SP 800-171 | June 2015 (Updated 9/3/2015) | Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations Withdrawn: Jan 21, 2016 Superseded By: SP 800-171 |
SP 800-171 | June 2015 | Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations Withdrawn: Oct 01, 2015 Superseded By: SP 800-171 Archived File |
SP 800-171 | June 2015 | Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations Withdrawn: Oct 01, 2015 Superseded By: SP 800-171 Archived File |
SP 800-171 | June 2015 | Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations Withdrawn: Oct 01, 2015 Superseded By: SP 800-171 Archived File |
SP 800-135 | December 2010 | Recommendation for Existing Application-Specific Key Derivation Functions Withdrawn: Dec 01, 2011 Superseded By: SP 800-135 Rev. 1 Archived File |
SP 800-131A | January 2011 | Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths Withdrawn: Nov 06, 2015 Superseded By: SP 800-131A Rev. 1 Archived File |
SP 800-126 Rev. 2 | September 2011 | The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.2 Withdrawn: Mar 19, 2012 Superseded By: SP 800-126 Rev. 2 |
SP 800-124 | October 2008 | Guidelines on Cell Phone and PDA Security Withdrawn: Jun 21, 2013 Superseded By: SP 800-124 Rev. 1 Archived File |
SP 800-121 Rev. 1 | June 2012 | Guide to Bluetooth Security Withdrawn: May 08, 2017 Superseded By: SP 800-121 Rev. 2 Archived File |
SP 800-121 Rev. 1 | June 2012 | Guide to Bluetooth Security Withdrawn: May 08, 2017 Superseded By: SP 800-121 Rev. 2 Archived File |
SP 800-121 | September 2008 | Guide to Bluetooth Security Withdrawn: Jun 01, 2012 Superseded By: SP 800-121 Rev. 1 Archived File |
SP 800-114 | November 2007 | User's Guide to Securing External Devices for Telework and Remote Access Withdrawn: Jul 29, 2016 Superseded By: SP 800-114 Rev. 1 Archived File |
SP 800-107 | February 2009 | Recommendation for Applications Using Approved Hash Algorithms Withdrawn: Aug 24, 2012 Superseded By: SP 800-107 Rev. 1 Archived File |
SP 800-104 | June 2007 | A Scheme for PIV Visual Card Topography Withdrawn: Sep 01, 2014 Superseded By: FIPS 201-2 Archived File |
SP 800-101 | May 2007 | Guidelines on Cell Phone Forensics Withdrawn: May 15, 2014 Superseded By: SP 800-101 Rev. 1 Archived File |
SP 800-100 | October 2006 | Information Security Handbook: A Guide for Managers Withdrawn: Mar 07, 2007 Superseded By: SP 800-100 |
SP 800-90A | January 2012 | Recommendation for Random Number Generation Using Deterministic Random Bit Generators Withdrawn: Jun 24, 2015 Superseded By: SP 800-90A Rev. 1 Archived File |
SP 800-90A | January 2012 | Recommendation for Random Number Generation Using Deterministic Random Bit Generators Withdrawn: Jun 24, 2015 Superseded By: SP 800-90A Rev. 1 Archived File |
SP 800-90 Revised | March 2007 | Recommendation for Random Number Generation Using Deterministic Random Bit Generators (Revised) Withdrawn: Jan 01, 2012 Superseded By: SP 800-90A Archived File |
SP 800-90 | June 2006 | Recommendation for Random Number Generation Using Deterministic Random Bit Generators Withdrawn: Mar 14, 2007 Superseded By: SP 800-90 Revised Archived File |
SP 800-90 | June 2006 | Recommendation for Random Number Generation Using Deterministic Random Bit Generators Withdrawn: Mar 14, 2007 Superseded By: SP 800-90 Archived File |
SP 800-90 | June 2006 | Recommendation for Random Number Generation Using Deterministic Random Bit Generators Withdrawn: Mar 14, 2007 Superseded By: SP 800-90 Revised Archived File |
SP 800-90 | June 2006 | Recommendation for Random Number Generation Using Deterministic Random Bit Generators Withdrawn: Mar 14, 2007 Superseded By: SP 800-90 Archived File |
