text stringlengths 51 4.95k | embedding listlengths 1.54k 1.54k | example_idx int64 0 2.23k |
|---|---|---|
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations:
| 3.4.3. Enhancing Practices....................................................................................................................49 | ... | [
0.009778906,
0.026356116,
0.07833271,
0.01907584,
0.044645585,
0.02111787,
0.01248047,
0.008605691,
-0.024111154,
0.053016633,
-0.009709147,
-0.020103198,
0.01419273,
-0.010000865,
0.0291972,
-0.02335015,
0.022589145,
0.0043789456,
-0.00793347,
0.03239342,
0.058495864,
0.06... | 100 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
............................................ 5 |
| 2.1 DEVELOPMENTAPPROACH .............................................................................. | [
0.017715218,
0.028639602,
0.051454652,
-0.015903434,
0.060768563,
0.0064553176,
-0.010763337,
0.01538003,
-0.0412013,
0.016789194,
0.024465788,
-0.0016071191,
0.008179868,
0.030706376,
0.014802943,
-0.017916527,
0.045388535,
0.004989115,
-0.033095248,
0.032343693,
0.03808772,... | 101 |
NIST Special Publication
NIST SP 800-63B-4
Digital Identity Guidelines
Authentication and Authenticator Management
David Temoshok
James L. Fenton
Yee-Yin Choong
Naomi Lefkovitz
Andrew Regenscheid
Ryan Galluzzo
Justin P. Richer
This publication is available free of charge from:
https://doi.org/10.6028/NIST.SP.800-63B... | [
0.010535017,
-0.021707641,
0.019620925,
-0.026315805,
0.021751113,
-0.017490735,
-0.0047059786,
0.017084986,
-0.03251799,
-0.018635532,
0.031271756,
-0.0018693495,
-0.05842804,
-0.05025507,
0.026054965,
0.024794241,
-0.023548007,
0.02008464,
0.0023348755,
0.007049911,
0.00299... | 102 |
According to Security and Privacy Controls for Information Systems and Organizations:
............................................................. 16
3.1 ACCESS CONTROL ..................................................................................................................
18
3.2 AWARENESS AND TRAINING ... | [
-0.0040349783,
0.032724887,
0.06021379,
0.00015022767,
0.030970832,
0.0017851425,
0.018600825,
0.015721034,
-0.010465418,
0.023614278,
0.047621254,
-0.013966981,
0.019765832,
-0.0032119476,
0.019792011,
-0.026323898,
0.021624604,
0.033955343,
0.023954617,
0.024046246,
0.01608... | 103 |
According to Digital Identity Guidelines_ Identity Proofing and Enrollment:
3.15.6. 3.15.6. | [
0.047606837,
-0.0037881518,
0.025678674,
0.039640427,
0.01520736,
-0.018779926,
0.00926677,
0.0135648,
-0.024501506,
0.044485975,
0.030195711,
-0.0089382585,
-0.005204859,
-0.029976703,
0.0015681306,
0.033918843,
0.033426076,
0.038216874,
-0.03769673,
0.04226852,
0.059405886,... | 104 |
y and Privacy
## JOINT TASK FORCE
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.800-37r2
## December 2018
<!-- image -->
U.S. Department of Commerce Wilbur L.
Ross, Jr., Secretary
National Institute of Standards and Technology Walter Copan, NIST Director and Under Secretary of... | [
-0.032635845,
0.016317923,
0.034957107,
0.0024093462,
0.0040449384,
-0.0021589124,
-0.04186563,
-0.012062275,
-0.017064042,
-0.010183157,
0.03982071,
0.011184894,
-0.031419948,
-0.012462969,
-0.0015077844,
0.014950036,
-0.011350698,
-0.016400825,
0.032414775,
0.0035993387,
-0... | 105 |
According to Organizational Views of NIST Cryptographic Standards and Testing and Validation Programs:
running up against is, how do you automate a test when the spec is so woolly? Then you have many degrees of freedom to implement to the spec and the test language can't accommodate all those degrees of freedom. There... | [
0.002501615,
0.01587767,
0.074745014,
-0.012942065,
0.036638606,
0.013640682,
-0.005878266,
-0.018658025,
0.012017632,
0.017091429,
0.047957618,
0.020408098,
-0.051090814,
-0.016625684,
0.015510719,
-0.025658313,
-0.005574826,
0.011311958,
-0.011530717,
-0.02389413,
0.0757047... | 106 |
According to Contingency Planning Guide for Federal Information Systems:
rocesses. Although information systems typically support mission/business processes, the processes also depend on a variety of other resources and capabilities not associated with information systems.
