An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Hsiao-Ming M. Koo, Romain Gaucher, Charline Cleraux, Jenise Reyes Rodriguez
This document provides a set of metrics, including test suites and methods, to determine how well a particular source code security analysis tool conforms to...
Kelley L. Dempsey, L A. Johnson, Matthew A. Scholl, Kevin M. Stine, Alicia Clay Jones, Angela Orebaugh, Nirali S. Chawla, Ronald Johnston
The purpose of this guideline is to assist organizations in the development of a continuous monitoring strategy and the implementation of a continuous...
David A. Waltermire, Stephen D. Quinn, Adam M. Halbardier, Karen Scarfone
This document provides the definitive technical specification for version 1.2 of the Security Content Automation Protocol (SCAP). SCAP consists of a suite of...
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks...
An international workshop was held within the Fire Research Division at NISTs Engineering Laboratory on June 27th, 2011. The workshop was entitled Urban and...
Fang Liu, Jin Tong, Jian Mao, Robert B. Bohn, John V. Messina, Mark L. Badger, Dawn M. Leaf
The adoption of cloud computing into the Federal Government and its implementation depend upon a variety of technical and non-technical factors. A fundamental...
Janet M. Cassard, Jon C. Geist, Theodore V. Vorburger, David T. Read, David G. Seiler
The Microelectromechanical Systems (MEMS) 5-in-1 is a standard reference device sold as a NIST Standard Reference Material (SRM) that contains MEMS test...
Samuel L. Manzello, Sayaka S. Suzuki, Keisuke Himoto
An international workshop was held within the Fire Research Division at NISTs Engineering Laboratory on June 27th, 2011. The workshop was entitled Urban and...
L A. Johnson, Kelley L. Dempsey, Ronald S. Ross, Sarbari Gupta, Dennis Bailey
The purpose of Special Publication 800-128, Guide for Security-Focused Configuration Management of Information Systems, is to provide guidelines for...
Michael D. Hogan, Fang Liu, Annie W. Sokol, Tong Jin
The NIST Cloud Computing Standards Roadmap Working Group has surveyed the existing standards landscape for security, portability, and interoperability standards...
Robert R. Zarr, Amanda C. Harris, John F. Roller, Stefan D. Leigh
Thermal conductivity measurements at and near room temperature are presented as the basis for certified values of thermal conductivity for SRM 1450d, Fibrous...
The purpose of this workshop was to identify performance needs and establish research priorities to address the thermal characteristics of respiratory equipment...
Linda D. Crown, Tina G. Butcher, Steven E. Cook, Lisa Warfield, David A. Sefcik
The 95th Annual Meeting of the National Conference on Weights and Measures (NCWM) was held July 11 to 15, 2010, at the Crowne Plaza St. Paul Riverfront, St...
Keith A. Stouffer, Joseph A. Falco, Karen A. Scarfone
NIST Special Publication (SP) 800-82, Guide to Industrial Control Systems (ICS) Security, provides guidance on how to secure Industrial Control Systems (ICS)...
David Cooper, William Polk, Andrew Regenscheid, Murugiah Souppaya
This document provides guidelines for preventing the unauthorized modification of Basic Input/Output System (BIOS) firmware on PC client systems. Unauthorized...
Nelson P. Bryner, Stephen P. Fuss, Bryan W. Klein, Anthony D. Putorti Jr.
A fire occurred on the evening of June 18, 2007, in the Sofa Super Store in Charleston, SC. NIST analyzed the fire ground, consulted with other experts, and...
Nelson P. Bryner, Stephen P. Fuss, Bryan W. Klein, Anthony D. Putorti Jr.
A fire occurred on the evening of June 18, 2007, in the Sofa Super Store in Charleston, SC. NIST analyzed the fire ground, consulted with other experts, and...
David W. Allen, Edward A. Early, Benjamin K. Tsai, Catherine C. Cooksey
This document describes measurement services, instrumentation, and measurement techniques for regular spectral transmittance over the spectral range from 250 nm...
The purpose of Special Publication 800-39 is to provide guidance for an integrated, organization-wide program for managing information security risk to...
Elizabeth N. Fong, Paul E. Black, Michael J. Kass, Hsiao-Ming M. Koo
Software assurance tools are a fundamental resource to improve assurance in today's software applications. Some tools analyze software requirements or design...
David A. Waltermire, Stephen D. Quinn, Karen Scarfone
This document provides the definitive technical specification for Version 1.1 of the Security Content Automation Protocol (SCAP). SCAP consists of a suite of...
This publication provides recommendations for using two vulnerability naming schemes: Common Vulnerabilities and Exposures (CVE) and Common Configuration...
Rajmohan (. Madhavan, Elena R. Messina, Brian A. Weiss
The 2010 Performance Metrics for Intelligent Systems workshop is the tenth in a series dedicated to defining measures and methodologies of evaluating...
Murugiah P. Souppaya, Karen Scarfone, Paul Hoffman
The purpose of SP 800-125 is to discuss the security concerns associated with full virtualization technologies for server and desktop virtualization, and to...