| SP 800-171 | Jun. 2015 | Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations SP 800-171 FAQ doi:10.6028/NIST.SP.800-171 [Direct Link] |
| SP 800-170 | Jun 2014 | 2013 Computer Security Division Annual Report SP 800-170 - Annual Report (2013) FAQ doi:10.6028/NIST.SP.800-170 [Direct Link] |
| SP 800-168 | May 2014 | Approximate Matching: Definition and Terminology SP 800-168 FAQ doi:10.6028/NIST.SP.800-168 [Direct Link] |
SP 800-167 (Draft) | Aug. 22, 2014 | DRAFT Guide to Application Whitelisting Announcement and Draft Publication |
| SP 800-165 | Jun 2013 | 2012 Computer Security Division Annual Report Annual Report (2012) - SP 800-165 FAQ doi:10.6028/NIST.SP.800-165 [Direct Link] |
SP 800-164 (Draft) | Oct. 31, 2012 | DRAFT Guidelines on Hardware-Rooted Security in Mobile Devices Announcement and Draft Publication |
| SP 800-163 | Jan. 2015 | Vetting the Security of Mobile Applications SP 800-163 FAQ doi:10.6028/NIST.SP.800-163 [Direct Link] |
| SP 800-162 | Jan 2014 | Guide to Attribute Based Access Control (ABAC) Definition and Considerations SP 800-162 FAQ doi:10.6028/NIST.SP.800-162 [Direct Link] |
| | SP 800-162 (EPUB) FAQ |
| SP 800-161 | Apr. 2015 | Supply Chain Risk Management Practices for Federal Information Systems and Organizations SP 800-161 FAQ doi:10.6028/NIST.SP.800-161 [Direct Link] |
SP 800-160 (Draft) | May 12, 2014 | DRAFT Systems Security Engineering: An Integrated Approach to Building Trustworthy Resilient Systems Announcement and Draft Publication |
| SP 800-157 | Dec. 2014 | Guidelines for Derived Personal Identity Verification (PIV) Credentials SP 800-157 FAQ doi:10.6028/NIST.SP.800-157 [Direct Link] |
SP 800-155 (Draft) | Dec. 8, 2011 | DRAFT BIOS Integrity Measurement Guidelines Announcement and Draft Publication |
| SP 800-153 | Feb 2012 | Guidelines for Securing Wireless Local Area Networks (WLANs) SP 800-153 |
SP 800-152 (Draft) | Dec. 18, 2014 | DRAFT A Profile for U. S. Federal Cryptographic Key Management Systems (CKMS) (Third Draft) Announcement and Draft Publication |
SP 800-150 (Draft) | Oct. 28, 2014 | DRAFT Guide to Cyber Threat Information Sharing Announcement and Draft Publication |
| SP 800-147 B | Aug. 2014 | BIOS Protection Guidelines for Servers SP 800-147B FAQ doi:10.6028/NIST.SP.800-147B [Direct Link] |
| SP 800-147 | Apr 2011 | Basic Input/Output System (BIOS) Protection Guidelines SP 800-147 |
| SP 800-146 | May 2012 | Cloud Computing Synopsis and Recommendations SP 800-146 |
| | SP 800-146 (EPUB) FAQ |
| SP 800-145 | Sep 2011 | The NIST Definition of Cloud Computing SP 800-145 |
| | SP 800-145 (EPUB) FAQ |
| SP 800-144 | Dec 2011 | Guidelines on Security and Privacy in Public Cloud Computing SP 800-144 |
| | SP 800-144 (EPUB) FAQ |
| SP 800-142 | Oct 2010 | Practical Combinatorial Testing SP 800-142 |
| SP 800-137 | Sep 2011 | Information Security Continuous Monitoring for Federal Information Systems and Organizations SP 800-137 |
| SP 800-135 Rev. 1 | Dec 2011 | Recommendation for Existing Application-Specific Key Derivation Functions SP 800-135 Rev. 1 |
| SP 800-133 | Dec 2012 | Recommendation for Cryptographic Key Generation SP 800-133 FAQ doi:10.6028/NIST.SP.800-133 [Direct Link] |
| | SP 800-133 (EPUB) FAQ |
| SP 800-132 | Dec 2010 | Recommendation for Password-Based Key Derivation Part 1: Storage Applications SP 800-132 |
SP 800-131 A-Rev.1 (Draft) | July 10, 2015 | DRAFT Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths Announcement and Draft Publication |
