SP 800-135 | Dec. 2010 | Recommendation for Existing Application-Specific Key Derivation FunctionsWithdrawn: Dec. 2011 Superceded By: SP 800 135 Rev. 1
|
SP 800-131 | | Recommendation for the Transitioning of Cryptographic Algorithms and Key SizesWithdrawn: Jan. 2011 Superceded By: SP 800 131 A
|
SP 800-121 | Sept 2008 | Guide to Bluetooth SecurityWithdrawn: June 2012 Superceded By: SP 800 121 Rev. 1
|
SP 800-107 | Feb. 2009 | Recommendation for Applications Using Approved Hash AlgorithmsWithdrawn: Aug. 2012 Superceded By: SP 800 107 Rev. 1
|
SP 800-90 | Mar 2007 | Recommendation for Random Number Generation Using Deterministic Random Bit GeneratorsWithdrawn: Jan. 2012 Superceded By: SP 800 90 A
|
SP 800-87 | Mar 2007 | Codes for the Identification of Federal and Federally Assisted Organizations * Withdrawn: Apr 2008 Superceded By: SP 800 87 Rev 1
|
SP 800-85 A-1 | Mar. 2009 | PIV Card Application and Middleware Interface Test Guidelines (SP 800-73-2 Compliance)Withdrawn: July 2010 Superceded By: SP 800 85 A-2
|
SP 800-85 A | Apr 2006 | PIV Card Application and Middleware Interface Test Guidelines (SP800-73 compliance) * Withdrawn: Apr. 2009 Superceded By: SP 800 85 A-1
|
SP 800-81 | May 2006 | Secure Domain Name System (DNS) Deployment GuideWithdrawn: Aug. 2010 Superceded By: SP 800 81 Rev. 1
|
SP 800-79 | Jul 2005 | Guidelines for the Certification and Accreditation of PIV Card Issuing Organizations * Withdrawn: June 2008 Superceded By: SP 800 79 -1
|
SP 800-78 -2 | Feb. 2010 | Cryptographic Algorithms and Key Sizes for Personal Identification Verification (PIV)Withdrawn: Dec. 2010 Superceded By: SP 800 78 -3
|
SP 800-78 | Apr 2005 | Cryptographic Algorithms and Key Sizes for Personal Identity Verification * Withdrawn: Aug 2007 Superceded By: SP 800 78 -2
|
SP 800-76 | Feb 2006 | Biometric Data Specification for Personal Identity Verification * Withdrawn: Jan 2006 Superceded By: SP 800 76 -1
|
SP 800-73 -2 | Sept. 2008 | Interfaces for Personal Identity Verification (4 parts):
1- End-Point PIV Card Application Namespace, Data Model and Representation
2- End-Point PIV Card Application Interface
3- End-Point PIV Client Application Programming Interface
4- The PIV Transitional Data Model and InterfacesWithdrawn: Feb. 2010 Superceded By: SP 800 73 -3
|
SP 800-73 -1 | Mar 2006 | Interfaces for Personal Identity Verification * Withdrawn: Sept 2008 Superceded By: SP 800 73 -3
|
SP 800-73 | Apr 2005 | Interfaces for Personal Identity Verification * Withdrawn: Mar 2006 Superceded By: SP 800 73 -3
|
SP 800-70 Rev. 1 | Sept. 2009 | National Checklist Program for IT Products--Guidelines for Checklist Users and DevelopersWithdrawn: Feb. 2011 Superceded By: SP 800 70 Rev. 2
|
SP 800-70 | May 2005 | Security Configuration Checklists Program for IT Products: Guidance for Checklists Users and DeveloperWithdrawn: Sept. 2009 Superceded By: SP 800 70 Rev. 2
|
SP 800-68 | Oct 2005 | Guidance for Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist * Withdrawn: October 2008 Superceded By: SP 800 68 Rev. 1
|
SP 800-67 | May 2008 | Recommendation for the Triple Data Encryption Algorithm (TDEA) Block CipherWithdrawn: January 2012 Superceded By: SP 800 67 Rev. 1
|
SP 800-66 | Mar 2005 | An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule * Withdrawn: Oct 2008 Superceded By: SP 800 66 Rev 1
|
SP 800-64 Rev.1 | Jun 2004 | Security Considerations in the Information System Development Life Cycle * Withdrawn: Oct 2008 Superceded By: SP 800 64 Rev. 2
