SP 800-87 | Mar 2007 | Codes for the Identification of Federal and Federally Assisted Organizations * Withdrawn: Apr 2008 Superceded By: SP 800 87 Rev 1
|
SP 800-85 A | Apr 2006 | PIV Card Application and Middleware Interface Test Guidelines (SP800-73 compliance) * Withdrawn: Apr. 2009 Superceded By: SP 800 85 A-1
|
SP 800-79 | Jul 2005 | Guidelines for the Certification and Accreditation of PIV Card Issuing Organizations * Withdrawn: June 2008 Superceded By: SP 800 79 -1
|
SP 800-78 | Apr 2005 | Cryptographic Algorithms and Key Sizes for Personal Identity Verification * Withdrawn: Aug 2007 Superceded By: SP 800 78 -1
|
SP 800-76 | Feb 2006 | Biometric Data Specification for Personal Identity Verification * Withdrawn: Jan 2006 Superceded By: SP 800 76 -1
|
SP 800-73 -1 | Mar 2006 | Interfaces for Personal Identity Verification * Withdrawn: Sept 2008 Superceded By: SP 800 73 -2
|
SP 800-73 | Apr 2005 | Interfaces for Personal Identity Verification * Withdrawn: Mar 2006 Superceded By: SP 800 73 -2
|
SP 800-68 | Oct 2005 | Guidance for Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist * Withdrawn: October 2008 Superceded By: SP 800 68 Rev. 1
|
SP 800-66 | Mar 2005 | An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule * Withdrawn: Oct 2008 Superceded By: SP 800 66 Rev 1
|
SP 800-64 Rev.1 | Jun 2004 | Security Considerations in the Information System Development Life Cycle * Withdrawn: Oct 2008 Superceded By: SP 800 64 Rev. 2
|
SP 800-64 | Oct 2003 | Security Considerations in the Information System Development Life Cycle * Withdrawn: Jun 2004 Superceded By: SP 800 64 Rev.1
|
SP 800-61 | Jan 2004 | Computer Security Incident Handling Guide * Withdrawn: March 2008 Superceded By: SP 800 61 Rev. 1
|
SP 800-60 | Jun 2004 | Guide for Mapping Types of Information and Information Systems to Security Categories * Withdrawn: August 2008 Superceded By: SP 800 60 Rev. 1
|
SP 800-55 | Jul 2003 | Security Metrics Guide for Information Technology Systems * Withdrawn: July 2008 Superceded By: SP 800 55 Rev. 1
|
SP 800-53 Rev. 1 | Dec 2006 | Recommended Security Controls for Federal Information SystemsWithdrawn: July 2009 Superceded By: SP 800 53 Rev. 3
|
SP 800-53 | Feb 2005 | Recommended Security Controls for Federal Information Systems * Withdrawn: Dec 2006 Superceded By: SP 800 53 Rev. 2
|
SP 800-48 | Nov 2002 | Wireless Network Security: 802.11, Bluetooth, and Handheld Devices * Withdrawn: July 2008 Superceded By: SP 800 48 Rev. 1
|
SP 800-46 | Aug 2002 | Security for Telecommuting and Broadband CommunicationsWithdrawn: June 2009 Superceded By: SP 800 46 Rev. 1
|
SP 800-45 | Sep 2002 | Guidelines on Electronic Mail Security * Withdrawn: Feb 2007 Superceded By: SP 800 45 Version 2
|
SP 800-44 | Sep 2002 | Guidelines on Securing Public Web Servers * Withdrawn: Sep 2007 Superceded By: SP 800 44 Version 2
|
SP 800-42 | Oct 2003 | Guideline on Network Security Testing * Withdrawn: Sept 2008 Superceded By: SP 800 115
|
SP 800-40 | Aug 2002 | Creating a Patch and Vulnerability Management Program * Withdrawn: Nov 2005 Superceded By: SP 800 40 Version 2.0
|
SP 800-31 | Aug 2001 | Intrusion Detection Systems * Withdrawn: February 2007 Superceded By: SP 800 94
|
SP 800-28 | Oct 2001 | Guidelines on Active Content and Mobile Code * Withdrawn: March 2008 Superceded By: SP 800 28 Version 2
|
SP 800-28 | Oct 2001 | Guidelines on Active Content and Mobile Code * Withdrawn: Mar 2008 Superceded By: SP 800 28 Version 2
|
