CARVIEW |
This is a potential security issue, you are being redirected to https://csrc.nist.gov.

An official website of the United States government
Here’s how you know
Official websites use .gov
A
.gov website belongs to an official government
organization in the United States.
Secure .gov websites use HTTPS
A
lock (
) or https:// means you’ve safely connected to
the .gov website. Share sensitive information only on official,
secure websites.
Current Publications
-
NIST Series Pubs
- Final Pubs
- Drafts Open for Comment
- Drafts (all)
- View By Series
- Other Pubs
Public Drafts: Current list of all draft NIST cybersecurity documents--they are typically posted for public comment. "Current" public drafts are the latest draft versions that have not yet been published as "Final." FIPS: Current Federal Information Processing Standard Publications (FIPS). Includes current (Final and Draft) FIPS.
SP 800 Series: Current NIST Special Publication (SP) 800 series publications, which focus on Computer/Information Security. Includes current (Final and Draft) SP 800 pubs.
All SP Series: Current NIST Special Publications (SP), including SP 800 (Computer/Information Security) and SP 1800 (Cybersecurity Practice Guides) pubs. Also includes SP 500 (Computer Systems Technology) pubs related to cybersecurity and privacy. Includes current (Final and Draft) NIST Special Publications.
NISTIRs: Current list of NIST Interagency or Internal Reports (NISTIR) related to cybersecurity and privacy. Includes current (Final and Draft) NISTIRs.
ITL Bulletins: Current list of NIST Information Technology Laboratory (ITL) Bulletins. White Papers: Consists of NIST Cybersecurity White Papers; NCCoE Project Descriptions, Building Blocks and Use Cases; and other NIST-authored papers that are not part of a formal series. Includes current (Final and Draft) papers.
Journal Articles: NIST-authored articles published in external journals and in the NIST Journal of Research (JRES).
Conference Papers: NIST-authored conference papers related to cybersecurity and privacy.
Books: NIST-authored books, book sections, and encyclopedia entries related to cybersecurity and privacy.
Search Results
Series | Number | Title Publications | Status | Release Date |
---|---|---|---|---|
SP | 1800-44 |
SP 1800-44 (Initial Public Draft)
Secure Software Development, Security, and Operations (DevSecOps) Practices
7/30/2025
Status: Draft |
Draft | 7/30/2025 |
SP | 1800-43 |
8/05/2025
Status: Draft |
Draft | 8/05/2025 |
SP | 1800-40 |
SP 1800-40 (Initial Preliminary Draft)
Automation of the NIST Cryptographic Module Validation Program
6/07/2023
Status: Draft |
Draft | 6/07/2023 |
SP | 1800-39 |
4/25/2023
Status: Draft |
Draft | 4/25/2023 |
SP | 1800-38 |
SP 1800-38 (Initial Preliminary Draft)
Migration to Post-Quantum Cryptography: Preparation for Considering the Implementation and Adoption of Quantum Safe Cryptography
12/19/2023
Status: Draft |
Draft | 12/19/2023 |
SP | 1800-37 |
SP 1800-37 (Final)
Addressing Visibility Challenges with TLS 1.3 within the Enterprise: High-Level Document
9/17/2025
Status: Final |
Final | 9/17/2025 |
SP | 1800-36 |
SP 1800-36 (Initial Public Draft)
Trusted Internet of Things (IoT) Device Network-Layer Onboarding and Lifecycle Management: Enhancing Internet Protocol-Based IoT Device and Network Security
5/31/2024
Status: Draft |
Draft | 5/31/2024 |
SP | 1800-35 |
6/10/2025
Status: Final |
Final | 6/10/2025 |
SP | 1800-34 |
12/09/2022
Status: Final |
Final | 12/09/2022 |
SP | 1800-33 |
3/18/2025
Status: Draft |
Draft | 3/18/2025 |
SP | 1800-33 |
4/25/2022
Status: Draft |
Draft | 4/25/2022 |
SP | 1800-32 |
SP 1800-32 (Final)
Securing Distributed Energy Resources: An Example of Industrial Internet of Things Cybersecurity
2/02/2022
Status: Final |
Final | 2/02/2022 |
SP | 1800-31 |
SP 1800-31 (Final)
Improving Enterprise Patching for General IT Systems: Utilizing Existing Tools and Performing Processes in Better Ways
4/06/2022
Status: Final |
Final | 4/06/2022 |
SP | 1800-30 |
2/22/2022
Status: Final |
Final | 2/22/2022 |
SP | 1800-29 |
2/23/2024
Status: Final |
Final | 2/23/2024 |
SP | 1800-28 |
2/23/2024
Status: Final |
Final | 2/23/2024 |
SP | 1800-27 |
3/30/2021
Status: Final |
Final | 3/30/2021 |
SP | 1800-26 |
SP 1800-26 (Final)
Data Integrity: Detecting and Responding to Ransomware and Other Destructive Events
12/08/2020
Status: Final |
Final | 12/08/2020 |
SP | 1800-25 |
SP 1800-25 (Final)
Data Integrity: Identifying and Protecting Assets Against Ransomware and Other Destructive Events
12/08/2020
Status: Final |
Final | 12/08/2020 |
SP | 1800-24 |
SP 1800-24 (Final)
