Guide: Planning Topic Cluster
Planning
A collection of documents dealing with security plans and for identifying, documenting, and preparing security for systems.
NIST FIPS 200 | Security Controls for Federal Information Systems |
---|---|
NIST FIPS 199 | Standards for Security Categorization of Federal Information and Information Systems |
NIST FIPS 191 | Guideline for The Analysis of Local Area Network Security |
NIST FIPS 188 | Standard Security Labels for Information Transfer |
NIST FIPS 140-2 | Security Requirements for Cryptographic Modules |
NIST SP 800-81 | Secure Domain Name System (DNS) Deployment Guide |
NIST SP 800-57 | Recommendation on Key Management |
NIST SP 800-55 | Security Metrics Guide for Information Technology Systems |
NIST SP 800-53 | Security Controls for Federal Information Systems |
NIST SP 800-47 | Security Guide for Interconnecting Information Technology Systems |
NIST SP 800-44 | Guidelines on Securing Public Web Servers |
NIST SP 800-43 | Systems Administration Guidance for Securing Microsoft Windows 2000 Professional System |
NIST SP 800-41 | Guidelines on Firewalls and Firewall Policy |
SP 800-40, Ver 2 | Creating a Patch and Vulnerability Management Program |
NIST SP 800-37 | Guidelines for the Security Certification and Accreditation of Federal Information Technology Systems |
NIST SP 800-36 | Guide to Selecting Information Technology Security Products |
NIST SP 800-35 | Guide to Information Technology Security Services |
NIST SP 800-33 | Underlying Technical Models for Information Technology Security |
NIST SP 800-32 | Introduction to Public Key Technology and the Federal PKI Infrastructure |
NIST SP 800-31 | Intrusion Detection Systems (IDSs) |
NIST SP 800-30 | Risk Management Guide for Information Technology Systems |
NIST SP 800-27 | Engineering Principles for Information Technology Security (A Baseline for Achieving Security) |
NIST SP 800-25 | Federal Agency Use of Public Key Technology for Digital Signatures and Authentication |
NIST SP 800-21 Rev 1 | Guideline for Implementing Cryptography in the Federal Government |
NIST SP 800-19 | Mobile Agent Security |
NIST SP 800-18 | Guide for Developing Security Plans for Information Technology Systems |
NIST IR 7316 | Assessment of Access Control Systems |
NIST IR 7284 | Personal Identity Verification Card Management Report |
NIST IR 6985 | COTS Security Protection Profile - Operating Systems (CSPP-OS) (Worked Example Applying Guidance of NISTIR-6462, CSPP) |
NIST IR 6981 | Policy Expression and Enforcement for Handheld Devices |
NIST IR 6887 | Government Smart Card Interoperability Specification (GSC-IS), v2.1 |
NIST IR 6462 | CSPP - Guidance for COTS Security Protection Profiles |
NIST SB 2005-12 | Preventing and Handling Malware Incidents: How To Protect Information Technology Systems From Malicious Code and Software |
NIST SB 2006-03 | Minimum Security Requirements For Federal Information and Information Systems: Federal Information Processing Standard (FIPS) 200 Approved By The Secretary Of Commerce |
NIST SB 2006-02 | Creating A Program To Manage Security Patches and Vulnerabilities: NIST Recommendations For Improving System Security |
NIST SB 2006-01 | Testing and Validation Of Personal Identity Verification (PIV) Components and Subsystems For Conformance To Federal Information Processing Standard 201 |
NIST SB 2005-11 | Securing Microsoft Windows XP Systems: NIST Recommendations For Using A Security Configuration Checklist |
NIST SB 2005-08 | Implementation Of FIPS 201, Personal Identity Verification (PIV) Of Federal Employees and Contractors |
NIST SB 2005-07 | Protecting Sensitive Information That Is Transmitted Across Networks: NIST Guidance For Selecting and Using Transport Layer Security Implementations |
NIST SB 2005-06 | NIST's Security Configuration Checklists Program For IT Products |
NIST SB 2005-05 | Recommended Security Controls For Federal Information Systems: Guidance For Selecting Cost-Effective Controls Using A Risk-Based Process |
NIST SB 2005-01 | Integrating It Security Into The Capital Planning and Investment Control Process |
NIST SB 2004-11 | Understanding the New NIST Standards and Guidelines Required by FISMA: How Three Mandated Documents are Changing the Dynamic of Information Security for the Federal Government |
NIST SB 2004-07 | Guide For Mapping Types Of Information and Information Systems To Security Categories |
NIST SB 2004-05 | Guide For The Security Certification and Accreditation Of Federal Information Systems |
NIST SB 2004-03 | Federal Information Processing Standard (FIPS) 199, Standards For Security Categorization Of Federal Information and Information Systems |
NIST SB 2003-02 | Secure Interconnections for Information Technology Systems |
NIST SB 2002-12 | Security of Public Web Servers |
NIST SB 2002-07 | Overview: The Government Smart Card Interoperability Specification |
NIST SB 2002-02 | Risk Management Guidance For Information Technology Systems |
NIST SB 2002-01 | Guidelines on Firewalls and Firewall Policy |
NIST SB 2000-02 | Guideline for Implementing Cryptography in the Federal Government |
NIST SB 1999-04 | Guide for Developing Security Plans for Information Technology Systems |
Original source for tables: Guide to NIST Security Documents.