National Cybersecurity Center of Excellence
The National Cybersecurity Center of Excellence (NCCoE) addresses businesses’ most pressing cybersecurity problems by developing practical, standards-based example solutions using commercially available technologies. These example solutions are published in NIST Cybersecurity Practice Guides that provide detailed implementation information.
National Initiative for Cybersecurity Education
The National Initiative for Cybersecurity Education (NICE) is a partnership between government, academia, and the private sector focused on cybersecurity education, training, and workforce development.
Trusted Identities Group
The Trusted Identities Group aims to create an Identity Ecosystem that promotes confidence, privacy, choice, and innovation for all in our online world.
NIST Special Publications (SP)
NIST uses three NIST Special Publication subseries to publish computer/cyber/information security and guidelines, recommendations and reference materials. Listed below are some publications that may be of use to you.
- SP 800-163 Rev. 1 (Draft): Vetting the Security of Mobile Apps helps organizations implement a process for ensuring that mobile apps conform to the organization’s security requirements and are reasonably free from vulnerabilities. Security requirements and references have been added to aid organizations in defining their own app vetting policy. Finally, a brief discussion of the mobile app threat landscape is included to better contextualize the need for app vetting. [Government] [Industry] [Small Business]
- SP 800-116 Rev. 1: Guidelines for the Use of PIV Credentials in Facility Access provides technical specs for implementing PIV cards to control physical access to facilities. [Government] [Industry]
- SP 800-125A Rev. 1: Security Recommendations for Server-based Hypervisor Platforms provides information on securing the software architecture that underlies virtual machines (VMs). [Government] [Industry]
- SP 800-131A Rev. 2 (Draft): Transitioning the Use of Cryptographic Algorithms and Key Lengths is intended to provide more detail about the transitions associated with the use of cryptography by federal government agencies for the protection of sensitive, but unclassified information. The document addresses the use of algorithms and key lengths specified in Federal Information Processing Standards (FIPS) and NIST Special Publications (SPs). [Government] [Industry] [Small Business]
- SP 800-171 Rev. 1: Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations. The security requirements apply to all components of nonfederal systems and organizations that process, store, or transmit CUI, or that provide security protection for such components. The requirements are intended for use by federal agencies in contractual vehicles or other agreements established between those agencies and nonfederal organizations (i.e., Federal agencies and organizations under contract with federal agencies who process, store or transmit Controlled Unclassified Information are required to comply with these security requirements (it's stipulated in the Federal Acquisition Regulations (FAR)). [Government] [Industry] [Small Business]
- SP 800-187: Guide to LTE Security. This document serves as a guide to the fundamentals of how Long Term Evolution (LTE) networks operate and explores the LTE security architecture. This is followed by an analysis of the threats posed to LTE networks and supporting mitigations. [Industry] [Government]
- NISTIR 8183: Cybersecurity Framework Manufacturing Profile. This document provides the Cybersecurity Framework (CSF) implementation details developed for the manufacturing environment. The "Manufacturing Profile" of the Cybersecurity Framework can be used as a roadmap for reducing cybersecurity risk for manufacturers that is aligned with manufacturing sector goals and industry best practices. This Manufacturing Profile provides a voluntary, risk-based approach for managing cybersecurity activities and reducing cyber risk to manufacturing systems. The Manufacturing Profile is meant to enhance but not replace current cybersecurity standards and industry guidelines that the manufacturer is embracing. [Industry] [Small Business]
- NISTIR 8136: An Overview of Mobile Application Vetting Services for Public Safety. This document is intended to be an overview of existing mobile application vetting services and the features these services provide and how they relate to public safety’s needs. It is also meant to aid public safety organizations when choosing which mobile application vetting services are used to evaluate relevant mobile applications. [Law Enforcement]
- NISTIR 8080: Usability and Security Considerations for Public Safety Mobile Authentication. Although first responders work in a variety of disciplines, this report is focused on the Fire Service, Emergency Medical Services (EMS), and Law Enforcement. This report describes the constraints presented by their personal protective equipment (PPE), specialized gear, and unique operating environments and how such constraints may interact with mobile authentication requirements. The overarching goal of this work is analyzing which authentication solutions are the most appropriate and usable for first responders using mobile devices in operational scenarios in the field. [Law Enforcement]
The National Cyber Security Alliance, the other STOP. THINK. CONNECT. ™ founding organizations and many of there partners have created resources, ranging from tip sheets to posters to videos and more, to help you stay safer and more secure online and better protect your personal information. All of these resources are free to use, download and share at home, at work and in the community.