SP 800-88 | September 2006 | Guidelines for Media Sanitization Withdrawn: Dec 22, 2014 Superseded By: SP 800-88 Rev. 1 Archived File |
SP 800-88 | August 2006 | Guidelines for Media Sanitization Withdrawn: Sep 11, 2006 Superseded By: SP 800-88 |
SP 800-87 Version 1.0 (March 2007 edition) | March 2007 | Codes for the Identification of Federal and Federally Assisted Organizations Withdrawn: Apr 01, 2008 Superseded By: SP 800-87 Rev. 1 Archived File |
SP 800-87 Version 1.0 (January 2006 edition) | January 2006 | Codes for the Identification of Federal and Federally Assisted Organizations Withdrawn: Mar 15, 2007 Superseded By: SP 800-87 Version 1.0 (March 2007 edition) Archived File |
SP 800-87 Version 1.0 | October 2005 | Codes for the Identification of Federal and Federally Assisted Organizations Version 1.0 Withdrawn: Jan 15, 2006 Superseded By: SP 800-87 Version 1.0 (January 2006 edition) Archived File |
SP 800-85A-2 | July 2010 | PIV Card Application and Middleware Interface Test Guidelines (SP800-73-3 Compliance) Withdrawn: Apr 13, 2016 Superseded By: SP 800-85A -4 Archived File |
SP 800-85A-1 | March 2009 | PIV Card Application and Middleware Interface Test Guidelines (SP800-73-2 Compliance) Withdrawn: Jul 28, 2010 Superseded By: SP 800-85A -2 Archived File |
SP 800-85A-1 | March 2009 | PIV Card Application and Middleware Interface Test Guidelines (SP800-73-2 Compliance) Withdrawn: Jul 28, 2010 Superseded By: SP 800-85A -2 Archived File |
SP 800-85A | April 2006 | PIV Card Application and Middleware Interface Test Guidelines (SP800-73 Compliance) Withdrawn: Apr 03, 2009 Superseded By: SP 800-85A -1 Archived File |
SP 800-85 | October 2005 | PIV Middleware and On-Card Application Conformance Test Guidance (SP 800-73 Compliance) Withdrawn: Apr 05, 2006 Superseded By: SP 800-85A Archived File |
SP 800-83 | November 2005 | Guide to Malware Incident Prevention and Handling Withdrawn: Jul 22, 2013 Superseded By: SP 800-83 Rev. 1 Archived File |
SP 800-82 Rev. 1 | May 2013 | Guide to Industrial Control Systems (ICS) Security Withdrawn: May 29, 2015 Superseded By: SP 800-82 Rev. 2 Archived File |
SP 800-82 | June 2011 | Guide to Industrial Control Systems (ICS) Security Withdrawn: May 14, 2013 Superseded By: SP 800-82 Rev. 1 Archived File |
SP 800-81 Rev. 1 | April 2010 | Secure Domain Name System (DNS) Deployment Guide Withdrawn: Sep 13, 2013 Superseded By: SP 800-81 -2 Archived File |
SP 800-81 | May 2006 | Secure Domain Name System (DNS) Deployment Guide Withdrawn: Apr 30, 2010 Superseded By: SP 800-81 Rev. 1 Archived File |
SP 800-79-1 | June 2008 | Guidelines for the Accreditation of Personal Identity Verification Card Issuers Withdrawn: Jul 30, 2015 Superseded By: SP 800-79 -2 Archived File |
SP 800-79 | July 2005 | Guidelines for the Certification and Accreditation of PIV Card Issuing Organizations Withdrawn: Jun 18, 2008 Superseded By: SP 800-79 -1 Archived File |
SP 800-78-3 | December 2010 | Cryptographic Algorithms and Key Sizes for Personal Identity Verification Withdrawn: May 29, 2015 Superseded By: SP 800-78 -4 Archived File |
SP 800-78-2 | February 2010 | Cryptographic Algorithms and Key Sizes for Personal Identity Verification Withdrawn: Dec 01, 2010 Superseded By: SP 800-78 -3 Archived File |
SP 800-78-1 | August 2007 | Cryptographic Algorithms and Key Sizes for Personal Identity Verification Withdrawn: Feb 13, 2010 Superseded By: SP 800-78 -2 Archived File |
SP 800-78 | April 2005 | Cryptographic Algorithms and Key Sizes for Personal Identity Verification Withdrawn: Aug 01, 2007 Superseded By: SP 800-78 -1 Archived File |
