Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 926 through 950 of 15603 matching records.
Project Pages https://csrc.nist.gov/projects/automated-combinatorial-testing-for-software/quick-start

Combinatorial Testing Quick Start – two short readings make it easy to learn the basics: Read tutorial sections 2, 3, and 4 (pp. 4 to 18) (pdf in English or Espanol):   Practical Combinatorial Testing // Pruebas Combinatorias Pracaticas  Two examples are included, illustrating how to apply the combinatorial approach.  See the ACTS User Guide, which explains how to use the ACTS tool.  The user guide contains illustrations and screen shots of examples showing how to use the tool for practical testing. Now try it on your own testing project! See also: Video overview (12:46, mp4) of...

Project Pages https://csrc.nist.gov/projects/forum/meet-the-forum-team

The NIST Cybersecurity & Privacy Professionals Forum is co-chaired by representatives of NIST's Information Technology Laboratory, Computer Security Division (CSD) and Applied Cybersecurity Division (ACD). The Forum Secretariat provides the necessary administrative and logistical support for operations.     The Forum serves as an important mechanism for NIST to: exchange information directly with cybersecurity and privacy professionals in U.S. federal, state, and local government, and higher education organizations in fulfillment of its leadership mandate under the Federal Information...

Project Pages https://csrc.nist.gov/projects/forum/suggest-a-forum-speakertopic

Please use the Google Form below to submit a Speaker/Topic suggestion. Speaker and topic suggestions for future Forum meetings can also be sent as an email to: sec-forum@nist.gov Speaker and Topic submissions will be used by the NIST Forum Team and not shared outside of NIST. Loading…  

Project Pages https://csrc.nist.gov/projects/cryptographic-module-validation-program/cmvp-flow

Process from Vendor to Validation The figure below illustrates the interactions that happen between Vendor, CST Lab, and CMVP. The MIP list indicates one of fives steps in the process for each validation. Each step is addressed in the figure and the legend below. For more information, please refer to Section 4 of the Management Manual.  The steps for the cryptographic module validation life cycle include: Step 1 - IUT. The vendor submits the cryptographic module for testing to an accredited CST laboratory under a contractual agreement. Cryptographic module validation testing is performed...

Project Pages https://csrc.nist.gov/projects/ssdf/references

The SSDF uses these established secure development practice documents as references. Note that these references were current at the time SSDF version 1.1 was published, and may no longer be current. NIST Publications General Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1 National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (SP 800-181) Security and Privacy Controls for Information Systems and Organizations (SP 800-53 Rev. 5) Software Development Cybersecurity Supply Chain Risk Management Practices for Systems and...

Project Pages https://csrc.nist.gov/projects/vdg/related-guidance

References ISO/IEC 29147  International Organization for Standardization/International Electrotechnical Commission (2018) ISO/IEC 29147:2018 – Information technology – Security techniques – Vulnerability disclosure (ISO, Geneva, Switzerland). Available at https://www.iso.org/standard/72311.html ISO/IEC 30111 International Organization for Standardization/International Electrotechnical Commission (2019) ISO/IEC 30111:2019 – Information technology – Security techniques – Vulnerability handling processes (ISO, Geneva, Switzerland). Available at https://www.iso.org/standard/69725.html ISO/IEC...

Project Pages https://csrc.nist.gov/projects/risk-management/meet-the-rmf-team

The NIST Risk Management Framework Team conducts the research and develops the suite of key cybersecurity risk management standards and guidelines, as required by Congressional legislation to support implementation of the Federal Information Security Modernization Act (FISMA) and to assist organizations better understand and manage cybersecurity risk for their systems and organizations. We collaborate with the Cyber Supply Chain Risk Management Team in the NIST Computer Security Division and Privacy Engineering Team in the NIST Applied Cybersecurity Division to develop the suite of...

Project Pages https://csrc.nist.gov/projects/risk-management/about-rmf/implement-step

At A Glance       Purpose: Implement the controls in the security and privacy plans for the system and organization   Outcomes:  controls specified in security and privacy plans implemented security and privacy plans updated to reflect controls as implemented     Resources for Implementers RMF Quick Start Guide (QSG): Implement Step FAQs Security Configuration Settings Multiple Supporting NIST Publications include templates Examples include: SP 800-88, Guidelines for Media Sanitization, SP 800-34 Revision 1, Contingency Planning Guide for Federal Information...

