Use this form to search content on CSRC pages.
NIST Announces the Final Release of Special Publication (SP) 800-190, Application Container Security Guide
NIST Releases the Second Draft of Special Publication 800-125A, Security Recommendations for Hypervisor Deployment, for public comment.
NIST Releases Draft Special Publication 800-56A Revision 3, Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography, for public comment.
NIST Announces the release of Draft Special Publication 800-56C Revision 1, Recommendation for Key Derivation through Extraction-then-Expansion for public comment.
NIST requests public comments on the release of Draft Special Publication (SP) 800-70 Revision 4, National Checklist Program for IT Products: Guidelines for Checklist Users and Developers.
NIST Releases Special Publication 800-192, Verification and Test Methods for Access Control Policies/Models
NIST Releases Special Publication 800-12 Revision 1, An Introduction to Information Security
NIST Special Publication 800-63-3, Digital Identity Guidelines is now final
SP 800-121 Rev. 2 has been approved as final & is now available.
NIST announces the public comment release of Draft Special Publication (SP) 800-190, Application Container Security Guide.
What is the current status of release of Draft Special Publication 800-53 Revision 5? This news item will explain the current status of this document.
NCCoE Released Draft Special Publication 1800-7, Situational Awareness for Electric Utilities for public comment.
Special Publication 800-179 aims to assist IT professionals in securing Apple OS X 10.10 desktop and laptop systems within various environments. It provides detailed information about the security features of OS X 10.10...
NIST invites comments on Draft NIST SP 800-187, Guide to LTE Security. Cellular technology plays an increasingly large role in society as it has become the primary portal to the Internet for a large segment of the population. One of the main drivers making this change possible is the deployment ...
NIST announces the release of Draft Special Publication 800-121 Revision 2 Guide to Bluetooth Security. This draft is the second revision to NIST SP 800-121, Guide to Bluetooth Security. Updates in this revision include an introduction to and discussion ...
Special Publication 800-53 Revision 5 Status Update
Special Publication 800-178, A Comparison of ABAC Standards for Data Service Applications: XACML and NGAC and Special Publication 800-150, Guide to Cyber Threat Information Sharing ...
NIST Requests Comments on a Draft Special Publication regarding the De-Identification of Government Datasets
Draft Special Publication 800-171, Revision 1, represents a limited update to the original publication released in June 2015. In particular, this update includes...
The new SP 800-73-4-based Test Runner has been released
NIST announces the release of Special Publication (SP) 800-183, Networks of ‘Things’. SP 800-183 offers an underlying and foundational understanding of the Internet of Things (IoT) based on the realization that IoT involves sensing, computing, communication,...
NIST invites comments on two draft publications on the Security Content Automation Protocol (SCAP). The first is Special Publication 800-126 Revision 3, The Technical Specification for the Security Content Automation Protocol (SCAP): ...
NIST invites comments on Draft Special Publication 800-179, Guide to Securing Apple OS X 10.10 Systems for IT Professionals: A NIST Security Configuration Checklist. This publication assists IT professionals in securing Apple OS X 10.10...
NIST announces the release of Special Publication (SP) 800-166, Derived PIV Application and Data Model Test Guidelines. SP 800-166 contains the derived test requirements and test assertions for testing the Derived PIV Application and associated...
NIST is proud to announce the release of Draft Special Publication 800-184, Guide for Cybersecurity Event Recovery. The purpose of this document is to support federal agencies in a technology-neutral way in improving their cyber event recovery plans, processes, and procedures...