Securing Picture Archiving and Communication System (PACS): Cybersecurity for the Healthcare Sector
12/21/2020
Status: Final |
Final | 12/21/2020 |
SP | 1800-23 |
5/20/2020
Status: Final |
Final | 5/20/2020 |
SP | 1800-22 |
9/28/2023
Status: Final |
Final | 9/28/2023 |
SP | 1800-21 |
9/15/2020
Status: Final |
Final | 9/15/2020 |
SP | 1800-19 |
SP 1800-19 (Final)
Trusted Cloud: Security Practice Guide for VMware Hybrid Cloud Infrastructure as a Service (IaaS) Environments
4/20/2022
Status: Final |
Final | 4/20/2022 |
SP | 1800-17 |
SP 1800-17 (Final)
Multifactor Authentication for E-Commerce: Risk-Based, FIDO Universal Second Factor Implementations for Purchasers
7/30/2019
Status: Final |
Final | 7/30/2019 |
SP | 1800-16 |
6/16/2020
Status: Final |
Final | 6/16/2020 |
SP | 1800-15 |
SP 1800-15 (Final)
Securing Small-Business and Home Internet of Things (IoT) Devices: Mitigating Network-Based Attacks Using Manufacturer Usage Description (MUD)
5/26/2021
Status: Final |
Final | 5/26/2021 |
SP | 1800-14 |
SP 1800-14 (Final)
Protecting the Integrity of Internet Routing: Border Gateway Protocol (BGP) Route Origin Validation
6/28/2019
Status: Final |
Final | 6/28/2019 |
SP | 1800-13 |
SP 1800-13 (Final)
Mobile Application Single Sign-On: Improving Authentication for Public Safety First Responders
8/25/2021
Status: Final |
Final | 8/25/2021 |
SP | 1800-12 |
8/27/2019
Status: Final |
Final | 8/27/2019 |
SP | 1800-11 |
9/22/2020
Status: Final |
Final | 9/22/2020 |
SP | 1800-10 |
SP 1800-10 (Final)
Protecting Information and System Integrity in Industrial Control System Environments: Cybersecurity for the Manufacturing Sector
3/16/2022
Status: Final |
Final | 3/16/2022 |
SP | 1800-8 |
8/17/2018
Status: Final |
Final | 8/17/2018 |
SP | 1800-7 |
8/07/2019
Status: Final |
Final | 8/07/2019 |
SP | 1800-6 |
1/19/2018
Status: Final |
Final | 1/19/2018 |
SP | 1800-5 |
9/07/2018
Status: Final |
Final | 9/07/2018 |
SP | 1800-4 |
2/21/2019
Status: Final |
Final | 2/21/2019 |
SP | 1800-2 |
7/13/2018
Status: Final |
Final | 7/13/2018 |
SP | 1800-1 |
7/27/2018
Status: Final |
Final | 7/27/2018 |
SP | 1500-16 |
8/20/2020
Status: Final |
Final | 8/20/2020 |
SP | 1500-4 Rev. 2 |
SP 1500-4 Rev. 2 (Final)
NIST Big Data Interoperability Framework: Volume 4, Security and Privacy Version 3
10/21/2019
Status: Final |
Final | 10/21/2019 |
SP | 1334 |
9/30/2025
Status: Final |
Final | 9/30/2025 |
SP | 1331 |
SP 1331 (Initial Public Draft)
Quick-Start Guide for Using CSF 2.0 to Improve Management of Emerging Cybersecurity Risks
8/21/2025
Status: Draft |
Draft | 8/21/2025 |
SP | 1326 |
SP 1326 (Initial Public Draft)
NIST Cybersecurity Supply Chain Risk Management: Due Diligence Assessment Quick-Start Guide
10/30/2024
Status: Draft |
Draft | 10/30/2024 |
SP | 1318 |
SP 1318 (Final)
Protecting Controlled Unclassified Information (CUI): NIST Special Publication 800-171, Revision 3. Small Business Primer
8/18/2025
Status: Final |
Final | 8/18/2025 |
SP | 1314 |
7/23/2024
Status: Final |
Final | 7/23/2024 |
SP | 1308 |
SP 1308 (Initial Public Draft)
NIST Cybersecurity Framework 2.0: Cybersecurity, Enterprise Risk Management, and Workforce Management Quick Start Guide
3/12/2025
Status: Draft |
Draft | 3/12/2025 |
SP | 1305 |
SP 1305 (Final)
NIST Cybersecurity Framework 2.0: Quick-Start Guide for Cybersecurity Supply Chain Risk Management (C-SCRM)
10/21/2024
Status: Final |
Final | 10/21/2024 |
SP | 1303 |
10/21/2024
Status: Final |
Final | 10/21/2024 |
SP | 1302 |
10/21/2024
Status: Final |
Final | 10/21/2024 |
SP | 1301 |
SP 1301 (Final)
NIST Cybersecurity Framework 2.0: Quick-Start Guide for Creating and Using Organizational Profiles
2/26/2024
Status: Final |
Final | 2/26/2024 |
SP | 1300 |
2/26/2024
Status: Final |
Final | 2/26/2024 |
SP | 1299 |
2/26/2024
Status: Final |
Final | 2/26/2024 |
SP | 1288 |
1/11/2023
Status: Final |
Final | 1/11/2023 |
SP | 1271 |
8/06/2021
Status: Final |
Final | 8/06/2021 |
SP | 800-236 |
4/28/2025
Status: Final |
Final | 4/28/2025 |
SP | 800-234 |
5/01/2025
Status: Draft |
Draft | 5/01/2025 |
SP | 800-233 |
10/16/2024
Status: Final |
Final | 10/16/2024 |
SP | 800-232 |
SP 800-232 (Final)
Ascon-Based Lightweight Cryptography Standards for Constrained Devices: Authenticated Encryption, Hash, and Extendable Output Functions
8/13/2025
Status: Final |
Final | 8/13/2025 |
SP | 800-231 |
7/30/2024
Status: Final |
Final | 7/30/2024 |
SP | 800-229 |
5/20/2024
Status: Final |
Final | 5/20/2024 |
SP | 800-228 |
6/27/2025
Status: Final |
Final | 6/27/2025 |
SP | 800-227 |
9/18/2025
Status: Final |
Final | 9/18/2025 |
SP | 800-226 |
3/06/2025
Status: Final |
Final | 3/06/2025 |
