| ITL May 2013 | May 2013 | ITL Publishes Security And Privacy Controls For Federal Agencies itlbul2013_05.pdf |
| ITL April 2013 | Apr. 2013 | Security Content Automation Protocol (SCAP) Version 1.2 Validation Program Test Requirements itlbul2013_04.pdf |
| ITL March 2013 | Mar. 2013 | NIST to Develop a Cybersecurity Framework to Protect Critical Infrastructure itlbul2013_03.pdf |
| ITL January 2013 | Jan. 2013 | Managing Identity Requirements for Remote Users of Information Systems to Protect System Security and Information Privacy itlbul2013_01.pdf |
| ITL December 2012 | Dec. 2012 | Generating Secure Cryptographic Keys: A Critical Component of Cryptographic Key Management and the Protection of Sensitive Information itlbul2012_12.pdf |
| ITL November 2012 | Nov. 2012 | Practices for Managing Supply Chain Risks to Protect Federal Information Systems itlbul2012_11.pdf |
| ITL October 2012 | Oct. 2012 | Conducting Information Security-Related Risk Assessments: Updated Guidelines for Comprehensive Risk Management Programs itlbul2012_10.pdf |
| ITL September 2012 | Sept. 2012 | Revised Guide Helps Organizations Handle Security Related Incidents itlbul2012_09.pdf |
| ITL August 2012 | Aug. 2012 | Security of Bluetooth Systems and Devices: Updated Guide Issued by the National Institute of Standards and Technology (NIST) august-2012_itl-bulletin.pdf |
| ITL July 2012 | July 2012 | Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance july-2012_itl-bulletin.pdf |
| ITL June 2012 | June 2012 | Cloud Computing: A Review of Features, Benefits, and Risks, and Recommendations for Secure, Efficient Implementations june-2012_itl-bulletin.pdf |
| ITL May 2012 | May 2012 | Secure Hash Standard: Updated Specifications Approved and Issued as Federal Information Processing Standard (FIPS) 180-4 may-2012_itl-bulletin.pdf |
| ITL March 2012 | Mar. 2012 | Guidelines for Improving Security and Privacy in Public Cloud Computing march-2012_itl-bulletin.pdf |
| ITL February 2012 | Feb. 2012 | Guidelines for Securing Wireless Local Area Networks (WLANs) february-2012_itl-bulletin.pdf |
| ITL January 2012 | Jan. 2012 | Advancing Security Automation and Standardization: Revised Technical Specifications Issued for the Security Content Automation Protocol (SCAP) january-2012_itl-bulletin.pdf |
| ITL December 2011 | Dec. 2011 | Revised Guideline for Electronic Authentication of Users Helps Organizations Protect the Security of Their Information Systems December-2011_ITL-Bulletin.pdf |
| ITL October 2011 | Oct. 2011 | Continuous Monitoring of Information Security: An Essential Component of Risk Management October-2011_ITL-Bulletin.pdf |
| ITL September 2011 | Sept. 2011 | Managing the Configuration of Information Systems with a Focus on Security September-2011_ITL-Bulletin.pdf |
| ITL August 2011 | Aug. 2011 | Protecting Industrial Control Systems – Key Components of Our Nation's Critical Infrastructures August-200-ITL-Bulletin.pdf |
| ITL June 2011 | Jun. 2011 | Guidelines for Protecting Basic Input/Output System (BIOS) Firmware June-2011-ITL-Bulletin.pdf |
| ITL May 2011 | May 2011 | Using Security Configuration Checklists and the National Checklist Program May2011-ITL-Bulletin.pdf |
| ITL April 2011 | Apr. 2011 | Full Virtualization Technologies: Guidelines for Secure Implementation and Management April2011-ITL-Bulletin.pdf |
| ITL March 2011 | Mar. 2011 | Managing Information Security Risk: Organization, Mission and Information System View March2011-ITL-Bulletin.pdf |
