Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NIST Pubs

Extending Network Security into Virtualized Infrastructure

Author(s)
Ramaswamy Chandramouli, Larry Feldman, Gregory A. Witte
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-125B, "Secure Virtual Network Configuration for Virtual Machine (VM)

Representation of PIV Chain-of-Trust for Import and Export

Author(s)
Hildegard Ferraiolo, Ramaswamy Chandramouli, Ketan L. Mehta, Jason Mohler, Stephen Skordinski, Steven Brady
This document provides a common XML-based data representation of a chain-of-trust record to facilitate the exchange of PIV Card enrollment data. The exchanged

Combinatorial Testing for Cybersecurity and Reliability

Author(s)
David R. Kuhn, Raghu N. Kacker, Larry Feldman, Gregory A. Witte
This bulletin focuses on NIST's combinatorial testing work. Combinatorial testing is a proven method for more effective software testing at lower cost. The key

Report on Post-Quantum Cryptography

Author(s)
Lidong Chen, Stephen P. Jordan, Yi-Kai Liu, Dustin Moody, Rene C. Peralta, Ray A. Perlner, Daniel C. Smith-Tone
In recent years, there has been a substantial amount of research on quantum computers - machines that exploit quantum mechanical phenomena to solve mathematical

STEP File Analyzer User's Guide (Version 3)

Author(s)
Robert R. Lipman
This guide describes how to use the STEP File Analyzer, a software tool that analyzes and generates a spreadsheet from a STEP (STandard for the Exchange of

Baseline Tailor User Guide

Author(s)
Joshua Lubell
This guide describes how to use Baseline Tailor, a software tool for navigating the United States Government's Cybersecurity Framework and for tailoring the
Was this page helpful?