text
stringlengths
51
4.95k
embedding
listlengths
1.54k
1.54k
example_idx
int64
0
2.23k
According to Zero Trust Architecture: | | | 3.2.2.
[ 0.0068734917, 0.04320097, 0.040811356, 0.008028023, 0.031306606, -0.0069943145, -0.033212926, 0.013699996, -0.021050068, 0.028863294, -0.0016042622, -0.0029400287, 0.0007056404, 0.012981771, -0.0043630563, -0.009773246, 0.049188424, -0.016230568, -0.016807836, 0.036220077, 0....
0
According to IoT Device Cybersecurity Capability Core Baseline: | 1. The ability to use demonstrably secure cryptographic modules for standardized cryptographic algorithms (e.g., encryption with authentication, cryptographic hashes, digital signature validation) to prevent the confidentiality and integrity of the devi...
[ -0.0012311254, 0.041222844, 0.079109736, -0.00746618, 0.02986472, 0.010517517, -0.042308353, -0.004199726, 0.013661521, -0.0048417645, 0.032591727, -0.027058283, -0.03214164, -0.012099448, -0.01196045, -0.03420675, -0.016984235, 0.0292293, -0.014111609, 0.02859388, 0.03981962...
1
According to Multi-Factor Authentication for Criminal Justice Information Systems_ Implementation Considerations for Protecting Criminal Justice Information: 3.2.3. 3.2.3.
[ 0.0021882725, 0.032307543, 0.053044476, 0.017318346, 0.02930219, -0.013286163, 0.02604639, -0.009116236, 0.012403341, 0.045981895, 0.019021379, 0.0016138118, -0.0015872018, 0.03501236, -0.018958766, -0.0024700242, 0.056300275, 0.0065929927, -0.02567072, -0.0030804866, -0.0395...
2
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: ............................................ 5 | | 2.1 DEVELOPMENTAPPROACH ..............................................................................
[ 0.017715218, 0.028639602, 0.051454652, -0.015903434, 0.060768563, 0.0064553176, -0.010763337, 0.01538003, -0.0412013, 0.016789194, 0.024465788, -0.0016071191, 0.008179868, 0.030706376, 0.014802943, -0.017916527, 0.045388535, 0.004989115, -0.033095248, 0.032343693, 0.03808772,...
3
A111D3 DflTSbb NATL INST OF STANDARDS & TfCH R.I.C. A1 11 03089566 NBS Invitational Wor/Aud^ and evaluatio QC100 .U57 NO.500-19, 1977 C.2 NBS-PUB-O IMCE & TECHNOLOGY: UDIT AND EVALUATION OF COMPUTER SECURITY iO-19 NBS Special Publication 500-19 U.S. DEPARTMEMT OF COMMERCE National Bureau of Standards NATIONAL BU...
[ 0.019853566, 0.01073995, 0.061678004, -0.012320258, -0.0054697036, 0.0013626312, -0.02686522, -0.036147606, -0.043788314, -0.015112645, 0.031514086, -0.013662752, -0.04716373, 0.019163141, 0.06269063, 0.040474273, 0.00026298495, 0.014629347, 0.006206157, 0.03458264, 0.0290132...
4
According to Ordered t-way Combinations for Testing State-based Systems: rd with combinatorial interaction testing. Computer. 2013 Dec 11;47(2):37-45. - [30] Garn B, Simos DE, Zauner S, Kuhn R, Kacker R. Browser fingerprinting using combinatorial sequence testing. In Proceedings of the 6th Annual Symposium on...
[ -0.00039313003, -0.013712871, 0.05502139, 0.0030176104, 0.0072564236, -0.030356629, 0.010003245, -0.011850979, -0.013698712, 0.058957558, 0.014611959, -0.023574527, 0.011022684, -0.010718268, 0.021351583, -0.033414945, 0.009875815, 0.004481284, -0.033273358, 0.041825317, 0.04...
5
According to Digital Identity Guidelines: • RPs and CSPs SHALL make human support personnel available to intervene and • RPs and CSPs SHALL educate support personnel on issue handling procedures for the digital identity management system, the avenues for redress, and the alternatives available to gain access to s...
[ 0.0005419599, 0.034430392, 0.080422595, 0.08047927, 0.01589749, -0.001214982, 0.012008131, 0.05531533, 0.036640737, 0.055627044, 0.03547889, -0.02847946, 0.007296976, -0.028592812, 0.0040523014, 0.019524725, -0.00004358593, 0.041401483, -0.017356886, 0.025220618, 0.048372578,...
6
tegrity, and availability protection. The enhanced security requirements are implemented in addition to the basic and derived requirements since those requirements are not designed to address the APT. The enhanced security requirements apply to those components of nonfederal systems that process, store, or transmit CUI...
[ -0.013136676, 0.019705012, 0.07176378, 0.04056105, 0.036807712, 0.011234986, 0.0022707682, 0.013336853, -0.035356425, 0.04081127, 0.0040035583, -0.022932881, -0.009314529, -0.00034425128, -0.0007299456, -0.008688972, 0.039860427, 0.0019830125, -0.033304602, 0.005695687, 0.036...
7
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: 3.4.3e Employ automated discovery and management tools to maintain an up-to-date, complete, accurate, and readily available inventory of system components. 3.4.3. 3.4.3e | E...
[ -0.0119802905, 0.050263483, 0.02876923, -0.015404215, 0.022582743, -0.0025076629, -0.022486296, 0.0056904657, -0.052936487, 0.03596154, 0.02548998, 0.002531775, 0.00827391, 0.00053391175, 0.03813852, -0.03039508, -0.010492227, 0.02092934, -0.03739449, -0.00046071416, 0.024773...
8
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer: | Access Control | Maintenance | Security Assessment and Monitoring | |-----------------------------------|---------------------|-------------------------...
[ -0.026579311, 0.032411277, 0.06373873, 0.026992192, 0.031611316, -0.016592715, 0.0028159877, 0.041262444, 0.005661006, 0.014670231, 0.048023395, 0.00017700724, -0.013354168, -0.003919158, 0.03217903, -0.024514899, -0.021611819, 0.02612772, -0.02287627, 0.01797329, 0.043068804...
9
According to Digital Identity Guidelines_ Identity Proofing and Enrollment: 3.9. 4.3.9. Notification of Proofing . . . . . . . . . . . . . . . . . . . . . . • Visual and tactile inspection by trained personnel for on-site identity proofing
[ 0.042656228, 0.029605808, 0.017733654, 0.051157642, 0.00180189, -0.005216439, 0.0122226495, 0.01396022, -0.018792603, 0.041999977, 0.03791333, -0.006857063, 0.012699922, -0.018285502, 0.01093998, 0.021865044, 0.022044022, 0.04361077, -0.03931532, 0.03600424, 0.057421844, 0....
10
## Assessing Enhanced Security Requirements for Controlled Unclassified Information RON ROSS VICTORIA PILLITTERI KELLEY DEMPSEY This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.800-172A <!-- image --> ## NIST Special Publication 800-172A ## Assessing Enhanced Security Requirements...
[ -0.017489862, 0.045271054, 0.049889997, -0.022540987, 0.039760735, 0.004595309, -0.007468643, -0.014153957, -0.016787566, -0.0026690608, 0.027376022, -0.008137175, -0.037005574, 0.010750525, 0.025012527, 0.0050612553, -0.003768086, 0.0037748388, 0.0042948076, 0.051024474, 0.0...
