﻿<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <title type="text">NIST Draft Publications Open for Comment</title>
  <subtitle type="text">Many of NIST's cybersecurity and privacy publications are posted as drafts for public comment. Comment periods are still open for the following publications. Visit the links for downloads, related content, and instructions for submitting comments. Your thoughtful reviews and comments are greatly appreciated and help us to improve our standards and guidance.</subtitle>
  <id>https://csrc.nist.gov/CSRC/media/feeds/pubs/drafts-open-for-comment.xml</id>
  <updated>2026-03-12T09:00:39Z</updated>
  <logo>https://csrc.nist.gov/CSRC/Media/images/CSRC-white-134-38.png</logo>
  <link rel="alternate" href="https://csrc.nist.gov/publications/drafts-open-for-comment" />
  <entry>
    <id>https://csrc.nist.gov/pubs/sp/1800/39/ipd</id>
    <title type="text">SP 1800-39, Data Classification PracticesInitial Public Draft</title>
    <summary type="text">&lt;p&gt;This guide,&amp;nbsp;&lt;em&gt;Data Classification Practices&lt;/em&gt;, demonstrates how organizations can discover, identify, and label unstructured data using data classification practices. Performing Data Classification Practices allows an organization to know its data and apply technologies that minimize the risk of valuable or sensitive data being lost or mismanaged. Data Classification Practices prepare an organization for the use of emerging security measures&amp;mdash;including Zero Trust Architecture, quantum-safe cryptography, and AI model training that requires labeled data. This 1800-series NIST publication documents how the NCCoE and its collaborators created a synthetic dataset and used commercially available data classification tools to discover, identify, and label unstructured data.&lt;o&gt;&lt;/o&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Background&lt;o&gt;&lt;/o&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Organizations trying to protect sensitive data from unauthorized access or disclosure need to understand all their data&amp;mdash;structured and unstructured&amp;mdash;across all the places that data might live. Sensitive data, such as PII, may reside in a variety of systems, digital conversations, data lakes, and file repositories. Identifying and classifying sensitive data is crucial for minimizing data loss and preparing organizations for advanced security measures, including Zero Trust Architecture, quantum-safe cryptography, and AI model training. &lt;o&gt;&lt;/o&gt;&lt;/p&gt;
&lt;p&gt;The goal of this project is to demonstrate data classification practices for identifying and understanding sensitive unstructured data. This NIST Cybersecurity Practice Guide provides users with the information they need to apply data classification practices to discover, identify, and label sensitive unstructured data using commercially available data classification technology. By doing so, organizations can better understand their data and minimize the risk of losing or mismanaging valuable or sensitive data.&lt;/p&gt;
&lt;p&gt;The public comment period ends on &lt;strong&gt;March&amp;nbsp;30, 2026.&lt;/strong&gt;&lt;/p&gt;</summary>
    <published>2026-02-12T00:00:00-05:00</published>
    <updated>2026-02-12T00:00:00-05:00</updated>
    <link href="https://csrc.nist.gov/pubs/sp/1800/39/ipd" />
    <content type="text">Comments Due 03/30/2026</content>
  </entry>
  <entry>
    <id>https://csrc.nist.gov/pubs/other/2026/02/05/accelerating-the-adoption-of-software-and-ai-agent/ipd</id>
    <title type="text">Other [Concept Paper] Accelerating the Adoption of Software and Artificial Intelligence Agent Identity and AuthorizationInitial Public Draft</title>
    <summary type="text">&lt;p&gt;The NIST National Cybersecurity Center of Excellence is interested in launching a project to demonstrate how identity standards and best practices can be applied to software agents, with a focus on agentic AI applications.&lt;o&gt;&lt;/o&gt;&lt;/p&gt;
&lt;p&gt;Artificial Intelligence (AI) technology brings great opportunities to organizations. Specifically, AI agents&amp;mdash;software systems that use data and algorithms to autonomously perform tasks&amp;mdash;offer the promise of improved productivity, efficiency, and decision-making in complex scenarios. However, realizing these benefits requires understanding the potential risks from giving AI agents access to diverse data sets, tools, and applications, and applying appropriate identification and authorization controls to mitigate these risks. &amp;nbsp;&lt;o&gt;&lt;/o&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;We Need Your Feedback&lt;/strong&gt;&lt;o&gt;&lt;/o&gt;&lt;/p&gt;
&lt;p&gt;To help the community provide input on this potential project, the NCCoE has released a concept paper, &lt;em&gt;Accelerating the Adoption of Software and Artificial Intelligence Agent Identity and Authorization&lt;/em&gt;, outlining considerations for a potential NCCoE project focused on applying identity standards and best practices to AI agents.&lt;o&gt;&lt;/o&gt;&lt;/p&gt;
&lt;p&gt;The concept paper provides an overview of the types of feedback that would be most helpful, such as:&lt;o&gt;&lt;/o&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Use Cases: How are organizations currently using or planning to use AI agents?&lt;o&gt;&lt;/o&gt;&lt;/li&gt;
&lt;li&gt;Challenges: What new and unique problems do AI agents bring compared to other software?&lt;o&gt;&lt;/o&gt;&lt;/li&gt;
&lt;li&gt;Standards: What current or emerging standards are being used to guide AI agent identity and access management?&lt;o&gt;&lt;/o&gt;&lt;/li&gt;
&lt;li&gt;Technologies: What technology is being used or planned to support AI agents?&lt;o&gt;&lt;/o&gt;&lt;/li&gt;
&lt;li&gt;More detailed questions on the identification, authorization, auditing and non-repudiation of AI agents, as well as controls to prevent and mitigate prompt injection techniques.&lt;o&gt;&lt;/o&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;How to Submit Feedback&lt;/strong&gt;&lt;o&gt;&lt;/o&gt;&lt;/p&gt;
&lt;p&gt;This concept paper is open for public comment through &lt;strong&gt;April 2, 2026&lt;/strong&gt;. We encourage you to visit our project page for more details and instructions to submit comments. We appreciate your feedback to inform the NCCoE&amp;rsquo;s work to accelerate the adoption of secure technologies.&lt;o&gt;&lt;/o&gt;&lt;/p&gt;</summary>
    <published>2026-02-05T00:00:00-05:00</published>
    <updated>2026-02-05T00:00:00-05:00</updated>
    <link href="https://csrc.nist.gov/pubs/other/2026/02/05/accelerating-the-adoption-of-software-and-ai-agent/ipd" />
    <content type="text">Comments Due 04/02/2026</content>
  </entry>
</feed>