| SP 800-131 A | Jan 2011 | Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths SP 800-131A |
| SP 800-130 | Aug 2013 | A Framework for Designing Cryptographic Key Management Systems SP 800-130 |
| SP 800-128 | Aug 2011 | Guide for Security-Focused Configuration Management of Information Systems SP 800-128 |
| SP 800-127 | Sep 2010 | Guide to Securing WiMAX Wireless Communications SP 800-127 |
| | SP 800-127 (EPUB) FAQ |
| SP 800-126 Rev. 2 | Sep 2011 | The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.2 SP 800-126 Rev. 2 |
| | Errata for SP 800-126 Rev. 2 |
| SP 800-126 Rev. 1 | Feb 2011 | The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.1 SP 800-126 Rev. 1 |
| SP 800-126 | Nov 2009 | The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.0 SP 800-126 |
SP 800-125 A (Draft) | Oct. 20, 2014 | DRAFT Security Recommendations for Hypervisor Deployment Announcement and Draft Publication |
| SP 800-125 | Jan 2011 | Guide to Security for Full Virtualization Technologies SP 800-125 |
| SP 800-124 Rev. 1 | Jun 2013 | Guidelines for Managing the Security of Mobile Devices in the Enterprise SP 800-124 Rev. 1 FAQ doi:10.6028/NIST.SP.800-124r1 [Direct Link] |
| | SP 800-124 Rev. 1 (EPUB) FAQ |
| SP 800-123 | Jul 2008 | Guide to General Server Security SP 800-123 |
| | SP 800-123 (EPUB) FAQ |
| SP 800-122 | Apr 2010 | Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) SP 800-122 |
| | SP 800-122 (EPUB) FAQ |
| SP 800-121 Rev. 1 | Jun 2012 | Guide to Bluetooth Security SP 800-121 Rev. 1 |
| SP 800-120 | Sep 2009 | Recommendation for EAP Methods Used in Wireless Network Access Authentication SP 800-120 |
| SP 800-119 | Dec 2010 | Guidelines for the Secure Deployment of IPv6 SP 800-119 |
SP 800-118 (Draft) | Apr. 21, 2009 | DRAFT Guide to Enterprise Password Management Announcement and Draft Publication |
SP 800-117 Rev. 1 (Draft) | Jan. 6, 2012 | DRAFT Guide to Adopting and Using the Security Content Automation Protocol (SCAP) Version 1.2 Announcement and Draft Publication |
| SP 800-117 | Jul 2010 | Guide to Adopting and Using the Security Content Automation Protocol (SCAP) Version 1.0 SP 800-117 |
| SP 800-116 | Nov 2008 | A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS) SP 800-116 |
| SP 800-115 | Sep 2008 | Technical Guide to Information Security Testing and Assessment SP 800-115 |
| | SP 800-115 (EPUB) FAQ |
| SP 800-114 | Nov 2007 | User's Guide to Securing External Devices for Telework and Remote Access SP 800-114 |
| SP 800-113 | Jul 2008 | Guide to SSL VPNs SP 800-113 |
| SP 800-111 | Nov 2007 | Guide to Storage Encryption Technologies for End User Devices SP 800-111 |
| SP 800-108 | Oct 2009 | Recommendation for Key Derivation Using Pseudorandom Functions SP 800-108 |
| SP 800-107 Rev. 1 | Aug 2012 | Recommendation for Applications Using Approved Hash Algorithms SP 800-107 Rev. 1 |
| SP 800-106 | Feb 2009 | Randomized Hashing for Digital Signatures SP 800-106 |
SP 800-103 (Draft) | Oct. 6, 2006 | DRAFT An Ontology of Identity Credentials, Part I: Background and Formulation Announcement and Draft Publication |
| SP 800-102 | Sep 2009 | Recommendation for Digital Signature Timeliness SP 800-102 |
| SP 800-101 Rev.1 | May 2014 | Guidelines on Mobile Device Forensics SP 800-101 Rev. 1 FAQ doi:10.6028/NIST.SP.800-101r1 [Direct Link] |
| SP 800-100 | Oct 2006 | Information Security Handbook: A Guide for Managers SP 800-100 (including updates as of 03-07-2007) |
