SP 800-076-1 Biometric Data Specification for PIV, 2007-01.pdf
* NIST SP 800-085A-4 PIV Card Application and Middleware Interface Test Guidelines (SP 800-073-4 Compliance), 2016-04-13 (Final).pdf
* NIST SB 2006-10 Log Management; Using Computer And Network Records To Improve Information Security.pdf
* NIST SP 800-146 Cloud Computing Synopsis and Recommendations, 2012-05-29 (Final).epub
* NIST SP 800-029 A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2, 2001-06.pdf
* sidr-piir-nist-sp1800-14b-draft.pdf
* NIST IR 7539.pdf
* NIST SB 2006-06 Domain Name System (DNS) Services; NIST Recommendations For Secure Deployment.pdf
* NIST IR 7290 Fingerprint Identification and Mobile Handheld Devices; An Overview and Implementation, 2006-05 (final).pdf
* NIST SB 2011-03 Managing Information Security Risk; Organization, Mission and Information System View.pdf
* NIST SP 800-070r2 National Checklist Program for IT Products; Guidelines for Checklist Users and Developers, 2011-02.pdf
* NIST SP 800-137 Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations, 2011-09-30 (Final).pdf
* alt-SP800-60v1r1.pdf
* NIST FIPS 196 Entity Authentication Using Public Key Cryptography, 1997-02.pdf
* alt-SP800-98.pdf
* alt-IR8062.pdf
* alt-SP800-57part2.pdf
* NIST FIPS 188 Standard Security Labels for Information Transfer, 1994-09.pdf
* NIST IR 8165.pdf
* NIST SB 2001-06 Engineering Principles For Information Technology Security.pdf
* NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations, Annex 1 (Errata), 2010-05-01.pdf
* NIST SB 2008-05 New Cryptographic Hash Algorithm Family; NIST Holds A Public Competition To Find New Algorithms.pdf
* NIST SP 800-025 Federal Agency Use of Public Key Technology for Digital Signatures and Authentication, 2000-010-01 (Final).pdf
* derived-piv-nist-sp1800-12c-v2.pdf
* NIST SP 800-056A Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography, 2006-05 (updated March 9, 2007).pdf
* hit-ehr-nist-sp1800-1.pdf
* NIST IR 7358 Program Review for Information Security Management Assistance (PRISMA), DB v4-26-2007.zip
* alt-IR7536-2008AnnualReport.pdf
* NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations Controls (Errata), 2014-01-15.xml
* NIST SB 2008-11 Bluetooth Security; Protecting Wireless Networks And Devices.pdf
* 20hit-ehr-nist-sp1800-1.zip
* NIST FIPS 200 Minimum Security Requirements for Federal Information and Information Systems, 2006-05 (final).pdf
* NIST IR 7611.pdf
* alt-IR8200.pdf
* NIST IR 7693.pdf
* es-idam-nist-sp1800-2-draft.zip
* NIST SP 800-057 Part 1r4 Recommendation for Key Management, Part 1; General, 2016-01-28 (Final).pdf
* NIST SP 800-057-pt2-draft-comments-received-apr2005.pdf
* alt-SP800-70r2.pdf
* hit-infusion-pump-nist-sp1800-8a-draft.pdf
* NIST SP 800-043.pdf
* NIST SP 800-157 Guidelines for Derived Personal Identity Verification (PIV) Credentials, 2014-12-19 (Final).pdf
* NIST SB 1993-07 Connecting to the Internet; Security Considerations.txt
* NIST SP 800-085B Installation and Configuration Information for PIV Data Model Tester.doc
* NIST SP 1800-11b-draft.pdf
* NIST SP 800-090Ar1 Recommendation for Random Number Generation Using Deterministic Random Bit Generators, 2015-06-24 (Final).pdf
* NIST SP 800-126r3 The Technical Specification for the Security Content Automation Protocol (SCAP); SCAP Version 1.3, 2018-02-14 (Final).pdf
* NIST SP 800-012 An Introduction to Computer Security; The NIST Handbook, Part 3, 1995-10.ps
* alt-SP800-61rev1.pdf
* NIST FIPS 197.pdf
* NIST SP 800-078-2 Cryptographic Algorithms and Key Sizes for Personal Identification Verification (PIV), 2010-02.pdf
* NIST SP 800-053Ar4 Assessing Security and Privacy Controls in Federal Information Systems and Organizations; Building Effective Assessment Plans, 2014-12-18 (Final).pdf
* sidr-piir-nist-sp1800-14a-draft.pdf
* NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2014-01-15.pdf
* NIST IR 7764.pdf
* dns-secure-email-nist-sp1800-6b.pdf
* NIST SB 1998-11 Common Criteria; Launching the International Standard.pdf
* hit-ehr-nist-sp1800-1a-draft.pdf
* NIST SP 800-132 Recommendation for Password-Based Key Derivation Part 1; Storage Applications, 2010-12.pdf
* NIST SB 1999-04 Guide for Developing Security Plans for Information Technology Systems.txt
* NIST SP 800-077 Guide to IPsec VPNs, 2005-12-01 (Final).pdf
* NIST SP 800-145 A NIST Definition of Cloud Computing, 2011-09.pdf
* NIST SP 800-152 A Profile for US Federal Cryptographic Key Management Systems (CKMS), 2015-10-28 (Final).pdf
* alt-NIST.SP.800-50.pdf
* NIST SP 800-020 Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS).pdf
* NIST IR 5472 A Head Start on Assurance Proceedings of an Invitational Workshop on IT Assurance and Trustworthiness, 1994-03.txt
* NIST SP 800-155 BIOS Integrity Measurement Guidelines, 2011-12-08 (Draft).pdf
* NIST IR 7773.pdf
* NIST SP 800-061r2.pdf
* NIST SP 800-081r1 Secure Domain Name Service (DNS) Deployment Guide, 2010-08-24 (DNSSEC).pdf
* NIST IR 7046.pdf
* NIST SP 800-019.pdf
* alt-IR8060.pdf
* NIST SP 800-015 Minimum Interoperability Specification for PKI Components (MISPC), v1, 1997-09.ps
* NIST FIPS 180-4.pdf
* NIST IR 7502.pdf
* NIST SP 800-015 Minimum Interoperability Specification for PKI Components (MISPC), v1, 1997-09.PDF
* derived-piv-nist-sp1800-12c-draft.pdf
* NIST FIPS 140-2 Security requirements for Cryptographic Modules, Annex D; Approved Key Establishment Techniques, 2001-03 (2009 Minor Edits).pdf
* NIST SP 800-064r2 Security Considerations in the System Development Life Cycle, 2008-10.pdf
* alt-SP800-179.pdf
* cr-mfa-nist-sp1800-17.pdf
* NIST SB 2002-09 Cryptographic Standards and Guidelines; A Status Report.pdf
* alt-FIPS200.pdf
* alt-SP800-115.pdf
* NIST IR 6192.pdf
* alt-SP800-121.pdf
* NIST SP 800-098 Guidelines for Securing Radio Frequency Identification (RFID) Systems.pdf
* NIST IR 7751 2010 Computer Security Division Annual Report, 2011-05.pdf
* NIST SP 800-119 Guidelines for the Secure Deployment of IPv6 2010-12-06.pdf
* NIST IR 6483 Randomness Testing of the Advanced Encryption Standard Finalist Candidates1, 2000-05.doc
* NIST IR 7815.pdf
* NIST SB 2006-09 Forensic Techniques; Helping Organizations Improve Their Responses To Information Security Incidents.pdf
* NIST IR 8060.pdf
* NIST IR 7628 Guidelines for Smart Grid Cyber Security; Volume 02, 2010-08.pdf
* NIST SB 2012-01 Advancing Security Automation & Standardization; Revised Technical Specifications Issued for Security Content Automation Protocol (SCAP).pdf
* NIST FIPS 180-2 Secure Hash Standard (SHS), 2002-08 (With Change Notice from 2004-02).pdf
* NIST IR 8105.pdf
* NIST SP 800-040r3 Guide to Enterprise Patch Management Technologies, 2013-07-22 (Final).pdf
* alt-SP800-57part1rev3_general.pdf
* NIST SB 2012-03 Guidelines For Improving Security and Privacy In Public Cloud Computing.pdf
* NIST SB 1998-02 InfoSec and the World Wide Web (WWW).txt
* NIST SP 800-123 Guide to General Server Security, 2008-07.pdf
* NIST IR 7452 Secure Biometric Match-on-Card Feasibility Report, 2007-11.pdf
* alt-SP800-30r1.pdf
* fs-pam-nist-sp1800-18c-draft.pdf
* alt-SP800-121r2.pdf
* tc-hybrid-sp1800-19a-preliminary-draft.pdf
* NIST SP 800-076-2 Biometric Specifications for Personal Identity Verification, 2013-07-11 (Final).pdf
* alt-SP800-126r2.pdf
* NIST SP 800-177r1-draft-comment-template-form.xls
* NIST SP 800-193 Platform Firmware Resiliency Guidelines, 2018-05-04 (Final).pdf
* NIST SP 800-125 Guide to Security for Full Virtualization Technologies, 2011-01-28 (Final).pdf
* NIST SP 800-078-1 Cryptographic Algorithms and Key Sizes for Personal Identity Verification, 2007-08.pdf
* NIST IR 6390 Randomness Testing of the Advanced Encryption Standard Candidate Algorithms, 1999-09.pdf
* NIST SP 500-325.pdf
* NIST SP 800-121 Guide to Bluetooth Security, 2008-09.pdf
* NIST IR 7111.pdf
* NIST SP 800-085B PIV Data Model Test Guidelines, 2006-07-31 (Final).pdf
* alt-SP800-46r1.pdf
* NIST SB 2007-02 Intrusion Detection And Prevention Systems.pdf
* NIST IR 7987r1.pdf
* SP960_1.pdf
* psfr-mobile-sso-nist-sp1800-13b-draft.pdf
* NIST SP 500-304.pdf
* NIST SP 500-290 American National Standard for Information Systems, 2011-11.pdf
* NIST SB 1998-05 Management of Risks in Information Systems; Practices of Successful Organizations.txt
* NIST SP 800-061r2 Computer Security Incident Handling Guide, 2012-08 (2).pdf
* NIST SB 2007-03 Improving The Security Of Electronic Mail; Updated Guidelines Issued By NIST.pdf
* alt-IR7435-CVSS.pdf
* NIST IR 8183.pdf
* NIST SP 800-126r1 The Technical Specification for the Security Content Automation Protocol (SCAP); SCAP Version 1.1, 2011-02-25 (Final).pdf
* NIST SB 2007-07 Border Gateway Protocol Security.pdf
* NIST SP 800-067r2 Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher, 2017-11-17 (Final).pdf
* NIST IR 7188.pdf
* NIST SP 800-097 Establishing Wireless Robust Security Networks; A Guide to IEEE 802.11i, 2007-02.pdf
* NIST SP 800-127 Guide to Securing WiMAX Wireless Communications, 2010-09 (Final).pdf
* NIST IR 7085.pdf
* NIST SB 2007-08 Secure Web Services.pdf
* alt-SP800-183.pdf
* fs-itam-nist-sp1800-5a.pdf
* alt-IR8201.pdf
* NIST FIPS 181 Automated Password Generator, 1993-10.txt
* NIST SP 800-160 v1 Systems Security Engineering; Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems, 2018-03-21 (Final).pdf
* alt-SP800-66-Revision1.pdf
* NIST SB 2008-02 Federal Desktop Core Configuration (FDCC); Improving Security For Windows Desktop Operating Systems.pdf
* NIST IR 7653.pdf
* abac-nist-sp1800-3b-draft-v2.pdf
* SP960_5.pdf
* alt-IR7219-2004AnnualReport.pdf
* fs-itam-sp1800-5.zip
* derived-piv-nist-sp1800-12a-draft.pdf
* NIST IR 7337.pdf
* NIST SP 800-180 NIST Definition of Microservices, Application Containers and System Virtual Machines, 2016-02-18 (Draft).pdf
* NIST IR 7536 2008 Computer Security Division Annual Report, 2009-03.pdf
* NIST IR 5153 Minimum Security Requirements for Multi-User Operating Systems, 1993-03.txt
* NIST SB 2008-04 Using Active Content And Mobile Code And Safeguarding The Security Of Information Technology Systems.pdf
* NIST SB 2005-10 NVD; Helping IT System Users And Developers Find Current Info About Cyber Security Vulnerabilities.pdf
* NIST SP 500-292 Cloud Computing Reference Architecture, 2011-09-06.pdf
* NIST SB 2001-11 Computer Forensics Guidance.pdf
* NIST SP 800-092 Guide to Computer Security Log Management, 2006-09-13 (Final).epub
* NIST SB 1996-08 Implementation Issues for Cryptograpy.txt
* alt-SP800-170-2013AnnualReport.pdf
* alt-SP800-126A.pdf
* NIST SP 800-124r1 Guidelines for Managing the Security of Mobile Devices in the Enterprise, 2013-06-21 (Final).epub
* NIST IR 7502 The Common Configuration Scoring System (CCSS); Metrics for Software Security Configuration Vulnerabilities, 2010-12.pdf
* NIST SB 2009-06 Security For Enterprise Telework And Remote Access Solutions.pdf
* NIST SP 800-084 Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities, 2006-09-21 (Final).pdf
* alt-SP800-125-final.pdf
* NIST IR 7313.pdf
* alt-SP800-176-2014AnnualReport.pdf
* NIST SB 2004-09 InfoSec Within the System Development Life Cycle.pdf
* alt-SP800-63-1.pdf
* fs-itam-sp1800-5-draft.zip
* NIST SP 800-037r1 Guide for Applying the Risk Management Framework to Federal Information Systems; a Security Life Cycle Approach, 2014-06-10 (Final).pdf
* NIST SP 800-082r2 Guide to Industrial Control Systems (ICS) Security, 2015-06-03 (Final).pdf
* NIST SP 800-022r1A A Statistical Test Suite for RPNGs and PNGs for Cryptographic Apps, 2010-04.pdf
* NIST IR 7442.pdf
* fs-arm-nist-sp1800-9c-draft.pdf
* NIST SB 2005-05 Recommended Security Controls For Federal Information Systems.pdf
* NIST SB 2005-08 Implementation Of Fips 201, Personal Identity Verification (Piv) Of Federal Employees And Contractors.pdf
* NIST SP 800-115 Technical Guide to Information Security Testing and Assessment, 2008-09-30 (Final).pdf
* NIST SB 1998-11 Common Criteria; Launching the International Standard.txt
* NIST SB 1999-11 Acquiring and Deploying Intrusion Detection Systems.txt
* NIST IR 7904.pdf
* NIST SP 800-131Ar2 Transitioning the Use of Cryptographic Algorithms and Key Lengths, 2018-07-19 (Draft).pdf
* NIST SB 1998-02 Information Security and the World Wide Web (WWW).txt
* NIST SB 1997-02 Advanced Encryption Standard.txt
* NIST SP 800-203 2017 NIST-ITL Cybersecurity Program Annual Report, 2018-07-02 (Final).pdf
* NIST IR 7581.pdf
* NIST SP 800-068r1 Guide to Securing Microsoft Windows XP Systems for IT Professionals, 2008-10.pdf
* NIST SP 500-279 Static Analysis Tool Exposition (SATE) 2008.pdf
* alt-SP800-84.pdf
* NIST SP 800-115 Technical Guide to Information Security Testing and Assessment, 2008-09-30 (Final).epub
* NIST SP 800-052 Guidelines for the Selection and Use of Transport Layer Security (TLS) Implementations, 2005-06.pdf
* NIST SB 1999-12 Operating System Security; Adding to the Arsenal of Security Techniques.pdf
* NIST IR 7539 Symmetric Key Injection onto Smart Cards, 2008-12.pdf
* NIST SB 1996-06 Information Security Policies For Changing Information Technology Environments.txt
* NIST IR 8214-draft.pdf
* NIST SB 2003-08 IT Security Metrics.pdf
* NIST SB 2000-12 A Statistical Test Suite For Random And Pseudorandom Number Generators For Cryptographic Applications.pdf
* NIST SP 800-085B PIV Data Model Conformance Test Guidelines, 2006-07.pdf
* alt-SP800-163.pdf
* NIST SB 2018-07.pdf
* NIST SP 500-267 USGv6 Internet Protocol Version 6 (IPv6) v1 Draft 2.pdf
* NIST SP 800-038B Recommendation for Block Cipher Modes of Operation; The CMAC Mode for Authentication, Updated CMAC Examples, 2005-03.pdf
* NIST IR 7806 ANSI-NIST-ITL 1-2011 Requirements and Conformance Test Assertions, 2011-11-18.pdf
* NIST SP 800-107 Recommendation for Applications Using Approved Hash Algorithms, 2009-02 (2).pdf
* NIST SP 800-077 Guide to IPsec VPNs, 2005-12.pdf
* NIST SP 800-016 Information Technology Security Training Requirements; a Role- and Performance-Based Model, 1998-04-01 (Final).pdf
* NIST SP 800-047 Security Guide for Interconnecting Information Technology Systems, 2002-09-01 (Final).pdf
* fs-itam-nist-sp1800-5c.pdf
* NIST SP 800-063v1.0.2 Electronic Authentication Guideline, 2006-04.pdf
* NIST SB 1994-05 Threats to Computer Systems; An Overview.txt
* NIST SP 800-071 Recommendation for Key Establishment Using Symmetric Block Ciphers, 2018-07-02 (Draft).pdf
* alt-FIPS199.pdf
* alt-IR7694-ARF.pdf
* NIST SP 800-015 MISPC Minimum Interoperability Specification for PKI Components, Version 1, 1998-01-01 (Final).pdf
* NIST IR 6390 Randomness Testing of the Advanced Encryption Standard Candidate Algorithms, 1999-09.doc
* NIST SP 800-073-3 Interfaces for PIV; Part 2- PIV Card Application Card Command Interface, 2010-02.pdf
* NIST SB 1999-08 The Advanced Encryption Standard; A Status Report.txt
* mds-nist-sp1800-4c-draft.pdf
* NIST SB 1999-02 Enhancements to Data Encryption and Digital Signature Federal Standards.txt
* NIST SP 800-183 Networks of 'Things', 2016-07-28 (Final).pdf
* NIST IR 7046 A Framework for Multi-Mode Auth; Overview and Implementation Guide, 2003-08.pdf
* NIST SP 800-072 Guidelines on PDA Forensics, 2004-11-01 (Final).pdf
* NIST SP 800-116 A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS), 2008-11.pdf
* alt-SP800-51rev1.pdf
* NIST SB 1999-04 Guide for Developing Security Plans for IT Systems.txt
* alt-SP800-53Ar4.pdf
* NIST SP 800-152 A Profile for US Federal Cryptographic Key Management Systems (CKMS), 2014-12 (Draft).pdf
* NIST SB 2005-07 Protecting Sensitive Information That Is Transmitted Across Networks.pdf
* NIST SP 800-023 (Fixed) Guideline to Fed Orgs on Security Assurance and Acquisition-Use of Tested-Evaluated Products, 2000-08.pdf
* dns-secure-email-nist-sp1800-6a-draft.pdf
* NIST SP 800-108 Recommendation for Key Derivation Using Pseudorandom Functions (Revised), 2009-10-01 (Final).pdf
* NIST IR 8114.pdf
* abac-nist-sp1800-3a-draft-v2.pdf
* NIST SP 800-055r1 Performance Measurement Guide for Information Security, 2008-07-16 (Final).pdf
* NIST FIPS 197 Advanced Encryption Standard, 2001-11.ps
* alt-SP800-190.pdf
* NIST FIPS 201-1 PIV of Fed Employees and Contractors, 2006-05 (updated 2006-06-26).pdf
* NIST SB 2003-10 Information Technology Security Awareness, Training, Education, and Certification.pdf
* NIST SB 2004-04 Selecting Information Technology Security Products.pdf
* NIST SP 800-053A Guide for Assessing the Security Controls in Fed Info Systems, 2008-06.pdf
* hit-infusion-pump-nist-sp1800-8c-draft.pdf
* NIST SP 800-070r4 National Checklist Program for IT Products; Guidelines for Checklist Users and Developers, 2018-02-15 (Final).pdf
* NIST IR 7698 Common Platform Enumeration; Applicability Language Specification 2.3, 2011-08.pdf
* NIST SP 1800-8.pdf
* NIST SP 800-055r1 Performance Measurement Guide for InfoSec, 2008-07.pdf
* NIST IR 7497 Security Architecture Design Process for Health Information Exchanges (HIEs), 2010-10.pdf
* NIST IR 7435.pdf
* NIST IR 7298r3-draft.pdf
* NIST SP 800-163r1 Vetting the Security of Mobile Applications, 2018-07-23 (Draft).pdf
* NIST IR 7275r4 Specification for the Extensible Configuration Checklist Description Format (XCCDF) 1.2, 2011-09-30.pdf
* NIST IR 7559.pdf
* alt-SP800-64r2.pdf
* NIST IR 7620.pdf
* NIST SP 800-116r1 Guidelines for the Use of PIV Credentials in Facility Access, 2018-06-29 (Final).pdf
* derived-piv-nist-sp1800-12b-draft.pdf
* es-idam-sp1800-2b.pdf
* NIST FIPS 186-3 Digital Signature Standard (DSS), 2009-06.pdf
* NIST SP 800-161 Supply Chain Risk Management Practices for Federal Information Systems and Organizations, 2015-04-08 (Final).pdf
* NIST SP 800-020.pdf
* NIST SP 800-167 Guide to Application Whitelisting, 2015-10-28 (Final).pdf
* NIST IR 7435 The Common Vulnerability Scoring System (CVSS) and Its Applicability to Federal Agency Systems, 2007-08.pdf
* NIST SB 2007-01 Security Controls For Information Systems; Revised Guidelines Issued By NIST.pdf
* NIST SP 800-144 Guidelines on Security and Privacy in Public Cloud Computing, 2011-12-09 (Final).epub
* NIST IR 7609 Cryptographic Key Management Workshop Summary, 2010-01.pdf
* NIST SB 2007-06 Forensic Techniques for Cell Phones.pdf
* NIST SP 800-147B BIOS Protection Guidelines for Servers, 2014-08-28 (Final).pdf
* NIST SP 800-060r1V2 Guide for Mapping Types of Info and Info Systems to Security Categories - Appendices.pdf
* NIST SB 2006-03.pdf
* NIST SP 800-034r1 Contingency Planning Guide for Federal Information Systems (Errata 2010-11-11), 2010-05.pdf
* NIST SP 800-090B Recommendation for the Entropy Sources Used for Random Bit Generation, 2018-01-10 (Final).pdf
* alt-SP800-122.pdf
* NIST IR 7806.pdf
* es-idam-nist-sp1800-2a-draft.pdf
* NIST SP 800-060r1 v2 Guide for Mapping Types of Information and Information Systems to Security Categories; Appendices, 2008-08-01 (Final).pdf
* NIST SP 800-094 Guide to Intrusion Detection and Prevention Systems (IDPS), 2007-02-20 (Final).pdf
* NIST SP 800-092 Guide to Computer Security Log Management, 2006-09-13 (Final).pdf
* NIST SP 800-102 Recommendation for Digital Signature Timeliness, 2009-09-23 (Final).pdf
* NIST SP 800-108 Recommendation for Key Derivation Using Pseudorandom Functions, 2009-10.pdf
* NIST SP 800-033.pdf
* dns-secure-email-nist-sp1800-6a.pdf
* NIST IR 7864.pdf
* es-idam-nist-sp1800-2b-draft.pdf
* NIST SP 800-125A.pdf
* NIST FIPS 196 Entity Authentication Using Public Key Cryptography, 1997-02.ps
* NIST SP 800-171_draft.pdf
* NIST SP 800-045v2 Guidelines on Electronic Mail Security, 2007-02.pdf
* NIST SP 800-021-1 Guideline for Implementing Cryptography in the Fed Government, Second Edition, 2005-12.pdf
* NIST SP 800-106 Randomized Hashing for Digital Signatures, 2009-02-25 (Final).pdf
* NIST SB 1996-02 Human-Computer Interface Security Issue.txt
* NIST SB 2007-11 Using Storage Encryption Technologies to Protect End User Devices.pdf
* NIST SP 800-17.pdf
* NIST IR 7771.pdf
* NIST SP 800-128 Guide for Security-Focused Configuration Management of Information Systems, 2011-08.pdf
* NIST SP 800-057 Part 2r1 Recommendation for Key Management, Part 2; Best Practices for Key Management Organizations (2nd Draft), 2018-11-20 (Draft).pdf
* NIST SP 800-014 Generally Accepted Principles and Practices for Securing Information Technology Systems, 1996-09.ps
* cr-mfa-nist-sp1800-17b.pdf
* NIST FIPS 180-3 Secure Hash Standard (SHS), 2008-10.pdf
* NIST SB 1998-04 Training Requirements for Information Technology Security; An Introduction to Results-Based Learning.pdf
* NIST IR 7695 Common Platform Enumeration; Naming Specification 2.3, 2011-08.pdf
* NIST IR 7617.pdf
* alt-SP800-137-Final.pdf
* fs-itam-nist-sp1800-5-draft.pdf
* fs-arm-nist-sp1800-9-draft.pdf
* NIST SP 800-168 Approximate Matching; Definition and Terminology, 2014-07-02 (Final).pdf
* NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex B; Approved Protection Profiles, 2001-03 (2009 Minor Edits).pdf
* NIST SB 2006-04 Protecting Sensitive Information Transmitted In Public Networks.pdf
* NIST IR 7697.pdf
* alt-IR7816-2011AnnualReport.pdf
* NIST IR 7896.pdf
* NIST FIPS 185 Escrowed Encryption Standard, 1994-02.txt
* NIST SP 800-060r1V1 Guide for Mapping Types of Information and Information Systems to Security Categories - Guide, 2008-08.pdf
* NIST SP 800-056Br2 Recommendation for Pair-Wise Key-Establishment Using Integer Factorization Cryptography, 2018-07-10 (Draft).pdf
* NIST IR 7200 Proximity Beacons and Mobile Handheld Devices; Overview and Implementation, 2005-06.pdf
* NIST IR 8018.pdf
* derived-piv-nist-sp1800-12-v2.pdf
* NIST IR 6462 CSPP - Guidance for COTS Security Protection Profiles, 1999-12.rtf
* NIST SP 800-181 National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework, 2017-08-07 (Final).pdf
* NIST SP 800-057 Part 2 Recommendation for Key Management, Part 2; Best Practices for Key Management Organization, 2005-08-25 (Final).pdf
* NIST SP 800-117.pdf
* NIST IR 7358 Program Review for Information Security Management Assistance (PRISMA), 2007-01.pdf
* alt-IR8204-draft.pdf
* NIST SP 1800-5 IT Asset Management, 2018-09.pdf
* NIST SP 800-048r1.pdf
* NIST IR 7111 Computer Security Division - 2003 Annual Report, 2004-04.pdf
* alt-NIST.SP.800-125B.PDF
* SP960-11.pdf
* NIST IR 7665.pdf
* NIST SP 800-090 Recommendation for Random Number Generation Using Deterministic Random Bit Generators, 2006-06 (updated 2007-05-13).pdf
* NIST IR 7863.pdf
* NIST IR 7773 An Application of Combinatorial Methods to Conformance Testing for Document Object Model Events, 2010-11.pdf
* NIST SP 800-162 Guide to Attribute Based Access Control (ABAC) Definition and Considerations, 2014-01-16 (Final).pdf