Recovery of mission essential functions is ad... | [
-0.01576596,
0.034274828,
0.06758157,
0.022346634,
0.023695039,
-0.0062234052,
0.02491667,
0.050063837,
-0.0038406476,
-0.013414895,
0.01344947,
0.004128768,
0.021159578,
-0.012907803,
-0.010262856,
0.003872341,
-0.018889187,
0.020145392,
-0.024225181,
-0.012227839,
-0.001789... | 107 |
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations:
3.1.15. 3.1.15. | [
-0.006971334,
0.021733057,
0.048918135,
0.00077880436,
0.066124514,
-0.01925714,
-0.0086719645,
0.011066603,
-0.026584854,
0.03191183,
0.0039670956,
-0.005195676,
-0.007246436,
-0.02165803,
0.0046329675,
-0.0051456573,
0.041290306,
-0.012904784,
-0.047767706,
0.005161288,
0.0... | 108 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
ent, or possibly with other organizations like municipal governments, prime contractors, universities, etc., you will likely be required to demonstrate you are taking adequate measure... | [
-0.008649043,
0.0029976794,
0.045061782,
0.015630636,
0.018504612,
-0.011299337,
-0.0037788723,
0.022680013,
-0.044329733,
0.012153396,
0.049074505,
0.021324363,
-0.000002204254,
-0.022205535,
0.016728712,
-0.0052938107,
-0.014315656,
-0.008255905,
-0.031830646,
0.012804108,
... | 109 |
According to Multi-Factor Authentication for Criminal Justice Information Systems_ Implementation Considerations for Protecting Criminal Justice Information:
3.1.3. 3.1.3. 3.1.3. | [
0.0012094276,
0.031271562,
0.0543875,
0.019613523,
0.033322975,
-0.01962603,
0.025892852,
-0.009619132,
0.012002025,
0.044130426,
0.019500945,
0.0037557143,
-0.002185882,
0.03302277,
-0.017524583,
-0.00087325834,
0.054037254,
0.0068046916,
-0.024104118,
-0.0042654406,
-0.0369... | 110 |
According to A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Cloud Environments:
One of the basic tenets of zero trust is to remove the implicit trust in users, services, and devices based only on their network location, affiliation, and ownership. NIST Special Publication 8002... | [
-0.022102429,
0.0037432525,
0.06846212,
0.028640807,
0.048957802,
-0.05309508,
-0.03642283,
0.019738268,
-0.011703821,
0.022176309,
-0.010349354,
-0.0013375356,
0.008200678,
0.0073449016,
-0.020243116,
-0.024072561,
0.021043481,
0.019775208,
0.0026519836,
0.041052643,
-0.0042... | 111 |
## NIST SPECIAL PUBLICATION 1800-26
## Data Integrity:
## Detecting and Responding to Ransomware and Other Destructive Events
Includes Executive Summary (A); Approach, Architecture, and Security Characteristics (B); and How-To Guides (C)
Jennifer Cawthra Michael Ekstrom Lauren Lusty Julian Sexton John Sweetnam
FIN... | [
0.014597927,
0.019530043,
0.04362371,
-0.0008167044,
0.012812162,
-0.016596284,
-0.006523006,
0.03526179,
-0.03917347,
-0.0072564455,
0.035403516,
-0.011628738,
-0.040760815,
-0.020989835,
0.039456923,
0.017319094,
0.004616772,
0.01109726,
-0.02586526,
0.04036398,
0.02705577,... | 112 |
According to Approaches and Challenges of Federal Cybersecurity Awareness Programs:
| EXECUTIVE SUMMARY......................................................................................................... iii | EXECUTIVE SUMMARY.............................................................................. | [
0.020063087,
-0.030119836,
0.07546342,
0.008223093,
0.032237045,
-0.0042281193,
-0.007592971,
0.034102205,
-0.021814827,
0.054745007,
0.02564597,
-0.041688878,
0.00851295,
-0.021764416,
0.031052416,
0.035362452,
0.0020195413,
0.00872089,
-0.010793991,
0.008790203,
0.014959098... | 113 |
According to Recommendations for Federal Vulnerability Disclosure Guidelines:
................................................................... | Executive Summary.................................................................................................................
|
|-------------------------------------... | [
0.0006310159,
0.026401473,
0.096774176,
0.030563083,
0.023337135,
0.00657026,
-0.018600125,
0.017328894,
-0.000872299,
0.009634597,
0.021276401,
0.0013657376,
-0.026829677,
-0.023176558,
0.0034925416,
0.02850235,
0.039876528,
0.033828143,
-0.008744735,
0.021303166,
0.01765004... | 114 |
According to Digital Identity Guidelines:
NFC (communications protocol)
Near-Field Communication
approved cryptography
An encryption algorithm, hash function, random bit generator, or similar technique that
is Federal Information Processing Standards (FIPS)-approved or NIST-recommended.
Approved algorithms and techni... | [
-0.008304,
-0.011567889,
0.03470367,
-0.004203299,
0.050426763,
-0.01372244,
-0.016479753,
0.025623772,
-0.014940788,
-0.009875027,
0.022135451,
0.0052100387,
-0.0576086,
0.0025681483,
0.0063738814,
-0.011458879,
-0.016608,
0.008592556,
0.016646475,
0.005796769,
0.017877646,
... | 115 |
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations:
| 1. Introduction.....................................................................................................................................1 |
|-----------------------------------------------------------------... | [
0.015706683,
0.018023662,
0.1005813,
0.013048253,
0.035632707,
0.0013879013,
-0.0023825257,
0.0022575308,
-0.049851645,
0.055363618,
-0.0018840702,
-0.031827983,
-0.0041248333,
-0.004893095,
0.021901553,
-0.02238934,
0.02447462,
0.0088533005,
-0.015048172,
0.029511003,
0.0559... | 116 |
nodes. The main purpose of smart contracts is to satisfy common contractual conditions, as well as minimize exceptions (both malicious and accidental) and the need for trusted intermediaries [IR8202].