SP 800-76-1 | January 2007 | Biometric Data Specification for Personal Identity Verification Withdrawn: Jul 11, 2013 Superseded By: SP 800-76 -2 Archived File |
SP 800-76 | February 1, 2006 | Biometric Data Specification for Personal Identity Verification Withdrawn: Jan 17, 2007 Superseded By: SP 800-76 -1 Archived File |
SP 800-76 | February 1, 2006 | Biometric Data Specification for Personal Identity Verification Withdrawn: Jan 17, 2007 Superseded By: SP 800-76 -1 Archived File |
SP 800-73-4 | May 2015 | Interfaces for Personal Identity Verification Withdrawn: Feb 12, 2016 Superseded By: SP 800-73 -4 Archived File |
SP 800-73-4 | May 2015 | Interfaces for Personal Identity Verification Withdrawn: Feb 12, 2016 Superseded By: SP 800-73 -4 Archived File |
SP 800-73-4 | May 2015 | Interfaces for Personal Identity Verification Withdrawn: Feb 12, 2016 Superseded By: SP 800-73 -4 Archived File |
SP 800-73-4 | May 2015 | Interfaces for Personal Identity Verification Withdrawn: Feb 12, 2016 Superseded By: SP 800-73 -4 Archived File |
SP 800-73-4 | May 2015 | Interfaces for Personal Identity Verification Withdrawn: Feb 12, 2016 Superseded By: SP 800-73 -4 Archived File |
SP 800-73-4 | May 2015 | Interfaces for Personal Identity Verification Withdrawn: Feb 12, 2016 Superseded By: SP 800-73 -4 Archived File |
SP 800-73-4 | May 2015 | Interfaces for Personal Identity Verification Withdrawn: Feb 12, 2016 Superseded By: SP 800-73 -4 Archived File |
SP 800-73-4 | May 2015 | Interfaces for Personal Identity Verification Withdrawn: Feb 12, 2016 Superseded By: SP 800-73 -4 Archived File |
SP 800-73-4 | May 2015 | Interfaces for Personal Identity Verification Withdrawn: Feb 12, 2016 Superseded By: SP 800-73 -4 Archived File |
SP 800-73-4 | May 2015 | Interfaces for Personal Identity Verification Withdrawn: Feb 12, 2016 Superseded By: SP 800-73 -4 Archived File |
SP 800-73-4 | May 2015 | Interfaces for Personal Identity Verification Withdrawn: Feb 12, 2016 Superseded By: SP 800-73 -4 Archived File |
SP 800-73-4 | May 2015 | Interfaces for Personal Identity Verification Withdrawn: Feb 12, 2016 Superseded By: SP 800-73 -4 Archived File |
SP 800-73-3 | February 2010 | Interfaces for Personal Identity Verification Withdrawn: May 29, 2015 Superseded By: SP 800-73 -4 Archived File |
SP 800-73-2 | September 2008 | Interfaces for Personal Identity Verification Withdrawn: Feb 01, 2010 Superseded By: SP 800-73 -3 Archived File |
SP 800-73-1 | March 2006 | Interfaces for Personal Identity Verification Withdrawn: Sep 18, 2008 Superseded By: SP 800-73 -2 Archived File |
SP 800-73 | April 2005 | Interfaces for Personal Identity Verification Withdrawn: Sep 29, 2005 Superseded By: SP 800-73 |
SP 800-73 | April 2005 (Updated 9/29/2005) | Interfaces for Personal Identity Verification Withdrawn: Mar 15, 2006 Superseded By: SP 800-73 -1 Archived File |
SP 800-70 Rev. 3 | December 2015 | National Checklist Program for IT Products: Guidelines for Checklist Users and Developers Withdrawn: Dec 08, 2016 Superseded By: SP 800-70 Rev. 3 Archived File |
SP 800-70 Rev. 2 | February 2011 | National Checklist Program for IT Products: Guidelines for Checklist Users and Developers Withdrawn: Dec 10, 2015 Superseded By: SP 800-70 Rev. 3 Archived File |
SP 800-70 Rev. 1 | September 2009 | National Checklist Program for IT Products: Guidelines for Checklist Users and Developers Withdrawn: Feb 01, 2011 Superseded By: SP 800-70 Rev. 2 Archived File |
SP 800-70 | May 2005 | Security Configuration Checklists Program for IT Products: Guidance for Checklists Users and Developers Withdrawn: Sep 30, 2009 Superseded By: SP 800-70 Rev. 1 Archived File |