| ITL January 2011 | Jan. 2011 | Internet Protocol Version 6 (IPv6): NIST Guidelines Help Organizations Manage the Secure Deployment of the New Network Protocol January2011-ITLBulletin.pdf |
| ITL December 2010 | Dec. 2010 | Securing WiMAX Wireless Communications december2010-bulletin.pdf |
| ITL November 2010 | Nov. 2010 | The Exchange of Health Information: Designing a Security Architecture to Provide Information Security and Privacy november2010-bulletin.pdf |
| ITL October 2010 | Oct. 2010 | Cyber Security Strategies for the Smart Grid: Protecting the Advanced Digital Infrastructure for Electric Power october2010-bulletin.pdf |
| ITL September 2010 | Sept. 2010 | Security Content Automation Protocol (SCAP): Helping Organizations Maintain and Verify the Security of Their Information Systems september2010-bulletin.pdf |
| ITL August 2010 | Aug. 2010 | Assessing the Effectiveness of Security Controls in Federal Information Systems august2010-bulletin.pdf |
| ITL July 2010 | Jul. 2010 | Contingency Planning for Information Systems: Updated Guide for Federal Organizations july-2010-bulletin.pdf |
| ITL June 2010 | Jun. 2010 | How to Identify Personnel with Significant Responsibilities for Information Security June-2010.pdf |
| ITL April 2010 | Apr. 2010 | Guide to Protecting Personally Identifiable Information april-2010_guide-protecting-pii.pdf |
| ITL March 2010 | Mar. 2010 | Revised Guide Helps Federal Organizations Improve Their Risk Management Practices and Information System Security march2010_sp800-37rev1.pdf |
| ITL February 2010 | Feb. 2010 | Secure Management of Keys in Cryptographic Applications: Guidance for Organizations february2010_key-management-part3.pdf |
| ITL January 2010 | Jan. 2010 | Security Metrics: Measurements to Support the Continued Development of Information Security Technology Jan2010_securitymetrics.pdf |
| ITL November 2009 | Nov. 2009 | Cybersecurity Fundamentals for Small Business Owners Nov2009_smallbusiness.pdf |
| ITL October 2009 | Oct. 2009 | Protecting Information Systems with Firewalls: Revised Guidelines on Firewall Technologies and Policies Oct2009_firewall-bulletin.pdf |
| ITL September 2009 | Sept. 2009 | Updated Digital Signature Standard (DSS) Approved as Federal Information Processing Standard (FIPS) 186-3 Sept2009-fips186-3.pdf |
| ITL August 2009 | Aug. 2009 | Revised Catalog of Security Controls for Federal Information Systems and Organizations: For Use in Both National Security and Nonnational Security Systems Aug2009_sp800-53-rev3_bulletin.pdf |
| ITL July 2009 | July 2009 | Risk Management Framework: Helping Organizations Implement Effective Information Security Programs july2009_risk-management-framework.pdf |
| ITL June 2009 | Jun. 2009 | Security for Enterprise Telework and Remote Access Solutions June2009-Telework.pdf |
| ITL April 2009 | Apr. 2009 | The System Development Life Cycle (SDLC) april2009_system-development-life-cycle.pdf |
| ITL March 2009 | Mar 2009 | The Cryptographic Hash Algorithm Family: Revision of the Secure Hash Standard and Ongoing Competition for New Hash Algorithms March2009_cryptographic-hash-algorithm-family.pdf |
| ITL February 2009 | Feb 2009 | Using Personal Identity Verification (Piv) Credentials in Physical Access Control Systems (PACS) Feb2009_PIV-in-PACS.pdf |
| ITL January 2009 | Jan 2009 | Security of Cell Phones and PDAs Jan2009_Cell-Phones-and-PDAs.pdf |
| ITL December 2008 | Dec 2008 | Guide to Information Security Testing and Assessment Dec2008_Testing-Assessment-SP800-115.pdf |
