An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Microservices architecture is increasingly being used to design, develop, and deploy large-scale application systems in both cloud-based and enterprise...
Many U.S. Government information technology systems rely on strong cryptographic schemes to protect the integrity and confidentiality of the data they process...
NIST has long provided cryptographic key management guidance to encourage appropriate key management procedures, use algorithms that adequately protect...
Cryptography is often used in information technology security environments to protect sensitive, high-value data that might be compromised during transmission...
NIST announces the publication of NIST Internal Report (NISTIR) 8214, Threshold Schemes for Cryptographic Primitives. This publication provides a high-level...
Summary
NIST requests public comments on Draft Special Publication 800-38G Revision 1, Recommendation for Block Cipher Modes of Operation: Methods for Format...
The past forty years have seen both the worldwide adoption of email and the simultaneous rise of Internet-based crimes and threats. While the Internet’s...
NIST Special Publication 800-162, Guide to Attribute Based Access Control (ABAC) Definition and Considerations, has been updated with minor editorial changes...
Attribute-based access control systems rely upon enterprise-specific attributes to both define access control policy rules and enforce the access control...
The field has narrowed in the race to protect sensitive electronic information from the threat of quantum computers, which one day could render many of our...
After over a year of evaluation, NIST would like to announce the candidates that will be moving on to the 2nd round of the NIST PQC Standardization Process....
Today, NIST is publishing NIST Special Publication (SP) 800-37 Revision 2 , Risk Management Framework for Information Systems and Organizations: A System Life...
In recent years, numerous routing control plane anomalies such as Border Gateway Protocol (BGP), prefix hijacking, and route leaks have resulted in Denial of...
NIST has published NIST Interagency Report (NISTIR) 8011 Volume 3, Automation Support for Security Control Assessments: Software Asset Management.
This...
The Interagency International Cybersecurity Standardization Working Group (IICS WG), through its Internet of Things (IoT) Task Group, developed NIST Interagency...
The National Cybersecurity Center of Excellence (NCCoE) has released preliminary drafts for Volume A (Executive Summary) and Volume B ( Approach, Architecture...
NIST invites public comments on a second draft of Special Publication (SP) 800-57 Part 2 Rev. 1, Recommendation for Key Management Part 2: Best Practices for...
NIST invites public comments on this second draft of Special Publication (SP) 800-57 Part 2 Rev. 1, Recommendation for Key Management Part 2: Best Practices for...
NIST has released a preliminary draft of NIST Special Publication (SP) 1800-19B, Trusted Cloud: Security Practice Guide for VMWare Hybrid Cloud Infrastructure...
Comment Period Extended: Comments on Draft NISTIR 7298 Rev. 3 and the Online Glossary are now due by December 21, 2018 (the original due date was Nov. 30)...
NIST invites comments on Draft Special Publication (SP) 800-179 Revision 1, Guide to Securing macOS 10.12 Systems for IT Professionals: A NIST Security...
In today’s computing environment, the security of all computing resources, from network infrastructure devices to users’ desktop and laptop computers, is...
Pursuant to the Federal Advisory Committee Act, as amended, 5 U.S.C. App., notice is hereby given that the ISPAB will meet Thursday, November 01, 2018, from 9...