SP | 800-225 |
5/30/2023
Status: Final |
Final | 5/30/2023 |
SP | 800-224 |
SP 800-224 (Initial Public Draft)
Keyed-Hash Message Authentication Code (HMAC): Specification of HMAC and Recommendations for Message Authentication
6/28/2024
Status: Draft |
Draft | 6/28/2024 |
SP | 800-223 |
SP 800-223 (Final)
High-Performance Computing Security: Architecture, Threat Analysis, and Security Posture
2/09/2024
Status: Final |
Final | 2/09/2024 |
SP | 800-221A |
SP 800-221A (Final)
Information and Communications Technology (ICT) Risk Outcomes: Integrating ICT Risk Management Programs with the Enterprise Risk Portfolio
11/17/2023
Status: Final |
Final | 11/17/2023 |
SP | 800-221 |
SP 800-221 (Final)
Enterprise Impact of Information and Communications Technology Risk: Governing and Managing ICT Risk Programs Within an Enterprise Risk Portfolio
11/17/2023
Status: Final |
Final | 11/17/2023 |
SP | 800-220 |
9/26/2022
Status: Final |
Final | 9/26/2022 |
SP | 800-219 Rev. 1 |
SP 800-219 Rev. 1 (Final)
Automated Secure Configuration Guidance from the macOS Security Compliance Project (mSCP)
7/21/2023
Status: Final |
Final | 7/21/2023 |
SP | 800-218A |
SP 800-218A (Final)
Secure Software Development Practices for Generative AI and Dual-Use Foundation Models: An SSDF Community Profile
7/26/2024
Status: Final |
Final | 7/26/2024 |
SP | 800-218 |
SP 800-218 (Final)
Secure Software Development Framework (SSDF) Version 1.1: Recommendations for Mitigating the Risk of Software Vulnerabilities
2/03/2022
Status: Final |
Final | 2/03/2022 |
SP | 800-217 |
11/14/2024
Status: Draft |
Draft | 11/14/2024 |
SP | 800-216 |
5/24/2023
Status: Final |
Final | 5/24/2023 |
SP | 800-215 |
11/17/2022
Status: Final |
Final | 11/17/2022 |
SP | 800-214 |
9/28/2021
Status: Final |
Final | 9/28/2021 |
SP | 800-213A |
SP 800-213A (Final)
IoT Device Cybersecurity Guidance for the Federal Government: IoT Device Cybersecurity Requirement Catalog
11/29/2021
Status: Final |
Final | 11/29/2021 |
SP | 800-213 |
SP 800-213 (Final)
IoT Device Cybersecurity Guidance for the Federal Government: Establishing IoT Device Cybersecurity Requirements
11/29/2021
Status: Final |
Final | 11/29/2021 |
SP | 800-211 |
8/24/2020
Status: Final |
Final | 8/24/2020 |
SP | 800-210 |
7/31/2020
Status: Final |
Final | 7/31/2020 |
SP | 800-209 |
10/26/2020
Status: Final |
Final | 10/26/2020 |
SP | 800-208 |
10/29/2020
Status: Final |
Final | 10/29/2020 |
SP | 800-207A |
SP 800-207A (Final)
A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Cloud Environments
9/13/2023
Status: Final |
Final | 9/13/2023 |
SP | 800-207 |
8/11/2020
Status: Final |
Final | 8/11/2020 |
SP | 800-206 |
3/13/2020
Status: Final |
Final | 3/13/2020 |
SP | 800-205 |
6/18/2019
Status: Final |
Final | 6/18/2019 |
SP | 800-204D |
SP 800-204D (Final)
Strategies for the Integration of Software Supply Chain Security in DevSecOps CI/CD Pipelines
2/12/2024
Status: Final |
Final | 2/12/2024 |
SP | 800-204C |
SP 800-204C (Final)
Implementation of DevSecOps for a Microservices-based Application with Service Mesh
3/08/2022
Status: Final |
Final | 3/08/2022 |
SP | 800-204B |
SP 800-204B (Final)
Attribute-based Access Control for Microservices-based Applications using a Service Mesh
8/06/2021
Status: Final |
Final | 8/06/2021 |
SP | 800-204A |
SP 800-204A (Final)
Building Secure Microservices-based Applications Using Service-Mesh Architecture
5/27/2020
Status: Final |
Final | 5/27/2020 |
SP | 800-204 |
8/07/2019
Status: Final |
Final | 8/07/2019 |
SP | 800-203 |
7/02/2018
Status: Final |
Final | 7/02/2018 |
SP | 800-202 |
5/10/2018
Status: Final |
Final | 5/10/2018 |
SP | 800-201 |
7/30/2024
Status: Final |
Final | 7/30/2024 |
SP | 800-197A |
SP 800-197A (Initial Preliminary Draft)
PRE-DRAFT Call for Comments: NIST Launches Development of Cryptographic Accordions
6/06/2025
Status: Draft |
Draft | 6/06/2025 |
SP | 800-197 |
SP 800-197 (Initial Preliminary Draft)
PRE-DRAFT Call for Comments: NIST Proposes to Standardize a Wider Variant of AES
12/23/2024
Status: Draft |
Draft | 12/23/2024 |
SP | 800-195 |
9/28/2017
Status: Final |
Final | 9/28/2017 |
SP | 800-193 |
5/04/2018
Status: Final |
Final | 5/04/2018 |
SP | 800-192 |
6/27/2017
Status: Final |
Final | 6/27/2017 |
SP | 800-190 |
9/25/2017
Status: Final |
Final | 9/25/2017 |
SP | 800-189 Rev. 1 |
1/03/2025
Status: Draft |
Draft | 1/03/2025 |
SP | 800-189 |
12/17/2019
Status: Final |
Final | 12/17/2019 |
SP | 800-188 |
9/14/2023
Status: Final |
Final | 9/14/2023 |
SP | 800-187 |
12/21/2017
Status: Final |
Final | 12/21/2017 |
SP | 800-186 |
SP 800-186 (Final)
