In September 2017, this (legacy) site will be replaced with the new site you can see at beta.csrc.nist.rip. At that time, links to this legacy site will be automatically redirected to apporpriate links on the new site.

View the beta site
NIST Logo and ITL Banner Link to the NIST Homepage Link to the ITL Homepage Link to the NIST Homepage

Archived NIST Special Publications

We strongly encourage you to start using the publication information on the new CSRC:

Withdrawn NIST Special Publications (SPs), including Final and Draft SPs

 

These computer security-related NIST Special Publications (SPs) have been archived. Some may have been revised or superceded by a newer SP (see current SP list).

NumberDateTitle
SP 800-171June 2015 (Updated 9/3/2015)Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations
  Withdrawn: Jan 21, 2016
  Superseded By: SP 800-171
SP 800-171June 2015 Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations
  Withdrawn: Oct 01, 2015
  Superseded By: SP 800-171
  Archived File
SP 800-171June 2015 Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations
  Withdrawn: Oct 01, 2015
  Superseded By: SP 800-171
  Archived File
SP 800-171June 2015 Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations
  Withdrawn: Oct 01, 2015
  Superseded By: SP 800-171
  Archived File
SP 800-135December 2010 Recommendation for Existing Application-Specific Key Derivation Functions
  Withdrawn: Dec 01, 2011
  Superseded By: SP 800-135 Rev. 1
  Archived File
SP 800-131AJanuary 2011 Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths
  Withdrawn: Nov 06, 2015
  Superseded By: SP 800-131A Rev. 1
  Archived File
SP 800-126 Rev. 2September 2011 The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.2
  Withdrawn: Mar 19, 2012
  Superseded By: SP 800-126 Rev. 2
SP 800-124October 2008 Guidelines on Cell Phone and PDA Security
  Withdrawn: Jun 21, 2013
  Superseded By: SP 800-124 Rev. 1
  Archived File
SP 800-121 Rev. 1June 2012 Guide to Bluetooth Security
  Withdrawn: May 08, 2017
  Superseded By: SP 800-121 Rev. 2
  Archived File
SP 800-121 Rev. 1June 2012 Guide to Bluetooth Security
  Withdrawn: May 08, 2017
  Superseded By: SP 800-121 Rev. 2
  Archived File
SP 800-121September 2008 Guide to Bluetooth Security
  Withdrawn: Jun 01, 2012
  Superseded By: SP 800-121 Rev. 1
  Archived File
SP 800-114November 2007 User's Guide to Securing External Devices for Telework and Remote Access
  Withdrawn: Jul 29, 2016
  Superseded By: SP 800-114 Rev. 1
  Archived File
SP 800-107February 2009 Recommendation for Applications Using Approved Hash Algorithms
  Withdrawn: Aug 24, 2012
  Superseded By: SP 800-107 Rev. 1
  Archived File
SP 800-104June 2007 A Scheme for PIV Visual Card Topography
  Withdrawn: Sep 01, 2014
  Superseded By: FIPS 201-2
  Archived File
SP 800-101May 2007 Guidelines on Cell Phone Forensics
  Withdrawn: May 15, 2014
  Superseded By: SP 800-101 Rev. 1
  Archived File
SP 800-100October 2006 Information Security Handbook: A Guide for Managers
  Withdrawn: Mar 07, 2007
  Superseded By: SP 800-100
SP 800-90AJanuary 2012 Recommendation for Random Number Generation Using Deterministic Random Bit Generators
  Withdrawn: Jun 24, 2015
  Superseded By: SP 800-90A Rev. 1
  Archived File
SP 800-90AJanuary 2012 Recommendation for Random Number Generation Using Deterministic Random Bit Generators
  Withdrawn: Jun 24, 2015
  Superseded By: SP 800-90A Rev. 1
  Archived File
SP 800-90 RevisedMarch 2007 Recommendation for Random Number Generation Using Deterministic Random Bit Generators (Revised)
  Withdrawn: Jan 01, 2012
  Superseded By: SP 800-90A
  Archived File
SP 800-90June 2006 Recommendation for Random Number Generation Using Deterministic Random Bit Generators