* NIST SP 800-126r2 The Technical Specification for the Security Content Automation Protocol (SCAP); SCAP Version 1.2, 2012-03-19 (Final).pdf
* NIST SB 2004-07 Guide For Mapping Types Of Information And Information Systems To Security Categories.pdf
* es-sa-nist-sp1800-7a-draft.pdf
* NIST SP 800-037r2-draft-ipd-comment-template.xlsx
* NIST IR 8228-draft-comment-template.docx
* NIST IR 8201.pdf
* NIST SP 800-081-2 Secure Domain Name System (DNS) Deployment Guide, 2013-09-18 (Final).pdf
* NIST IR 7816.pdf
* hit-infusion-pump-nist-sp1800-8-draft.pdf
* NIST SP 800-016 ITSec Training Reqs; A Role- and Performance-Based Model, 1998-04.pdf
* NIST SB 2010-01 Security Metrics; Measurements To Support The Continued Development Of Information Security Technology.pdf
* NIST SP 800-056Ar3 Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography, 2018-04-16 (Final).pdf
* NIST SB 1992-02 Establishing a Computer Security Incident Handling Capability.txt
* NIST IR 8136.pdf
* NIST SP 800-053r5 Security and Privacy Controls for Information Systems and Organizations, 2017-08-15 (Draft).pdf
* NIST SP 800-038D Recommendation for Block Cipher Modes of Operation; Galois-Counter Mode (GCM) and GMAC, 2007-11-28 (Final).pdf
* NIST SP 800-053r4 Security and Privacy Controls for Federal Information Systems and Organizations (Errata), 2013-05-07.pdf
* alt-NIST.SP.800-26.pdf
* NIST SP 800-086 Guide to Integrating Forensic Techniques into Incident Response, 2006-09-01 (Final).pdf
* NIST SP 800-056Cr1 Recommendation for Key-Derivation Methods in Key-Establishment Schemes, 2018-04-16 (Final).pdf
* alt-SP800-165-2012AnnualReport.pdf
* NIST IR 8151.pdf
* NIST SB 2009-09 Updated Digital Signature Standard Approved As FIPS 186-3, 2009-09.pdf
* NIST IR 7815 Access Control for Suspicious Activity Report (SAR) Systems, 2011-11-18.pdf
* NIST IR 8040.pdf
* NIST IR 8202.pdf
* NIST SP 800-175A Guideline for Using Cryptographic Standards in the Federal Government; Directives, Mandates and Policies, 2016-08-22 (Final).pdf
* NIST SP 800-154 Guide to Data-Centric System Threat Modeling, 2016-03-14 (Draft).pdf
* NIST SP 800-085b-4_draft_comment_template.xls
* fs-pam-nist-sp1800-18-draft.pdf
* NIST SB 2003-07 Testing Intrusion Detection Systems.pdf
* alt-SP800-147-April2011.pdf
* NIST SP 500-273v2 USGv6 Test Methods; General Description and Validation, 2009-08-06.pdf
* NIST IR 7682.pdf
* NIST IR 7601.pdf
* di-nist-sp1800-11a-draft.pdf
* NIST SP 800-054 Border Gateway Protocol Security, 2007-07.pdf
* NIST IR 8221-draft.pdf
* NIST SB 2004-03 Guide For The Security Certification And Accreditation Of Federal Information Systems.pdf
* NIST SP 800-038F Recommendation for Block Cipher Modes of Operation; Methods for Key Wrapping, 2012-12-13 (Final).pdf
* NIST SP 800-014 Generally Accepted Principles and Practices for Securing Information Technology Systems, 1996-09.pdf
* NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex A; Approved Security Functions, 2001-03 (2009 Minor Edits) .pdf
* NIST IR 7601 Framework for Emergency Response Officials (ERO), 2010-08.pdf
* NIST IR 8023.pdf
* alt-SP800-61rev2.pdf
* NIST SB 1996-03 The World Wide Web; Managing Security Risks.txt
* NIST IR 7956.pdf
* NIST SB 1991-02 Computer Security Roles of NIST and NSA.txt
* NIST SP 800-090B-changes-2nd-draft-to-final-markup.pdf
* alt-IR7653-2009AnnualReport.pdf
* NIST SP 800-133 Recommendation for Cryptographic Key Generation, 2012-11-15.pdf
* NIST FIPS 197 Advanced Encryption Standard, 2001-11.pdf
* NIST SP 800-135r1 Recommendation for Existing Application-Specific Key Derivation Functions, 2011-12-23 (Final).pdf
* NIST SP 800-090B-changes-2nd-draft-to-final-summary.pdf
* NIST IR 7442 Computer Security Division - 2007 Annual Report.pdf
* NIST SP 800-038a-add.pdf
* NIST SB 1998-09 Cryptography Standards and Infrastructures for the Twenty-First Century.pdf
* NIST SB 2007-05 Securing Radio Frequency Identification (RFID) Systems.pdf
* NIST SB 2004-03.pdf
* NIST SP 800-049 Federal S-MIME V3 Client Profile, 2002-11-05 (Final).pdf
* alt-SP800-82r2.pdf
* psfr-mobile-sso-nist-sp1800-13c-draft.pdf
* es-idam-nist-sp1800-2c-draft.pdf
* NIST SB 1993-05 Guidance on the Legality of Keystroke Monitoring.txt
* NIST SP 800-152_comments-received_march2015 Draft.pdf
* NIST SB 2010-09 Security Content Automation Protocol (SCAP); Helping Organizations Maintain And Verify The Security Of Their Information Systems.pdf
* NIST SP 800-090B Recommendation for the Entropy Sources Used for Random Bit Generation, 2016-01-27 (2nd Draft).pdf
* NIST SP 800-028v2 Guidelines on Active Content and Mobile Code, 2008-05.pdf
* NIST SP 800-123 Guide to General Server Security, 2008-07-25 (Final).epub
* NIST FIPS 186-2 Digital Signature Standard (DSS), 2000-01 (with Change Notice from 2001-10).pdf
* NIST SB 1999-11 Acquiring and Deploying Intrusion Detection Systems.pdf
* NIST SB 2009-11 Cybersecurity Fundamentals For Small Business Owners.pdf
* NIST SP 800-063A Digital Identity Guidelines; Enrollment and Identity Proofing, 2017-12-01 (Final).pdf
* NIST SB 2005-12 Preventing And Handling Malware Incidents; How To Protect IT Systems From Malicious Code And Software.pdf
* fs-itam-nist-sp1800-5b-draft.pdf
* NIST SP 800-016 Information Technology Security Training Requirements; A Role- and Performance-Based Model, Appendix E, 1998-04.pdf
* alt-SP800-181.pdf
* NIST SB 2002-11 Security For Telecommuting And Broadband Communications.pdf
* NIST IR 5308 General Procedures for Registering Computer Security Objects, 1993-12.txt
* alt-SP800-160v1.pdf
* NIST IR 7056.pdf
* mds-nist-sp1800-4a-draft.pdf
* NIST SP 800-030r1 Guide for Conducting Risk Assessments, 2012-09-17 (Final).pdf
* alt-SP800-189-Draft.pdf
* NIST SB 2010-02 Secure Management Of Keys In Cryptographic Applications, Part 3; Guidance For Organizations.pdf
* alt-SP800-187.pdf
* NIST SB 1991-11 Advanced Authentication Technology.txt
* NIST IR 8062.pdf
* alt-SP800-144.pdf
* NIST SP 800-086 Guide to Integrating Forensic Techniques into Incident Response, 2006-08.pdf
* NIST SP 800-029.pdf
* NIST SP 800-090C Recommendation for Random Bit Generator (RBG) Constructions, 2016-04-13 (Draft).pdf
* alt-IR7275r4-XCCDF.pdf
* NIST SP 800-057 Part 3r1 Recommendation for Key Management, Part 3; Application-Specific Key Management Guidance, 2015-01-22 (Final).pdf
* NIST SP 800-037r2-draft-fpd-comment-template.xlsx
* NIST SP 800-120 Recommendation for EAP Methods Used in Wireless Network Access Authentication, 2009-09.pdf
* NIST SP 800-038A Addendum Recommendation for Block Cipher Modes of Operation; Three Variants of Ciphertext Stealing for CBC Mode, 2010-10.pdf
* NIST SP 800-175b-draft-comments-received.pdf
* NIST SP 800-022r1a A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, 2010-04-30 (Final).pdf
* NIST SB 2010-03 Revised Guide Helps Federal Organizations Improve Their Risk Management Practices And Information System Security.pdf
* NIST IR 7621r1.pdf
* NIST IR 7628 Guidelines for Smart Grid Cyber Security; Volume 03, 2010-08.pdf
* alt-IR7399-2006AnnualReport.pdf
* NIST SP 800-035 Guide to ITSec Services, 2003-10 (Minor Edits).pdf
* NIST SP 800-018r1 Guide for Developing Security Plans for Federal Information Systems, 2006-02-24 (Final).pdf
* NIST IR 7946.pdf
* NIST SB 2005-11 Securing Microsoft Windows XP Systems; NIST Recommendations For Using A Security Configuration Checklist.pdf
* NIST SB 1998-06 Training for ITSec; Evaluating the Effectiveness of Results-Based Learning, 1998-06.txt
* NIST SP 800-111 Guide to Storage Encryption Technologies for End User Devices, 2007-11-15 (Final).pdf
* alt-SP800-40r3.pdf
* NIST SP 800-083r1 Guide to Malware Incident Prevention and Handling for Desktops and Laptops, 2013-07.pdf
* NIST SB 2011-08 Protecting Industrial Control Systems-Key Components Of Our Nation's Critical Infrastructure.pdf
* NIST IR 7250 Cell Phone Forensic Tools; An Overview and Analysis, 2005-10.pdf
* NIST IR 7511r4.pdf
* NIST SP 800-013 Telecommunications Security Guidelines for Telecommunications Management Network, 1995-10.pdf
* NIST SB 2008-01 Secure Web Servers Protecting Web Sites That Are Accessed By The Public.pdf
* NIST SP 800-083 Guide to Malware Incident Prevention and Handling, 2005-11.pdf
* NIST SP 800-046r2 Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security, 2016-07-29 (Final).pdf
* alt-SP800-44v2.pdf
* NIST SP 800-142 Practical Combinatorial Testing, 2010-10.pdf
* NIST SB 2010-08 Assessing the Effectiveness of Security Controls in Federal Information Systems.pdf
* alt-SP800-70r3.pdf
* NIST SP 800-157_comments_resolutions.pdf
* NIST SP 800-063B Digital Identity Guidelines; Authentication and Lifecycle Management, 2017-12-01 (Final).pdf
* NIST SP 800-066r1 An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule, 2008-10-23 (Final).pdf
* NIST IR 7359 Information Security Guide For Government Executives, 2007-01.pdf
* NIST SP 800-030r1 Guide for Conducting Risk Assessments, 2012-09-18.pdf
* NIST SP 800-051r1 Guide to Using Vulnerability Naming Schemes, 2011-02-25 (Final).pdf
* NIST SP 800-053Ar1 Guide for Assessing the Security Controls in Federal Information Systems and Organizations, 2010-06-29.pdf
* NIST SP 800-050 Building an ITSec Awareness and Training Program, 2003-10.pdf
* NIST FIPS 191 Guideline for The Analysis of Local Area Network Security, 1994-11.pdf
* NIST SP 800-185_draft_comments_received.pdf
* NIST SP 800-063C Digital Identity Guidelines; Federation and Assertions, 2017-12-01 (Final).pdf
* NIST IR 8135.pdf
* NIST IR 7316 Assessment of Access Control Systems, 2006-09.pdf
* NIST SB 1998-05 Management of Risks in Info Systems; Practices of Successful Orgs.txt
* NIST SP 800-113 Guide to SSL VPNs.pdf
* NIST IR 6529A Common Biometric Exchange File Format (CBEFF), April 5, 2004.pdf
* NIST SB 2001-09 Security Self-Assessment Guide for Information Technology Systems.pdf
* NIST SP 800-019 Mobile Agent Security, 1999-10.pdf
* dns-secure-email-nist-sp1800-6.pdf
* fs-pam-nist-sp1800-18b-draft.pdf
* NIST IR 7696.pdf
* NIST SP 800-013.pdf
* NIST IR 7551.pdf
* NIST IR 7696 Common Platform Enumeration; Name Matching Specification 2.3, 2011-08.pdf
* NIST SB 1998-06 Training for ITSec; Evaluating the Effectiveness of Results-Based Learning, 1998-06.pdf
* alt-SP800-126r3.pdf
* NIST SP 800-152 A Profile for US Federal Cryptographic Key Management Systems (CKMS), 2014-01 (Draft).pdf
* NIST IR 7874.pdf
* NIST IR 7698.pdf
* NIST IR 7933.pdf
* NIST SP 800-039 Managing Information Security Risk; Organization, Mission, and Information System View, 2011-03-01 (Final).pdf
* NIST SP 800-177 Trustworthy Email, 2016-09-07 (Final).pdf
* NIST SP 800-079-1 Guidelines for the Accreditation of PIV Card Issuers, 2008-06.pdf
* NIST SP 800-057 Recommendation for Key Management, Part 2; 2005-08 (updated March 9, 2007).pdf
* NIST SP 800-122 Guide to Protecting the Confidentiality of Personally Identifiable Information (PII), 2010-04-06 (Final).pdf
* NIST SP 800-063a.pdf
* fs-itam-nist-sp1800-5c-draft.pdf
* NIST IR 7030 Picture Password; A Visual Login Technique for Mobile Devices, 2003-07.pdf
* NIST IR 7791.pdf
* NIST IR 7516 Forensic Filtering of Cell Phone Protocols, 2008-08.pdf
* hit-ehr-nist-sp1800-1-draft.pdf
* alt-SP800-57part3rev1.pdf
* NIST FIPS 186-4.pdf
* NIST IR 7621 Small Business Information Security; The Fundamentals, 2009-10.pdf
* alt-IR7111-2003AnnualReport.pdf
* NIST SB 2005-04 Implementing The Health Insurance Portability And Accountability Act (HIPAA) Security Rule.pdf
* alt-SP800-37-r2-Draft.pdf
* NIST SP 800-056ar3-draft-comments-received.pdf
* NIST SP 500-280 Mobile ID Device Best Practice Recommendation v1.0, 2009-08-25.pdf
* NIST IR 8112.pdf
* alt-SP800-121_Rev1.pdf
* NIST IR 7657.pdf
* NIST IR 7658.pdf
* hit-ehr-nist-sp1800-1d.pdf
* es-idam-sp1800-2.pdf
* alt-NIST.CSWP.04162018.pdf
* NIST SP 800-101r1 Guidelines on Mobile Device Forensics, 2014-05-15 (Final).pdf
* NIST IR 8080.pdf
* NIST SP 800-044v2 Guidelines on Securing Public Web Servers, 2007-09.pdf
* NIST SP 500-264.pdf
* NIST SP 800-031 Intrusion Detection Systems (IDS), 2001-11.pdf
* NIST SP 800-145 The NIST Definition of Cloud Computing, 2011-09-28 (Final).pdf
* NIST SP 800-175a-draft-comments-received.pdf
* NIST IR 7387 Cell Phone Forensic Tools; An Overview and Analysis Update.pdf
* NIST SP 800-137 Information Security Continuous Monitoring for Federal Information Systems and Organizations (with Index), 2011-09.pdf
* NIST SP 800-036.pdf
* alt-SP800-81.pdf
* NIST SB 2009-01 Security Of Cell Phones And PDAs.pdf
* NIST IR 7452.pdf
* NIST IR 7692 Specification for the Open Checklist Interactive Language (OCIL) 2.0, 2011-04.pdf
* alt-NIST cybersecurity-framework-021214.pdf
* NIST FIPS 180-2 Secure Hash Standard (SHS), 2002-08.zip
* NIST SP 800-082 Guide to Industrial Control Systems (ICS) Security, 2011-06.pdf
* NIST SP 800-095 Guide to Secure Web Services, 2007-08-29 (Final).pdf
* es-idam-sp1800-2a.pdf
* NIST SP 800-084 Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities, 2006-09.pdf
* NIST SP 800-037r2-draft-fpd-with-line-nums.pdf
* NIST SB 1997-07 Public Key Infrastructure Technology.pdf
* NIST SP 800-064r2 Security Considerations in the System Development Life Cycle, 2008-10-16 (Final).pdf
* NIST SP 800-160.pdf
* NIST SB 2003-05 Security For Wireless Networks And Devices.pdf
* NIST SP 800-133 Recommendation for Cryptographic Key Generation, 2012-12-21 (Final).epub
* hit-ehr-nist-sp1800-1-draft.zip
* NIST SP 800-038B Recommendation for Block Cipher Modes of Operation; The CMAC Mode for Authentication, 2005-03.pdf
* sidr-piir-nist-sp1800-14c-draft.pdf
* NIST SP 800-056Br1 Recommendation for Pair-Wise Key-Establishment Schemes Using Integer Factorization Cryptography, 2014-10-01 (Final).pdf
* NIST SP 800-037r2-draft-ipd-with-line-nums.pdf
* hit-ehr-nist-sp1800-1c.pdf
* NIST IR 7497.pdf
* NIST SB 2003-01 Security Of Electronic Mail.pdf
* NIST FIPS 200.pdf
* NIST SP 800-057 Recommendation for Key Management; Part 3 Key Management, 2007-03.pdf
* NIST IR 7617 Mobile Forensic Reference Materials; A Methodology and Reification, 2009-10.pdf
* NIST SP 800-037r2-draft-fpd.pdf
* NIST SP 800-125 Guide to Security for Full Virtualization Technologies, 2011-01.pdf
* NIST SP 800-178 A Comparison of Attribute Based Access Control (ABAC) Standards for Data Service Applications; XACML and NGAC, 2016-10-03 (Final).pdf
* NIST SP 800-125B Secure Virtual Network Configuration for Virtual Machine (VM) Protection, 2016-03-07 (Final).pdf
* NIST SP 800-023.pdf
* alt-SP800-167.pdf
* NIST SP 800-144 Guidelines on Security and Privacy in Public Cloud Computing, 2012-01.pdf
* NIST IR 7628 Guidelines for Smart Grid Cyber Security; Introduction, 2010-08.pdf
* NIST IR 7511r5.pdf
* NIST SP 800-123 Guide to General Server Security, 2008-07-25 (Final).pdf
* NIST IR 7694 Specification for the Asset Reporting Format 1.1, 2011-06.pdf
* NIST IR 7764 Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competition, 2011-02.pdf
* NIST IR 6483 Randomness Testing of the Advanced Encryption Standard Finalist Candidates1, 2000-05.pdf
* alt-SP800-77.pdf
* NIST SP 800-156 Representation of PIV Chain-of-Trust for Import and Export, 2016-05-20 (Final).pdf
* NIST SB 1999-03 Computer Attacks; What They Are and How to Defend Against Them.txt
* alt-SP800-95.pdf
* NIST IR 7564 Directions in Security Metrics Research, 2009-08.pdf
* NIST FIPS 198-1.pdf
* NIST IR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards, 2010-06.pdf
* NIST SB 2002-12 Security of Public Web Servers.pdf
* NIST SP 800-037r2 Risk Management Framework for Information Systems and Organizations; A System Life Cycle Approach for Security and Privacy, 2018-12-20 (Final).pdf
* NIST IR 7849.pdf
* fs-itam-nist-sp1800-5.pdf
* NIST SP 800-037r2-draft-ipd.pdf
* hit-ehr-nist-sp1800-1e-draft.pdf
* NIST IR 4939 Threat Assessment of Malicious Code and External Attacks, 1992-10 (2009 Minor Edits).txt
* NIST SP 800-038B Recommendation for Block Cipher Modes of Operation; the CMAC Mode for Authentication, 2016-10-06 (Final).pdf
* NIST SP 800-059 Guideline for Identifying an Information System as a National Security System, 2003-08-20 (Final).pdf
* NIST SB 2003-06 ASSET; Security Assessment Tool For Federal Agencies.pdf
* NIST SP 800-164 Guidelines on Hardware-Rooted Security in Mobile Devices, 2012-10-31 (Draft).pdf
* NIST IR 7609.pdf
* NIST SP 800-147 BIOS Protection Guidelines, 2011-04-29 (Final).pdf
* NIST SP 800-107 Recommendation for Apps Using Approved Hash Algorithms, 2009-02.pdf
* NIST SP 800-106 Randomized Hashing for Digital Signatures, 2009-02.pdf
* alt-SP800-145.pdf
* NIST SP 800-101 Guidelines for Cell Phone Forensics, 2007-05.pdf
* NIST SP 800-117r1 Guide to Adopting and Using the Security Content Automation Protocol (SCAP) Version 1.2, 2012-01-06 (Draft).pdf
* alt-SP800-171r1.pdf
* alt-SP800-37r1.pdf
* NIST SP 800-088r1 Guidelines for Media Sanitization, 2014-12-17 (Final).pdf
* NIST SP 800-025 Federal Agency Use of Public Key Technology for Digital Signatures and Authentication, 2000-10.pdf
* NIST IR 8053.pdf
* cr-mfa-nist-sp1800-17a.pdf
* NIST SP 800-065 Integrating Security into the Capital Planning and Investment Control Process, 2005-01.pdf
* NIST SB 1992-03 An Introduction to Secure Telephone Terminals.txt
* alt-SP800-45v2.pdf
* NIST SP 800-034-r1_cp_template_high_impact_system.docx
* NIST IR 7697 Common Platform Enumeration; Dictionary Specification 2.3, 2011-08.pdf
* NIST SP 800-126r2 Technical Specification for SCAP 1.2, Errata 2012-04-09.pdf
* hit-ehr-nist-sp1800-1a.pdf
* NIST IR 7559 Forensics Web Services (FWS), 2010-07-07.pdf
* NIST SB 2009-03 The Cryptographic Hash Algorithm Family; Revision Of The SHS.pdf
* NIST SP 800-078-3 Cryptographic Algorithms and Key Sizes for Personal Identification Verification (PIV), 2010-12.pdf
* hit-wip-nist-sp1800-8c.pdf
* NIST IR 7284 Personal Identity Verification Card Management Report, 2006-01.pdf
* NIST SB 2007-12 Securing External Computers And Other Devices Used by Teleworkers.pdf
* NIST SB 1999-09 Securing Web Servers .txt
* NIST SP 800-153 Guidelines for Securing Wireless Local Area Networks (WLANs), 2012-02-21 (Final).pdf
* NIST SP 800-202 Quick Start Guide for Populating Mobile Test Devices, 2018-05-10 (Final).pdf
* NIST SB 2002-10 Security Patches And The CVE Vulnerability Naming Scheme.pdf
* NIST SB 2007-10 The Common Vulnerability Scoring System (CVSS).pdf
* NIST SB 2002-02 Risk Management Guidance For Information Technology Systems.pdf
* alt-IR7874.pdf
* NIST SP 800-119 Guidelines for the Secure Deployment of IPv6, 2010-12-29 (Final).pdf
* NIST SP 500-291 Cloud Computing Standards Roadmap, 2011-07-05.pdf
* NIST SP 800-037-rev2-IPD-redline-final.pdf
* NIST SP 800-131Ar1 Transitions; Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths, 2015-11-06 (Final).pdf
* NIST SB 2008-08 Security Assessments; Tools For Measuring The Effectiveness Of Security Controls.pdf
* NIST IR 8149.pdf
* NIST SP 800-056B Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptography, 2009-08.pdf
* NIST IR 7007.pdf
* NIST SP 800-122 Guide to Protecting the Confidentiality of Personally Identifiable Information (PII), 2010-04.pdf
* NIST SP 800-127 Guide to Securing WiMAX Wireless Communications, 2010-09 (Final).epub
* NIST IR 7957.pdf
* NIST SP 800-120.pdf
* NIST IR 8192.pdf
* NIST SP 800-100 Information Security Handbook; A Guide for Managers, 2007-03-07 (Final).pdf
* NIST IR 7285.pdf
* NIST SP 800-124r1 Guidelines for Managing the Security of Mobile Devices in the Enterprise, 2013-06-21 (Final).pdf
* NIST IR 8074v2.pdf
* NIST SB 1999-09 Securing Web Servers .pdf
* NIST IR 7206 Smart Cards and Mobile Device Auth; An Overview and Implementation, 2005-07.pdf
* NIST SP 800-065.pdf
* NIST SB 2007-04 Securing Wireless Networks.pdf
* NIST SB 2009-10 Protecting Information Systems With Firewalls; Revised Guidelines On Firewall Technologies And Policies, 2009-10.pdf
* NIST SP 800-079-2 Guidelines for the Authorization of Personal Identity Verification Card Issuers (PCI) and Derived PIV Credential Issuers (DPCI), 2015-07-30 (Final).pdf
* NIST SP 800-096 PIV Card-Reader Interoperability Guidelines, 2006-09.pdf
* alt-SP800-160.pdf
* es-idam-sp1800-2c.pdf
* alt-SP800-40v2.pdf
* NIST SB 1996-10 Generally Accepted System Security Principles (GSSPs); Guidance On Securing IT Systems.txt
* NIST SB 1998-09 Cryptography Standards and Infrastructures for the Twenty-First Century.txt
* NIST IR 7200.pdf
* NIST SP 800-046r1 Guide to Enterprise Telework and Remote Access Security, 2009-06.pdf
* hit-ehr-nist-sp1800-1b-draft.pdf
* NIST SB 2009-02 Using PIV Credentials In Physical Access Control Systems (PACS).pdf
* NIST SP 800-115 Technical Guide to Information Security Testing and Assessment, 2008-09.pdf
* NIST SB 1997-07 Public Key Infrastructure Technology.txt
* NIST SP 800-073-3 Interfaces for PIV; Part 3- PIV Client Application Programming Interface, 2010-02.pdf
* NIST SP 800-053r3 Recommended Security Controls for Federal Information Systems and Organizations (Errata), 2010-05-01.pdf
* mds-nist-sp1800-4-draft.pdf
* NIST SB 2006-08 Protecting Sensitive Information Processed And Stored In Information Technology (It) Systems.pdf
* NIST IR 7298r1 Glossary of Key Information Security Terms, 2011-02.pdf
* NIST SB 2011-06 Guidelines for Protecting Basic Input-Output System (BIOS) Firmware.pdf
* NIST SP 800-061r1 Computer Security Incident Handling Guide, 2008-05.pdf
* SP960_4.pdf
* NIST SP 800-069.pdf
* NIST IR 7275.pdf
* NIST SP 800-038G Recommendation for Block Cipher Modes of Operation; Methods for Format-Preserving Encryption, 2016-03-29 (Final).pdf
* NIST SP 800-188_draft2_comment-template-form.docx
* abac-nist-sp1800-3a-draft.pdf
* NIST FIPS 199.pdf
* NIST FIPS 201-1 PIV of Fed Employees and Contractors, 2006-05 (updated 2006-06-26).txt
* NIST SP 800-190 Application Container Security Guide, 2017-09-25 (Final).pdf
* NIST SP 500-288 Specification for WS-Biometric Devices (WS-BD), 2012-03-14.pdf
* NIST FIPS 140-2 Security Requirements for Cryptographic Modules, Annex C; Approved Random Number Generators, 2001-03 (2009 Minor Edits).pdf
* NIST SP 800-034-r1_bia_template.docx
* NIST SP 800-060r1 v1 Guide for Mapping Types of Information and Information Systems to Security Categories, 2008-08-01 (Final).pdf
* NIST IR 6887 Government Smart Card Interoperability Specification (GSC-IS), v2.1, 2003-07.pdf
* NIST SP 800-059 Guideline for Identifying an Information System as a National Security System, 2003-08.pdf
* NIST FIPS 140-2 Security Reqs for Cryptographic Modules, 2001-03.pdf
* NIST SB 2010-07 Contingency Planning for Information Systems; Updated Guide for Federal Organizations.pdf