| SP 800-98 | Apr 2007 | Guidelines for Securing Radio Frequency Identification (RFID) Systems SP 800-98 |
| SP 800-97 | Feb 2007 | Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i SP 800-97 |
| SP 800-96 | Sep 2006 | PIV Card to Reader Interoperability Guidelines SP 800-96 |
| SP 800-95 | Aug 2007 | Guide to Secure Web Services SP 800-95 |
SP 800-94 Rev. 1 (Draft) | July 25, 2012 | DRAFT Guide to Intrusion Detection and Prevention Systems (IDPS) Announcement and Draft Publication |
| SP 800-94 | Feb 2007 | Guide to Intrusion Detection and Prevention Systems (IDPS) SP 800-94 |
| SP 800-92 | Sep 2006 | Guide to Computer Security Log Management SP 800-92 |
| | SP 800-92 (EPUB) FAQ |
| SP 800-90 A Rev.1 | Jun. 2015 | Recommendation for Random Number Generation Using Deterministic Random Bit Generators SP 800-90A Revision 1 FAQ doi:10.6028/NIST.SP.800-90Ar1 [Direct Link] |
SP 800-90 B-C (Draft) | Sep. 9, 2013 | DRAFT Draft SP 800-90 Series: Random Bit Generators
800-90 B: Recommendation for the Entropy Sources Used for Random Bit Generation
800-90 C: Recommendation for Random Bit Generator (RBG) Constructions Announcement and Draft Publication |
| SP 800-89 | Nov 2006 | Recommendation for Obtaining Assurances for Digital Signature Applications SP 800-89 |
| SP 800-88 Rev. 1 | Dec. 2014 | Guidelines for Media Sanitization SP 800-88 Revision 1 FAQ doi:10.6028/NIST.SP.800-88r1 [Direct Link] |
| SP 800-87 Rev 1 | Apr 2008 | Codes for Identification of Federal and Federally-Assisted Organizations SP 800-87 Rev. 1 |
| SP 800-86 | Aug 2006 | Guide to Integrating Forensic Techniques into Incident Response SP 800-86 |
SP 800-85 B-4 (Draft) | Aug. 6, 2014 | DRAFT PIV Data Model Conformance Test Guidelines Announcement and Draft Publication |
| SP 800-85 B | Jul 2006 | PIV Data Model Test Guidelines SP 800-85B |
SP 800-85 A-4 (Draft) | Jun. 8, 2015 | DRAFT PIV Card Application and Middleware Interface Test Guidelines (SP 800-73-4 Compliance) Announcement and Draft Publication |
| SP 800-85 A-2 | Jul 2010 | PIV Card Application and Middleware Interface Test Guidelines (SP800-73-3 Compliance) SP 800-85A-2 |
| SP 800-84 | Sep 2006 | Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities SP 800-84 |
| | SP 800-84 (EPUB) FAQ |
| SP 800-83 Rev. 1 | Jul 2013 | Guide to Malware Incident Prevention and Handling for Desktops and Laptops SP 800-83 Rev. 1 FAQ doi:10.6028/NIST.SP.800-83r1 [Direct Link] |
| SP 800-82 Rev.2 | May 2015 | Guide to Industrial Control Systems (ICS) Security SP 800-82 Revision 2 FAQ doi:10.6028/NIST.SP.800-82r2 [Direct Link] |
| SP 800-81 -2 | Sep 2013 | Secure Domain Name System (DNS) Deployment Guide SP 800-81-2 FAQ doi:10.6028/NIST.SP.800-81-2 [Direct Link] |
SP 800-79 2 (Draft) | Jun 2, 2014 | DRAFT Guidelines for the Authorization of Personal Identity Verification Card Issuers (PCI) and Derived PIV Credential Issuers (DPCI) Announcement and Draft Publication |
| SP 800-79 -1 | Jun 2008 | Guidelines for the Accreditation of Personal Identity Verification (PIV) Card Issuers (PCI's) SP 800-79-1 |
| SP 800-78 -4 | May 2015 | Cryptographic Algorithms and Key Sizes for Personal Identity Verification SP 800-78-4 FAQ doi:10.6028/NIST.SP.800-78-4 [Direct Link] |
| SP 800-77 | Dec 2005 | Guide to IPsec VPNs SP 800-77 |
| SP 800-76 -2 | Jul 2013 | Biometric Specifications for Personal Identity Verification SP 800-76-2 FAQ doi:10.6028/NIST.SP.800-76-2 [Direct Link] |
