|  |  CSRC 
    Homepage 
 CSRC Site Map
    Search 
    CSRC:  CSD 
    Publications:- Draft Publications
 - Special 
    Publications
 - FIPS Pubs
 - ITL Security 
    Bulletins
 - NIST IRs
  CSD 
    Focus Areas:- Cryptographic Standards
 & Application
 - Security Testing
 - Security Research 
    /
 Emerging 
    Technologies
 - Security Management
 & 
    Guidance
  General 
      Information:- Site 
    Map
 - List of Acronyms
 - Archived 
      Projects
 & 
      Conferences
 - Virus Information
 - ICAT Alerts
 
  Search 
    NIST's ICATVulnerability Archive:
 |  |   
 
 
 
       
        | Draft SP
 800-79
 | Draft 
              NIST Special Publication 800-79, Guidelines for the Certification 
              and Accreditation of PIV Card Issuing Organizations |   
        | SP 800-78
 |  Cryptographic Algorithms 
            and Key Sizes for Personal Identity VerificationApril 2005
 Adobe 
            .pdf (200 KB)
 |   
        | Draft SP
 800-77
 | Draft 
            NIST Special Publication 800-77, Guide to IPsec VPNs |   
        | Draft SP
 800-76
 | Draft 
            NIST Special Publication 800-76, Biometric Data Specification for 
            Personal Identity Verification |   
        | SP 800-73
 | Interfaces 
            for Personal Identity Verification Adobe 
            .pdf (860 KB)(File updated April 12, 2005)
 Errata 
            Sheet (April 12, 2005)
 |   
        | SP 800-72
 
 
 | Guidelines on PDA ForensicsNovember 2004
 Adobe 
            .pdf (1.12 MB)   |   
        | SP 800-70
 
 
 | The 
            NIST Security Configuration Checklists Program |   
        | Draft SP
 800-68
 
 
 | Draft 
            NIST Special Publication 800-68, Guidance for Securing Microsoft Windows 
            XP Systems for IT Professionals: A NIST Security Configuration Checklist
 |   
        | SP 800-67
 | Recommendation for the Triple 
            Data Encryption Algorithm (TDEA) Block Cipher,May 2004
 Adobe 
            .pdf (960 KB)   |   
        | SP 800-66
 | An Introductory Resource 
            Guide for Implementing the Health Insurance Portability and Accountability 
            Act (HIPAA) Security Rule,March 2005
 Adobe 
            .pdf (1,725 KB)Zipped .pdf file (1,378 
            KB)
 |   
        | SP 800-65
 | Integrating Security into 
            the Capital Planning and Investment Control Process,January 2005
 Adobe 
            .pdf (4.05 MB)Zipped .pdf file (3.48 MB)
 |   
        | SP 800-64
 | Security Considerations in the 
            Information System Development Life Cycle,October 2003 (publication original release date)
 (revision 1 released June 2004)
 Adobe 
            .pdf (1,083 KB)Zipped .pdf file (669 KB)
 |   
        | SP 800-63
 | Electronic Authentication 
            Guideline: Recommendations of the National Institute of Standards 
            and Technology,June 2004 (publication original release date)
 (revision 1.0.1 released September 2004)
 Adobe 
            .pdf (217 KB)  |   
        | SP 800-61
 | Computer Security Incident 
            Handling Guide,January 2004
 Adobe 
            .pdf (2.71 MB)Zipped .pdf file (1.6 MB)
 |   
        | SP 800-60
 | Guide for Mapping Types 
            of Information and Information Systems to Security Categories,June 2004
 Volume 
            I Adobe .pdf file (444 KB)Volume II: Appendixes Adobe 
            .pdf (2,003 KB)
 |   
        | SP 800-59
 | Guideline for Identifying 
            an Information System as a National Security System,August 2003
  Adobe 
            .pdf (95.5 KB)Zipped .pdf file (72.9 KB)
 |   
        | SP 800-58
 | Security Considerations 
            for Voice Over IP Systems,January 2005
  Adobe 
            .pdf (1.24 MB)Zipped .pdf file (854 KB)
 |   
        | Draft SP
 800-57
 | DRAFT 
            Special Publication 800-57 Recommendation on Key Management
 |   
        | Draft SP
 800-56
 | DRAFT 
            Special Publication 800-56, Recommendation on Key Establishment Schemes
 |   
        | SP 800-55
 | Security Metrics Guide 
            for Information Technology Systems,July 2003
  Adobe 
            .pdf (569 KB)Zipped .pdf file (465 KB)
 |   
        | SP 800-53
 | Recommended Security Controls 
            for Federal Information Systems,February 2005 (Including errata updates through 05-04-2005)
 