Every blockchain node that executes the smart contract should arrive at the same result given the same input. Blockchai... | [
0.0069873077,
0.012710639,
0.019881045,
0.034021042,
0.04706244,
-0.0024142535,
-0.050133787,
-0.082548276,
0.016148182,
0.056796238,
-0.0070109335,
0.00012052811,
-0.011919177,
0.012982335,
0.012356253,
0.0023581425,
-0.02096783,
0.0055077467,
0.02679157,
-0.05717425,
0.0208... | 117 |
According to Guide to Malware Incident Prevention and Handling for Desktops and Laptops:
There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in this publication, including concepts and methodol... | [
-0.018419834,
0.0074785315,
0.045661174,
-0.027043844,
-0.0074851145,
-0.046029832,
0.007070372,
0.013304676,
-0.020065637,
-0.011020301,
0.02646452,
0.0046872483,
-0.048873782,
-0.0048551206,
-0.009808989,
-0.0009850134,
0.001533066,
-0.0037491405,
-0.014180243,
0.03365339,
... | 118 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
systems, but such standards and guidelines shall not apply to national security systems without the express approval of the appropriate federal officials exercising policy a... | [
0.005651286,
0.016780078,
0.037313778,
-0.011518057,
0.02336977,
0.00050482736,
-0.023467086,
-0.011949029,
-0.026372667,
0.0049665975,
0.02512146,
0.021075891,
-0.027874116,
-0.00428886,
0.0053419597,
-0.0070415162,
-0.00080807135,
-0.017169343,
-0.021381741,
0.0153898485,
0... | 119 |
According to Recommendation for Pair-Wise Key-Establishment Using Integer Factorization Cryptography:
3.1.2 rsakpg1-prime-factor ... 3.1.2 rsakpg1-prime-factor
rsakpg1-prime-factor is the generator in the RSAKPG1 family such that the private key is in the prime factor format ( p , q , d ). 3.1.2). | [
0.03297544,
-0.02396366,
0.04792732,
-0.007430767,
0.044245813,
0.0053133373,
-0.00073686556,
0.043206863,
-0.03789917,
-0.0070976247,
0.032614067,
-0.017910633,
-0.037763655,
-0.01457921,
0.054296546,
-0.0040569957,
0.005900571,
-0.03740228,
-0.03663436,
0.030942708,
0.00157... | 120 |
According to Control Baselines for Information Systems and Organizations:
| CONTROL NUMBER | CONTROL NAME CONTROL ENHANCEMENT NAME | PRIVACY CONTROL BASELINE | SECURITY CONTROL BASELINES | SECURITY CONTROL BASELINES | SECURITY CONTROL BASELINES | |------------------|----------------------------------------------------... | [
-0.016074128,
0.039532226,
0.08045061,
0.011335859,
0.033481102,
0.010509494,
-0.0161541,
-0.0284696,
-0.0019709466,
0.03628008,
0.04670294,
-0.03326785,
0.007843801,
0.00045733294,
0.013188516,
-0.013661676,
0.014914552,
0.029375935,
0.00971645,
0.02404455,
0.031561803,
0.... | 121 |
Technology (NIST), Amy Wohl Phillips, Dean Gallup, and David Lynes of Booz Allen Hamilton, wish to thank their colleagues who reviewed drafts of this document and contributed to its technical content.
The authors would like to acknowledge Kelley Dempsey, Esther Katzman, Peter Mell, Murugiah Souppaya, Lee Badger, and El... | [
0.023243828,
0.033713657,
-0.00030823337,
-0.008071335,
0.033902302,
-0.02002338,
-0.01951134,
-0.016223518,
-0.019632613,
-0.016910726,
0.027326657,
0.024901213,
-0.059611995,
-0.00881918,
0.03147686,
0.049964122,
0.011722974,
-0.0021525805,
0.034576036,
0.018568113,
0.00896... | 122 |
According to Blockchain for Access Control Systems:
There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in this publication, including concepts and methodologies, may be used by federal ag... | [
-0.014217658,
-0.004995562,
0.039764427,
0.007759065,
0.04234036,
0.0068399813,
-0.018956877,
0.010228711,
0.0034418737,
-0.022395626,
0.023446007,
0.01072264,
-0.04504134,
0.0021961092,
0.011104029,
-0.014292685,
-0.033036985,
-0.0126358345,
0.024796495,
0.006502359,
-0.0019... | 123 |
According to High-Performance Computing Security_ Architecture, Threat Analysis, and Security Posture:
HPC file systems in the data storage zone provide superior data access speed and much larger storage capacity compared to average enterprise file systems. Hard disk failure is a threat due to the large number of disk... | [
-0.019543301,
0.045464426,
0.07171854,
0.04702687,
0.03445051,
-0.017084379,
-0.033887006,
0.0047673616,
-0.0017193238,
0.0027886983,
0.061063208,
0.0151505405,
-0.015534746,
0.011180407,
-0.001500006,
-0.022937125,
0.00079082494,
0.014638266,
-0.014190025,
0.00556459,
0.0309... | 124 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
| Access Control | Maintenance | Security Assessment and Monitoring |
|-----------------------------------|---------------------|-------------------------... | [
-0.023050858,
0.021448392,
0.052462276,
0.022841305,
-0.0024745774,
-0.016776588,
-0.016640995,
0.049725756,
0.005907553,
0.005926043,
0.03249308,
-0.007260404,
0.010274273,
-0.02101696,
0.039617892,
0.015580901,
-0.034563962,
0.027587071,
-0.02625579,
0.028055483,
0.03219724... | 125 |
According to Data Integrity_ Detecting and Responding to Ransomware and Other Destructive Events:
| 1 | Summary..............................................................................................1 | Summary..............................................................................................1 | |----... | [
-0.014490258,
0.040540006,
0.042366624,
-0.00019914733,
0.013720079,
-0.038249917,
-0.05970586,
0.026963057,
-0.03623246,
0.04141242,
0.040921688,
0.0064306483,
-0.009139904,
-0.026308747,
0.013488345,
0.0022798642,
-0.010693892,
0.011280046,
-0.049863935,
0.012002514,
0.0371... | 126 |
According to Zero Trust Architecture:
3.1.3 | ZTA y el uso de una infraestructura de red y perímetros definidos a través de software... 3.1.3 ZTA y e... | [
-0.018583568,
0.033638608,
0.03594391,
0.011156022,
0.050810765,
-0.023123603,
0.0030933407,
0.051751707,
-0.03947244,
0.031921394,
-0.011897012,
0.050669625,
0.0021876858,
-0.01054441,
0.026510987,
-0.024934912,
0.036179148,
-0.0036373215,
-0.019183416,
0.017971955,
0.006727... | 127 |
..................11 | |
| 3.4.4.