* hit-wip-nist-sp1800-8a.pdf
* NIST IR 7387.pdf
* NIST SP 800-045 Version 2 Guidelines on Electronic Mail Security, 2007-02-20 (Final).pdf
* alt-SP800-63-2.pdf
* alt-SP800-126.pdf
* NIST SB 2006-02 Creating A Program To Manage Security Patches And Vulnerabilities.pdf
* NIST IR 8014.pdf
* NIST SP 800-028 Version 2 Guidelines on Active Content and Mobile Code, 2008-03-07 (Final).pdf
* NIST SP 800-069 Guidance for Securing Microsoft Windows XP Home Edition.pdf
* NIST IR 7399.pdf
* NIST IR 6887e2003.pdf
* NIST SP 800-015 Minimum Interoperability Specification for PKI Components (MISPC), v1, 1997-09.doc
* NIST FIPS 202.pdf
* alt-SP800-70r4.pdf
* NIST SP 800-051r1 Guide to Using Vulnerability Naming Schemes, 2011-02.pdf
* NIST FIPS 198-1 The Keyed-Hash Message Authentication Code (HMAC), 2008-07.pdf
* NIST FIPS 190 Guideline for the Use of Advanced Authentication Technology Alternatives, 1994-09.txt
* NIST IR 6462 CSPP - Guidance for COTS Security Protection Profiles, 1999-12.pdf
* NIST SP 800-142 Practical Combinatorial Testing, 2010-10-07 (Final).pdf
* alt-SP800-123.pdf
* NIST SP 800-050 Building an Information Technology Security Awareness and Training Program, 2003-10-01 (Final).pdf
* NIST SP 800-096 PIV Card to Reader Interoperability Guidelines, 2006-12-29 (Final).pdf
* NIST IR 7628r1.pdf
* NIST IR 7100.pdf
* alt-NIST SP 800-88_Guidelines for Media Sanitization.pdf
* Component_Legend_SP800_56B_RSADP.pdf
* 140sp2660.pdf
* sp800-171r2-security-reqs.csv
* 140sp1806.pdf
* 140sp1955.pdf
* session-7-ntru-schanck.pdf
* 140crt1021.pdf
* 202i.pdf
* Kaucher-FISSEA-030904.ppt
* metrics-network-vulnerability_lbadger.pdf
* Homeland-Bill.pdf
* ISPAB September ISPAB Metting Minutes Final.pdf
* Industry-Day-polk_v3.pdf
* 140sp824.pdf
* GILBERT_TradeoffsPanel.pdf
* b-June-2007.pdf
* Erik-Hjelmvik-Standards-Vattenfall.pdf
* 140sp1544.pdf
* pivmiddlewarecertificate3.pdf
* 140sp214.pdf
* Daniels_re_Natl_Strategy_04_2003.pdf
* FRN Announcing March 2022 ISPAB Meeting.pdf
* SP-800-56C.pdf
* 140sp1264.pdf
* forum_august2014_otto.pdf
* 140sp453.pdf
* NIST.SP.800-213.pdf
* 140sp1042.pdf
* nistir7696.pdf
* Davis-OmniTek-Migration-Strategies.pdf
* Program_NIAT2011.pdf
* twg-02-06.pdf
* risk-management-framework-2009.pdf
* 140sp2999.pdf
* OLIR_reviewed_800-213A_to_CSF_final.xlsx
* LeslieR-ISPAB-Sept2006.pdf
* 140sp1120.pdf
* ICSsecurity_ISPAB-dec2008_SPMcGurk.pdf
* 140sp2787.pdf
* 140sp2411.pdf
* 140crt340.pdf
* 140crt329.pdf
* 140sp1739.pdf
* PIV-Wilson.pdf
* ispab_june-11_a-130_cbales.pdf
* Comments-Draft-SP-800-171B-Boeing-26July2019.pdf
* CDT-cl.txt
* 140crt1198.pdf
* 252.pdf
* session-7-bernstein-fast-verified-software.pdf
* twg-04-03.pdf
* rbac-slides-doe.pdf
* minutes3-99.txt
* 140sp2495.pdf
* Smith-FISSEA-031104.ppt
* nistspecialpublication800-6.pdf
* nistir_8014_draft.pdf
* paperD1.pdf
* 140sp1612.pdf
* draft-sp800-40rev3.pdf
* FrodoKEM-Statements.pdf
* 140sp2503.pdf
* SHA256.pdf
* June2005-GAO-RFID-Report.pdf
* 140sp845.pdf
* 140sp2544.pdf
* 140sp1285.pdf
* 15CFR24.pdf
* Xoodyak-update.pdf
* iosp1.txt
* FIPS140ConsolidatedCertList0032.pdf
* 140sp4242.pdf
* 186-4ecdsatestvectors.zip
* nistspecialpublication800-19.pdf
* 800-5.ps
* 140sp2873.pdf
* 140sp243.pdf
* checklist.pdf
* Fargo-Electronics-Inc.pdf
* 140crt348.pdf
* mtd_paper_final.pdf
* 140sp2744.pdf
* 140sp1044.pdf
* forum_august2014_dempsey.pdf
* Square-AES-Mugi.mat.txt
* Poulios-Wed440.ppt
* Comments-Draft-SP-800-171B-SphereCom-10July2019.pdf
* 140sp2936.pdf
* Blue_Midnight_Wish.zip
* 140crt248.pdf
* o10.pdf
* 140sp1632.pdf
* sp800-171A-fpd-comment-template.xls
* tg003.txt
* LAEM-official-comment.pdf
* WU_presentation.pdf
* iosp19.txt
* NIST.SP.800-160v2.pdf
* ESSENCE_SHA_3_Leuven_v2.pdf
* itlbul2013_10.pdf
* test4_29.csv
* ACIWorldwide.pdf
* Ouroboros-R-April2018.pdf
* 140sp3852.pdf
* sha-3bittestvectors.zip
* Draft_NIST-FIPS-201-2.pdf
* NISTIR-8259A-focal-details.csv
* NIST.IR.8241.pdf
* NIST.IR.8235.pdf
* NIST.IR.8176.pdf
* test4_40.csv
* 140sp1288.pdf
* 140sp2990.pdf
* 140crt616.pdf
* 140sp2870.pdf
* JDray.pdf
* S10_802.11i Overview-jw1.pdf
* 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
* 133-SAINT-SCAP-Implementation-Statement.pdf
* 140sp88.pdf
* 140sp668.pdf
* 140crt1431.pdf
* nistspecialpublication800-81r1.pdf
* 03-06-Schaul.pdf
* FISSEA2006-Hash.pdf
* SP800-59.pdf
* draft_nistir-7823.pdf
* NIST.FIPS.140-3.pdf
* guess-again-official-comment.pdf
* SP800-60V2-final.pdf
* fips140consolidatedcertlist0034.pdf
* Khaja-ISPAB_Jun2007.pdf
* ISPAB-Minutes-Dec2005.pdf
* 800-6.ps
* nist.ir.7878.pdf
* NIST.SP.800-88r1.pdf
* tinyjambu.zip
* 140sp977.pdf
* 140sp1033.pdf
* Titanium-April2018.pdf
* 140sp3064.pdf
* twg-02-01.pdf
* ISPAB-March2007-Final-Minutes.pdf
* twg-04-05.pdf
* 140sp2476.pdf
* FISSEA2011_motivational-winner.pdf
* PIVCardApplicationCertificate15.pdf
* sp800-53B-draft-comment-template.xlsx
* Randy_Easter_-New_IG_(3).pdf
* sp_800-126_comment_development_template.doc
* 140sp1754.pdf
* crystals-kyber-selected-algo-official-comment.pdf
* 5-Greene Webinar-slides-06-16-20 FINAL.pdf
* Draft Febraury 2020 Agenda.pdf
* keefe.ppt
* SHAKE256_Msg5.pdf
* 140crt225.pdf
* draftcharge.txt
* HMAC_SHA3-224.pdf
* sp800-171A-ipd-comment-template.xls
* session-7-chou-classic-mceliece-arm-cortex-m4.pdf
* 140sp1694.pdf
* 140sp2686.pdf
* nistspecialpublication800-95.pdf
* fissea_2013_contest_winner_poster.pdf
* Dec2004-FIPS-201-Update-Briefing.pdf
* itlbul2015_04.pdf
* 140sp364.pdf
* NIST.CSWP.04282020-draft.pdf
* SIMD.zip
* Comments-received-SP800-90B-May2016.pdf
* forkae.zip
* cui-plan-of-action-template-final.docx
* ICS-Augmentation-Appx-F-800-53-rev1_blueline_22jun07.pdf
* NTRU-Round2.zip
* ascon-spec-final.pdf
* nist.ir.7916.pdf
* 140sp2113.pdf
* 140crt1338.pdf
* Giophantus-April2018.pdf
* IT-security-video-text-for-visually-impaired.doc
* 140crt73.pdf
* CMT12verbose.pdf
* test3_18.csv
* X9-82_Part3_workshop.pdf
* 140sp710.pdf
* FISSEA-litchko.ppt
* twg-03-13.pdf
* 140sp2355.pdf
* 140sp1812.pdf
* nistspecialpublication800-67ver1.pdf
* 140sp1820.pdf
* 140sp1703.pdf
* 140sp2496.pdf
* General-Mitre-OCIL-1.xml
* ntru-round3-official-comment.pdf
* test3_80.csv
* NTRU-Prime-round2-official-comment.pdf
* DAGS.zip
* 905.pdf
* physecpre10.ppt
* CRYSTALS-Dilithium-Statements.pdf
* FISSEA2006-Mon1020-Morris.pdf
* sp800_133.pdf
* 140sp2310.pdf
* itlbul2016-10.pdf
* 140sp2299.pdf
* 140sp86.pdf
* oct22_dod_mobility-needs-and-challenges_youst.pdf
* fr991105.pdf
* 140sp1919.pdf
* NTRU-Statements-Round2.pdf
* 03-06-Millett-pt2.pdf
* 140sp3246.pdf
* aesmmt.zip
* Federal Register Notice Announcing March 2023 ISPAB Meeting 2023-00529.pdf
* Minutes.pdf
* 140crt864.pdf
* elephant-spec-round2.pdf
* September 2021_011021_0714_Signed2.pdf
* 1993-16th-NCSC-proceedings.pdf
* gcm-revised-spec.pdf
* HR3394-final.pdf
* NIST.SP.800-140Dr1-draft.pdf
* FIPS_186_and_Elliptic_Curves_052914.pdf
* comet_update.pdf
* session5-nandi-forgery-on-qameleon-and-siv.pdf
* fisma-final.pdf
* 140crt1187.pdf
* session-6-hansen-toolchain.pdf
* 140sp2181.pdf
* 140sp3759.pdf
* KarenEvans.pdf
* tg002.txt
* Sept2004-Govt_wide-Information-Security-Enhance.pdf
* Dodson_System_Priorities.pdf
* 20141015_ccia.pdf
* Identity_Proofing_MacGregor.pdf
* 140sp1684.pdf
* dme-April2018.pdf
* 04-slucks.pdf
* sp800-131a_r1_draft.pdf
* 140sp2465.pdf
* heinz-first-order-pqc2021.pdf
* lesser_day2_230_hipaa_secprivacy_nccoe.pdf
* 100-103.pdf
* cjackson_fissea2010-difficulties-evolving-cybersecurity-workforce.pdf
* 140crt1405.pdf
* LUX_Comments.pdf
* 140crt1165.pdf
* UMD Final Report-Cyber Risk Analytics Project revised tc november 25 2017.pdf
* o14.pdf
* 20191111-TIS-talk-threshold---ts-20191125.pdf
* press-release.doc
* NIST.SP.1800-23.pdf
* NIST_FCSM_2018-Cybersecurity_Presentation-Nick Marinos.pdf
* CONEY_e2e_nist_Oct09.pdf
* Dixon-DOD-NISTv31.pdf
* call-for-papers-fourth-pqc-conference.pdf
* Transition_comments_8142009.pdf
* itlbul2012-03.pdf
* 140sp1440.pdf
* 140sp4025.pdf
* KAT_HQC.zip
* Daniels_Re_Natl_Strategy_04_2003.pdf
* 140sp841.pdf
* NIST.IR.8212-draft.pdf
* Tuesday1020-Wrubel.pdf
* WG5_1297.doc
* 140sp2890.pdf
* 140crt192.pdf
* fissea_2014_wilson.pdf
* crystals-dilithium-round3-official-comment.pdf
* FISSEA2006-Serepca_panel-Mon1pm.pdf
* 140sp1656.pdf
* comments.pdf
* 140sp520.pdf
* BlenderUpdate.zip
* sp800-38a-initial-public-comments-2021.pdf
* 140sp2806.pdf
* nistspecialpublication800-22r1a.pdf
* NIST.SP.1800-27.pdf
* 94-rpt.txt
* ISPAB-ITSecurityProducts-PHoward_BAbrams.pdf
* 140sp3782.pdf
* physecpre10.ppt
* 140sp2590.pdf
* sp800-128.pdf
* TupleHash_samples.pdf
* 140sp4261.pdf
* RD-ATTWTC_ISPAB0307.pdf
* covey.pdf
* 140sp3630.pdf
* CKMW_Program_March2014.pdf
* ipo-nist.pdf
* oribatida.zip
* 140sp342.pdf
* 140sp960.pdf
* 2015_agenda-ispab-october-meeting.pdf
* NVD2007.xls
* 140sp3540.pdf
* sp800-57pt2-r1-draft.pdf
* nistspecialpublication800-40ver2.pdf
* sp800-172a-assessment-procedures.csv
* 140crt1016.pdf
* SHA_All.pdf
* ckelsall_fissea2010_panel-tracking-role-base-training.pdf
* ispab_meeting_minutes_february_2013.pdf
* 140sp2645.pdf
* 140sp1584.pdf
* sp800-177_draft_comment-template-form.xls
* 140sp3604.pdf
* USGOLDSchema.pdf
* 20000316-bgladman.pdf
* 140sp1471.pdf
* panele2.pdf
* NIST.SP.800-38B.pdf
* ASSET_Source_code_v1_10162002.zip
* 140sp879.pdf
* ispab_jun2014_fccx-briefing_glair.pdf
* sp800-15-decision-proposal-comments-2021.pdf
* PIV-Morphet.pdf
* 140crt529.pdf
* drbgvs.pdf
* rump-talks.pdf
* 140sp2617.pdf
* ISPAB_Jun2007_final-Minutes.pdf
* 140crt845.pdf
* 140sp2526.pdf
* agenda9706.txt
* IR7111-CSDAnnualReport.pdf
* itlbul2015-06.pdf
* 140crt1175.pdf
* bground.txt
* 140sp1982.pdf
* NIST.SP.800-63a.pdf
* Comments-SP-800-171B-Nevaridge_Technologies-26June2019.pdf
* March2005-RFID-BriefingII.pdf
* Closed-Isolated-Network-Overlay.pdf
* Richardson-Tues1110.ppt
* 328-330.pdf
* 140crt94.pdf
* 140sp1275.pdf
* 140sp2659.pdf
* cover.txt
* fissea2007_change-management_roth-perreault.pdf
* 140sp1060.pdf
* 140sp2880.pdf
* 140sp2216.pdf
* 140sp2492.pdf
* ISPAB-Minutes-March2004.pdf
* estate-spec-round2.pdf
* 140crt304.pdf
* JONES_DefinitionPanel.pdf
* 140sp509.pdf
* 140crt258.pdf
* 09-smurphy.pdf
* 140sp2899.pdf
* HK17-official-comment.pdf
* test4_28.csv
* 140sp3060.pdf
* privacy-workshop-breakout-session-slides.pdf
* twg-04-04.pdf
* 140sp1459.pdf
* RuoffT_Bio.pdf
* Greenwood.doc
* 140sp935.pdf
* 140sp2129.pdf
* fissea_conf_2013_morris_audio.pdf
* itlbul2019-05.pdf
* NIST.SP.800-85A-4.pdf
* ESTATE-update-email.pdf
* BKP.pdf
* 140sp556.pdf
* forum_august2014_fiscal_service.pdf
* 140sp1651.pdf
* chen-lily-threshold-crypto-workshop-March-2019.pdf
* SP800-137-Final.pdf
* 140sp1348.pdf
* nistspecialpublication800-107r1.pdf
* NIST.CSWP.27.ipd.pdf
* 260-265.pdf
* Identity-Proofing-Dodson.pdf
* fips201-3_BRM_Federation - 4.zip
* FIPSConsolidatedDec2019.pdf
* AES_CMAC.pdf
* powanda.ZIP
* nistspecialpublication800-77.pdf
* omac-spec.pdf
* 140sp4176.pdf
* 140sp530.pdf
* jun-gd-nist-cardtech2003.pdf
* csic_comments_cignet.pdf
* LOCKWOOD_TitlePage.pdf
* forum_feb2015_dhs_sp800-53-appendix-j.pdf
* three-bears-hamburg.pdf
* March16_FISSEA-Competency-driven-training-TCinnamon.pdf
* pp-authenticatingusersonpdas.pdf
* kelsey.pdf
* IAB.pdf
* August 2021_010921_0733.pdf
* SANDstorm.zip
* std004.txt
* Gimli-Statements.pdf
* Jul13_Cloud-Coordinating-Draft-Guidelines-Secure-Use-Cloud-Computing.pdf
* December 2019 ISPAB Meeting Minutes Final.pdf
* 140crt201.pdf
* 0920 - FCSM FISMA Training_September 2018-Cutshall for Posting.pdf
* fissea_conf_2013_roberson.pdf
* OSCAL-CAT_Dmitry-Cousin.pdf
* keywrap.pdf
* agenda970324.wpd
* Black-FISSEApanel-030904.ppt
* session-8-nguyen-boosting-hybrid-attack.pdf
* sp800-24pbx.pdf
* minutes9804.txt
* fips1402ig.pdf
* 800-53-for-ICS_KEMA.pdf
* appxi_800-53-rev1-augmented_15may07.pdf
* FISSEA Poster Winner.pdf
* 140sp523.pdf
* 140sp1634.pdf
* NIST_Ransomware_Tips_and_Tactics_Infographic.pdf
* NISTIR-7802.pdf
* Trilli-Andrews.pdf
* 140sp1765.pdf
* 140crt200.pdf
* USRP_NIST_GRE_090315.pdf
* SS16-4x4-GF256-inv.mat.txt
* 140sp2535.pdf
* usgcb-winxp-firewall-gpos.zip
* 140sp2695.pdf
* Transition_comments_8142009.pdf
* physecpre06.ppt
* example-Candidate-Information-spreadsheet.xlsx
* 140sp1078.pdf
* nistir7981_draft_comment_template.xls
* 140sp715.pdf
* sp800-171r2-draft-ipd-with-line-nums.pdf
* 990407-jgraff.pdf
* CRYSTALS-DILITHIUM-round2-official-comment.pdf
* 20000524-smurphy.pdf
* 140sp3942.pdf
* EDON-R_Comments.pdf
* 140sp3895.pdf
* 2009nomination-letter.pdf
* 140sp1650.pdf
* 140sp412.pdf
* 140sp358.pdf
* forum-april2015-media-sanitization-regenscheid.pdf
* 140sp1621.pdf
* 140sp1689.pdf
* 140sp3792.pdf
* CLAE-Statements.pdf
* BURR_presentation.pdf
* 140sp1148.pdf
* NTRUEncrypt-official-comment.pdf
* ca-tutorial-110706.pdf
* MayConsolidatedCert.pdf
* NaSHA_Comments.pdf
* SP800-53_Comment_Site_Infographic.pdf
* ispab_june-11_quantum_lchen.pdf
* 140crt741.pdf
* nistir-7502_CCSS.pdf
* PrideL0--XOR=24-rs=-1.circ.txt
* FIPS140ConsolidatedCertList0040.pdf
* 140sp1984.pdf
* SP800-73-Dray.pdf
* Gui-April2018.pdf
* 140sp2002.pdf
* session-5-grobschadl-evaluation-multi-platform.pdf
* nistir_8014_draft_comment-template.xls
* 140crt742.pdf
* oct23_choong_password.pdf
* 140sp3907.pdf
* 1991-14th-NCSC-proceedings-vol-1.pdf
* review-of-the-white-box-encodability-of-nist-lighweight-finalists.pdf
* CubeHash.zip
* D_Burk-Dec2005-ISPAB.pdf
* 140sp955.pdf
* physecpre18.pdf
* 140sp1236.pdf
* 140sp1709.pdf
* 2014_agenda-ispab-march-meeting.pdf
* FIPS140ConsolidatedCertList0031.pdf
* 140sp3273.pdf
* 140crt1113.pdf
* 140crt314.pdf
* 140sp959.pdf
* 140sp3152.pdf
* 034.pdf
* LaneUpdate.zip
* feb2_ispa-nccic-information-sharing_danderson.pdf
* ieee-morocco-rethinking-dlt-2.pptx
* day1_research_100-150.pdf
* Google Groups Presentation 02-13-18 - Rathini.pdf
* nistir-8221-draft.pdf
* 140sp1218.pdf
* agenda-hipaa-2010.pdf
* index.html.gz
* 140sp2747.pdf
* FIPS1402DTR.pdf
* 140crt597.pdf
* PIVMiddlewareCertificate18.pdf
* aes-draft.00.txt
* sp800-140dr1-draft-comment-template.docx
* WhirlwindM0.mat.txt
* chen-session-4-paper-pqc2019.pdf
* 140sp3201.pdf
* PIVCardApplicationCertificate27.pdf
* update-on-ascon-lwc2020.pdf
* FISSEA-Workshop-Nov2004.ppt
* 140sp2879.pdf
* 140crt828.pdf
* charter.pdf
* 140crt494.pdf
* Ed_Roback.pdf
* session-6-huang-randomness-testing-of-lwc-cipher-finalists.pdf
* 1.t4 - Lunch - Piez_workshop-March2022-slides-OSCALtools.pdf
* ascon-changelog.pdf
* 03-06-Landwehr.pdf
* 140crt942.pdf
* day2_security-automation_330-420.pdf
* SNEIK-Statements.pdf
* 140sp3871.pdf
* 140sp3092.pdf
* 02-12-McCrary.pdf
* SKOP15-8x8-GF16--XOR=170--XZLBZ20.circ.txt
* Rivest-NIST-E2E-keynote.pdf
* itlbul2014-08.pdf
* 140crt1237.pdf
* NIST.SP.800-189-draft2.pdf
* itlbul2004-09.pdf
* 140crt196.pdf
* may30_future-privacy-health-it_gbuchelt.pdf
* ongoing_comments.pdf
* 140sp4235.pdf
* sep96.txt
* daon-inc.pdf
* 990415-pmokros.pdf
* 140sp3350.pdf
* mpts2020-1a3-talk-ivan.pdf
* 140sp1707.pdf
* README.txt
* remaining_modes.pdf
* test4_50.csv
* ISPAB - Final Agenda - Mar2021.pdf
* 140sp1728.pdf
* 140sp2539.pdf
* xecb-mac-doc.pdf
* tues1230_pbgc_tier2-program.pdf
* service.taxonomy.doc
* 140sp1831.pdf
* 140sp39.pdf
* 140sp2033.pdf
* k0day_august-version.pdf
* 140sp1782.pdf
* Sept2004-PIV-Briefing.pdf
* Sharon_Keller.pdf
* clipper.txt
* isap-spec-final.pdf
* 140crt856.pdf
* 140sp173.pdf
* QSG_categorize-system-perspective.pdf
* fedeli.txt
* CBarker.ppt
* 140crt1153.pdf
* Forum-121410-Continuous-Monitoring-AJohnson.pdf
* 111-115.pdf
* drygascon-spec.pdf
* Deborah_Lafky.pdf
* 140sp3582.pdf
* DC-RealID_ISPAB0307.pdf
* pagter-jakob-threshold-crypto-March-2019.pdf
* 140sp637.pdf
* 140sp3996.pdf
* OMB-Update_ISPAB-Dec2008_M-Howell.pdf
* laem-statements.pdf
* 140sp2072.pdf
* Spook_updates.pdf
* 140crt899.pdf
* PIV-Baldridge.pdf
* sp800-218-potential-updates.xlsx
* 140sp1574.pdf
* ikev2.zip
* 140crt891.pdf
* 140sp2824.pdf
* 140crt878.pdf
* 140crt1275.pdf
* oct21_derusha_cyber-sprint.pdf
* 140sp44.pdf
* 140sp65.pdf
* Thursday_SWallace_PrivacyPanel.pdf
* NSTIC.pdf
* 140sp648.pdf
* 140sp503.pdf
* itlbul2014_10.pdf
* NIST.SP.1500-4r2.pdf
* Elephant_status-update-round-2.pdf
* 140crt1325.pdf
* Abstract-Isler.pdf
* 140crt886.pdf
* emareport_20001015.pdf
* nistir7442.pdf
* Cheetah.zip
* Gale-FISMA-presentation-Nov06.pdf
* BCADirectoryPhaseII-14-04-00.doc
* session-6-open-discussion.pdf
* 140sp1344.pdf
* ShamashandShamashash-Statements.pdf
* 140sp2492.pdf
* 140sp1648.pdf
* rbac-web.pdf
* SecondHashWshop_2006_Report.pdf
* March17_FISSEA-technical-workforce-monitor-KArnold-JLusby.pdf
* 140sp2096.pdf
* S07_CMVP_Wireless-re.pdf
* day1_HIPAA-conference2011-security-considerations-health-info.pdf
* nistir8200-draft-comment-template.docx
* 140sp2650.pdf
* 140sp2156.pdf
* ParallelHash_samples.pdf
* 140crt390.pdf
* 03-06-Bouma.pdf
* Federal_Cybersecurity_Privacy_Forum_2Dec2021_GAO_Assessing_Cybersecurity_Controls.pdf
* 140sp1278.pdf
* 140sp2912.pdf
* nistspecialpublication800-57p1r2006.pdf
* 140sp3070.pdf
* 140sp1910.pdf
* 140sp3534.pdf
* 140sp1582.pdf
* SP800-53_Comment_Site_Infographic.pdf
* nistspecialpublication800-46.pdf
* ross_2004_06_ispab.pdf
* Thursday-RAyer_Role-BasedTraining.pdf
* nistspecialpublication500-189.pdf
* DonghoonChang_bio.pdf
* sp800-70r3_draft.pdf
* 132-134.pdf
* 140sp2287.pdf
* bell76.pdf
* March15_FISSEA-nice-track4-PMaxson.pdf
* 140sp3381.pdf
* x963-IBM-Patent.PDF
* draft-sp800-85B-1.pdf
* faq-historical.pdf
* enhancing-resilience-against-botnets-draft.pdf
* 140sp491.pdf
* SHAMATA_Comments.pdf
* 140sp369.pdf
* Second Workshop on Enhancing Resilience no speakers[1].pdf
* 140sp2067.pdf
* ISAP_update_isap.pdf
* fissea-conference-2012_risler.pdf
* 140sp3496.pdf
* PKICON20b.doc
* Mersenne_756839.zip
* NIST.IR.7867.pdf
* fissea_2014_mwilson.pdf
* FIPS-201-overview.pdf
* sfarrand_fissea2010-awareness-out-of-box.pdf
* 140sp1066.pdf
* final-rqse.pdf
* 140sp1840.pdf
* 140sp3738.pdf
* AugustConsolidated.pdf
* 140sp164.pdf
* day1-a1_lgallagher_mobile.pdf
* GAJ_paper.pdf
* day2_research_330-420.pdf
* Final Agenda.ISPAB Meeting August 2019.pdf
* Apply-SP-800-53-ICS-final-22Aug06.pdf
* key-wrapping-KW-KWP.pdf
* 140sp2759.pdf
* PIVMiddlewareCertificate16.pdf
* DANCER_Trend Micro - Utilising and enhancing the strengths of IBE.pdf
* comments-received-fips186-4-december-2015.pdf
* KS_ECC_All.pdf
* 140sp69.pdf
* Wednesday-KAMartinez-Privacy.pdf
* 140sp820.pdf
* 90-rpt.txt
* 140crt568.pdf
* tg006.txt
* CRYSTALS-DILITHIUM-official-comment.pdf
* Chenok and Evans NAPA Report - A Call To Action 3.10.22.1045am.pdf
* PIVCardApplicationCertificate21.pdf
* 140sp107.pdf
* 140sp1505.pdf
* minutes9-99.pdf
* 140sp3030.pdf
* USDA-2.pdf
* NIST.SP.1800-2.pdf
* sp800-171a-draft-20180220.pdf
* 140crt371.pdf
* iwct2015-oracle-free.pdf
* 140sp475.pdf
* letter_sec.PDF
* session8-standaert-anaylzing-the-leakage-resistance.pdf
* itlbul2015_07.pdf
* Masked-Circuits-Feedback-2021a-Compilation-v20220127.pdf
* digimarc.pdf
* NIST RMF Prepare Step-FAQs.pdf
* NIST.SP.800-175Br1-draft.pdf
* 140sp1208.pdf
* 140sp506.pdf
* abdulgadir-lightweight-implementation-gmu-pqc2021.pdf
* Prime Controls.pdf
* itlbul2014-06.pdf
* FIPS140ConsolidatedCertJan2018.pdf
* nistir_7904_second_draft.pdf
* 140sp194.pdf
* 140sp2887.pdf
* key-wrapping-KW-KWP.pdf
* BenWuFISMAtestimony-FINAL.pdf
* 20170705-BFA2017--MC6bit--MSonmezTuran.pdf
* 140crt852.pdf
* csf-focal-details.csv
* oct23_choong_password.pdf
* TRIAD-spec.pdf
* 140crt1047.pdf
* 140sp47.pdf
* final-report_cyber-risk-portal_umd.pdf
* JdeFerrari-Privacy-ISPAB_June2007.pdf
* 2009fissea_motivational-item-winner.pdf
* 140sp2758.pdf
* 140sp4044.pdf
* pp-attCert-final.pdf
* 140crt396.pdf
* 140sp2547.pdf
* 251.pdf
* 140crt381.pdf
* 140sp1437.pdf
* scap-schematron-rules-1.3.5.zip
* june-2014_ispab-meeting-minutes.pdf
* slide-attack-on-clx-128-lwc2019.pdf
* 140sp3184.pdf
* ispab_june2013_menna_ecs_fact_sheet.pdf
* 140crt769.pdf
* oct23_schaffer_describing-authentication.pdf
* RobZ_NIST_May1.pdf
* call-for-proposals-draft-aug-2016.pdf
* 140sp1260.pdf
* SIMfill-1.2.1-distrib.zip
* 140sp219.pdf
* ispab_feb2013_fedramp_dmcclure.pdf
* 140sp1258.pdf
* nistir-8105-public-comments-mar2016.pdf
* FOIA-COV-Files-3.zip
* sp800_162.epub
* 140sp3435.pdf
* USRP_NIST_Fujitsu_091615.pdf
* 140sp3858.pdf
* white-paper.pdf
* 140sp2078.pdf
* nacha-2.pdf
* 140crt393.pdf
* commerce.txt
* PipelineModeWOCounter.zip
* 140sp2682.pdf
* pivmiddlewarecertificate6.pdf
* 140sp1317.pdf
* FCSM Feb 2019 - Agenda^FINAL.pdf
* Comments-Draft-SP-800-171B-SAIC-2August2019.pdf
* CSF update FCSM-May2018 - Jeff Marron.pdf
* 140sp177.pdf
* 140crt739.pdf
* 140crt1110.pdf
* SIV-TEM-PHOTON-Spec.pdf
* S07_CMVP_Wireless-re.pdf
* Day 1 - 1115am Tabassi.pdf
* Big-Quake-April2018.pdf
* 140sp2926.pdf
* NISTIR-7788.pdf
* 140sp2006.pdf
* NASA-Continous-Monitoring-Program.pdf
* BOOLE.zip
* Folmsbee.pdf
* nistir-8183a-draft-comment-template.xlsx
* draft-sp800-60V2.pdf
* US-Nuclear-Regulatory-Commission.pdf
* sts-2.1.2.zip
* Using-NICE-Cybersecurity-Workforce-Framework.pdf
* session-8-fiedler-buffing-signature.pdf
* 140crt1472.pdf
* mouli_sp800-156_new_status_update_fips201-2_2015.pdf
* 140sp1676.pdf
* 140sp1132.pdf
* NTRU-Prime-Round2.zip
* nistir7981_draft_comment_template.xls
* directions_to_nist_main_campus_fissea.pdf
* ispab-october2009-minutes_final.pdf
* FCSM CEU Form Mtg AND Agenda - Sept 2018-FINAL (3).pdf
* 140sp1461.pdf
* 140sp3447.pdf
* physecpaper13.pdf
* Tompkin-OVDKinegramChip-NIST-lv.pdf
* FISMA-ICS-Knoxville-invitation_agenda.pdf
* 140sp1165.pdf
* 140sp3250.pdf
* 140sp1645.pdf
* 140sp1968.pdf
* 140sp852.pdf
* p29.pdf
* 140crt574.pdf
* Saturnin-Statements.pdf
* filelist.xml
* sBMOC_Workshop_052407.pdf
* mwilson_fissea2010-sp800-16-rev1.pdf
* sp800-106-initial-public-comments-2022.pdf
* qsg_select_tips-and-techniques-for-systems.pdf
* SP800-82-final.pdf
* feb1_nist_updates.pdf
* AcceptedPapersListing_SHA3_2012.pdf
* Schwartz_HSPD12.pdf
* UlfMattsson-Practical- IPS-Enterprise-Databases.pdf
* March15_FISSEA-nice-Track3_MHiggins.pdf
* CRYSTALS_Kyber.zip
* Probaris.pdf
* 140crt279.pdf
* 140sp3770.pdf
* sp800-53r5-fpd-controls.xlsx
* 140sp27.pdf
* FIPS698_Word95.doc
* 140sp1001.pdf
* nistspecialpublication800-107.pdf
* 002-intro.pdf
* sp800-57-pt1-draft-apr2005-comments.pdf
* R_Ross-March2003-FIPS199InitialPublicDraft.pdf
* 140crt385.pdf
* sp800_162.epub
* talk-keymgmt00.ppt
* fips1861.pdf
* 140sp2099.pdf
* twg-99-02.pdf
* ISPABMetrics.pdf
* 2dem-summary.pdf
* 140sp2986.pdf
* cschmidt_fissea2010-doc-it-security-workforce.pdf
* test3_20.csv
* fissea-conference-2012_udy.pdf
* CryptographyResearchandEvaluationCommittees.pdf
* 20200417-nist-pec-comments-on-zkpcomref-0.2-ts.pdf
