U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 976 through 1000 of 13539 matching records.
Publications NISTIR 8403 May 26, 2022
https://csrc.nist.rip/publications/detail/nistir/8403/final

Abstract: The rapid development and wide application of distributed network systems have made network security – especially access control and data privacy – ever more important. Blockchain technology offers features such as decentralization, high confidence, and tamper-resistance, which are advantages to sol...

Publications SP 800-140C Rev. 1 May 20, 2022
https://csrc.nist.rip/publications/detail/sp/800-140c/rev-1/final

Abstract: The approved security functions listed in this publication replace the ones listed in International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) 19790 Annex C and ISO/IEC 24759 6.15, within the context of the Cryptographic Module Validation Program (CMVP). As...

Publications SP 800-140D Rev. 1 May 20, 2022
https://csrc.nist.rip/publications/detail/sp/800-140d/rev-1/final

Abstract: The approved sensitive security parameter generation and establishment methods listed in this publication replace the ones listed in International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) 19790 Annex D and ISO/IEC 24759 paragraph 6.16, within the context o...

Publications White Paper NIST CSWP 25 May 20, 2022
https://csrc.nist.rip/publications/detail/white-paper/2022/05/20/data-structure-for-integrity-protection-with-erasure-capability/final

Abstract: This document describes a data structure, referred to as a data block matrix, that supports the ongoing addition of hash-linked records while also allowing for the deletion of arbitrary records, thereby preserving hash-based integrity assurance that other blocks are unchanged. The block matrix data...

Publications SP 800-140B Rev. 1 (Draft) May 12, 2022
https://csrc.nist.rip/publications/detail/sp/800-140b/rev-1/draft

Abstract: NIST Special Publication (SP) 800-140Br1 is to be used in conjunction with ISO/IEC 19790 Annex B and ISO/IEC 24759 section 6.14. The special publication modifies only those requirements identified in this document. SP 800-140Br1 also specifies the content of the information required in ISO/IEC 19790...

Publications White Paper NIST CSWP 20 May 6, 2022
https://csrc.nist.rip/publications/detail/white-paper/2022/05/06/planning-for-a-zero-trust-architecture/final

Abstract: NIST Special Publication 800-207 defines zero trust as a set of cybersecurity principles used when planning and implementing an enterprise architecture. These principles apply to endpoints, services, and data flows. Input and cooperation from various stakeholders in an enterprise is needed for a zer...

Publications SP 800-161 Rev. 1 May 5, 2022
https://csrc.nist.rip/publications/detail/sp/800-161/rev-1/final

Abstract: Organizations are concerned about the risks associated with products and services that may potentially contain malicious functionality, are counterfeit, or are vulnerable due to poor manufacturing and development practices within the supply chain. These risks are associated with an enterprise’s decr...

Publications NISTIR 8320 May 4, 2022
https://csrc.nist.rip/publications/detail/nistir/8320/final

Abstract: In today’s cloud data centers and edge computing, attack surfaces have shifted and, in some cases, significantly increased. At the same time, hacking has become industrialized, and most security control implementations are not coherent or consistent. The foundation of any data center or edge computi...

Publications SP 800-82 Rev. 3 (Draft) April 26, 2022
https://csrc.nist.rip/publications/detail/sp/800-82/rev-3/draft

Abstract: This document provides guidance on how to secure operational technology (OT), while addressing their unique performance, reliability, and safety requirements. OT encompasses a broad range of programmable systems and devices that interact with the physical environment (or manage devices that interact...

Publications SP 1800-33 (Draft) April 25, 2022
https://csrc.nist.rip/publications/detail/sp/1800-33/draft

Abstract: Organizations face significant challenges in transitioning from 4G to 5G usage, particularly the need to safeguard new 5G-using technologies at the same time that 5G development, deployment, and usage are evolving. Some aspects of securing 5G components and usage lack standards and guidance, making...

Publications NISTIR 8320C (Draft) April 20, 2022
https://csrc.nist.rip/publications/detail/nistir/8320c/draft

Abstract: Organizations employ a growing volume of machine identities, often numbering in the thousands or millions per organization. Machine identities, such as secret cryptographic keys, can be used to identify which policies need to be enforced for each machine. Centralized management of machine identities...

Publications NISTIR 8320B April 20, 2022
https://csrc.nist.rip/publications/detail/nistir/8320b/final

Abstract: In today’s cloud data centers and edge computing, attack surfaces have significantly increased, cyber attacks are industrialized, and most security control implementations are not coherent or consistent. The foundation of any data center or edge computing security strategy should be securing the pla...

Publications SP 1800-19 April 20, 2022
https://csrc.nist.rip/publications/detail/sp/1800-19/final

Abstract: A cloud workload is an abstraction of the actual instance of a functional application that is virtualized or containerized to include compute, storage, and network resources. Organizations need to be able to monitor, track, apply, and enforce their security and privacy policies on their cloud worklo...