| ITL November 2008 | Nov 2008 | Bluetooth Security: Protecting Wireless Networks and Devices Nov2008_Bluetooth-Security.pdf |
| ITL October 2008 | Oct 2008 | Keeping Information Technology (IT) System Servers Secure: A General Guide to Good Practices October2008-bulletin_800-123.pdf |
| ITL September 2008 | Sept 2008 | Using Performance Measurements to Evaluate and Strengthen Information System Security Sept-2008-bulletin.pdf |
| ITL August 2008 | Aug. 2008 | Security Assessments: Tools for Measuring the Effectiveness of Security Controls Aug2008_SP800-53a.pdf |
| ITL July 2008 | Jul 2008 | Guidelines on Implementing A Secure Sockets Layer (SSL) Virtual Private Network (VPN) July2008_SSL-VPN_Bulletin.pdf |
| ITL May 2008 | May 2008 | New Cryptographic Hash Algorithm Family: NIST Holds a Public Competition to Find New Algorithms b-May-2008.pdf |
| ITL April 2008 | Apr 2008 | Using Active Content and Mobile Code and Safeguarding the Security of Information Technology Systems b-April-2008.pdf |
| ITL March 2008 | Mar 2008 | Handling Computer Security Incidents: NIST Issues Updated Guidelines b-March-2008.pdf |
| ITL February 2008 | Feb 2008 | Federal Desktop Core Configuration (FDCC): Improving Security for Windows Desktop Operating Systems b-February-2008.pdf |
| ITL January 2008 | Jan 2008 | Secure Web Servers Protecting Web Sites that are Accessed by the Public b-January-2008.pdf |
| ITL December 2007 | Dec 2007 | Securing External Computers and Other Devices Used by Teleworkers b-December-2007.pdf |
| ITL November 2007 | Nov 2007 | Using Storage Encryption Technologies to Protect End User Devices November-2007.pdf |
| ITL October 2007 | Oct 2007 | The Common Vulnerability Scoring System (CVSS) Oct-2007.pdf |
| ITL August 2007 | Aug 2007 | Secure Web Services Aug2007.pdf |
| ITL July 2007 | Jul 2007 | Border Gateway Protocol (BGP) Security b-July-2007.pdf |
| ITL June 2007 | Jun 2007 | Forensic Techniques for Cell Phones b-June-2007.pdf |
| ITL May 2007 | May 2007 | Securing Radio Frequency Identification (RFID) Systems b-May-2007.pdf |
| ITL April 2007 | Apr 2007 | Securing Wireless Networks b-April-07.pdf |
| ITL March 2007 | Mar 2007 | Improving The Security of Electronic Mail: Updated Guidelines Issued by NIST b-03-07.pdf |
| ITL February 2007 | Feb 2007 | Intrusion Detection and Prevention Systems b-02-07.pdf |
| ITL January 2007 | Jan 2007 | Security Controls for Information Systems: Revised Guidelines Issued by NIST b-01-07.pdf |
| ITL December 2006 | Dec 2006 | Maintaining Effective Information Technology (IT) Security Through Test, Training, and Exercise Programs b-12-06.pdf |
| ITL November 2006 | Nov 2006 | Guide to Securing Computers Using Windows XP Home Edition b-11-06.pdf |
| ITL October 2006 | Oct 2006 | Log Management: Using Computer and Network Records to Improve Information Security b-10-06.pdf |
| ITL September 2006 | Sep 2006 | Forensic Techniques: Helping Organizations Improve Their Responses to Information Security Incidents b-09-06.pdf |
| ITL August 2006 | Aug 2006 | Protecting Sensitive Information Processed and Stored in Information Technology (IT) Systems Aug-06.pdf |
| ITL June 2006 | Jun 2006 | Domain Name System (DNS) Services: NIST Recommendations for Secure Deployment b-06-06.pdf |
| ITL May 2006 | May 2006 | An Update on Cryptographic Standards, Guidelines, and Testing Requirements b-05-06.pdf |
| ITL April 2006 | Apr 2006 | Protecting Sensitive Information Transmitted in Public Networks b-04-06.pdf |