* March2003-ITL-Briefing.pdf
* Cybercash-cl.txt
* ISAP-Statements.pdf
* sp800-70r4-draft.pdf
* 20220629-crypto-club-FX-abstract.pdf
* 140sp972.pdf
* march2003-itl-briefing.pdf
* 140sp2219.pdf
* SHAvite-3_Round2.zip
* 140crt790.pdf
* HMAC_SHA3-512.pdf
* 2-5-hie-kelly-harvardpilgrim.pdf
* sp800-217-ipd-comment-template.xlsx
* 140crt797.pdf
* B283_SHA512_256.pdf
* klingenstein.pdf
* test3_50.csv
* 140crt80.pdf
* Java-API-old.pdf
* CaputoD_Bio.pdf
* 140sp1025.pdf
* 140sp2967.pdf
* 140sp1661.pdf
* README-for-CSV-sp800-53ar5-assessment-procedures.txt
* fissea-conference-2012_kelson-and-hanscomb.pdf
* 140sp2029.pdf
* nistir7791.pdf
* itlbul2011-04.pdf
* practical-forgery-limdolen-hern-forgery-lwc2019.pdf
* 140crt312.pdf
* cyberstrategy-draft.pdf
* nist_scapnvd.pdf
* conference-agenda-051509.pdf
* SHAvite3Update.zip
* anteon.pdf
* sp800-53r4-to-r5-comparison-workbook.xlsx
* ISPAB_CDC-Social-Media_JNall.pdf
* quartet-statements.pdf
* ecdsa2vs.pdf
* 140sp3440.pdf
* 140sp1546.pdf
* Sept2002-Security-Privacy-at-IRS.pdf
* ARIRANG.zip
* Federal_Cybersecurity_and_Privacy_Forum_15Feb2022_What_Is_New_SP800-53ARevision5.pdf
* 140sp2831.pdf
* 140sp1721.pdf
* bio_ggarcia_ispab_2015v2.pdf
* o25.pdf
* OKCN_AKCN_CNKE.zip
* wagner.pdf
* 237.pdf
* p10.pdf
* Black-RMAC-cmt2.pdf
* B571_SHA3-512.pdf
* 266-269.pdf
* 140sp3910.pdf
* lotus-locus-spec-round2.pdf
* nistspecialpublication800-9.pdf
* sp800-193-draft-comment-template.xlsx
* ePACS Overlay_v1_SP800-53rev5-April2021.pdf
* SecondHashWshop_2006_Report.pdf
* 140sp2027.pdf
* nistir7657.pdf
* minutes-06-2002.pdf
* Agents_PAAM98.pdf
* GAO-Information-Security-Issues-Update.pdf
* day2_mar24_fips-140-quo-vadis_nist-csd.pdf
* 140crt33.pdf
* 140sp2186.pdf
* bernstein-session-4-paper-pqc2019.pdf
* 140sp772.pdf
* Dec2004-FIPS-201-Update-Briefing.pdf
* NIST.IR.7622.pdf
* health_it_briefing.pdf
* 140sp3187.pdf
* TDES_CFB.pdf
* 140sp808.pdf
* aeshash.pdf
* 140sp3719.pdf
* OMB-Update_ISPAB-Dec2008_M-Howell.pdf
* 140sp907.pdf
* 140crt91.pdf
* johnson.pdf
* day1_research_200-250pt4.pdf
* nistir_7511r4_draft.pdf
* tues400_sp800-171_dempsey.pdf
* summary-comments_nistir-7977_feb14_first-draft.pdf
* SHAKE256_Msg0.pdf
* 140crt1179.pdf
* 140crt1332.pdf
* nist-ics4_10-23-2009.pdf
* CMVP2707.pdf
* federal-metrics.pdf
* sp800_82_r2_draft.pdf
* 140crt145.pdf
* session-2-kutas-torsion-point-attacks.pdf
* 140sp2501.pdf
* misuse-free-key-recovery-and-distinguishing-attacks-on-7-round-ascon.pdf
* hyena.zip
* nistir8151_draft.pdf
* 917slide.pdf
* CMVP2602.pdf
* 140sp2926.pdf
* nistspecialpublication800-145.pdf
* 20200923-PEC-ICMC-slides.pdf
* 140sp2079.pdf
* 140crt294.pdf
* selected-infrastructures.pdf
* quick-start-guide--ransomware.spa.pdf
* manual_MSDE_install2.pdf
* 140crt1455.pdf
* 907slide.pdf
* 140crt916.pdf
* SABER-Round3.zip
* FISMA-Metrics-20061128_ISPAB.pdf
* tinyjambu-tweak-final.pdf
* 140sp1938.pdf
* 140sp3982.pdf
* 202ro.pdf
* FIPS140ConsolidatedCertList0034.pdf
* nistspecialpublication800-41r1.pdf
* fips1402.pdf
* 2-5-start-with-security-han.pdf
* cmvp-handout.pdf
* oct22_mobiledevice_tlange.pdf
* 990414-jdaemen.pdf
* 140sp559.pdf
* 140crt493.pdf
* 140sp424.pdf
* MCS-PWG 2022-0013_mtg9-minutes_2022May02.pdf
* 140sp919.pdf
* 234-236.pdf
* 20000531-bsummers.pdf
* 140sp1609.pdf
* 140sp1257.pdf
* nbsspecialpublication404.pdf
* 140crt1287.pdf
* Towns-FISSEA-030904.ppt
* November FCSM Introduction.pdf
* Draft-SP800-117-r1.pdf
* mhiggins_fissea2010-panel-workforce-initiatives.pdf
* 140crt322.pdf
* nsahardware-aes.pdf
* ispab_june-10_nice_rpetersen.pdf
* SHAKE256_Msg1630.pdf
* 140sp192.pdf
* 25.pdf
* 140sp2292.pdf
* presentation-7_berthier-fawaz-sanders-pal.pdf
* WG5-1097.doc
* 140sp1280.pdf
* rc6-statement.pdf
* 140sp1424.pdf
* 140sp2588.pdf
* 800-17.pdf
* 140sp810.pdf
* 140sp1354.pdf
* tg002.txt
* 140sp1187.pdf
* HamsiUpdate.zip
* 140crt637.pdf
* test4_18.csv
* 140sp3414.pdf
* 3_ISPAB-FISMA-briefing-IG-Panel-BBaker.pdf
* ip-statement-2d3-reference-optimized-implementation-owners.docx
* 140sp1338.pdf
* 140sp1234.pdf
* 2010-winner_awareness-newsletter-and-entry-form.pdf
* 140crt660.pdf
* SHAVS.pdf
* session10-chakraborti-security-analysis-hyena.pdf
* 140sp2269.pdf
* PIVCardApplicationCertificate13.pdf
* SKOP15-4x4-GF16.mat.txt
* FCSM CEU Form Mtg AND Agenda - November 2018-FINAL.pdf
* HISTORICAL_Component_Legend_80056A_5712_ECCCDH_Prim.pdf
* SP800-22rev1a.pdf
* June2005-RFID-Handout.pdf
* 140sp315.pdf
* 140crt985.pdf
* 140sp2627.pdf
* IT-study-overview.ppt
* 140crt1329.pdf
* nistir7399.pdf
* 140crt57.pdf
* 140crt407.pdf
* liu-kuhn-rossman-v11-n3.pdf
* Soura_TunableParameters.pdf
* 140sp224.pdf
* 140sp2076.pdf
* 140sp1139.pdf
* March17_FISSEA-CyberWatch-DPruitt-Mentle.pdf
* NIST.SP.800-156.pdf
* Katrina-Dec06.pdf
* ISPAB-Minutes-March2005.pdf
* NIST.SP.800-160v2r1.pdf
* Sept2004-Fed-Enterprise-Architecture-Security.pdf
* jhwang4_ssiri09_final.pdf
* 1999_agenda-csspab-march-meeting.pdf
* CLX-spec.pdf
* jbardin_fissea2010-using-risk-based-approach-alighn-security.pdf
* 140sp2322.pdf
* sp800-160v1-appendixd-supplement.xlsx
* 140sp2651.pdf
* wed330_csip-metrics_cfaith.pdf
* 140sp3533.pdf
* CRYSTALS-Dilithium-April2018.pdf
* ACP133.zip
* 140crt49.pdf
* Jan7-overview.txt
* NIST.IR.8355-draft.pdf
* HMAC_SHA512.pdf
* Doung-Van-abstract.pdf
* change_log-1.3.0.0.txt
* 140sp1868.pdf
* FISSEA2006-Wilson_Tues3pm.pdf
* 140sp1001.pdf
* 140sp1447.pdf
* contacts.pdf
* 140sp2524.pdf
* 140crt305.pdf
* ISPAB Final3 Agenda - Sept2021.pdf
* test4_6.csv
* 140sp1549.pdf
* NISTIR_8259B_Focal_Document_Template.xlsx
* S12_NIST-IETFpart2--ba.pdf
* loki97-slides.pdf
* ispab-news_fed100-award_2013-winner_kfu.pdf
* 140sp2084.pdf
* Social-Security-Administration.pdf
* sbc_workshop_presentation_2015_ver1.pdf
* TAF-SFT_Flow_Diagram.pdf
* 140sp1469.pdf
* NIST_HSR_Toolkit_Installation_Guide.pdf
* SmartCard-federalreg.pdf
* Argonne-National-Laboratory2.pdf
* NIST.SP.800-133r1-draft.pdf
* United-States-Government-Printing-Office.pdf
* 140sp2164.pdf
* 140sp2197.pdf
* nistspecialpublication800-85.pdf
* 140crt443.pdf
* NIST.SP.500-320.pdf
* FCSM-CAB-Operational-Assurance-ISCM.pdf
* 140crt857.pdf
* FISSEA_2016_Final_Agenda.pdf
* 01_Dynamic_SHA.pdf
* security-day.ppt
* VAN_A_RadioGatun-presentation_Aug11.pdf
* feb1_der_cred_ferraiolo_h_fips_201-2.pdf
* nistir_8136_draft.pdf
* 140sp3006.pdf
* Roback_Dec_2003.pdf
* MAOSCO-Limited.pdf
* 1_ISPAB-FISMA-briefing-IG-Panel-APatchan.pdf
* 140sp3532.pdf
* feb1_nist-800-63-1_overview_enewton.pdf
* 140sp3098.pdf
* 140sp1078.pdf
* KINDI-April2018-not-presented.pdf
* SP800-116.pdf
* itlbul2018-10.pdf
* 140crt1413.pdf
* session-1-calik-benchmarking-second-round-cadidates.pdf
* Feudo-FISSEA-031104.ppt
* sp800-140cr1-draft-comment-template.docx
* SHA3_Aug2010_Papers.zip
* DME.zip
* 140sp104.pdf
* FISSEA2017MedinaPresentationCybersecurityDecisionsHabitsandHygiene_v1.pdf
* 140crt172.pdf
* 140sp4226.pdf
* 140sp1805.pdf
* 140crt589.pdf
* NIST_NSA_MOU-1989.pdf
* 140sp1791.pdf
* 140sp3803.pdf
* qsg_categorization-roles-and-responsibilities.pdf
* fast-skinny-128-simd-implementations-for-sequential-modes-operation.pdf
* jpollard.zip
* pkipap1.doc
* 140sp3746.pdf
* minutes3-2000.pdf
* 140sp3142.pdf
* Resol2.wpd
* 140sp2991.pdf
* SteptoeJohnsonLLP-cl.txt
* 140crt425.pdf
* 140sp3000.pdf
* guidance.txt
* 140sp1781.pdf
* 140sp170.pdf
* 140sp2885.pdf
* 140sp3290.pdf
* o03.pdf
* oribatida-spec-round2.pdf
* USRP_NIST_SEL_081415.pdf
* 140sp2116.pdf
* 140sp1199.pdf
* 03-2004.pdf
* 2009-FISSEA-Conference-Call-for-Participation.pdf
* privacypol.pdf
* 140sp71.pdf
* PKITS.pdf
* itlbul2016_07.pdf
* ffx-spec.pdf
* cslbul1991-04.pdf
* 140sp1693.pdf
* Apply-SP-800-53-ICS-final-22Aug06.pdf
* 06_Bhasin.pdf
* Ferguson-Wed200.ppt
* paperF5.pdf
* dualec_in_X982_and_sp800-90.pdf
* 140sp531.pdf
* sp800_146.epub
* ECHO.zip
* incits-riis.pdf
* RISTEN_hashwork06f.pdf
* 046.pdf
* 140crt890.pdf
* 140sp3210.pdf
* sp800-140a-draft.pdf
* b-July-2007.pdf
* jdoody.zip
* physecpaper08.pdf
* 140crt989.pdf
* 140crt1014.pdf
* NIST.SP.800-40r4.pdf
* 1_secure-engineering_rross.pdf
* ECHO_Round2.zip
* B233_SHA3-224.pdf
* 140sp1887.pdf
* 140sp3663.pdf
* NIST.SP.800-70r4.pdf
* 140sp1196.pdf
* 2008FISSEA_Agenda-Final.pdf
* 2005-FISSEA-Conf-BusMtg.ppt
* 140sp1614.pdf
* bio_jcentafont_ispab.pdf
* 140sp2105.pdf
* Kekicheff-Global-Platform-NIST2003.pdf
* nistir7085.pdf
* day3_info-sharing_930-1020.pdf
* 140crt909.pdf
* optikey.pdf
* 140crt650.pdf
* 140sp3019.pdf
* 140sp373.pdf
* FISSEA-2020-summer-series-june-22-webinar-presentation.pdf
* FISSEA2006-ACrawley_panel-Mon1pm.pdf
* friedberg.pdf
* cslbul1995-02.txt
* March17_FISSEA-workforce-education-SA-RGandi.pdf
* 140crt669.pdf
* 149-151.pdf
* dsa2vs.pdf
* 140sp748.pdf
* 140sp3984.pdf
* tg005.txt
* George.ppt
* 140crt517.pdf
* 140sp908.pdf
* 140crt334.pdf
* 140sp1642.pdf
* itlbul2013_08.pdf
* Resources for an Innovative Awareness Program_Tiffany Schoenike.pdf
* 02-12-Roback.pdf
* paperG3.pdf
* profiles-lwc-I-II-june2017-public-comments.pdf
* Jones-WhatNext.pdf
* fissea_best_practice_session_march_21_2013.pdf
* paperF10.pdf
* 140sp2341.pdf
* rinker_day1_215_hipaa_privacy_security_breach_audits.pdf
* GAO-Information-Security-Issues-Update.pdf
* 140sp3458.pdf
* 140sp2910.pdf
* CWC-GCM-comments-06-02-2005.pdf
* FIPS140ConsolidatedCertList0037.pdf
* 140sp2081.pdf
* 140sp3416.pdf
* 140sp4246.pdf
* 140sp3771.pdf
* 140sp2285.pdf
* test4_60.csv
* sp800-125A-r1-draft-markup.pdf
* nistir7358.pdf
* NIST Control Overlay Repository Submission Form.docx
* MesaCommCol-FISSEApanel-031104.ppt
* Wednesday-Building-Security-Awareness-Program_SBalderson.pdf
* 140crt1202.pdf
* EntropySources.pdf
* johansson.pdf
* 140sp2210.pdf
* 800-12_4.ps
* 140sp4048.pdf
* B2B-article.pdf
* 140sp1219.pdf
* PIVCardApplicationCertificate23.pdf
* 1982-5th-seminar-proceedings.pdf
* test3_28.csv
* 20141015_cea.pdf
* wed11_mclaughlin-jones.pdf
* day3_research_1035-1125.pdf
* 140sp1581.pdf
* sp800_188_draft2_comment-template-form.docx
* NIST Director Response - Privacy Program Rec.pdf
* fipspub73.pdf
* 140sp3011.pdf
* Abstract-Kabay.pdf
* NIST.IR.8278A.pdf
* safeguarding_health_information_title_slide.pdf
* 140sp3172.pdf
* fips140consolidatedcertlist0017.pdf
* IIIP1-7-00.txt
* NISTIR_8259A_Focal_Document_Template.xlsx
* 140sp1801.pdf
* 140crt1181.pdf
* 140crt60.pdf
* 140sp2872.pdf
* 140crt251.pdf
* nistir7806.pdf
* sp800_90a_r1_comments-received_2nd-draft.pdf
* 140sp1035.pdf
* NIST.IR.8214B.ipd.pdf
* 140sp1557.pdf
* 140crt1404.pdf
* may30_road-confidence-samate_pblack.pdf
* 140sp3718.pdf
* nistir_8071_draft.pdf
* oribatida.zip
* 140sp2271.pdf
* 140crt1365.pdf
* FIPS-200-final-march.pdf
* FISSEA_2016_ATE_contest_winners_all.pdf
* fissea_2014_conference_program_march_12_2014.pdf
* NIST.SP.1800-13.pdf
* 140crt1403.pdf
* SCAP1_2ValidationTestContent_1-2_1_0_0.zip
* 140sp1920.pdf
* twg-02-04.xls
* Sept2002-Security-Privacy-at-IRS.pdf
* 140sp2023.pdf
* fissea_2014_peers_choice_website_fda_conway_fitzgerald_van_brackle.pdf
* sp800-157r1-ipd-comment-template.xlsx
* 140crt1421.pdf
* ispab_feb2012_eo_improving-critical-infrastructure-cybersecurity_handout2.pdf
* Lilliput-AE-Statements.pdf
* 140sp1591.pdf
* CIMC_PP_20011031.pdf
* S12_NIST-IETFpart2--ba.pdf
* 140sp583.pdf
* nist-ics3_10-23-2009.pdf
* 140crt1313.pdf
* 140sp3003.pdf
* 140sp1864.pdf
* Mobile-Threat-Catalogue-draft.xlsx
* CA-presentation-swanson.ppt
* 140sp3324.pdf
* joint-conference_12-04-2013.pdf
* Day 2 - NIST Privacy Engineering Collaboration Space - Boeckl.pdf
* ISPAB December 2021 Minutes .pdf
* fcsmMeeting021318 - Justin Sensensey.pdf
* draft-nist-fips-201-2-revised_track-changes.pdf
* 140crt1247.pdf
* 140sp1173.pdf
* o11.pdf
* MCS-PWG_mtg2_2022.02.14_minutes.pdf
* cavpfaq.pdf
* sp800-34-rev1_bia_template.docx
* 140sp779.pdf
* kuhn-lei-kacker-random-combinatorial.pdf
* National-Virtual-Lab-for-Cybersecurity-Education.pdf
* 140sp1324.pdf
* OMB-M-07-16-Data-Extract-FAQ.pdf
* 140crt862.pdf
* FOIA-COV-Files-2.zip
* 140sp3623.pdf
* panelE1.pdf
* Usability_and_Insider_threat.pdf
* 140crt1235.pdf
* ispab_june2013_badger.pdf
* 140sp1320.pdf
* NIST.IR.8183A-2-draft.pdf
* fissea-conference-2012_maxson_nics-portal.pdf
* Interagency-Advisory-Board.pdf
* 140sp2807.pdf
* BIKE-Statements-Round3.pdf
* B571_SHA512.pdf
* barkley-et-al-97.pdf
* CMVP2608.pdf
* Details39PIVApp.pdf
* USRP_NIST_GRE_090315.pdf
* ITSL-FISSEA-2003v2.pdf
* sp800-53r5-draft-baselines-markup.pdf
* 140sp3700.pdf
* 140crt612.pdf
* SP-800-89_November2006.pdf
* johnson_lifecyclesresiliency.pdf
* NIST.SP.800-216-draft.pdf
* 20141015_mitre.pdf
* FISSEA2017_Witkowski_Benczik_Jarrin_Walker_Materials_Final.pdf
* 140sp3857.pdf
* PIV-BasicCard-06262007.zip
* 140crt123.pdf
* paperG5.pdf
* nistspecialpublication800-106.pdf
* 140sp1891.pdf
* August 2019 ISPAB Meeting FINAL Minutes.pdf
* notice980417.txt
* 140sp223.pdf
* 140crt21.pdf
* CMVP2709.pdf
* NIST.IR.8202.pdf
* 140sp2856.pdf
* RSADPtestvectors.zip
* NIST.SP.800-56Br2.pdf
* wed945_a-130_cbales.pdf
* 140sp401.pdf
* MAOSCO-Limited.pdf
* FISSEA-Contest-Entry-Video-Rita-John-IFDS.pdf
* FIPS140ConsolidatedCertList0009.pdf
* 140sp1009.pdf
* 140sp1865.pdf
* folmsbee.pdf
* itlbul2009-07.pdf
* 140crt453.pdf
* 140sp2920.pdf
* ww-ransomware.pdf
* std002.txt
* 140sp3944.pdf
* USRP_NIST_Northup_081615.pdf
* 140sp2997.pdf
* nist.ir.8074v1.pdf
* 140sp3360.pdf
* 140sp233.pdf
* US-agency-for-international-development.pdf
* 140sp916.pdf
* 1992-15th-NCSC-proceedings-vol-2.pdf
* 140crt1472.pdf
* fips1401.pdf
* ascon.zip
* August 2020_010920_0658.pdf
* p26.pdf
* NIST.IR.7823.pdf
* saturnin_update.pdf
* 140sp3816.pdf
* 2021-23326 - FRN December ISPAB Meeting.pdf
* test4_16.csv
* p13.pdf
* USGCB-rhel5desktop-1.2.5.0.zip
* agenda980602.txt
* 140sp158.pdf
* FCSMAdHoc_IoTDeviceCybersecurityGuidanceforFedAgencies_v2.pdf
* 140sp2787.pdf
* ispab_july09-sager_vulnerability-analysis-operation.pdf
* 140crt1449.pdf
* 20190411-zkproof-talk--PEC-at-NIST.pdf
* 140sp547.pdf
* 140sp2793.pdf
* kuhn-coyne-weil-10.pdf
* nistspecialpublication500-171.pdf
* liaisons.txt
* xccdf-1.0-schema-bundle.zip
* 140sp3277.pdf
* PIVCardApplicationCertificate16.pdf
* 140sp2867.pdf
* 140sp2248.pdf
* remaining_modes.pdf
* 140sp1034.pdf
* NIST.IR.8183r1.pdf
* abc-spec.pdf
* ace-spec-round2.pdf
* 140sp2053.pdf
* 140sp705.pdf
* 140crt552.pdf
* october-2012_fcsm-jjarzombek.pdf
* SAEAES-Statements.pdf
* NIST.IR.8287.pdf
* test3_21.csv
* Communications-Security-Establishment.pdf
* Lake-and-Locker-April2018.pdf
* AprilF2FPresentations.zip
* 140sp459.pdf
* CEU Form 09.01.2022 draft.pdf
* BlueMidnightWish-Presentation-Final.pdf
* ppcounterMeas.pdf
* scmmicrosystem.pdf
* public-comment.txt
* pmac-spec.pdf
* key-management-guideline-workshop.pdf
* agenda09-99.doc
* performance-evaluation-cryptographic-permutations-lwc2020.pdf
* fissea-2015-toner.pdf
* SkeinUpdate.zip
* PIV-Diffie.pdf
* 140crt134.pdf
* Forum-121410-Continuous-Monitoring-AJohnson.pdf
* pkits_test_list_generator.tgz
* boldfield_fissea2010-panel-workforce-initiatives.pdf
* 140crt228.pdf
* SONATYPE-05-06-2020.pdf
* 140sp1408.pdf
* smartgrid_small.pdf
* fisseaProgram.pdf
* 140sp2518.pdf
* 140sp2673.pdf
* DRBG_ANSI_X9-62-1998.pdf
* update-on-ascon-lwc2020.pdf
* 140sp1015.pdf
* 140sp3739.pdf
* 140crt496.pdf
* j63nec.pdf
* nistspecialpublication800-47.pdf
* SHERMAN_ScantegrityMock_NEW.pdf
* FISSEA _Fishman-Attack_Surface_Reduction-Tues400.pdf
* 140crt834.pdf
* stig-mapping-to-nist-800-53.xlsx
* 140sp2897.pdf
* ISPAB_Sept2005-discussion-points.pdf
* 140sp1876.pdf
* 140sp1581.pdf
* KLSW17-M-4x4-GF16.mat.txt
* 140sp2385.pdf
* K571_SHA3-512.pdf
* PIV-Butler.pdf
* NIST.IR.7863.pdf
* 140sp1629.pdf
* fips201-3_biometrics (3).pdf
* 140sp1883.pdf
* cslbul1995-08.txt
* 140sp437.pdf
* itlbul2015_10.pdf
* itlbul2004-06.pdf
* aes3cfp.pdf
* EMBLEM-R-EMBLEM-April2018.pdf
* 140sp2051.pdf
* 03-06-Bouma.pdf
* track2_track3_v3.pdf
* nistir7981_draft.pdf
* 19990812-lknudsen.pdf
* nistir-7046.pdf
* SP800-22rev1a.pdf
* 140sp1135.pdf
* 2012-fissea-contest-winner_poster.pdf
* test3_24.csv
* ecb_d_m.txt
* bio_jcentafont_ispab.pdf
* Security Fatigue Stanton Feb2019.pdf
* 140sp1970.pdf
* NIST.SP.800-82r3.ipd.pdf
* 140sp3999.pdf
* 800-53A-R1_Assessment-Cases_AU-Family_ipd.zip
* 140sp2445.pdf
* ispab-csd-letter-final_oct2009.pdf
* Security-Web-rivera.ppt
* KINDI.zip
* 140sp2350.pdf
* 140sp199.pdf
* 140crt1129.pdf
* 140crt1423.pdf
* 140sp1331.pdf
* Identity_Proofing_MacGregor.pdf
* FISMA-project-presentation-08-16-2007.pdf
* 140sp1701.pdf
* FISSEA Peers Choice Poster Winner.pdf
* nistspecialpublication800-83.pdf
* nistir7564.pdf
* nistspecialpublication800-21e2.pdf
* sesson-6-primas-schlaffer-new-ascon-implementations.pdf
* 140sp2183.pdf
* pmac-spec.pdf
* 140sp3476.pdf
* Sept2004-NIST-Guide-Computer-Crimes-Briefing.pdf
* sts-2_1_2.zip
* SDLC_Brochure_aug04.pdf
* paperG4.pdf
* NIST.SP.800-204C-draft.pdf
* 140sp1665.pdf
* CommonDataFormat_110101.pdf
* 140crt1209.pdf
* 140sp3736.pdf
* ande72.pdf
* 140sp1706.pdf
* 140sp1680.pdf
* 140sp1190.pdf
* sp800-146.pdf
* 140sp2954.pdf
* presentation-mon-rowe.pdf
* forum_august2014_wilshusen.pdf
* BRM_ID Proofing_v2.pdf
* FISSEA-Contest-Entry-Form-2017_Training Education Scenario_IHS.pdf
* Oribatida-round2-official-comment.pdf
* pyjamask.zip
* nistspecialpublication800-72.pdf
* Ferguson_Bio.pdf
* 140crt1007.pdf
* itlbul2012-01.pdf
* session-3-gaj-high-speed-hardware.pdf
* day1-4_mmcmillan-and-vcampitelli_cloud.pdf
* Comments-Draft-SP-800-171B-Teledyne_Technologies_Inc-16July2019.pdf
* NISTIR-7696-CPE-Matching.pdf
* dsa2vs.pdf
* Keynote_Security Training & Awareness in a Multigenerational Workforce_Shayla Treadwell.pdf
* 140sp1244.pdf
* 140sp1595.pdf
* NIST.SP.800-137A-draft.pdf
* forum_april2014_nists_role_in_ongoing_assessments_v1_0.pdf
* 140sp2819.pdf
* 140sp2869.pdf
* ikev1.zip
* minutes9-98.txt
* myer80.pdf
* 140sp3801.pdf
* 140sp683.pdf
* 140crt974.pdf
* saturnin-changelog.pdf
* spoc-changelog.pdf
* 140crt1211.pdf
* 140crt226.pdf
* update-draft-800-53r5-v2.pdf
* Monday1500Ets.pdf
* xccdf-1.1.4-schema-bundle-20071011.zip
* metrics_report.pdf
* 140crt1196.pdf
* Kaliski - KBA Security Mechanims.pdf
* USDA.pdf
* sp800-175a-draft-comments-received.pdf
* fissea-conference-2012_grunberg.pdf
* 140sp1608.pdf
* day2-6_kscarfone-rmetzer_security-testing-assessment.pdf
* FISSEA_Awards_Carney_Social_Engineering.pdf
* 140sp2766.pdf
* Cyber-Security-Workforce_OPM-NICE_MHiggins.pdf
* 140sp3217.pdf
* 303slide.pdf
* 140sp367.pdf
* ISCMAx-Alternate-Judgements.zip
* forum-august2015-maples-cauwels.pdf
* 140sp1761.pdf
* 1.6 - Main - JWalker-Automate Transition to NIST.SP.500-53rev5 w OSCAL.pdf
* itlbul2007-12.pdf
* nistir7981_draft.pdf
* fissea_2014_educator_of_the_year_sam_maroon_nomination_letters.pdf
* nistir_8103_draft.pdf
* NIST.SP.800-53r4.pdf
* may30_fisma_rross.pdf
* 140sp34.pdf
* 140sp3639.pdf
* RD-ATTWTC_ISPAB0307.pdf
* 140sp2169.pdf
* 140sp1198.pdf
* QSG_categorize_management-perspective.pdf
* usgcb-winvista-firewall-gpos.zip
* 140sp3425.pdf
* 140crt830.pdf
* mt_slides_pg3.pdf
* sp800-90B-changes-2nd-draft-to-final-summary.pdf
* PIVCardApplicationCertificate17.pdf
* NIST.SP.800-208-draft.pdf
* ispab-ltr_to_nist-director-willie-may_doc-risk-mgmt_07-2015.pdf
* Randy_Easter-ISO_(4).pdf
* 140crt291.pdf
* FIPS_140-3_sections_submitted_for_comments.pdf
* nist.ir.8406.ipd.pdf
* ispab_meeting_minutes_june-2016.pdf
* sp800-53b-control-baselines.xlsx
* min0193.doc
* 20191106-NIST-ITL-Science-Day-poster-THRESHOLD--ts-20191125.pdf
* 140crt800.pdf
* 140sp1002.pdf
* itlbul2013-09.pdf
* Role-based Access Control2.pdf
* nistir7788.pdf
* SP800-177-Rev-1-to-SP800-53-Rev-4.xlsx
* 5-14-2019-source-code-for-distribution.zip
* 140sp742.pdf
* 140sp738.pdf
* 140crt40.pdf
* Jul13_Cloud-ISIMC-Cloud-Security-ISPAB.pdf
* 140sp3009.pdf
* on-sthe-security-of-comet-lwc2019.pdf
* 140sp3261.pdf
* Odd-Manhattan-Statements.pdf
* grain_128aead-spec.pdf
* Dektor-FISSEA-030904.ppt
* 140crt171.pdf
* ISPAB-minutes-August2010.pdf
* PGrother.ppt
* KLSW17-M-8x8-GF256.mat.txt
* HSPD-7-Attach-A2.pdf
* 140crt803.pdf
* NIST.CSWP.04212016.pdf
* Sept2008-ISPAB-GMarshall.pdf
* NSA-AESfinalreport.pdf
* SPIX-official-comment.pdf
* sp800_160_second-draft.pdf
* stiles.pdf
* fips140_2_chng2_20021203.epub
* ispab_jun2014_big-data-privacy_blumenthal.pdf
* June 2022_010722_0704_signed.pdf
* 90B Shall Statements.xlsx
* 140sp963.pdf
* CazesGB_Bio.pdf
* paperF3.pdf
* pqcrypto-april2018_moody.pdf
* United-States-General-Services-Administration.pdf
* 140sp777.pdf
* physecpaper06.pdf
* K-Britton-ISPAB-March2006.ZIP
* 140sp2458.pdf
* jun98.txt
* kuhn-ndia.pdf
* test4_20.csv
* presentation-10_yu.pdf
* NIST.CSWP.02042020-6.pdf
* 140crt1253.pdf
* fissea_2014_goldstein.pdf
* NIST.IR.8183A-3-draft.pdf
* 140sp2796.pdf
* KELSEY_new-attack-tools-primer.pdf
* NIST_WSBD_Beta_v0.2.7.zip
* 140crt1324.pdf
* itlbul2006-09.pdf
* Cybersecurity Education FTC Resources_Rosario Mendez.pdf
* katzke.pdf
* ISPAB Recommendations- Open Source Software and OSSF NIST March.2021 Final.pdf
* sp800_160_draft.pdf
* spix_update.pdf
* twg-02-08.pdf
* 140crt1186.pdf
* Jul13_NIST-updates.pdf
* fissea-2015-king-chun-white.pdf
* 140sp1325.pdf
* international-biometric-industry-association.pdf
* ispab3.pdf
* ISPAB-Dec06-minutes-final.pdf
* PIVCardApplicationCertificate31.pdf
* CMVP-handout.pdf
* NIST.SP.800-56Cr1.pdf
* IA_Program_at_West_Point_FISSEA.pdf
* 140sp2245.pdf
* Mar05-Santosh.pdf
* session-5-iwata-analyzing-provablesecurity-of-gift-cofb-and-photon-beetle.pdf
* 140sp2977.pdf
* 140crt745.pdf
* Reference Mat-final-a.pdf
* CSC-comments.doc
* nistspecialpublication800-3.pdf
* sp800-34-rev1_cp_template_moderate_impact_system.docx
* sp800_85b-4_draft_comment_template.xls
* 140sp3486.pdf
* 140crt676.pdf
* Grostl_Comments.pdf
* itlbul2017-03.pdf
* NIST.SP.800-140B.pdf
* october-2012_fcsm_pturner.pdf
* overview-summary-changes_sp800-85a-to-sp800-85a1.pdf
* bailey.ppt
* test4_24.csv
* Irvine-CyberCIEGE-paper.pdf
* 140sp1554.pdf
* 20th-nissc-proceedings-1997.zip
* nist.ir.7987r1.pdf
* certpath1_07.zip
* 140sp1854.pdf
* fissea2007_anatomy-forensics-failed-course_litchko-payne.pdf
* o21.pdf
* ROLLO-round2-official-comment.pdf
* agenda-final.pdf
* forum_august2014_wilshusen.pdf
* NIST RMF Authorize Step-FAQs.pdf
* FISSEA Contest Motivational Item 2020.pdf
* 140sp1246.pdf
* 140sp1018.pdf
* 140crt316.pdf
* SP_800-38B.pdf
* 313slide.pdf
* 06_Considerations_for_SHA3.pdf
* nbsspecialpublication500-19.pdf
* SP800-73-Errata-April12-2005.pdf
* 140sp38.pdf
* 140sp3487.pdf
* Tuesday-LitchkoPayne_presentation.pdf
* Grady_2003-03_CIP.pdf
* ispab_june2013_sedgewick.pdf
* 20000512-jdaemen.pdf
* K_Britton-March2006-ISPAB.pdf
* profiles-lwc-I-II-june2017-public-comments.pdf
* Jutla_Sha1-ime.pdf
* 140crt1393.pdf
* 02-12-Cahoon-pt2.pdf