SP 800-68 | October 2005 | Guidance for Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist Withdrawn: Oct 01, 2008 Superseded By: SP 800-68 Rev. 1 Archived File |
SP 800-67 Ver. 1 | May 2004 | Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher Withdrawn: Jan 01, 2012 Superseded By: SP 800-67 Rev. 1 Archived File |
SP 800-66 | March 2005 | An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule Withdrawn: Oct 01, 2008 Superseded By: SP 800-66 Rev. 1 Archived File |
SP 800-64 Rev. 1 | June 2004 | Security Considerations in the Information System Development Life Cycle Withdrawn: Oct 16, 2008 Superseded By: SP 800-64 Rev. 2 Archived File |
SP 800-64 | October 2003 | Security Considerations in the Information System Development Life Cycle Withdrawn: Jun 16, 2004 Superseded By: SP 800-64 Rev. 1 Archived File |
SP 800-63-2 | August 2013 | Electronic Authentication Guideline Withdrawn: Jun 22, 2017 Superseded By: SP 800-63 -3 Archived File |
SP 800-63-2 | August 2013 | Electronic Authentication Guideline Withdrawn: Jun 22, 2017 Superseded By: SP 800-63C Archived File |
SP 800-63-2 | August 2013 | Electronic Authentication Guideline Withdrawn: Jun 22, 2017 Superseded By: SP 800-63A Archived File |
SP 800-63-2 | August 2013 | Electronic Authentication Guideline Withdrawn: Jun 22, 2017 Superseded By: SP 800-63B Archived File |
SP 800-63-1 | December 2011 | Electronic Authentication Guideline Withdrawn: Aug 29, 2013 Superseded By: SP 800-63 -2 Archived File |
SP 800-63 Ver. 1.0.2 | April 2006 | Electronic Authentication Guideline Withdrawn: Dec 12, 2011 Superseded By: SP 800-63 -1 Archived File |
SP 800-63 Ver. 1.0.1 | September 2004 | Electronic Authentication Guideline Withdrawn: Apr 30, 2006 Superseded By: SP 800-63 Ver. 1.0.2 Archived File |
SP 800-63 Ver. 1.0 | June 2004 | Electronic Authentication Guideline Withdrawn: Sep 27, 2004 Superseded By: SP 800-63 Ver. 1.0.1 Archived File |
SP 800-61 Rev. 1 | March 2008 | Computer Security Incident Handling Guide Withdrawn: Aug 01, 2012 Superseded By: SP 800-61 Rev. 2 Archived File |
SP 800-61 | January 2004 | Computer Security Incident Handling Guide Withdrawn: Mar 07, 2008 Superseded By: SP 800-61 Rev. 1 Archived File |
SP 800-60 Ver. 2.0 | June 2004 | Guide for Mapping Types of Information and Information Systems to Security Categories Withdrawn: Aug 01, 2008 Superseded By: SP 800-60 Vol. 1 Rev. 1 Archived File |
SP 800-60 Ver. 2.0 | June 2004 | Guide for Mapping Types of Information and Information Systems to Security Categories Withdrawn: Aug 01, 2008 Superseded By: SP 800-60 Vol. 2 Rev. 1 Archived File |
SP 800-57 Part 1 Rev. 3 | July 2012 | Recommendation for Key Management, Part 1: General (Revision 3) Withdrawn: Jan 28, 2016 Superseded By: SP 800-57 Part 1 Rev. 4 Archived File |
SP 800-57 Part 1 Rev. 3 | July 2012 | Recommendation for Key Management, Part 1: General (Revision 3) Withdrawn: Jan 28, 2016 Superseded By: SP 800-57 Part 1 Rev. 4 Archived File |
SP 800-57 Part 1 Rev. 3 | July 2012 | Recommendation for Key Management, Part 1: General (Revision 3) Withdrawn: Jan 28, 2016 Superseded By: SP 800-57 Part 1 Rev. 4 Archived File |
SP 800-57 Part 1 Revised | March 2007 | Recommendation for Key Management, Part 1: General (Revised) Withdrawn: Jul 01, 2012 Superseded By: SP 800-57 Part 1 Rev. 3 Archived File |
SP 800-57 Part 1 Revised | May 2006 | Recommendation for Key Management, Part 1: General (Revised) Withdrawn: Mar 01, 2007 Superseded By: SP 800-57 Part 1 Revised Archived File |
SP 800-57 Part 1 | August 2005 | Recommendation for Key Management, Part 1: General Withdrawn: May 01, 2006 Superseded By: SP 800-57 Part 1 Revised Archived File |