Project Pages https://csrc.nist.gov/projects/risk-management/about-rmf/assess-step

At A Glance   Purpose: Determine if the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security and privacy requirements for the system and the organization.   Outcomes:  assessor/assessment team selected security and privacy assessment plans developed assessment plans are reviewed and approved control assessments conducted in accordance with assessment plans security and privacy assessment reports developed remediation actions to address deficiencies in controls are taken security and privacy plans are...

Project Pages https://csrc.nist.gov/projects/risk-management/about-rmf/authorize-step

At A Glance     Purpose: Provide  accountability by requiring a senior official to determine if the security and privacy risk based on the operation of a system or the use of common controls, is acceptable.   Outcomes:  authorization package (executive summary, system security and privacy plan, assessment report(s), plan of action and milestones) risk determination rendered risk responses provided authorization for the system or common controls is approved or denied   Resources for Implementers RMF Introductory Online Course RMF Quick Start Guide (QSG): Authorize Step...

Project Pages https://csrc.nist.gov/projects/risk-management/sp800-53-controls/overlay-repository/government-wide-overlay-submissions/closed-isolated-network

Overlay Name:   Closed Isolated Network  Overlay Publication Date: October 2020 Technology or System: Closed Isolated Network Overlay Author: US Army Europe Comments: A Closed Isolated Network is defined as a data communications enclave that operates in a single security domain, implements a security policy administered by a single authority, does not connect to any other network and has a single, common, continuous security perimeter. Overlay Point of Contact: Michael Naya   Download Overlay   Return to Control Overlay Repository Overview Disclaimer Statement The National...

Project Pages https://csrc.nist.gov/projects/risk-management/sp800-53-controls/public-comments-home

Welcome to the NIST SP 800-53 Public Comment Website   The NIST SP 800-53 Public Comment Site was developed to ensure that the SP 800-53 control catalog provides the most comprehensive and up-to-date set of controls/countermeasures to manage security, privacy, and supply chain risk. By modernizing the NIST comment process and moving to an online dataset instead of following a document-based update process, NIST can provide its stakeholders the most up-to-date controls in multiple data formats to manage risk while encouraging use of automation.  Stakeholders can provide feedback on...

Project Pages https://csrc.nist.gov/projects/risk-management/sp800-53-controls/public-comments-home/more-info

The NIST SP 800-53 Controls Public Comment Site was developed to ensure that the SP 800-53 control catalog provides the most comprehensive and up-to-date set of controls/countermeasures to manage security, privacy, and supply chain risk. By modernizing the NIST comment process and moving to an online dataset instead of following a document-based update process, NIST can provide its stakeholders the most up-to-date controls in multiple data formats to manage risk while encouraging use of automation.  Stakeholders can provide feedback on controls by: submitting a "proposal" for a new...

Project Pages https://csrc.nist.gov/projects/risk-management/sp800-53-controls/public-comments-home/faq

General Questions and Background What is the purpose of the SP 800-53 Public Comment Website? NIST believes that robust, widely understood, and participatory development processes produce the strongest, most effective, most trusted, and broadly accepted standards and guidelines. The following principles guide NIST's standards and guidelines development: Transparency: All interested and affected parties have access to essential information regarding standards and guidelines-related activities throughout the development process. Openness: Participation is open to all interested...

Project Pages https://csrc.nist.gov/projects/risk-management/sp800-53-controls/public-comments-home/user-guide

As NIST continues to refine the SP 800-53 Comment Site, screenshots included in the User Guide may differ slightly from the latest version.    Each topic area below includes a step-by-step guide demonstrating how to: Navigate to the SP 800-53 Public Comment Site Users can reach the SP 800-53 Public Comment Site directly, or by browsing from the NIST Risk Management Framework (RMF) project page.  Option 1: Access by Direct Link Access the SP 800-53 Public Comment Site directly: https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/public-comments. Figure 1 below shows the...

Project Pages https://csrc.nist.gov/projects/risk-management/sp800-53-controls/overlay-repository

Overview The NIST Security and Privacy Control Overlay Repository (SCOR), formerly the Security Control Overlay Repository, provides stakeholders a platform for voluntarily sharing control overlays created by subject matter experts to help reduce the duplication of effort and share best practices for the information security and privacy community. SCOR is organized into categories of overlays based on the submitting organization:  Government-wide Overlay submissions from federal, state, tribal, and local governments. Public Overlay submissions from commercial,...