* Federal_Cybersecurity_and_Privacy_Forum_1Sept2022_NIST_Welcome.pdf
* sp800_116_r1_draft.pdf
* 140crt1229.pdf
* v1-04_FAQ_102003.doc
* 2007_agenda-ispab-june-meeting.pdf
* Kuehl-FISSEA-031104.ppt
* fissea2010_website-winner-presentation_Jim-Henderson_ISSPM.pdf
* HashCompetition-June2008_BBurr-JKelsey.pdf
* 140sp671.pdf
* NIST.SP.800-140Br1.ipd.pdf
* ACM-comments.txt
* 140sp2827.pdf
* 140sp99.pdf
* comments-on-draft-nistir-8114.pdf
* sike-round3-official-comment.pdf
* 140sp2352.pdf
* 140sp3705.pdf
* fips201_2_2012_draft_comments_and_dispositions.pdf
* ferraiolo_plenary.pdf
* NCCoE ES Use Case - Identity and Access Management (Draft) 20130717.pdf
* cloud-security.pdf
* oct26-2011_cybersecurity-awareness_BNewhouse.pdf
* day2_HIPAA-conference2011-Insider-Threat.pdf
* cloud-computing-panel_ISPAB-Dec2008_R-Carey.pdf
* 140sp1816.pdf
* mixFeed-changelog.pdf
* nistir-7275r4_updated-march-2012_markup.pdf
* sp800-80-draft.pdf
* panelC3.pdf
* 140sp752.pdf
* 140crt692.pdf
* questions-about_draft-sp800-90b.pdf
* 140sp1496.pdf
* 140sp1533.pdf
* 140sp2202.pdf
* 140sp2388.pdf
* slides-pierson.pdf
* fips46-3.pdf
* 140sp1295.pdf
* 140sp56.pdf
* bike-misoczki.pdf
* S05_NIST-tk2.pdf
* 140sp3552.pdf
* 140sp252.pdf
* 140sp3577.pdf
* 140sp2244.pdf
* ispab-meeting-minutes-october-2016.pdf
* G_Bieber-March2006-ISPAB.pdf
* 140sp1599.pdf
* csf-v1-0-to-sp800-171rev2-mapping.xlsx
* 800-53-rev1-annex3-sz.pdf
* ISPAB-Minutes-Sept2004.pdf
* 140sp2803.pdf
* 140sp3266.pdf
* 140sp1299.pdf
* paperF8.pdf
* 140sp999.pdf
* REDISH_E2E panel_10_09.pdf
* 140sp3072.pdf
* ikev1.zip
* Seven-reasons-NOT.pdf
* 140crt840.pdf
* 140sp2180.pdf
* 1-Introduction and Welcome.pdf
* 021.pdf
* itlbul2009-06.pdf
* 005.pdf
* nistspecialpublication800-18r1.pdf
* 140sp656.pdf
* 140sp2522.pdf
* 140sp557.pdf
* SPIX-official-comment.pdf
* August 2019 ISPAB Meeting FINAL Minutes (1).pdf
* 20000515-dwhiting.pdf
* NSA_comments_Draft_FIPS202_dated_April2014.pdf
* 202.pdf
* ombencryption-guidance.pdf
* 140sp360.pdf
* 140sp2992.pdf
* Abstract-Halpern.pdf
* 140sp2315.pdf
* Berg-FISSEA-030904.ppt
* FISSEA 2018 EOY Winner Mike Petock.pdf
* KAT_nts_kem_13_80.zip
* skinny.zip
* nistspecialpublication800-51r1.pdf
* NIST.IR.8333.pdf
* 140sp3157.pdf
* csspab_workshop_agenda_2000-06.pdf
* 140sp22.pdf
* Soltys-Tues200.ppt
* grain-128aead-spec-round2.pdf
* test3_90.csv
* HiMQ_3.zip
* DAGS-April2018.pdf
* 140crt1465.pdf
* nist.sp.800-210.pdf
* vpillitteri_dec2013_managers-forum.pdf
* NIST.IR.7916.pdf
* 140sp2769.pdf
* 140sp2800.pdf
* oct22_dod_mobility-needs-and-challenges_youst.pdf
* twg-03-02.pdf
* idwma.pdf
* FIPS140ConsolidatedCertOct2017.pdf
* nistir4774.pdf
* mispc.ps
* RSADPtestvectors.zip
* update-on-the-performance-and-mode-level-properties-of-isap.pdf
* NIST.SP.800-57pt1r4.pdf
* NIST.SP.800-213-draft.pdf
* OUROBOROS-R-Statements.pdf
* SBMOC-CRDA-MTA21.pdf
* NIST.CSWP.02042020-3.pdf
* ASSET_1-04_Installation.zip
* sp800-107-rev1.pdf
* day1_research_100-150.pdf
* Maroochy-Water-Services-Case-Study_briefing.pdf
* 140sp1566.pdf
* YANG_presentation.pdf
* NIST.IR.8323r1.ipd.pdf
* 990415-kaoki4.pdf
* KAT_AES.zip
* 140sp882.pdf
* Monday1100-Sharp.pdf
* sp800-53ar5-assessment-procedures.csv
* VANASSCHE_RadioGatun_0720.pdf
* CAVPMM.pdf
* aesmmt.zip
* 140crt914.pdf
* 140crt879.pdf
* NIST.IR.8431.pdf
* CAVPFAQ.pdf
* 140sp1454.pdf
* 140sp2102.pdf
* fips1402annexa.pdf
* 140sp1668.pdf
* 140sp549.pdf
* sp800_92.epub
* 140crt199.pdf
* CoverFINAL.pdf
* Overlay Submission Form_6-1-2019.docx
* nistir7007.pdf
* 140sp2396.pdf
* NIST.FIPS.186-4.pdf
* nistspecialpublication800-64r1.pdf
* fissea-FISMA-030603.pdf
* 140sp1943.pdf
* 2011_agenda-ispab-march-meeting.pdf
* tom_k.pdf
* 140sp578.pdf
* 140crt892.pdf
* 140sp3343.pdf
* 140crt247.pdf
* Schultz-FISSEA-031104.ppt
* 140crt135.pdf
* 2010_FISSEA-educator-of-the-year-nomination-form.docx
* Schmidt-FISSEApanel-030904.ppt
* NIST RMF QSG-FAQs and Roles and Responsibilities Crosswalk.zip
* Program_SHA3_Aug2010.pdf
* security-analysis-of-knot-lwc2020.pdf
* USGCB Windows7 SP1 x86 Enterprise - 20111014.zip
* 140sp2582.pdf
* Minutes-03-2002.pdf
* 140crt85.pdf
* Dept of State Comments-NIST 800-38D-GCM.pdf
* 140sp3915.pdf
* 140sp2342.pdf
* sp800_121_r2_draft.pdf
* fissea-conference-2012_cinnamon-and-wasielak.pdf
* 140sp1560.pdf
* ron_ross_continuous_monitoring_article_july2012.pdf
* june-2014_ispab-meeting-minutes.pdf
* MCSSHA3.zip
* 140sp1771.pdf
* CMT11verbose.pdf
* PIVCardApplicationCertificate32.pdf
* 140sp3581.pdf
* seta.pdf
* JDoherty-ISPAB-OMB_07-11_June2007.pdf
* fipspub48.pdf
* 140sp3075.pdf
* ISPAB_Dec7-BOldfield.pdf
* CFP_2006.pdf
* gcm-revised-spec.pdf
* 140sp3322.pdf
* 140sp2131.pdf
* 140crt1420.pdf
* 140sp3269.pdf
* 02-12-Howe.pdf
* 140sp485.pdf
* DSA2_All.pdf
* nist-sp800-132.pdf
* itlbul2013_07.pdf
* 140crt1466.pdf
* NIST.IR.8228.pdf
* 140sp2264.pdf
* nistir-8179-draft.pdf
* PIV-BRM-Authenticators-final.pdf
* day3_trusted-computing_1035-1125.pdf
* NTRUEncrypt.zip
* Panel-Tues200.ppt
* session-2-zhang-security-analysis-knot.pdf
* future.ZIP
* Nelson-03-2002.pdf
* S05_NIST-tk2.pdf
* presentation-tue-gazdag.pdf
* nistir7694.pdf
* Cyber-Security-and-Science_PWeinberger.pdf
* trusted-computing-group.pdf
* CJohnson_NVD_ISPAB-Nov2010.pdf
* 140crt1366.pdf
* Sept2002-Liberty-Alliance-Project.pdf
* physecpaper12.pdf
* chen-yilei-approx-trapdoors.pdf
* 140sp21.pdf
* ssh.zip
* 140sp2645.pdf
* itlbul2008-07.pdf
* 140sp2780.pdf
* ISPAB June 2021 FINAL ACCEPTED MINUTES.pdf
* nist.sp.800-193.pdf
* 140sp2478.pdf
* 140sp2818.pdf
* 2015-feb_george-ispab.pdf
* 140sp837.pdf
* NIST.CSWP.08042021-draft.pdf
* 140sp1214.pdf
* PIV_model.pdf
* 140sp2366.pdf
* oct23_csric-on-framework_seader.pdf
* 140sp1570.pdf
* session-2-nandi-revisiting-security-of-comet.pdf
* aware-inc-2.pdf
* Session4_Dodson_Transcripts.pdf
* schemes-workshop-doc.pdf
* price-kuhn-ivv-13.pdf
* schneier.pdf
* Request-for-Public-Comment-on_XTS.pdf
* 140sp2324.pdf
* 140sp2431.pdf
* RISTENPARThashdomext1.pdf
* draft_nistir_8138_comment_form.doc
* 140sp1101.pdf
* SHA-3-August2014-presentations.zip
* gaj-session-1-paper-pqc2019.pdf
* 140sp1054.pdf
* nistspecialpublication800-121r1.pdf
* isap-spec-round2.pdf
* ispab_ltr_to_omb_infosharg_cyberthreats.pdf
* NISTIR-7698-CPE-Language.pdf
* NIST.IR.8320-draft.pdf
* ApplicationsTraining.pdf
* Framework_Quick Start_Guide.pdf
* 140crt632.pdf
* physecpaper09.pdf
* ispab_15-usc_278g-4.pdf
* 140sp1202.pdf
* 140sp2937.pdf
* 140sp247.pdf
* sp800_30_r1.epub
* ISPAB-BoltenLtrreCSDFunding-2004.pdf
* 140sp359.pdf
* 140sp635.pdf
* Picnic-official-comment.pdf
* 140sp90.pdf
* ISPAB-Dec7-Carol-Bales.pdf
* Koeune.pdf
* Zagorski_scv.pdf
* 140crt743.pdf
* 140sp4032.pdf
* FISSEA03a.pdf
* 140sp517.pdf
* session-2-peyrin-new-results-rolmulus.pdf
* 140crt564.pdf
* CSD-Funding92004.pdf
* 140sp2142.pdf
* Citigroup.pdf
* 140sp1799.pdf
* fountain.zip
* FISSEA-Newsletter-March2006.pdf
* 140crt649.pdf
* S09_Wi-Fi Alliance Overview-01-part2-ff.pdf
* 140sp388.pdf
* KAT_Rainbow.zip
* 2_post-quantum_dmoody.pdf
* PIV-Strawman-grance.pdf
* December 2020_040121_1006_signed.pdf
* 140crt960.pdf
* 140sp3781.pdf
* NIST.CSWP.25.pdf
* YI_Password-Authenticated Key Agreement from IBE_060108.pdf
* 10th-FISSEA-Workshop-Presentation_Nov13-2008.pdf
* ross_2004_06_ispab.pdf
* sp800-171B-and-dod-cost-estimate-request-for-comments.pdf
* 140sp452.pdf
* FIPS201 - Federation - 4.pdf
* sp800_53_r4_final_word_errata_01_22_2015.docx
* 140crt500.pdf
* 140sp4169.pdf
* getdoc-gpea.pdf
* Classic-McEliece-Round3.zip
* nistspecialpublication800-27ra.pdf
* fipspub73.pdf
* 140sp1065.pdf
* 140sp2451.pdf
* 140sp1383.pdf
* paperD10.pdf
* 140sp3867.pdf
* 140crt1302.pdf
* Forum_Dec-6-2011_RKuhn.pdf
* subterranean-2.0-official-comment.pdf
* 22.annex1.ps
* 140sp1973.pdf
* ispab-october2009-minutes_final.pdf
* 140sp1577.pdf
* 140sp3994.pdf
* vmsec_ISPAB_L-Badger.pdf
* 140sp2693.pdf
* bio_aanton_ispab.pdf
* NIST.CSWP.04162018.pdf
* 140sp2427.pdf
* NIST-Cybersecurity-Publications.xlsx
* admin.txt
* twg-03-18.pdf
* ispab_feb2013_automated-indicators-in-telecom_jnagengast.pdf
* nistspecialpublication800-48.pdf
* 140sp642.pdf
* 140sp528.pdf
* suite-draft1.pdf
* b-02-06.pdf
* sp800-207-draft-comment-template.xlsx
* 140sp675.pdf
* 20000515-bschneier.pdf
* Hamsi_Round2.zip
* Mersenne-756839-Statements.pdf
* 140sp3103.pdf
* 140sp657.pdf
* nistir_8114_draft.pdf
* 20220615-crypto-club-mary-slides.pdf
* itlbul2011-05.pdf
* 140crt227.pdf
* 140crt5.pdf
* sp800-56ar3-draft-comments-received.pdf
* FIPS140ConsolidatedCertList0035.pdf
* Comments-Draft-SP-800-171B-Raytheon-2August2019.pdf
* taylor.pdf
* p15.pdf
* NIST.IR.8196.pdf
* NIST.GCR.16-010.pdf
* 140sp1240.pdf
* nistspecialpublication800-78-1.pdf
* 140sp2885.pdf
* SP800-144.pdf
* 140sp2921.pdf
* thesis_vadim.pdf
* 2017-11-02 Fed Managers Forum Presentation.pdf
* nistspecialpublication800-45.pdf
* LOTUS.zip
* 140crt796.pdf
* NIST.SP.800-125B.pdf
* 140sp3245.pdf
* nist.sp.800-76-2.pdf
* fwalls.ps
* 800-12_5.ps
* 140sp2200.pdf
* 140sp3694.pdf
* 140sp1746.pdf
* HQC-April2018.pdf
* fips81change3.pdf
* 140sp811.pdf
* Goyet-Interoperability-Card-Printing2.pdf
* toolchain-timing-leakage-lwc2020.pdf
* lwc-2022-agenda.pdf
* cmvpmm.pdf
* icmc-2019--threshold-slides-v20190516-b.pdf
* 140sp3546.pdf
* sp800-22r1a-decision-proposal-comments-2022.pdf
* oct23_drones_uas_chris-lee.pdf
* 140sp4027.pdf
* 140crt75.pdf
* Jul14_Vaughn_SCADA-Presentation-2011.pdf
* 800-53A-R1_Assessment-Cases_SI-Family_ipd.zip
* dec2012_cybersec_data_element.pdf
* 140sp594.pdf
* 140crt1100.pdf
* 140sp345.pdf
* 140sp3839.pdf
* xccdf-spec-1.1.3-20070401-draft.pdf
* 140sp2167.pdf
* AMAG-Technology.pdf
* 140sp2740.pdf
* 140crt730.pdf
* 140sp3256.pdf
* LW16-4x4-GF256-inv-circ--XOR=89-rs=923.circ.txt
* pcfb-spec.pdf
* 140sp1552.pdf
* 140sp1115.pdf
* 140sp2160.pdf
* 140crt1119.pdf
* x509tests.zip
* itlbul2007-07.pdf
* 20000515-lknudsen-1.pdf
* NIST.SP.800-160.pdf
* 140sp2162.pdf
* copyright-release.pdf
* paperE4.pdf
* Style-over-substance.zip
* ace_update.pdf
* new-results-romulus-lwc2020.pdf
* 140sp2705.pdf
* 140crt221.pdf
* letter_feb2012_future-cybersecurity-awareness-months.pdf
* ISPAB_april2010-meeting-minutes.pdf
* 140crt763.pdf
* ispab_meeting_minutes_june-2016.pdf
* NIST.SP.800-140A.pdf
* talk-032498.ppt
* 140sp2714.pdf
* ISPAB-ReportAdequateFundingNIST-CSD.pdf
* Teelucksingh-FISSEA-031104.ppt
* 140crt76.pdf
* Odd_Manhattan.zip
* 140sp2380.pdf
* 140crt1453.pdf
* 140sp834.pdf
* MehtaJ_Bio.pdf
* 140crt842.pdf
* 140sp320.pdf
* 140sp2814.pdf
* fissea-2015-stoffell.pdf
* RMA Complexity 21100_RMA_FINAL.pdf
* Security_and_Privacy_ Auth_PBGC-Tool_Based_Approach.pdf
* 140crt807.pdf
* Wang_Bio.pdf
* 140sp2813.pdf
* sano.pdf
* Bolten-Letter-Section-522-01_2005-final.pdf
* 152-154.pdf
* session-3-saha-security-margin-tinyjambu.pdf
* ispab_feb2013_fisma-annual-rpt_cbales.pdf
* fissea_2014_holcomb.pdf
* HMAC_SHA3-512.pdf
* Qarma64--XOR=24-rs=-1.circ.txt
* FIPS140ConsolidatedCertAug2018.pdf
* mcmillan_aske_fabbri_terra_day2_315_managing_the_insider_threat.pdf
* kelsey-email-moving-forward-110113.pdf
* Texas-comments.txt
* 140sp1682.pdf
* 140sp4151.pdf
* nistir8144_draft.pdf
* 140crt944.pdf
* 140sp3464.pdf
* 140sp2548.pdf
* 140crt159.pdf
* 02-12-Cahoon.pdf
* titlewkshp.ps
* NIST.IR.8403.pdf
* NIST.SP.1800-1.pdf
* Wallach_PositionPaper.pdf
* 140sp3695.pdf
* 140sp821.pdf
* xtec.pdf
* nistir4614.pdf
* 140crt1349.pdf
* SHA512_256.pdf
* day1_HIPAA-conference2011-FTC-Proposed-Privacy-Framework.pdf
* Howe_2002-12-20.pdf
* Gui.zip
* 140sp3747.pdf
* PIVCardApplicationCertificate3.pdf
* 140sp3651.pdf
* kcl.pdf
* SKOP15-4x4-GF16-inv--XOR=44--XZLBZ20.circ.txt
* KRtable6.doc
* 140sp2715.pdf
* panelF3.pdf
* NIST.SP.800-63c.pdf
* nistspecialpublication800-63ver1.0.1.pdf
* 140sp2968.pdf
* wed945_a-130_cbales.pdf
* 140crt1333.pdf
* May 2018 FCSM CEU Form.docx
* 140sp2909.pdf
* Cybersecurity IOT Act of 2020 Shaffer.pdf
* sp800_73-4_2014_draft_comments_and_dispositions.pdf
* FISSEA-Newsletter_Winter2008.pdf
* 140crt1218.pdf
* 140sp1127.pdf
* 140sp2815.pdf
* 140sp3899.pdf
* RSA2SP1VS.pdf
* Identity_Proofing_MEHTA.pdf
* Tom_K.pdf
* 05-9945-DES-Withdrawl.pdf
* session-7-classic-mceliece-lange.pdf
* lwc-use-cases-lwc2020.pdf
* sp800-126A_draft.pdf
* session3-renner-benchmarking-software.pdf
* may.zip
* brannon_hipaa_2014_day1.pdf
* 140sp1350.pdf
* fcsm_june2012_garbars.pdf
* nsapubs.txt
* NIST.SP.1800-10.pdf
* nistspecialpublication800-8.pdf
* 140crt332.pdf
* fips180-4-initial-public-comments-2022.pdf
* pmac.pdf
* 289-290.pdf
* 317slide.pdf
* 140sp2960.pdf
* 140sp3477.pdf
* AES_CBC.pdf
* fpga-benchmarking-lwc2020.pdf
* 3_software-assurance_pblack.pdf
* qsg_monitor_management-perspective.pdf
* 140sp426.pdf
* 140crt1383.pdf
* october-2012_fcsm_pturner.pdf
* WG5-0298.doc
* jelen.ppt
* BLAKE.zip
* 140sp607.pdf
* itlbul2014-04.pdf
* 140sp2257.pdf
* nist.ir.8023.pdf
* FIPS140ConsolidatedCertList0015.pdf
* 140sp430.pdf
* 140sp43.pdf
* 2-Pascoe and Sedgewick 1pm - NIST Updates to the Cybersecurity Framework.pdf
* session10-nandi-security-proof-mixfeed.pdf
* 140sp901.pdf
* fissea_2014_role_based_training_winner_susan_farrand.pdf
* forum-august2015-program-final.pdf
* 140sp1789.pdf
* 140crt911.pdf
* 140sp2922.pdf
* 140crt955.pdf
* 140sp617.pdf
* NIST.IR.8183A-3.pdf
* test4_24.csv
* public-comments-nistir7977-second-round-mar2015.pdf
* install_SP800_73_4_tester_enc.zip
* 140sp2656.pdf
* VAN_ASSCHE_presentation.pdf
* 140sp3529.pdf
* sp800-22rev1a.pdf
* 140crt1471.pdf
* cfp-cover-sheet-supporting-doc-dig-sig.pdf
* wage.zip
* 140sp1902.pdf
* vs-jf-study-mobile-device-security.pdf
* FIPS140ConsolidatedCertList0051.pdf
* tcinnamon_fissea2010-how-info-security-competency-models.pdf
* session-1-yalcin-need-for-low-latency-ciphers.pdf
* nistir_7621_r1_draft.pdf
* 140sp781.pdf
* US-Standards-Strategy-blackwhite.pdf
* FISSEA-Monday1500ACarverpart2.pdf
* 140sp1678.pdf
* March17_FISSEA-technical-workforce-monitor-KArnold-JLusby.pdf
* Vendor_LeVan.pdf
* 140crt220.pdf
* 140sp2902.pdf
* WG1.doc
* 140crt972.pdf
* 140crt1434.pdf
* FISSEA_July2008-workshop-GeorgeBieber.pdf
* itlbul2013_09.pdf
* ispab_july09-stingley_data-gov-panel.pdf
* track2_track3_v3.pdf
* 140sp1365.pdf
* DODCAR_-no class markings - Pat Arvidson.pdf
* robots.txt
* security-analysis-of-hyena-lwc2019.pdf
* EMBLEM-and-R-EMBLEM-official-comment.pdf
* fips198-1-initial-public-comments-2021.pdf
* 8.pdf
* NIST.SP.800-171r1.pdf
* nistir7697.pdf
* nistir7298_r2_draft.pdf
* 140sp1332.pdf
* nistspecialpublication800-57p1r2007.pdf
* SKINNY-Statements.pdf
* 140crt1013.pdf
* 140sp1474.pdf
* NIST.SP.800-157.pdf
* 140sp3052.pdf
* Frodo.zip
* sp800_56a_r2_comments_received.pdf
* nistspecialpublication800-90.pdf
* sp800-37r2-draft-ipd-comment-template.xlsx
* November 2020_011220_0856_signed.pdf
* 140sp1140.pdf
* july2013_abac_workshop_abac-model-framework_dferraiolo.pdf
* 140sp3483.pdf
* XTec.pdf
* HMACVS.pdf
* 140sp185.pdf
* Forum critical.pdf
* 140sp254.pdf
* 140sp2360.pdf
* 140sp417.pdf
* BERGER_NC_E2E_Voting_Systems.pdf
* 140sp3927.pdf
* CMVP2604.pdf
* CFP-3rd-NIST-PQC-Conference-2021.pdf
* sp800-57pt2-r1-draft.pdf
* BLAKE_Comments.pdf
* RLCE-KEM-Statements.pdf
* Federal_Cybersecurity_and_Privacy_Forum_15Feb2022_Welcome_and_Announcements.pdf
* 140sp603.pdf
* 140sp1282.pdf
* eax-prime-spec.pdf
* wage-spec-round2.pdf
* 140sp1223.pdf
* ispab_july09-donelan_tic-external-connections.pdf
* itlbul2007-06.pdf
* 140sp3063.pdf
* program_SHA3_workshop_aug2014.pdf
* March17_FISSEA-launching-mentor-prog-RAyer.pdf
* MATSUO_2nd_HASH_0822.pdf
* 140crt1271.pdf
* Forensics.pdf
* fisma-poster1.pdf
* SIKE-Round2.zip
* 140sp1553.pdf
* 140sp2320.pdf
* 140crt1392.pdf
* 140sp299.pdf
* nist.sp.800-88r1.pdf
* ForensicArticle-DI-fin.pdf
* sp800_184_draft_comment-template.xls
* stppa-03-luis-welcome.pdf
* draft_nistir_7924.pdf
* cmvp2704.pdf
* NIST.CSWP.07092019-draft.pdf
* 140sp2307.pdf
* KCL-okcn-official-comment.pdf
* 04_Essence_Observation.pdf
* 140sp1735.pdf
* 140crt1136.pdf
* USRP_NIST_CommsCo_062415.pdf
* 2015_agenda-ispab-february-meeting.pdf
* day1_info-sharing_1100-1150.pdf
* 140crt1445.pdf
* 116-119.pdf
* day1_security-automation_430-530.pdf
* 140sp3025.pdf
* 140sp3274.pdf
* 140sp2805.pdf
* steve_bell_reader_infrastructure_enhancements_fips201-2_2015.pdf
* forcht.ZIP
* 140crt1327.pdf
* Fugue.zip
* 140sp653.pdf
* draft_comment_template_piv-for-privileged-use.xls
* Email_Oct 27 2004 Don Johnson to John Kelsey.pdf
* 140sp3116.pdf
* fips181.pdf
* 140crt1402.pdf
* nistspecialpublication800-22.pdf
* usgcb-ie7-gpos.zip
* 140sp285.pdf
* feb1_mobility-roots-of-trust_regenscheid.pdf
* photon-beetle_software_update_18sep2020.pdf
* 140sp2193.pdf
* 140sp3865.pdf
* nguyen-optimized-software-gmu-pqc2021.pdf
* cloud-computing-industry-trends-FISMA_ISPAB-Dec2008_B-Whyman.pdf
* test3_21.csv
* 140sp2723.pdf
* ISPAB Agenda FINAL - June2021.pdf
* Gemplus.pdf
* nbsspecialpublication500-24.pdf
* 140sp613.pdf
* 140crt920.pdf
* HQC-Round3.zip
* saunders-fissea-031004.ppt
* NIST.SP.800-46r2.pdf
* 140crt1012.pdf
* 140sp2807.pdf
* 140crt513.pdf
* 140sp3758.pdf
* forum_august2014_scholl.pdf
* 140crt1077.pdf
* radac-paper0001.pdf
* itlbul2013-11.pdf
* 140crt405.pdf
* 140crt183.pdf
* CEU Form September 2021 Final2.pdf
* aug2012_risk-management-briefing_swanson-saunders-light.pdf
* sp800-140e-draft.pdf
* 140sp3861.pdf
* nist_ict-scrm_fact-sheet.pdf
* fissea-conference-2012_sadeh.pdf
* 140crt1167.pdf
* fdic_cert_policy.doc
* Day_2_AM_1_Resiliency_Mitigations_for_SCRM.pdf
* session-2-beyne-updates-on-elephant.pdf
* physecpre01.pdf
* HAWKES_NIST_20060729.pdf
* twofish-unix-optc.tar
* Overview_Ferraiolo.pdf
* 140sp508.pdf
* 140sp1432.pdf
* FIPS140ConsolidatedCertJune2016.pdf
* r1-ansic.pdf
* 140crt1306.pdf
* comet-spec.pdf
* NIST.IR.8322.pdf
* ISPAB-Minutes-Dec2004.pdf
* oct23_kalluri_2020-census_nist_ispab.pdf
* PIV-Opening.pdf
* 140sp2957.pdf
* test3_30.csv
* ispab_june-10_nice_rpetersen.pdf
* 140sp2141.pdf
* 140sp2607.pdf
* 140sp246.pdf
* nist.sp.800-160v2r1.pdf
* 140sp1075.pdf
* 140sp3419.pdf
* 140sp3617.pdf
* 140sp2967.pdf
* 140sp1132.pdf
* nistir7188.pdf
* FISSEA-Monday1500A-Carverpart1.pdf
* HERN&HERON-spec.pdf
* S09_IEEE802.11Procedures-ncwv2.pdf
* mpts2020-1b2-talk-nigel.pdf
* Opening-Nov18-Workshop.pdf
* HISTORICAL_Component_Legend_All_56_Except_KDF.pdf
* oct23_csric-on-framework_kriz.pdf
* 140sp2044.pdf
* public-comment_dmoore_2013jun14.pdf
* 140sp3681.pdf
* sp800-53-rev4-ipd.pdf
* LEDAcrypt-Round2.zip
* BIKE-official-comment.pdf
* 140sp1304.pdf
* 140sp2985.pdf
* panelA1.pdf
* ISPAB_Jun2007_final-Minutes.pdf
* edaccompliance.pdf
* NIST-Wkshp-Definitions.pdf
* 140sp3731.pdf
* PIV-Morphet.pdf
* 140sp2254.pdf
* LAC-April2018.pdf
* gift-cofb-spec.pdf
* 140sp1882.pdf
* iosp13.txt
* govt-invest-salesforce_ISPAB_Dec2008-J-DeVoe.pdf
* NIST 2021 Annual FACA FRN (2021).pdf
* SP800-90A.pdf
* 140crt1331.pdf
* twg-02-19.pdf
* Grain_128AEAD-spec.pdf
* AES_ModesA_All.pdf
* Bayuk.ppt
* fcsm_june2012_ross.pdf
* physecpaper07.pdf
* 208.pdf
* fips140consolidatedcertlist0053.pdf
* ecccdhtestvectors.zip
* SPHINCS-Round3.zip
* 2009fissea_website-winner.pdf
* 02-02.pdf
* history-lwc-round-2-updates.pdf
* fips140consolidatedcertlist0019.pdf
* 140crt652.pdf
* mitre.ps
* using-attack-graphs-forensic-examinations.pdf
* fissea_conf_2013_massaro.pdf
* 140sp357.pdf
* sp800-53ar5-assessment-procedures.txt
* 140sp2978.pdf
* 140crt571.pdf
* cns-final.pdf
* 140crt1059.pdf
* Monday1100-Sharp.pdf
* minutes9712.txt
* Email-Authentication-Summit-FRNotice.pdf
* 140sp1119.pdf
* bsnow-ppt.zip
* gift-cofb-spec-round2.pdf
* 140sp343.pdf
* LW16-4x4-GF16.mat.txt
* 140crt1144.pdf
* test4_16.csv
* 140sp2357.pdf
* 140sp54.pdf
* 140sp340.pdf
* BLAKE_Comments.pdf
* ECHO_Comments.pdf
* panelD2.pdf
* nistspecialpublication800-63-1.pdf
* 140crt404.pdf
* NIST.SP.800-181.pdf
* comments-draft-cfp-aug2016.pdf
* fips1401ig.pdf
* security-beacons-final-werb.pdf
* sept2004-tcg-best-practices-principles-brief.pdf
* NISTIR-7358.pdf
* twg-02-03.pdf
* fips1402annexc.pdf
* 140sp717.pdf
* Nyberg_Gilbert_and_Robshaw.pdf
* 140sp3721.pdf
* cbc_e_m.txt
* GaryClayton.pdf
* welcome_abac_workshop_july2013.pdf
* wed230_cdm_shansche.pdf
* DRBG_FIPS186_2.pdf
* SP800-53-control-comment-template.xlsx
* 140sp2085.pdf
* CCMVS.pdf
* 140sp2493.pdf
* Burr_Dec_2003.pdf
* sp800_185_draft_comments_received.pdf
* presentation-1_gupta.pdf
* kuhn-craigen-saaltink-03.pdf
* Winter_2015_Draft_Agenda.pdf
* 140sp1135.pdf
* NCCoE_FSCM_Brief.pdf
* nguyen-boosting-hybridboost-pqc2021.pdf
* 140sp2263.pdf
* 140sp3421.pdf
* test4_5.csv
* 140sp2466.pdf
* 140sp1426.pdf
* Comments-Draft-SP-800-171B-EmeryGroup-6August2019.pdf
* 140sp4024.pdf
* CRUNCHUpdate.zip
* forum_april2014_automated_assessment_practicals_v1_0.pdf
* itlbul2017-08.pdf
* June-2021-final-agenda-with-links.pdf
* 140sp3765.pdf
* NISTIR-7298_Glossary_Key_Infor_Security_Terms.pdf
* 140crt1177.pdf
* 140sp335.pdf
* Powanda-FISSEA-031104.ppt
* EdonK.zip
* KNOT-official-comment.pdf
* PIV-Dodson.pdf
* 140sp2893.pdf
* fissea_2015_contest_winners_all.pdf
* nistir7200.pdf
* 140sp242.pdf
* history-pqc-round-1-updates.pdf
* Romulus-spec.pdf
* FISSEA-Mar2003.pdf
* QPL_SmithBIO_.pdf
* 1987-10th-NCSC-proceedings.pdf
* physecpre16.ppt
* itlbul2014_03.pdf
* 140sp1029.pdf
* missionbn-safeconfig final.pdf
* DOE_CPv2_3030805.pdf
* WIP_800_53_Rev_5_to_Framework_v_1_1.xlsx
* 140crt1316.pdf
* 140crt595.pdf
* 140sp2952.pdf
* 140sp183.pdf
* 140sp1163.pdf
* ispab_april2010_health-it-briefing.pdf
* handout1.pdf
* FoxMu8.mat.txt
* ngrunberg_fissea2010-keynote-abstract-bio.pdf
* sha1-vectors.zip
* 140sp1061.pdf
* cryptography1_Cryptotoolkit.pdf
* kenney_holtzman_day2_1030_hipaa_hitech_rule_changes.pdf
* CSSPAB-Privacy-Report-2002-09.pdf
* 140sp253.pdf
* 140crt498.pdf
* ir6462.pdf
* paf.pdf
* 140crt940.pdf
* 140sp2368.pdf
* sp800_184_draft.pdf
* 140sp790.pdf
* NISTIR-7771.pdf
* Fed-Register-jan-19meeting.pdf
* Newsletter-Jan-2006.pdf
* itlbul2014-09.pdf
* 140crt969.pdf
* ESSENCE_Comments.pdf
* FR-CSSPAB-Nominations.pdf
* Comments-Draft-SP-800-171B-CMU-Parno-30July2019.pdf
* 140sp2839.pdf
* aug2012_risk-management-briefing_swanson-saunders-light.pdf
* ICSS_SP800-5307-02-2008.pdf
* ibm-patent-letter.pdf
* 140sp2812.pdf
* 140crt1017.pdf
* t11.pdf
* 140sp2843.pdf
* api.pdf
* pkcs11-software.zip
* 140sp2904.pdf
* session-8-espitau-mitaka.pdf
* rc6-unix-optj.tar
* Freeman-Assa-Contacless-Interoperability.pdf
* 140sp3926.pdf
* 140crt1180.pdf
* 140crt604.pdf
* PIVMiddlewareCertificate7.pdf
* drygascon-changelog.pdf
* Sec_Func_Testing.pdf
* 140crt1353.pdf
* 140sp1583.pdf
* 140sp3.pdf
* feb1_mobility_lchen.pdf
* Thursday-MKabay_AbstractBio.pdf
* June 2020_010720_0752.pdf
* 140crt64.pdf
* o23.pdf
* NIST.SP.800-130.pdf
* CSD_DocsGuide_Trifold.pdf
* 140sp109.pdf