Recommendations for Discrete Logarithm-based Cryptography: Elliptic Curve Domain Parameters
2/03/2023
Status: Final |
Final | 2/03/2023 |
SP | 800-185 |
12/22/2016
Status: Final |
Final | 12/22/2016 |
SP | 800-184 |
12/22/2016
Status: Final |
Final | 12/22/2016 |
SP | 800-183 |
7/28/2016
Status: Final |
Final | 7/28/2016 |
SP | 800-182 |
8/10/2016
Status: Final |
Final | 8/10/2016 |
SP | 800-181 Rev. 1 |
11/16/2020
Status: Final |
Final | 11/16/2020 |
SP | 800-178 |
10/03/2016
Status: Final |
Final | 10/03/2016 |
SP | 800-177 Rev. 1 |
2/26/2019
Status: Final |
Final | 2/26/2019 |
SP | 800-176 |
8/20/2015
Status: Final |
Final | 8/20/2015 |
SP | 800-175B Rev. 1 |
SP 800-175B Rev. 1 (Final)
Guideline for Using Cryptographic Standards in the Federal Government: Cryptographic Mechanisms
3/31/2020
Status: Final |
Final | 3/31/2020 |
SP | 800-175A |
SP 800-175A (Final)
Guideline for Using Cryptographic Standards in the Federal Government: Directives, Mandates and Policies
8/22/2016
Status: Final |
Final | 8/22/2016 |
SP | 800-172 Rev. 3 |
SP 800-172 Rev. 3 (Final Public Draft)
Enhanced Security Requirements for Protecting Controlled Unclassified Information
9/29/2025
Status: Draft |
Draft | 9/29/2025 |
SP | 800-172A Rev. 3 |
SP 800-172A Rev. 3 (Initial Public Draft)
Assessing Enhanced Security Requirements for Controlled Unclassified Information
9/29/2025
Status: Draft |
Draft | 9/29/2025 |
SP | 800-172A |
SP 800-172A (Final)
Assessing Enhanced Security Requirements for Controlled Unclassified Information
3/15/2022
Status: Final |
Final | 3/15/2022 |
SP | 800-172 |
SP 800-172 (Final)
Enhanced Security Requirements for Protecting Controlled Unclassified Information: A Supplement to NIST Special Publication 800-171
2/02/2021
Status: Final |
Final | 2/02/2021 |
SP | 800-171 Rev. 3 |
SP 800-171 Rev. 3 (Final)
Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
5/14/2024
Status: Final |
Final | 5/14/2024 |
SP | 800-171A Rev. 3 |
5/14/2024
Status: Final |
Final | 5/14/2024 |
SP | 800-170 |
9/04/2014
Status: Final |
Final | 9/04/2014 |
SP | 800-168 |
7/02/2014
Status: Final |
Final | 7/02/2014 |
SP | 800-167 |
10/28/2015
Status: Final |
Final | 10/28/2015 |
SP | 800-166 |
6/06/2016
Status: Final |
Final | 6/06/2016 |
SP | 800-165 |
7/22/2013
Status: Final |
Final | 7/22/2013 |
SP | 800-163 Rev. 1 |
4/19/2019
Status: Final |
Final | 4/19/2019 |
SP | 800-162 |
8/02/2019
Status: Final |
Final | 8/02/2019 |
SP | 800-161 Rev. 1 |
SP 800-161 Rev. 1 (Final)
Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations
11/01/2024
Status: Final |
Final | 11/01/2024 |
SP | 800-160 Vol. 2 Rev. 1 |
SP 800-160 Vol. 2 Rev. 1 (Final)
Developing Cyber-Resilient Systems: A Systems Security Engineering Approach
12/09/2021
Status: Final |
Final | 12/09/2021 |
SP | 800-160 Vol. 1 Rev. 1 |
11/16/2022
Status: Final |
Final | 11/16/2022 |
SP | 800-157 Rev. 1 |
SP 800-157 Rev. 1 (Final Public Draft)
Guidelines for Derived Personal Identity Verification (PIV) Credentials
11/14/2024
Status: Draft |
Draft | 11/14/2024 |
SP | 800-157 |
12/19/2014
Status: Final |
Final | 12/19/2014 |
SP | 800-156 |
5/20/2016
Status: Final |
Final | 5/20/2016 |
SP | 800-154 |
3/14/2016
Status: Draft |
Draft | 3/14/2016 |
SP | 800-153 |
2/21/2012
Status: Final |
Final | 2/21/2012 |
SP | 800-152 |
10/28/2015
Status: Final |
Final | 10/28/2015 |
SP | 800-150 |
10/04/2016
Status: Final |
Final | 10/04/2016 |
SP | 800-147B |
8/28/2014
Status: Final |
Final | 8/28/2014 |
SP | 800-147 |
4/29/2011
Status: Final |
Final | 4/29/2011 |
SP | 800-146 |
5/29/2012
Status: Final |
Final | 5/29/2012 |
SP | 800-145 |
9/28/2011
Status: Final |
Final | 9/28/2011 |
SP | 800-144 |
12/09/2011
Status: Final |
Final | 12/09/2011 |
SP | 800-142 |
10/07/2010
Status: Final |
Final | 10/07/2010 |
SP | 800-140F Rev. 1 |
SP 800-140F Rev. 1 (Initial Public Draft)
CMVP Approved Non-Invasive Attack Mitigation Test Metrics: CMVP Validation Authority Updates to ISO/IEC 24759
8/20/2021
Status: Draft |
Draft | 8/20/2021 |
SP | 800-140F |
SP 800-140F (Final)
CMVP Approved Non-Invasive Attack Mitigation Test Metrics: CMVP Validation Authority Updates to ISO/IEC 24759
3/20/2020
Status: Final |
Final | 3/20/2020 |
SP | 800-140E |
SP 800-140E (Final)
CMVP Approved Authentication Mechanisms: CMVP Validation Authority Requirements for ISO/IEC 19790 Annex E and ISO/IEC 24579 Section 6.17
3/20/2020
Status: Final |
Final | 3/20/2020 |
SP | 800-140D Rev. 2 |
SP 800-140D Rev. 2 (Final)
Cryptographic Module Validation Program (CMVP)-Approved Sensitive Security Parameter Generation and Establishment Methods: CMVP Validation Authority Updates to ISO/IEC 24759
7/25/2023
Status: Final |
