﻿{
  "title": "NIST Draft Publications Open for Comment",
  "subtitle": "Many of NIST's cybersecurity and privacy publications are posted as drafts for public comment. Comment periods are still open for the following publications. Visit the links for downloads, related content, and instructions for submitting comments. Your thoughtful reviews and comments are greatly appreciated and help us to improve our standards and guidance.",
  "updated": "2026-04-22T01:00:20.571231-04:00",
  "id": "https://csrc.nist.gov/csrc/media/feeds/pubs/drafts-open-for-comment.xml",
  "link": "https://csrc.nist.gov/publications/drafts-open-for-comment",
  "entries": [
    {
      "id": "https://csrc.nist.gov/pubs/other/2026/03/24/devsecops-practices/iprd",
      "title": "Other Secure Software Development, Security, and Operations (DevSecOps) PracticesInitial Preliminary Draft",
      "summary": "<p>The NIST National Cybersecurity Center of Excellence (NCCoE) is releasing this live document as part of its Secure Software Development, Security, and Operations (DevSecOps) project. This project demonstrates how organizations can implement the security practices and tasks recommended in the <a data-csrc-link=\"true\" data-node-guid=\"92b05c5d-001d-4ef5-920f-f6c7bbab7c05\" href=\"/Projects/ssdf\">NIST Secure Software Development Framework</a> (SSDF) using modern DevSecOps pipelines and commercially available technology. The live document is open for public comment until <b>April 24, 2026.</b><o></o></p>\n<p>This release provides several components of the NCCoE DevSecOps demonstration, including:<o></o></p>\n<ol>\n<li>An updated <a href=\"https://pages.nist.gov/nccoe-devsecops/executive-summary.html#executive-summary\">Executive Summary and Introduction</a>, highlighting the purpose and background of this project.<o></o></li>\n<li>A <a href=\"https://pages.nist.gov/nccoe-devsecops/notational-reference-model.html\">notional reference model</a> for DevSecOps to demonstrate the NIST SSDF.<o></o></li>\n<li>Details on the <a href=\"https://pages.nist.gov/nccoe-devsecops/example-implementations.html\">first example implementation</a>, which demonstrates DevSecOps practices in a Microsoft Azure-based environment.<o></o></li>\n<li>An <a href=\"https://pages.nist.gov/nccoe-devsecops/appendix-c.html\">appendix</a> highlighting industry collaborators in the project and their technologies used in the demonstration environment.<o></o></li>\n</ol>\n<h5><b>Background</b><o></o></h5>\n<p>The live document shares findings from the NCCoE's collaborative, demonstrative applied research project with 14 technology companies, who contributed technologies, expertise, and operational insights. This project demonstrates and documents practical approaches for integrating SSDF practices into modern DevSecOps pipelines using commercially available technologies. By automating and standardizing security considerations throughout the development lifecycle, the project aims to help organizations improve efficiency, strengthen software supply chain security, and provide greater assurance that secure software development practices are consistently applied.<o></o></p>\n<p>As part of NIST&rsquo;s response to&nbsp;<a href=\"https://www.whitehouse.gov/presidential-actions/2025/06/sustaining-select-efforts-to-strengthen-the-nations-cybersecurity-and-amending-executive-order-13694-and-executive-order-14144/\">Executive Order (EO) 14306</a>,&nbsp;<i>Sustaining Select Efforts to Strengthen the Nation's Cybersecurity and Amending Executive Order 13694 and Executive Order 14144</i>, this project will showcase examples of secure software development practices that fundamentally bolster the security of DevSecOps practices by implementing the SSDF's recommendations.<o></o></p>\n<h5><b>Next Steps</b><o></o></h5>\n<p>Unlike traditional static publications, this live document will be updated on a rolling basis with additional implementations and technical findings as the work with collaborators in the laboratory continues. In the coming months, the NCCoE will publish use case scenarios for the initial example implementation, as well as details on other example implementations showcasing several development platforms and tools. The NCCoE will also release an analysis that decomposes NIST SSDF practices and tasks into more granular and actionable tasks, illustrating their application within the project's DevSecOps model.<o></o></p>",
      "published": "2026-03-24T00:00:00",
      "updated": "2026-03-24T00:00:00",
      "link": "https://csrc.nist.gov/pubs/other/2026/03/24/devsecops-practices/iprd",
      "content": "Comments Due 04/24/2026"
    },
    {
