An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
The initial public draft of NIST Special Publication (SP) 800-233, Service Mesh Proxy Models for Cloud-Native Applications, is now available for public comment
In January 2022, NIST revised Federal Information Processing Standard (FIPS) 201, which establishes standards for the use of Personal Identity Verification (PIV
NIST has released the fourth public draft (4pd) of NIST Special Publication (SP) 800-90C, Recommendation for Random Bit Generator (RBG) Constructions. The NIST
The initial public draft of NIST Internal Report (IR) 8505, A Data Protection Approach for Cloud-Native Applications, is now available for public comment. Cloud
NIST maintains its cryptography standards and guidelines using a periodic review process. Currently, we are reviewing the following publications: NIST Special
NIST Internal Report (IR) 8517, Hardware Security Failure Scenarios: Potential Weaknesses in Hardware Design, is now available for public comment. There is an
NIST held a virtual workshop in September 2023 on Standards and Performance Metrics for On-Road Automated Vehicles, attracting over 600 attendees from industry
This week, NIST released Special Publication 800-229, Fiscal Year (FY) 2023 Cybersecurity and Privacy Annual Report. This publication shares key highlights of
In July 2023, NIST's Crypto Publication Review Board initiated a review of Special Publication (SP) 800-135 Rev. 1, Recommendation for Existing Application
NIST has published the final versions of Special Publication (SP) 800-171r3 (Revision 3), Protecting Controlled Unclassified Information in Nonfederal Systems
Contractors and other organizations that do business with the federal government now have clearer, more straightforward guidance for protecting sensitive data.
NIST has published Internal Report (IR) 8504, Access Control on NoSQL Databases. NoSQL (i.e., “not only SQL” or “non-SQL”) database systems and data stores
NIST has posted an initial public draft of NIST Special Publication (SP) 800-218A, Secure Software Development Practices for Generative AI and Dual-Use
NIST has released the initial public draft of Internal Report (IR) 8475, A Security Perspective on the Web3 Paradigm, for public comment. Since its inception
NIST has released three self-guided online introductory courses on the NIST Special Publication (SP) 800-53 security and privacy control catalog, the SP 800-53A
Incident response is a critical part of cybersecurity risk management and should be integrated across organizational operations. The six Functions of the NIST
The latest Access Control Logic Simulation Tool (ACLST) prototype system and the research report are both available for download from the Access Control Policy
In August 2021, NIST's Crypto Publication Review Board initiated a review process for NIST Special Publication (SP) 800-38D, Recommendation for Block Cipher
On February 28-29, 2024, the NIST Automated Vehicles team , representing multiple NIST laboratories, visited the Virginia Tech Transportation Institute (VTTI)
NIST has published the final version of Internal Report (IR) 8472, Non-Fungible Token Security. Non-fungible token (NFT) technology provides a mechanism to sell
Today, NIST is releasing Special Publication (SP) 800-204D, Strategies for the Integration of Software Supply Chain Security in DevSecOps CI/CD Pipelines
In August 2021, NIST's Crypto Publication Review Board initiated a review process for NIST Special Publication ( SP) 800-38E, Recommendation for Block Cipher
NIST has published Special Publication (SP) 800-223, High-Performance Computing Security: Architecture, Threat Analysis, and Security Posture. Executive Order
NIST seeks to update and improve the guidance in Special Publication (SP) 800-60, Guide for Mapping Types of Information and Information Systems to Security