  Withdrawn: Mar 14, 2007
  Superseded By: SP 800-90 Revised
  Archived File
SP 800-90June 2006 Recommendation for Random Number Generation Using Deterministic Random Bit Generators
  Withdrawn: Mar 14, 2007
  Superseded By: SP 800-90
  Archived File
SP 800-90June 2006 Recommendation for Random Number Generation Using Deterministic Random Bit Generators
  Withdrawn: Mar 14, 2007
  Superseded By: SP 800-90 Revised
  Archived File
SP 800-90June 2006 Recommendation for Random Number Generation Using Deterministic Random Bit Generators
  Withdrawn: Mar 14, 2007
  Superseded By: SP 800-90
  Archived File
SP 800-88September 2006 Guidelines for Media Sanitization
  Withdrawn: Dec 22, 2014
  Superseded By: SP 800-88 Rev. 1
  Archived File
SP 800-88August 2006 Guidelines for Media Sanitization
  Withdrawn: Sep 11, 2006
  Superseded By: SP 800-88
SP 800-87 Version 1.0 (March 2007 edition)March 2007 Codes for the Identification of Federal and Federally Assisted Organizations
  Withdrawn: Apr 01, 2008
  Superseded By: SP 800-87 Rev. 1
  Archived File
SP 800-87 Version 1.0 (January 2006 edition)January 2006 Codes for the Identification of Federal and Federally Assisted Organizations
  Withdrawn: Mar 15, 2007
  Superseded By: SP 800-87 Version 1.0 (March 2007 edition)
  Archived File
SP 800-87 Version 1.0October 2005 Codes for the Identification of Federal and Federally Assisted Organizations Version 1.0
  Withdrawn: Jan 15, 2006
  Superseded By: SP 800-87 Version 1.0 (January 2006 edition)
  Archived File
SP 800-85A-2July 2010 PIV Card Application and Middleware Interface Test Guidelines (SP800-73-3 Compliance)
  Withdrawn: Apr 13, 2016
  Superseded By: SP 800-85A -4
  Archived File
SP 800-85A-1March 2009 PIV Card Application and Middleware Interface Test Guidelines (SP800-73-2 Compliance)
  Withdrawn: Jul 28, 2010
  Superseded By: SP 800-85A -2
  Archived File
SP 800-85A-1March 2009 PIV Card Application and Middleware Interface Test Guidelines (SP800-73-2 Compliance)
  Withdrawn: Jul 28, 2010
  Superseded By: SP 800-85A -2
  Archived File
SP 800-85AApril 2006 PIV Card Application and Middleware Interface Test Guidelines (SP800-73 Compliance)
  Withdrawn: Apr 03, 2009
  Superseded By: SP 800-85A -1
  Archived File
SP 800-85October 2005 PIV Middleware and On-Card Application Conformance Test Guidance (SP 800-73 Compliance)
  Withdrawn: Apr 05, 2006
  Superseded By: SP 800-85A
  Archived File
SP 800-83November 2005 Guide to Malware Incident Prevention and Handling
  Withdrawn: Jul 22, 2013
  Superseded By: SP 800-83 Rev. 1
  Archived File
SP 800-82 Rev. 1May 2013 Guide to Industrial Control Systems (ICS) Security
  Withdrawn: May 29, 2015
  Superseded By: SP 800-82 Rev. 2
  Archived File
SP 800-82June 2011 Guide to Industrial Control Systems (ICS) Security
  Withdrawn: May 14, 2013
  Superseded By: SP 800-82 Rev. 1
  Archived File
SP 800-81 Rev. 1April 2010 Secure Domain Name System (DNS) Deployment Guide
  Withdrawn: Sep 13, 2013
  Superseded By: SP 800-81 -2
  Archived File
SP 800-81May 2006 Secure Domain Name System (DNS) Deployment Guide
  Withdrawn: Apr 30, 2010
  Superseded By: SP 800-81 Rev. 1
  Archived File
SP 800-79-1June 2008 Guidelines for the Accreditation of Personal Identity Verification Card Issuers
  Withdrawn: Jul 30, 2015
  Superseded By: SP 800-79 -2
  Archived File
SP 800-79July 2005 Guidelines for the Certification and Accreditation of PIV Card Issuing Organizations
  Withdrawn: Jun 18, 2008
  Superseded By: SP 800-79 -1
  Archived File
SP 800-78-3December 2010 Cryptographic Algorithms and Key Sizes for Personal Identity Verification
  Withdrawn: May 29, 2015