Final | 7/25/2023 |
SP | 800-140C Rev. 2 |
SP 800-140C Rev. 2 (Final)
Cryptographic Module Validation Program (CMVP)-Approved Security Functions: CMVP Validation Authority Updates to ISO/IEC 24759
7/25/2023
Status: Final |
Final | 7/25/2023 |
SP | 800-140B Rev. 1 |
SP 800-140B Rev. 1 (Final)
Cryptographic Module Validation Program (CMVP) Security Policy Requirements: CMVP Validation Authority Updates to ISO/IEC 24759 and ISO/IEC 19790 Annex B
11/17/2023
Status: Final |
Final | 11/17/2023 |
SP | 800-140A |
SP 800-140A (Final)
CMVP Documentation Requirements: CMVP Validation Authority Updates to ISO/IEC 24759
3/20/2020
Status: Final |
Final | 3/20/2020 |
SP | 800-140 |
SP 800-140 (Final)
FIPS 140-3 Derived Test Requirements (DTR): CMVP Validation Authority Updates to ISO/IEC 24759
3/20/2020
Status: Final |
Final | 3/20/2020 |
SP | 800-137A |
SP 800-137A (Final)
Assessing Information Security Continuous Monitoring (ISCM) Programs: Developing an ISCM Program Assessment
5/21/2020
Status: Final |
Final | 5/21/2020 |
SP | 800-137 |
SP 800-137 (Final)
Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations
9/30/2011
Status: Final |
Final | 9/30/2011 |
SP | 800-135 Rev. 1 |
12/23/2011
Status: Final |
Final | 12/23/2011 |
SP | 800-133 Rev. 2 |
6/04/2020
Status: Final |
Final | 6/04/2020 |
SP | 800-132 |
12/22/2010
Status: Final |
Final | 12/22/2010 |
SP | 800-131A Rev. 3 |
SP 800-131A Rev. 3 (Initial Public Draft)
Transitioning the Use of Cryptographic Algorithms and Key Lengths
10/21/2024
Status: Draft |
Draft | 10/21/2024 |
SP | 800-131A Rev. 2 |
3/21/2019
Status: Final |
Final | 3/21/2019 |
SP | 800-130 |
8/15/2013
Status: Final |
Final | 8/15/2013 |
SP | 800-128 |
10/10/2019
Status: Final |
Final | 10/10/2019 |
SP | 800-126 Rev. 3 |
SP 800-126 Rev. 3 (Final)
The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3
2/14/2018
Status: Final |
Final | 2/14/2018 |
SP | 800-126 Rev. 2 |
SP 800-126 Rev. 2 (Final)
The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.2
3/19/2012
Status: Final |
Final | 3/19/2012 |
SP | 800-126A |
SP 800-126A (Final)
SCAP 1.3 Component Specification Version Updates: An Annex to NIST Special Publication 800-126 Revision 3
2/14/2018
Status: Final |
Final | 2/14/2018 |
SP | 800-126 Rev. 1 |
SP 800-126 Rev. 1 (Final)
The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.1
2/25/2011
Status: Final |
Final | 2/25/2011 |
SP | 800-125B |
3/07/2016
Status: Final |
Final | 3/07/2016 |
SP | 800-125A Rev. 1 |
6/07/2018
Status: Final |
Final | 6/07/2018 |
SP | 800-125 |
1/28/2011
Status: Final |
Final | 1/28/2011 |
SP | 800-124 Rev. 2 |
5/17/2023
Status: Final |
Final | 5/17/2023 |
SP | 800-123 |
7/25/2008
Status: Final |
Final | 7/25/2008 |
SP | 800-122 |
SP 800-122 (Final)
Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)
4/06/2010
Status: Final |
Final | 4/06/2010 |
SP | 800-121 Rev. 2 |
1/19/2022
Status: Final |
Final | 1/19/2022 |
SP | 800-119 |
12/29/2010
Status: Final |
Final | 12/29/2010 |
SP | 800-116 Rev. 1 |
6/29/2018
Status: Final |
Final | 6/29/2018 |
SP | 800-115 |
9/30/2008
Status: Final |
Final | 9/30/2008 |
SP | 800-114 Rev. 1 |
7/29/2016
Status: Final |
Final | 7/29/2016 |
SP | 800-113 |
7/01/2008
Status: Final |
Final | 7/01/2008 |
SP | 800-111 |
11/15/2007
Status: Final |
Final | 11/15/2007 |
SP | 800-108 Rev. 1 |
2/02/2024
Status: Final |
Final | 2/02/2024 |
SP | 800-107 Rev. 1 |
8/24/2012
Status: Final |
Final | 8/24/2012 |
SP | 800-101 Rev. 1 |
5/15/2014
Status: Final |
Final | 5/15/2014 |
SP | 800-100 Rev. 1 |
SP 800-100 Rev. 1 (Initial Preliminary Draft)
PRE-DRAFT Call for Comments | Information Security Handbook: A Guide for Managers
1/09/2024
Status: Draft |
Draft | 1/09/2024 |
SP | 800-100 |
3/07/2007
Status: Final |
Final | 3/07/2007 |
SP | 800-98 |
4/06/2007
Status: Final |
Final | 4/06/2007 |
SP | 800-97 |
2/07/2007
Status: Final |
Final | 2/07/2007 |
SP | 800-96 |
12/29/2006
Status: Final |
Final | 12/29/2006 |
SP | 800-95 |
8/29/2007
Status: Final |
Final | 8/29/2007 |
SP | 800-94 |
2/20/2007
Status: Final |
Final | 2/20/2007 |
SP | 800-92 Rev. 1 |
10/11/2023
Status: Draft |
Draft | 10/11/2023 |
SP | 800-92 |
9/13/2006
Status: Final |
Final | 9/13/2006 |
SP | 800-90C |
9/25/2025
Status: Final |
Final | 9/25/2025 |
SP | 800-90B |
1/10/2018
Status: Final |
Final | 1/10/2018 |
SP | 800-90A Rev. 2 |
SP 800-90A Rev. 2 (Initial Preliminary Draft)
PRE-DRAFT Call for Comments: Recommendation for Random Number Generation Using Deterministic Random Bit Generators
9/04/2025
Status: Draft |
Draft | 9/04/2025 |
SP | 800-90A Rev. 1 |
SP 800-90A Rev. 1 (Final)
Recommendation for Random Number Generation Using Deterministic Random Bit Generators