| SP 800-73 -4 | May 2015 | Interfaces for Personal Identity Verification (3 Parts)
Part 1- PIV Card Application Namespace, Data Model and Representation
Part 2- PIV Card Application Card Command Interface
Part 3- PIV Client Application Programming Interface SP 800-73-4 FAQ doi:10.6028/NIST.SP.800-73-4 [Direct Link] |
| SP 800-72 | Nov 2004 | Guidelines on PDA Forensics SP 800-72 |
| SP 800-70 Rev. 2 | Feb 2011 | National Checklist Program for IT Products: Guidelines for Checklist Users and Developers SP 800-70 Rev. 2 |
SP 800-70 Rev 3 (Draft) | Mar. 26, 2015 | DRAFT National Checklist Program for IT Products - Guidelines for Checklist Users and Developers Announcement and Draft Publication |
| SP 800-69 | Sep 2006 | Guidance for Securing Microsoft Windows XP Home Edition: A NIST Security Configuration Checklist SP 800-69 |
| SP 800-68 Rev. 1 | Oct 2008 | Guide to Securing Microsoft Windows XP Systems for IT Professionals SP 800-68 Rev. 1 |
| SP 800-67 Rev. 1 | Jan 2012 | Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher SP 800-67 Rev. 1 |
| SP 800-66 Rev 1 | Oct 2008 | An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule SP 800-66 Rev. 1 |
SP 800-65 Rev. 1 (Draft) | July 14, 2009 | DRAFT Recommendations for Integrating Information Security into the Capital Planning and Investment Control Process (CPIC) Announcement and Draft Publication |
| SP 800-65 | Jan 2005 | Integrating IT Security into the Capital Planning and Investment Control Process SP 800-65 |
| SP 800-64 Rev. 2 | Oct 2008 | Security Considerations in the System Development Life Cycle SP 800-64 Rev. 2 |
| SP 800-63 -2 | Aug 2013 | Electronic Authentication Guideline SP 800-63-2 FAQ doi:10.6028/NIST.SP.800-63-2 [Direct Link] |
| SP 800-61 Rev. 2 | Aug 2012 | Computer Security Incident Handling Guide SP 800-61 Rev. 2 FAQ doi:10.6028/NIST.SP.800-61r2 [Direct Link] |
| SP 800-60 Rev. 1 | Aug 2008 | Guide for Mapping Types of Information and Information Systems to Security Categories Vol. 1: Guide for Mapping Types of Information and Information Systems to Security Categories |
| | Vol. 2: Appendices |
| SP 800-59 | Aug 2003 | Guideline for Identifying an Information System as a National Security System SP 800-59 |
| SP 800-58 | Jan 2005 | Security Considerations for Voice Over IP Systems SP 800-58 |
| SP 800-57 Part 1-Rev. 3 | Jul 2012 | Recommendation for Key Management: Part 1: General (Revision 3) SP 800-57 Part 1, Revision 3 |
| SP 800-57 Part 2 | Aug 2005 | Recommendation for Key Management: Part 2: Best Practices for Key Management Organization SP 800-57 Part 2 |
| SP 800-57 Part 3-Rev.1 | Jan. 2015 | Recommendation for Key Management: Part 3 - Application-Specific Key Management Guidance SP 800-57 Part 3, Revision 1 FAQ doi:10.6028/NIST.SP.800-57pt3r1 [Direct Link] |
| SP 800-56 A Rev. 2 | May 2013 | Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography SP 800-56A Rev. 2 FAQ doi:10.6028/NIST.SP.800-56Ar2 [Direct Link] |
| | Public Comments received on Draft SP 800-56A Rev. 2 |
| SP 800-56 B Rev. 1 | Sep 2014 | Recommendation for Pair-Wise Key-Establishment Schemes Using Integer Factorization Cryptography SP 800-56B Revision 1 FAQ doi:10.6028/NIST.SP.800-56Br1 [Direct Link] |
| SP 800-56 C | Nov 2011 | Recommendation for Key Derivation through Extraction-then-Expansion SP 800-56C |
| SP 800-55 Rev. 1 | Jul 2008 | Performance Measurement Guide for Information Security SP 800-55 Rev. 1 |