| ITL March 2006 | Mar 2006 | Minimum Security Requirements for Federal Information and Information Systems: Federal Information Processing Standard (FIPS) 200 Approved by the Secretary of Commerce b-March-06.pdf |
| ITL February 2006 | Feb 2006 | Creating a Program to Manage Security Patches and Vulnerabilities: NIST Recommendations for Improving System Security b-02-06.pdf |
| ITL January 2006 | Jan 2006 | Testing and Validation of Personal Identity Verification (PIV) Components and Subsystems for Conformance to Federal Information Processing Standard 201 b-01-06.pdf |
| ITL December 2005 | Dec 2005 | Preventing and Handling Malware Incidents: How to Protect Information Technology Systems from Malicious Code and Software b-12-05.pdf |
| ITL November 2005 | Nov 2005 | Securing Microsoft Windows XP Systems: NIST Recommendations for Using a Security Configuration Checklist b-11-05.pdf |
| ITL October 2005 | Oct 2005 | National Vulnerability Database (NVD): Helping Information Technology System Users and Developers Find Current Information About Cyber Security Vulnerabilities b-Oct-05.pdf |
| ITL September 2005 | Sep 2005 | Biometric Technologies: Helping to Protect Information and Automated Transactions in Information Technology Systems bulletin-Sept-05.pdf |
| ITL August 2005 | Aug 2005 | Implementation of FIPS 201, Personal Identity Verification (PIV) of Federal Employees and Contractors b-08-05.pdf |
| ITL July 2005 | Jul 2005 | Protecting Sensitive Information that is Transmitted Across Networks: NIST Guidance for Selecting and Using Transport Layer Security Implementations July-2005.pdf |
| ITL June 2005 | Jun 2005 | NIST’s Security Configuration Checklists Program for Information Technology (IT) Products June-2005.pdf |
| ITL May 2005 | May 2005 | Recommended Security Controls for Federal Information Systems: Guidance for Selecting Cost-Effective Controls Using a Risk-Based Process b-May-05.pdf |
| ITL April 2005 | Apr 2005 | Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule April-05.pdf |
| ITL March 2005 | Mar 2005 | Personal Identity Verification (PIV) of Federal Employees and Contractors: Federal Information Processing Standard (FIPS) 201 Approved by the Secretary of Commerce March-2005.pdf |
| ITL January 2005 | Jan 2005 | Integrating Information Technology (IT) Security into the Capital Planning and Investment Control Process Jan-05.pdf |
| ITL November 2004 | Nov 2004 | Understanding the New NIST Standards and Guidelines Required by FISMA: How Three Mandated Documents are Changing the Dynamic of Information Security for the Federal Government Nov-2004.pdf |
| ITL October 2004 | Oct 2004 | Securing Voice Over Internet Protocol (IP) Networks Oct-2004.pdf |
| ITL September 2004 | Sep 2004 | Information Security Within the System Development Life Cycle (SDLC) Sept-04.pdf |
| ITL August 2004 | Aug 2004 | Electronic Authentication: Guidance for Selecting Secure Techniques August-2004.pdf |
| ITL July 2004 | Jul 2004 | Guide for Mapping Types of Information and Information Systems to Security Categories July-2004.pdf |
| ITL June 2004 | Jun 2004 | Information Technology Security Services: How to Select, Implement, and Manage b-06-04.pdf |
| ITL May 2004 | May 2004 | Guide for the Security Certification and Accreditation of Federal Information Systems b-05-2004.pdf |
| ITL April 2004 | Apr 2004 | Selecting Information Technology Security Products 04-2004.pdf |