  Superseded By: SP 800-78 -4
  Archived File
SP 800-78-2February 2010 Cryptographic Algorithms and Key Sizes for Personal Identity Verification
  Withdrawn: Dec 01, 2010
  Superseded By: SP 800-78 -3
  Archived File
SP 800-78-1August 2007 Cryptographic Algorithms and Key Sizes for Personal Identity Verification
  Withdrawn: Feb 13, 2010
  Superseded By: SP 800-78 -2
  Archived File
SP 800-78April 2005 Cryptographic Algorithms and Key Sizes for Personal Identity Verification
  Withdrawn: Aug 01, 2007
  Superseded By: SP 800-78 -1
  Archived File
SP 800-76-1January 2007 Biometric Data Specification for Personal Identity Verification
  Withdrawn: Jul 11, 2013
  Superseded By: SP 800-76 -2
  Archived File
SP 800-76February 1, 2006 Biometric Data Specification for Personal Identity Verification
  Withdrawn: Jan 17, 2007
  Superseded By: SP 800-76 -1
  Archived File
SP 800-76February 1, 2006 Biometric Data Specification for Personal Identity Verification
  Withdrawn: Jan 17, 2007
  Superseded By: SP 800-76 -1
  Archived File
SP 800-73-4May 2015 Interfaces for Personal Identity Verification
  Withdrawn: Feb 12, 2016
  Superseded By: SP 800-73 -4
  Archived File
SP 800-73-4May 2015 Interfaces for Personal Identity Verification
  Withdrawn: Feb 12, 2016
  Superseded By: SP 800-73 -4
  Archived File
SP 800-73-4May 2015 Interfaces for Personal Identity Verification
  Withdrawn: Feb 12, 2016
  Superseded By: SP 800-73 -4
  Archived File
SP 800-73-4May 2015 Interfaces for Personal Identity Verification
  Withdrawn: Feb 12, 2016
  Superseded By: SP 800-73 -4
  Archived File
SP 800-73-4May 2015 Interfaces for Personal Identity Verification
  Withdrawn: Feb 12, 2016
  Superseded By: SP 800-73 -4
  Archived File
SP 800-73-4May 2015 Interfaces for Personal Identity Verification
  Withdrawn: Feb 12, 2016
  Superseded By: SP 800-73 -4
  Archived File
SP 800-73-4May 2015 Interfaces for Personal Identity Verification
  Withdrawn: Feb 12, 2016
  Superseded By: SP 800-73 -4
  Archived File
SP 800-73-4May 2015 Interfaces for Personal Identity Verification
  Withdrawn: Feb 12, 2016
  Superseded By: SP 800-73 -4
  Archived File
SP 800-73-4May 2015 Interfaces for Personal Identity Verification
  Withdrawn: Feb 12, 2016
  Superseded By: SP 800-73 -4
  Archived File
SP 800-73-4May 2015 Interfaces for Personal Identity Verification
  Withdrawn: Feb 12, 2016
  Superseded By: SP 800-73 -4
  Archived File
SP 800-73-4May 2015 Interfaces for Personal Identity Verification
  Withdrawn: Feb 12, 2016
  Superseded By: SP 800-73 -4
  Archived File
SP 800-73-4May 2015 Interfaces for Personal Identity Verification
  Withdrawn: Feb 12, 2016
  Superseded By: SP 800-73 -4
  Archived File
SP 800-73-3February 2010 Interfaces for Personal Identity Verification
  Withdrawn: May 29, 2015
  Superseded By: SP 800-73 -4
  Archived File
SP 800-73-2September 2008 Interfaces for Personal Identity Verification
  Withdrawn: Feb 01, 2010
  Superseded By: SP 800-73 -3
  Archived File
SP 800-73-1March 2006 Interfaces for Personal Identity Verification
  Withdrawn: Sep 18, 2008
  Superseded By: SP 800-73 -2
  Archived File
SP 800-73April 2005 Interfaces for Personal Identity Verification
  Withdrawn: Sep 29, 2005
  Superseded By: SP 800-73
SP 800-73April 2005 (Updated 9/29/2005)Interfaces for Personal Identity Verification
  Withdrawn: Mar 15, 2006
  Superseded By: SP 800-73 -1
  Archived File
SP 800-70 Rev. 3December 2015 National Checklist Program for IT Products: Guidelines for Checklist Users and Developers
  Withdrawn: Dec 08, 2016
  Superseded By: SP 800-70 Rev. 3
  Archived File
SP 800-70 Rev. 2February 2011 National Checklist Program for IT Products: Guidelines for Checklist Users and Developers
