NIST Logo and ITL Banner Link to the NIST Homepage Link to the ITL Homepage Link to the NIST Homepage
Search CSRC:
Computer Security Division Documents Guide Click Here to download the "Guide to NIST Information Security Documents."
Computer Security Division Roadmap to NIST Information Security Documents Click Here to download the "Roadmap to NIST Information Security Documents."
*NOTE: Categories in the Families, Topic Clusters, and Legal Requirements listings are from the "Guide to NIST Information Security Documents."

Publications

By NIST IRs

NIST Interagency Reports (NISTIRs) describe research of a technical nature of interest to a specialized audience. The series includes interim or final reports on work performed by NIST for outside sponsors (both government and nongovernment). NISTIRs may also report results of NIST projects of transitory or limited interest, including those that will be published subsequently in more comprehensive form.

NIST IRs
NumberDateTitle
NIST IR 7516Aug 2008Forensic Filtering of Cell Phone Protocols
nistir-7516_forensic-filter.pdf
NIST IR 7511Aug. 13, 2008DRAFT Security Content Automation Protocol (SCAP) Validation Program Test Requirements
Draft-NISTIR-7511.pdf
NIST IR 7502May 30, 2008DRAFT The Common Configuration Scoring System (CCSS)
Draft-NISTIR-7502.pdf
NIST IR 7452Nov 2007Secure Biometric Match-on-Card Feasibility Report
NISTIR-7452.pdf
NIST IR 7442Apr 2008Computer Security Division 2007 Annual Report
NIST-IR-7442_2007CSDAnnualReport.pdf
NIST IR 7435Aug 2007The Common Vulnerability Scoring System (CVSS) and Its Applicability to Federal Agency Systems
NISTIR-7435.pdf
NISTIR-7435_pdf.zip
NIST IR 7427Sep 20076th Annual PKI R&D Workshop "Applications-Driven PKI" Proceedings
NISTIR7427_PKI_2007.pdf
NISTIR7427-PKI.zip
NIST IR 7399Mar 2007Computer Security Division 2006 Annual Report
NISTIR7399_CSDAnnualReport2006.pdf
nistir7399.zip
NIST IR 7387Mar 2007Cell Phone Forensic Tools: An Overview and Analysis Update,
nistir-7387.pdf
nistir-7387-pdf.zip
NIST IR 7359Jan 2007Information Security Guide For Government Executives
NISTIR-7359.pdf
CSD_ExecGuide-booklet.pdf
NIST IR 7358Jan 2007Program Review for Information Security Management Assistance (PRISMA)
NISTIR-7358.pdf
NIST IR 7337Aug 2006Personal Identity Verification Demonstration Summary
NISTIR-7337_CRADA_082006.pdf
NIST IR 7328Sep 29, 2007DRAFT Security Assessment Provider Requirements and Customer Responsibilities: Building a Security Assessment Credentialing Program for Federal Information Systems
NISTIR_7328-ipdraft.pdf
NIST IR 7316Sep 2006Assessment of Access Control Systems
NISTIR-7316.pdf
NIST IR 7313Jul 20065th Annual PKI R&D Workshop "Making PKI Easy to Use" Proceedings
NIST-IR-7313_Final.pdf
NIST IR 7298Apr 2006Glossary of Key Information Security Terms
NISTIR-7298_Glossary_Key_Infor_Security_Terms.pdf
nistir-7298.zip
NIST IR 7290Mar 2006Fingerprint Identification and Mobile Handheld Devices: Overview and Implementation
NIST-IR-7290-pp-mobileFprint-final.pdf
NIST IR 7285Feb 2006Computer Security Division 2005 Annual Report
nistir-7285-CSD-2005-Annual-Report.pdf
NIST IR 7284Jan 2006Personal Identity Verification Card Management Report