| ITL March 2004 | Mar 2004 | Federal Information Processing Standard (FIPS) 199, Standards for Security Categorization of Federal Information and Information Systems 03-2004.pdf |
| ITL January 2004 | Jan 2004 | Computer Security Incidents: Assessing, Managing, and Controlling the Risks b-01-04.pdf |
| ITL November 2003 | Nov 2003 | Network Security Testing b-11-03.pdf |
| ITL October 2003 | Oct 2003 | Information Technology Security Awareness, Training, Education, and Certification b-10-03.pdf |
| ITL August 2003 | Aug 2003 | Information Technology (IT) Security Metrics bulletin08-03.pdf |
| ITL July 2003 | Jul 2003 | Testing Intrusion Detection Systems bulletin07-03.pdf |
| ITL June 2003 | Jun 2003 | ASSET: Security Assessment Tool for Federal Agencies itl-06-2003.pdf |
| ITL March 2003 | Mar 2003 | Security for Wireless Networks and Devices march-03.pdf |
| ITL February 2003 | Feb 2003 | Secure Interconnections for Information Technology Systems feb-03.pdf |
| ITL January 2003 | Jan 2003 | Security of Electronic Mail 01-03.pdf |
| ITL December 2002 | Dec 2002 | Security of Public Web Servers b-12-02.pdf |
| ITL November 2002 | Nov 2002 | Security for Telecommuting and Broadband Communication itl11-02.pdf |
| ITL October 2002 | Oct 2002 | Security Patches and the CVE Vulnerability Naming Scheme: Tools to Address Computer System Vulnerabilities bulletin10-02.pdf |
| ITL September 2002 | Sep 2002 | Cryptographic Standards and Guidelines: A Status Report 09-02itl.pdf |
| ITL July 2002 | Jul 2002 | Overview: The Government Smart Card Interoperability Specification 07-02.pdf |
| ITL June 2002 | Jun 2002 | Contingency Planning Guide for Information Technology Systems bulletin06-02.pdf |
| ITL April 2002 | Apr 2002 | Techniques for System and Data Recovery 04-02.pdf |
| ITL February 2002 | Feb 2002 | Risk Management Guidance for Information Technology Systems 02-02.pdf |
| ITL January 2002 | Jan 2002 | Guidelines on Firewalls and Firewall Policy 01-02.pdf |
| ITL November 2001 | Nov 2001 | Computer Forensics Guidance 11-01.pdf |
| ITL September 2001 | Sep 2001 | Security Self-Assessment Guide for Information Technology Systems 09-01.pdf |
| ITL July 2001 | Jul 2001 | A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2 07-01.pdf |
| ITL June 2001 | Jun 2001 | Engineering Principles for Information Technology Security 06-01.pdf |
| ITL May 2001 | May 2001 | Biometrics - Technologies for Highly Secure Personal Authentication 05-01.pdf |
| ITL March 2001 | Mar 2001 | An Introduction to IPsec (Internet Protocol Security) 03-01.pdf |
| ITL December 2000 | Dec 2000 | A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications 12-00.pdf |
| ITL October 2000 | Oct 2000 | An Overview of the Common Criteria Evaluation and Validation Scheme 10-00.pdf |
| ITL August 2000 | Aug 2000 | Security for Private Branch Exchange Systems 08-00.pdf |
| ITL June 2000 | Jun 2000 | Mitigating Emerging Hacker Threats 06-00.pdf |
| ITL March 2000 | Mar 2000 | Security Implications of Active Content 03-00.pdf |
| ITL February 2000 | Feb 2000 | Guideline for Implementing Cryptography in the Federal Government 02-00.pdf |
| ITL December 1999 | Dec 1999 | Operating System Security: Adding to the Arsenal of Security Techniques 12-99.pdf |
| ITL November 1999 | Nov 1999 | Acquiring and Deploying Intrusion Detection Systems 11-99.pdf |
| ITL September 1999 | Sep 1999 | Securing Web Servers 09-99.pdf |
| ITL August 1999 | Aug 1999 | The Advanced Encryption Standard (AES): A Status Report 08-99.pdf |