11
ving inputs from a variety of software producers will be particularly helpful to us in refining and revising the SSDF. The publication will be updated periodically to reflect your inputs and feedback. If you are from a standards-developing organization or another organization that has produced a set of secure practices...
[ 0.0051595424, -0.008159425, 0.082757145, -0.023871271, 0.028752869, -0.0053767865, 0.01794179, 0.0071307113, -0.040509596, 0.009635406, 0.050323907, -0.008415006, -0.0064662006, -0.026452638, 0.029647402, -0.020740403, 0.021660494, -0.009053959, -0.025711454, 0.013558575, 0.0...
12
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations: .......24 | | 2.3.2. Level 1 -Enterprise...................................................................................................................27 | | 2.3.3. Level 2 -Mission and ...
[ -0.003938797, 0.031612847, 0.104727164, -0.01026649, 0.045241725, 0.010548291, -0.0060138702, 0.010650763, -0.03896527, 0.05810206, 0.021711417, -0.041168433, -0.01657497, 0.01040739, 0.03881156, 0.019892525, 0.024759982, -0.0044575655, -0.017343516, 0.03527625, 0.07454894, ...
13
According to Guide to Auditing for Controls and Security_ A System Development Life Cycle Approach: 3.6.1 | Potential Deficiencies | Potential Deficiencies | 88 | | 4. 3.6.1 Potential Defic...
[ -0.019029269, 0.04545881, 0.06786099, 0.020577285, 0.025334602, 0.0028270169, 0.057188492, 0.027864287, 0.041481793, 0.00891053, 0.022792332, -0.040248413, -0.003879479, -0.03612037, 0.029399717, -0.013403553, 0.0068528024, -0.0043828986, -0.017216958, 0.040047046, 0.08960873...
14
According to Digital Identity Guidelines_ Authentication and Authenticator Management: 3.2.5. 3.2.5) option. 3.2.5) with a non-exportable authentication key (see Sec.
[ 0.026305355, 0.036589663, 0.037844166, -0.00064481114, 0.017942002, -0.021235073, -0.021391885, 0.027180893, 0.008298013, 0.010094827, 0.0195232, -0.022946946, -0.021470292, -0.022659456, -0.013930208, 0.024449736, 0.015197778, -0.004576975, -0.041607674, 0.019941367, 0.00747...
15
According to Addressing Visibility Challenges with TLS 1.3 within the Enterprise_ High-Level Document: | | 5.4 Specific Details .............................................................................................
[ 0.014226874, 0.022453833, 0.107526876, 0.004873294, 0.01966348, 0.023501853, -0.03730952, -0.005030497, -0.033300843, -0.008161457, 0.04983336, 0.034008257, -0.015667902, 0.0023040068, -0.008619966, 0.017947346, 0.01919187, 0.021091407, 0.01602161, 0.032934036, 0.046951305, ...
16
. . . . 2.2. 2.3. Evaluation Criteria . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.4. Cost and Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.5. Algorithm and Implementation Cha...
[ 0.021892887, 0.007360275, 0.04924749, -0.022215066, 0.019422842, 0.007456162, -0.0024930583, -0.00679646, 0.033230547, 0.050566893, 0.012910206, -0.02813704, -0.018318225, 0.014106874, 0.036176194, 0.022123015, 0.023687888, -0.03955141, 0.016001599, 0.026326695, 0.011606145, ...
17
| | Federal Vulnerability Disclosure Coordination Body .................................................... | 6 | ...
[ 0.016347058, 0.023905376, 0.11336124, 0.0073419795, -0.012926211, 0.020403402, -0.0075650783, 0.01576565, -0.002535214, 0.0022073262, 0.033234965, -0.00320113, -0.00640226, -0.02122819, 0.004668174, 0.04077976, 0.05738372, 0.051840052, -0.020241147, 0.0021042274, 0.013886211,...
18
l official. This publication may be used by nongovernmental organizations on a voluntary basis and is not subject to copyright in the United States. Attribution would, however, be appreciated by NIST. ## NIST Technical Series Policies Copyright, Use, and Licensing Statements NIST Technical Series Publication Identifie...
[ 0.019638753, 0.028740263, 0.051814515, -0.050583888, 0.0046501025, 0.019074714, -0.00080519525, -0.022971699, 0.022241015, -0.0059031625, 0.051558133, -0.014216303, -0.075837374, 0.015818682, 0.009184834, 0.029329937, -0.009486081, 0.03525233, -0.008422102, -0.0009077475, 0.0...
19
According to Audit and Evaluation of Computer Security: 3.3.7 Encryption Enciphering may be indicated for very sensitive data that must be passed outside the control of its owner.
[ 0.04205125, 0.013539228, 0.04659087, 0.012795897, 0.047068726, 0.0143887475, 0.02713155, 0.051395968, 0.008641212, -0.007811603, 0.041387558, 0.0167382, 0.015264815, -0.0066700606, 0.008528385, -0.0499624, 0.03541437, 0.01737534, -0.013552501, 0.037856743, -0.0007719516, 0....
20
According to Guidelines for Media Sanitization: | Executive Summary............................................................................................................................1 | |----------------------------------------------------------------------------------------------------------------------...
[ 0.029191712, 0.035812225, 0.03620331, -0.007926458, 0.009497782, 0.028563183, -0.01418382, 0.0317617, 0.01885589, 0.021649355, 0.054500505, -0.025532272, -0.04357806, -0.0047977767, 0.033130497, -0.013457519, 0.024582494, 0.0102520175, -0.033717126, 0.046790544, 0.0473213, ...
21
According to Overview and Considerations of Access Control Based on Attribute Encryption: In addition to functionalities like revocation, accountability, attribute privacy protection, policy updating, decentralization (multi-authorities), and key hierarchy for practical access control system deployments [ZDXSLZ], the ...
[ 0.020383036, 0.05510276, 0.0773932, 0.017702697, 0.041838206, 0.04453101, -0.012803289, 0.026379513, -0.012666156, 0.024260174, 0.030069651, -0.055651296, -0.006211527, 0.027825648, -0.02717738, -0.023212973, 0.021978771, -0.0016362529, -0.0052983426, 0.03286219, -0.02115597,...
22
According to Guide to Enterprise Patch Management Planning_ Preventive Maintenance for Technology: installations require administrator privileges, such as installing firmware patches for a system basic input/output system (BIOS). 3 Some patch installations require user participation or cooperation. - Change software c...
[ -0.01452938, 0.04397344, 0.05891297, -0.0004128724, 0.0029409877, -0.0008754604, 0.046732653, -0.01803433, -0.027666723, 0.02602611, 0.059211265, 0.058067806, -0.01950094, 0.005338211, 0.014579096, -0.0031180994, -0.004157466, -0.0018115117, -0.056576338, -0.007942065, 0.0446...
23
oners in these fields, but since the report contains initial findings from a small group exercise, it is not intended as a specific recommendation or guideline for practice. ## Table of Contents | 1. Introduction..............................................................................................................
[ 0.02553431, 0.03238215, 0.056465644, -0.025505293, 0.01675689, -0.010888352, -0.017888526, -0.012759901, 0.0297997, 0.018512376, 0.019121716, -0.027159221, -0.00924168, -0.034819514, 0.035690002, 0.051271733, 0.06963903, -0.038475562, 0.014711245, 0.039723262, 0.038214415, ...
