NIST SP 800-70
NIST SP 800-70: NIST Special Publication 800-70 provides guidelines for the development, selection, and implementation of security configuration checklists. It is designed to guide organizations in establishing and maintaining secure configurations for their operating systems, software applications, and network devices to reduce vulnerabilities and mitigate potential threats.
NIST 800-94
NIST 800-94: A guideline on intrusion detection and prevention systems (IDPS), providing a detailed explanation of these technologies along with recommendations for their planning, implementation, configuration, securing, monitoring, and maintenance. It aids organizations in comprehending the characteristics of IDPS technologies and offers a comprehensive approach to integrating them effectively into an overall security architecture to […]
NIST SP 800-82
NIST SP 800-82: NIST SP 800-82 Revision 2 offers guidelines for securing Industrial Control Systems (ICS), including SCADA systems, DCS, and PLCs. It addresses the specific operational demands of ICS and provides strategies for protecting against vulnerabilities while maintaining system integrity and resilience.
NIST Cybersecurity Framework (CSF)
NIST Cybersecurity Framework (CSF): A voluntary set of standards, guidelines, and best practices designed to assist organizations in managing cybersecurity risk. It is composed of three parts – the Framework Core, the Framework Profile, and the Framework Implementation Tiers, each providing specific guidance for establishing new or improving existing cybersecurity programs. The framework has been […]
NIST SP 800-88
NIST SP 800-88: A special publication by the National Institute of Standards and Technology providing guidelines for media sanitization. It details how to properly clear, purge, and destroy data on different types of media to prevent unauthorized disclosure of sensitive information.
NIST SP 800-124
NIST SP 800-124: NIST Special Publication 800-124, titled “Guidelines for Managing the Security of Mobile Devices in the Enterprise,” is a guidance document from the National Institute of Standards and Technology (NIST). This publication provides recommendations for the secure deployment and management of mobile devices, such as smartphones and tablets, within enterprise environments. It covers […]