Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 51 through 75 of 1391 matching records.
Project Pages

NIST-developed Overlay Submissions

https://csrc.nist.gov/projects/risk-management/sp800-53-controls/overlay-repository/nist-developed-overlay-submissions

NIST developed category consists of submissions developed by NIST staff or contractors. Select from overlays listed below for more information and to access the overlay. Overlay Name / Version Author / Point of Contact Technology or System Comment SP 800-82 v1 / Version 2 Author: Keith Stouffer PoC: Keith Stouffer x1234 Industrial Control System The FISMA Implementation Project was established in January 2003 to produce several key security standards and guidelines required by Congressional legislation. These publications include...

Updates

NIST Releases Control Overlays for Securing AI Systems Concept Paper

August 14, 2025
https://csrc.nist.gov/news/2025/control-overlays-for-securing-ai-systems

NIST has released a concept paper and proposed action plan for developing a series of NIST SP 800-53 Control Overlays for Securing AI Systems, as well as a launching a Slack channel for this community of interest.

Project Pages

Cybersecurity Adoption, Awareness, & Training

https://csrc.nist.gov/projects/human-centered-cybersecurity/research-areas/cybersecurity-adoption

People and organizations often fail to adopt and effectively use cybersecurity best practices and technologies for a variety of reasons, including lack of knowledge/skills. Those professionals tasked with educating others may likewise face a number of challenges, including lack of resources, support, and skills needed to be effective security communicators. We conduct research to better understand the approaches and challenges with cybersecurity awareness and role-based training through the eyes of training professionals within the U.S. government. In the recent past, we also explored...

Project Pages

Internet of Things

https://csrc.nist.gov/projects/human-centered-cybersecurity/research-areas/internet-of-things

Internet of Things (IoT) technology is becoming more pervasive in the home environment. These technologies are increasingly used by non-technical users who have little understanding of the technologies or awareness of the security and privacy implications of use. We conduct research to help improve consumers' security and privacy experiences and outcomes when using IoT, with a specific focus on smart home devices. Publications IoT Cybersecurity Labels Papers Recommended Criteria for Cybersecurity Labeling for Consumer Internet of Things (IoT) Products - National Institute of...

Project Pages

User Perceptions & Behaviors

https://csrc.nist.gov/projects/human-centered-cybersecurity/research-areas/user-perceptions-behaviors

Understanding user perceptions and behavior is critical to achieving security objectives. People are repeatedly bombarded with messages about the dangers lurking on the Internet and are encouraged (or forced) to take numerous security-related actions, often without a clear understanding of why and to what end. We conduct research to discover people’s security and privacy perceptions, attitudes, and behaviors with a goal of developing cybersecurity guidance that: 1) takes into account user needs, skills, and limitations and 2) helps people make sound security decisions. Recent projects include...

Project Pages

Youth Security & Privacy

https://csrc.nist.gov/projects/human-centered-cybersecurity/research-areas/youth-security

Many security research efforts have focused on adults' perceptions and practices, leaving gaps in our understanding of youth perceptions and practices. To help fill this gap, our team explores the online security and privacy perceptions and practices of youth and influencing social factors from three perspectives: youth themselves, parents/guardians, and teachers/educators. Publications Influences on Youth Online Privacy and Security Papers Youth understandings of online privacy and security: A dyadic study of children and their parents - Olivia Williams, Yee-Yin Choong, &...

Publications SP 1800-43 (Initial Public Draft)

Genomic Data Threat Modeling

August 5, 2025
https://csrc.nist.gov/pubs/sp/1800/43/ipd

Abstract: This paper provides an example of how to conduct genomic data threat modeling for privacy on a data processing environment, including documenting the architecture, identifying threats, applying sample interventions, and iterating the process as needed. The paper complements the earlier NIST CSWP 35,...

Updates

Development of an Internal-Use NCCoE Chatbot | Comment on Draft NIST IR 8579

July 31, 2025
https://csrc.nist.gov/news/2025/draft-nist-ir-8579-nccoe-chatbot

The National Cybersecurity Center of Excellence (NCCoE) has released the initial public draft of Internal Report (IR) 8579. The comment period for this NIST IR closes on September 11, 2025.

Updates

Second Public Draft | Supply Chain Traceability: Manufacturing Meta-Framework

July 31, 2025
https://csrc.nist.gov/news/2025/nist-ir-8536-second-public-draft

NIST's NCCoE has posted the second public draft of NIST IR 8536, "Supply Chain Traceability: Manufacturing Meta-Framework," for public comment. The comment period is open through October 3, 2025.

Publications IR 8579 (Initial Public Draft)

Developing the NCCoE Chatbot: Technical and Security Learnings from the Initial Implementation

July 31, 2025
https://csrc.nist.gov/pubs/ir/8579/ipd

Abstract: Chatbots are emerging as alternative interfaces for structured information retrieval and internal knowledge access. Chatbots can utilize the capabilities of large language models (LLMs) to help interpret user-provided input and provide responses to a variety of requests. This paper describes the dev...