24
According to Likely Exploited Vulnerabilities_ A Proposed Metric for Vulnerability Exploitation Probability: Additional information about this publication is available at https://csrc.nist.gov/publications/cswp, including related content, potential updates, and document history.
[ 0.0047573647, 0.010257564, 0.060253497, -0.008597491, -0.006524017, 0.012259984, 0.006146141, 0.036172766, -0.0038853427, 0.0010141294, 0.0030908338, 0.020967286, -0.042373814, 0.013487275, 0.01130399, -0.004799351, 0.056997947, -0.013913597, -0.03010091, -0.017892601, 0.0132...
25
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer: ource code. | CUI//SP-CTI | | General Proprietary | e.g., financial information, trade secrets, product research and development, existing and future product designs and performanc...
[ -0.008124537, 0.008853749, 0.048705943, -0.002142924, 0.023472412, -0.031204823, -0.0016802863, 0.02098208, -0.015327238, 0.0024920518, 0.0517879, 0.008922543, -0.0069791214, 0.017528636, 0.024229143, -0.014900716, -0.00090377725, -0.007842482, -0.03769895, 0.012465419, 0.043...
26
According to Secure Software Development Framework (SSDF) Version 1.1_ Recommendations for Mitigating the Risk of Software Vulnerabilities: 3.4.3 SP800161 : SA-1, SA-8, SA-15, SR-3 SP800181 : T0414; K0003, K0039, K0044, K0157, K0168, K0177, K0211, K0260, K0261, K0262, K0524; S0010, S0357, S0368; A0033, A0123, A0151 ...
[ -0.0015671795, 0.014106998, 0.08687878, -0.022494944, -0.004340126, -0.028519012, 0.01958458, -0.009099649, -0.0029675532, 0.013929072, 0.011438106, -0.019508326, -0.044074837, 0.013598638, -0.0066722287, -0.020817354, 0.07767745, 0.011596969, -0.046692893, 0.0103197135, 0.03...
27
According to Guidelines for the Use of PIV Credentials in Facility Access: ..........................................6 | | 3. | Threat Environment............................................................................................................. 7 | | 3.1 | Identifier Collision...
[ -0.025164122, 0.005584455, 0.052508943, 0.010329627, 0.019023731, 0.013528943, -0.04725805, -0.020415362, -0.011341071, -0.031620137, 0.036297165, -0.009834667, -0.041203737, 0.039740372, 0.029468132, -0.024159852, 0.05072995, 0.022653447, -0.016713912, 0.045737296, -0.009999...
28
According to Guide to Auditing for Controls and Security_ A System Development Life Cycle Approach: President's Council on Integrity and Efficiency | ^ | 3.2.2 | Size of Review Task | Size of Review Task | 49 | |-----------|------------------------------------------------------------------|----------------------------...
[ -0.037311, 0.021159593, 0.07072674, 0.0031979366, -0.00290927, 0.051890388, -0.015789703, 0.024359269, -0.03244193, 0.008333068, 0.03074471, -0.04582492, -0.012993465, 0.012729144, 0.01090672, 0.010238961, 0.015956642, -0.027322447, -0.0018363355, 0.024846176, 0.030605592, ...
29
According to Protecting Information and System Integrity in Industrial Control System Environments_ Cybersecurity for the Manufacturing Sector: Although the integration of IT and OT networks is helping manufacturers boost productivity and gain efficiencies, it has also provided malicious actors, including nation state...
[ -0.0042900597, 0.022429258, 0.05158849, 0.0017812878, 0.031662017, -0.016800987, 0.0045894356, 0.0063347984, -0.039876897, 0.021423353, 0.058677714, -0.006250973, -0.03551798, -0.028261105, 0.02181853, -0.03594908, 0.0036913073, 0.010250637, -0.036883134, 0.028500605, 0.02785...
30
According to Secure Software Development Framework (SSDF) Version 1.1_ Recommendations for Mitigating the Risk of Software Vulnerabilities: 3.2.1, 3. 3.2.1, 3. 3.2.1, 3.
[ 0.007950324, 0.022481957, 0.100226834, -0.009884526, 0.041974697, -0.018575875, 0.01833724, 0.007529572, -0.028786955, 0.02338626, 0.031851534, 0.010945825, -0.008829506, 0.014054364, 0.0013376137, -0.0048135254, 0.080131225, -0.0034382325, -0.030419722, 0.013137502, 0.016955...
31
According to Digital Identity Guidelines_ Authentication and Authenticator Management: 6. Threats and Security Considerations . . . . . . . . . . . . . . . . . . . . . . . 6.1. Authenticator Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . Threat Mitigation Strategies . . . . . . . . . . . . . . . . . ....
[ 0.031167997, 0.04565415, 0.04011139, 0.031328656, 0.02033685, -0.015209125, 0.015597386, 0.007430515, -0.02621432, 0.038424462, -0.010784288, -0.025116479, -0.021809565, -0.014205002, -0.0066640335, 0.013723022, 0.043083597, 0.024032025, -0.022572698, 0.016414074, 0.032131955...
32
1. Scope the Target Profile. Decide which of your supplier criticality levels it will apply to, and determine any other restrictions to be placed on the Profile's scope, such as suppliers of a particular type of product or service only. You can create as many Target Profiles as you need to specify the requirements for ...
[ -0.010319678, -0.022929821, 0.0757112, -0.025560081, 0.006418336, -0.005474463, 0.024905661, 0.0037849306, -0.02138187, 0.03405494, 0.043644685, -0.013692451, -0.01384347, 0.0052384953, 0.023068257, -0.015768971, 0.03652159, -0.009627504, -0.034029767, 0.031991, 0.048074596, ...
33
According to Summary Report for “Workshop on Updating Manufacturer Guidance for Securable Connected Product Development”: rs. ' Zombie devices ' are those that no longer receive software support and security updates. Higginbotham noted that unsupportive owners can neglect cybersecurity issues, leading to vulnerabiliti...
[ 0.07708363, 0.054071378, 0.026961455, 0.05125052, 0.01658367, -0.005571193, 0.023131028, 0.057278246, 0.037027463, 0.002297514, 0.051695917, -0.019033363, -0.04750917, -0.027941333, 0.0038712553, -0.018751277, -0.014319561, 0.0030973754, -0.042283162, -0.002136057, 0.01662821...
34
According to Proceedings of the Cybersecurity in Cyber-Physical Systems Workshop, April 23-24, 2012: Some of the threats to wireless IMDs include device reprogramming, data extraction, data tampering, repeated access attempts and data flooding. Vulnerabilities include unsecured communication channels, inade...
[ 0.02791492, 0.04515649, 0.052386824, 0.009130616, 0.014924154, -0.0049526473, 0.014593094, -0.008448633, -0.018353928, -0.00030147086, 0.051168524, -0.038217485, -0.017003207, 0.0022859646, 0.00948816, -0.056783292, 0.036257613, -0.008528087, -0.014328247, 0.044865157, 0.0120...
35
According to Security and Privacy Controls for Information Systems and Organizations: September 2020 INCLUDES UPDATES AS OF 12-10-2020; SEE PAGE XVII CHAPTER ONE INTRODUCTION ...................................................................................................... 1 1.1 PURPOSE AND APPLICABILITY .......
[ 0.000377715, 0.013400409, 0.06073567, 0.011628953, 0.024209913, 0.0025728303, 0.00007079803, 0.0050341915, -0.030898066, 0.04388875, 0.01307504, -0.030199124, 0.0034736223, -0.005597563, 0.008778955, -0.022655368, 0.034175865, 0.037622374, 0.021305688, 0.018088143, 0.02414965...
