An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
The National Institute of Standards and Technology (NIST) has released a new draft document, NIST Special Publication (SP) 800-218, Secure Software Development
Draft NIST Special Publication (SP) 800-204C, " Implementation of DevSecOps for a Microservices-based Application with Service Mesh ", is now available for
We’ve heard your feedback about improving the usability of our most downloaded NIST publication, Special Publication (SP) 800-53! We have now made it available
Access control policy verification ensures that there are no faults within the policy that leak or block access privileges. As a software test, access control
In May 2021, NIST's Crypto Publication Review Board initiated a review process for the following publications: NIST Special Publication (SP) 800-15, Minimum
The NIST Information Services Office, also known as the NIST Research Library, manages publication of the NIST Technical Series publications. The Information
The NIST Special Publication (SP) 800-140x series supports Federal Information Processing Standards (FIPS) Publication 140-3, Security Requirements for
NIST is in the process of a periodic review and maintenance of its cryptography standards and guidelines. Currently, we are reviewing the following publications
Cloud-native applications now consist of loosely coupled components (microservices), with all application services (e.g., authentication, authorization, load
Cyber attacks are a reality. Sometimes even with the best protective measures in place, adversaries can breach perimeter defenses and find their way into
In May 2021, NIST initiated a review of several publications, including the following NIST Special Publications (SP): SP 800 15, MISPC Minimum Interoperability
Control assessments are not about checklists, simple pass/fail results, or generating paperwork to pass inspections or audits. The testing and evaluation of
NIST announces the release of NISTIR 8319, Review of the Advanced Encryption Standard. This publication provides a technical and editorial review of FIPS 197
NIST announces the publication of NIST Internal Report (NISTIR) 8369, Status Report on the Second Round of the NIST Lightweight Cryptography Standardization
Organizations have mission and business-based needs to exchange or share information with one or more internal or external organizations via various information
Space operations are vital to advancing the security, economic prosperity, and scientific knowledge of the Nation. However, cyber-related threats to space
A draft NIST Cybersecurity White Paper, Combinatorial Coverage Difference Measurement, is now available for public comment. Structural coverage criteria are
NIST is pleased to announce the release of Open Security Controls Assessment Language (OSCAL) 1.0.0. This is the first, official, major release of OSCAL and
Not all security vulnerabilities can be found through automated processes or testing. Internal and external reporting of security vulnerabilities in software
More than ever, organizations are concerned about the risks associated with products and services that may contain potentially malicious functionality, are
NIST is in the process of a periodic review and maintenance of its cryptography standards and NIST Special Publications. A description of the review process is
More than ever, organizations are concerned about the risks associated with products and services that may contain potentially malicious functionality, are
The protection of controlled unclassified information (CUI) in nonfederal systems and organizations—especially CUI associated with a critical program or high
Digital twin technology is an emerging area of research and standardization. Because of this, there may be a lack of clarity as to what is new with digital
Information security continuous monitoring (ISCM) programs provide an understanding of risk tolerance and help officials set priorities and consistently manage