| SCAP Generation Script ........................................................................................11 ... | [
0.034429472,
0.014452049,
0.09712443,
-0.036484133,
-0.032930125,
-0.0029414291,
-0.01796441,
-0.03081993,
-0.03043121,
-0.03584552,
0.011668537,
-0.04070452,
-0.008024288,
0.032319278,
0.027807351,
0.035956584,
0.046868507,
0.013320596,
-0.039788254,
0.01085639,
0.023642495,... | 128 |
According to IoT Non-Technical Supporting Capability Core Baseline:
1 One resource supporting both Information Reception and Information Dissemination to others in the ecosystem about vulnerabilities is found in Draft NIST SP 800-216: Federal Vulnerability Disclosure Guidelines [17] . This document recommends guidanc... | [
-0.006800808,
0.039552234,
0.11367155,
0.012810824,
0.022142166,
-0.007306915,
-0.004048853,
0.0067185657,
0.013842016,
0.0025890518,
0.002193656,
0.009717247,
-0.036515594,
-0.009369299,
0.020560583,
0.012829803,
0.026924873,
0.033630785,
-0.021142606,
0.01775169,
-0.0020022... | 129 |
10, ACPT], data structure [MARG], system simulation [VK13, ACRLCS], and test oracle [ACTS] to verify the expected functional logic implied in policy rules [AS15]. The model proof method converts policy to a finite state machine (FSM) and verifies test access cases against it to detect policy faults, such as rule confli... | [
-0.017047342,
0.050914727,
0.034174908,
0.0060534775,
-0.0021793856,
0.019119764,
-0.045031723,
-0.03666181,
0.04468409,
0.02101837,
0.06637099,
-0.034388833,
0.009031748,
0.0018668511,
-0.02560444,
-0.008797766,
0.005284676,
0.0017949848,
0.0016754863,
0.020242883,
0.0395765... | 130 |
h incorporating cybersecurity incident response recommendations and considerations throughout their cybersecurity risk management activities as described by the NIST Cybersecurity Framework (CSF) 2.0.
Doing so can help organizations prepare for incident responses, reduce the number and impact of incidents that occur, a... | [
-0.03541107,
-0.0022923946,
0.06771381,
-0.0076453006,
0.045644656,
-0.046553247,
0.0053020967,
0.028142357,
-0.013879896,
0.060349457,
0.009599963,
-0.0043247654,
-0.015386242,
-0.024938384,
0.023898289,
-0.005592008,
-0.006808442,
-0.0045160474,
-0.00091083086,
0.023910243,
... | 131 |
According to Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations:
...................94 |
| Table 5. Audit and Accountability (AU).......................................................................................................95 |
| Table 6.
Assessment, Autho... | [
-0.029629523,
0.043773428,
0.08273905,
-0.02065681,
0.01012575,
0.026512833,
-0.012585559,
0.009385011,
-0.030272428,
0.0031691012,
0.049391855,
-0.024108928,
0.021034166,
0.029685428,
0.025702214,
-0.0138364285,
0.011215893,
0.01863026,
-0.02982519,
0.029238189,
0.021872737,... | 132 |
CONTRIBUTIONS TO NIST SPECIAL PUBLICATION 800-53
The authors wanted to acknowledge the many individuals who contributed to previous versions of Special Publication 800-53 since its inception in 2005.
They include Marshall Abrams, Dennis Bailey, Lee Badger, Curt Barker, Matthew Barrett, Nadya Bartol, Frank Belz, Paul B... | [
0.038423203,
-0.028268864,
0.019313656,
-0.027656542,
-0.013866541,
-0.013968594,
-0.0072394316,
0.027095247,
-0.01561421,
-0.015320806,
0.057558265,
0.010479636,
-0.014300269,
0.025679253,
0.024735255,
0.035234027,
0.035540186,
-0.0069141355,
0.0072649447,
0.051792234,
0.019... | 133 |
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations:
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation's measurement and stand... | [
-0.017407201,
-0.006206511,
0.067109674,
-0.0035677205,
0.05693238,
-0.019548463,
-0.009220023,
0.011443157,
-0.057436205,
0.021525983,
0.009358575,
0.017747285,
-0.032320462,
-0.027055476,
0.03642665,
-0.01996412,
-0.0058254926,
0.0007293674,
-0.0206065,
0.027836407,
0.06454... | 134 |
According to Protecting Information and System Integrity in Industrial Control System Environments_ Cybersecurity for the Manufacturing Sector:
## Protecting Information and System Integrity in Industrial Control System Environments: Cybersecurity for the Manufacturing Sector
The first draft of this publication is av... | [
-0.008703578,
0.022194125,
0.031332884,
-0.019631404,
0.007301335,
0.0019719044,
-0.0042339284,
0.0383441,
-0.057637032,
0.016693948,
0.0364825,
-0.01666977,
-0.016911536,
-0.015521382,
0.02843169,
-0.010571222,
-0.01703242,
-0.00015034828,
-0.050432403,
0.03769133,
0.0321065... | 135 |
According to Risk Management Framework for Information Systems and Organizations_ A System Life Cycle Approach for Security and Privacy:
assess; authorization to operate; authorization to use; authorizing official; categorize; common control; common control authorization; common control provider; continuous monitoring... | [
0.02950279,
0.037636265,
0.0689072,
0.046552774,
0.048548255,
0.00944064,
-0.00862603,
0.02192502,
0.0006500307,
0.06158202,
0.026749533,
-0.03642382,
0.0027722013,
-0.026699014,
0.010299454,
-0.030993085,
0.00289534,
0.0124086,
0.032028712,
-0.009699548,
0.015496543,
0.030... | 136 |
ft publications during the designated public comment periods
and provide feedback to NIST. Many NIST publications, other than the ones noted above, are available at
https://csrc.nist.gov/publications.
Submit comments on this publication to: sec-cert@nist.gov
National Institute of Standards and Technology
Attn: Compute... | [
-0.005666914,
-0.004566604,
0.06309291,
-0.046938073,
-0.0012950902,
-0.015442499,
-0.016854458,
0.014094142,
0.011015819,
-0.016332923,
0.028162844,
-0.0013459715,
-0.024283139,
-0.008325466,
0.017452314,
-0.0075304443,
-0.0018555804,
0.009145929,
0.0071297535,
0.02617847,
0... | 137 |
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations:
3.1.4. 3.1.4. | [
-0.011167151,
0.018168826,
0.048466537,
0.0009946605,
0.064736396,
-0.020643609,
-0.0059664315,
0.009727611,
-0.032539718,
0.029060319,
0.006983298,
-0.00003450492,
-0.003819374,
-0.021758486,
0.0040062075,
-0.011651081,
0.04140973,
-0.014309634,
-0.041336223,
0.00487912,
0.0... | 138 |
.................61 |
| List of Tables |
| Table 1.