  Adobe 
            .pdf (1,817 KB)Zipped .pdf file (1,326 KB)
 
 Annex 
            1: Consolidated Security Controls-Low 
            Baseline (.pdf)
 
 Annex 2: Consolidated Security 
            Controls-Moderate Baseline (.pdf)
 (includes updates through 4/22/05)
 
 Annex 3: Consolidated Security 
            Controls-High Baseline (.pdf)
 (includes updates through 4/22/05)
 |   
        | SP 800-52
 | Guidelines for the Selection 
            and Use of Transport Layer Security (TLS) Implementations,June 2005
 Adobe 
            .pdf (325 KB)  |   
        | SP 800-51
 | Use of the Common Vulnerabilities 
            and Exposures (CVE) Vulnerability Naming Scheme,September 2002
  Adobe 
            .pdf (204 KB)Zipped .pdf file 
            (177 KB)
 |   
        | SP 800-50
 | Building an Information Technology 
            Security Awareness and Training Program,October 2003
 Adobe 
            .pdf (4,131 KB)Zipped .pdf file (3,565 KB)
 |   
        | SP 800-49
 | Federal S/MIME V3 Client 
            Profile,November 2002
  Adobe 
            .pdf (151 KB)Zipped .pdf file 
            (112 KB)
 |   
        | SP 800-48
 | Wireless Network Security: 
            802.11, Bluetooth, and Handheld Devices,November 2002
  Adobe 
            .pdf (1,027 KB)Zipped 
            .pdf file (780 KB)
 |   
        | SP 800-47
 | Security Guide for Interconnecting 
            Information Technology Systems,August 2002
  Adobe 
            .pdf (729 KB)Zipped .pdf file 
            (505 KB)
 |   
        | SP 800-46
 | Security for Telecommuting 
            and Broadband Communications,August 2002
  Adobe 
            pdf (3,779 KB)Zipped .pdf file 
            (2,156 KB)
 |   
        | SP 800-45
 | Guidelines on Electronic 
            Mail Security,September 2002
  Adobe 
            .pdf (1,098 KB)Zipped .pdf file 
            (1,019 KB)
 |   
        | SP 800-44
 | Guidelines on Securing 
            Public Web Servers,September 2002
  Adobe 
            .pdf (2,183 KB)Zipped .pdf file 
            (2,073 KB)
 |   
        | SP 800-43
 | Systems Administration 
            Guidance for Windows 2000 Professional,November 2002
  Download 
            the guidance document and security templates.  |   
        | SP 800-42
 | Guideline on Network Security 
            Testing,October 2003
 Adobe 
            .pdf (1,554 KB)Zipped .pdf file (1,104 KB)
 |   
        | SP 800-41
 | Guidelines on Firewalls 
            and Firewall Policy,January 2002
 Adobe 
            .pdf (1,180 KB)  |   
        | SP 800-40
 | Procedures for Handling 
            Security Patches,August 2002
  Adobe 
            .pdf (3,773 KB)Zipped .pdf file 
            (1,949 KB)
 |   
        | SP 800-38C
 | Recommendation 
          for Block Cipher Modes of Operation: the CCM Mode for Authentication 
          and Confidentiality, May 2004
  Adobe 
            .pdf (104 KB)  |   
        | SP 800-38B
 |  
          Recommendation for Block Cipher 
          Modes of Operation: The CMAC Mode for AuthenticationMay 2005
  Adobe 
            .pdf (180 KB)  |   
        | SP 800-38A
 | Recommendation 
          for Block Cipher Modes of Operation - Methods and Techniques, December 2001
  Adobe 
            .pdf (225 KB)  |   
        | SP 800-37
 | Guide for the Security 
            Certification and Accreditation of Federal Information Systems,May 2004
 Adobe 
            .pdf (738 KB)   |   
        | SP 800-36
 | Guide to Selecting 
          Information Security Products, October 2003
 Adobe 
            .pdf (464 KB)Zipped .pdf file (339 KB)
 |   
        | SP 800-35
 | Guide to Information Technology 
            Security Services,October 2003
 Adobe 
            .pdf (2,920 KB)Zipped .pdf file (2,426 KB)
 |   
        | SP 800-34
 | Contingency Planning Guide 
            for Information Technology Systems,June 2002
 Adobe 
            .pdf (1,937 KB)Zipped Adobe .pdf 
            (1,164 KB)
 |   
        | SP 800-33
 | Underlying Technical Models 
            for Information Technology Security,December 2001
 Adobe 
            .pdf (453 KB) |   
        | SP 800-32
 | Introduction to Public Key Technology and the 
            Federal PKI Infrastructure,February 2001
  Adobe 
            .pdf (256 KB)  |   
        | SP 800-31
 | Intrusion Detection Systems (IDS),November 2001
 Adobe .pdf 
            (851 KB)  |   