| SP 800-54 | Jul 2007 | Border Gateway Protocol Security SP 800-54 |
| SP 800-53 Rev. 4 | Apr 2013 | Security and Privacy Controls for Federal Information Systems and Organizations SP 800-53 Rev. 4 (including updates as of 01-22-2015) FAQ doi:10.6028/NIST.SP.800-53r4 [Direct Link] |
| | Word version of SP 800-53 Rev. 4 (01-22-2015) |
| | XML file for SP 800-53 Rev. 4 (01-15-2014) |
| | Summary of NIST SP 800-53 Revision 4 |
| SP 800-53 A Rev.4 | Dec 2014 | Assessing Security and Privacy Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans SP 800-53A Revision 4 FAQ doi:10.6028/NIST.SP.800-53Ar4 [Direct Link] |
| | XML file for SP 800-53A Rev. 4 (06-16-2015) |
| SP 800-53 A Rev. 1 | Jun 2010 | Guide for Assessing the Security Controls in Federal Information Systems and Organizations, Building Effective Security Assessment Plans SP 800-53A Rev. 1 |
| | Security Assessment Overview and Cases |
| SP 800-52 Rev. 1 | Apr. 2014 | Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations SP 800-52 Rev. 1 FAQ doi:10.6028/NIST.SP.800-52r1 [Direct Link] |
| SP 800-51 Rev. 1 | Feb 2011 | Guide to Using Vulnerability Naming Schemes SP 800-51 Rev. 1 |
| SP 800-50 | Oct 2003 | Building an Information Technology Security Awareness and Training Program SP 800-50 |
| SP 800-49 | Nov 2002 | Federal S/MIME V3 Client Profile SP 800-49 |
| SP 800-48 Rev. 1 | Jul 2008 | Guide to Securing Legacy IEEE 802.11 Wireless Networks SP 800-48 Rev. 1 |
| SP 800-47 | Aug 2002 | Security Guide for Interconnecting Information Technology Systems SP 800-47 |
| SP 800-46 Rev. 1 | Jun 2009 | Guide to Enterprise Telework and Remote Access Security SP 800-46 Rev. 1 |
| SP 800-45 Version 2 | Feb 2007 | Guidelines on Electronic Mail Security SP 800-45 Version 2 |
| SP 800-44 Version 2 | Sep 2007 | Guidelines on Securing Public Web Servers SP 800-44 Version 2 |
| SP 800-43 | Nov 2002 | Systems Administration Guidance for Windows 2000 Professional System SP 800-43 |
| SP 800-41 Rev. 1 | Sep 2009 | Guidelines on Firewalls and Firewall Policy SP 800-41 Rev. 1 |
| SP 800-40 Rev. 3 | Jul 2013 | Guide to Enterprise Patch Management Technologies SP 800-40 Rev. 3 FAQ doi:10.6028/NIST.SP.800-40r3 [Direct Link] |
| SP 800-39 | Mar 2011 | Managing Information Security Risk: Organization, Mission, and Information System View SP 800-39 |
| SP 800-38 A | Dec 2001 | Recommendation for Block Cipher Modes of Operation - Methods and Techniques SP 800-38A |
| SP 800-38 A - Addendum | Oct 2010 | Recommendation for Block Cipher Modes of Operation: Three Variants of Ciphertext Stealing for CBC Mode SP 800-38A Addendum |
| SP 800-38 B | May 2005 | Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication SP 800-38B |
| | CMAC Examples (updated) |
| SP 800-38 C | May 2004 | Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality SP 800-38C (including updates as of 07-20-2007) |
| SP 800-38 D | Nov 2007 | Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC SP 800-38D |
| SP 800-38 E | Jan 2010 | Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices SP 800-38E |
| SP 800-38 F | Dec 2012 | Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping SP 800-38F FAQ doi:10.6028/NIST.SP.800-38F [Direct Link] |
SP 800-38 G (Draft) | July 8, 2013 | DRAFT Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption Announcement and Draft Publication |
| SP 800-37 Rev. 1 | Feb 2010 | Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach SP 800-37 Rev. 1 (including updates as of June 05, 2014) FAQ doi:10.6028/NIST.SP.800-37r1 [Direct Link] |