36
ation Processing Guidelines. latter effort will be carried out by a working group convened for this purpose and will result in a FIPS publication by NBS. These Proceedings are the result of phase one. Task Group 15 This The General Chairman and organizer of the Workshop was Robert G. General Accounting Office. McKenz...
[ 0.025304196, 0.023427825, 0.065780185, -0.009864347, -0.04254, -0.010085491, -0.0018110325, 0.040395577, -0.0047947965, -0.0481155, 0.06958654, -0.009355047, -0.036535613, -0.04452359, -0.013791323, 0.020720491, -0.006299244, 0.031469412, 0.025800094, 0.0010554583, 0.04390707...
37
IoT Product Capabilities..............................................................................................5 | 2.2.1. IoT Product ...
[ 0.022689007, -0.0042943293, 0.004600859, -0.024218734, 0.041524503, 0.0010181152, -0.03699371, 0.007561056, 0.056704998, -0.032229364, 0.030664606, -0.04322939, -0.021918304, -0.07020397, 0.0017282413, 0.0025909024, -0.011461277, -0.016149715, -0.039305814, 0.044350408, 0.014...
38
blication 800-series reports on ITL’s research, guidelines, and outreach efforts in information system security, and its collaborative activities with industry, government, and academic organizations. i NIST SP 800-63-4 July 2025 Patent Disclosure Notice Digital Identity Guidelines NOTICE: ITL has requested that h...
[ 0.033553004, 0.000008379677, 0.057607453, -0.01522336, 0.022950564, -0.031345233, -0.012020807, 0.01537739, -0.026570283, -0.009947811, 0.016866352, -0.02401594, -0.050650403, -0.06423077, 0.002897701, 0.015993513, 0.04220439, 0.019459203, 0.0099670645, 0.01980577, 0.00881183...
39
According to Zero Trust Architecture: 3.1.1 | ZTA basada en una gobernanza de la identidad mejorada... 3.1.1 ZTA basada en una gobernanza de la ident...
[ 0.019888585, 0.026578588, 0.03936897, 0.034493204, 0.04898443, -0.019128874, -0.02039884, 0.052658264, -0.032792356, -0.004025341, 0.015194245, 0.012280124, 0.0064235367, -0.045242563, 0.0055872863, 0.022621281, -0.012586277, -0.020319467, -0.006559605, 0.034130353, -0.008600...
40
According to Strategies for the Integration of Software Supply Chain Security in DevSecOps CI_CD Pipelines: .............................9 | | 3.1.5. Types of Exploits.........................................................................................................................10 | | 3.2.1. Baseline S...
[ 0.025156226, 0.02427053, 0.096786894, -0.029375585, 0.044235595, -0.024344338, -0.006667323, 0.020432515, -0.039290458, 0.0131747285, 0.030974757, -0.007245485, -0.014970723, -0.0101486, 0.010935886, -0.01771392, 0.031048566, 0.0033090587, -0.0433745, 0.023864588, 0.048196625...
41
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer: | Access Control | Maintenance | Security Assessment and Monitoring | |-----------------------------------|---------------------|-------------------------...
[ -0.045868356, 0.03636945, 0.049533695, -0.004878514, 0.011454184, -0.01963021, 0.0060303854, 0.03162, -0.0030361651, 0.027077043, 0.051624488, 0.0008929423, 0.0122350035, 0.013783738, 0.017487796, -0.029322708, 0.0151001625, 0.026083272, -0.035388585, 0.040086415, 0.06391112,...
42
According to IoT Non-Technical Supporting Capability Core Baseline: | 1. The ability for the manufacturer and/or supporting entity to receive maintenance and vulnerability information (e.g., bug reporting capabilities and bug bounty programs) from their customers and others in the IoT device ecosystem 2. The ability f...
[ -0.008194442, 0.012350238, 0.07660477, 0.016672513, 0.024712808, -0.0094091175, -0.007454537, 0.012442726, 0.031199303, 0.018053668, 0.035737384, -0.0045812414, -0.016524533, -0.03371498, -0.012621536, -0.0051392526, -0.0019129612, 0.0151187135, -0.044172294, 0.032111853, 0.0...
43
According to Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations: aft publications during public comment periods and provide feedback to NIST. Many NIST cybersecurity publications, other than the ones noted above, are available at https://csrc.nist.gov/publications. ## Authority Thi...
[ -0.027055494, 0.007480961, 0.0106594, -0.041526437, 0.00798486, -0.0028102053, -0.041474756, -0.00279244, -0.021783937, -0.007920257, 0.052327964, 0.012907565, -0.013114292, -0.022804655, 0.008876373, 0.0016635124, 0.00852752, -0.001703889, -0.012920485, 0.02531123, 0.0122873...
44
According to Recommendations for Federal Vulnerability Disclosure Guidelines: Commission (2016) ISO/IEC 27035-1:2016 - Information technology - Security Techniques - Information security incident management - Part 1: Principles of incident management (ISO, Geneva, Switzerland). Available at https://www.iso.org/standar...
[ -0.0712522, 0.026211437, 0.09174708, 0.008151376, 0.01987383, 0.0036839982, -0.00696925, 0.012661098, -0.012639925, 0.015484085, 0.030262424, 0.05072908, -0.024376495, -0.029528446, 0.017996544, 0.0071703875, 0.02527985, 0.0372352, -0.05521763, 0.008758318, 0.038505547, 0.0...
45
According to Profile of the IoT Core Baseline for Consumer IoT Products: ts related to the IoT product (e.g., price of maintenance) and length and terms of support. - b. All IoT components, including but not limited to the IoT device, that are part of the IoT product. - c. How the baseline product criteria are met by ...
[ -0.018333573, -0.0020390686, 0.06736746, 0.0013804313, 0.020246327, -0.0100028645, 0.002569888, 0.00500444, 0.03738894, 0.03260104, 0.026441727, 0.0027097357, -0.0149652, -0.044149745, -0.02238765, 0.010742703, -0.011482542, 0.001589451, -0.060438234, 0.050333116, 0.03618595,...
46
.....................................11 | | | 4. | Attribute-Based Encryption..............................................................................................
[ 0.03234573, 0.018852323, 0.045418598, -0.010615696, 0.010219185, 0.059212394, -0.01554806, 0.017915113, 0.011090308, -0.018515889, 0.055030998, -0.031913172, -0.012544184, -0.03136046, 0.0064583323, 0.011360657, 0.04719689, 0.016485268, -0.0021868213, 0.02797209, -0.02727519,...
47
According to Cryptographic Module Validation Program (CMVP) Security Policy Requirements_ CMVP Validation Authority Updates to ISO_IEC 24759 and ISO_IEC 19790 Anne: CMVP Validation Authority Updates to ISO/IEC 24759 and ISO/IEC 19790 Annex B CMVP Validation Authority Updates to ISO/IEC 24759 and ISO/IEC 19790 Annex B...
[ -0.01736975, 0.04890561, 0.052209366, -0.035390243, -0.008428334, 0.029934037, 0.03106032, -0.033763394, 0.03055975, 0.009523329, 0.023489209, -0.014954505, -0.0611195, 0.04114679, -0.015955644, 0.030634835, -0.0028203947, 0.07878959, -0.014816849, 0.015868044, 0.00043447842,...
48
According to Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations: ......................98 | | Table 11. Maintenance (MA) ......................................................................................................................98 | | Table 12. Media Protection ...