6/24/2015
Status: Final |
Final | 6/24/2015 |
SP | 800-89 |
11/30/2006
Status: Final |
Final | 11/30/2006 |
SP | 800-88 Rev. 2 |
9/26/2025
Status: Final |
Final | 9/26/2025 |
SP | 800-87 Rev. 2 |
4/19/2018
Status: Final |
Final | 4/19/2018 |
SP | 800-86 |
9/01/2006
Status: Final |
Final | 9/01/2006 |
SP | 800-85B |
7/31/2006
Status: Final |
Final | 7/31/2006 |
SP | 800-85A-4 |
SP 800-85A-4 (Final)
PIV Card Application and Middleware Interface Test Guidelines (SP 800-73-4 Compliance)
4/13/2016
Status: Final |
Final | 4/13/2016 |
SP | 800-84 |
9/21/2006
Status: Final |
Final | 9/21/2006 |
SP | 800-83 Rev. 1 |
7/22/2013
Status: Final |
Final | 7/22/2013 |
SP | 800-82 Rev. 3 |
9/28/2023
Status: Final |
Final | 9/28/2023 |
SP | 800-81 Rev. 3 |
4/10/2025
Status: Draft |
Draft | 4/10/2025 |
SP | 800-81-2 |
9/18/2013
Status: Final |
Final | 9/18/2013 |
SP | 800-79 Rev. 3 |
SP 800-79 Rev. 3 (Initial Public Draft)
Guidelines for the Authorization of PIV Card and Derived PIV Credential Issuers
12/13/2023
Status: Draft |
Draft | 12/13/2023 |
SP | 800-79-2 |
SP 800-79-2 (Final)
Guidelines for the Authorization of Personal Identity Verification Card Issuers (PCI) and Derived PIV Credential Issuers (DPCI)
7/30/2015
Status: Final |
Final | 7/30/2015 |
SP | 800-78-5 |
7/15/2024
Status: Final |
Final | 7/15/2024 |
SP | 800-77 Rev. 1 |
6/30/2020
Status: Final |
Final | 6/30/2020 |
SP | 800-76-2 |
7/11/2013
Status: Final |
Final | 7/11/2013 |
SP | 800-73-5 |
SP 800-73-5 (Final)
Interfaces for Personal Identity Verification: Part 1 – PIV Card Application Namespace, Data Model and Representation
7/15/2024
Status: Final |
Final | 7/15/2024 |
SP | 800-73-5 |
SP 800-73-5 (Final)
Interfaces for Personal Identity Verification: Part 2 – PIV Card Application Card Command Interface
7/15/2024
Status: Final |
Final | 7/15/2024 |
SP | 800-73-5 |
Interfaces for Personal Identity Verification: Part 3 – PIV Client Application Programming Interface
SP 800-73-5 (Final)
Interfaces for Personal Identity Verification: Part 3 – PIV Client Application Programming Interface
7/15/2024
Status: Final |
Final | 7/15/2024 |
SP | 800-72 |
11/01/2004
Status: Final |
Final | 11/01/2004 |
SP | 800-71 |
7/02/2018
Status: Draft |
Draft | 7/02/2018 |
SP | 800-70 Rev. 4 |
SP 800-70 Rev. 4 (Final)
National Checklist Program for IT Products: Guidelines for Checklist Users and Developers
2/15/2018
Status: Final |
Final | 2/15/2018 |
SP | 800-66 Rev. 2 |
SP 800-66 Rev. 2 (Final)
Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule: A Cybersecurity Resource Guide
2/14/2024
Status: Final |
Final | 2/14/2024 |
SP | 800-63-4 |
7/31/2025
Status: Final |
Final | 7/31/2025 |
SP | 800-63C-4 |
7/31/2025
Status: Final |
Final | 7/31/2025 |
SP | 800-63B-4 |
7/31/2025
Status: Final |
Final | 7/31/2025 |
SP | 800-63A-4 |
7/31/2025
Status: Final |
Final | 7/31/2025 |
SP | 800-61 Rev. 3 |
SP 800-61 Rev. 3 (Final)
Incident Response Recommendations and Considerations for Cybersecurity Risk Management: A CSF 2.0 Community Profile
4/03/2025
Status: Final |
Final | 4/03/2025 |
SP | 800-60 Vol. 2 Rev. 1 |
SP 800-60 Vol. 2 Rev. 1 (Final)
Guide for Mapping Types of Information and Information Systems to Security Categories: Appendices
8/01/2008
Status: Final |
Final | 8/01/2008 |
SP | 800-60 Rev. 2 |
SP 800-60 Rev. 2 (Initial Working Draft)
Guide for Mapping Types of Information and Systems to Security Categories
1/31/2024
Status: Draft |
Draft | 1/31/2024 |
SP | 800-60 Vol. 1 Rev. 1 |
SP 800-60 Vol. 1 Rev. 1 (Final)
Guide for Mapping Types of Information and Information Systems to Security Categories
8/01/2008
Status: Final |
Final | 8/01/2008 |
SP | 800-59 |
8/20/2003
Status: Final |
Final | 8/20/2003 |
SP | 800-58 |
1/01/2005
Status: Final |
Final | 1/01/2005 |
SP | 800-57 Part 3 Rev. 1 |
SP 800-57 Part 3 Rev. 1 (Final)
Recommendation for Key Management, Part 3: Application-Specific Key Management Guidance
1/22/2015
Status: Final |
Final | 1/22/2015 |
SP | 800-57 Part 2 Rev. 1 |
SP 800-57 Part 2 Rev. 1 (Final)
Recommendation for Key Management: Part 2 – Best Practices for Key Management Organizations
5/23/2019
Status: Final |
Final | 5/23/2019 |
SP | 800-57 Part 1 Rev. 5 |
5/04/2020
Status: Final |
Final | 5/04/2020 |
SP | 800-56C Rev. 2 |
8/18/2020
Status: Final |
Final | 8/18/2020 |
SP | 800-56B Rev. 2 |
SP 800-56B Rev. 2 (Final)
Recommendation for Pair-Wise Key-Establishment Using Integer Factorization Cryptography
3/21/2019
Status: Final |
Final | 3/21/2019 |
SP | 800-56A Rev. 3 |
SP 800-56A Rev. 3 (Final)
Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography
4/16/2018
