- NIST SP 800-53 Rev 5 NIST Special Publication 800-53 Revision 5, "Security and Privacy Controls for Information Systems and Organizations," provides a comprehensive set of security and privacy controls for federal information systems and organizations. It includes controls to address diverse requirements derived from federal laws, executive orders, policies, directives, regulations, standards, and mission/business needs.
- NIST SP 800-55 NIST Special Publication 800-55 provides guidelines for measuring the performance of information security policies and technologies within federal information systems. These guidelines help organizations to develop, select, and implement metrics to improve the efficiency and effectiveness of security control measures.
- NIST SP 800-61 NIST Special Publication 800-61 offers best practices for computer security incident handling, including preparation, detection, analysis, containment, recovery, and user response. It is designed to assist organizations in establishing effective incident response capabilities to promptly handle various types of cybersecurity incidents.
- NIST SP 800-63 A special publication by NIST that provides technical guidelines for digital identity services. It covers identity proofing, authentication, and federation, outlining standards for ensuring the security and privacy of online identities.
- NIST SP 800-64NIST Special Publication 800-64 provides comprehensive guidelines for integrating security considerations into the system development life cycle (SDLC). It assists organizations in understanding the process of incorporating effective security measures at every phase of the software development process, thus ensuring the creation of more secure and robust systems.
- NIST SP 800-70 NIST Special Publication 800-70 provides guidelines for the development, selection, and implementation of security configuration checklists. It is designed to guide organizations in establishing and maintaining secure configurations for their operating systems, software applications, and network devices to reduce vulnerabilities and mitigate potential threats.
- NIST SP 800-82NIST Special Publication 800-82 offers guidance on securing industrial control systems, including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations. The guidance aims to help protect these systems from potential threats and reduce risks associated with the operational technology environment.
- NIST SP 800-88 A special publication by the National Institute of Standards and Technology providing guidelines for media sanitization. It details how to properly clear, purge, and destroy data on different types of media to prevent unauthorized disclosure of sensitive information.
- NIST SP 800-92A publication by the National Institute of Standards and Technology providing guidelines for Computer Security Log Management. It explains the importance of log management in security incident identification and outlines best practices for log generation, analysis, storage, and disposal.
- NIST SP 800-124 NIST Special Publication 800-124, titled "Guidelines for Managing the Security of Mobile Devices in the Enterprise," is a guidance document from the National Institute of Standards and Technology (NIST). This publication provides recommendations for the secure deployment and management of mobile devices, such as smartphones and tablets, within enterprise environments. It covers topics like device policy development, device configuration and management, secure data communication, and the protection of enterprise data stored on mobile devices. The objective of NIST SP 800-124 is to help organizations mitigate security risks associated with the use of mobile devices while supporting the productivity benefits that these devices offer. The guidance is intended for IT managers and security professionals responsible for mobile device security. As mobile technology and security threats evolve, NIST periodically updates its publications to reflect the most current best practices and(...) Read More
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.