Skip to main content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Special Publication (NIST SP)

Mobile Device Security: Corporate-Owned Personally-Enabled (COPE)

Author(s)
Gema E. Howell, Kaitlin R. Boeckl, Naomi B. Lefkovitz, Ellen M. Nadeau, Joshua M. Franklin, Behnam Shariati, Jason Ajmo, Christopher J. Brown, Spike E. Dog, Frank Javar, Michael Peck, Kenneth F. Sandlin
Mobile devices provide access to vital workplace resources while giving employees the flexibility to perform their daily activities. Securing these devices is

Report of the 104th National Conference on Weights and Measures

Author(s)
Yvonne A. Branden, Tina G. Butcher, Richard A. Harshman, Lisa Warfield, Gloria D. Lee, John W. Barton
The 104th Annual Meeting of the National Conference on Weights and Measures (NCWM) was held July 14 - 18, 2019, at the Hyatt Regency Milwaukee Hotel, Milwaukee

2019 NIST/ITL Cybersecurity Program Annual Report

Author(s)
Patrick D. O'Reilly, Kristina G. Rigopoulos, Larry Feldman, Gregory A. Witte
During Fiscal Year 2019 (FY 2019), from October 1, 2018 through September 30, 2019, the NIST Information Technology Laboratory (ITL) Cybersecurity and Privacy

Polycyclic Aromatic Hydrocarbon Structure Index

Author(s)
Lane C. Sander, Stephen A. Wise
NIST Special Publication (SP) 922 is an aid in the identification of the chemical structures of polycyclic aromatic hydrocarbons (PAHs). The Structure Index

Zero Trust Architecture

Author(s)
Scott W. Rose, Oliver Borchert, Stuart Mitchell, Sean Connelly
Zero trust (ZT) is the term for an evolving set of cybersecurity paradigms that move defenses from static, network- based perimeters to focus on users, assets

General Access Control Guidance for Cloud Systems

Author(s)
Chung Tong Hu, Michaela Iorga, Wei Bao, Ang Li, Qinghua Li, Antonios Gouglidis
This document presents cloud access control characteristics and a set of general access control guidance for cloud service models: IaaS (Infrastructure as a

Polymer Surface/Interface Consortium 2018 Workshop Report

Author(s)
Ronald S. Lankone, Li Piin Sung, David G. Goodwin, Andrew Fairbrother
The Polymer Surface/Interface (PSI) consortium held a two-day workshop at the National Institute of Standards and Technology (NIST) in Gaithersburg, MD on

Metrological Tools for the Reference Materials and Reference Instruments of the NIST Material Measurement Laboratory

Author(s)
Carlos R. Beauchamp, Johanna Camara, Jennifer Carney, Steven J. Choquette, Kenneth D. Cole, Paul C. DeRose, David L. Duewer, Michael S. Epstein, Margaret C. Kline, Katrice A. Lippa, Enrico Lucon, Karen W. Phinney, Maria Polakoski, Antonio M. Possolo, Katherine E. Sharpless, John R. Sieber, Blaza Toman, Michael R. Winchester, Donald A. Windover
The National Institute of Standards and Technology (NIST), formerly the National Bureau of Standards, was established by the U.S. Congress in 1901 and charged

Guide to IPsec VPNs

Author(s)
Elaine B. Barker, Quynh H. Dang, Sheila E. Frankel, Karen Scarfone, Paul Wouters
Internet Protocol Security (IPsec) is a widely used network layer security control for protecting communications. IPsec is a framework of open standards for

Securing Web Transactions TLS Server Certificate Management

Author(s)
Murugiah P. Souppaya, William A. Haag Jr., Mehwish Akram, William C. Barker, Rob Clatterbuck, Brandon Everhart, Brian Johnson, Alexandros Kapasouris, Dung Lam, Brett Pleasant, Mary Raguso, Susan Symington, Paul Turner, Clint Wilson, Donna F. Dodson
Transport Layer Security (TLS) server certificates are critical to the security of both internet- facing and private web services. Despite the critical

Recommendation for Cryptographic Key Generation

Author(s)
Elaine B. Barker, Allen L. Roginsky, Richard Davis
Cryptography is often used in an information technology security environment to protect data that is sensitive, has a high value, or is vulnerable to

Space Commerce Workshop Report

Author(s)
Michelle S. Stephens, Nicholas Barbosa, Leah R. Kauffman, Rebecca Dorch, Marcus Holzinger
The Department of Commerce (DOC) Boulder Laboratories (consisting of the National Institute for Standards and Technology, the National Oceanic and Atmospheric