[ -0.019059673, 0.040248126, 0.091055, -0.01575297, 0.024168745, 0.021415522, -0.013006844, 0.0060350904, -0.031619474, -0.0005783185, 0.05077849, 0.003867283, 0.00818161, 0.014929841, 0.030654427, -0.02595692, 0.03318058, 0.01229725, -0.020138256, 0.037721977, 0.030512508, 0...
49
According to Status Report on the Fourth Round of the NIST Post-Quantum Cryptography Standardization Process: There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in this publication, including ...
[ -0.025845062, 0.011507364, 0.038189568, 0.00053733145, 0.02495477, 0.020370426, -0.024968058, 0.044381753, -0.028569091, -0.025114225, 0.04284035, 0.0050162007, -0.105506316, 0.012291353, 0.010889474, -0.009819794, -0.0039797407, -0.010902762, -0.030881194, 0.04270747, 0.0275...
50
According to Guide for Developing Security Plans for Federal Information Systems: In order for the plans to adequately reflect the protection of the resources, a senior management official must authorize a system to operate. The authorization of a system to process information, granted by a management official, provi...
[ -0.0075923433, 0.04459898, 0.06747796, -0.009856633, -0.0038578764, -0.009813707, -0.013478422, -0.003391068, -0.009362996, 0.008327433, 0.05575946, 0.02710708, -0.025068147, 0.0021864877, -0.005134892, -0.03794562, -0.033288267, 0.04071428, -0.014261802, -0.030219136, 0.0131...
51
According to Multi-Factor Authentication for Criminal Justice Information Systems_ Implementation Considerations for Protecting Criminal Justice Information: 3.2.1. 3.2.1.
[ 0.0019624913, 0.030499866, 0.055449758, 0.019012416, 0.028874872, -0.017249925, 0.026124885, -0.0085687125, 0.012518695, 0.046449795, 0.019212415, 0.0024374893, -0.0029484245, 0.03449985, -0.01837492, -0.002135928, 0.05509976, 0.007518717, -0.02507489, -0.0033531103, -0.03729...
52
## Summary of NIST SP 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations Kelley Dempsey Computer Security Division Information Technology Laboratory Greg Witte Doug Rike G2, Inc. Annapolis Junction, MD February 19, 2014 <!-- image --> ## Abstract This white paper pr...
[ 0.002572879, -0.0032164901, 0.030266954, 0.017902102, -0.011281205, -0.022662632, -0.0051269666, 0.012696837, -0.006714854, -0.009921948, 0.018553542, -0.015822502, -0.024804872, -0.015233698, 0.021221945, -0.003874195, 0.018992012, 0.013191681, 0.00549027, 0.0510379, -0.0051...
53
According to Proceedings of the Cybersecurity in Cyber-Physical Systems Workshop, April 23-24, 2012: low the audit logs through certain types of attacks on the IMD. Creative techniques for selective overwriting of audit records based on significance of each type of audit record may be useful. Alert mechanisms ...
[ 0.016549157, 0.049880944, 0.036669087, -0.025228882, 0.0071003437, -0.002892669, 0.017249579, 0.0074917553, -0.013376663, 0.028428843, 0.055209637, -0.023264956, -0.015409257, 0.0337026, 0.02187785, -0.0021544804, 0.01428309, 0.0010059965, -0.020573143, 0.02191905, 0.04315141...
54
osure Notice NOTICE: ITL has requested that holders of patent claims whose use may be required for compliance with the guidance or requirements of this publication disclose such patent claims to ITL. However, holders of patents are not obligated to respond to ITL calls for patents and ITL has not undertaken a patent s...
[ -0.012950259, -0.0011045809, 0.054127928, -0.015138645, -0.004338683, -0.04878162, -0.02878143, -0.010900378, -0.04482036, -0.02670385, 0.05806148, -0.030886713, -0.017479386, -0.022340927, -0.0007682724, -0.0060076737, 0.07468214, -0.008483458, -0.04221646, 0.040415887, -0.0...
55
According to Guide to Enterprise Patch Management Planning_ Preventive Maintenance for Technology: There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in this publication, including concepts an...
[ -0.02647238, -0.0011511657, 0.074638784, -0.009670147, 0.02159477, 0.012654847, 0.004640111, -0.0066641774, -0.017993279, 0.0021640852, 0.032385066, 0.063238785, -0.04602536, 0.011548878, 0.007213617, -0.025862679, -0.0028429097, -0.05311491, -0.03340596, -0.003817723, 0.0282...
56
According to Security and Privacy Controls for Information Systems and Organizations: CHAPTER ONE INTRODUCTION ...................................................................................................... 1 1.1 PURPOSE AND APPLICABILITY ........................................................................
[ -0.0026052925, 0.0011828291, 0.049329598, 0.013922169, 0.03562953, -0.01457678, -0.01389879, 0.018679786, -0.036471173, 0.025202516, 0.016552301, -0.041123584, 0.014155959, -0.012379157, 0.013302626, -0.016528923, 0.04750604, 0.041357376, 0.025249274, 0.03698551, 0.033759214,...
57
Murugiah Souppaya, Gary Stoneburner, Keith Stouffer, Marianne Swanson, Pat Toth, Glenda Turner, Patrick Viscuso, Joe Weiss, Richard Wilsher, Mark Wilson, John Woodward, and Carol Woody. iv T h s i p u b l i c a t i o n i s a v a i l l a b e f r e e o f c h a r g e f r o m : h t t p s : /...
[ 0.0070397556, 0.005975919, 0.046947066, -0.016452981, -0.0069168573, -0.009716629, -0.009555326, 0.005837659, -0.0073047546, -0.04562591, 0.040126223, -0.0033547336, -0.000041166055, 0.015761679, -0.013449659, 0.013849077, 0.044427656, -0.007627362, -0.0025174904, 0.016099649, ...
58
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: | CHAPTERONE INTRODUCTION...................................................................................................... | CHAPTERONE INTRODUCTION.......................
[ 0.02867414, 0.007869022, 0.055200994, -0.015305968, 0.042841, 0.0015891889, -0.024628337, 0.011666054, -0.052241925, 0.017374696, 0.016248679, 0.0011963925, -0.011711881, 0.024143888, 0.024667617, -0.014638214, 0.03294253, 0.013839528, -0.026042404, 0.02346304, 0.02809804, ...
59
According to Incident Response Recommendations and Considerations for Cybersecurity Risk Management_ A CSF 2.0 Community Profile: public. Sometimes, the media learns of incidents through alternate sources (i.e., not through public affairs personnel). Having a media engagement strategy in place can greatly aid in this ...
[ 0.024616996, 0.0001528539, 0.03910387, 0.0359499, 0.034960944, -0.024790732, -0.0109186135, -0.003731974, -0.005709887, 0.060941096, 0.026514724, -0.0023320662, 0.022893004, -0.011840749, 0.009254761, 0.0099162925, 0.009361675, -0.0049681696, -0.037179414, 0.01356474, 0.01053...
60
According to Digital Identity Guidelines_ Identity Proofing and Enrollment: 3.8.1 of [SP800-63C] describes the association of an RP subscriber account with multiple CSP/IdP accounts.
[ 0.02714711, -0.033208832, 0.08371448, 0.030987944, 0.02183004, -0.021516502, 0.030360868, 0.018341936, -0.00410538, 0.025357336, 0.016526032, -0.024821708, 0.012665603, 0.002774479, 0.0035828177, 0.0067149256, 0.018368065, 0.047788322, -0.031196969, 0.03367914, 0.0013186532, ...
