Guide: System and Communication Protection Family

From FISMApedia
Jump to: navigation, search

System and Communication Protection



NIST FIPS 201-1 Personal Identity Verification for Federal Employees and Contractors
NIST FIPS 200 Security Controls for Federal Information Systems
NIST FIPS 198 The Keyed-Hash Message Authentication Code (HMAC)
NIST FIPS 197 Advanced Encryption Standard
NIST FIPS 190 Guideline for the Use of Advanced Authentication Technology Alternatives
NIST FIPS 186-3 Digital Signature Standard (DSS)
NIST FIPS 180-2 Secure Hash Standard (SHS)
NIST FIPS 140-2 Security Requirements for Cryptographic Modules
NIST SP 800-100 Information Security Handbook for Managers
NIST SP 800-97 Guide to IEEE 802.11i: Robust Security Networks
NIST SP 800-90 Recommendation for Random Number Generation Using Deterministic Random Bit Generators
NIST SP 800-89 Recommendation for Obtaining Assurances for Digital Signature Applications
NIST SP 800-83 Guide to Malware Incident Prevention and Handling
NIST SP 800-81 Secure Domain Name System (DNS) Deployment Guide
NIST SP 800-78 Cryptographic Algorithms and Key Sizes for Personal Identity Verification
NIST SP 800-77 Guide to IPSec VPNs
NIST SP 800-73 Rev 1 Integrated Circuit Card for Personal Identification Verification
NIST SP 800-70 Security Configuration Checklists Program for IT Products
NIST SP 800-68 Guidance for Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist
NIST SP 800-67 Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher
NIST SP 800-66 An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
NIST SP 800-58 Security Considerations for Voice Over IP Systems
NIST SP 800-57 Recommendation on Key Management
NIST SP 800-56A Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography
NIST SP 800-52 Guidelines on the Selection and Use of Transport Layer Security
NIST SP 800-49 Federal S/MIME V3 Client Profile
NIST SP 800-46 Security for Telecommuting and Broadband Communications
NIST SP 800-45 Guidelines on Electronic Mail Security
NIST SP 800-44 Guidelines on Securing Public Web Servers
NIST SP 800-41 Guidelines on Firewalls and Firewall Policy
NIST SP 800-38D Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) for Confidentiality and Authentication
NIST SP 800-38C Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality
NIST SP 800-38B Recommendation for Block Cipher Modes of Operation: The RMAC Authentication Mode
NIST SP 800-38A Recommendation for Block Cipher Modes of Operation - Methods and Techniques
NIST SP 800-36 Guide to Selecting Information Technology Security Products
NIST SP 800-32 Introduction to Public Key Technology and the Federal PKI Infrastructure
NIST SP 800-29 A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2
NIST SP 800-28 Guidelines on Active Content and Mobile Code
NIST SP 800-25 Federal Agency Use of Public Key Technology for Digital Signatures and Authentication
NIST SP 800-22 A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
NIST SP 800-21 Rev 1 Guideline for Implementing Cryptography in the Federal Government
NIST SP 800-20 Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS): Requirements and Procedures
NIST SP 800-19 Mobile Agent Security
NIST SP 800-17 Modes of Operation Validation System (MOVS): Requirements and Procedures
NIST SP 800-15 Minimum Interoperability Specification for PKI Components (MISPC), Version 1
NIST SP 800-14 Generally Accepted Principles and Practices for Securing Information Technology Systems
NIST SP 800-12 An Introduction to Computer Security: The NIST Handbook


Original source for tables: Guide to NIST Security Documents.