      "id": "https://csrc.nist.gov/pubs/sp/1347/ipd",
      "title": "SP 1347, NIST Cybersecurity Framework 2.0: Informative References Quick-Start GuideInitial Public Draft",
      "summary": "<p>The Initial Public Draft of SP 1347, <em>NIST Cybersecurity Framework 2.0:&nbsp;</em><i>Informative References</i> <i>Quick‑Start Guide, </i>explains what informative references are and how they support achieving the outcomes of the NIST Cybersecurity Framework (CSF) 2.0. The guide also introduces readers to NIST tools available for accessing, viewing, and using informative references for cybersecurity risk management, including direct download, the CSF 2.0 Reference Tool, and the Online Informative References Program. The draft contains two sample use cases and provides an overview of how artificial intelligence tools can support reference data use.<i><o></o></i></p>",
      "published": "2026-03-23T00:00:00",
      "updated": "2026-03-23T00:00:00",
      "link": "https://csrc.nist.gov/pubs/sp/1347/ipd",
      "content": "Comments Due 05/06/2026"
    },
    {
      "id": "https://csrc.nist.gov/pubs/sp/1800/42/ipd",
      "title": "SP 1800-42, Digital Identities – Mobile Driver’s License (mDL): Accelerating Development and Adoption of Digital Identity for Financial InstitutionsInitial Public Draft",
      "summary": "<p>Today, the NCCoE published technical resources to help financial institutions use mobile driver&rsquo;s licenses (mDLs) for customer identification. NIST Special Publication 1800-42 ipd provides an updated reference architecture, implementation details, and key findings from the project. <o></o></p>\n<p>Compared to physical driver&rsquo;s licenses, mobile driver&rsquo;s licenses (mDLs) are easier to use for digital transactions and offer improved protections against fraud, identity theft, and unauthorized access. The NCCoE&rsquo;s technology demonstration is tackling the security, privacy, and interoperability issues with mDLs. <!-- [if !supportAnnotations]--><!--[endif]-->&nbsp;<o></o></p>\n<p>This publication reflects insights from industry collaborators and lessons learned by developing a functional online demonstration using mDLs for customer identification. The publication provides a practical roadmap to enable adoption and implementation of mDLs for online financial management.</p>\n<h4>Feedback</h4>\n<p>You can improve this guide by contributing feedback. As an initial public draft, this document intends to&nbsp;gain critical feedback from stakeholders across government and industry on the implementation of mDL to support Customer Identification Programs and high assurance use cases more broadly. Comments are&nbsp;welcome on all aspects of this document and specifically encouraged on the following areas:</p>\n<ol>\n<li><strong>Implementation and Adoption Challenges.</strong> This document highlights challenges to the adoption of mDL technology learned through engagement with collaborators and stakeholders spanning technology providers, financial institutions, standards bodies and government agencies. However, additional insights on barriers to adoption can help focus the project and future&nbsp;phases of work and NIST&rsquo;s engagement with standards development organizations.</li>\n<li><strong>Regulatory and Compliance Alignment.</strong> This document offers insights into the ways in which mDL online presentation aligns with existing regulatory structures. Additional insights on other regulatory mappings, views on the degree to which alignment is achieved, and suggested&nbsp;clarifications are encouraged.</li>\n<li><strong>Technology Transfer and Resources.</strong> This document as well as supporting resources are&nbsp;intended to aid in implementation of the technology in real world environments. The project team is highly interested in additional resources and tools which may further aid in both technical implementation and broader adoption of the technology.</li>\n<li><strong>Threats and Threat Model. </strong>The threat model proposed here is intended to act as a starting&nbsp;point for members of the ecosystem to identify and prepare for how attacks may shift in an mDL environment. Input on approach, specific threats, and mitigations will be highly valuable in&nbsp;maturing this view and providing greater visibility into future risks.&nbsp;</li>\n</ol>",
      "published": "2026-03-18T00:00:00",
      "updated": "2026-03-18T00:00:00",
      "link": "https://csrc.nist.gov/pubs/sp/1800/42/ipd",
      "content": "Comments Due 05/08/2026"
    },
    {
      "id": "https://csrc.nist.gov/pubs/cswp/50/small-business-cybersecurity-non-employer-firms/ipd",