        | SP 800-30
 | Risk Management Guide for 
            Information Technology Systems,July 2002
  Adobe 
            .pdf (479 KB) |   
        | SP 800-29
 | A Comparison of the Security Requirements for 
            Cryptographic Modules in FIPS 140-1 and FIPS 140-2,June 2001
 Adobe .pdf 
            (274 KB)  |   
        | SP 800-28
 | Guidelines on Active Content 
            and Mobile Code,October 2001
 Adobe 
            .pdf (498 KB) 
             |   
        | SP 800-27
 Rev. A
 | Engineering Principles 
            for Information Technology Security (A Baseline for Achieving Security), 
            Revision A,June 2004
 Adobe 
            .pdf (291 KB) 
             |   
        | SP 800-26
 | Security Self-Assessment 
            Guide for Information Technology Systems,November 2001
  Adobe 
            .pdf (1,522 KB)MS Word .doc 
            (922 KB)
  Revised 
            NIST SP 800-26 System Questionnaire with NIST SP 800-53 References 
            and Associated Security Control MappingsApril 2005
  MS 
            Word .doc (484 KB)  |   
        | SP 800-25
 | Federal Agency Use of Public Key Technology for 
            Digital Signatures and Authentication,October 2000
 Choose 1 of 2 ways to download document1. Adobe .pdf (130 KB)
 2. MS Word .doc (421 KB)
 |   
        | SP 800-24
 | PBX Vulnerability Analysis: Finding Holes in Your 
            PBX Before Someone Else Does,August 2000
  Adobe 
            .pdf (225 KB)
 |   
        | SP 800-23
 | Guideline to Federal Organizations on Security 
            Assurance and Acquisition/Use of Tested/Evaluated Products,August 2000
 Choose 1 of 2 ways to download document:1. Adobe .pdf (837 KB)
 2. Zipped .pdf file (803 KB)
 |   
        | SP 800-22
 | A Statistical Test Suite for Random and Pseudorandom 
            Number Generators for Cryptographic Applications, October 2000 (publication original release date)
 Revised: May 15, 2001Adobe .pdf (1,422 KB)
 Errata sheet for originally published 
            version (.pdf file)
 |   
        | SP 800-21
 | Guideline for Implementing Cryptography in the 
            Federal Government, November 1999
 Adobe .pdf 
            (612 KB) |   
        | SP 800-20
 | Modes of Operation Validation System for the Triple 
            Data Encryption Algorithm (TMOVS): Requirements and Procedures, October 1999 (Publication original release date)
 Revised April 2000
 Adobe .pdf 
            (1,246 KB) |   
        | SP 800-19
 | Mobile Agent Security, October 1999
 Adobe .pdf 
            (136 KB) |   
        | SP 800-18
 | Guide for Developing Security Plans for Information 
            Technology Systems, December 1998
 2 different file formats: Letter from CIO Council Security CommitteeMS Word .doc (540 KB)
 Adobe .pdf (306 KB)
 Adobe .pdf 
            (31 KB) |   
        | SP 800-17
 | Modes of Operation Validation System (MOVS): Requirements 
            and Procedures, February 1998
 Adobe .pdf 
            (406 KB) |   
        | SP 800-16
 | Information Technology Security Training Requirements: 
            A Role- and Performance-Based Model (supersedes NIST Spec. Pub. 500-172), 
            April 1998
 broken down into 3 parts: Pt. 1 - document: Adobe .pdf (845 
            KB)
 Pt. 2 - Appendix A-D: Adobe .pdf 
            (96 KB)
 Part 3 - Appendix E: Adobe .pdf 
            (374 KB)
 |   
        | SP 800-15
 | Minimum Interoperability Specification for PKI 
            Components (MISPC), Version 1, September 1997
 3 different file formats: Adobe .pdf (278 KB)
 MS Word .doc (339 KB)
 Postscript file (886 KB)
 |   
        | SP 800-14
 | Generally Accepted Principles and Practices for 
            Securing Information Technology Systems, September 1996
 3 different file formats: Postscript file (480 KB)
 WordPerfect file (182 KB)
 Adobe .pdf (188 KB)
 |   
        | SP 800-13
 | Telecommunications Security Guidelines for Telecommunications 
            Management Network, October 1995
 WordPerfect 
            file (217 KB) |   
        | SP 800-12
 | An Introduction to Computer Security: The NIST 
            Handbook, October 1995
  800-12 
            in .HTML format
 Adobe .PDF File [1,685 KB]
 Postscript File 1 of 5 [602 KB]
 Postscript File 2 of 5 [3,051 KB]
 Postscript File 3 of 5 [1,345 KB]
 Postscript File 4 of 5 [575 KB]
 Postscript File 5 of 5 [1,247 KB]
 