Publications NISTIR 8401 (Draft) April 18, 2022
https://csrc.nist.rip/publications/detail/nistir/8401/draft

Abstract: Space operations are increasingly important to the national and economic security of the United States. Commercial space’s contribution to the critical infrastructure is growing in both volume and diversity of services, as illustrated by the increased use of commercial communications satellite (COMS...

Publications NISTIR 8419 April 7, 2022
https://csrc.nist.rip/publications/detail/nistir/8419/final

Abstract: As supply chains become more complex and the origins of products become harder to discern, efforts are emerging that improve traceability of goods by exchanging traceability data records using blockchain and related technologies. This NIST NCCoE publication explores the issues that surround traceabi...

Publications SP 1800-31 April 6, 2022
https://csrc.nist.rip/publications/detail/sp/1800-31/final

Abstract: Patching is the act of applying a change to installed software – such as firmware, operating systems, or applications – that corrects security or functionality problems or adds new capabilities. Despite widespread recognition that patching is effective and attackers regularly exploit unpatched softw...

Publications SP 800-40 Rev. 4 April 6, 2022
https://csrc.nist.rip/publications/detail/sp/800-40/rev-4/final

Abstract: Enterprise patch management is the process of identifying, prioritizing, acquiring, installing, and verifying the installation of patches, updates, and upgrades throughout an organization. Patching is more important than ever because of the increasing reliance on technology, but there is often a div...

Publications SP 1800-10 March 16, 2022
https://csrc.nist.rip/publications/detail/sp/1800-10/final

Abstract: Today’s manufacturing organizations rely on industrial control systems (ICS) to conduct their operations. Increasingly, ICS are facing more frequent, sophisticated cyber attacks—making manufacturing the second-most-targeted industry. Cyber attacks against ICS threaten operations and worker safety, r...

Publications SP 800-172A March 15, 2022
https://csrc.nist.rip/publications/detail/sp/800-172a/final

Abstract: The protection of Controlled Unclassified Information (CUI) in nonfederal systems and organizations is important to federal agencies and can directly impact the ability of the Federal Government to successfully carry out its assigned missions and business operations. This publication provides federa...

Publications SP 800-204C March 8, 2022
https://csrc.nist.rip/publications/detail/sp/800-204c/final

Abstract: Cloud-native applications have evolved into a standardized architecture consisting of multiple loosely coupled components called microservices (often typically implemented as containers) that are supported by an infrastructure for providing application services, such as service mesh. Both of these c...

Publications White Paper (Draft) February 28, 2022
https://csrc.nist.rip/publications/detail/white-paper/2022/02/28/responding-to-and-recovering-from-a-cyberattack-manufacturing/draft

Abstract: Industrial control systems (ICS) and devices that run manufacturing environments play a critical role in the supply chain. Manufacturing organizations rely on ICS to monitor and control physical processes that produce goods for public consumption. These same systems are facing an increasing number o...

Publications NISTIR 8270 (Draft) February 25, 2022
https://csrc.nist.rip/publications/detail/nistir/8270/draft

Abstract: Space is a newly emerging commercial critical infrastructure sector that is no longer the domain of only national government authorities. Space is an inherently risky environment in which to operate, so cybersecurity risks involving commercial space – including those affecting commercial satellite v...

Publications White Paper February 24, 2022
https://csrc.nist.rip/publications/detail/white-paper/2022/02/24/getting-started-with-cybersecurity-risk-management-ransomware/final

Abstract: With the threat of ransomware growing, this "quick start guide" will help organizations use the National Institute of Standards and Technology (NIST) "Ransomware Risk Management: A Cybersecurity Framework Profile" to combat ransomware. Like the broader NIST Cybersecurity Framework, which is widely u...

Publications NISTIR 8374 February 23, 2022
https://csrc.nist.rip/publications/detail/nistir/8374/final

Abstract: Ransomware is a type of malicious attack where attackers encrypt an organization’s data and demand payment to restore access. Attackers may also steal an organization’s information and demand an additional payment in return for not disclosing the information to authorities, competitors, or the publi...

Publications SP 1800-30 February 22, 2022
https://csrc.nist.rip/publications/detail/sp/1800-30/final

Abstract: Increasingly, healthcare delivery organizations (HDOs) are relying on telehealth and remote patient monitoring (RPM) capabilities to treat patients at home. RPM is convenient and cost-effective, and its adoption rate has increased. However, without adequate privacy and cybersecurity measures, unauth...

<< first   < previous   28     29     30     31     32     33     34     35     36     37     38     39     40     41     42     43     44     45     46     47     48     49     50     51     52  next >  last >>