Example of a phased MFA deployment................................................................................16 ... | [
-0.0034375272,
0.023527337,
0.057141844,
0.009171435,
0.049111556,
0.0033195382,
-0.025541954,
0.006864488,
0.002423175,
0.07061019,
0.0069490173,
-0.01841331,
-0.012742801,
-0.013299285,
0.026753541,
0.005237298,
0.027767893,
0.012080654,
-0.02540107,
0.03279739,
-0.00282116... | 139 |
## Transitioning to the Security Content Automation Protocol (SCAP) Version 2
David Waltermire Computer Security Division Information Technology Laboratory
Jessica Fitzgerald-McKay Cybersecurity Solutions National Security Agency Fort Meade, MD
This publication is available free of charge from: https://doi.org/10.60... | [
0.013048666,
0.009574712,
0.068349525,
-0.014985936,
0.0016015316,
-0.008386082,
-0.0019241364,
-0.006120461,
-0.013488656,
0.01565577,
0.03094379,
-0.03706425,
-0.053797014,
0.018072434,
0.029551582,
-0.0058249454,
0.051643033,
0.019280765,
-0.018072434,
0.011525117,
0.00876... | 140 |
According to Recommendation for Pair-Wise Key-Establishment Using Integer Factorization Cryptography:
Many U.S. Government Information Technology (IT) systems need to employ strong cryptographic schemes to protect the integrity and confidentiality of the data that they process. Algorithms such as the Advanced Encrypt... | [
-0.004872709,
-0.02122006,
0.04266245,
0.018823849,
0.061165158,
0.022479925,
-0.010387702,
0.046491448,
-0.011215259,
-0.0025382552,
0.02751938,
-0.022195838,
-0.06872434,
-0.012320728,
0.024715565,
-0.040167425,
0.010251834,
-0.0077444576,
-0.046936106,
-0.0065772305,
-0.00... | 141 |
According to Workshop on Enhancing Security of Devices and Components Across the Supply Chain:
cycle. The last panel member was Matthew Areno, Senior Principal Engineer for Intel Corporation. Matthew admitted that there is no industry standard to describe the phases of the supply chain for ICs.
However, his expertise ... | [
-0.000197138,
-0.0053813113,
0.029530501,
-0.016202092,
0.0033492078,
0.01306841,
0.040532596,
0.025890505,
-0.029585239,
0.009886834,
0.053368375,
0.025890505,
-0.0067839418,
-0.0015736829,
0.014888409,
-0.049290486,
0.041764174,
0.020375773,
-0.05090522,
0.0062331525,
0.046... | 142 |
According to Audit and Evaluation of Computer Security II_ System Vulnerabilities and Controls:
| VULNERABILITIES | VULNERABILITIES | 6-5 | | 3.1 | Targets | Targets | 6-5 | | | 3.1.1 | Vul nerabl llties of Data and Prog ranis •••••••••••«••«•••••••«••••••••• | 6~5 | | | | Vulnerabilities of Terminals | 6-7 | | | 3.1.... | [
-0.031794794,
0.06539084,
0.11997417,
-0.010882553,
0.033896253,
0.027892085,
0.01765771,
0.022529272,
-0.008951668,
0.0006149154,
0.02708698,
-0.011749064,
0.012001512,
-0.0063487245,
-0.010459532,
-0.052427296,
0.04333917,
0.040337086,
-0.01206974,
0.041155837,
0.023757398,... | 143 |
According to Overview and Considerations of Access Control Based on Attribute Encryption:
In addition to functionalities like revocation, accountability, attribute privacy protection, policy updating, decentralization (multi-authorities), and key hierarchy for practical access control system deployments [ZDXSLZ], the ... | [
0.020395068,
0.055101592,
0.07734169,
0.01770232,
0.041837316,
0.044554997,
-0.0127905505,
0.026378952,
-0.012678352,
0.024247194,
0.030069014,
-0.055650115,
-0.006202046,
0.027800124,
-0.02715187,
-0.023224946,
0.02199077,
-0.0016502428,
-0.0053013465,
0.03283656,
-0.0211679... | 144 |
According to Guide to Malware Incident Prevention and Handling for Desktops and Laptops:
3.5.2 | Sandbo... | [
-0.02141996,
0.0166411,
0.058462176,
0.03924971,
0.015282644,
-0.059675086,
0.0054520224,
0.03556247,
0.031559873,
0.04652716,
-0.013657346,
-0.0253983,
0.009606233,
-0.018048074,
-0.025543848,
-0.009903396,
-0.03842493,
0.025058683,
-0.031050451,
-0.0029685928,
0.06341084,
... | 145 |
According to Audit and Evaluation of Computer Security II_ System Vulnerabilities and Controls:
| 3. | POLICY | AND CONTROL STANDARDS | 3-6 |
|------|----------------|----------------------------------------------------------... | [
-0.006502703,
0.051262878,
0.098542325,
0.0019457723,
0.021470182,
0.01932435,
0.021956256,
0.0033076648,
-0.0046473285,
-0.0031031587,
0.031582862,
-0.019466614,
0.024896402,
-0.016787289,
-0.011600537,
-0.04668668,
0.018482614,
0.034167346,
0.012946129,
0.023900546,
0.03739... | 146 |
## NIST Special Publication 800-83 Revision 1
## Guide to Malware Incident Prevention and Handling for Desktops and Laptops
Murugiah Souppaya Karen Scarfone
## C O M P U T E R S E C U R I T Y
<!-- image -->
## NIST Special Publication 800-83 Revision 1
## Guide to Malware Incident Prevention an... | [
0.022090774,
0.02426277,
0.038619123,
0.008946234,
-0.009668025,
-0.05051212,
0.012058543,
-0.00568162,
-0.040473264,
0.025203085,
0.034592986,
-0.030275486,
-0.069450855,
0.0076417127,
0.0014617922,
0.02313704,
0.0098733045,
-0.012952505,
0.0276532,
0.013919307,
0.05003534,
... | 147 |
171A. |
| What products, vendors, or solutions are 'NIST SP 800 -171 compliant' or 'CMMC - certified'? | NIST does not identify or track implementation of or compliance with the security requirements.