61
According to Assessing Security Requirements for Controlled Unclassified Information: other than the ones noted above, are available at Organizations are encouraged to review all draft publications during public comment periods and provide feedback https://csrc.nist.gov/publications. ## Authority This publication ha...
[ -0.023494147, 0.044498675, 0.043712478, -0.05325165, 0.015435641, 0.005755607, -0.028879587, -0.022210026, -0.010279508, -0.010200888, 0.03962426, -0.0134177385, -0.0078881625, -0.0031775406, 0.010030546, -0.002908924, 0.020545913, -0.0039964947, -0.010836396, 0.031631272, 0....
62
According to Guide to a Secure Enterprise Network Landscape: - applications, supply chain applications) and allocate routing priorities and WAN resources accordingly. - Integration of security and networking functions: Use of appliances that contain a combination of networking and security functions (e.g., the presenc...
[ -0.028748946, 0.030677078, 0.07534548, 0.0012838765, 0.06313397, -0.02783432, 0.0111671, 0.028946703, 0.009140088, 0.066693604, -0.015561016, 0.011883969, -0.006909141, -0.021617329, -0.020764502, -0.03258049, 0.018515013, 0.013991319, 0.015116063, -0.001802989, 0.056756303, ...
63
Profile..........................................................................................................17 Table 2. Highlighted Insights and Key Takeaways from the Consumer Profiling Process. ........20 | | List of Figures ...
[ 0.019680785, -0.01167178, 0.031372473, -0.020105453, 0.0219103, 0.0021863852, -0.0054676216, 0.02663475, 0.0069937785, 0.026833814, 0.06258569, -0.005776171, 0.005882338, -0.065399125, 0.011605426, 0.025559805, -0.01237514, -0.02704615, -0.032991525, 0.038167186, 0.018075002,...
64
ft publications during the designated public comment periods and provide feedback to NIST. Many NIST publications, other than the ones noted above, are available at https://csrc.nist.gov/publications. ## Comments on this publication may be submitted to: National Institute of Standards and Technology Attn: Computer Sec...
[ -0.016875068, 0.016640149, 0.07580077, -0.038422428, -0.003119212, -0.021651769, -0.02640237, 0.014525871, 0.01523063, -0.011941753, 0.02238263, 0.0008719764, -0.029965317, -0.0070541175, 0.02176923, 0.003654307, 0.00006331821, -0.0016330185, -0.0015008762, 0.028581902, 0.021...
65
According to Secure Software Development Framework (SSDF) Version 1.1_ Recommendations for Mitigating the Risk of Software Vulnerabilities: Personnel within the following Workforce Categories and Specialty Areas from the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework [SP800181...
[ 0.014686249, 0.010512819, 0.0959889, -0.020444527, 0.02720654, -0.029108357, 0.027232954, 0.036874108, -0.022504829, 0.02550283, 0.03970042, -0.0072374684, -0.0060653416, 0.0012827356, 0.04495683, -0.018740816, 0.040307943, -0.007349728, -0.023640634, 0.013708927, 0.056367725...
66
According to Guidelines for Media Sanitization: 3.2.5. 3.2.5.
[ 0.024952412, 0.022837333, -0.012206637, -0.010637607, -0.025823327, -0.01654739, -0.0066251764, 0.014459957, 0.007554844, 0.008494879, 0.04138921, -0.03234828, -0.026777187, -0.00042530557, 0.029030507, 0.011660587, 0.053443782, -0.026265698, -0.03773966, 0.034062464, 0.04454...
67
According to Data Integrity_ Detecting and Responding to Ransomware and Other Destructive Events: 3.2.3 Other Considerations USB attacks do not always come in the form of disguised file-based malware.
[ -0.021505045, 0.028558912, 0.003649121, 0.03278595, 0.010785546, -0.037171498, -0.04258739, 0.051094297, -0.018123416, 0.0036193996, 0.023578934, 0.030830944, 0.019774603, 0.0074105226, -0.01315665, -0.0028994826, 0.009398551, -0.007417127, -0.048795845, -0.0020094933, 0.0395...
68
th authentication and authorization support. | | | Provides network and asset monitoring to detect behavior anomalies and modifications to hardware, firmware, and software capabilities. | | | Provides network and asset monitoring to detect behavior anomalies and modifications to hardware, ...
[ 0.0064283223, 0.019999225, 0.024063868, -0.0103383325, 0.024549859, 0.016096577, -0.0069216755, 0.033076774, -0.013158547, 0.018688524, 0.049541526, -0.009491532, 0.00021618731, -0.035845444, 0.005743518, 0.008364919, -0.030337557, 0.02415223, -0.028879587, 0.024697129, 0.025...
69
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: ............................................ 5 | | 2.1 DEVELOPMENTAPPROACH ..............................................................................
[ 0.017715218, 0.028639602, 0.051454652, -0.015903434, 0.060768563, 0.0064553176, -0.010763337, 0.01538003, -0.0412013, 0.016789194, 0.024465788, -0.0016071191, 0.008179868, 0.030706376, 0.014802943, -0.017916527, 0.045388535, 0.004989115, -0.033095248, 0.032343693, 0.03808772,...
70
According to IoT Device Cybersecurity Capability Core Baseline: | 1. The ability to update the device's software through remote (e.g., network download) and/or local means (e.g., removable media) 2. The ability to verify and authenticate any update before installing it 3. The ability for authorized entities to roll ba...
[ -0.013243617, 0.037532605, 0.03229147, 0.0021549303, 0.02670381, -0.009940834, 0.022220688, 0.009816303, 0.013449363, 0.04989909, 0.03742432, 0.0155718075, -0.040304776, -0.013915002, -0.015517664, -0.035929944, -0.0010537772, 0.010541832, -0.030169023, 0.0036249394, 0.007753...
71
According to Strategies for the Integration of Software Supply Chain Security in DevSecOps CI_CD Pipelines: .............................9 | | 3.1.5. Types of Exploits.........................................................................................................................10 | | 3.2.1. Baseline S...
[ 0.02515644, 0.024270736, 0.09678771, -0.029400436, 0.044285174, -0.024369149, -0.0066673793, 0.020432688, -0.03929079, 0.013187141, 0.030925814, -0.0072455467, -0.0149462465, -0.010148686, 0.010948279, -0.017726371, 0.031024225, 0.0033060114, -0.04337487, 0.02387709, 0.048172...
72
ly the best available for the purpose. There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in this publication, including concepts and methodologies, may be used by federal agencies even before ...
[ 0.01134097, 0.004991994, 0.030836951, -0.05905171, 0.0045462213, 0.0054672654, -0.0055459314, 0.020793965, -0.03579289, -0.025959678, 0.05878949, -0.002405859, -0.06052014, -0.050765593, 0.018748656, 0.033144478, -0.013727163, -0.003140072, 0.0008595866, 0.026497226, 0.049244...
73
According to Cryptographic Module Validation Program (CMVP)-Approved Sensitive Security Parameter Generation and Establishment Methods_ CMVP Validation Authority U: There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibi...
[ 0.026213877, 0.030264877, 0.09016737, -0.014217696, -0.040431574, 0.035361294, 0.049082417, 0.01157148, 0.028226309, -0.014505187, 0.033871572, -0.025991727, -0.06507733, 0.028461529, -0.010937694, -0.0018899213, -0.012015783, 0.008866458, -0.010460722, -0.007755701, 0.005949...