SP 800-57 Part 1 | August 2005 | Recommendation for Key Management, Part 1: General Withdrawn: May 01, 2006 Superseded By: SP 800-57 Part 1 Revised Archived File |
SP 800-57 Part 1 | August 2005 | Recommendation for Key Management, Part 1: General Withdrawn: May 01, 2006 Superseded By: SP 800-57 Part 1 Revised Archived File |
SP 800-57 Part 1 | August 2005 | Recommendation for Key Management, Part 1: General Withdrawn: May 01, 2006 Superseded By: SP 800-57 Part 1 Revised Archived File |
SP 800-57 Part 1 | August 2005 | Recommendation for Key Management, Part 1: General Withdrawn: May 01, 2006 Superseded By: SP 800-57 Part 1 Revised Archived File |
SP 800-57 Part 3 | December 2009 | Recommendation for Key Management, Part 3: Application-Specific Key Management Guidance Withdrawn: Jan 01, 2015 Superseded By: SP 800-57 Part 3 Rev. 1 Archived File |
SP 800-56A Revised | March 2007 | Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography Withdrawn: May 15, 2013 Superseded By: SP 800-56A Rev. 2 Archived File |
SP 800-56A | March 2006 [May 2006] | Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography Withdrawn: Mar 14, 2007 Superseded By: SP 800-56A Revised Archived File |
SP 800-56A | March 2006 [May 2006] | Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography Withdrawn: Mar 14, 2007 Superseded By: SP 800-56A Revised Archived File |
SP 800-56A | March 2006 [May 2006] | Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography Withdrawn: Mar 14, 2007 Superseded By: SP 800-56A Revised Archived File |
SP 800-56A | March 2006 [May 2006] | Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography Withdrawn: Mar 14, 2007 Superseded By: SP 800-56A Revised Archived File |
SP 800-56A | March 2006 [May 2006] | Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography Withdrawn: Mar 14, 2007 Superseded By: SP 800-56A Revised Archived File |
SP 800-56B | August 2009 | Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptography Withdrawn: Sep 30, 2014 Superseded By: SP 800-56B Rev. 1 Archived File |
SP 800-55 | August 2003 | Security Metrics Guide for Information Technology Systems Withdrawn: Jul 01, 2008 Superseded By: SP 800-55 Rev. 1 Archived File |
SP 800-53A Rev. 4 | December 2014 | Assessing Security and Privacy Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans Withdrawn: Dec 18, 2014 Superseded By: SP 800-53A Rev. 4 |
SP 800-53A Rev. 1 | June 2010 | Guide for Assessing the Security Controls in Federal Information Systems and Organizations: Building Effective Security Assessment Plans Withdrawn: Dec 10, 2015 Superseded By: SP 800-53A Rev. 4 Archived File |
SP 800-53A | July 2008 | Guide for Assessing the Security Controls in Federal Information Systems and Organizations: Building Effective Security Assessment Plans Withdrawn: Jun 29, 2011 Superseded By: SP 800-53A Rev. 1 Archived File |
SP 800-53 Rev. 4 | April 2013 (Updated 1/15/2014) | Security and Privacy Controls for Federal Information Systems and Organizations Withdrawn: Jan 22, 2015 Superseded By: SP 800-53 Rev. 4 |
SP 800-53 Rev. 4 | April 2013 (Updated 5/7/2013) | Security and Privacy Controls for Federal Information Systems and Organizations Withdrawn: Jan 15, 2014 Superseded By: SP 800-53 Rev. 4 |
SP 800-53 Rev. 4 | April 2013 | Security and Privacy Controls for Federal Information Systems and Organizations Withdrawn: May 07, 2013 Superseded By: SP 800-53 Rev. 4 |
SP 800-53 Rev. 3 | August 2009 (Updated 5/1/2010) | Recommended Security Controls for Federal Information Systems and Organizations Withdrawn: Apr 30, 2014 Superseded By: SP 800-53 Rev. 4 Archived File |