|
SP 800-64 | Oct 2003 | Security Considerations in the Information System Development Life Cycle * Withdrawn: Jun 2004 Superceded By: SP 800 64 Rev.1
|
SP 800-61 Rev. 1 | Mar 2008 | Computer Security Incident Handling GuideWithdrawn: Aug. 2012 Superceded By: SP 800 61 Rev. 2
|
SP 800-61 -1 | Aug 2007 | Cryptographic Algorithms and Key Sizes for Personal Identity Verification * Withdrawn: Feb. 2010 Superceded By: SP 800 78 -2
|
SP 800-61 | Jan 2004 | Computer Security Incident Handling Guide * Withdrawn: March 2008 Superceded By: SP 800 61 Rev. 1
|
SP 800-60 | Jun 2004 | Guide for Mapping Types of Information and Information Systems to Security Categories * Withdrawn: August 2008 Superceded By: SP 800 60 Rev. 1
|
SP 800-55 | Jul 2003 | Security Metrics Guide for Information Technology Systems * Withdrawn: July 2008 Superceded By: SP 800 55 Rev. 1
|
SP 800-53 Rev. 1 | Dec 2006 | Recommended Security Controls for Federal Information SystemsWithdrawn: July 2009 Superceded By: SP 800 53 Rev. 2
|
SP 800-53 | Feb 2005 | Recommended Security Controls for Federal Information Systems * Withdrawn: Dec 2006 Superceded By: SP 800 53 Rev. 1
|
SP 800-53 Rev. 2 | Dec 2007 | Recommended Security Controls for Federal Information SystemsWithdrawn: Dec. 2010 Superceded By: SP 800 53 Rev. 3
|
SP 800-53 A | Jul 2008 | Guide for Assessing the Security Controls in Federal Information SystemsWithdrawn: June 2011 Superceded By: SP 800 53 A Rev. 1
|
SP 800-51 | Sep 2002 | Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming SchemeWithdrawn: Feb. 2011 Superceded By: SP 800 51 Rev. 1
|
SP 800-48 | Nov 2002 | Wireless Network Security: 802.11, Bluetooth, and Handheld Devices * Withdrawn: July 2008 Superceded By: SP 800 48 Rev. 1
|
SP 800-46 | Aug 2002 | Security for Telecommuting and Broadband CommunicationsWithdrawn: June 2009 Superceded By: SP 800 46 Rev. 1
|
SP 800-45 | Sep 2002 | Guidelines on Electronic Mail Security * Withdrawn: Feb 2007 Superceded By: SP 800 45 Version 2
|
SP 800-44 | Sep 2002 | Guidelines on Securing Public Web Servers * Withdrawn: Sep 2007 Superceded By: SP 800 44 Version 2
|
SP 800-42 | Oct 2003 | Guideline on Network Security Testing * Withdrawn: Sept 2008 Superceded By: SP 800 115
|
SP 800-41 | Jan 2002 | Guidelines on Firewalls and Firewall PolicyWithdrawn: Sept. 2009 Superceded By: SP 800 41 Rev. 1
|
SP 800-40 | Aug 2002 | Creating a Patch and Vulnerability Management Program * Withdrawn: Nov 2005 Superceded By: SP 800 40 Version 2.0
|
SP 800-37 | May 2004 | Guide for the Security Certification and Accreditation of Federal Information SystemsWithdrawn: Feb. 2010 Superceded By: SP 800 37 Rev. 1
|
SP 800-34 | Jun 2002 | Contingency Planning Guide for Information Technology SystemsWithdrawn: May 2010 Superceded By: SP 800 34 Rev. 1
|
SP 800-31 | Aug 2001 | Intrusion Detection Systems * Withdrawn: February 2007 Superceded By: SP 800 94
|
SP 800-30 | Jul 2002 | Risk Management Guide for Information Technology SystemsWithdrawn: Sept. 2012 Superceded By: SP 800 30 Rev. 1
|
SP 800-28 | Oct 2001 | Guidelines on Active Content and Mobile Code * Withdrawn: March 2008 Superceded By: SP 800 28 Version 2
|
SP 800-28 | Oct 2001 | Guidelines on Active Content and Mobile Code * Withdrawn: Mar 2008 Superceded By: SP 800 28 Version 2
|
SP 800-27 | Jun 2001 | Engineering Principles for Information Technology Security (A Baseline for Achieving Security) * Withdrawn: Jun 2004 Superceded By: SP 800 27 Rev. A