|
| What is the relationship between NIST and CMMC? | The Cybersecurity Maturity Model Certification (CMMC) is a DOD pr... | [
-0.03644712,
-0.015303543,
0.077884816,
-0.006039126,
0.02115685,
-0.004542617,
0.00084614125,
0.013405532,
0.022749586,
0.041517332,
0.026678335,
0.00014361588,
-0.029863808,
0.019192474,
-0.007512407,
0.008607414,
-0.02570942,
-0.006573356,
0.010631516,
0.047782093,
0.03711... | 148 |
According to Control Baselines for Information Systems and Organizations:
In working with the Office of Management and Budget to develop standards and guidelines required by FISMA, NIST consults with federal agencies; state, local, and tribal governments; and private sector organizations to improve information securi... | [
-0.005681209,
0.030570315,
0.08253739,
0.013920192,
0.018863581,
-0.009542463,
-0.02172878,
-0.024249664,
-0.02887333,
0.0029266835,
0.010341768,
0.0068309773,
-0.045818582,
-0.014178429,
0.02185175,
-0.00788237,
-0.020597456,
-0.0107352715,
0.011300933,
-0.012616711,
0.03910... | 149 |
According to Approaches and Challenges of Federal Cybersecurity Awareness Programs:
| EXECUTIVE SUMMARY......................................................................................................... iii | EXECUTIVE SUMMARY.............................................................................. | [
0.020063087,
-0.030119836,
0.07546342,
0.008223093,
0.032237045,
-0.0042281193,
-0.007592971,
0.034102205,
-0.021814827,
0.054745007,
0.02564597,
-0.041688878,
0.00851295,
-0.021764416,
0.031052416,
0.035362452,
0.0020195413,
0.00872089,
-0.010793991,
0.008790203,
0.014959098... | 150 |
According to Guidelines for the Use of PIV Credentials in Facility Access:
## Guidelines for the Use of PIV Credentials in Facility Access
## Guidelines for the Use of PIV Credentials in Facility Access
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIS... | [
-0.036420528,
-0.019905513,
0.0598806,
-0.012816909,
0.05433002,
-0.021901533,
-0.038225148,
0.012324739,
-0.0065417504,
-0.042162504,
0.014792422,
0.048451334,
-0.046592027,
-0.0076217884,
0.014259238,
-0.0138285905,
-0.017485682,
0.008455742,
-0.014423295,
0.02087618,
0.038... | 151 |
According to Federal Cybersecurity Awareness Programs_ A Mixed Methods Research Study:
| Focus Group Design...................................................................................................
| 3 ... | [
0.010825076,
-0.009401576,
0.045966133,
0.013419731,
0.032429937,
-0.013976189,
-0.015930267,
0.030048808,
0.008942173,
0.031291135,
0.030980553,
-0.041592106,
0.0019831953,
-0.017754937,
-0.012216225,
0.023565408,
0.007130445,
-0.012022112,
-0.0050501926,
-0.011187422,
0.021... | 152 |
n activities; provides scientific and technological advisory services and assistance to Federal agencies; and provides the technical foundation for computer-related policies of the Federal Government.
The Institute consists of the following centers:
Programming Science and Technology - Computer Systems Engineering. 'H... | [
-0.006180744,
0.013373423,
0.060213476,
0.0056284782,
0.0035616164,
-0.01752699,
0.041376922,
0.0011458682,
-0.03251422,
-0.021548277,
0.009352137,
0.013141935,
-0.028863315,
-0.011838986,
0.015780905,
0.037831843,
-0.008373271,
0.03740855,
0.035265625,
0.03611221,
0.00687851... | 153 |
According to Guide to a Secure Enterprise Network Landscape:
inks to malicious websites or to websites infected with malware. They centralize control, visibility, and reporting across many locations and types of users. They are not a replacement for WAFs,
- a.
Virtualized server-based approach: This approach is only ... | [
-0.05548419,
0.037007008,
0.06890778,
0.0017881675,
0.023991385,
-0.031032192,
-0.05174664,
0.017990248,
-0.017279588,
0.053089,
-0.0038198023,
0.007692246,
-0.018174494,
-0.008192341,
-0.029058134,
-0.045508616,
0.013831566,
0.013897369,
-0.022754308,
-0.003944826,
0.0394285... | 154 |
on, DC 20234
## Reports on Computer Science and Technology
The National Bureau of Standards has a special responsibility within the Federal Government for computer science and technology activities.
The programs of the NBS Institute for Computer Sciences and Technology are designed to provide ADP standards, guideline... | [
0.0047471127,
0.033066813,
0.086717166,
0.0047020344,
0.0026336247,
0.0044072904,
-0.0040605324,
-0.01755981,
-0.017629161,
-0.011332042,
0.020888684,
-0.007524642,
-0.06003069,
-0.0001641681,
0.021041257,
0.02252538,
0.012212806,
0.04191607,
0.03337196,
-0.0020580068,
0.0261... | 155 |
According to IoT Non-Technical Supporting Capability Core Baseline:
Document maintenance requirements for the IoT device, such as: a. Cybersecurity maintenance expectations and associated instructions or procedures for the customer (e.g., account management, local and/or remote maintenance activities, and vulnerabilit... | [
0.007854987,
0.05156315,
0.06667055,
0.00072766235,
0.020003317,
0.004847496,
0.010254525,
-0.016183427,
0.00878037,
0.040264882,
0.039619267,
0.009705751,
-0.0035293642,
-0.053844325,
-0.02227373,
0.003949014,
-0.031290825,
-0.0035535747,
-0.037402652,
-0.017549979,
0.069855... | 156 |
According to Guidelines for the Use of PIV Credentials in Facility Access:
3 OMB Memorandum [M-05-24] and credentialing guidance issued the Office of Personnel Management (OPM) clarifies the eligibility requirements for a PIV Card.