* SHA3-384_1630.pdf
* itlbul2004-11.pdf
* Dec2004-Email-ID-Theft-Phishing-Spam.pdf
* m-06-15.pdf
* 140crt1035.pdf
* 140sp1126.pdf
* 140sp2745.pdf
* ispab-march-2018-meeting-minutes.pdf
* 305slide.pdf
* 140crt1384.pdf
* 140crt675.pdf
* 140sp271.pdf
* test3_26.csv
* 167-171.pdf
* 140crt126.pdf
* Wrap-upBurr.pdf
* 140sp573.pdf
* IP-Statement-2D3-Reference-Optimized-Implementation-Owners.docx
* joux_pres_nist.pdf
* sp800-56a_revision1_mar08-2007.pdf
* nist.ir.8408.ipd.pdf
* 140sp3225.pdf
* session-4-babinkostova-tvla.pdf
* 140sp3394.pdf
* fissea-2015-grunberg.pdf
* essa_isa_intro_requirements_overview.pdf
* ispab_meeting-minutes_october-2012.pdf
* 140crt927.pdf
* 140sp2748.pdf
* 140sp2533.pdf
* Session7_Peralta_Transcripts.pdf
* 140sp434.pdf
* ISPAB Recommendations- Secure Software Configurations OMB March2021 Final.pdf
* FIPS698_Word97.doc
* FIPS140ConsolidatedCertList0013.pdf
* april-2010_guide-protecting-pii.pdf
* nistspecialpublication800-53r1.pdf
* PIVMiddlewareCertificate12.pdf
* ISPAB June 2020 Meeting FRN.pdf
* itlbul2013_11.pdf
* 140sp2240.pdf
* FedRegister-fms.txt
* 140sp2881.pdf
* mispc.doc
* 140sp982.pdf
* 140sp2497.pdf
* 800-53A-R1_Assessment-Cases_PE-Family_ipd.zip
* Rainbow-Round3.zip
* 140sp737.pdf
* HMACVS.pdf
* presentation-tue-hanatani.pdf
* nist.cswp.02042022-1.pdf
* Summer_2015_Agenda.pdf
* ICS-in-SP800-53_final_21Mar07.pdf
* session-1-calik-benchmarking-second-round-cadidates.pdf
* NVD2006.xls
* ispab_oct2012_dchenok_informatioin-sharing.pdf
* 140sp1467.pdf
* gcm-update.pdf
* 140sp2313.pdf
* 140crt1231.pdf
* 140sp3660.pdf
* 140sp3608.pdf
* CTR_DRBG_withDF.pdf
* 140crt1195.pdf
* 2011-FISSEA-Conf_Abstracts-Bios.pdf
* sphincs-plus-selected-algo-official-comment.pdf
* 140sp3316.pdf
* twg-02-07.ppt
* 1981-4th-seminar-proceedings.pdf
* 140crt1456.pdf
* itlbul2006-08.pdf
* fissea_2014_peers_choice_motivational_item_winner_united_technologies.pdf
* 140sp749.pdf
* CubeHash.pdf
* ZdravkovichV_Bio.pdf
* Keccak-slides-at-NIST.pdf
* 140sp1639.pdf
* PIVMiddlewareCertificate11.pdf
* 140sp2692.pdf
* ispab_minutes-final_october2011-meeting.pdf
* AES_Core128.pdf
* 140sp3494.pdf
* SS16-4x4-GF16.mat.txt
* readme-for-csv-sp800-171r2-security-reqs.txt
* Role-of-Two-Year-Colleges-Cybersecurity-Education.pdf
* sp800_145.epub
* sp800_73-4_2014_draft_comments_and_dispositions.pdf
* Wack_Wilson_Demo.ppt
* Sept2008-ISPAB-EHopkins.pdf
* ecoh-leuven.pdf
* CISA-Overview-austin.ppt
* nistir7298.pdf
* NIST.SP.800-219.pdf
* 3-051809-assessment-methods.pdf
* iosp4.txt
* FIPS180-2_changenotice.pdf
* 140sp2965.pdf
* DME-official-comment.pdf
* itlbul2013-03.pdf
* 140sp3039.pdf
* o18.pdf
* 140crt740.pdf
* Burr_FutureStrategy_Panel.pdf
* ctst-wack_rev_21.pdf
* Masked-Circuits-Scope-2022a.pdf
* 31-tkohno.pdf
* 140sp1154.pdf
* 140sp3051.pdf
* ispab_june-12_nstic_mgarcia.pdf
* fips171.txt
* 17.pdf
* Details41PIVApp.pdf
* toc.PDF
* Picnic-Round3.zip
* NIST.IR.8278A-draft.pdf
* USRP_NIST_DuPont_071315.pdf
* 140sp3967.pdf
* 375-378.pdf
* 140crt1001.pdf
* FIPS140ConsolidatedCertList0007.pdf
* forum_feb2015_nist_usgcb.pdf
* logistics-Jan19-meeting.pdf
* fcsm_august-2015_agenda_final_with_presentation_links.pdf
* ace-changelog.pdf
* 140sp1540.pdf
* 140sp793.pdf
* 140sp3387.pdf
* 140sp2810.pdf
* 140sp805.pdf
* 140sp2272.pdf
* ispab_meeting_minutes_february_2015.pdf
* 140crt829.pdf
* sp800_157_draft_comment_template.xls
* xoodyak.zip
* Ross-Wed300.pdf
* 140sp3723.pdf
* 140sp2224.pdf
* session-7-gonzalez-verifyng-pq-signatures.pdf
* drbgtestvectors.zip
* 140crt120.pdf
* jlindley_fissea2010-panaceaorpandora.pdf
* 140sp1156.pdf
* tosem99.pdf
* 140crt710.pdf
* Sept2008-ISPAB-DDodson_CSD.pdf
* 2006-Conf-Flyer.pdf
* K283_SHA256.pdf
* 140crt602.pdf
* NIST.IR.8286D.ipd.pdf
* fedregister-198.pdf
* Forum_Dec-6-2011_RKuhn.pdf
* 140sp3703.pdf
* NTRU-HRSS-KEM-Statements.pdf
* TEMOSHOK_NISTDHSQPL_Workshop042110.pdf
* November 2021_011221_0923_signed.pdf
* 140crt1334.pdf
* June 2021_010721_0718.pdf
* 11_Hutter.pdf
* HMAC_SHA256.pdf
* Dec2004-Perspectice-on-NIAP_CC.pdf
* 218slp.pdf
* department-of-state.pdf
* 140sp433.pdf
* FISSEA-Workshop-Dec2004.ppt
* PIV-Dawson.pdf
* 140crt182.pdf
* 140crt670.pdf
* Tuesday-MWilson_SP800-16-Updates.pdf
* nistspecialpublication800-70.pdf
* WG5-1097.txt
* PP-VisualAuthentication-rev-DS04.pdf
* nistspecialpublication800-86.pdf
* Software_Assurance_Session-Mar2006.ZIP
* WaMM.zip
* 2.6 - Main - KPMG Presentation to 3rd OSCAL Workshop_updated.pdf
* NIST.SP.800-181r1.pdf
* paperF13.pdf
* nbsspecialpublication500-30.pdf
* 140sp7.pdf
* ispab-ltr-to-omb_med_device.pdf
* wakid-kuhn-wallace99.pdf
* hipaa-final-agenda-052013.pdf
* NIST.SP.800-218.SSDF-table.xlsx
* ispab_feb2013_global-policy_enewton.pdf
* 140sp2822.pdf
* 140sp2217.pdf
* Comments-Draft-SP-800-171B-DukeUniversity-2August2019.pdf
* ISPAB October 2020 Minutes Final.pdf
* 140sp435.pdf
* FISSEA-conference-2010_call-for-presentation-Word2007.docx
* 250-253.pdf
* Speakers_Biography.pdf
* 140crt560.pdf
* Lepton.zip
* 140crt1162.pdf
* Bieber-FISSEA-031004.ppt
* 95-rpt.txt
* sp800_78-4_draft.pdf
* Nelson-03-2002.pdf
* 140crt254.pdf
* sp800_185_draft.pdf
* nistspecialpublication800-35.pdf
* 140sp37.pdf
* NewFIPS1402LogoForm.pdf
* fcsm_june2012_cooper_mell.pdf
* NIST.SP.800-140C.pdf
* 140crt931.pdf
* GAGEandInGAGE-Statements.pdf
* sp800-171A-assessment-procedures.xlsx
* Centech-Group.pdf
* ansx963_2001.zip
* PIVCardApplicationCertificate15.pdf
* draft_nist-fips-201-2_revised.pdf
* 140sp3237.pdf
* drbgtestvectors.zip
* 140crt411.pdf
* 140crt653.pdf
* 140sp2752.pdf
* 140crt431.pdf
* twofish-unix-add.tar
* PipelineModewithCounter.zip
* 140crt956.pdf
* 140sp3775.pdf
* rbac-web.ps
* panelC.ZIP
* 140sp3728.pdf
* Day_1_PM_1_Ian_Bryant.pdf
* fissea_2013_contest_winner_motivational_item.pdf
* 140sp3078.pdf
* ispab_ehopkins_april2009.pdf
* LAUTER_HashJuly27.pdf
* 140crt1422.pdf
* guidelines-for-submitting-tweaks-fourth-round.pdf
* 140crt608.pdf
* day2_HIPAA-conference2011-Hardware-Enabled-Security.pdf
* Overview.doc
* 140sp1224.pdf
* 043slide.pdf
* 140sp465.pdf
* test4_27.csv
* IEEEaftm.pdf
* NIST.IR.8459.ipd.pdf
* kat-pqc-dig-sig-page.pdf
* fcsm_august-2015_agenda_final_with_presentation_links.pdf
* draft_sp800_152_comments_received.pdf
* sp800_46r2_draft.pdf
* FIPS140ConsolidatedCertList0023.pdf
* 2018-agenda-june-ispab-meeting.pdf
* 140sp1765.pdf
* o08.pdf
* nistir_8149_draft.pdf
* AURORAUpdate.zip
* fips-197.pdf
* 140sp2556.pdf
* VA- FCSM Conference - Mike Bowman.pdf
* pivcardapplicationcertificate25.pdf
* breaux_nist_pew_07apr14.pdf
* Bellovin_and_Blaze.pdf
* iosp9.txt
* 206.pdf
* massey.pdf
* 2-1Lefkovitz - NIST Privacy Framework Brief.pdf
* 140sp262.pdf
* 140sp1738.pdf
* NIST.SP.800-183.pdf
* 140sp3638.pdf
* cmvp-briefing.pdf
* 1Dennehy.ppt
* Day 1 - 1030am Romine_ISPAB_Oct2022.pdf
* 140sp1293.pdf
* 140sp3284.pdf
* FCSM April 2020-Introduction.pdf
* HealthIT12010.pdf
* day1_mar23_cyber-security-rating-in-auto-industry_jolcott.pdf
* 140sp1345.pdf
* SHAKE128_Msg30.pdf
* sp800-171r2-security-reqs.xlsx
* itlbul2014_02.pdf
* serpent-dos-optc.tar
* 140sp2882.pdf
* Odd-Manhattan-official-comment.pdf
* 137-SCAP-Extensions-Configuration-Manager-Assertion-Statement.pdf
* Forum_Agenda 02(1).15.2022 Curve-DRAFT.pdf
* sp800-160v1r1-fpd-comment-template.xlsx
* CBarker-ISPAB_June2007.pdf
* 18-rweiss.pdf
* 140sp3013.pdf
* draft3.pdf
* 800-53-rev4-controls.csv
* fissea-2015-aho.pdf
* 140sp1308.pdf
* 140sp1722.pdf
* SHA3-256_1630.pdf
* 140sp2280.pdf
* nist_privacy_engr_objectives_risk_model_discussion_deck.pdf
* 140crt558.pdf
* 140sp70.pdf
* IAB-3.pdf
* Component_Legend_186_3ECDSA.pdf
* 140sp1071.pdf
* 1991-14th-ncsc-proceedings-vol-2.pdf
* itlbul2016-05.pdf
* Wednesday-Oleary_InfoSecurityFlatWorld.pdf
* fips140-3-draft-2009.pdf
* 046-048.pdf
* forum-august2015-cherry.pdf
* tinyjambu.zip
* users.pdf
* Federal Register Notice 03.2019-03755.pdf
* FISSEA_2007-final-agenda.pdf
* 140sp4153.pdf
* 140crt530.pdf
* 140sp3518.pdf
* SHA1.pdf
* 140sp3745.pdf
* 140sp3160.pdf
* stppa-03-elaine-PIR.pdf
* 140sp3041.pdf
* FISSEA-Mar2003.pdf
* QAMELEON-Statements.pdf
* pp-attCert-final.pdf
* 140sp2042.pdf
* fissea-2015-waddell.pdf
* 140sp728.pdf
* fips1401.pdf
* itlbul2019-04.pdf
* sp800-57-Part1-revised2_Mar08-2007.pdf
* FCSM CEU Form - Nov 2019.pdf
* 140crt1069.pdf
* 140sp3990.pdf
* 140sp571.pdf
* CSTBNRC-report.pdf
* 140sp2304.pdf
* COMET-official-comment.pdf
* sp80053-focal-elements.csv
* fissea-2015-petock.pdf
* SHA512_256.pdf
* Lizard-official-comment.pdf
* software-certification.pdf
* 140sp1841.pdf
* feb3_fedramp_ispab.pdf
* MCSSHA-3_Comments.pdf
* analyzing-the-leakage-resistance-of-round-2-candidates-lwc2019.pdf
* ATEAS-kuhn-kacker2.pdf
* SHA2_Additional.pdf
* 140crt451.pdf
* new-ascon-implementations.pdf
* presentation-mon-hanatani.pdf
* CMVP2710.pdf
* USGCB-Windows.zip
* panelE4.pdf
* PACS.pdf
* Struik_CCM_comments .pdf
* Comments-Draft-SP-800-171B-CNA-2August2019.pdf
* Procurement-Presentation-12_08_06.pdf
* PIV-Gupta.pdf
* 140crt497.pdf
* fissea_2014_motivational_item_winner_fda_conway_fitzgerald_van_brackle.pdf
* 140sp1667.pdf
* session-4-karl-detailed-report-overhead-hardware.pdf
* 140crt50.pdf
* 140sp2246.pdf
* Zagorski_scv.pdf
* MinR_Bio.pdf
* Dec2004-Way-Ahead-for-CC.pdf
* NIST.SP.800-201.ipd.pdf
* ding-new-attacks-luov.pdf
* change_log_1-2_0_3_0.txt
* csd_execguide-booklet.pdf
* 140crt111.pdf
* Randy_Easter_Jean_Campbell-Welcome_(1).pdf
* FPKI Overlay-v1-SP800-53rev5-April2021.pdf
* Planguide.PDF
* 140crt480.pdf
* 140sp2437.pdf
* S08_State of industry-jp.pdf
* FISSEA2006-FISMA_PhaseII_Overview-Toth.pdf
* JHorlick.pdf
* day3_1015_corrigenda-and-amendments_24727.pdf
* clae-spec.pdf
* itlbul2005-01.pdf
* MCS-PWG 2022-0016_mtg11-minutes_2022May16.pdf
* sp800-56cr1-draft.pdf
* 140sp4251.pdf
* diversity_06272014.pdf
* Carver-FISSEA-031104.ppt
* 033.pdf
* 140crt980.pdf
* cybersecurity-innovation-forum_01-28-2014.pdf
* LUX.pdf
* PRE-Publication-version-SP.800-203.pdf
* ANL-3.pdf
* 140sp322.pdf
* forum_june2013_lchen.pdf
* kamucheka-power-based-pqc2021.pdf
* csf-manufacturing-profile-draft.pdf
* twg-02-22.pdf
* 140crt668.pdf
* 025slide.pdf
* FIPS-180-4-public-comments-aug2014.pdf
* sp800-53r5-draft.pdf
* sp800-56-draft-jan2003.pdf
* 140sp1836.pdf
* 140sp3113.pdf
* RU-consulting-2.pdf
* crclub-2021-side-channels-1.pdf
* 140sp1064.pdf
* 140sp1515.pdf
* Craft.pdf
* forum_june2013_gwilshusen-and-alawrence.pdf
* benchmarking-and-optimizing-aes-for-lwc-on-asics-lwc2019.pdf
* June2005-SCADA-Briefing.pdf
* ispab_falexander-tpolk_april2009.pdf
* 140sp2900.pdf
* 140sp3829.pdf
* 140crt448.pdf
* day-1_mar23_threat-environment_tblauvelt.pdf
* 140sp1747.pdf
* 140crt455.pdf
* 140crt136.pdf
* NIST.IR.8272.pdf
* KNOT-official-comment.pdf
* KeyRecovery-Standard.doc
* 140sp3163.pdf
* sp800_73-4_pt1_draft.pdf
* Draft-LWC-Submission-Requirements-April2018.pdf
* fissea_conf_2013_pailen_byod_panel.pdf
* automated-tools-ross-v5.pdf
* 140sp143.pdf
* o28.pdf
* 140sp1787.pdf
* 140sp2785.pdf
* aesavs.pdf
* nistspecialpublication800-88.pdf
* sp800-53r5-draft-fpd-comment-template.xlsx
* 140crt1048.pdf
* 140sp264.pdf
* BAUMEISTER_NIST_e2e.pdf
* USGCB-RHEL5-Desktop-Settings-Version-1.2.5.0.xls
* ispab_ltr-to-nist_dir_eo_june2013.pdf
* 140sp138.pdf
* IndustryDay-Biometric-Data-Mouli.pdf
* talk-rsa2000.ppt
* 140sp2680.pdf
* test3_27.csv
* LAC-round2-official-comment.pdf
* b-11-06.pdf
* 140sp662.pdf
* 140sp548.pdf
* january-2012_itl-bulletin.pdf
* paperA5.pdf
* 140sp2963.pdf
* PIVStrawmanBriefing.pdf
* 306-308.pdf
* draft-SP800-65.pdf
* FIPS140ConsolidatedCertNov2015.pdf
* grain-128aead.zip
* xie-compact-coprocessor-pqc2021.pdf
* kuhn-modsim09.pdf
* NIST.IR.7957.pdf
* 140sp3095.pdf
* SafeNet.pdf
* Security-overview-012703.pdf
* 140sp3609.pdf
* Impediments-formatted-final-post.pdf
* 140crt812.pdf
* may31_fips201-2-rfinal_hferraiolo-dcooper.pdf
* ssr2016-presentations.zip
* CTR_DRBG_noDF.pdf
* updates-on-isap-lwc2020.pdf
* 056-058.pdf
* 140sp382.pdf
* NIST.SP.800-131Ar2.pdf
* session-2-grobschadl-risc-v-instruction-set-extensions.pdf
* sp800-177_second-draft.pdf
* final-program.pdf
* 140sp2227.pdf
* Tuesday1020-Wrubel.pdf
* sp800-56ar3-draft.pdf
* 140crt907.pdf
* ESTATE-Statements.pdf
* threshold-single-device-talk-nist-20200707.pdf
* Building-a-Cybersecure-Citizenry-and-Workforce.pdf
* Giophantus.zip
* PIVCardApplicationCertificate28.pdf
* 140sp2580.pdf
* 140sp3863.pdf
* sp800-126.pdf
* NSA-AESfinalreport.pdf
* EDON-R.zip
* 140sp1633.pdf
* kat-pqc-dig-sig-page.pdf
* mobile-threats-catalogue.pdf
* AES_GCM.pdf
* 800-53A-R1_Assessment-Cases_AT-Family_ipd.zip
* RQC-official-comment.pdf
* 140crt732.pdf
* sp800-53r5-to-iso-27001-mapping.docx
* day1_trusted-computing_330-420.pdf
* nistir4846.pdf
* 140sp1589.pdf
* 140sp1499.pdf
* 140sp3511.pdf
* NIST.IR.8074v2.pdf
* S17_WLAN-Security-Rationale1-rh.pdf
* 910.pdf
* 02-12-Ross.pdf
* MAUGHAN_NIST IBE - 3June2008.pdf
* draft_nistir_7924_comment_form.doc
* nistspecialpublication800-73-1.pdf
* fissea-2015-ferrillo.pdf
* 140sp3372.pdf
* CMT16verbose.pdf
* 140sp3456.pdf
* KLSW17-M-8X8-GF16-0x13-inv.mat.txt
* 025.pdf
* ispab_feb2013_agency-ig-audit-compliance.pdf
* nist.sp.800-82r2.pdf
* Final-Agenda_FISSEA-2011.pdf
* E_Barker-March2006-ISPAB.pdf
* 140sp1822.pdf
* NIST.IR.8360-draft.pdf
* nist.sp.800-140d.pdf
* NCSC.pdf
* fissea-conference-2012_kurtz.pdf
* ECOH_Comments.pdf
* FIPS1402DTR.pdf
* 140sp1226.pdf
* SIKE-April2018.pdf
* NIST.CSWP.02192014.pdf
* 140crt737.pdf
* KAT_Rainbow_Ia_CompressedCyclic.zip
* FISMA_ICS_Workshop_Description_Agendal.pdf
* ISPAB-Minutes-Dec2003.pdf
* 140crt1203.pdf
* 140sp2536.pdf
* 140crt288.pdf
* 140crt435.pdf
* 140sp3588.pdf
* 140sp2152.pdf
* 140sp2843.pdf
* 140sp2873.pdf
* Talk-FlexibleSymmetricCrypto-meltem-March2018.pdf
* 140crt1261.pdf
* 140crt273.pdf
* nist.sp.800-156.pdf
* sp800-53r5-draft-controls-markup.pdf
* 140sp2683.pdf
* KCL.pdf
* 140crt1280.pdf
* 140sp2459.pdf
* SHAKE256_Msg1630.pdf
* panelC2.pdf
* 140sp3763.pdf
* WhirlwindM0--XOR=183--XLZBZ20.circ.txt
* PIV_Card_Application_FERRAIOLO.pdf
* United-States-Government-Printing-Office.pdf
* 8-051809-erx2.pdf
* Falcon-Statements-final.pdf
* ISPAB_NIST-CSD-Update_DDodson.pdf
* pqcrypto-2016-presentation.pdf
* FISSEA-workshop_November2010-announcement.pdf
* 140sp2674.pdf
* test3_13.csv
* NIST.IR.8344-draft.pdf
* 140crt1399.pdf
* oct22_cgreer_iot_overview.pdf
* 140sp2912.pdf
* Sept-2021-final-agenda-with-links.pdf
* National-Areonautics-and-Space-Administration.pdf
* Jan12-2005-FR-FIPS1403-Notice.pdf
* NIST.SP.800-208.pdf
* Quantum Computin_ Current State and Crytography.pdf
* 140sp1620.pdf
* may31_why-the-beacon_rperalta.pdf
* 140sp2545.pdf
* 140sp2889.pdf
* lotus-aead-and-locus-aead-official-comment.pdf
* DESMMT.pdf
* sp800-172A-assessment-procedures.xlsx
* 140sp1578.pdf
* 140sp303.pdf
* March16_FISSEA-Competency-driven-training-TCinnamon.pdf
* 140sp876.pdf
* 015.pdf
* Holden-Model of KBA.pdf
* SCAP Content Validation Tool for SCAP 1_0 and 1_1.zip
* nistir7682.pdf
* 2012-fissea-contest-winner_newsletter.pdf
* USRP_NIST_Exelon_102215_05.pdf
* lotus-aead-and-locus-aead-spec.pdf
* 140sp8.pdf
* 140sp2798.pdf
* Boisvert_ISPAB_Sept2007.pdf
* tg001.txt
* 140sp2791.pdf
* 140sp2294.pdf
* FISSEA_2008contest_Website-winner.pdf
* 140crt17.pdf
* POPOVENIUC_eTegrity.pdf
* 1979-1st-seminar-proceedings.pdf
* 2_toolchain_lbadger.pdf
* kevans_fissea2010-federal-cyber-workforce.pdf
* NIST.IR.8204-20190426.pdf
* FIPS140ConsolidatedCertList0008.pdf
* fips197-frn.pdf
* nissc97.zip
* FIPS-201.pdf
* ISPAB_DMCA_01_2003.pdf
* sp800_133.epub
* nsaorder.txt
* 140sp1949.pdf
* 140sp592.pdf
* twofish-slides.pdf
* 140crt1217.pdf
* 140sp234.pdf
* 140sp2481.pdf
* nistir7609.pdf
* agenda9806.txt
* SUNDAE-GIFT-official-comment.pdf
* 140sp3241.pdf
* sp800-38gr1-draft-comments-received.pdf
* NIST.SP.800-184.pdf
* ispab_feb2013_global-policy_enewton.pdf
* JSciandra.pdf
* twg-02-16.pdf
* 140sp1446.pdf
* 140crt1339.pdf
* fisseaBR05.pdf
* Program_NIAT2011.pdf
* 140sp572.pdf
* nist-ics1_10-23-2009.pdf
* forum_august2014_belloli.pdf
* itlbul2006-04.pdf
* ispab_ltr_omb_sp800-53rev4.pdf
* fissea-conference-2012_maxson_workforce-framework.pdf
* 140sp2803.pdf
* 140sp682.pdf
* 140sp4034.pdf
* 140sp2377.pdf
* 140sp307.pdf
* agenda-pqc2019-final.pdf
* EDACv2overview.pdf
* Bieber-Brief-FISSEA2006.pdf
* Classic-McEliece-Statements.pdf
* 140sp2520.pdf
* fissea_2013_contest_winner_motivational_item.pdf
* 140sp1824.pdf
* April-2021-final-agenda-with-links.pdf
* FISSEA2017LoganWoodsAntiPhishingPresentationFinal.pdf
* 140sp1996.pdf
* fips-201-3-potential-updates.xlsx
* 140sp3480.pdf
* 140crt1435.pdf
* 140sp614.pdf
* 140sp2337.pdf
* FRA_data.xlsx
* Comments-Draft-SP-800-171B-DARPA-25July2019.pdf
* industry-panel-discussion-pqc-2019.pdf
* 140crt434.pdf
* FISSEA_Ex-Bd-Nomination-Memo-2010.pdf
* nistspecialpublication800-50.pdf
* 140crt809.pdf
* mpts2020-3c2-brief-jack.pdf
* ISPAB Recommendations- Secure Software Configurations DHS March2021 Final.pdf
* nist.sp.800-67r2.pdf
* 140sp2678.pdf
* 320.pdf
* README-for-CSV-sp800-172A-assessment-procedures.txt
* final-report_cyber-risk-portal_umd.pdf
* 140crt648.pdf
* COM100.ppt
* fissea-conference-2012_sadeh.pdf
* kuhn-coyne-weil-10.pdf
* 140sp2615.pdf
* 140sp4036.pdf
* 140sp1800.pdf
* nistspecialpublication500-174.pdf
* draft_sp800-124-rev1.pdf
* 140sp1828.pdf
* 186-3ecdsasiggencomponenttestvectors.zip
* fips1403Draft.pdf
* threshold-one-pager-single-device.pdf
* Orebaugh-FISSEA-031004.ppt
* 140sp2305.pdf
* 140crt271.pdf
* hansen.txt
* twg-04-05.pdf
* 800-53A-R1_Assessment-Cases_MP-Family_ipd.zip
* Yoshida_cameraNistHash.pdf
* 140sp1961.pdf
* b-03-07.pdf
* CRYSTALS-KYBER-official-comment.pdf
* USGCB-Windows-Issues.xls
* Bailey.pdf
* JUNGK_paper.pdf
* PIV-Dodson.pdf
* PIVCardApplicationCertificate17.pdf
* ISPAB-Minutes-March2004.pdf
* revised-draft-fips140-3_PDF-zip_document-annexA-to-annexG.zip
* preprint-iwct-22-cfd.pdf
* Department-of-Veterans-Affairs.pdf
* 140crt919.pdf
* PHunter-TWIC-Stakehldr-BrfX16.pdf
* ipo-nist.pdf
* FIPS140ConsolidatedCertList0003.pdf
* 140sp2984.pdf
* HashCompetition-June2008_BBurr-JKelsey.pdf
* 140crt699.pdf
* twg-04-11.pdf
* NIST.IR.7970.pdf
* Wednesday-SBalderson_BioAbstract.pdf
* felics-ae-lwc2019.pdf
* 140crt1161.pdf
* twg-04-08.pdf
* 140crt125.pdf
* draft-sp800-48.pdf
* Dektor-FISSEApanel-031004.ppt
* FIPS140ConsolidatedCertList0042.pdf
* 140sp2751.pdf
* iapm-tv.txt
* Certifications Enable Transitioning Service Members to Show What They Know_Christopher Bloor_Jeff Felice.pdf
* sp800-63-3-template.xlsx
* ptoth_fissea2010-fisma-phass2-risk-mgmt-training.pdf
* April 2021_030521_0757_signed.pdf
* rbelani_fissea2010-million-phishing-emails.pdf
* nist.ir.8413-upd1.pdf
* TAF-SFT_Flow_Diagram.pdf
* 140sp3067.pdf
* 140sp931.pdf
* 2003-flyer.pdf
* nistir_8062_draft.pdf
* 140sp3014.pdf
* NISTReCur.ps
* 140crt1463.pdf
* Abacus.zip
* gcm-spec.pdf
* a-comprehensive-framework-for-fair-and-efficient-benchmarking-lwc2019.pdf
* cmactestvectors.zip
* March17_FISSEA-Securing-Weakest-Link-JFerron.pdf
* 140sp3791.pdf
* baudron1.pdf
* PM-Protocol-Filtering-FINAL-formatted-e.pdf
* 140sp2024.pdf
* ISPAB-IDManagement-MHymes.pdf
* fissea-conference-2012_curry.pdf
* 140sp3619.pdf
* IBM_131_SCAP_1-2_Implementation_statement_v1-1.pdf
* 140crt281.pdf
* stppa-01-20200127-talk02-Garfinkel-deid-diff-priv.pdf
* stppa-02-panel-slide.pdf
* sp800-171r2-draft-ipd-comment-template.xlsx
* NIST.SP.800-131Ar1.pdf
* 140sp76.pdf
* SCHLAEFFER_paper.pdf
* 140crt262.pdf
* 140sp1136.pdf
* 140sp2510.pdf
* ccm-ad1.pdf
* nist.ir.8401.pdf
* Barker_ISPAB-9-05.pdf
* hyena-round2-official-comment.pdf
* agenda970916.wpd
* 140crt232.pdf
* 140sp2655.pdf
* ron_parson_fips201-2_2015.pdf
* 140crt3.pdf
* nist.sp.800-40r4-draft.pdf
* Workshop-Brief-on-Cyber-SCRM-Vendor-Selection-and-Management.pdf
* day2_research_430-530pt2.pdf
* sp500-169.txt
* 140sp2050.pdf
* 140sp978.pdf
* xcbc.pdf
* 140sp3668.pdf
* MCS-PWG 2022-0011_mtg8-minutes_2022Apr25.pdf
* OCIL_language.pdf
* atkins-requirements-pqc-iot-pqc2021.pdf
* session3-huynh-felics-ae.pdf
* sp800_115.epub
* ispab_april2010_health-it-briefing.pdf
* NIST.SP.800-66r2.ipd.pdf
* Kohno_RMAC_paper.pdf
* 140sp149.pdf
* forum_june2013_jmclaughlin.pdf
* Tuesday100pm-Isaacs.pdf
* 140sp3137.pdf
* Jan2010_securitymetrics.pdf
* LS16-8x8-GF256--XOR=427-rs=7-symp=2.circ.txt
* 140crt1254.pdf
* 140sp3244.pdf
* 140crt1248.pdf
* PIV-Strawman-grance.pdf
* TSE-0172-1003-1.pdf
* 140sp1788.pdf
* m08-22.pdf
* p22.pdf
* fissea2007_diabriefing_krasley.pdf
* NIST.IR.7991.pdf
* Sept2004-CSP-Professional-Program-Dept-of-Ve.pdf
* 140sp751.pdf
* 140sp3131.pdf
* 140crt54.pdf
* 140crt204.pdf
* 140sp1247.pdf
* NIST.IR.8335-draft.pdf
* 140sp2166.pdf
* 140crt841.pdf
* sp800-25.pdf
* NIST.IR.8419.pdf
* science-application-international-corporation.pdf
* KAT_Rainbow_Ia_Classic.zip
* csspab_meeting_minutes_2000-03.pdf
* 980828-jborst.pdf
* GandD-NIST-PIV-implem-workshop-06282005-Rev3.pdf
* federal register notice announcing march 2023 ispab meeting 2023-00529.pdf
* SIKE-round2-official-comment.pdf
* MCSSHA_presentation.pdf
* cfp-cover-sheet-supporting-doc-dig-sig.pdf
* nist.sp.500-304.pdf
* BrowserExtensions-ISPAB.pdf
* paper-MSV.pdf
* NIST-ITL-Science-Day-2021-Poster-Circuits-AC-MD.pdf
* sp800-180_draft_comment-template.xls
* 140sp2865.pdf
* 140sp3089.pdf
* 140sp2328.pdf
* day1_info-sharing_200-250.pdf
* 140sp4192.pdf
* OpenDiscussionTopics-NIST.pdf
* LOTUS-AEAD-and-LOCUS-AEAD-official-comment.pdf
* twg-02-03.pdf
* 140sp2974.pdf
* 140crt1362.pdf
* CSSPAB-Privacy-Report-2002-09.pdf
* 140sp464.pdf
* ispab_jun2014_derived-piv-credentials_ferraiolo.pdf
* 140crt1220.pdf
* Luffa_Comments.pdf
* 140sp3727.pdf
* Arant-Cinnamon-FISSEA-030904.ppt
* paperG1.pdf
* 1980-3rd-seminar-proceedings.pdf
* sp800_181_draft.pdf
* March2003-Computer-Forensics.pdf
* nistspecialpublication500-172.pdf
* DRS-OddManhattan-April2018.pdf
* DualModeMS.zip
* 04-2004.pdf
* nistspecialpublication800-128.pdf
* 140crt1098.pdf
* Poulios-FISSEA2006.pdf
* 140sp3904.pdf
* 140sp3906.pdf
* 1985-8th-NCSC-proceedings.pdf
* bob_mcgraw.pdf
* itlbul2011-10.pdf
* 140sp1879.pdf
* CUI-Plan-of-Action-Template-final.docx
* 015slide.pdf
* twg-02-13.xls
* 140sp3495.pdf
* tg014.txt
* metrics_report.doc
* 140sp679.pdf
* 2006_agenda-ispab-june-meeting.pdf
* 140crt882.pdf
* 140sp3610.pdf
* 254.pdf
* nbstechnicalnote809.pdf
* PIVMiddlewareCertificate13.pdf
* DESTranPlan.pdf
* 800-12_1.ps
* iot-trust-concerns-draft.pdf
* itlbul2010-11.pdf
* gcm-update.pdf
* cyber-security-issues-Dec2008_ISPAB_G-Wilshusen.pdf
* 140sp2628.pdf
* twg-04-04.pdf
* ISPAB Agenda Final(1).pdf
* 140sp1485.pdf
* NIST-ITL-Science-Day-2021-Poster-Beacon.pdf
* 140sp1361.pdf
* figs-KR3.doc
* sp800_157_comments_resolutions.pdf
* 184-187.pdf
