Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 176 through 200 of 15603 matching records.
Topics https://csrc.nist.gov/topics/laws-and-regulations/executive-documents/cnci

The Comprehensive National Cybersecurity Initiative (March 2010) was originally described in Homeland Security Presidential Directive/HSPD-23 (January 8, 2008). The CNCI is a driver for cybersecurity education and supply chain risk management.

Topics https://csrc.nist.gov/topics/laws-and-regulations/executive-documents/csip

OMB Memo M-16-04, Cybersecurity Strategy and Implementation Plan (CSIP) for the Federal Civilian Government (October 30, 2015), resulted from a comprehensive review in 2015 of the Federal Government's cybersecurity policies, procedures, and practices by the Cybersecurity Sprint Team. Its intent was to identify and address critical cybersecurity gaps and emerging priorities, and make specific recommendations to address those gaps and priorities. The five objectives of CSIP are: Prioritized Identification and Protection of high value information and assets; Timely Detection of and Rapid...

Topics https://csrc.nist.gov/topics/laws-and-regulations/executive-documents/cyberspace-policy-review

The Cyberspace Policy Review (May 2009) served as a driver for both the National Strategy for Trusted Identities in Cyberspace (NSTIC) and the National Initiative for Cybersecurity Education (NICE).  

Topics https://csrc.nist.gov/topics/laws-and-regulations/executive-documents/eo-13636

Improving Critical Infrastructure Cybersecurity (February 12, 2013) initiated development of the Cybersecurity Framework (CSF).

Topics https://csrc.nist.gov/topics/laws-and-regulations/executive-documents/eo-13702

Creating a National Strategic Computing Initiative (July 29, 2015)

Topics https://csrc.nist.gov/topics/laws-and-regulations/executive-documents/eo-13718

Commission on Enhancing National Cybersecurity (February 9, 2016)

Topics https://csrc.nist.gov/topics/laws-and-regulations/executive-documents/eo-13800

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure (May 11, 2017)

Topics https://csrc.nist.gov/topics/laws-and-regulations/executive-documents/hspd-7

Critical Infrastructure Identification, Prioritization, and Protection (December 17, 2003).

Topics https://csrc.nist.gov/topics/laws-and-regulations/executive-documents/hspd-12

Policy for a Common Identification Standard for Federal Employees and Contractors (August 27, 2004) initiated the development effort for FIPS 201 and other publications and testing related to Personal Identity Verification (PIV).

Topics https://csrc.nist.gov/topics/laws-and-regulations/executive-documents/omb-a-11

Office of Management and Budget (OMB) Circular A-11, Preparation, Submission, and Execution of the Budget (updated annually)

Topics https://csrc.nist.gov/topics/laws-and-regulations/executive-documents/omb-a-130

Office of Management and Budget (OMB) Circular A-130, Managing Information as a Strategic Resource (July 28, 2016).

Topics https://csrc.nist.gov/topics/security-and-privacy/risk-management/vulnerability-management

Vulnerabilities are "weaknesses in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source." [SP 800-37 Rev. 2, Appendix B]

<< first   < previous   1     2     3     4     5     6     7     8     9     10     11     12     13     14     15     16     17     18     19     20     21     22     23     24     25  next >  last >>