      "title": "CSWP 50, Small Business Cybersecurity: Non-Employer FirmsInitial Public Draft",
      "summary": "<p>According to the U.S. Small Business Administration Office of Advocacy, there are 34.8 million small businesses in the United States. Of those, 81.9% have no paid employees other than the owner or owners&mdash;termed &ldquo;non-employer firms.&rdquo; These include sole proprietors, freelancers, single-member limited liability companies (LLCs), independent contractors, gig economy workers, and others. This publication helps small firms with no employees and with minimal IT complexity use the NIST Cybersecurity Framework 2.0 to manage their cybersecurity risks. To make this information applicable to a broader audience, cybersecurity risk management considerations are included for businesses as they grow and hire employees&mdash;acknowledging that some non-employer firms may never hire additional employees. Many small businesses rely upon consultants, who are also a key audience for this report. While the guide is developed for a U.S. audience, it is recognized that many small businesses engage in international commerce or collaborations, and this document can be adapted to support the cybersecurity risk management of those efforts.&nbsp;<o></o></p>\n<p>Cybersecurity White Paper (CSWP) 50 was initially published in 2009 as NIST IR 7621, <i>Small Business Information Security</i>: <i>The Fundamentals</i>. The publication underwent an initial revision in 2016 (NIST IR 7621, Rev.1). A pre-draft call for comments was issued in 2024, followed by an initial public draft and comment period on NIST IR 7621, Rev. 2. During the revision process, the publication was converted to CSWP 50,<i> Small Business Cybersecurity: Non-Employer Firms. </i></p>\n<p>Key Updates within CSWP 50:<o></o></p>\n<ul>\n<li>This revision has a narrowed scope. Previous versions of this publication discussed the broader topic of information security; this revised publication is now focused specifically on cybersecurity, which is a subset of information security.<o></o></li>\n<li>Based on community input, the audience was narrowed. Prior versions focused on &ldquo;small business,&rdquo; which is a very broad and diverse population. This revision is tailored to a more specific population&mdash;non-employer firms with minimal information technology (IT) complexity. <o></o></li>\n<li>Three notional use-cases were developed and added to the appendices. &nbsp;<o></o></li>\n<li>This revision changes in technology and recent updates to NIST publications, including the Cybersecurity Framework (CSF) 2.0 and the NIST IR 8286 series.</li>\n<li><o></o>The layout has been updated to present the information in a tabular format to enhance readability.&nbsp;<o></o></li>\n</ul>",
      "published": "2026-04-14T00:00:00",
      "updated": "2026-04-14T00:00:00",
      "link": "https://csrc.nist.gov/pubs/cswp/50/small-business-cybersecurity-non-employer-firms/ipd",
      "content": "Comments Due 05/14/2026"
    },
    {
      "id": "https://csrc.nist.gov/pubs/sp/1800/40/ipd",
      "title": "SP 1800-40, Automation of the NIST Cryptographic Module Validation ProgramInitial Public Draft",
      "summary": "<p>The NIST Cryptographic Module Validation Program (CMVP) is essential for organizations required to use validated cryptography &ndash; ensuring that hardware and software cryptographic implementations meet standard security requirements. The NCCoE has published the draft NIST SP 1800-40, Automation of the NIST Cryptographic Module Validation Program, to demonstrate how structured test evidence, standardized submission protocols, and modernized computing infrastructure can streamline the submission and review process. This publication is open for public comment through <strong>June 1, 2026</strong>.</p>\n<h5>Background</h5>\n<p>NIST established the CMVP to ensure that hardware and software cryptographic implementations conform to specified security requirements. Since CMVP was established, the volume, complexity, and speed-to-market of cryptographic modules seeking validation have steadily increased. The rapid pace of innovation is exceeding the capacity of vendors, labs, and validation authorities to keep up with testing and validation.</p>\n<p>The NCCoE, in collaboration with the CMVP, is demonstrating the value of automation to improve the efficiency and timeliness of CMVP operations and processes. This publication provides details on the modernization effort, including automation of the testing and validation process, demonstration of protocols to accept and process module validation submissions, and an overview of the infrastructure changes to shift from an on-premises architecture to a cloud-native platform. This publication is intended to help testing labs, technology producers, and validation authorities streamline the validation process while maintaining and improving assurance levels.