An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Internet Protocol Security (IPsec) is a network layer security control used to protect communications over public networks, encrypt IP traffic between hosts...
It is difficult to overstate the importance of the internet to modern business and to society in general. The internet is essential to the exchange of all...
Summary
The National Cybersecurity Center of Excellence (NCCoE) is announcing the release of two new data confidentiality draft project descriptions. We are...
NIST is pleased to announce the first official release of the Open Security Controls Assessment Language ( OSCAL), Version 1.0.0 - Milestone 1. The release...
Summary
NIST is seeking comments on Draft NIST Special Publication (SP) 800-171 Revision 2, Protecting Controlled Unclassified Information in Nonfederal...
Attribute-based access control systems rely upon enterprise-specific attributes to both define access control policy rules and enforce the access control...
The National Cybersecurity Center of Excellence (NCCoE) has posted two draft Project Descriptions for public comment:
Detecting and Protecting Against Data...
NIST is releasing a Draft NIST Cybersecurity White Paper for public comment, Mitigating the Risk of Software Vulnerabilities by Adopting a Secure Software...
NIST is releasing a Draft NIST Cybersecurity White Paper for public comment, Mitigating the Risk of Software Vulnerabilities by Adopting a Secure Software...
Hardware/Server Virtualization is a foundational technology in a cloud computing environment and the hypervisor is the key software in that virtualized...
NIST Special Publication (SP) 800-64 Revision 2, Security Considerations in the System Development Life Cycle (October 2008), has been withdrawn. It includes...
The National Cybersecurity Center of Excellence (NCCoE) at NIST is seeking comments on a revised draft of the practice guide NIST SP 1800-13, Mobile Application...
A draft implementation guide ( NISTIR 8183A) for the Cybersecurity Framework (CSF) Manufacturing Profile Low Security Level has been developed for managing...
Cryptographic mechanisms are often used to protect the integrity, authenticity, and confidentiality of sensitive and high value data that is vulnerable to...
A draft white paper is now available for comment, An Application of Combinatorial Methods for Explainability in Artificial Intelligence and Machine Learning....
The latest version of the Access Control Policy Tool (ACPT) from NIST is now available for download.
This version includes capabilities for assigning...
On March 22, 2019, the Secretary of Commerce approved Federal Information Processing Standard (FIPS) 140-3, Security Requirements for Cryptographic Modules....
Electronic device manufacturers should find it less time-consuming to bring their wares to both the U.S. and international markets as a result of new...
The National Cybersecurity Center of Excellence (NCCoE) has released a preliminary draft practice guide, SP 1800-15, Securing Small-Business and Home Internet...
We entrust our lives to software every time we step aboard a high-tech aircraft or modern car. A long-term research effort guided by two researchers at the...
NIST Special Publication (SP) 800-163 Revision 1, Vetting the Security of Mobile Applications, is an important update to NIST guidance on mobile application...
NIST has completed the initial check of all algorithm submission packages received in response to the August 27, 2018 Request for Nominations for Lightweight...
Cybersecurity and usability must coexist. Systems that prioritize usability over a strong security posture may fall prey to increasingly sophisticated cyber...