An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
NIST has updated its key management guidance in Special Publication (SP) 800-57 Part 1 Revision 5, Recommendation for Key Management: Part 1 – General. This
NIST has updated its key management guidance in S pecial Publication (SP) 800-57 Part 1 Revision 5, Recommendation for Key Management: Part 1 – General. This
U.S. Government concerns about the cybersecurity of electric vehicle supply equipment (EVSE) infrastructure cover a range of issues. What impact would EVSE have
NIST requests comments on the Draft Cybersecurity White Paper, Hardware-Enabled Security for Server Platforms: Enabling a Layered Approach to Platform Security
When known software vulnerabilities are unmanaged, uncorrected, or undetected, attack vectors are left open to exploit the software. As a result, vulnerable
NIST requests comments on Draft Special Publication (SP) 800-210, General Access Control Guidance for Cloud Systems, which presents an initial step toward
Network and data security are essential in today's environment of increasingly open and interconnected systems, networks, and mobile devices. Critical security
NIST requests comments on Draft Special Publication (SP) 800-56C Revision 2 , Recommendation for Key-Derivation Methods in Key-Establishment Schemes, which
NIST requests comments on Draft Special Publication (SP) 800-56C Revision 2 , Recommendation for Key-Derivation Methods in Key-Establishment Schemes, which
NIST Special Publications (SP) 800-140 and -140A through -140F are now available. With the completion of these documents, the Cryptographic Module Validation
As millions of Americans transition from an office environment to their homes to continue to work, maintaining cybersecurity while teleworking is imperative
There is an urgent need to strengthen the trustworthiness and resilience of the information systems, component products, and services that we depend on in every
After your organization forms a general plan for tackling its cybersecurity and privacy risk management issues, it needs particular state-of-the-art tools to
NIST requests comments on Draft NISTIR 8272, Impact Analysis Tool for Interdependent Cyber Supply Chain Risks, which describes a prototype tool developed to
NIST requests your comments on Draft SP 800-133 Revision 2, Recommendation for Cryptographic Key Generation , which discusses the generation of the keys to be
NIST Special Publication 800-171, Revision 2, Protecting Controlled Unclassified Information (CUI) in Nonfederal Systems and Organizations, has been approved as
The number of Common Vulnerabilities and Exposures identifiers (CVE IDs) created year over year has rapidly increased, and this trend is expected to continue
NIST requests feedback on Draft NISTIR 8276, Key Practices in Cyber Supply Chain Risk Management: Observations from industry. This publication is based on an
Since NIST Special Publication (SP) 800-161, Supply Chain Risk Management Practices for Federal Information Systems and Organizations, was published in 2015
Reducing the cybersecurity risk to one of the most vulnerable aspects of commerce — global supply chains — is the goal of a new publication by the National
As microservices-based applications are increasingly adopted within large enterprises and cloud-based environments, there is a need for a dedicated, scalable
Traditional identity management has typically involved the storing of user credentials (e.g., passwords) by organizations and third parties, which often results
Federal agencies, under the Federal Information Security Modernization Act of 2014 (FISMA) and Office of Management and Budget (OMB) circulars and memoranda
NIST invites comments on Draft NIST Special Publication (SP) 800-208, Recommendation for Stateful Hash-Based Signature Schemes. All of the digital signature
The United States continues to have complete dependence on information technology deployed in critical systems and applications in both the public and private