  Withdrawn: Dec 10, 2015
  Superseded By: SP 800-70 Rev. 3
  Archived File
SP 800-70 Rev. 1September 2009 National Checklist Program for IT Products: Guidelines for Checklist Users and Developers
  Withdrawn: Feb 01, 2011
  Superseded By: SP 800-70 Rev. 2
  Archived File
SP 800-70May 2005 Security Configuration Checklists Program for IT Products: Guidance for Checklists Users and Developers
  Withdrawn: Sep 30, 2009
  Superseded By: SP 800-70 Rev. 1
  Archived File
SP 800-68October 2005 Guidance for Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist
  Withdrawn: Oct 01, 2008
  Superseded By: SP 800-68 Rev. 1
  Archived File
SP 800-67 Ver. 1May 2004 Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher
  Withdrawn: Jan 01, 2012
  Superseded By: SP 800-67 Rev. 1
  Archived File
SP 800-66March 2005 An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
  Withdrawn: Oct 01, 2008
  Superseded By: SP 800-66 Rev. 1
  Archived File
SP 800-64 Rev. 1June 2004 Security Considerations in the Information System Development Life Cycle
  Withdrawn: Oct 16, 2008
  Superseded By: SP 800-64 Rev. 2
  Archived File
SP 800-64October 2003 Security Considerations in the Information System Development Life Cycle
  Withdrawn: Jun 16, 2004
  Superseded By: SP 800-64 Rev. 1
  Archived File
SP 800-63-2August 2013 Electronic Authentication Guideline
  Withdrawn: Jun 22, 2017
  Superseded By: SP 800-63 -3
  Archived File
SP 800-63-2August 2013 Electronic Authentication Guideline
  Withdrawn: Jun 22, 2017
  Superseded By: SP 800-63C
  Archived File
SP 800-63-2August 2013 Electronic Authentication Guideline
  Withdrawn: Jun 22, 2017
  Superseded By: SP 800-63A
  Archived File
SP 800-63-2August 2013 Electronic Authentication Guideline
  Withdrawn: Jun 22, 2017
  Superseded By: SP 800-63B
  Archived File
SP 800-63-1December 2011 Electronic Authentication Guideline
  Withdrawn: Aug 29, 2013
  Superseded By: SP 800-63 -2
  Archived File
SP 800-63 Ver. 1.0.2April 2006 Electronic Authentication Guideline
  Withdrawn: Dec 12, 2011
  Superseded By: SP 800-63 -1
  Archived File
SP 800-63 Ver. 1.0.1September 2004 Electronic Authentication Guideline
  Withdrawn: Apr 30, 2006
  Superseded By: SP 800-63 Ver. 1.0.2
  Archived File
SP 800-63 Ver. 1.0June 2004 Electronic Authentication Guideline
  Withdrawn: Sep 27, 2004
  Superseded By: SP 800-63 Ver. 1.0.1
  Archived File
SP 800-61 Rev. 1March 2008 Computer Security Incident Handling Guide
  Withdrawn: Aug 01, 2012
  Superseded By: SP 800-61 Rev. 2
  Archived File
SP 800-61January 2004 Computer Security Incident Handling Guide
  Withdrawn: Mar 07, 2008
  Superseded By: SP 800-61 Rev. 1
  Archived File
SP 800-60 Ver. 2.0June 2004 Guide for Mapping Types of Information and Information Systems to Security Categories
  Withdrawn: Aug 01, 2008
  Superseded By: SP 800-60 Vol. 1 Rev. 1
  Archived File
SP 800-60 Ver. 2.0June 2004 Guide for Mapping Types of Information and Information Systems to Security Categories
  Withdrawn: Aug 01, 2008
  Superseded By: SP 800-60 Vol. 2 Rev. 1
  Archived File
SP 800-57 Part 1 Rev. 3July 2012 Recommendation for Key Management, Part 1: General (Revision 3)
  Withdrawn: Jan 28, 2016
  Superseded By: SP 800-57 Part 1 Rev. 4
  Archived File
SP 800-57 Part 1 Rev. 3July 2012 Recommendation for Key Management, Part 1: General (Revision 3)
  Withdrawn: Jan 28, 2016
  Superseded By: SP 800-57 Part 1 Rev. 4
  Archived File
SP 800-57 Part 1 Rev. 3July 2012 Recommendation for Key Management, Part 1: General (Revision 3)
  Withdrawn: Jan 28, 2016
  Superseded By: SP 800-57 Part 1 Rev. 4
  Archived File
SP 800-57 Part 1 RevisedMarch 2007 Recommendation for Key Management, Part 1: General (Revised)