74
According to Data Integrity_ Detecting and Responding to Ransomware and Other Destructive Events: | Technology Partner/Collaborator | Build Involvement | |-----------------------------------|--------------------------------------------------------------------------------------------------------| | Symantec Corporation...
[ -0.025998183, 0.029638808, 0.05484427, 0.027510216, 0.01334407, -0.028170813, -0.033705153, 0.04236632, -0.029624129, 0.017351694, 0.025352264, -0.035936505, -0.014158807, -0.0032956474, 0.0062866863, -0.00005241199, -0.00047021697, 0.019583046, -0.06623591, 0.01829121, 0.034...
75
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations: Balancing exposure to cybersecurity risks throughout the supply chain with the costs and benefits of implementing C-SCRM practices and controls should be a key component of the acquirer's overall approach to C-SCRM. Enterp...
[ -0.01623031, 0.015218096, 0.10694552, 0.029831192, 0.034066197, 0.009714916, 0.04658506, 0.019581083, -0.018289639, 0.047934677, 0.012425785, -0.012891171, -0.002632335, 0.0005370109, 0.01934839, -0.026503688, 0.018312907, 0.0033391388, -0.03234427, 0.0041535627, 0.07059894, ...
76
According to Digital Identity Guidelines: 3.2.2. 3.2.2. 3.2.2) Digital Identity Guidelines The impact analysis SHALL consider the level of impact for each impact category for each type of impacted entity if an intruder obtains unauthorized access as a member of each user group.
[ 0.0045183245, 0.026270404, 0.03294708, 0.024155023, 0.04048313, -0.027526412, 0.0054603308, 0.020386998, -0.021947091, 0.009783643, 0.03530044, 0.0045579877, -0.023969926, -0.024062473, -0.038473517, 0.033449482, 0.033105735, -0.009082923, -0.011224748, 0.021365361, 0.0412764...
77
According to Data Integrity_ Detecting and Responding to Ransomware and Other Destructive Events: 3.1.1, A. 3.1.1 Scenario The following scenario was simulated to test the architecture's defense against ransomware.
[ -0.022841033, 0.031303182, 0.047604665, -0.0044443207, 0.010655538, -0.034796357, -0.03818122, 0.0632021, -0.030978236, 0.01594946, 0.034092307, 0.0025894176, -0.0089428, -0.027674614, -0.0009012189, -0.020620566, 0.028893163, -0.0067155617, -0.05962769, -0.01084509, 0.035283...
78
According to Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography: 3.3.2 | C(0e, 2s) Scheme with Unilateral K...
[ 0.009597615, -0.022814697, 0.013428216, -0.015660219, 0.021499624, 0.03962108, 0.032744095, 0.033926453, 0.005248225, 0.0086806845, 0.03457796, -0.056560177, -0.018857414, 0.014308953, -0.020365525, -0.013802228, 0.039934766, 0.005637317, -0.028400738, 0.016094556, -0.0094950...
79
According to Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations: - Federal agencies responsible for managing and protecting CUI - Nonfederal organizations responsible for protecting CUI - Individuals with system development life cycle responsibilities (e.g., program managers, missio...
[ -0.024702938, 0.018326756, 0.049253155, 0.016837707, 0.030697314, -0.008011592, -0.013986877, 0.007133435, -0.034566294, 0.003713077, 0.046784133, -0.020693962, 0.017168606, 0.017550413, 0.02102486, -0.037697118, 0.03474447, 0.009621547, -0.022768447, 0.030010061, 0.034540843...
80
## Table of Contents | Executive Summary....................................................................................................................1 | Executive Summary....................................................................................................................1 | Executive Summary.........
[ 0.02690971, 0.0028831833, 0.05935138, -0.02331159, 0.056397878, -0.018049195, -0.037879873, 0.04141939, -0.026581543, 0.043857202, 0.006100394, 0.0049664592, 0.020639373, -0.035371736, -0.019291544, -0.022702139, 0.019092299, 0.006270338, 0.008878095, 0.0042544533, 0.04193508...
81
| Enterprise Infrastructure Layer ................................................................................... | 6 | | ...
[ 0.016551586, 0.0006665467, 0.07659861, -0.008586293, 0.047576305, 0.0008372428, -0.022495454, 0.019111631, -0.009688888, 0.013231129, 0.019796, -0.013332518, -0.01377609, -0.04017498, 0.0056048534, 0.012857261, 0.040200327, 0.0051042503, -0.0029513403, 0.049274553, 0.0358153,...
82
f each application. When a license application is received, TPO will contact you regarding the licensing process and to obtain additional information that may be necessary for the application process. A license application should include the prospective licensee's intentions for research and development of the inventio...
[ 0.003979736, 0.015222062, 0.045338243, 0.020250535, 0.017039418, -0.03686636, 0.008225926, -0.026536128, -0.023652954, 0.030498782, 0.04257805, 0.021316353, -0.04580283, -0.01821455, 0.018064244, 0.004690281, 0.036975674, -0.014593503, -0.013773643, -0.018569823, 0.029460292,...
83
| 41 | ## NIST USABLE CYBERSECURITY We are the Usable Cybersecurity team within the National Institute of Standards and Technology (NIST) Visualization and Usability Group. Our multi-disciplinary team conducts research at the intersection of cybersecurity, human factors, cognitive science, and psychology to 'champio...
[ 0.0097249895, 0.017301518, 0.04385138, 0.031159805, 0.022110656, -0.04504655, -0.010820563, 0.04695313, 0.01872434, 0.013559495, 0.02225294, 0.002948799, -0.037192572, -0.041489493, 0.032497257, -0.003777593, -0.04257084, -0.013957886, -0.04151795, 0.011332778, 0.038985327, ...
84
According to Automated Secure Configuration Guidance from the macOS Security Compliance Project (mSCP): 3.4.1. 3.4.1. 3.4.1), guidance (Section 3.
[ 0.014802989, 0.01694872, 0.06299253, 0.02204483, 0.00018499745, -0.0030637332, 0.006347787, 0.0015757711, -0.00991762, 0.020895332, 0.010173064, 0.042224918, -0.008155054, 0.027766779, -0.020333355, -0.0147519, 0.0017003001, 0.0056229644, 0.011878153, -0.015926942, 0.01047321...
85
gement is encouraged. For more information on IoT device security and privacy considerations, see NISTIR 8228, Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks [4]. ## 2 IoT Device Cybersecurity Capability Core Baseline Definition Table 1 defines the IoT device cybersecurity capabil...
[ -0.00469721, 0.034982085, 0.043540537, 0.013562573, 0.0470481, -0.017362433, -0.031568058, -0.00736588, 0.04629982, 0.029533673, 0.034795016, 0.008190158, -0.011539879, -0.035309456, -0.0071437345, -0.033929817, -0.002122075, -0.043026093, -0.013761335, 0.028738625, 0.0372035...
86
According to Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations: aft publications during public comment periods and provide feedback to NIST. Many NIST cybersecurity publications, other than the ones noted above, are available at https://csrc.nist.gov/publications. ## Authority Thi...
[ -0.027080853, 0.007467907, 0.01069797, -0.041525695, 0.007965337, -0.0027843148, -0.041474015, -0.002790775, -0.021796469, -0.007907195, 0.05232703, 0.0129267145, -0.013101137, -0.022817168, 0.008895595, 0.0016602527, 0.008514447, -0.0016844781, -0.012913794, 0.025284937, 0.0...