|
SP 800-26 Rev.1 | Apr 2005 | Guide for Information Technology Security Assessments and System Reporting Form * Withdrawn: Feb. 2007 Superceded By: FIPS 200, SP 800-53, SP 800-53A
|
SP 800-26 | Nov 2001 | Security Self-Assessment Guide for Information Technology Systems * Withdrawn: Feb. 2007 Superceded By: FIPS 200, SP 800-53, SP 800-53A
|
SP 800-22 | May 2001 | A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications * Withdrawn: Aug. 2008 Superceded By: SP 800 22 Rev. 1
|
SP 800-21 | Nov 1999 | Guideline for Implementing Cryptography in the Federal Government * Withdrawn: Dec 2005 Superceded By: SP 800 21 2nd edition
|
SP 800-18 | Dec 1998 | Guide for Developing Security Plans for Federal Information Systems * Withdrawn: Feb 2006 Superceded By: SP 800 18 Rev.1
|
SP 800-11 | February 1995 | The Impact of the FCC's Open Network Architecture on NS/EP Telecommunications Security *
|
SP 800-10 | December 1994 | Keeping Your Site Comfortably Secure: An Introduction to Internet Firewalls *
|
SP 800-9 | December 1993 | Good Security Practices for Electronic Commerce, Including Electronic Data Interchange *
|
SP 800-8 | August 1993 | Security Issues in the Database Language SQL *
|
SP 800-7 | July 1994 | Security in Open Systems *
|
SP 800-6 | December 1992 | Automated Tools for Testing Computer System Vulnerability *
|
SP 800-5 | December 1992 | A Guide to the Selection of Anti-Virus Tools and Techniques *
|
SP 800-4 | March 1992 | Computer Security Considerations in Federal Procurements: A Guide for Procurement Initiatiors, Contracting Officers, and Computer Security * Withdrawn: October 2003 Superceded By: SP 800-64 Security Considerations in the Information System Development Life Cycle
|
SP 800-3 | November 1991 | Establishing a Computer Security Incident Response Capability (CSIRC) * Withdrawn: January 2004 Superceded By: SP 800 61 Computer Security Incident Handling Guide
|
SP 800-2 | April 1991 | Public-Key Cryptography *
|
SP 500 189 | September 1991 | Security in ISDN *
|
SP 500 174 | October 1989 | Guide for Selecting Automated Risk Analysis Tools *
|
SP 500 172 | November 1989 | Computer Security Training Guidelines * Withdrawn: April 1998 Superceded By: SP 800 16 Information Technology Security Training Requirements: A Role- and Performance- Based Model
|
SP 500 171 | 1989 | Computer Users' Guide to the Protection of Information Resources *
|
SP 500 170 | 1989 | Management Guide to the Protection of Information Resources *
|
SP 500 169 | 1989 | Executive Guide to the Protection of Information Resources *
|
SP 500 166 | August 1989 | Computer Viruses and Related Threats: A Management Guide *
|
SP 500 158 | August 1988 | Accuracy, Integrity, and Security in Computerized Vote-Tallying *
|
sP 500 157 | September 1988 | Smart Card Technology: New Methods for Computer Access Control *
|
SP 500 156 | May 1988 | Message Authentication Code (MAC) Validation System: Requirements and Procedures *
|
SP 500 153 | April 1988 | Guide to Auditing for Controls and Security: A System Development Life Cycle Approach *
|
SP 500 134 | November 1985 | Guide on Selecting ADP Backup Process Alternatives *
|
SP 500 133 | October 1985 | Technology Assessment: Methods for Measuring the Level of Computer Security *
|
SP 500 120 | January 1985 | Security of Personal Computer Systems - A Management Guide *
|
SP 500 61 | August 1980 | Maintenance Testing for the Data Encryption Standard *
|