Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NIST Issues Four-Pack of Computer Security Pubs

The National Institute of Standards and Technology recently issued four publications to provide computer security advice on issues ranging from securing Windows XP Home Edition® computers and exercising IT plans to guidance on access control policies, models and mechanisms, and security log management.

  • Guidance for Securing Microsoft Windows XP Home Edition: A NIST Security Configuration Checklist (http://csrc.nist.gov/itsec/guidance_WinXP_Home.html) provides advice on securing Windows XP Home Edition computers for home users, in particular telecommuting Federal employees. It explains the need to use a combination of security protections and provides instructions on how to implement the most essential security protections. 
  • Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities (http://csrc.nist.gov/publications/nistpubs/800-84/SP800-84.pdf) provides guidance on conducting tests, training sessions, and exercises to maintain contingency and computer security incident response plans for managing adverse IT situations.
  • Assessment of Access Control Systems (http://csrc.nist.gov/publications/nistir/7316/NISTIR-7316.pdf) provides background information on access control policies, models, and mechanisms to help organizations secure their computer applications.
  • Guide to Computer Security Log Management (http://csrc.nist.gov/publications/nistpubs/800-92/SP800-92.pdf) provides detailed information on developing, implementing, and maintaining effective log management practices throughout an enterprise.
Released October 12, 2006, Updated February 3, 2025
Was this page helpful?