  Withdrawn: Jul 01, 2012
  Superseded By: SP 800-57 Part 1 Rev. 3
  Archived File
SP 800-57 Part 1 RevisedMay 2006 Recommendation for Key Management, Part 1: General (Revised)
  Withdrawn: Mar 01, 2007
  Superseded By: SP 800-57 Part 1 Revised
  Archived File
SP 800-57 Part 1August 2005 Recommendation for Key Management, Part 1: General
  Withdrawn: May 01, 2006
  Superseded By: SP 800-57 Part 1 Revised
  Archived File
SP 800-57 Part 1August 2005 Recommendation for Key Management, Part 1: General
  Withdrawn: May 01, 2006
  Superseded By: SP 800-57 Part 1 Revised
  Archived File
SP 800-57 Part 1August 2005 Recommendation for Key Management, Part 1: General
  Withdrawn: May 01, 2006
  Superseded By: SP 800-57 Part 1 Revised
  Archived File
SP 800-57 Part 1August 2005 Recommendation for Key Management, Part 1: General
  Withdrawn: May 01, 2006
  Superseded By: SP 800-57 Part 1 Revised
  Archived File
SP 800-57 Part 1August 2005 Recommendation for Key Management, Part 1: General
  Withdrawn: May 01, 2006
  Superseded By: SP 800-57 Part 1 Revised
  Archived File
SP 800-57 Part 3December 2009 Recommendation for Key Management, Part 3: Application-Specific Key Management Guidance
  Withdrawn: Jan 01, 2015
  Superseded By: SP 800-57 Part 3 Rev. 1
  Archived File
SP 800-56A RevisedMarch 2007 Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography
  Withdrawn: May 15, 2013
  Superseded By: SP 800-56A Rev. 2
  Archived File
SP 800-56AMarch 2006 [May 2006]Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography
  Withdrawn: Mar 14, 2007
  Superseded By: SP 800-56A Revised
  Archived File
SP 800-56AMarch 2006 [May 2006]Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography
  Withdrawn: Mar 14, 2007
  Superseded By: SP 800-56A Revised
  Archived File
SP 800-56AMarch 2006 [May 2006]Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography
  Withdrawn: Mar 14, 2007
  Superseded By: SP 800-56A Revised
  Archived File
SP 800-56AMarch 2006 [May 2006]Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography
  Withdrawn: Mar 14, 2007
  Superseded By: SP 800-56A Revised
  Archived File
SP 800-56AMarch 2006 [May 2006]Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography
  Withdrawn: Mar 14, 2007
  Superseded By: SP 800-56A Revised
  Archived File
SP 800-56BAugust 2009 Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptography
  Withdrawn: Sep 30, 2014
  Superseded By: SP 800-56B Rev. 1
  Archived File
SP 800-55August 2003 Security Metrics Guide for Information Technology Systems
  Withdrawn: Jul 01, 2008
  Superseded By: SP 800-55 Rev. 1
  Archived File
SP 800-53A Rev. 4December 2014 Assessing Security and Privacy Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans
  Withdrawn: Dec 18, 2014
  Superseded By: SP 800-53A Rev. 4
SP 800-53A Rev. 1June 2010 Guide for Assessing the Security Controls in Federal Information Systems and Organizations: Building Effective Security Assessment Plans
  Withdrawn: Dec 10, 2015
  Superseded By: SP 800-53A Rev. 4
  Archived File
SP 800-53AJuly 2008 Guide for Assessing the Security Controls in Federal Information Systems and Organizations: Building Effective Security Assessment Plans
  Withdrawn: Jun 29, 2011
  Superseded By: SP 800-53A Rev. 1
  Archived File
SP 800-53 Rev. 4April 2013 (Updated 1/15/2014)Security and Privacy Controls for Federal Information Systems and Organizations
  Withdrawn: Jan 22, 2015
  Superseded By: SP 800-53 Rev. 4
SP 800-53 Rev. 4April 2013 (Updated 5/7/2013)Security and Privacy Controls for Federal Information Systems and Organizations
  Withdrawn: Jan 15, 2014
  Superseded By: SP 800-53 Rev. 4
