Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 26 - 50 of 1918

2023 NIST Summary of U.S. Legal Metrology Activities

November 20, 2023
Author(s)
Lisa Warfield, Katrice Lippa, Jan Konijnenburg, Loren Minnich, Gloria Diane Lee, Juana Williams, John McGuire
The NIST Office of Weights and Measures (OWM) presents its second issue of the 2023 NIST Annual Summary of U.S. Legal Metrology Activities report. This report includes a summary of changes made to NIST Handbook 44 (2023) Specifications, Tolerances and

Cryptographic Module Validation Program (CMVP) Security Policy Requirements

November 17, 2023
Author(s)
David Hawes, Alexander Calis, Roy Crombie
NIST Special Publication (SP) 800-140Br1 is to be used in conjunction with ISO/IEC 19790 Annex B and ISO/IEC 24759 Section 6.14. This Special Publication modifies only those requirements identified in this document. NIST SP 800-140Br1 also specifies the

Enterprise Impact of Information & Communications Technology Risk

November 17, 2023
Author(s)
Stephen Quinn, Nahla Ivy, Matthew Barrett, Larry Feldman, Daniel Topper, Greg Witte, Karen Scarfone, Robert Gardner, Julie Chua
All enterprises should ensure that information and communications technology (ICT) risk receives appropriate attention within their enterprise risk management (ERM) programs. This document is intended to help individual organizations within an enterprise

Information and Communications Technology (ICT) Risk Outcomes

November 17, 2023
Author(s)
Stephen Quinn, Nahla Ivy, Karen Scarfone, Matthew Barrett, Larry Feldman, Daniel Topper, Greg Witte, Robert Gardner, Julie Chua
The increasing frequency, creativity, and severity of technology attacks means that all enterprises should ensure that information and communications technology (ICT) risk is receiving appropriate attention within their enterprise risk management (ERM)

NIST SI Units Card Deck

November 1, 2023
Author(s)
Dinelka Jagoda, Elizabeth Benham
Welcome to the SI Units Card Deck! This interactive educational activity offers a fun way for students to enhance their understanding of the International System of Units (SI), including the Defining Constants, Base Units, Derived Units with Special Names

Certification of Standard Reference Material(R) 2386 Avocado Powder

October 18, 2023
Author(s)
Melissa M. Phillips, Laura Wood, Joseph Browning, George Caceres, Grace Hahm, Mahboubeh Hanaee, Abigail Lee, Karen Murphy, Rabia Oflaz, Rick L. Paul, Benjamin Place, Jeanice "Brown Thomas ", James H. Yen
The National Institute of Standards and Technology (NIST) recently released SRM 2386 Avocado Powder which has value assignment for over 70 analytes. This material is intended to be used for the evaluation of methods for the determination of elements

Guide to Operational Technology (OT) Security

September 28, 2023
Author(s)
Keith A. Stouffer, Michael Pease, CheeYee Tang, Timothy Zimmerman, Victoria Yan Pillitteri, Suzanne Lightman, Adam Hahn, Stephanie Saravia, Aslam Sherule, Michael Thompson
This document provides guidance on how to secure operational technology (OT) while addressing their unique performance, reliability, and safety requirements. OT encompasses a broad range of programmable systems and devices that interact with the physical

Mobile Device Security: Bring Your Own Device (BYOD)

September 28, 2023
Author(s)
Gema Howell, Katie Boeckl, Nakia R. Grayson, Naomi Lefkovitz, Jason Ajmo, R. Eugene Craft, Milissa McGinnis, Kenneth Sandlin, Oksana Slivina, Julie Snyder, Paul Ward
Many organizations provide employees the flexibility to use their personal mobile devices to perform work-related activities. An ineffectively secured personal mobile device could expose an organization or employee to data loss or a privacy compromise

De-Identifying Government Datasets: Techniques and Governance

September 14, 2023
Author(s)
Simson Garfinkel, Joseph Near, Aref Dajani, Phyllis Singer, Barbara Guttman
De-identification is a general term for any process of removing the association between a set of identifying data and the data subject. This document describes the use of deidentification with the goal of preventing or limiting disclosure risks to

An Evolving Regulatory Landscape for Commercial Electric Vehicle Fueling

August 22, 2023
Author(s)
Tina G. Butcher, Michael Nelson
Plug-in electric vehicles (PEV), which include "all-electric" battery EV (BEV) and plug-in hybrid EV (PHEV), comprise a rapidly growing proportion of the U.S. automobile market – nearly 8% of all light-duty vehicles sold in Oct. 2022, a 41.4% rise over

Report from the 2022 NIST Rapid Microbial Testing Methods (RMTM) Workshop

August 15, 2023
Author(s)
Stephanie Servetas, Nancy Lin, Nadratun Chowdhury, Scott Jackson, Jason Kralj, Sheng Lin-Gibson, Melody Sanders, Tara Eskandari
Safety and quality of advanced therapies, including cellular, gene, and tissue-engineered medical products, is paramount for success of these products. Sterility assurance testing confirming the absence of microbial contamination in advanced therapy

CMVP Approved Security Functions

July 25, 2023
Author(s)
Alexander Calis
The approved security functions listed in this publication replace the ones listed in International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) 19790 Annex C and ISO/IEC 24759 6.15, within the context of the

Automated Secure Configuration Guidance from the macOS Security Compliance Project (mSCP)

July 20, 2023
Author(s)
Mark Trapnell, Eric Trapnell, Murugiah Souppaya, Bob Gendler, Dan Brodjieski, Allen Golbig, Karen Scarfone, Blair Heiserman
The macOS Security Compliance Project (mSCP) provides resources that system administrators, security professionals, security policy authors, information security officers, and auditors can leverage to secure and assess macOS desktop and laptop system
Displaying 26 - 50 of 1918