</p>\n<h5>Comment Now!</h5>\n<p>We encourage you to download the publication and submit your feedback by <strong>June 1, 2026</strong>. While no further publication updates are planned, the team invites users to provide feedback on the areas where clarification might be beneficial. If you have any questions, you can reach out to the team at <a href=\"mailto:applied-crypto-testing@nist.gov\">applied-crypto-testing@nist.gov</a>.</p>",
      "published": "2026-04-15T00:00:00",
      "updated": "2026-04-15T00:00:00",
      "link": "https://csrc.nist.gov/pubs/sp/1800/40/ipd",
      "content": "Comments Due 06/01/2026"
    },
    {
      "id": "https://csrc.nist.gov/pubs/sp/800/230/ipd",
      "title": "SP 800-230, Additional SLH-DSA Parameter Sets for Limited Signature Use CasesInitial Public Draft",
      "summary": "<p>NIST is seeking public comments on the initial public draft (ipd) of Special Publication (SP) 800-230, <i>Additional SLH-DSA Parameter Sets for Limited-Signature Use Cases</i>. This document serves as a technical extension to <a href=\"https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcsrc.nist.gov%2Fpubs%2Ffips%2F205%2Ffinal&amp;data=05%7C02%7Cisabel.vanwyk%40nist.gov%7C23ed3339464e4d97d26b08de919562ba%7C2ab5d82fd8fa4797a93e054655c61dec%7C0%7C0%7C639108267947072041%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=sl5pq0Isea89tueZpkPIVNd4IstRxXtQP02K%2BDDXSVU%3D&amp;reserved=0\">FIPS 205</a>&nbsp;by specifying six additional parameter sets for security levels 1, 3, and 5. These variants are specifically tailored for use cases that require fast verification and reduced signature sizes, such as the signing of software, firmware, and digital certificates. These optimizations are achieved by establishing a strict limit of 2^24 signatures per signing key; therefore, these sets are not approved for general-purpose use.<o></o></p>\n<p><o>&nbsp;</o></p>\n<p>NIST requests feedback on the suitability of these additional parameter sets, specifically asking reviewers to identify applications for which these variants might incur unacceptable performance or to suggest alternative sets that are better suited for such use cases. Users must perform a thorough evaluation to ensure that the signature limit is never exceeded during a key's lifetime. Please submit comments to <a href=\"mailto:SP800-230-comments@nist.gov\">SP800-230-comments@nist.gov</a> by June 12, 2026</p>",
      "published": "2026-04-13T00:00:00",
      "updated": "2026-04-13T00:00:00",
      "link": "https://csrc.nist.gov/pubs/sp/800/230/ipd",
      "content": "Comments Due 06/12/2026"
    },
    {
      "id": "https://csrc.nist.gov/pubs/sp/800/133/r3/ipd",
      "title": "SP 800-133 Rev. 3, Recommendation for Cryptographic Key GenerationInitial Public Draft",
      "summary": "<p>This document describes the generation of keys to be managed and used by approved cryptographic algorithms.&nbsp;<o></o></p>\n<p>Proposed changes in this revision include the following:<o></o></p>\n<ul>\n<li>Asymmetric key-pair generation has been expanded to include methods for deriving randomness during key-pair generation.<o></o></li>\n<li>Key-pair generation now has options for derivation similar to symmetric keys and new methods for &ldquo;seed expansion,&rdquo; which allows for the limited use of SHAKE and deterministic random bit generators (DRBGs).<o></o></li>\n<li>Key-encapsulation mechanisms (KEMs) are discussed as a key-establishment option for symmetric key generation, and post-quantum cryptography (PQC) references have been added throughout (e.g., the new PQC signatures).<o></o></li>\n<li>Text has been reworded to address random number generation in alignment with SP 800-90C.<o></o></li>\n</ul>\n<p>Comments are especially requested regarding:<o></o></p>\n<ul>\n<li>Hardware security module (HSM) design &mdash; How do these requirements align with common practice and existing systems using a root seed/secret value?<o></o></li>\n<li>PQC implementations and protocol &mdash; How do these requirements fit with storing keys as seeds (e.g., for ML-KEM) and performing hybrid (i.e., combined classical and post-quantum) implementations?<o></o></li>\n</ul>",
      "published": "2026-04-17T00:00:00",
      "updated": "2026-04-17T00:00:00",
      "link": "https://csrc.nist.gov/pubs/sp/800/133/r3/ipd",
      "content": "Comments Due 06/16/2026"
    }
  ]
}