SP 800-53 Rev. 4April 2013 Security and Privacy Controls for Federal Information Systems and Organizations
  Withdrawn: May 07, 2013
  Superseded By: SP 800-53 Rev. 4
SP 800-53 Rev. 3August 2009 (Updated 5/1/2010)Recommended Security Controls for Federal Information Systems and Organizations
  Withdrawn: Apr 30, 2014
  Superseded By: SP 800-53 Rev. 4
  Archived File
SP 800-53 Rev. 3August 2009 (Updated 9/14/2009)Recommended Security Controls for Federal Information Systems and Organizations
  Withdrawn: May 01, 2010
  Superseded By: SP 800-53 Rev. 3
SP 800-53 Rev. 3August 2009 (Updated 8/12/2009)Recommended Security Controls for Federal Information Systems and Organizations
  Withdrawn: Sep 14, 2009
  Superseded By: SP 800-53 Rev. 3
SP 800-53 Rev. 3August 2009 Recommended Security Controls for Federal Information Systems and Organizations
  Withdrawn: Aug 12, 2009
  Superseded By: SP 800-53 Rev. 3
SP 800-53 Rev. 2December 2007 Recommended Security Controls for Federal Information Systems
  Withdrawn: Aug 03, 2010
  Superseded By: SP 800-53 Rev. 3
  Archived File
SP 800-53 Rev. 1December 2006 Recommended Security Controls for Federal Information Systems
  Withdrawn: Dec 19, 2008
  Superseded By: SP 800-53 Rev. 2
  Archived File
SP 800-53February 2005 (Updated 6/17/2005)Recommended Security Controls for Federal Information Systems
  Withdrawn: Dec 19, 2007
  Superseded By: SP 800-53 Rev. 1
  Archived File
SP 800-53February 2005 (Updated 4/22/2005)Recommended Security Controls for Federal Information Systems
  Withdrawn: Jun 17, 2005
  Superseded By: SP 800-53
SP 800-53February 2005 Recommended Security Controls for Federal Information Systems
  Withdrawn: Apr 22, 2005
  Superseded By: SP 800-53
SP 800-52June 2005 Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations
  Withdrawn: Mar 13, 2013
  Superseded By: SP 800-52 Rev. 1
  Archived File
SP 800-51September 2002 Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme
  Withdrawn: Feb 25, 2011
  Superseded By: SP 800-51 Rev. 1
  Archived File
SP 800-48November 2002 Wireless Network Security: 802.11, Bluetooth and Handheld Devices
  Withdrawn: Jul 01, 2008
  Superseded By: SP 800-48 Rev. 1
  Archived File
SP 800-46 Rev. 1June 2009 Guide to Enterprise Telework and Remote Access Security
  Withdrawn: Jul 29, 2016
  Superseded By: SP 800-46 Rev. 2
  Archived File
SP 800-46August 2002 Security for Telecommuting and Broadband Communications
  Withdrawn: Jun 01, 2009
  Superseded By: SP 800-46 Rev. 1
  Archived File
SP 800-45September 2002 Guidelines on Electronic Mail Security
  Withdrawn: Feb 01, 2007
  Superseded By: SP 800-45 Version 2
  Archived File
SP 800-44September 2002 Guidelines on Securing Public Web Servers
  Withdrawn: Sep 01, 2007
  Superseded By: SP 800-44 Version 2
  Archived File
SP 800-42October 2003 Guideline on Network Security Testing
  Withdrawn: Sep 01, 2008
  Superseded By: SP 800-115
  Archived File
SP 800-41January 2002 Guidelines on Firewalls and Firewall Policy
  Withdrawn: Sep 28, 2009
  Superseded By: SP 800-41 Rev. 1
  Archived File
SP 800-40 Version 2.0November 2005 Creating a Patch and Vulnerability Management Program
  Withdrawn: Jul 22, 2013
  Superseded By: SP 800-40 Rev. 3
  Archived File
SP 800-40August 2002 Procedures for Handling Security Patches
  Withdrawn: Nov 16, 2005
  Superseded By: SP 800-40 Version 2.0
  Archived File
SP 800-38BMay 2005 Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication
  Withdrawn: Oct 06, 2016
  Superseded By: SP 800-38B
  Archived File
SP 800-38CMay 2004 Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality
  Withdrawn: Jul 20, 2007
  Superseded By: SP 800-38C
SP 800-37 Rev. 1February 2010 Guide for Applying the Risk Management Framework to Federal Information Systems: a Security Life Cycle Approach
