Use this form to search content on CSRC pages.
An area of cryptography that researches and advances the use of quantum-resistant primitives, with the goal of keeping existing public key infrastructure intact in a future era of quantum computing.
Cyber Security Research & Development Act of 2002 Cyber Security Research and Development Act (Public Law 107-305; November 27, 2002).
Cybersecurity Enhancement Act of 2014 (Public Law 113-274; December 18, 2014)
E-Government Act of 2002 (Public Law 107-347; December 17, 2002). This Public Law also included the original Federal Information Security Management Act (FISMA) of 2002.
Energy Independence and Security Act of 2007 (Public Law 110-140; December 19, 2007).
Federal Information Security Modernization Act of 2014 (Public Law 113-283; December 18, 2014). The original FISMA was Federal Information Security Management Act of 2002 (Public Law 107-347 (Title III); December 17, 2002), in the E-Government Act of 2002.
The First Responder Network Authority (FirstNet) has the mission to build, operate and maintain the first high-speed, nationwide wireless broadband network dedicated to public safety. It was codified in Public Safety Communications and Electromagnetic Spectrum Auctions (Public Law 112-96 (Title VI, Subtitle B); February 22, 2012).
Health Insurance Portability and Accountability Act of 1996 (Public Law 104-191; August 21, 1996) Related regulations include: HIPAA Privacy Rule (December 28, 2000; as amended) HIPAA Security Rule (February 20, 2003)
Help America Vote Act of 2002 (Public Law 107-252; October 29, 2002)
Driver for the National Checklist Program. The National Archives and Records Administration (NARA) is sponsoring a FAR clause regarding SP 800-171.
This is the process of creating and using a government-wide secure and reliable form of identification for federal employees and contractors, in support of HSPD-12, Policy for a Common Identification Standard for Federal Employees and Contractors. FIPS 201 defines a reliable, government-wide identity credential for use in applications such as access to federally-controlled facilities and information systems. It also specifies a PIV system within which a common identity credential can be created and later used to verify a claimed identity.
The Comprehensive National Cybersecurity Initiative (March 2010) was originally described in Homeland Security Presidential Directive/HSPD-23 (January 8, 2008). The CNCI is a driver for cybersecurity education and supply chain risk management.
OMB Memo M-16-04, Cybersecurity Strategy and Implementation Plan (CSIP) for the Federal Civilian Government (October 30, 2015), resulted from a comprehensive review in 2015 of the Federal Government's cybersecurity policies, procedures, and practices by the Cybersecurity Sprint Team. Its intent was to identify and address critical cybersecurity gaps and emerging priorities, and make specific recommendations to address those gaps and priorities. The five objectives of CSIP are: Prioritized Identification and Protection of high value information and assets; Timely Detection of and Rapid...