| | Supplemental Guidance on Ongoing Authorization, (June 2014) |
| SP 800-36 | Oct 2003 | Guide to Selecting Information Technology Security Products SP 800-36 |
| SP 800-35 | Oct 2003 | Guide to Information Technology Security Services SP 800-35 |
| SP 800-34 Rev. 1 | May 2010 | Contingency Planning Guide for Federal Information Systems SP 800-34 Rev. 1 (including updates as of 11-11-2010) |
| | Business Impact Analysis (BIA) Template (SP 800-34 Rev. 1) |
| | Contingency Planning: Low Impact System Template (SP 800-34 Rev. 1) |
| | Contingency Planning: Moderate Impact System Template (SP 800-34 Rev. 1) |
| | Contingency Planning: High Impact System Template (SP 800-34 Rev. 1) |
| SP 800-33 | Dec 2001 | Underlying Technical Models for Information Technology Security SP 800-33 |
| SP 800-32 | Feb 2001 | Introduction to Public Key Technology and the Federal PKI Infrastructure SP 800-32 |
| SP 800-30 Rev. 1 | Sep 2012 | Guide for Conducting Risk Assessments SP 800-30 Rev. 1 |
| | SP 800-30 Rev. 1 (EPUB) FAQ |
| SP 800-29 | Jun 2001 | A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2 SP 800-29 |
| SP 800-28 Version 2 | Mar 2008 | Guidelines on Active Content and Mobile Code SP 800-28 Version 2 |
| SP 800-27 Rev. A | Jun 2004 | Engineering Principles for Information Technology Security (A Baseline for Achieving Security) SP 800-27 Rev. A |
| SP 800-25 | Oct 2000 | Federal Agency Use of Public Key Technology for Digital Signatures and Authentication SP 800-25 |
| SP 800-24 | Apr 2001 | PBX Vulnerability Analysis: Finding Holes in Your PBX Before Someone Else Does SP 800-24 |
| SP 800-23 | Aug 2000 | Guidelines to Federal Organizations on Security Assurance and Acquisition/Use of Tested/Evaluated Products SP 800-23 |
| SP 800-22 Rev. 1a | Apr 2010 | A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications SP 800-22 Rev. 1a |
| SP 800-21 2nd edition | Dec 2005 | Guideline for Implementing Cryptography in the Federal Government SP 800-21 2nd Edition |
| SP 800-20 | Oct 1999 | Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS): Requirements and Procedures SP 800-20 (including updates as of 03-2012) |
| SP 800-19 | Oct 1999 | Mobile Agent Security SP 800-19 |
| SP 800-18 Rev.1 | Feb 2006 | Guide for Developing Security Plans for Federal Information Systems SP 800-18 Rev. 1 |
| SP 800-17 | Feb 1998 | Modes of Operation Validation System (MOVS): Requirements and Procedures SP 800-17 |
SP 800-16 Rev. 1 (3rd draft) (Draft) | Mar. 14, 2014 | DRAFT A Role-Based Model for Federal Information Technology / Cyber Security Training (3rd public draft) Announcement and Draft Publication |
| SP 800-16 | Apr 1998 | Information Technology Security Training Requirements: A Role- and Performance-Based Model SP 800-16 |
| | Appendices A, B, C, D |
| | Appendix E |
| SP 800-15 | Jan 1998 | MISPC Minimum Interoperability Specification for PKI Components, Version 1 SP 800-15 |
| SP 800-14 | Sep 1996 | Generally Accepted Principles and Practices for Securing Information Technology Systems SP 800-14 |
| SP 800-13 | Oct 1995 | Telecommunications Security Guidelines for Telecommunications Management Network SP 800-13 |
| SP 800-12 | Oct 1995 | An Introduction to Computer Security: The NIST Handbook SP 800-12 |
| SP 800-1 | Dec 1990 | Bibliography of Selected Computer Security Publications, January 1980 - October 1989 SP 800-1 |