  Withdrawn: Jun 05, 2014
  Superseded By: SP 800-37 Rev. 1
  Archived File
SP 800-37May 2004 Guide for the Security Certification and Accreditation of Federal Information Systems
  Withdrawn: Feb 22, 2010
  Superseded By: SP 800-37 Rev. 1
  Archived File
SP 800-34 Rev. 1May 2010 Contingency Planning Guide for Federal Information Systems
  Withdrawn: Nov 11, 2010
  Superseded By: SP 800-34 Rev. 1
SP 800-34June 2002 Contingency Planning Guide for Information Technology Systems
  Withdrawn: May 31, 2010
  Superseded By: SP 800-34 Rev. 1
  Archived File
SP 800-31November 2001 Intrusion Detection Systems (IDS)
  Withdrawn: Feb 01, 2007
  Superseded By: SP 800-94
  Archived File
SP 800-30July 2002 Risk Management Guide for Information Technology Systems
  Withdrawn: Sep 01, 2012
  Superseded By: SP 800-30 Rev. 1
  Archived File
SP 800-28October 2001 Guidelines on Active Content and Mobile Code
  Withdrawn: Mar 01, 2008
  Superseded By: SP 800-28 Version 2
  Archived File
SP 800-27June 2001 Engineering Principles for Information Technology Security (A Baseline for Achieving Security)
  Withdrawn: Jun 01, 2004
  Superseded By: SP 800-27 Rev. A
  Archived File
SP 800-26November 2001 Security Self-Assessment Guide for Information Technology Systems
  Withdrawn: Dec 19, 2007
  Superseded By: FIPS 200
  Archived File
SP 800-26November 2001 Security Self-Assessment Guide for Information Technology Systems
  Withdrawn: Dec 19, 2007
  Superseded By: SP 800-53A
  Archived File
SP 800-26November 2001 Security Self-Assessment Guide for Information Technology Systems
  Withdrawn: Dec 19, 2007
  Superseded By: SP 800-53 Rev. 1
  Archived File
SP 800-22May 15, 2001 A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
  Withdrawn: Aug 01, 2008
  Superseded By: SP 800-22 Rev. 1a
  Archived File
SP 800-22May 15, 2001 A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
  Withdrawn: Aug 01, 2008
  Superseded By: SP 800-22 Rev. 1a
  Archived File
SP 800-21 Second editionDecember 2005 Guideline for Implementing Cryptography in the Federal Government
  Withdrawn: Aug 22, 2016
  Superseded By: SP 800-175A
  Archived File
SP 800-21 Second editionDecember 2005 Guideline for Implementing Cryptography in the Federal Government
  Withdrawn: Aug 22, 2016
  Superseded By: SP 800-175B
  Archived File
SP 800-21November 1999 Guideline for Implementing Cryptography in the Federal Government
  Withdrawn: Dec 01, 2005
  Superseded By: SP 800-21 Second edition
  Archived File
SP 800-20October 1999 (Updated 4/1/2000)Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS): Requirements and Procedures
  Withdrawn: Mar 01, 2012
  Superseded By: SP 800-20
SP 800-20October 1999 Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS): Requirements and Procedures
  Withdrawn: Apr 01, 2000
  Superseded By: SP 800-20
SP 800-18December 1998 Guide for Developing Security Plans for Information Technology Systems
  Withdrawn: Feb 01, 2006
  Superseded By: SP 800-18 Rev. 1
  Archived File
SP 800-12October 1995 An Introduction to Computer Security: the NIST Handbook
  Withdrawn: Jun 22, 2017
  Superseded By: SP 800-12 Rev. 1
  Archived File
SP 800-11February 1995 The Impact of the FCC's Open Network Architecture on NS/EP Telecommunications Security
  Archived File
SP 800-10December 1994 Keeping Your Site Comfortably Secure: An Introduction to Internet Firewalls
  Archived File
SP 800-9December 1993 Good Security Practices for Electronic Commerce, Including Electronic Data Interchange
  Archived File
SP 800-8July 30, 1993 Security Issues in the Database Language SQL
  Archived File
SP 800-7July 1994 Security in Open Systems
