Guide: Certification, Accreditation and Security Assessments Family
Certification, Accreditation and Security Assessments
NIST FIPS 200 | Security Controls for Federal Information Systems |
---|---|
NIST SP 800-100 | Information Security Handbook for Managers |
NIST SP 800-85 | PIV Middleware and PIV Card Application Conformance Test Guidelines |
NIST SP 800-79 | Guidelines for the Certification and Accreditation of PIV Card Issuing Organizations |
NIST SP 800-76 | Biometric Data Specification for Personal Identity Verification |
NIST SP 800-66 | An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule |
NIST SP 800-65 | Integrating Security into the Capital Planning and Investment Control Process |
NIST SP 800-55 | Security Metrics Guide for Information Technology Systems |
NIST SP 800-53A | Guide for Assessing the Security Controls in Federal Information Systems |
NIST SP 800-47 | Security Guide for Interconnecting Information Technology Systems |
NIST SP 800-42 | Guideline on Network Security Testing |
NIST SP 800-37 | Guidelines for the Security Certification and Accreditation of Federal Information Technology Systems |
NIST SP 800-36 | Guide to Selecting Information Technology Security Products |
NIST SP 800-35 | Guide to Information Technology Security Services |
NIST SP 800-30 | Risk Management Guide for Information Technology Systems |
NIST SP 800-26 | Security Self-Assessment Guide for Information Technology Systems |
NIST SP 800-23 | Guideline to Federal Organizations on Security Assurance and Acquisition/Use of Tested/Evaluated Products |
NIST SP 800-22 | A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications |
NIST SP 800-20 | Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS): Requirements and Procedures |
NIST SP 800-18 | Guide for Developing Security Plans for Information Technology Systems |
NIST SP 800-17 | Modes of Operation Validation System (MOVS): Requirements and Procedures |
NIST SP 800-14 | Generally Accepted Principles and Practices for Securing Information Technology Systems |
NIST SP 800-12 | An Introduction to Computer Security: The NIST Handbook |
Original source for tables: Guide to NIST Security Documents.