Project Pages https://csrc.nist.gov/projects/risk-management/sp800-53-controls/downloads

Download the SP 800-53 Controls in Different Data Formats Note that NIST Special Publication (SP) 800-53, 800-53A, and SP 800-53B contain additional background, scoping, and implementation guidance in addition to the controls, assessment procedures, and baselines. This NIST SP 800-53 database represents the derivative format of controls defined in NIST SP 800-53 Revision 5, Security and Privacy Controls for Information Systems and Organizations. If there are any discrepancies noted in the content between these NIST SP 800-53 and 53A derivative data formats and the latest published NIST SP...

Project Pages https://csrc.nist.gov/projects/crypto-publication-review-project/background-and-approach

Background NIST cryptography standards (Federal Information Processing Standards, or “FIPS”) and other publications (typically specified in the Special Publication (SP) 800 series) are intended to protect non-national security federal information and information systems. Outside the Federal Government, these publications are voluntarily relied upon across many sectors to promote economic development and protect sensitive personal and corporate information.   Cryptography standards and other publications must be reviewed and maintained regularly because of rapid technological advances, the...

Project Pages https://csrc.nist.gov/projects/crypto-publication-review-project/completed-reviews

The following table summarizes publication reviews completed by the Crypto Publication Review Board, including links to announcements, received comments, the Board's initial decision proposal, and the final decision approved by NIST management. Also, see a list of publications currently under review and descriptions of the publication decision options—Reaffirm, Update, Revise, Convert, Withdraw. Latest updates: • 3/5/24: Decision to revise SP 800-38D. • 2/9/24: Decision to revise SP 800-38E. Completed Publication Reviews and Decisions (sorted by Final Decision, newest to oldest)...

Project Pages https://csrc.nist.gov/projects/crypto-publication-review-project/publication-decision-options

Table 2 identifies and describes the decision options available for handling publications. The Crypto Publication Review Board will make its decision proposals and final recommendations to NIST management based on these options. Table 2. Publication Decision Options Publication Decision Option Description Standards (FIPS) NIST Special Publications Reaffirm The publication content is confirmed as current and remains unchanged. NIST determines the publication is current and needs no changes.  NIST adds "Publication is current as of ."...

Project Pages
64%
https://csrc.nist.gov/projects/lightweight-cryptography/finalists

The following table lists the ten Finalists of the lightweight crypto standardization process. Official comments on the Finalists should be submitted using the "Submit Comment" link for the appropriate algorithm. Comments from the lwc-forum Google group subscribers will also be forwarded to the lwc-forum Google group list. We will periodically post and update the comments received to the appropriate algorithm. All relevant comments will be posted in their entirety and should not include PII information in the body of the email message. Please refrain from using OFFICIAL COMMENT to ask...

Project Pages https://csrc.nist.gov/projects/pec/encounters

A multidisciplinary NIST initiative seeks to address the Covid-19 pandemic by analyzing the availability, effectiveness, accuracy, and privacy of automated contact tracing efforts. PEC team members have been participating, by studying privacy tradeoffs of widespread contact tracing applications and considering how privacy can be improved within these systems. 2021-January-26-28: NIST workshop Challenges for Digital Proximity Detection in Pandemics: Privacy, Accuracy, and Impact. The workshop was held to engage with the broader community. PEC team members helped organize the breakout session...

Project Pages https://csrc.nist.gov/projects/risk-management/sp800-53-controls/overlay-repository/government-wide-overlay-submissions/physical-access-control-systems

Overlay Name:   Electronic Physical Access Control System Overlay Publication Date: April 2021 Technology or System: Electronic Physical Access Control System (ePACS) Overlay Author: PACS Modernization Working Group (PACSmod WG) Comments: Electronic Physical Access Control Systems (ePACS) use a combination of IT components and physical security elements (e.g., card readers, doors/locks) to enable access to real-world resources such as secured facilities or controlled areas within facilities. This overlay provides a standardized template for Chief Security Officers (CSOs) and other ePACS...

<< first   < previous   26     27     28     29     30     31     32     33     34     35     36     37     38     39     40     41     42     43     44     45     46     47     48     49     50  next >  last >>