SP 800-53 Rev. 3 | August 2009 (Updated 9/14/2009) | Recommended Security Controls for Federal Information Systems and Organizations Withdrawn: May 01, 2010 Superseded By: SP 800-53 Rev. 3 |
SP 800-53 Rev. 3 | August 2009 (Updated 8/12/2009) | Recommended Security Controls for Federal Information Systems and Organizations Withdrawn: Sep 14, 2009 Superseded By: SP 800-53 Rev. 3 |
SP 800-53 Rev. 3 | August 2009 | Recommended Security Controls for Federal Information Systems and Organizations Withdrawn: Aug 12, 2009 Superseded By: SP 800-53 Rev. 3 |
SP 800-53 Rev. 2 | December 2007 | Recommended Security Controls for Federal Information Systems Withdrawn: Aug 03, 2010 Superseded By: SP 800-53 Rev. 3 Archived File |
SP 800-53 Rev. 1 | December 2006 | Recommended Security Controls for Federal Information Systems Withdrawn: Dec 19, 2008 Superseded By: SP 800-53 Rev. 2 Archived File |
SP 800-53 | February 2005 (Updated 6/17/2005) | Recommended Security Controls for Federal Information Systems Withdrawn: Dec 19, 2007 Superseded By: SP 800-53 Rev. 1 Archived File |
SP 800-53 | February 2005 (Updated 4/22/2005) | Recommended Security Controls for Federal Information Systems Withdrawn: Jun 17, 2005 Superseded By: SP 800-53 |
SP 800-53 | February 2005 | Recommended Security Controls for Federal Information Systems Withdrawn: Apr 22, 2005 Superseded By: SP 800-53 |
SP 800-52 | June 2005 | Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations Withdrawn: Mar 13, 2013 Superseded By: SP 800-52 Rev. 1 Archived File |
SP 800-51 | September 2002 | Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme Withdrawn: Feb 25, 2011 Superseded By: SP 800-51 Rev. 1 Archived File |
SP 800-48 | November 2002 | Wireless Network Security: 802.11, Bluetooth and Handheld Devices Withdrawn: Jul 01, 2008 Superseded By: SP 800-48 Rev. 1 Archived File |
SP 800-46 Rev. 1 | June 2009 | Guide to Enterprise Telework and Remote Access Security Withdrawn: Jul 29, 2016 Superseded By: SP 800-46 Rev. 2 Archived File |
SP 800-46 | August 2002 | Security for Telecommuting and Broadband Communications Withdrawn: Jun 01, 2009 Superseded By: SP 800-46 Rev. 1 Archived File |
SP 800-45 | September 2002 | Guidelines on Electronic Mail Security Withdrawn: Feb 01, 2007 Superseded By: SP 800-45 Version 2 Archived File |
SP 800-44 | September 2002 | Guidelines on Securing Public Web Servers Withdrawn: Sep 01, 2007 Superseded By: SP 800-44 Version 2 Archived File |
SP 800-42 | October 2003 | Guideline on Network Security Testing Withdrawn: Sep 01, 2008 Superseded By: SP 800-115 Archived File |
SP 800-41 | January 2002 | Guidelines on Firewalls and Firewall Policy Withdrawn: Sep 28, 2009 Superseded By: SP 800-41 Rev. 1 Archived File |
SP 800-40 Version 2.0 | November 2005 | Creating a Patch and Vulnerability Management Program Withdrawn: Jul 22, 2013 Superseded By: SP 800-40 Rev. 3 Archived File |
SP 800-40 | August 2002 | Procedures for Handling Security Patches Withdrawn: Nov 16, 2005 Superseded By: SP 800-40 Version 2.0 Archived File |
SP 800-38B | May 2005 | Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication Withdrawn: Oct 06, 2016 Superseded By: SP 800-38B Archived File |
SP 800-38C | May 2004 | Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality Withdrawn: Jul 20, 2007 Superseded By: SP 800-38C |
SP 800-37 Rev. 1 | February 2010 | Guide for Applying the Risk Management Framework to Federal Information Systems: a Security Life Cycle Approach Withdrawn: Jun 05, 2014 Superseded By: SP 800-37 Rev. 1 Archived File |
SP 800-37 | May 2004 | Guide for the Security Certification and Accreditation of Federal Information Systems Withdrawn: Feb 22, 2010 Superseded By: SP 800-37 Rev. 1 Archived File |