  Archived File
SP 800-6December 1992 Automated Tools for Testing Computer System Vulnerability
  Archived File
SP 800-5December 1992 A Guide to the Selection of Anti-Virus Tools and Techniques
  Archived File
SP 800-4March 1992 Computer Security Considerations in Federal Procurements: A Guide for Procurement Initiatiors, Contracting Officers, and Computer Security
  Withdrawn: Oct 10, 2003
  Superseded By: SP 800-64
  Archived File
SP 800-3November 1991 Establishing a Computer Security Incident Response Capability (CSIRC)
  Withdrawn: Jan 16, 2004
  Superseded By: SP 800-61
  Archived File
SP 800-2April 1991 Public Key Cryptography
  Archived File
SP 500-189September 1991 Security in ISDN
  Archived File
SP 500-174October 1989 Guide for Selecting Automated Risk Analysis Tools
  Archived File
SP 500-172November 1989 Computer Security Training Guidelines
  Withdrawn: Apr 01, 1998
  Superseded By: SP 800-16
  Archived File
SP 500-171October 1989 Computer Users' Guide to the Protection of Information Resources
  Archived File
SP 500-170October 1989 Management Guide to the Protection of Information Resources
  Archived File
SP 500-169October 1989 Executive Guide to the Protection of Information Resources
  Archived File
SP 500-166August 1989 Computer Viruses and Related Threats: a Management Guide
  Archived File
SP 500-160January 1989 Report of the Invitational Workshop on Integrity Policy in Computer Information Systems (WIPCIS)
  Archived File
SP 500-158August 1988 Accuracy, Integrity, and Security in Computerized Vote-Tallying
  Archived File
SP 500-157September 1988 Smart Card Technology: New Methods for Computer Access Control
  Archived File
SP 500-156May 1988 Message Authentication Code (MAC) Validation System: Requirements and Procedures
  Archived File
SP 500-153April 1988 Guide to Auditing for Controls and Security: A System Development Life Cycle Approach
  Archived File
SP 500-134November 1985 Guide on Selecting ADP Backup Process Alternatives
  Archived File
SP 500-133October 1985 Technology Assessment: Methods for Measuring the Level of Computer Security
  Archived File
SP 500-120January 1985 Security of Personal Computer Systems: A Management Guide
  Archived File
SP 500-85January 1982 Executive Guide to ADP Contingency Planning
  Archived File
SP 500-61August 1980 Maintenance Testing for the Data Encryption Standard
  Archived File
SP 500-57April 1980 Audit and Evaluation of Computer Security II: System Vulnerabilities and Controls
  Archived File
SP 500-42January 1979 A Survey of Remote Monitoring
  Archived File
SP 500-30April 1978 Effective Use of Computing Technology in Vote-Tallying
  Archived File
SP 500-27February 1978 Computer Security and the Data Encryption Standard: Proceedings of the Conference on Computer Security and the Data Encryption Standard
  Archived File
SP 500-25January 1978 An Analysis of Computer Security Safeguards for Detecting and Preventing Intentional Computer Misuse
  Archived File
SP 500-24January 1978 Performance Assurance and Data Integrity Practices
  Archived File
SP 500-21 Vol. 2January 1978 The Network Security Center: a System Level Approach to Computer Network Security
  Archived File
SP 500-21 Vol. 1January 1978 Design Alternatives for Computer Network Security
  Archived File
SP 500-20September 1980 Validating the Correctness of Hardware Implementations of the NBS Data Encryption Standard
  Archived File
SP 500-20November 1977 Validating the Correctness of Hardware Implementations of the NBS Data Encryption Standard
  Withdrawn: Sep 01, 1980
  Superseded By: SP 500-20
  Archived File
SP 500-19October 1977 Audit and Evaluation of Computer Security
  Archived File
Back to Top