* 140sp3943.pdf
* test3_60.csv
* nyberg_gilbert_and_robshaw.pdf
* huv_complexity.pdf
* BARKER_ProposedTimeline.pdf
* 140crt473.pdf
* RBAC-Std-Proposal.pdf
* 140sp2897.pdf
* 140crt170.pdf
* Comments-Draft-SP-800-171B-UniversityofNevadaLasVegas-2August2019.pdf
* 140sp1314.pdf
* SP800-37-rev2-IPD-redline-final.pdf
* P1363-2.pdf
* ispab_jun2014_medical-devices_hoyme.pdf
* agenda-ssr2016.pdf
* gemss-perret.pdf
* 140sp2613.pdf
* 140sp442.pdf
* 140sp3295.pdf
* Len_LaPadula.pdf
* 140sp4031.pdf
* serpent-presentation-bw.pdf
* 800-16.pdf
* Round5-official-comment.pdf
* NIST PrivEng Presentation_to post_2.14.17.pdf
* ipo-nist.pdf
* sp800_84.epub
* public-comments-nistir7977.pdf
* Bieber-Brief-FISSEA2006.pdf
* 140sp726.pdf
* Dec2004-Common-Criteria-Years1993-2008.pdf
* sp800_171r1_draft.pdf
* forum_april2014_automated_assessment_concepts_v1_0.pdf
* 140sp1616.pdf
* AWS_OSCAL_Lessons_Learned.pdf
* aware-inc.pdf
* nbsspecialpublication500-61.pdf
* 140sp4391.pdf
* 318.pdf
* source-code-files-for-kats.zip
* ispab_july09-donelan_tic-external-connections.pdf
* Jeff_Horlick.pdf
* 140sp1962.pdf
* skipjack.pdf
* 907.pdf
* 140sp2852.pdf
* 140sp1855.pdf
* Barker_SP800-60.pdf
* niba79.pdf
* 140crt347.pdf
* 300slide.pdf
* gimli-spec.pdf
* ISPAB December 2021 Minutes .pdf
* nbsspecialpublication500-153.pdf
* day1_security-automation_100-150.pdf
* nist.ir.8060.pdf
* 140crt414.pdf
* 140sp2174.pdf
* NIST.IR.8320.pdf
* sp800-16r1-draft.pdf
* OMB_Policy.pdf
* FISSEA2017_Laura_Lee_Brief-Circadence_June_Update_Reduced.pdf
* NICE- Agenda-Presentation_Ver2.pdf
* 140sp546.pdf
* 140sp2877.pdf
* 140sp995.pdf
* 140sp3729.pdf
* 140sp851.pdf
* fissea09-pmell-day3_cloud-computing.pdf
* Popoveniuc_PaperlessVoting.pdf
* an-open-source-platform-for-evaluatiing-side-channel-lwc2019.pdf
* ATEcontest18.pdf
* gcm-spec.pdf
* MQDSS.zip
* 140sp3140.pdf
* 140crt838.pdf
* FSB.zip
* NIST.IR.8011-2.pdf
* Details44PIVApp.pdf
* 041.pdf
* Jean_Campbell-FIPS_140-3_-_Looking_over_the_horizon(3).pdf
* 140crt1166.pdf
* AESAVS.pdf
* 140sp1623.pdf
* pp-btScardAuthentication-final.pdf
* PM-Protocol-Filtering-FINAL-formatted-e.pdf
* jon-hale-associates.pdf
* fissea-2017-conf_call-for-presentations.docx
* CSSPAB_Minutes_September_2002.pdf
* dod85.pdf
* nistspecialpublication500-157.pdf
* fissea-conference-2012_hong.pdf
* picnic-round3-official-comment.pdf
* kuhn-98.pdf
* itlbul2014-01.pdf
* ecccdhvs.pdf
* sp800-63-v1-0.pdf
* KELSEY_new-attack-tools-primer.pdf
* itlbul2010-06.pdf
* SHAvite-3.pdf
* physecpre03.ppt
* Federal Register Notice December ISPAB.pdf
* sp800_154_draft_comment-template.xls
* PIV-I-dodson.pdf
* 140crt349.pdf
* 140sp3676.pdf
* test3_60.csv
* Coulson-tues1030.ppt
* The-Threats-That-Concern-Us-Most.pdf
* ispab-meeting-minutes-march-2017.pdf
* SS17-8x8-GF16.mat.txt
* FebConsolidated.pdf
* sp800-56cr1-draft.pdf
* 3.pdf
* SIMfill-1_2_1-distrib.zip
* 140sp3869.pdf
* CUI-Plan-of-Action-Template-final.docx
* Program_SHA3_2009.pdf
* 140sp1309.pdf
* FISSEA2007-poster-winner.pdf
* bio_eroback_ispab.pdf
* 140sp2175.pdf
* 09_Jaffe.pdf
* 366-367.pdf
* ascon-changelog-final.pdf
* 140crt163.pdf
* 093-096.pdf
* December-2011_ITL-Bulletin.pdf
* NewHope-round2-official-comment.pdf
* nissc3.pdf
* 140sp260.pdf
* 140crt1335.pdf
* sp800-179r1-draft.pdf
* 140sp3580.pdf
* test4_11.csv
* MobileDeviceSecurity.pdf
* NIST.SP.800-210.pdf
* comments-3.zip
* 1_secure-engineering_rross.pdf
* fissea09-oleary-day3_la-traffic-knowledge-malice-chaos.pdf
* shamash-shamashash.zip
* pivmiddlewarecertificate19.pdf
* ISCMAx-Recommended-Judgements.zip
* forum_august2014_scholl.pdf
* Round5-Statements-Round2.pdf
* 140sp1168.pdf
* Harvard_Linux Presentation for Information Security and Privacy Advisory Board on March 3.pdf
* 140crt1207.pdf
* FISSEA-Monday1500ACarverpart2.pdf
* 140sp3804.pdf
* Fall2019 draft as of sept 4.pdf
* Proposed-Changes-to-SP-800-73.pdf
* 140sp3661.pdf
* 21.pdf
* 140sp3413.pdf
* 2_iot_jvoas.pdf
* 140crt550.pdf
* 2-4Kerman - Zero Trust Architecture - NCCoE - 2019 - ISPAB.pdf
* draft_sp800-94-rev1.pdf
* FALCON-round3-official-comment.pdf
* 140sp1777.pdf
* PIVMiddlewareCertificate17.pdf
* WorkshopFlyer-halfday-sample.pdf
* 20000514-mbondarenko.pdf
* summary-of-comments_NISTIR7977-Jan-2015.pdf
* 140sp2804.pdf
* 140sp3165.pdf
* session-1-sphincs-plus-hulsing.pdf
* ACE-Statements.pdf
* Component_Legend_SP800_56B_RSADP.pdf
* C_Barker-Dec2005-ISPAB.pdf
* sp800-171r2-security-reqs.xlsx
* PIV-Polk.pdf
* 140sp1751.pdf
* 140sp576.pdf
* ecdsa2vs.pdf
* 140sp3598.pdf
* itlbul2016_01.pdf
* sp800-56ar3-draft.pdf
* hamburg-tighter-proofs.pdf
* 140sp3056.pdf
* 140sp174.pdf
* FCSM_CAB_Operational_Assurance_ISCM.pdf
* 140crt367.pdf
* TACReport-Recommend.doc
* April2011-ITL-Bulletin.pdf
* ISPAB_NCS_SMcDonald.pdf
* CubeHash_Comments.pdf
* sp800-53A-rev1-final.pdf
* SHERMAN_FINK_SecurityPanel.pdf
* 140sp1966.pdf
* eax-prime-ip.pdf
* 140sp714.pdf
* 140crt1040.pdf
* DOD-Strategy-for-Operating-in-Cyberspace.pdf
* 140sp3251.pdf
* 140sp721.pdf
* LEDApkc-Statements.pdf
* ispab_meeting_minutes_december2013.pdf
* CoreStreet.pdf
* SciDay2019-poster-crypto-standards.pdf
* itlbul2017-04.pdf
* 140crt236.pdf
* iosp7.txt
* 140sp2026.pdf
* twg-02-13.xls
* sp800_90a_r1_draft.pdf
* itlbul2012-08.pdf
* NIST.IR.8374-draft.pdf
* 140sp2622.pdf
* 140sp880.pdf
* 140sp3544.pdf
* SHA3_March2012_Presentations.zip
* FISSEA-2003-Wilson.pdf
* day-1_mar23_threat-environment_tblauvelt.pdf
* 140sp263.pdf
* test4_10.csv
* 140sp1649.pdf
* mwilson_fissea2010-panel-significant-responsibilities-draft-itl-bulletin.pdf
* 140sp2415.pdf
* WBarker-Metrics_ISPAB0307.pdf
* raynal-pq-wireguard-pqc2021.pdf
* Round2-April2018.pdf
* sp800-207-draft2-comment-template.xlsx
* 140crt694.pdf
* Department-of-Veterans-Affairs.pdf
* 140sp2889.pdf
* NSA-AESvhdlmodels_tar.gz
* zegar_mike_day2_1115_panel_njhitec.pdf
* sp800-191-draft-comment-template.xlsx
* Koontz_Dec_2003.pdf
* 140sp1455.pdf
* NIST.TN.2051.pdf
* march2009_cryptographic-hash-algorithm-family.pdf
* 140sp347.pdf
* test3_10.csv
* forum_aug2013_rross.pdf
* detailed-report-overhead-hardware-lwc2020.pdf
* FIPS 140-3 IG.pdf
* PIVCardApplicationCertificate33.pdf
* nistir7658.pdf
* fips180-3_final.pdf
* CarverFISSEA.ppt
* 140sp2679.pdf
* pivmiddlewarecertificate4.pdf
* Roger_Westman.pdf
* TrinketWinner-NativeIntelligence-2006.pdf
* day1_HIPAA-conference2011-Plenary-OCR-Reg-Update.pdf
* 140sp1928.pdf
* NIST.IR.7904.pdf
* 140sp1268.pdf
* 140sp2551.pdf
* using-attack-graphs-forensic-examinations.pdf
* Meeting Minutes Final March 2019.pdf
* 140sp538.pdf
* 140sp2949.pdf
* 140crt1029.pdf
* tg019.txt
* WG8.rtf
* 2012_agenda-ispab-october-meeting.pdf
* 140crt364.pdf
* 140sp2741.pdf
* ffx-spec2.pdf
* test3_19.csv
* FISSEA-Workshop-Dec2004.ppt
* Ferguson-FISSEA-031004.ppt
* cps-workshop-agenda_04-03-2012.pdf
* FIPS140ConsolidatedCertList0002.pdf
* 140sp3838.pdf
* 140sp3096.pdf
* draft-nistir-7823_comment-form.docx
* 140sp2718.pdf
* Smith-FISSEA-031104.ppt
* faq-categorize-step1.pdf
* PIV-Dray.pdf
* tinyjambu_update_20200918.pdf
* forum_december2014_einstein_3a.pdf
* 140sp31.pdf
* NTRU-Prime-Statements.pdf
* NIST-CapPlanning-Wkshp-Final.pdf
* 140sp3940.pdf
* 140crt538.pdf
* 140sp2544.pdf
* NIST.IR.8228-draft.pdf
* govCAR Threat Based Approach to Cybersecurity Architecture Review - Bokan.pdf
* Lefkovitz-N_NSTIC_ISPAB.pdf
* Bellingham_Case_Study_report 20Sep071.pdf
* DRBG_ANSI_X9-31.pdf
* test4_12.csv
* 140sp3283.pdf
* NIST.SP.800-161r1-draft.pdf
* SPRING_2017_final_agenda_for_web.pdf
* 140sp3128.pdf
* 140sp4198.pdf
* 140crt55.pdf
* 140crt661.pdf
* 15-tichikawa.pdf
* gaj.pdf
* Gordon-Info Based Identity.pdf
* twg-04-12.pdf
* 140sp2658.pdf
* PIV-Dray.pdf
* aes3cfp-cr.pdf
* FEA-Security-Profile-PhaseI-FINAL_07-29-04.pdf
* FIPS140ConsolidatedCertSept2016.pdf
* 140sp314.pdf
* Bailey.ppt
* ISPAB-Minutes-Dec2003.pdf
* mouli_sp800-79-2_new_status_update_fips201-2_2015.pdf
* 140sp3570.pdf
* 140sp312.pdf
* nbstechnicalnote876.pdf
* fissea-abernat.ppt
* KLSW17-M-8x8-GF256-inv--XOR=368-rs=21-symp=2-2.circ.txt
* hmactestvectors.zip
* sp800_150_second_draft_comment-template.xls
* 140sp4015.pdf
* CMAC-comments.pdf
* p32.pdf
* 140sp3836.pdf
* 140sp3786.pdf
* HALEVI_UpdateonRandomizedHashing0824.pdf
* Second-Workshop-Announcement.doc
* 140sp860.pdf
* 140sp108.pdf
* itlbul2015-10.pdf
* FIPS140ConsolidatedCertSept2016.pdf
* bernstein-session-6-paper-pqc2019.pdf
* intermediate-values-2048.pdf
* 140sp2855.pdf
* Bio-Popwcyz-ISPAB.pdf
* 140sp2814.pdf
* nistspecialpublication800-27.pdf
* 140crt161.pdf
* NIST.IR.8183.pdf
* 140sp1859.pdf
* FIPS140ConsolidatedCertList0034.pdf
* physecpre18.ppt
* Trinket-Winner-NativeIntelligence-FISSEA-contest.pdf
* session-6-ntruprime-bernstein.pdf
* FIPS140ConsolidatedCertList0054.pdf
* require5.ps
* sandi_opening.pdf
* twofish-unix-optj.tar
* 2013_agenda-ispab-december-meeting.pdf
* 140sp3748.pdf
* sp800-171r1-excerpt.pdf
* test4_19.csv
* sp800-102.pdf
* call-for-proposals-dig-sig-sept-2022.pdf
* Sept2004-CSP-Professional-Program-Dept-of-Ve.pdf
* Secure-Software-Education-Initiatives.pdf
* 140sp2260.pdf
* 140crt1243.pdf
* 140sp3004.pdf
* ispab_feb2013_fisma-metrics_dwaltermire.pdf
* ccmtestvectors.zip
* 140sp427.pdf
* 140sp3023.pdf
* 140sp2112.pdf
* 140crt195.pdf
* 140sp1407.pdf
* 140sp2841.pdf
* sp800_30_r1.epub
* 140sp2116.pdf
* sandhu-ferraiolo-kuhn-00.pdf
* nbsspecialpublication500-21v1.pdf
* Statement by Patent Owners.doc
* 140sp1041.pdf
* twg-04-01.pdf
* 140sp3482.pdf
* 140crt1156.pdf
* arirang.pdf
* yarara-coral.zip
* Randy_Easter-ISO_(4).pdf
* 140sp2212.pdf
* ispab_june-10_realignment_ddodson.pdf
* 140sp2457.pdf
* Wade-06-2002.pdf
* 140sp111.pdf
* day2_research_430-530pt1.pdf
* Details47PIVApp.pdf
* draft_sp800_90a_comments_received.pdf
* 140crt1046.pdf
* letter-to-nist-from-ispab-07202017.pdf
* minutes6-98.txt
* itlbul2005-08.pdf
* Consumer_IoT_Labeling_Focal_Document_Final.xlsx
* 2015_agenda-ispab-june-meeting.pdf
* security-proof-ORANGE-Zest-lwc2019.pdf
* sp800-70r4-draft.pdf
* 140crt725.pdf
* 140crt398.pdf
* ikev2.zip
* fissea2010_website-winner-entry-form.pdf
* NIST.SP.800-70r3.pdf
* kuhn-intro-mse-nist.pdf
* sp800-57pt1r4_draft_track_changes_from_rev3_to_rev4.pdf
* nistir-7692.pdf
* 140sp804.pdf
* Cybersecurity Training for the DoD Workforce with a Limited Budget_Fred Bisel.pdf
* security-proof-of-mixfeed-lwc2019.pdf
* 140sp3701.pdf
* 140crt1132.pdf
* sparkle-spec-final.pdf
* 140sp2150.pdf
* talk-keymgmt00.ppt
* cloud-computing-standards_ISPAB-Dec2008_P-Mell.pdf
* 140sp2382.pdf
* oval-schematron-rules.zip
* DME-statements.pdf
* may31_why-the-beacon_rperalta.pdf
* christopher-columbus-foundation.pdf
* lotus-locus.zip
* Dec2004-Email-ID-Theft-Phishing-Spam.pdf
* 140sp1670.pdf
* 140sp1114.pdf
* nistir-8432-ipd-comment-template.xlsx
* 230-233.pdf
* PIV-Broghammer.pdf
* 140sp2924.pdf
* JPST17-4x4-GF16--XOR=40-rs=217-nd=4-2.circ.txt
* FCSM-Forum-021011-NIST-Security-Automation-Banghart.pdf
* 140sp2376.pdf
* Mersenne-April2018.pdf
* nistir_7977_draft.pdf
* sp800_116_r1_draft_comment_template.xls
* NewHope-round2-official-comment.pdf
* PReitinger-Bio.pdf
* 140sp144.pdf
* 140sp2648.pdf
* 140sp3636.pdf
* 140crt210.pdf
* 140crt753.pdf
* 140sp1796.pdf
* 140sp3688.pdf
* Simple-spec.pdf
* 140sp337.pdf
* itlbul2015_02.pdf
* 140sp730.pdf
* itlbul2014-10.pdf
* 140crt991.pdf
* schi75.pdf
* FISSEA-btafoya.ppt
* 140sp470.pdf
* sp800-140c-draft.pdf
* Edon-R-Presentation-04-pdf-friendly.pdf
* sp800_78-4_2014_draft_comments_and_dispositions.pdf
* 244.pdf
* sp800_85b-4_draft.pdf
* sp800_171r1_draft_markup.pdf
* cui-ssp-template-final.docx
* 140sp161.pdf
* Kelsey_SHA-256_Panel.pdf
* entrust.pdf
* EPSTEIN_NextSteps_panel.pdf
* fips1402DTR.pdf
* 140sp3363.pdf
* 140sp3334.pdf
* sp800-152_third_draft.pdf
* new-results-ForkAE-lwc2020.pdf
* twg-02-14.pdf
* March2005-RFID-BriefingII.pdf
* 140sp3962.pdf
* 140sp1786.pdf
* itl97-02.txt
* PKITS_data.zip
* SteinD_Bio.pdf
* sp800_154_draft_comment-template.xls
* PKITS_v1_0_0.pdf
* C-Furlani-June06.pdf
* Cybercash-comments.doc
* workshop-notice.pdf
* CallSpeakers-NIST-Public-Workshop.doc
* 140sp1427.pdf
* March16_FISSEA-improvecust-service--JOLeary.pdf
* fips201_evaluation_program_temoshok.pdf
* 012.pdf
* subterranean.zip
* 140sp3183.pdf
* Rijndael-ammended.pdf
* 140sp1880.pdf
* 140crt572.pdf
* 140sp1357.pdf
* hyena_update.pdf
* HQC-Round2.zip
* SPIES-ibe-panel.pdf
* Spook-Statements.pdf
* PIVCardApplicationCertificate8.pdf
* SIV-Rijndael256-Statements.pdf
* nistir_8085_draft.pdf
* 140sp1605.pdf
* 140sp2344.pdf
* t12.pdf
* Program_SHA3_Aug2010.pdf
* Fred-Schneider-Bio.pdf
* ispab-minutes-october-2017-meeting.pdf
* 140sp3653.pdf
* 140sp2130.pdf
* ferraiolo_piv_card_specification_update_fips201-2_2015.pdf
* NIST.FIPS.197.pdf
* FISSEA 2020_NCSA CybersecurityAwarenessMonth-final.pdf
* itlbul2018-09.pdf
* sp800_188_draft.pdf
* nistspecialpublication800-102.pdf
* analysis-of-practical-application-of-lwc-cryptographic-algorithm-ascon.pdf
* 140sp3281.pdf
* serpent-unix-optj.tar
* 140sp2424.pdf
* forum_august2014_paulsen.pdf
* KNOT_Update.pdf
* PQCrypto-April2018_Moody.pdf
* 95-rpt.txt
* 140crt516.pdf
* sp800-60v1-final.pdf
* nist.ir.7896.pdf
* 140crt771.pdf
* Bio-Chenok-ISPAB.pdf
* 140sp1950.pdf
* D_Hurley-Dec2005-ISPAB.pdf
* nistspecialpublication800-38a.pdf
* nistspecialpublication800-51.pdf
* FISSEA-GovLoop-July2010.pdf
* 140sp2749.pdf
* 140sp2845.pdf
* 140sp2091.pdf
* kobza_day2_115_nh_isac_nist.pdf
* 1-3a-breach-notification-heide-ocr.pdf
* 140crt1003.pdf
* NIST.SP.1800-15.pdf
* 140crt810.pdf
* NIST.IR.8276-draft.pdf
* Xoodyak-Statements.pdf
* 140crt814.pdf
* SchrotterF_Bio.pdf
* 140crt1262.pdf
* ispab-meeting-minutes-october-2016.pdf
* fissea_2014_stine.pdf
* forum_june2013_vpillitteri.pdf
* 140sp1856.pdf
* 140sp1191.pdf
* DOT efforts for PNT in EO 13905 Van Dyke.pdf
* 920slide.pdf
* McNie-April2018.pdf
* Jul14_LIN-H_market-incentives-for-cybersecurity.pdf
* test3_26.csv
* Lesamnta_12Feb2009_NIST_1stRound.pdf
* 140sp3143.pdf
* 30-jsoto.pdf
* Safenet-Inc.pdf
* 140sp1395.pdf
* 140crt206.pdf
* march2010_sp800-37rev1.pdf
* 140sp2825.pdf
* 140sp2504.pdf
* o16.pdf
* 140sp1177.pdf
* 140sp3643.pdf
* 140sp1768.pdf
* 140crt18.pdf
* sp800-63b-draft.pdf
* itlbul2016-07.pdf
* duman-faster-kyber-pqc2021.pdf
* fips180-2withchangenotice.pdf
* DAGS-official-comment.pdf
* fissea-FISMA-030603.pdf
* SigVer931IRTest.txt
* Final2Agenda ISPAB Meeting March 2019(002).pdf
* 140sp1806.pdf
* test3_30.csv
* Tuesday200pm-Bower.pdf
* draft_sp_800_152_2nd.pdf
* 140sp2265.pdf
* sp800_73-4_pt3_revised_draft.pdf
* 140sp2992.pdf
* 140crt1432.pdf
* Arant-Cinnamon-FISSEA-030904.ppt
* WG5-0298.txt
* CMVP2607.pdf
* 140sp1938.pdf
* mpts2020-2c4-brief-ronald.pdf
* 140crt68.pdf
* 140sp2888.pdf
* ComCoverage110130.pdf
* j45nec.pdf
* 140sp310.pdf
* thursday-rayer_role-basedtraining.pdf
* 140sp562.pdf
* session-9-hess-fast-quantum-safe.pdf
* 140crt1099.pdf
* ISSPM_Slide-8_Training Course FISMA-NIST Section.pdf
* statement-patent.docx
* Day 2 - 1030am Temoshok-Galluzzo-LaSalle Digital Identity Update.pdf
* 140crt968.pdf
* 140sp976.pdf
* FISSEA_Oct2005_Workshop-flyer.pdf
* session-2-charles-review-of-white-box-encodability-of-nist-lightweight-finalists.pdf
* MENNINK_paper.pdf
* xoodyak.zip
* 140crt949.pdf
* SHA3-224_Msg0.pdf
* 140sp2070.pdf
* KLSW17-M-8x8-GF256--XOR=364-rs=25-symp=2-2.circ.txt
* saturnin-spec-round2.pdf
* ISPAB Recommendation June 2020- Meeting.pdf
* 134-Security-Content-Automation-Protocol-Compliance.pdf
* jan_2020_final_agenda_with_links.pdf
* espitau-mitaka-pqc2021.pdf
* FCSM Offsite Agenda - FINAL 5-7-2019.pdf
* barbir_thibeau.pdf
* ZOHNER_paper.pdf
* tasso-resistance-isogeny-based-crypto-pqc2021.pdf
* NTRU-Prime-Round3.zip
* 140sp1017.pdf
* lind76.pdf
* itlbul2015-03.pdf
* 140sp3135.pdf
* agenda09-99.txt
* daemen.pdf
* HMAC_SHA3-384.pdf
* TW.FCSM conf.option PPT final - Tammy Whitcomb.pdf
* feb1_mobility_lchen.pdf
* feb2012_nist-sp-800-63-1_newton-perlner.pdf
* 140crt685.pdf
* 140sp2194.pdf
* 140sp939.pdf
* S09_WPA Analyst Briefing 05-part1-ff.pdf
* 140sp3144.pdf
* 140sp2592.pdf
* HotelReservationForm.pdf
* 140sp350.pdf
* nistspecialpublication800-52.pdf
* 140sp584.pdf
* sp800_164_draft.pdf
* 140sp2731.pdf
* 140sp1221.pdf
* 081-085.pdf
* DRBGVS.pdf
* 140sp3555.pdf
* pcfb-spec.pdf
* nistspecialpublication800-24.pdf
* day1_HIPAA-conference2011-securing-info-Cloud.pdf
* 140sp1798.pdf
* NIST.IR.8259-draft2.pdf
* 140sp1117.pdf
* Keccak.zip
* 140sp3972.pdf
* 140crt234.pdf
* Thursday-PToth_abstractbio.pdf
* Orebaugh-FISSEA-031004.ppt
* Sept2002-Liberty-Alliance-Project.pdf
* stppa-03-panel-topics.pdf
* 140sp3606.pdf
* 140sp3127.pdf
* session-3-reza-hardware-deployment.pdf
* 140sp2906.pdf
* S06_Boeing-stw.pdf
* oct23_csric-on-framework_seader.pdf
* ISPAB Final3 Agenda - Sept2021.pdf
* sp800_57_pt3_r1_draft.pdf
* nistir7387.pdf
* 140sp564.pdf
* slides-ocb-talk.pdf
* iosp14.txt
* 140sp1084.pdf
* 140sp563.pdf
* PKICON20b.doc
* panelE7.pdf
* 140sp4008.pdf
* 140sp2888.pdf
* abstract-krasley.pdf
* KoehlerM_Bio.pdf
* 140sp1397.pdf
* physecpaper08.pdf
* gilligan.ppt
* Abstract-Clark.pdf
* 140crt798.pdf
* rmac-spec.pdf
* fcscope.txt
* august-2012_itl-bulletin.pdf
* Murphy_XTec-Presentation-NIST-Final.pdf
* sp800_168_draft.pdf
* oct26-2011_cybersecurity-awareness_BNewhouse.pdf
* omac-tv.pdf
* nistir7559.pdf
* WebSrcRelease-02152005.tar
* nbsspecialpublication404.pdf
* QPL_LegacyBIO.tar.gz
* 140sp765.pdf
* nist_cryptographic_standards_process_review.pdf
* 140sp1005.pdf
* xccdf_1.1.4_to_1.2_converter.zip
* ntru-hrss-kem-April2018.pdf
* PIV_Validation_Chandramouli.pdf
* 140sp1050.pdf
* 140sp2980.pdf
* Strain-FISSEA-031004.ppt
* bio_steve_lipner_ispab.pdf
* SHA3_Aug2010_Presentations.zip
* Federal_Cybersecurity_and_Privacy_Forum_1Sept2022_VA_CyberNextGen.pdf
* 140crt1149.pdf
* 140crt375.pdf
* SHA3-256_Msg0.pdf
* fissea_2014_peers_choice_poster_winner_dept_education_coleman.pdf
* king_matt_fpkipa_derived_piv_policy_fips201-2_2015.pdf
* 140sp911.pdf
* 140sp2198.pdf
* dff-ff2-fpe-scheme-update.pdf
* physecpre02.pdf
* Fish, Guerrilla, and Other Marketing Tactics to Drive Awareness _Tomm Larson.pdf
* 140sp2479.pdf
* iosp8.txt
* Clark-Tues1110.ppt
* 140sp1742.pdf
* x-tec.pdf
* 140crt180.pdf
* agenda06-99.doc
* 140sp3452.pdf
* sp800-37r2-draft-fpd.pdf
* 140sp1760.pdf
* A_Giles-March2006-ISPAB.pdf
* Draft-NISTIR-7800.pdf
* 140sp87.pdf
* ispab_feb2013_gaos-view-of-fisma_alawrence.pdf
* faq_monitor-step6.pdf
* frog-slides.pdf
* 140sp4019.pdf
* iosp10.txt
* 140sp2820.pdf
* sp800-172a-draft-comment-template.xlsx
* Bio-LReis.pdf
* 10_Katashita.pdf
* FISSEA Contest Security Newsletter 2020.pdf
* 140sp387.pdf
* 2016_agenda-ispab-october-meeting.pdf
* carr_ruth_day2_1115_panel_ocr_nist_conf_hie_security.pdf
* statement-submitter.docx
* nistir-8214-diff-comments-received.pdf
* 140sp4023.pdf
* 140crt1352.pdf
* EnRUPT.zip
* KAT_Rainbow_IIIc_Cyclic.zip
* kuhn-owasp-oct05.pdf
* 230.pdf
* 20000511-emang-2.pdf
* nistspecialpublication800-125.pdf
* Draft_Revised_SP800-107.pdf
* 140sp4014.pdf
* ECDSAVS.pdf
* Classic-McEliece-round3-official-comment.pdf
* SKOP15-8x8-GF256-inv.mat.txt
* JdeFerrari-Privacy-ISPAB_June2007.pdf
* 140sp2257.pdf
* 140sp3178.pdf
* Email_Announcing_Round2_Candidates.pdf
* 140sp1160.pdf
* 03-06-Sherald.pdf
* sp800-32.pdf
* 140sp993.pdf
* CTST20025.pdf
* FALCON-round2-official-comment.pdf
* nist.ir.7870.pdf
* Agenda-HIPAA-2008.pdf
* session-5-panel-pqc-dnssec.pdf
* REDISH_E2E panel_10_09.pdf
* structural-classification-lwc2020.pdf
* nist.ir.7823.pdf
* 140crt1299.pdf
* December 2019 ISPAB Meeting Minutes Final.pdf
* security-proofs-for-oribatida-lwc2019.pdf
* macleod_fips-2_2015.pdf
* photon-beetle.zip
* 140sp393.pdf
* test4_12.csv
* agenda12-99.doc
* 140crt746.pdf
* fissea09-pkrasley-day3_self-directed-training-cyber-world.pdf
* kiran-icst-2012.pdf
* 140sp3769.pdf
* 140sp3815.pdf
* b-09-06.pdf
* 140crt784.pdf
* qsg_monitor_management-perspective.pdf
* Thornton - EAuthentication Guidance.pdf
* s09_wpa analyst briefing 05-part1-ff.pdf
* 140sp2948.pdf
* 140sp719.pdf
* 140crt43.pdf
* Masked-Circuits-call-feedback-2021.pdf
* 140crt1087.pdf
* 140sp375.pdf
* agenda9712.txt
* 140sp1112.pdf
* session-5-atkins-requirements-pqc-iot.pdf
* presentation-mon-chen.pdf
* 140sp3033.pdf
* 140crt594.pdf
* xccdf_1.2.zip
* 140sp1387.pdf
* 140crt1037.pdf
* sp800-172-enhanced-security-reqs.xlsx
* 140sp2578.pdf
* 140sp1418.pdf
* 140sp3049.pdf
* 23-adandalis.pdf
* KINDI-Statements.pdf
* ISPABAgenda Final2- Mar22.pdf
* 3-051908-vmh-case-study.pdf
* 140crt545.pdf
* PipelineModewithCounter.zip
* minutes9612.txt
* itlbul2014-03.pdf
* Human-Side-Info-Security.pdf
* CFPKM-official-comment.pdf
* monitor_roles-and-responsibilities-step6.pdf
* 140sp3675.pdf
* 140sp2568.pdf
* 140sp3200.pdf
* 140sp457.pdf
* clapp.pdf
* nbstechnicalnote906.pdf
* Ding_LWE_Key_Exchange.zip
* 140crt657.pdf
* PIV_Interface_Testing_Final.pdf
* 140sp3862.pdf
* NSA-2.pdf
* 140sp2103.pdf
* oct27-2011_FCC-cybersecurity-exec-summary_RNaylor.pdf
* 140crt721.pdf
* XTS_comments-Ball.pdf
* agenda_v3.pdf
* 140sp859.pdf
* fissea09-mgupta-day3-panel_process-program-build-effective-training.pdf
* 140sp3761.pdf
* 140sp3941.pdf
* 140sp874.pdf
* nistir7536.pdf
* sp800_78-4_2014_draft_comments_and_dispositions.pdf
* draft-sp-800-76-2_revised.pdf
* clae.zip
* fissea-conference-2012_tzoumas_and_murray.pdf
* forum_june2013_hbooth.pdf
* fissea2010_vendor-exhibition.pdf
* NTRU_Prime.zip
* Brainbench-Certification-Panel.pdf
* 140sp2325.pdf
* twg-04-02.pdf
* CommentsSP800-57-1.pdf
* Securing-Auditing-VirtualOffice-Networks.pdf
* UlfMattsson-Practical- IPS-Enterprise-Databases.pdf
* csic_comments_nzitf.pdf
* 140sp840.pdf
* tutorB6.pdf
* Collier.ppt
* 140sp3538.pdf
* Recor-Wed1110.ppt
* oct21_hatipoglu_cyber nhtsa.pdf
* 140sp1818.pdf
* 256.pdf
* final-ispab-minutes_april2009.pdf
* FISSEA2006-Hash.pdf
* 20101219_RBAC2_Final_Report.pdf
* physecpaper10.pdf
* fissea-conference-2012_cohen_panel.pdf
* 140sp3349.pdf
* 140sp2874.pdf
* r1-rand.pdf
* poster-circuits-2019.pdf
* ISPAB-final-minutes_Dec2007.pdf
* fips140consolidatedcertlist0042.pdf
* 140sp1766.pdf
* 140sp3286.pdf
* 140crt303.pdf
* paper-LJYM.pdf
* Sung_FORK-256.pdf
* nistspecialpublication800-73-1.pdf
* 140sp2993.pdf
* sp800_56a_r2_comments_received.pdf
* Talk-SILC2021-Final-Round-Lightweight-Meltem-Oct2021.pdf
* 241-245.pdf
* FISSEA2011_website-winner.pdf
* 12_Standaert.pdf
* oct27-2011_NVD_JBanghart.pdf
* q-crypto-030613.pdf
* pubfrmrev.txt
* 140sp1204.pdf
* Stern-FISSEA-030904.ppt
* 140crt89.pdf
* 140crt1376.pdf
* NIST.sp.800-162.pdf
* benchmarking-software-implementations-lwc2019.pdf
* nistir_8060_second_draft.pdf
* 140sp129.pdf
* FIPS140ConsolidatedCertMay2016.pdf
* FISSEA-Contest-Entry_Poster_2017KRudolphandFriends.pdf
* ACPT-UARK-source.zip
