Guide: Identification and Authentication Family
Identification and Authentication
NIST FIPS 201-1 | Personal Identity Verification for Federal Employees and Contractors |
---|---|
NIST FIPS 200 | Security Controls for Federal Information Systems |
NIST FIPS 190 | Guideline for the Use of Advanced Authentication Technology Alternatives |
NIST FIPS 140-2 | Security Requirements for Cryptographic Modules |
NIST SP 800-100 | Information Security Handbook for Managers |
NIST SP 800-97 | Guide to IEEE 802.11i: Robust Security Networks |
NIST SP 800-96 | PIV Card / Reader Interoperability Guidelines |
NIST SP 800-87 | Codes for the Identification of Federal and Federally Assisted Organizations |
NIST SP 800-86 | Guide to Integrating Forensic Techniques into Incident Response |
NIST SP 800-81 | Secure Domain Name System (DNS) Deployment Guide |
NIST SP 800-78 | Cryptographic Algorithms and Key Sizes for Personal Identity Verification |
NIST SP 800-77 | Guide to IPSec VPNs |
NIST SP 800-76 | Biometric Data Specification for Personal Identity Verification |
NIST SP 800-73 Rev 1 | Integrated Circuit Card for Personal Identification Verification |
NIST SP 800-72 | Guidelines on PDA Forensics |
NIST SP 800-68 | Guidance for Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist |
NIST SP 800-66 | An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule |
NIST SP 800-63 | Recommendation for Electronic Authentication |
NIST SP 800-52 | Guidelines on the Selection and Use of Transport Layer Security |
NIST SP 800-48 | Wireless Network Security: 802.11, Bluetooth, and Handheld Devices |
NIST SP 800-46 | Security for Telecommuting and Broadband Communications |
NIST SP 800-45 | Guidelines on Electronic Mail Security |
NIST SP 800-44 | Guidelines on Securing Public Web Servers |
NIST SP 800-36 | Guide to Selecting Information Technology Security Products |
NIST SP 800-32 | Introduction to Public Key Technology and the Federal PKI Infrastructure |
NIST SP 800-25 | Federal Agency Use of Public Key Technology for Digital Signatures and Authentication |
NIST SP 800-24 | PBX Vulnerability Analysis: Finding Holes in Your PBX Before Someone Else Does |
NIST SP 800-14 | Generally Accepted Principles and Practices for Securing Information Technology Systems |
NIST SP 800-12 | An Introduction to Computer Security: The NIST Handbook |
Original source for tables: Guide to NIST Security Documents.