Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Projects

Showing 1 through 10 of 11 matching records.
Apple macOS Security Configuration APPLE-OS
CSD’s macOS security configuration team is working to develop secure system configuration baselines supporting different operational environments for Apple macOS version 10.12, “Sierra.” These configuration guidelines will assist organizations with...
Awareness, Training, & Education ATE
Public Law 100-235, "The Computer Security Act of 1987," mandated NIST and OPM to create guidelines on computer security awareness and training based on functional organizational roles. Guidelines were produced in the form of NIST Special Publication...
Continuous Monitoring ConMon
To advance the state of the art in continuous monitoring capabilities and to further interoperability within commercially available tools, the Computer Security Division is working within the international standards development community to establish...
Cyber Supply Chain Risk Management C-SCRM
Information and operational technology (IT/OT) relies on a complex, globally distributed, and interconnected supply chain ecosystem to provide highly refined, cost-effective, and reusable solutions. This ecosystem is composed of various entities with...
Federal Computer Security Program Managers' Forum
Welcome to the Federal Computer Security Program Managers' Forum (Forum) website. The Forum is an informal group sponsored by the National Institute of Standards and Technology (NIST) to promote the sharing of information system security information...
Federal Information Systems Security Educators' Association FISSEA
FISSEA, founded in 1987, is an organization run by and for information security professionals to Assist Federal Agencies in Strengthening Their Employee Security Training and Awareness Programs. FISSEA conducts an annual fee-based conference and...
National Checklist Program NCP
NIST maintains the National Checklist Repository, which is a publicly available resource that contains information on a variety of security configuration checklists for specific IT products or categories of IT products. A security configuration...
Program Review for Information Security Assistance PRISMA
The Program Review for Information Security Management Assistance (PRISMA) includes many review options and incorporates guidelines contained in Special Publication 800-53 (Revision 3), Recommended Security Controls for Federal Information...
Security Content Automation Protocol SCAP
The Security Content Automation Protocol (SCAP) is a suite of specifications that standardize the format and nomenclature by which software flaw and security configuration information is communicated, both to machines and humans. SCAP is a multi-purpose...
Software Identification SWID
The International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) publishes ISO/IEC 19770-2, a standard for software identification (SWID) tags that defines a structured metadata format for...

1     2  next >  last >>