SP 800-34 Rev. 1 | May 2010 | Contingency Planning Guide for Federal Information Systems Withdrawn: Nov 11, 2010 Superseded By: SP 800-34 Rev. 1 |
SP 800-34 | June 2002 | Contingency Planning Guide for Information Technology Systems Withdrawn: May 31, 2010 Superseded By: SP 800-34 Rev. 1 Archived File |
SP 800-31 | November 2001 | Intrusion Detection Systems (IDS) Withdrawn: Feb 01, 2007 Superseded By: SP 800-94 Archived File |
SP 800-30 | July 2002 | Risk Management Guide for Information Technology Systems Withdrawn: Sep 01, 2012 Superseded By: SP 800-30 Rev. 1 Archived File |
SP 800-28 | October 2001 | Guidelines on Active Content and Mobile Code Withdrawn: Mar 01, 2008 Superseded By: SP 800-28 Version 2 Archived File |
SP 800-27 | June 2001 | Engineering Principles for Information Technology Security (A Baseline for Achieving Security) Withdrawn: Jun 01, 2004 Superseded By: SP 800-27 Rev. A Archived File |
SP 800-26 | November 2001 | Security Self-Assessment Guide for Information Technology Systems Withdrawn: Dec 19, 2007 Superseded By: FIPS 200 Archived File |
SP 800-26 | November 2001 | Security Self-Assessment Guide for Information Technology Systems Withdrawn: Dec 19, 2007 Superseded By: SP 800-53A Archived File |
SP 800-26 | November 2001 | Security Self-Assessment Guide for Information Technology Systems Withdrawn: Dec 19, 2007 Superseded By: SP 800-53 Rev. 1 Archived File |
SP 800-22 | May 15, 2001 | A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications Withdrawn: Aug 01, 2008 Superseded By: SP 800-22 Rev. 1a Archived File |
SP 800-22 | May 15, 2001 | A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications Withdrawn: Aug 01, 2008 Superseded By: SP 800-22 Rev. 1a Archived File |
SP 800-21 Second edition | December 2005 | Guideline for Implementing Cryptography in the Federal Government Withdrawn: Aug 22, 2016 Superseded By: SP 800-175A Archived File |
SP 800-21 Second edition | December 2005 | Guideline for Implementing Cryptography in the Federal Government Withdrawn: Aug 22, 2016 Superseded By: SP 800-175B Archived File |
SP 800-21 | November 1999 | Guideline for Implementing Cryptography in the Federal Government Withdrawn: Dec 01, 2005 Superseded By: SP 800-21 Second edition Archived File |
SP 800-20 | October 1999 (Updated 4/1/2000) | Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS): Requirements and Procedures Withdrawn: Mar 01, 2012 Superseded By: SP 800-20 |
SP 800-20 | October 1999 | Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS): Requirements and Procedures Withdrawn: Apr 01, 2000 Superseded By: SP 800-20 |
SP 800-18 | December 1998 | Guide for Developing Security Plans for Information Technology Systems Withdrawn: Feb 01, 2006 Superseded By: SP 800-18 Rev. 1 Archived File |
SP 800-12 | October 1995 | An Introduction to Computer Security: the NIST Handbook Withdrawn: Jun 22, 2017 Superseded By: SP 800-12 Rev. 1 Archived File |
SP 800-11 | February 1995 | The Impact of the FCC's Open Network Architecture on NS/EP Telecommunications Security Archived File |
SP 800-10 | December 1994 | Keeping Your Site Comfortably Secure: An Introduction to Internet Firewalls Archived File |
SP 800-9 | December 1993 | Good Security Practices for Electronic Commerce, Including Electronic Data Interchange Archived File |
SP 800-8 | July 30, 1993 | Security Issues in the Database Language SQL Archived File |
SP 800-7 | July 1994 | Security in Open Systems Archived File |
SP 800-6 | December 1992 | Automated Tools for Testing Computer System Vulnerability Archived File |
SP 800-5 | December 1992 | A Guide to the Selection of Anti-Virus Tools and Techniques Archived File |