Figure 5-3 depicts a security posture of an FSL I or II campus. It includes one or mo... | [
-0.009775224,
0.021917298,
0.06687375,
0.042493835,
0.030509098,
0.003066301,
-0.03699399,
-0.0013775268,
0.038526285,
-0.009870993,
0.04908818,
0.01831914,
-0.036720365,
0.04309581,
0.01164955,
-0.019468362,
0.029113613,
0.023695854,
-0.021397412,
0.020166103,
-0.014967243,
... | 157 |
other than the ones noted above, are available at
Organizations are encouraged to review all draft publications during public comment periods and provide feedback https://csrc.nist.gov/publications.
## Authority
This publication has been developed by NIST in accordance with its statutory responsibilities under the Fe... | [
-0.025712207,
0.030769693,
0.043167837,
-0.049300537,
0.02086711,
-0.008342861,
-0.031778537,
-0.015477766,
-0.015504315,
-0.011057444,
0.03451303,
-0.011289743,
-0.016367141,
-0.020707818,
0.00977648,
0.015106088,
0.019393668,
-0.0050574862,
0.003580727,
0.029813947,
0.01265... | 158 |
2
23
23
24
iii
NIST SP 800-63A-4
July 2025
Digital Identity Guidelines
Identity Proofing and Enrollment
3.7. Additional Requirements for Federal Agencies
. . . . . . . . . . . . . . 3.8. 3.9.
Requirements for Confirmation Codes . . . . . . . . . . . . . . . . . . . Requirements for Continuation Codes . . . . .... | [
0.019044552,
0.0064517125,
0.05779718,
0.008421108,
0.02404216,
0.0017920444,
0.013319892,
0.0017673386,
-0.0062223026,
0.04102555,
0.05373133,
-0.0039917324,
-0.041872602,
-0.009536394,
0.000034742367,
0.0028164478,
0.037524402,
0.034644425,
-0.010856383,
0.0326115,
0.004778... | 159 |
According to Ascon-Based Lightweight Cryptography Standards for Constrained Devices_ Authenticated Encryption, Hash, and Extendable Output Functions:
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | 15 |
| 4.2. Implementation Options . . . . . . . . . . .... | [
0.035589408,
0.009319332,
0.075184055,
-0.019539844,
0.021456638,
0.02324469,
-0.008668481,
-0.009483834,
0.026005445,
-0.03610437,
0.021513855,
-0.023444952,
-0.028623154,
0.022086032,
-0.013846683,
-0.01603526,
0.0032453164,
-0.012072935,
0.024560697,
0.019067798,
-0.003349... | 160 |
According to Guidelines for the Use of PIV Credentials in Facility Access:
+ Enhanced trust. PIV Cards are issued in accordance with standardized, audited processes, which exceeds the level for low- and moderate-impact legacy applications, and equals best practice reached for high-impact applications. + Resistance to ... | [
-0.0031736346,
-0.0012812664,
0.049518153,
0.020739663,
0.036640912,
-0.0016521801,
-0.014036443,
-0.0025105576,
0.0320545,
-0.044830937,
0.033717703,
0.023587272,
-0.065520205,
0.04218493,
0.027064882,
-0.023801474,
-0.020008862,
0.028425688,
-0.018055856,
0.012360638,
0.005... | 161 |
Just as preventive maintenance on corporate fleet vehicles can help avoid costly breakdowns, patching should be viewed as a normal and necessary part of reliably achieving the organization's missions.
If an organization needs a particular technology to support its mission, it also needs to maintain that technology thro... | [
0.028898371,
0.03584895,
0.08533173,
0.027481522,
0.022241855,
0.027174093,
0.008574609,
0.012170197,
-0.014529385,
0.029112235,
0.025824076,
0.0238993,
-0.0020818321,
-0.018272003,
0.00962388,
-0.0025580137,
0.022308687,
-0.022081457,
-0.020704707,
-0.007391674,
0.023458205,... | 162 |
According to The Federal Cybersecurity Awareness Workforce_ Professional Backgrounds, Knowledge, Skills, and Development Activities:
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing t... | [
-0.038186636,
-0.03789214,
0.046800718,
-0.009301244,
0.064249754,
-0.027339276,
0.0050647603,
0.037180435,
-0.029130809,
0.020295855,
0.030357886,
0.037524015,
-0.040100876,
-0.036198772,
0.050604656,
0.021768346,
-0.049303956,
-0.016209688,
-0.0075587947,
0.014786278,
0.034... | 163 |
According to Protecting Information and System Integrity in Industrial Control System Environments_ Cybersecurity for the Manufacturing Sector:
NIST's Cybersecurity for IoT program has defined a set of device cybersecurity capabilities that device manufacturers should consider integrating into their IoT devices and th... | [
-0.0039558634,
-0.0025946617,
0.03560277,
0.0040025646,
0.0549865,
-0.012856556,
0.018856281,
-0.00080696866,
0.011680786,
0.035317067,
0.033580884,
0.013790579,
-0.039756425,
-0.055030454,
-0.024042858,
-0.026877893,
-0.046239648,
-0.002373518,
-0.015944326,
0.040789347,
0.0... | 164 |
According to Zero Trust Architecture:
| 1 INTRODUCCIÓN..................................................................................................................................................10 | 1 INTRODUCCIÓN....................................................................................................... | [
-0.011461441,
0.01398726,
0.035570413,
0.019272428,
0.04823024,
0.02016968,
-0.016887957,
0.015216369,
-0.042723827,
0.03102271,
0.0147370165,
-0.019727198,
-0.00070097623,
-0.015277824,
0.01375373,
0.017404184,
0.009156862,
-0.009273628,
-0.010410553,
0.007024358,
-0.0050485... | 165 |
According to Data Integrity_ Detecting and Responding to Ransomware and Other Destructive Events:
NIST Cybersecurity Practice Guides (Special Publication 1800 series) target specific cybersecurity challenges in the public and private sectors. They are practical, user-friendly guides that facilitate the adoption of sta... | [
-0.017151479,
0.017901402,
0.07741147,
-0.002857572,
0.020901097,
-0.04905952,
-0.0061989655,
0.026174754,
-0.048237022,