 |  
 
      | 
           
            | Archived Special Publications 
                from 500 & 800 Series |  |  
 Archived 
      Special Publications:The following Special Publications are no longer available on the CSRC website 
      to view and/or download. If for some reason you still need to refer to a 
      particular archived Special Publication, we can e-mail it to you. Please 
      send e-mail to Pat 
      O'Reilly. In the e-mail please specify which Special Publication number 
      you need. If we have the archived electronic file we can send it to you, 
      if not we can send you a paper copy by postal mail. Please look at list 
      below to see which document you need, and if you see that the document you 
      need is only available in paper format, in your e-mail please include your 
      postal address so we can mail out a paper copy to you quicker. NOTE: Due 
      to e-mail volume, it may take a couple days to get back to you. Thanks for 
      understanding.
 These publications we 
      have electronic copies: 
        500 Series 
      SP 500-166 
        Computer Viruses and Related Threats: A Management Guide, August 1989SP 500-169 
        Executive Guide to the Protection of Information Resources, 1989SP 500-170 
        Management Guide to the Protection of Information Resources, 1989SP 500-171 
        Computer Users' Guide to the Protection of Information Resources, 1989SP 500-174 
        Guide for Selecting Automated Risk Analysis Tools, October 1989SP 500-189 
        Security in ISDN, September 1991
 800 Series
SP 800-2 Public-Key 
        Cryptography, April 1991SP 800-3 Special 
        Publication 800-3: Establishing a Computer Security Incident Response 
        Capability (CSIRC), November 1991As of January 2004, 800-3 has 
        been superceded by 800-61 Computer Security Incident Handling Guide
SP 800-4: 
        Computer Security Considerations in Federal Procurements: A Guide for 
        Procurement Initiatiors, Contracting Officers, and Computer Security Officials, 
        March 1992As of October 2003, 800-4 has been 
        superceded by 800-64 Security Considerations in the Information System 
        Development Life Cycle
SP 800-5 A 
        Guide to the Selection of Anti-Virus Tools and Techniques, December 1992SP 800-6 Automated 
        Tools for Testing Computer System Vulnerability, December 1992SP 800-7 Security 
        in Open Systems, July 1994SP 800-8 Security 
        Issues in the Database Language SQL, August 1993SP 800-9 Good 
        Security Practices for Electronic Commerce, Including Electronic Data 
        Interchange, December 1993SP 800-10 
        Keeping Your Site Comfortably Secure: An Introduction to Internet Firewalls, 
        December 1994SP 800-11 
        The Impact of the FCC's Open Network Architecture on NS/EP Telecommunications 
        Security, February 1995  The documents listed 
      below (500 series), we only have "paper" copies of. (No electronic 
      file is available for the documents listed below.) If you want us to send 
      you a paper copy of any of these documents listed below, please include 
      your postal address in the e-mail. That way we can ship out the document 
      to you quicker. Thanks. NIST Computer Security Webmaster.  
      SP 500-61 
        Maintenance Testing for the Data Encryption Standard, August 1980SP 500-120 
        Security of Personal Computer Systems - A Management Guide, January 1985SP 500-133 
        Technology Assessment: Methods for Measuring the Level of Computer Security, 
        October 1985SP 500-134 
        Guide on Selecting ADP Backup Process Alternatives, November 1985SP 500-153 
        Guide to Auditing for Controls and Security: A System Development Life 
        Cycle Approach, April 1988SP 500-156 
        Message Authentication Code (MAC) Validation System: Requirements and 
        Procedures, May 1988SP 500-158 
        Accuracy, Integrity, and Security in Computerized Vote-Tallying, August 
        1988SP 500-157 
        Smart Card Technology: New Methods for Computer Access Control, September 
        1988SP 500-172 
        Computer Security Training Guidelines, November 1989Superseded by Special Publication 
        800-16 Information Technology Security Training Requirements: A Role- 
        and Performance- Based Model, April 1998
 |