Publications SP 800-63-4 (Final)

Digital Identity Guidelines

July 31, 2025
https://csrc.nist.gov/pubs/sp/800/63/4/final

Abstract: These guidelines cover the identity proofing, authentication, and federation of users (e.g., employees, contractors, or private individuals) who interact with government information systems over networks. They define technical requirements in each of the areas of identity proofing, enrollment, authe...

Publications IR 8536 (2nd Public Draft)

Supply Chain Traceability: Manufacturing Meta-Framework

July 31, 2025
https://csrc.nist.gov/pubs/ir/8536/2pd

Abstract: Manufacturing and critical infrastructure supply chains are vital to the security, resilience, and economic strength of the United States. However, increasing global complexity makes tracing product origins more difficult, exposing vulnerabilities to logistical disruptions, fraud, sabotage, and coun...

Updates

Secure Software Development, Security, and Operations (DevSecOps) Practices | Draft SP 1800-44A

July 30, 2025
https://csrc.nist.gov/news/2025/draft-sp-1800-44a-available-for-comment

Volume A of NIST Special Publication 1800-44, "Secure Software Development, Security, and Operations (DevSecOps) Practices," is available for comment through September 14, 2025.

Publications SP 1800-44 (Initial Public Draft)

Secure Software Development, Security, and Operations (DevSecOps) Practices

July 30, 2025
https://csrc.nist.gov/pubs/sp/1800/44/ipd

Abstract: Development Operations (DevOps) bring together software development and operations to shorten development cycles, allow organizations to be agile and maintain the pace of innovation while taking advantage of cloud-native technology and practices and the increasing industry use of rapidly evolving ar...

Project Pages

Membership

https://csrc.nist.gov/projects/ispab/members

Steven Lipner, Chairperson Executive Director SAFECode Term Expires 5/30/2026 Dr. Brett Baker Inspector General for the National Archives U.S. National Archives and Records Administration Term Expires 3/14/2026 Resigned as Member 2/18/2025 Anne Dames Distinguished Engineer International Business Machines (IBM) Term Expires 11/24/2028 Michael Duffy Associate Director for Capacity Building CISA Cybersecurity Division, Department of Homeland Security Term Expires 3/13/2028 Giulia Fanti Angel Jordan Associate Professor of Electrical and Computer Engineering Carnegie Mellon...

Updates

Draft SP 800-53 Controls on Secure and Reliable Patches Available for Comment

July 22, 2025
https://csrc.nist.gov/news/2025/sp-800-53-draft-controls-available-for-comment

NIST's draft updates to SP 800-53 providing additional guidance on how to securely and reliably deploy patches and updates in response to Executive Order 14306

Topics

Executive Order 14306

https://csrc.nist.gov/topics/laws-and-regulations/executive-documents/executive-order-14306

Sustaining Select Efforts To Strengthen the Nation's Cybersecurity and Amending Executive Order 13694 and Executive Order 14144 (June 6, 2025)

Updates

Considerations for Achieving Crypto Agility | Second Public Draft Available for Comment

July 18, 2025
https://csrc.nist.gov/news/2025/considerations-for-achieving-crypto-agility-2nd-dr

The second public draft of NIST Cybersecurity White Paper (CSWP) 39, Considerations for Achieving Crypto Agility: Strategies and Practices is available for comment. The public comment period for this second draft is open through August 15, 2025.

Publications CSWP 39 (2nd Public Draft)

Considerations for Achieving Cryptographic Agility: Strategies and Practices

July 17, 2025
https://csrc.nist.gov/pubs/cswp/39/considerations-for-achieving-cryptographic-agility/2pd

Abstract: Cryptographic (crypto) agility refers to the capabilities needed to replace and adapt cryptographic algorithms in protocols, applications, software, hardware, firmware, and infrastructures while preserving security and ongoing operations. This white paper provides an in-depth survey of current appro...

Updates

Reducing the Cybersecurity Risks of Portable Storage Media in OT Environments | Comment on NIST SP 1334

July 15, 2025
https://csrc.nist.gov/news/2025/cyber-risks-of-portable-storage-media-in-ot-enviro

The NCCoE seeks public comments on the initial public draft of SP 1334, "Reducing the Cybersecurity Risks of Portable Storage Media in OT Environments." Comments are due August 14, 2025.

Projects

Combinatorial Testing for AI-Enabled Systems

https://csrc.nist.gov/projects/combinatorial-testing-for-ai-enabled-systems

*NEW* Short course from the Defense and Aerospace Test and Analysis Workshop 2025 (Dataworks 2025) - complete course presentation here. The goal of this project is to provide practitioners and researchers with a foundational understanding of combinatorial testing techniques and applications to testing AI-enabled software systems (AIES). Resources are being developed in these areas: Combinatorial testing (CT), applying CT to test traditional software systems, including real-world examples and case studies. How Test and Evaluation (T&E) of AIES differ from traditional software systems...

<< first   < previous   1     2     3     4     5     6     7     8     9     10     11     12     13     14     15     16     17     18     19     20     21     22     23     24     25  next >  last >>