nistir-7284.pdf
NIST IR 7275 Rev. 3Jan 2008Specification for the Extensible Configuration Checklist Description Format (XCCDF) Version 1.1.4
NISTIR-7275r3.pdf
NISTIR-7275r3pdf.zip
NIST IR 7250Oct 2005Cell Phone Forensic Tools: An Overview and Analysis
nistir-7250.pdf
nistir-7250.zip
NIST IR 7224Aug 20054th Annual PKI R&D Workshop: Multiple Paths to Trust Proceedings
NISTIR-7224.zip
NIST IR 7219Apr 2005Computer Security Division 2004 Annual Report
NISTIR7219-CSD-2004-Annual-Report.pdf
nistir-7219pdf.zip
NIST IR 7206Jul 2005Smart Cards and Mobile Device Authentication: An Overview and Implementation
nist-IR-7206.pdf
NIST IR 7200Jun 2005Proximity Beacons and Mobile Handheld Devices: Overview and Implementation
NIST-IR-7200.pdf
NIST IR 7111Apr 2004Computer Security Division 2003 Annual Report
IR7111-CSDAnnualReport.pdf
NIST IR 7100Aug 2004PDA Forensic Tools:An Overview and Analysis
nistir-7100-PDAForensics.pdf
NIST IR 7056Mar 2004Card Technology Development and Gap Analysis Interagency Report
nistir-7056.pdf
NIST IR 7046Aug 2003A Framework for Multi-Mode Authentication: Overview and Implementation Guide
nistir-7046.pdf
NIST IR 7030Jul 2003Picture Password: A Visual Login Technique for Mobile Devices
nistir-7030.pdf
NIST IR 7007Jun 2003An Overview of Issues in Testing Intrusion Detection Systems
nistir-7007.pdf
NIST IR 6985Apr 2003COTS Security Protection Profile - Operating Systems (CSPP-OS) (Worked Example Applying Guidance of NISTIR-6462, CSPP)
nistir-6985.pdf
nistir-6985.rtf
NIST IR 6981Apr 2003Policy Expression and Enforcement for Handheld Devices
nistir-6981.pdf
NIST IR 6887Jul 2003Government Smart Card Interoperability Specification
nistir-6887.pdf
NIST IR 6529 AApr 2004Common Biometric Exchange Formats Framework (CBEFF)
NISTIR6529A.pdf
NIST IR 6483Mar 2000Randomness Testing of the Advanced Encryption Standard Finalist Candidates
ir6483.pdf
ir6483.doc
NIST IR 6462Dec 1999CSPP - Guidance for COTS Security Protection Profiles
ir6462.pdf
ir6462.rtf
ir6462-rtf.zip
IR6462-pdf.zip
NIST IR 6416Oct 1999Applying Mobile Agents to Intrusion Detection and Response
ir6416.pdf
NIST IR 6390Sep 1999Randomness Testing of the Advanced Encryption Standard Candidate Algorithms
ir6390.pdf
ir6390.doc
NIST IR 54951994Computer Security Training & Awareness Course Compendium
ir5495.txt
NIST IR 5472Mar 1994A Head Start on Assurance Proceedings of an Invitational Workshop on Information Technology (IT) Assurance and Trustworthiness
ir5472.txt
NIST IR 5308Dec 1993General Procedures for Registering Computer Security Objects
ir5308.txt
NIST IR 5153Mar 1993Minimum Security Requirements for Multi-User Operating Systems
ir5153.txt
NIST IR 4976Nov 1992Assessing Federal and Commercial Information Security Needs
ir4976.txt
NIST IR 4939Oct 1992Threat Assessment of Malicious Code and External Attacks
index.html
ir4939.txt
ir4939.ps
NIST IR 4749Jun 1992Sample Statements of Work for Federal Computer Security Services: For use In-House or Contracting Out
ir4749.txt
NIST IR 4734Feb 1992Foundations of a Security Policy for use of the National Research and Educational Network
NISTIR-4734.pdf
Back to Top