An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
A total of 432 registered participants from 11 countries contributed to a successful first-ever international symposium devoted exclusively to the topic of...
Jeanita Pritchett, Katrice A. Lippa, Mary Bedner, Carolyn Q. Burdette, Johanna Camara, Brian E. Lang, Michael A. Nelson, Lane C. Sander, Lorna T. Sniegoski
The one week NIST-SIM chemical metrology training opportunity was designed to provide SIM NMI/DI laboratory personnel with in-depth classroom and hands-on...
Michael Bartock, Jeffrey Cichonski, Murugiah Souppaya, Matthew C. Smith, Gregory Witte, Karen Scarfone
In light of an increasing number of cybersecurity events, organizations can improve resilience by ensuring that their risk management processes include...
This Recommendation specifies four types of SHA-3-derived functions: cSHAKE, KMAC, TupleHash, and ParallelHash, each defined for a 128- and 256-bit security...
A major aspect of characterizing the built environment is identifying key infrastructure dependencies that may exist. Some of these dependencies are obvious...
Stephen D. Quinn, Murugiah P. Souppaya, Melanie R. Cook, Karen Scarfone
A security configuration checklist is a document that contains instructions or procedures for configuring an information technology (IT) product to an...
Mark L. Badger, Murugiah Souppaya, Mark R. Trapnell, Eric R. Trapnell, Dylan J. Yaga, Karen Scarfone
This publication assists IT professionals in securing Apple OS X 10.10 desktop and laptop systems within various environments. It provides detailed information...
[Superseded by NIST SP 800-160 (November 2016, including updates as of 01-03-2016)] With the continuing frequency, intensity, and adverse consequences of cyber...
The National Institute of Standards and Technology (NIST) workshop on Software Measures and Metrics to Reduce Security Vulnerabilities (SwMM-RSV) was held on...
The workshop occurred on 12 July 2016 at National Institute of Standards and Technology (NIST). The workshop's object was software as a product. 20 position...
This report of analysis documents procedures used to obtain certified values and associated uncertainties of the density of iso-octane SRM 2214 over an extended...
This Recommendation specifies a message authentication code (MAC) algorithm based on a symmetric key block cipher. This block cipher-based MAC algorithm, called...
Homeowners and builders have increasingly strived to build low energy homes. As building materials, equipment, and methods have improved and renewable energy...
Christopher S. Johnson, Mark L. Badger, David A. Waltermire, Julie Snyder, Clem Skorupka
Cyber threat information is any information that can help an organization identify, assess, monitor, and respond to cyber threats. Cyber threat information...
David F. Ferraiolo, Ramaswamy Chandramouli, Chung Tong Hu, David R. Kuhn
Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC) are very different attribute based access control (ABAC) standards...
Once a community identifies its resilience gaps, the challenge shifts to identifying solutions to close those gaps. One of the most helpful actions is to...
This Guide Brief provides an example of how to determine the anticipated performance of water and wastewater systems subjected to an earthquake and tsunami...
This Guide Brief provides guidance for determining the anticipated performance of building clusters and infrastructure systems when subjected to hazard events...
This Guide Brief provides additional rationale and guidance regarding the first part of Step 2 in the Guide, Characterize social functions and dependencies...
This Guide Brief provides additional rationale and guidance regarding Step 2 in the GuideUnderstand the Situation for how to Identify Social Institutions...
Ramaswamy Chandramouli, Simson L. Garfinkel, J. S. Nightingale, Scott W. Rose
This document gives recommendations and guidelines for enhancing trust in email. The primary audience includes enterprise email administrators, information...
This document is part of a series intended to provide guidance to the Federal Government for using cryptography and NIST's cryptographic standards to protect...
This document is intended to provide guidance to the Federal Government for using cryptography and NIST's cryptographic standards to protect sensitive, but...
Amanda J. Moors, Rebecca S. Pugh, Jody R. Evans, Jennifer M. Ness, Debra L. Ellisor, Melannie J. Bachman
The NIST Reference Materials Production (RMP) Facility at the Hollings Marine Laboratory produces fresh, frozen powder materials which are used as Standard...
The document describes the procedure by which fingerprint image downsampling procedures will be evaluated with respect to conformance to the NIST guidance for...