This is a potential security issue, you are being redirected to https://csrc.nist.gov.
Date Published: June 2021
Comments Due: August 9, 2021 (public comment period is CLOSED)
Email Questions to: email@example.com
Not all security vulnerabilities can be found through automated processes or testing. Internal and external reporting of security vulnerabilities in software and information systems owned or utilized by the Federal Government is critical to mitigating risk, establishing a robust security posture, and maintaining transparency and trust with the public. In 2020 alone, more than 18,000 vulnerabilities were publicly listed in the National Vulnerability Database (NVD).
NIST is inviting comments on this Draft NIST Special Publication, which establishes a flexible, unified framework for establishing policies and implementing procedures for reporting, assessing, and managing vulnerability disclosures for systems within the Federal Government. Per the Internet of Things Cybersecurity Improvement Act of 2020, Public Law 116-207, and in alignment with ISO/IEC 29147 and ISO/IEC30111, these guidelines address:
NIST is leading this government-wide effort in coordination with other agencies, including the Office of Management and Budget (OMB), the Department of Defense (DoD), and the Department of Homeland Security (DHS).
We encourage you to use the comment template for documenting your comments on the draft.
NOTE: A call for patent claims is included on page iii of this draft. For additional information, see the Information Technology Laboratory (ITL) Patent Policy--Inclusion of Patents in ITL Publications.
SP 800-216 (Draft) (DOI)
Comment template (xls)
06/07/21: SP 800-216 (Draft)
05/24/23: SP 800-216 (Final)
Security and Privacy
threats; vulnerability management
Laws and Regulations
Internet of Things Cybersecurity Improvement Act