Status: Final |
Final | 4/16/2018 |
SP | 800-55 Vol. 2 |
SP 800-55 Vol. 2 (Final)
Measurement Guide for Information Security: Volume 2 — Developing an Information Security Measurement Program
12/04/2024
Status: Final |
Final | 12/04/2024 |
SP | 800-55 Vol. 1 |
SP 800-55 Vol. 1 (Final)
Measurement Guide for Information Security: Volume 1 — Identifying and Selecting Measures
12/04/2024
Status: Final |
Final | 12/04/2024 |
SP | 800-53 Rev. 5 |
12/10/2020
Status: Final |
Final | 12/10/2020 |
SP | 800-53B |
12/10/2020
Status: Final |
Final | 12/10/2020 |
SP | 800-53A Rev. 5 |
SP 800-53A Rev. 5 (Final)
Assessing Security and Privacy Controls in Information Systems and Organizations
1/25/2022
Status: Final |
Final | 1/25/2022 |
SP | 800-52 Rev. 2 |
SP 800-52 Rev. 2 (Final)
Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations
8/29/2019
Status: Final |
Final | 8/29/2019 |
SP | 800-51 Rev. 1 |
2/25/2011
Status: Final |
Final | 2/25/2011 |
SP | 800-50 Rev. 1 |
9/12/2024
Status: Final |
Final | 9/12/2024 |
SP | 800-49 |
11/05/2002
Status: Final |
Final | 11/05/2002 |
SP | 800-47 Rev. 1 |
7/20/2021
Status: Final |
Final | 7/20/2021 |
SP | 800-46 Rev. 3 |
SP 800-46 Rev. 3 (Initial Preliminary Draft)
PRE-DRAFT Call for Comments: Guide to Enterprise Telework Security
9/10/2020
Status: Draft |
Draft | 9/10/2020 |
SP | 800-46 Rev. 2 |
SP 800-46 Rev. 2 (Final)
Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security
7/29/2016
Status: Final |
Final | 7/29/2016 |
SP | 800-45 Version 2 |
2/20/2007
Status: Final |
Final | 2/20/2007 |
SP | 800-44 Version 2 |
10/09/2007
Status: Final |
Final | 10/09/2007 |
SP | 800-41 Rev. 1 |
9/28/2009
Status: Final |
Final | 9/28/2009 |
SP | 800-40 Rev. 4 |
SP 800-40 Rev. 4 (Final)
Guide to Enterprise Patch Management Planning: Preventive Maintenance for Technology
4/06/2022
Status: Final |
Final | 4/06/2022 |
SP | 800-39 |
SP 800-39 (Final)
Managing Information Security Risk: Organization, Mission, and Information System View
3/01/2011
Status: Final |
Final | 3/01/2011 |
SP | 800-38G Rev. 1 |
SP 800-38G Rev. 1 (2nd Public Draft)
Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption
2/03/2025
Status: Draft |
Draft | 2/03/2025 |
SP | 800-38G |
SP 800-38G (Final)
Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption
8/04/2016
Status: Final |
Final | 8/04/2016 |
SP | 800-38F |
12/13/2012
Status: Final |
Final | 12/13/2012 |
SP | 800-38E |
SP 800-38E (Final)
Recommendation for Block Cipher Modes of Operation: the XTS-AES Mode for Confidentiality on Storage Devices
1/18/2010
Status: Final |
Final | 1/18/2010 |
SP | 800-38D Rev. 1 |
SP 800-38D Rev. 1 (Initial Preliminary Draft)
Pre-Draft Call for Comments: GCM and GMAC Block Cipher Modes of Operation
1/06/2025
Status: Draft |
Draft | 1/06/2025 |
SP | 800-38D |
SP 800-38D (Final)
Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC
11/28/2007
Status: Final |
Final | 11/28/2007 |
SP | 800-38C |
SP 800-38C (Final)
Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality
7/20/2007
Status: Final |
Final | 7/20/2007 |
SP | 800-38B |
SP 800-38B (Final)
Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication
10/06/2016
Status: Final |
Final | 10/06/2016 |
SP | 800-38A |
SP 800-38A (Final)
Recommendation for Block Cipher Modes of Operation: Three Variants of Ciphertext Stealing for CBC Mode
10/21/2010
Status: Final |
Final | 10/21/2010 |
SP | 800-38A |
12/01/2001
Status: Final |
Final | 12/01/2001 |
SP | 800-37 Rev. 2 |
SP 800-37 Rev. 2 (Final)
Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy
12/20/2018
Status: Final |
Final | 12/20/2018 |
SP | 800-35 |
10/09/2003
Status: Final |
Final | 10/09/2003 |
SP | 800-34 Rev. 1 |
11/11/2010
Status: Final |
Final | 11/11/2010 |
SP | 800-30 Rev. 1 |
9/17/2012
Status: Final |
Final | 9/17/2012 |
SP | 800-28 Version 2 |
3/07/2008
Status: Final |
Final | 3/07/2008 |
SP | 800-22 Rev. 1 |
SP 800-22 Rev. 1 (Final)
A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
4/30/2010
Status: Final |
Final | 4/30/2010 |
SP | 800-18 Rev. 2 |
SP 800-18 Rev. 2 (Initial Public Draft)
Developing Security, Privacy, and Cybersecurity Supply Chain Risk Management Plans for Systems
6/04/2025
Status: Draft |
Draft | 6/04/2025 |
SP | 800-18 Rev. 1 |
2/24/2006
Status: Final |
Final | 2/24/2006 |
SP | 800-12 Rev. 1 |
6/22/2017
Status: Final |
Final | 6/22/2017 |
SP | 500-325 |
3/14/2018
Status: Final |
Final | 3/14/2018 |
SP | 500-320 |
SP 500-320 (Final)
Report of the Workshop on Software Measures and Metrics to Reduce Security Vulnerabilities (SwMM-RSV)
11/10/2016
Status: Final |
Final | 11/10/2016 |
SP | 500-304 |
SP 500-304 (Final)