SP 800-4 | March 1992 | Computer Security Considerations in Federal Procurements: A Guide for Procurement Initiatiors, Contracting Officers, and Computer Security Withdrawn: Oct 10, 2003 Superseded By: SP 800-64 Archived File |
SP 800-3 | November 1991 | Establishing a Computer Security Incident Response Capability (CSIRC) Withdrawn: Jan 16, 2004 Superseded By: SP 800-61 Archived File |
SP 800-2 | April 1991 | Public Key Cryptography Archived File |
SP 500-189 | September 1991 | Security in ISDN Archived File |
SP 500-174 | October 1989 | Guide for Selecting Automated Risk Analysis Tools Archived File |
SP 500-172 | November 1989 | Computer Security Training Guidelines Withdrawn: Apr 01, 1998 Superseded By: SP 800-16 Archived File |
SP 500-171 | October 1989 | Computer Users' Guide to the Protection of Information Resources Archived File |
SP 500-170 | October 1989 | Management Guide to the Protection of Information Resources Archived File |
SP 500-169 | October 1989 | Executive Guide to the Protection of Information Resources Archived File |
SP 500-166 | August 1989 | Computer Viruses and Related Threats: a Management Guide Archived File |
SP 500-160 | January 1989 | Report of the Invitational Workshop on Integrity Policy in Computer Information Systems (WIPCIS) Archived File |
SP 500-158 | August 1988 | Accuracy, Integrity, and Security in Computerized Vote-Tallying Archived File |
SP 500-157 | September 1988 | Smart Card Technology: New Methods for Computer Access Control Archived File |
SP 500-156 | May 1988 | Message Authentication Code (MAC) Validation System: Requirements and Procedures Archived File |
SP 500-153 | April 1988 | Guide to Auditing for Controls and Security: A System Development Life Cycle Approach Archived File |
SP 500-134 | November 1985 | Guide on Selecting ADP Backup Process Alternatives Archived File |
SP 500-133 | October 1985 | Technology Assessment: Methods for Measuring the Level of Computer Security Archived File |
SP 500-120 | January 1985 | Security of Personal Computer Systems: A Management Guide Archived File |
SP 500-85 | January 1982 | Executive Guide to ADP Contingency Planning Archived File |
SP 500-61 | August 1980 | Maintenance Testing for the Data Encryption Standard Archived File |
SP 500-57 | April 1980 | Audit and Evaluation of Computer Security II: System Vulnerabilities and Controls Archived File |
SP 500-42 | January 1979 | A Survey of Remote Monitoring Archived File |
SP 500-30 | April 1978 | Effective Use of Computing Technology in Vote-Tallying Archived File |
SP 500-27 | February 1978 | Computer Security and the Data Encryption Standard: Proceedings of the Conference on Computer Security and the Data Encryption Standard Archived File |
SP 500-25 | January 1978 | An Analysis of Computer Security Safeguards for Detecting and Preventing Intentional Computer Misuse Archived File |
SP 500-24 | January 1978 | Performance Assurance and Data Integrity Practices Archived File |
SP 500-21 Vol. 2 | January 1978 | The Network Security Center: a System Level Approach to Computer Network Security Archived File |
SP 500-21 Vol. 1 | January 1978 | Design Alternatives for Computer Network Security Archived File |
SP 500-20 | September 1980 | Validating the Correctness of Hardware Implementations of the NBS Data Encryption Standard Archived File |
SP 500-20 | November 1977 | Validating the Correctness of Hardware Implementations of the NBS Data Encryption Standard Withdrawn: Sep 01, 1980 Superseded By: SP 500-20 Archived File |
SP 500-19 | October 1977 | Audit and Evaluation of Computer Security Archived File |