SP 800-27 | Jun 2001 | Engineering Principles for Information Technology Security (A Baseline for Achieving Security) * Withdrawn: Jun 2004 Superceded By: SP 800 27 Rev. A
|
SP 800-26 Rev.1 | Apr 2005 | Guide for Information Technology Security Assessments and System Reporting Form * Withdrawn: Feb. 2007 Superceded By: FIPS 200, SP 800-53, SP 800-53A
|
SP 800-26 | Nov 2001 | Security Self-Assessment Guide for Information Technology Systems * Withdrawn: Feb. 2007 Superceded By: FIPS 200, SP 800-53, SP 800-53A
|
SP 800-22 | May 2001 | A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications * Withdrawn: Aug. 2008 Superceded By: SP 800 22 Rev. 1
|
SP 800-21 | Nov 1999 | Guideline for Implementing Cryptography in the Federal Government * Withdrawn: Dec 2005 Superceded By: SP 800 21 2nd edition
|
SP 800-18 | Dec 1998 | Guide for Developing Security Plans for Federal Information Systems * Withdrawn: Feb 2006 Superceded By: SP 800 18 Rev.1
|
SP 800-11 | February 1995 | The Impact of the FCC's Open Network Architecture on NS/EP Telecommunications Security *
|
SP 800-10 | December 1994 | Keeping Your Site Comfortably Secure: An Introduction to Internet Firewalls *
|
SP 800-9 | December 1993 | Good Security Practices for Electronic Commerce, Including Electronic Data Interchange *
|
SP 800-8 | August 1993 | Security Issues in the Database Language SQL *
|
SP 800-7 | July 1994 | Security in Open Systems *
|
SP 800-6 | December 1992 | Automated Tools for Testing Computer System Vulnerability *
|
SP 800-5 | December 1992 | A Guide to the Selection of Anti-Virus Tools and Techniques *
|
SP 800-4 | March 1992 | Computer Security Considerations in Federal Procurements: A Guide for Procurement Initiatiors, Contracting Officers, and Computer Security * Withdrawn: October 2003 Superceded By: SP 800-64 Security Considerations in the Information System Development Life Cycle
|
SP 800-3 | November 1991 | Establishing a Computer Security Incident Response Capability (CSIRC) * Withdrawn: January 2004 Superceded By: SP 800 61 Computer Security Incident Handling Guide
|
SP 800-2 | April 1991 | Public-Key Cryptography *
|
SP 500 189 | September 1991 | Security in ISDN *
|
SP 500 174 | October 1989 | Guide for Selecting Automated Risk Analysis Tools *
|
SP 500 172 | November 1989 | Computer Security Training Guidelines * Withdrawn: April 1998 Superceded By: SP 800 16 Information Technology Security Training Requirements: A Role- and Performance- Based Model
|
SP 500 171 | 1989 | Computer Users' Guide to the Protection of Information Resources *
|
SP 500 170 | 1989 | Management Guide to the Protection of Information Resources *
|
SP 500 169 | 1989 | Executive Guide to the Protection of Information Resources *
|
SP 500 166 | August 1989 | Computer Viruses and Related Threats: A Management Guide *
|
SP 500 158 | August 1988 | Accuracy, Integrity, and Security in Computerized Vote-Tallying *
|
sP 500 157 | September 1988 | Smart Card Technology: New Methods for Computer Access Control *
|
SP 500 156 | May 1988 | Message Authentication Code (MAC) Validation System: Requirements and Procedures *
|
SP 500 153 | April 1988 | Guide to Auditing for Controls and Security: A System Development Life Cycle Approach *
|
SP 500 134 | November 1985 | Guide on Selecting ADP Backup Process Alternatives *
|
SP 500 133 | October 1985 | Technology Assessment: Methods for Measuring the Level of Computer Security *
|
SP 500 120 | January 1985 | Security of Personal Computer Systems - A Management Guide *
|
SP 500 61 | August 1980 | Maintenance Testing for the Data Encryption Standard *
|