* 2012-fissea-contest-winner_newsletter.pdf
* 800_38_series_052914.pdf
* nist.ir.8014.pdf
* Cogent-Systems.pdf
* ocb.pdf
* Grostl_Comments.pdf
* paperE3.pdf
* session-3-chang-a-new-conditional-cube-attack-on-reduced-round-ascon-128a.pdf
* 140crt656.pdf
* 140sp593.pdf
* 5.pdf
* Final.ISPABNov.pdf
* 140sp2876.pdf
* nistir_8149_draft_comment_matrix.xls
* fissea_conf_2013_12_key_metrics_murray.pdf
* sp800-53-collaboration-index-template.docx
* sp-800-63-1.pdf
* profiles-lwc-std-proc-draft.pdf
* 140sp2528.pdf
* NIST-SP-800-106.pdf
* 140sp3311.pdf
* 140sp4282.pdf
* 140sp2906.pdf
* SP800-142-101006.pdf
* 3_software-assurance_pblack.pdf
* glossary-etc.pdf
* hallam-baker.pdf
* WATANABE_cr_criteria.pdf
* fissea-2015-willis-ford.pdf
* 140sp2384.pdf
* fissea-conference-2012_quagliata.pdf
* stppa-02-MPC-lu-ostrovsky.pdf
* elephant-changelog.pdf
* 140sp647.pdf
* 140sp1039.pdf
* NIST.IR.8219.pdf
* Identity-Proofing-Dodson.pdf
* virtualization-govt-adoption_ISPAB-Dec2008_J-Sorrells.pdf
* ISPAB-KStouffer.pdf
* 140sp106.pdf
* 140sp2929.pdf
* fissea-conference-2012_koehler.pdf
* nist.sp.800-181.pdf
* rijndael-ip.pdf
* March17_FISSEA-Certifications-GBieber.pdf
* Teaching Cyber Security to Lawyers_Scott Aurnou.pdf
* Cryptographic_Capabilities_COOPER.pdf
* mispcv1.doc
* RNGStrategy.pdf
* 140sp1753.pdf
* RSA-statement_10-17-06_.pdf
* feb2_marzullo_nsf-csia-rd-strategic-plan.pdf
* FIPS140ConsolidatedCertList0052.pdf
* 140sp2867.pdf
* sp800-57pt1r4_comments_received.pdf
* 140sp1000.pdf
* engineer-check.doc
* 143_Vendor_Assertion_Document.pdf
* Resolution98-1.txt
* 140sp2687.pdf
* 140crt896.pdf
* FISSEA2007-Web-Entry.pdf
* 140sp4045.pdf
* LAC-Round2.zip
* itlbul2013_03.pdf
* Anubis-ClefiaM0.mat.txt
* twg-02-06.pdf
* SIKE-Statements-Round2.pdf
* sp800_90c_second_draft_comment_template.docx
* 140sp3386.pdf
* 140sp282.pdf
* 140sp3498.pdf
* best-practices-privileged-user-piv-authentication.pdf
* cryptanlysis-of-internal-keyed-permutation-of-flexaead-lwc2019.pdf
* 140crt726.pdf
* FIPS140ConsolidatedCertMay2017.pdf
* march2011-itl-bulletin.pdf
* Thursday_BSerepea-IGPanel.pdf
* United-States-General-Services-Administration.pdf
* kuhn-ECU.pdf
* 140sp1637.pdf
* 140sp2565.pdf
* day2_HIPAA-conference2011-NIST-HIPAA-Security-Rule-Toolkit.pdf
* 234.pdf
* 140sp3123.pdf
* 140sp1213.pdf
* Walsh-keynote-Wed830.pdf
* 140sp3523.pdf
* 090-092.pdf
* QPL_GhadialiBIO.pdf
* Iorga OSCAL-What_is_and_Who_needs_it 3.10.22.1145am.pdf
* iosp4.txt
* 140sp2392.pdf
* 140sp896.pdf
* Court-Services-and-Offender-Supervision-Agency.pdf
* 052.pdf
* dinesh1.pdf
* 2-NIST Digital Identity Guideline Update.pdf
* 140sp634.pdf
* 140crt1385.pdf
* 140sp3773.pdf
* ISPAB_board-members-list_2003-2010.pdf
* 140crt1326.pdf
* BGP_RFD_NIST_JSAC_2col_PDF1.pdf
* 140sp1577.pdf
* 05_Keccak_CryptPrize.pdf
* nistspecialpublication800-76.pdf
* 140sp1835.pdf
* PIVCardApplicationCertificate26.pdf
* ispab_april2010_scap-security-automation.pdf
* K-12_STEM-Initiatives-and-Cybersecurity-Education.pdf
* test3_100.csv
* 140crt290.pdf
* Transition_comments_7242009.pdf
* DocSec_2003.pdf
* 140sp599.pdf
* dang_ietf87_jul2013_presentation.pdf
* 2009fissea_poster-winner.pdf
* 2013_agenda-ispab-february-meeting.pdf
* 140sp2971.pdf
* nist.ir.8425.ipd.pdf
* statement-patent.docx
* sp800-53r5-draft-baselines-markup.pdf
* Presenter_Affiliations.pdf
* fipspub141.pdf
* 019.pdf
* PIV_Test_Data_Software.zip
* ispab_meeting_minutes_february_2013.pdf
* 140sp3735.pdf
* ffx-voltage-ip.pdf
* 142_Red_Hat_SCAP_1-2_Vendor_Assertion_Document_OpenSCAP.PDF
* 140crt1095.pdf
* CNSS15FS.pdf
* PIV-Diffie.pdf
* Marc15_FISSEA-isslob-security-training_TCinnamon.pdf
* privacy_workshop_overview_4_9_14.pdf
* ispab_mswanson-nist_april2009.pdf
* 140sp807.pdf
* cdm_program-overview.pdf
* day1_HIPAA-conference2011-Tiger-Team-Recs.pdf
* twg-03-16.pdf
* 140sp2883.pdf
* 140sp2393.pdf
* fips1402ig.pdf
* OMB_Policy.pdf
* itlbul2018-01.pdf
* nistspecialpublication800-85a-2.pdf
* 140crt207.pdf
* xai-iwct-short-preprint.pdf
* 140crt954.pdf
* 140sp2690.pdf
* twg-04-17.pdf
* fissea-conference-2012_curry.pdf
* fy01securityactreport.pdf
* FIPS1402LogoForm.pdf
* 2004_fisma_report.pdf
* 140sp2581.pdf
* 140crt536.pdf
* sp800_127.epub
* physecpre17.pdf
* ispab-report-may2009.pdf
* HMAC_SHA224.pdf
* SHAvite3_Comments.pdf
* dff-ff2-fpe-scheme-update.pdf
* hyena-spec-round2.pdf
* fissea_2015_program.pdf
* 140crt617.pdf
* FICAM_Plan_Baldridge.pdf
* Rainbow-round2-official-comment.pdf
* 140sp1458.pdf
* test3_25.csv
* itlbul2017-06.pdf
* bio_dcullinane_ispab.pdf
* 140sp1068.pdf
* session-3-kraleva-cryptanalysis-spoc.pdf
* nistspecialpublication800-20.pdf
* Industry-Day-polk_v3.pdf
* 140sp3712.pdf
* mobile-mind.pdf
* 140crt1118.pdf
* Overview.txt
* 5_hpc_lbadger_tpolk.pdf
* Szydloyin_shapp.pdf
* PIVMiddlewareCertificate15.pdf
* 140sp3192.pdf
* 140sp2818.pdf
* Distributed-Solutions-Inc.pdf
* sp800_164_draft.pdf
* CHISNELL_DefinitionsPanel.pdf
* CinnamonT_Bio.pdf
* 140sp1900.pdf
* barkley-et-al-97.pdf
* 140sp3981.pdf
* 140crt510.pdf
* wage.zip
* day1_HIPAA-conference2011-ONC-HC-Security-Pilot.pdf
* itlbul2017-02.pdf
* paperF16.pdf
* nistir5247.pdf
* fcsm_june2012_scholl.pdf
* 140sp1290.pdf
* 140sp2176.pdf
* PIV-Wilson.pdf
* FIPS140ConsolidatedCertApril2016.pdf
* EmblemR-Emblem-Statements.pdf
* cloud-computing-IA-challenges_ISPAB-Dec2008_C-Kubic.pdf
* KNOT-spec.pdf
* LSchlosser-Bio.pdf
* 140crt417.pdf
* IBM Trestle (part 1&2).pdf
* Ferguson2.pdf
* pkicon20b.PDF
* presentation-6_leita-dacier.pdf
* fissea_2014_koogle.pdf
* DOMUS.pdf
* 140sp328.pdf
* ClefiaM1--XOR=103--XLZBZ20.circ.txt
* VE-SmartHomePrivSec.pdf
* Day 2 - NIST Privacy Framework - Lefkowitz & Nadeau.pdf
* 140crt215.pdf
* 140sp1641.pdf
* 140sp568.pdf
* itlbul2014_11.pdf
* Second-Workshop-Announcement.doc
* CMVP2602.pdf
* threshold-slides-crypto-club-20180718-rev20180815.pdf
* FromNC2SA_IEEEComp_SI_Auton_Veh_Aug2021.pdf
* Welcome and Introduction Slides-28October2020 (002).pdf
* nist.sp.800-163.pdf
* Information-Security-EBK_Date.pdf
* csspab_meeting_minutes_1999-03.pdf
* criticality-analysis-process-model.xml
* 800_53_Rev_5_Focal_Document_Template.xlsx
* 140sp2293.pdf
* 140sp560.pdf
* 140sp741.pdf
* FIPS140ConsolidatedCertList0041.pdf
* nistir7751.pdf
* 2009_agenda-ispab-april-meeting.pdf
* wed11_mclaughlin-jones.pdf
* 140sp64.pdf
* Metrics.pdf
* 2008nomination.pdf
* C_Barker-Dec2005-ISPAB.pdf
* 319-321.pdf
* echo-handout.pdf
* antonakakis_nist_iot-sec.pdf
* frn.txt
* NIST.CSWP.09102018.pdf
* CMVP2701.pdf
* nist_ransomware_tips_and_tactics_infographic.pdf
* 2-5Lee - CIS Election Security Assistance.pdf
* 140sp2502.pdf
* 140crt525.pdf
* 7-051909-new-technologies-mobile-devices.pdf
* session-2-renner-third-round-ciphers-evaluation-on-microcontrollers.pdf
* 140sp3091.pdf
* oct23_privacy-engineering_brooks_lefkovitz.pdf
* 140sp903.pdf
* 140crt1300.pdf
* 140sp3149.pdf
* 140crt41.pdf
* 140sp3320.pdf
* SHA3-KATMCT1.pdf
* LopezD_Bio.pdf
* 140sp3741.pdf
* 140sp3876.pdf
* 140sp4029.pdf
* foresee.tgz
* 140sp2108.pdf
* mixfeed.zip
* gimli_update.pdf
* sp800_78-4_2014_draft_comments_and_dispositions.pdf
* WG5-1097.ppt
* 140crt219.pdf
* NIST.SP.800-56Br1.pdf
* Oct2017_Final_ISPABMeetingAgenda.pdf
* sundae-gift.zip
* Ramstake.zip
* 140crt658.pdf
* session-6-cassiers-secure-efficient-masking.pdf
* 140sp746.pdf
* 140crt1396.pdf
* fips188.pdf
* 140sp3892.pdf
* fissea_2015_final_agenda_with-presentation-links.pdf
* 140crt939.pdf
* luffa_sha3ws1_2pp.pdf
* forum-august2015-rudolph.pdf
* 140sp4001.pdf
* 140sp2833.pdf
* 140sp2996.pdf
* Presentation_MTuran_MC_of_Boolean_Functions_WPI.pdf
* day1_mar23_commerce-data-service_tgrandison.pdf
* 140crt167.pdf
* sp800_79-2_draft.pdf
* 140sp1079.pdf
* 203.pdf
* Dec2004- US-Visit-Program-Overview.pdf
* physecpaper11.pdf
* USGCB-Windows-Settings.xls
* FISSEA_Pendergast_MediaPro_Adaptive_Awareness_Framework-Wed0115.pdf
* session-4-gmu-fpga-benchmarking.pdf
* 2006_agenda-ispab-march-meeting.pdf
* 140sp2041.pdf
* 140sp3254.pdf
* 140sp3595.pdf
* 140sp1688.pdf
* 140sp2439.pdf
* Smartcard_Barbara.pdf
* 140crt409.pdf
* itlbul2017-09.pdf
* fissea_2014_peers_choice_newsletter_winner_fda.pdf
* SHAKE256_Msg30.pdf
* sp800_124_r1.epub
* winter_2015_draft_agenda.pdf
* 140crt1460.pdf
* aesmct.zip
* 140sp1189.pdf
* 140sp3446.pdf
* 140crt715.pdf
* tues1230_pbgc_tier2-program.pdf
* nistir7056.pdf
* CCM-TEST.zip
* 140crt509.pdf
* K283_SHA3-256.pdf
* NCCoE-Telework-Fact-Sheet.pdf
* department-of-defense.pdf
* biometrics-fingerprint_mbark.pdf
* 140crt880.pdf
* 3-051908-vmh-case-study.pdf
* 140sp3114.pdf
* 140crt1267.pdf
* summary_day1_workshop_2000-06.pdf
* Yarara-and-Coral-Statements.pdf
* 140sp1946.pdf
* ip1.pdf
* 140sp2208.pdf
* 140sp1658.pdf
* PIV_Test_Data_Software.zip
* nistir_8114_draft.pdf
* 140sp2795.pdf
* apply-sp-800-53-ics-final-22aug06.pdf
* SecFedAIS.pdf
* 140sp2854.pdf
* 140sp2074.pdf
* 140sp2705.pdf
* ZIVNEY_IndustryRoundTable.pdf
* picnic-zaverucha.pdf
* Transitioning_CryptoAlgos_070209.pdf
* 140sp469.pdf
* FISSEA-Workshop-Nov2004.ppt
* 140crt665.pdf
* test3_90.csv
* twofish-unix-refc.tar
* 140sp3180.pdf
* 140sp1313.pdf
* forum_agenda_august_2014.pdf
* scap-win2000-OCIL.xml
* SPARKLE-Statements-Final-Round.pdf
* FIPS140ConsolidatedCertList0048.pdf
* 140sp2472.pdf
* 140sp2602.pdf
* 140sp795.pdf
* 140sp2925.pdf
* 140sp2958.pdf
* 140sp2442.pdf
* Thales_Comments.pdf
* photon-beetle-round2-official-comment.pdf
* HENDRICKS_Airport_Biometrics_Access_Control.pdf
* KAT_DAGS.zip
* day1_research_330-420.pdf
* NaSHA.zip
* 140sp1337.pdf
* CMVP2706.pdf
* Overview_FERRAIOLO.pdf
* RumpSession_Benaloh.pdf
* 140sp525.pdf
* Day 1 - Talking SMAC - Kirkorian and Jacobs.pdf
* session-2-vizar-new-results-forkae.pdf
* nistspecialpublication800-2.pdf
* eei-presentation.pdf
* 140sp2447.pdf
* 140sp1462.pdf
* 140sp2097.pdf
* sp800-53ar5-potential-updates.xlsx
* Minutes-03-2002.pdf
* 181-183.pdf
* Wednesday-ALewis_abstractbio.pdf
* 140sp2235.pdf
* Thursday_BSymonds_PrivacyPanel-privacygovtissueseducator.pdf
* oribatida-changelog.pdf
* fr-modes-200007.txt
* Jan-05.pdf
* QPL_WolfhopeBIO.pdf
* session-5-raynal-pq-wireguard.pdf
* test3_28.csv
* romulus.zip
* baudron2.pdf
* day1_trusted-computing_200-250.pdf
* Opening-Nov18-Workshop.pdf
* Mackintosh.ppt
* 140sp2216.pdf
* 800-53-rev1-final-clean-sz.pdf
* session-3-kannwischer-pqm4.pdf
* 140sp2005.pdf
* 140crt1409.pdf
* 140sp836.pdf
* FrodoKEM-April2018.pdf
* Sager_ISPAB_sept2007.pdf
* 140sp2369.pdf
* 20190406-nist-pec-comments-on-zkproof-docs.pdf
* cratcliffe_fissea2010-computer-network-defense.pdf
* call-for-proposals-draft-aug-2016.pdf
* 1989_annual-report_natl-computer-system.pdf
* TAC-Time.txt
* vander-smartcardtech-roadmap-nistsca.pdf
* notice970827.txt
* hl7_role-based_access_control_(rbac).pdf
* panelG4.pdf
* fissea_2014_peers_choice_motivational_item_winner_united_technologies.pdf
* usgovII.pdf
* change_log_1-2_0_2_0.txt
* sp800_38g_draft.pdf
* BIG_QUAKE.zip
* Contest Entry Form 2020.docx
* 20-kaoki.pdf
* 140sp4152.pdf
* real-ID-letter-Sept2007.pdf
* 140sp2667.pdf
* fissea_conf_2013_farrand.pdf
* March2009_FISSEA-Newsletter.pdf
* Federal-Reserve-Board.pdf
* 140sp2908.pdf
* nistspecialpublication800-84.pdf
* chng1-for-fips186.pdf
* 140sp1121.pdf
* 140sp378.pdf
* 126-128.pdf
* pkcs11-software.zip
* iosp8.txt
* 140crt1390.pdf
* jippolito-fissea2010_panel-tracking-role-based-training.pdf
* FISSEA2008contest-motivational-winner.pdf
* day1_HIPAA-conference2011-Risk-Analysis.pdf
* 140sp2698.pdf
* 140crt904.pdf
* 3-Cooper - CMVP Slides for ISPAB 20200625.pdf
* 35-ebiham.pdf
* Draft_SP800-57-Part1-Rev3_May2011.pdf
* nistir7770.pdf
* NIST_SP-800-53_rev5_LOW-baseline_profile_load.csv
* NIST.SP.800-77r1.pdf
* 140sp14.pdf
* ThreeBears.zip
* glossary.ps
* 140crt947.pdf
* 600.pdf
* 3-051809-assessment-methods.pdf
* FISSEA2017_Mandelbaum_Batchelder_CMS_Data_Guardian_Program.pdf
* Katzke.ppt
* 140sp888.pdf
* FIPS-PUB-199-ipd.pdf
* 2013_agenda-ispab-june-meeting.pdf
* Ady42-8.doc
* Khazad--XOR=366--XLZBZ20.circ.txt
* 2006_agenda-ispab-december-meeting.pdf
* aes-ffx-vectors.txt
* feb1_med_dev_nist-eco-med-dev-sec-2012l.pdf
* twofish-dos-add.tar
* 254-257.pdf
* Northrop-Gruman-Information-Technology.pdf
* paperF21.pdf
* twg-03-07.pdf
* Ongoing Authorization - FCSM -- 10 Sep 2018_external.pdf
* nist.ir.8018.pdf
* fissea-agenda-preliminary.pdf
* 140sp1858.pdf
* ISPAB-minutes-Sept2006-final.pdf
* kuhn-qic05.pdf
* 140sp4003.pdf
* readme-for-csv-sp800-53ar5-assessment-procedures.txt
* sp800-172-enhanced-security-reqs.csv
* 140sp2976.pdf
* nistspecialpublication800-123.pdf
* Ross-FISSEA-031104.ppt
* july2013_abac_workshop_panel-discussion.pdf
* 077-080.pdf
* 140sp1726.pdf
* forum_august2014_badger.pdf
* 140sp418.pdf
* 140sp3289.pdf
* 140crt681.pdf
* comments-received-lwc-submission-reqs-june2018.pdf
* fissea-conference-2012_paullet.pdf
* x509tests.tgz
* 140sp3347.pdf
* Three-Bears-round2-official-comment.pdf
* nistspecialpublication800-66r1.pdf
* 005slide.pdf
* 140sp2234.pdf
* FugueUpdate.zip
* PIVCardApplicationCertificate23.pdf
* soukharev-pqdh-paper.pdf
* FrodoKEM-Round3.zip
* June2005-CPO-Fanning.pdf
* 140sp3710.pdf
* 236.pdf
* 2.t1 - Lunch - Wootten_OSCAL-deep-diff Workshop Presentation.pdf
* ecccdhvs.pdf
* harvey.pdf
* Bolten_Re_E-authentication_08_2003.pdf
* m04-04.pdf
* fissea_2014_peers_choice_poster_winner_dept_education_coleman.pdf
* CT-poster.pdf
* testpivcardsampleencryptedemails.zip
* bill_burr_future_deriv_piv_tokens_fips201-2_2015.pdf
* rbacsl.pdf
* 140sp2868.pdf
* HYENA-official-comment.pdf
* ORIBATIDA-Statements.pdf
* jippolito-fissea2010_panel-identifying-personnel-significant-resp.pdf
* 140sp1045.pdf
* 2014_agenda-ispab-june-meeting.pdf
* 800-53A-R1_Assessment-Cases_All-18-Families_ipd.zip
* may30_privacy-research_jwing.pdf
* paperA1.pdf
* 140sp91.pdf
* 140sp1411.pdf
* 140sp3097.pdf
* 140sp3351.pdf
* Forum_Agenda 05.17.2022 DRAFT.pdf
* 140sp1798.pdf
* ferraiolo-kuhn-sandhu-07.pdf
* 140crt1170.pdf
* 140sp3427.pdf
* leopard_hipaa_2014_day2.pdf
* ISCMAx-Alternate-Judgements.zip
* ISPAB-Minutes-June-2003.pdf
* March16_FISSEA-Use-News-DKurtz.pdf
* 140crt651.pdf
* PIV-Boult.pdf
* ActivCard.pdf
* SIV-Rijndael256-AEAD-official-comment.pdf
* r4sec.pdf
* KAT_DualModeMS.zip
* NIST.SP.800-207-draft2.pdf
* pqNTRUSign-Statements.pdf
* 140crt326.pdf
* 140sp913.pdf
* 140sp103.pdf
* talk-ipsec99.ppt
* FIPS140ConsolidatedCertList0028.pdf
* nistir8170-draft.pdf
* 140sp1049.pdf
* 1-5Wilshusen - GAO Update on VA and Other Federal Agencies Need to Address Significant Challenges.pdf
* Irvine-Wed100.ppt
* 140sp1495.pdf
* 140sp220.pdf
* NIST.IR.8301-draft.pdf
* sp800-26.pdf
* suite-feedback1.docx
* GeMSS-Round2.zip
* ferrailo_privileged_user_federal_computer_security_managers_forum_april_2016.pdf
* 140crt1427.pdf
* 140sp1643.pdf
* Details43PIVApp.pdf
* 1_04to2_0changes.doc
* 1994-17th-NCSC-proceedings-vol-2.pdf
* spoc_update.pdf
* 1990-13th-NCSC-proceedings-vol-2.pdf
* March16_FISSEA-keynote-stay-safe-cyberspace-BLawrence.pdf
* 140crt99.pdf
* AES3Proceedings-1.pdf
* 20000523-msmid-1.pdf
* 140sp2397.pdf
* Federal-Risk-Authorization.pdf
* 140crt586.pdf
* Im still waiting for my 10 million How about you_Dale Zabriskie.pdf
* NIST.IR.8397.pdf
* beginning-notes.pdf
* Is Usable Security an Oxymoron.pdf
* NIST.IR.8259A.pdf
* Whirlpool-Maelstrom--XOR=425-rs=4-symp=2.circ.txt
* ComCoverage110130.pdf
* 140sp3825.pdf
* preneel_nist_v2.pdf
* 140sp2923.pdf
* INSTITUTE-lmcnulty.ppt
* SP_800_181_(2017)_Focal_Document_Template.xlsx
* 140sp446.pdf
* metrics_jstreufert.pdf
* nistspecialpublication500-166.pdf
* NIST.CSWP.27.pdf
* BKL16-8x8-GF256--XOR=465-rs=13-symp=2.circ.txt
* NIST.IR.8053.pdf
* nistspecialpublication800-97.pdf
* Sarmal.zip
* 140sp1431.pdf
* day1_mar23_ncats_current-and-future-services.pdf
* NSA.pdf
* 140sp2559.pdf
* 140sp1191.pdf?url=2Fdata2Fjournals2Faim2F193252Faime196109010-00019.pdf
* SABER-round2-official-comment.pdf
* HSPD-12_Meeting_Agenda.pdf
* 140sp2642.pdf
* 140sp2629.pdf
* 140crt143.pdf
* Federal_Cybersecurity_Privacy_Professionals_Forum_2Dec2021_FedRAMP_NIST800-53_Rev5.pdf
* EWA.pdf
* 140sp3948.pdf
* history-lwc-finalist-updates.pdf
* Comments-Draft-SP-800-171B-IndianaUniversity-5August2019.pdf
* 140sp1764.pdf
* sp800_166_draft.pdf
* contini.pdf
* 140sp797.pdf
* fissea09-mwilson-day2_business-mtg.pdf
* Square-AES-Mugi--XOR=92--maximov.circ.txt
* estate.zip
* csf-pf-to-sp800-53r5-mappings.xlsx
* sp800-140f-draft.pdf
* 140crt1023.pdf
* FISSEA_Pailen_Conflict Changing Curriculum_Tues.pdf
* Draft-FIPS180-4_Feb2011.pdf
* session-5-ribeiro-saber-pq-kem.pdf
* 140sp4016.pdf
* 140sp3208.pdf
* fips140-3-draft-2009-comments-resolutions.pdf
* p31.pdf
* 140sp632.pdf
* itlbul2017-03.pdf
* 7-051809-erx1.pdf
* ISPAB-Approved-Nov2010-Minutes.pdf
* 140crt383.pdf
* 140sp3968.pdf
* MISPC2_public3_20000831.pdf
* FISSEA2011_newsletter-winner.pdf
* Nandi.pdf
* november2010-bulletin.pdf
* 140sp760.pdf
* 140crt567.pdf
* nistir_8112_draft.pdf
* 140sp2394.pdf
* NIST.SP.800-161r1.pdf
* day1_trusted-computing_1030-1100.pdf
* 140sp2071.pdf
* sp800-63-3-draft-revised.pdf
* 140sp3901.pdf
* Waterfall_Comments.pdf
* preprint-rethinking-dlt.pdf
* 140sp1019.pdf
* nistspecialpublication800-117.pdf
* 140sp1935.pdf
* csspab_meeting_minutes_2000-03.pdf
* fips201_2_2011_draft_comments_and_dispositions.pdf
* FrodoKEM-round2-official-comment.pdf
* SIMPLE-official-comment.pdf
* 140crt454.pdf
* mars-statement.pdf
* 140sp3105.pdf
* chari.pdf
* 2-1-keynote-robust-data-security-plan-ce_well.pdf
* 140sp1686.pdf
* 140sp2721.pdf
* 140sp3194.pdf
* leakage-resilience-isap-mode-lwc2019.pdf
* Draft-NISTIR-7756_second-public-draft.pdf
* 1401testA.pdf
* NIST.SP.800-140Cr1-draft2.pdf
* SPIES_nist-km.pdf
* session-4-adomnicai-fixslicing.pdf
* 140sp125.pdf
* nistir-7806.pdf
* fissea_2013_peer_choice_winner_motiv_item.pdf
* ispab_meeting_minutes_june_2015.pdf
* 140sp2854.pdf
* forum_august2014_ferraiolo.pdf
* DevelopmentHistory.pdf
* 140crt934.pdf
* 140sp2.pdf
* 140sp2191.pdf
* 2_ISPAB-FISMA-briefing-IG-Panel-LKing.pdf
* CCMVS.pdf
* itlbul2016-02.pdf
* itlbul2013-09-supplemental.pdf
* 026.pdf
* Thursday_AChantker_PrivacyPanel-PrivacyFedGovtissues.pdf
* sp800-47r1-draft-comment-template.xlsx
* 140sp1982.pdf
* 140sp120.pdf
* 140sp2090.pdf
* Component_Legend_186_3 RSASP1.pdf
* sp800-59.pdf
* simple.zip
* session5-tezcan-distinguishers-reduced-round.pdf
* test4_9.csv
* SP800-15.PDF
* 140crt141.pdf
* pm_long_v3.pdf
* fips-198a.pdf
* BKL16-4x4-GF256.mat.txt
* CFP-2nd-NIST-PQC-Conference-2019.pdf
* 140sp3009.pdf
* NIST Security Control Overlay Repository participation agreement-final Public Organizations.pdf
* may30_future-privacy-health-it_gbuchelt.pdf
* Brochure.doc
* Fall_2016_agenda_final.pdf
* sp800-67r2-draft.pdf
* 2010-FISMA-Report-Final.pdf
* 140crt877.pdf
* 140sp2302.pdf
* internet-threat.ppt
* 140crt1191.pdf
* nistir7815.pdf
* fissea_conf_2013_willson.pdf
* 140crt1080.pdf
* Gravity_SPHINCS.zip
* sp800-57pt2-r1-draft2.pdf
* 140crt537.pdf
* SHA3-256_Msg30.pdf
* 140sp890.pdf
* test3_8.csv
* AssetSystemUpdate.zip
* 140sp2253.pdf
* pqsigRM-Statements.pdf
* 140crt808.pdf
* Kelsey_Bio.pdf
* nistspecialpublication800-32.pdf
* t14.pdf
* 140sp2999.pdf
* nistspecialpublication800-40.pdf
* nistir_8149_draft_comment_matrix.xls
* 140sp1747.pdf
* DAGS-Statements.pdf
* FIPS201 - Federation - 4.pdf
* day1_HIPAA-conference2011-Plenary-OCR-Reg-Update.pdf
* itlbul2011-03.pdf
* xcbc-spec.pdf
* rainbow-ding.pdf
* 140sp3489.pdf
* jjonas.zip
* forum_december2014_einstein_3a.pdf
* GregG-ISPAB-Sept2006.pdf
* dualec_in_X982_and_sp800-90.pdf
* nistspecialpublication800-25.pdf
* NIST.IR.8347.pdf
* fips81change3.pdf
* ISC2-FISSEA.ppt
* BIKE-April2018.pdf
* 920.pdf
* csic_comments_cignet.pdf
* 140crt1027.pdf
* 140sp1587.pdf
* PIV-Pollack.pdf
* Kelsey_Truncation.pdf
* 140sp2863.pdf
* test3_13.csv
* Romulus-Statements-Final-Round.pdf
* 140sp3846.pdf
* 800-53-for-ICS_KEMA-BlackWhite.pdf
* cybersecurity-innovation-forum_01-28-2014.pdf
* 140sp1016.pdf
* NIST_NSA_MOU-1989.pdf
* ISPAB-Minutes-June2005.pdf
* PIV-Mehta.pdf
* call-for-papers.pdf
* I-CIDM-Bridge-to-Bridge-Working-Group.pdf
* ISPAB March 2021 Minutes Final - Accepted.pdf
* 140sp2430.pdf
* forum_agenda_feb_20_2014.pdf
* 140crt29.pdf
* NIST.IR.8286B.pdf
* 140sp2127.pdf
* 140crt1258.pdf
* forum-april2015-media-sanitization-regenscheid.pdf
* SP800-96-091106.pdf
* NIST_SP-800-53_rev5-derived-OSCAL.xlsx
* 140sp4017.pdf
* Barker_SP800-60.pdf
* 253.pdf
* ISPAB_Minutes_September_2003.pdf
* 140sp3510.pdf
* BERNSTEIN_presentation.pdf
* nist-cisos_Dec2009-meeting.pdf
* FISSEA_30th_Anniversary_June_19_Agenda_final_updated_Jun16_with_Links.pdf
* nist.ir.7511r5.pdf
* NIST.SP.800-175B.pdf
* 140crt708.pdf
* 140sp813.pdf
* 140sp2115.pdf
* csspab_meeting_minutes_1999-06.pdf
* FIPS140ConsolidatedCertList0030.pdf
* 140sp2189.pdf
* 140sp2405.pdf
* fips185.txt
* PrideL0.mat.txt
* George.pdf
* How to Measure the Effectiveness of Cybersecurity Training and Awareness Program_Michael Adams.pdf
* costello-case-for-sike-pqc2021.pdf
* 140sp2955.pdf
* 140crt1377.pdf
* 140sp2663.pdf
* 140-1comments.pdf
* 140sp2211.pdf
* forum_feb2015_dhs_sp800-53-appendix-j.pdf
* NIST RMF Select Step-FAQs.pdf
* jlindley_fissea2010-panaceaorpandora.pdf
* partial-nist_csp_v1-3.zip
* 140sp2223.pdf
* 140sp2417.pdf
* 140sp536.pdf
* 140crt615.pdf
* Court-Services-and-Offender-Supervision-Agency.pdf
* MCS-PWG 2022-0022_mtg16-agenda-2022Aug22.pdf
* federal-metrics.pdf
* 2012-fissea-contest-winner_motivational-item.pdf
* MPTS-2020-program.pdf
* spoc-changelog.pdf
* 140sp3306.pdf
* s07_cmvp_wireless-re.pdf
* 140sp1388.pdf
* NIST.IR.8379.pdf
* USRP_NIST_Cisco_071515.pdf
* o09.pdf
* FIPS140ConsolidatedCertOct2018.pdf
* 2022_OSCAL-Speaker-Bios_final.pdf
* NIST.IR.8006.pdf
* 140crt1292.pdf
* 140crt1314.pdf
* PIVMiddlewareCertificate6.pdf
* nistir_7977_second_draft.pdf
* 1-2-threat-intelligence-for-dummies-scarfone.pdf
* 800-53A-R1_Assessment-Cases_CA-Family_ipd.zip
* 2017-agenda-ispab-march-meeting(1).pdf
* Department-of-Labor.pdf
* Verified Timestamping Presentation Slides.pptx
* sp800-163r1-draft.pdf
* Proposal-ISPAB_DHS-Privacy-Workplan-090905.pdf
* Judy_Paul .pdf
* NIST.IR.8214A-draft.pdf
* 140sp3969.pdf
* 140sp2059.pdf
* dphilpott_fissea20100fismarts-improving-retention-fisma.pdf
* day1_keynote_zramzan_cybersecurity-headline-news.pdf
* jippolito-fissea2010_panel-tracking-role-based-training.pdf
* day1-b1_baquis-and-quinn_accessibility.pdf
* spoc-spec-round2.pdf
* skipjack.pdf
* acsac99.pdf
* 140sp3068.pdf
* 140crt623.pdf
* JoanneMcN-ISPAB-Sept2006.pdf
* 140sp130.pdf
* 140sp3655.pdf
* t06.pdf
* cr-nist-update.pdf
* 2010-winner_motivational-item-and-entry.pdf
* 1986-9th-NCSC-proceedings-addendum.pdf
* FIPS201-2_Workshop_Agenda_2012.pdf
* 140sp396.pdf
* SDLC_brochure_Aug04.pdf
<