Conformance Testing Methodology Framework for ANSI/NIST-ITL 1-2011 Update: 2013, Data Format for the Interchange of Fingerprint, Facial & Other Biometric Information
6/24/2015
Status: Final |
Final | 6/24/2015 |
SP | 500-189 |
9/01/1991
Status: Final |
Final | 9/01/1991 |
SP | 500-174 |
10/01/1989
Status: Final |
Final | 10/01/1989 |
SP | 500-171 |
10/01/1989
Status: Final |
Final | 10/01/1989 |
SP | 500-170 |
10/01/1989
Status: Final |
Final | 10/01/1989 |
SP | 500-169 |
10/01/1989
Status: Final |
Final | 10/01/1989 |
SP | 500-166 |
8/01/1989
Status: Final |
Final | 8/01/1989 |
SP | 500-160 |
SP 500-160 (Final)
Report of the Invitational Workshop on Integrity Policy in Computer Information Systems (WIPCIS)
1/01/1989
Status: Final |
Final | 1/01/1989 |
SP | 500-158 |
8/01/1988
Status: Final |
Final | 8/01/1988 |
SP | 500-157 |
9/01/1988
Status: Final |
Final | 9/01/1988 |
SP | 500-156 |
5/01/1988
Status: Final |
Final | 5/01/1988 |
SP | 500-153 |
SP 500-153 (Final)
Guide to Auditing for Controls and Security: A System Development Life Cycle Approach
4/01/1988
Status: Final |
Final | 4/01/1988 |
SP | 500-137 |
5/01/1986
Status: Final |
Final | 5/01/1986 |
SP | 500-134 |
11/01/1985
Status: Final |
Final | 11/01/1985 |
SP | 500-133 |
10/01/1985
Status: Final |
Final | 10/01/1985 |
SP | 500-120 |
1/01/1985
Status: Final |
Final | 1/01/1985 |
SP | 500-109 |
4/01/1984
Status: Final |
Final | 4/01/1984 |
SP | 500-85 |
1/01/1982
Status: Final |
Final | 1/01/1982 |
SP | 500-61 |
8/01/1980
Status: Final |
Final | 8/01/1980 |
SP | 500-57 |
4/01/1980
Status: Final |
Final | 4/01/1980 |
SP | 500-54 |
10/01/1979
Status: Final |
Final | 10/01/1979 |
SP | 500-42 |
1/01/1979
Status: Final |
Final | 1/01/1979 |
SP | 500-30 |
4/01/1978
Status: Final |
Final | 4/01/1978 |
SP | 500-27 |
SP 500-27 (Final)
Computer Security and the Data Encryption Standard: Proceedings of the Conference on Computer Security and the Data Encryption Standard
2/01/1978
Status: Final |
Final | 2/01/1978 |
SP | 500-25 |
An Analysis of Computer Security Safeguards for Detecting and Preventing Intentional Computer Misuse
SP 500-25 (Final)
An Analysis of Computer Security Safeguards for Detecting and Preventing Intentional Computer Misuse
1/01/1978
Status: Final |
Final | 1/01/1978 |
SP | 500-24 |
1/01/1978
Status: Final |
Final | 1/01/1978 |
SP | 500-21 Vol. 2 |
SP 500-21 Vol. 2 (Final)
The Network Security Center: a System Level Approach to Computer Network Security
1/01/1978
Status: Final |
Final | 1/01/1978 |
SP | 500-21 Vol. 1 |
1/01/1978
Status: Final |
Final | 1/01/1978 |
SP | 500-20 |
SP 500-20 (Final)
Validating the Correctness of Hardware Implementations of the NBS Data Encryption Standard
9/01/1980
Status: Final |
Final | 9/01/1980 |
SP | 500-19 |
10/01/1977
Status: Final |
Final | 10/01/1977 |
SP | 500-9 |
5/01/1977
Status: Final |
Final | 5/01/1977 |
SP | 404 |
9/01/1974
Status: Final |
Final | 9/01/1974 |
Current Publications
-
NIST Series Pubs
- Final Pubs
- Drafts Open for Comment
- Drafts (all)
- View By Series
- Other Pubs
Public Drafts: Current list of all draft NIST cybersecurity documents--they are typically posted for public comment. "Current" public drafts are the latest draft versions that have not yet been published as "Final." FIPS: Current Federal Information Processing Standard Publications (FIPS). Includes current (Final and Draft) FIPS.
SP 800 Series: Current NIST Special Publication (SP) 800 series publications, which focus on Computer/Information Security. Includes current (Final and Draft) SP 800 pubs.
All SP Series: Current NIST Special Publications (SP), including SP 800 (Computer/Information Security) and SP 1800 (Cybersecurity Practice Guides) pubs. Also includes SP 500 (Computer Systems Technology) pubs related to cybersecurity and privacy. Includes current (Final and Draft) NIST Special Publications.
NISTIRs: Current list of NIST Interagency or Internal Reports (NISTIR) related to cybersecurity and privacy. Includes current (Final and Draft) NISTIRs.
ITL Bulletins: Current list of NIST Information Technology Laboratory (ITL) Bulletins. White Papers: Consists of NIST Cybersecurity White Papers; NCCoE Project Descriptions, Building Blocks and Use Cases; and other NIST-authored papers that are not part of a formal series. Includes current (Final and Draft) papers.
Journal Articles: NIST-authored articles published in external journals and in the NIST Journal of Research (JRES).
Conference Papers: NIST-authored conference papers related to cybersecurity and privacy.
Books: NIST-authored books, book sections, and encyclopedia entries related to cybersecurity and privacy.