| ITL May 1999 | May 1999 | Computer Attacks: What They are and how to Defend Against Them 05-99.pdf |
| ITL April 1999 | Apr 1999 | Guide for Developing Security Plans for Information Technology Systems 04-99.pdf |
| ITL February 1999 | Feb 1999 | Enhancements to Data Encryption and Digital Signature Federal Standards 02-99.pdf |
| ITL January 1999 | Jan 1999 | Secure Web-Based Access to High Performance Computing Resources jan-99.html |
| ITL November 1998 | Nov 1998 | Common Criteria: Launching the International Standard 11-98.pdf |
| ITL September 1998 | Sep 1998 | Cryptography Standards and Infrastructures for the Twenty-First Century 09-98.pdf |
| ITL June 1998 | Jun 1998 | Training for Information Technology Security: Evaluating the Effectiveness of Results-Based Learning 06-98.pdf |
| ITL April 1998 | Apr 1998 | Training Requirements for Information Technology Security: An Introduction to Results-Based Learning 04-98.pdf |
| ITL March 1998 | Mar 1998 | Management of Risks in Information Systems: Practices of Successful Organizations 03-98.pdf |
| ITL February 1998 | Feb 1998 | Information Security and the World Wide Web (WWW) 02-98.pdf |
| ITL November 1997 | Nov 1997 | Internet Electronic Mail 11-97.pdf |
| ITL July 1997 | Jul 1997 | Public Key Infrastructure Technology 07-97.pdf |
| ITL April 1997 | Apr 1997 | Security Considerations in Computer Support and Operations itl97-04.txt |
| ITL March 1997 | Mar 1997 | Audit Trails itl97-03.txt |
| ITL February 1997 | Feb 1997 | Advanced Encryption Standard (AES) itl97-02.txt |
| ITL January 1997 | Jan 1997 | Security Issues for Telecommuting itl97-01.txt |
| ITL October 1996 | Oct 1996 | Generally Accepted System Security Principles (GSSPs): Guidance on Securing Information Technology (IT) Systems csl96-10.txt |
| ITL August 1996 | Aug 1996 | Implementation Issues for Cryptography csl96-08.txt |
| ITL June 1996 | Jun 1996 | Information Security Policies for Changing Information Technology Environments csl96-06.txt |
| ITL May 1996 | May 1996 | The World Wide Web: Managing Security Risks csl96-05.txt |
| ITL February 1996 | Feb 1996 | Human/Computer Interface Security Issues csl96-02.txt |
| ITL December 1995 | Dec 1995 | An Introduction to Role-Based Access Control csl95-12.txt |
| ITL August 1995 | Aug 1995 | FIPS 140-1: A Framework for Cryptographic Standards csl95-08.txt |
| ITL February 1995 | Feb 1995 | The Data Encryption Standard (DES): an Update csl95-02.txt |
| ITL November 1994 | Nov 1994 | Digital Signature Standard (DSS) csl94-11.txt |
| ITL May 1994 | May 1994 | Reducing the Risks of Internet Connection and Use csl94-05.txt |
| ITL March 1994 | Mar 1994 | Threats to Computer Systems: an Overview csl94-03.txt |
| ITL August 1993 | Aug 1993 | Security Program Management csl93-08.txt |
| ITL July 1993 | Jul 1993 | Connecting to the Internet: Security Considerations csl93-07.txt |
| ITL March 1993 | Mar 1993 | Guidance on the Legality of Keystroke Monitoring csl93-03.txt |
| ITL November 1992 | Nov 1992 | Sensitivity of Information csl92-11.txt |
| ITL March 1992 | Mar 1992 | An Introduction to Secure Telephone Terminals csl92-03.txt |
| ITL February 1992 | Feb 1992 | Establishing a Computer Security Incident Handling Capability csl92-02.txt |
| ITL November 1991 | Nov 1991 | Advanced Authentication Technology csl91-11.txt |
| ITL February 1991 | Feb 1991 | Computer Security Roles of NIST and NSA csl91-02.txt |
| ITL August 1990 | Aug 1990 | Computer Virus Attacks csl90-08.txt |