Guide: Identification and Authentication Family

From FISMApedia
Jump to: navigation, search

Identification and Authentication



NIST FIPS 201-1 Personal Identity Verification for Federal Employees and Contractors
NIST FIPS 200 Security Controls for Federal Information Systems
NIST FIPS 190 Guideline for the Use of Advanced Authentication Technology Alternatives
NIST FIPS 140-2 Security Requirements for Cryptographic Modules
NIST SP 800-100 Information Security Handbook for Managers
NIST SP 800-97 Guide to IEEE 802.11i: Robust Security Networks
NIST SP 800-96 PIV Card / Reader Interoperability Guidelines
NIST SP 800-87 Codes for the Identification of Federal and Federally Assisted Organizations
NIST SP 800-86 Guide to Integrating Forensic Techniques into Incident Response
NIST SP 800-81 Secure Domain Name System (DNS) Deployment Guide
NIST SP 800-78 Cryptographic Algorithms and Key Sizes for Personal Identity Verification
NIST SP 800-77 Guide to IPSec VPNs
NIST SP 800-76 Biometric Data Specification for Personal Identity Verification
NIST SP 800-73 Rev 1 Integrated Circuit Card for Personal Identification Verification
NIST SP 800-72 Guidelines on PDA Forensics
NIST SP 800-68 Guidance for Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist
NIST SP 800-66 An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
NIST SP 800-63 Recommendation for Electronic Authentication
NIST SP 800-52 Guidelines on the Selection and Use of Transport Layer Security
NIST SP 800-48 Wireless Network Security: 802.11, Bluetooth, and Handheld Devices
NIST SP 800-46 Security for Telecommuting and Broadband Communications
NIST SP 800-45 Guidelines on Electronic Mail Security
NIST SP 800-44 Guidelines on Securing Public Web Servers
NIST SP 800-36 Guide to Selecting Information Technology Security Products
NIST SP 800-32 Introduction to Public Key Technology and the Federal PKI Infrastructure
NIST SP 800-25 Federal Agency Use of Public Key Technology for Digital Signatures and Authentication
NIST SP 800-24 PBX Vulnerability Analysis: Finding Holes in Your PBX Before Someone Else Does
NIST SP 800-14 Generally Accepted Principles and Practices for Securing Information Technology Systems
NIST SP 800-12 An Introduction to Computer Security: The NIST Handbook


Original source for tables: Guide to NIST Security Documents.