87
ework for Improving Critical Infrastructure Cybersecurity [NIST CSF] can find in Appendix C a mapping of the enhanced security requirements in this publication to the security controls in [SP 800-53]. The security control mappings can be useful to organizations that wish to demonstrate compliance to the security requir...
[ 0.023776855, 0.007366709, 0.0694904, -0.018643767, 0.007233539, -0.0055598374, 0.017408919, -0.0042190603, -0.02170667, 0.028958369, 0.0028419637, -0.0042795916, -0.021149779, -0.0065495307, 0.031355426, -0.0052299397, 0.036294814, 0.009987731, 0.030338492, 0.029006794, 0.049...
88
According to Secure Software Development Practices for Generative AI and Dual-Use Foundation Models_ An SSDF Community Profile: The software development and use of AI models and AI systems inherit much of the same risk as any other digital system. A unique challenge for this community is the blurring of traditional bo...
[ 0.027412515, 0.024077876, 0.08687814, -0.0006363393, 0.025878327, -0.008121053, 0.010099014, 0.032737795, -0.039863527, 0.04351515, 0.027488591, -0.061874688, 0.019957121, -0.038240585, -0.027539307, -0.016254785, 0.0047547147, 0.012292522, -0.0041397717, 0.003753055, 0.01849...
89
................6 | | SSC Security -Risk Factors and Mitigation Measures .....................................................................8 | | 3. | | 3.1.1. Developer Environment ....................................................................................................
[ 0.03362458, 0.009194012, 0.103571184, -0.011343956, 0.025091574, -0.016518509, 0.007938766, 0.0023669407, -0.04588326, 0.009434379, 0.02116559, -0.024984745, -0.01355399, -0.021953458, 0.024584135, -0.007878674, 0.027909203, 0.0008141575, -0.04609692, 0.02021748, 0.03138116, ...
90
According to Status Report on the First Round of the Additional Digital Signature Schemes for the NIST Post-Quantum Cryptography Standardization Process: 3.9. UOV . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.9. UOV
[ 0.013222098, 0.026370985, 0.026693117, 0.011735894, -0.0028479493, 0.033413984, -0.012372838, -0.005688577, 0.028933406, 0.010740209, 0.061439563, 0.0050772564, -0.099099845, -0.002318992, 0.029519103, 0.013222098, 0.016370216, 0.0030584338, 0.009283289, 0.0006323692, 0.02143...
91
According to Status Report on the Fourth Round of the NIST Post-Quantum Cryptography Standardization Process: The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation's measurem...
[ -0.04243048, 0.0066490015, 0.036003113, -0.00645815, 0.030930169, -0.007203085, -0.022520414, 0.029255606, -0.029083224, -0.027457913, 0.037899308, 0.044769943, -0.093332276, -0.02499532, 0.03546134, -0.003456865, -0.033072624, -0.0071723023, -0.006846009, 0.040558908, 0.0631...
92
According to Recommendation for Pair-Wise Key-Establishment Using Integer Factorization Cryptography: The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the N...
[ -0.0114507675, -0.047562946, 0.009650368, -0.0076184073, 0.059511572, -0.0074736807, 0.006014837, 0.05288888, -0.03237244, 0.0063506025, 0.006124829, -0.02632866, -0.061271448, -0.014623174, 0.04677563, -0.03028838, -0.010402947, -0.0035544848, -0.027787505, 0.032534536, 0.00...
93
lishment to be studied: BIKE, Classic McEliece, HQC, and SIKE. This report describes the evaluation and selection process of these fourth-round candidates based on public feedback and internal review. The report summarizes each of the candidate algorithms and identifies those selected for standardization. The only key-...
[ 0.019000923, 0.0044605397, 0.028145378, -0.0036473116, 0.038225222, -0.0011273508, -0.043697935, 0.027866159, -0.014728856, -0.017953847, 0.054559592, -0.024417792, -0.08801015, 0.009311988, 0.028675897, 0.0028620053, -0.011378216, -0.0025059998, -0.020927541, 0.044758968, 0....
94
According to Guide to Malware Incident Prevention and Handling for Desktops and Laptops: Application whitelisting technologies, also known as application control programs, are used to specify which applications are authorized for use on a host. Most application whitelisting technologies can be run in two modes: audit ...
[ -0.028820625, 0.030237231, 0.07205156, 0.009012551, 0.0155948885, -0.047578454, -0.014275978, -0.0069425954, -0.026646866, 0.07210041, 0.039103236, 0.021090347, -0.013946251, 0.01835483, -0.019014284, -0.03839493, -0.018098375, 0.018965436, -0.031995777, 0.043719422, 0.053244...
95
ify, add, or delete Vendor Evidence (VE) and/or Test Evidence (TE) specified under paragraph 6.14 of the ISO/IEC 24759 and specify the order of the security policy as stated in ISO/IEC 19790:2012 B.1. ## Keywords CMVP; Cryptographic Module Validation Program; FIPS 140; FIPS 140 testing; ISO/IEC 19790; ISO/IEC 24759; s...
[ -0.01160563, 0.014426574, 0.051344972, -0.0366281, 0.0015485217, 0.019349027, 0.0062950603, -0.015915932, 0.020447113, 0.019121837, 0.04349429, -0.0141488975, -0.05131973, -0.01130271, 0.018730566, 0.01725383, -0.0070807594, 0.050638158, -0.028045362, 0.010564342, 0.048997343...
96
According to Blockchain for Access Control Systems: hemes may use the blockchain as a database for storing only the policies but not use the blockchain for access enforcement, such that PDP and PEP functions are performed off-the-chain. However, the main problems of the traditional mechanism, like sing...
[ 0.02425613, 0.0007429903, 0.11875526, 0.05040939, 0.03882952, 0.011376606, -0.03249755, -0.006535235, 0.051739845, 0.018330688, 0.027077185, -0.019353166, -0.0076870625, -0.0053710886, -0.02028941, 0.015263254, -0.009374767, -0.0036125497, 0.04124405, -0.006572192, -0.0007325...
97
According to Secure Software Development Framework (SSDF) Version 1.1_ Recommendations for Mitigating the Risk of Software Vulnerabilities: | Practices | Tasks | Notional Implementation Examples | References | |------------------------------------------------------------------------------------------------------------...
[ 0.023728056, 0.015227201, 0.083353944, 0.014256018, 0.028775813, -0.030190624, 0.026138032, 0.015239191, -0.03098196, 0.019699443, 0.046880595, -0.0014215552, 0.016486144, -0.02949521, 0.010623071, -0.024195664, 0.04959032, 0.011174608, -0.036185585, 0.020742565, 0.0466408, ...
98
According to Recommendation for Pair-Wise Key-Establishment Using Integer Factorization Cryptography: 3.2.2 rsakpg2-prime-factor ... 3.2.2 rsakpg2-prime-factor rsakpg2-prime-factor is the generator in the RSAKPG2 family such that the private key is in the prime-factor format ( p , q , d ). 3.2.2).
[ 0.034289274, -0.026460674, 0.040954772, -0.018576154, 0.03625761, 0.021707594, -0.0012197241, 0.04826892, -0.032276206, -0.001067346, 0.034848463, -0.022714129, -0.032455146, -0.01281654, 0.052474, -0.013375726, 0.0042218533, -0.046658468, -0.037040472, 0.037197042, -0.011664...
99