0.023271823,
0.03664949,
0.0067493124,
-0.013631676,
-0.0447777,
0.012216498,
0.0054913764,
-0.02544902,
0.0004944053,
-0.040471684,
0.015216192,
0.0513818... | 166 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
| FAMILY | FAMILY |
|-----------------------------------|--------------------------------------|
| Access Control ... | [
0.037914764,
0.057977535,
0.043579873,
-0.005644381,
0.008829277,
0.034184087,
0.0046253526,
0.019496258,
-0.025948955,
-0.009775764,
0.032277294,
0.0129882945,
0.016511714,
0.03882671,
0.0039172145,
-0.044906337,
0.027137244,
0.0076271687,
-0.02882296,
0.05344545,
0.03277471... | 167 |
According to IoT Device Cybersecurity Capability Core Baseline:
| 1. The ability to change the device's software configuration settings 2. The ability to restrict configuration changes to authorized entities only 3. The ability for authorized entities to restore the device to a secure configuration defined by an autho... | [
0.019769575,
0.029671898,
0.04594585,
-0.021780437,
0.021815509,
-0.010434267,
-0.022201315,
-0.0014898789,
0.020856842,
0.009960779,
0.0267959,
-0.014356616,
0.00523467,
0.019769575,
-0.0010653475,
-0.026328256,
-0.01018291,
0.034044355,
-0.025229298,
-0.0024171257,
0.034091... | 168 |
According to Planning for a Zero Trust Architecture_ A Planning Guide for Federal Administrators:
Assessing the SP 800-53controls of the system itself should ideally have a continual assessment component utilizing a monitoring program [13]. Frequent automated checks or scans should be conducted to detect changes in t... | [
-0.04683284,
0.04215735,
0.053612303,
-0.0030374462,
0.027221752,
0.021117637,
0.004451458,
0.025351554,
0.024234632,
0.06467763,
0.016714882,
0.0024919722,
-0.0020114356,
0.04530032,
0.026013916,
0.00213644,
-0.0000320121,
0.03293624,
-0.023325508,
-0.013052414,
0.016961645,... | 169 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
systems, but such standards and guidelines shall not apply to national security systems without the express approval of the appropriate federal officials exercising policy a... | [
0.005641308,
0.016767511,
0.037288945,
-0.011518975,
0.023371631,
0.00047749522,
-0.02348286,
-0.011963883,
-0.026360864,
0.004970469,
0.025109557,
0.021091472,
-0.027862431,
-0.0042787744,
0.005342385,
-0.007035125,
-0.0008194322,
-0.017184613,
-0.021411251,
0.015391074,
0.0... | 170 |
According to IoT Non-Technical Supporting Capability Core Baseline:
| Non-Technical Supporting Capability | Common Actions | Rationale | IoT Reference Examples | |------------------------------------------------------------------------------------------------------------------------------------------------------------... | [
0.0017603821,
0.016713826,
0.01807748,
-0.0072768494,
0.031303726,
-0.020394487,
-0.01407099,
0.013552076,
0.005807602,
0.02326661,
0.019815234,
-0.002682056,
-0.03497232,
-0.06970329,
0.0216616,
-0.012327201,
-0.023857929,
-0.005943364,
-0.024075149,
0.017498229,
0.07071698,... | 171 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
<!-- image -->
<!-- image -->
Howard Lutnick, Secretary of Commerce
<!-- image -->
Protecting Controlled Unclassified Information (CUI): NIST Special Publication 800-171, Revision... | [
-0.029982954,
-0.012517091,
0.02689492,
0.02363533,
0.017736396,
-0.031091478,
-0.009640206,
0.03977492,
-0.014358034,
0.012748034,
0.038771972,
0.002870287,
-0.026789347,
-0.007093238,
0.011560329,
-0.0057768654,
-0.012761231,
-0.0023374695,
-0.00986455,
0.027449183,
0.03322... | 172 |
oval of the appropriate federal officials exercising policy authority over such systems. This
guideline is consistent with the requirements of the Office of Management and Budget (OMB)
Circular A-130.
Nothing in this publication should be taken to contradict the standards and guidelines made
mandatory and binding on fe... | [
0.016718213,
0.007896658,
0.02385113,
-0.015176717,
0.004656015,
0.0073641413,
-0.016914403,
-0.036519416,
-0.004841695,
0.009276996,
0.050392866,
0.004656015,
-0.06339748,
-0.038789615,
0.027957112,
0.045151785,
-0.0027606771,
-0.01823168,
0.021791132,
0.0039623426,
0.019843... | 173 |
According to IoT Non-Technical Supporting Capability Core Baseline:
| Non-Technical Supporting Capability | Common Actions | Rationale | IoT Reference Examples | |------------------------------------------------------------------------------------------------------------------------------------------------------------... | [
0.0017603821,
0.016713826,
0.01807748,
-0.0072768494,
0.031303726,
-0.020394487,
-0.01407099,
0.013552076,
0.005807602,
0.02326661,
0.019815234,
-0.002682056,
-0.03497232,
-0.06970329,
0.0216616,
-0.012327201,
-0.023857929,
-0.005943364,
-0.024075149,
0.017498229,
0.07071698,... | 174 |
According to IoT Device Cybersecurity Capability Core Baseline:
| Data Protection : The IoT device can protect the data it stores and transmits from unauthorized access and modification. | [
-0.0017006835,
0.04240559,
0.03725868,
0.018824145,
0.06012243,
-0.0020364628,
-0.050771877,
0.029405037,
0.015061366,
-0.0063054734,
0.034121327,
0.012703221,
0.0030758407,
-0.028994923,
-0.03311655,
-0.02477077,
-0.026985375,
0.008566217,
-0.009463336,
0.033198573,
0.001777... | 175 |
<!-- image -->
## NIST Special Publication NIST SP 800-140Br1
## Cryptographic Module Validation Program (CMVP) Security Policy Requirements:
CMVP Validation Authority Updates to ISO/IEC 24759 and ISO/IEC 19790 Annex B
David Hawes Alexander Calis Roy Crombie
This publication is available free of charge from: https... | [
0.013105993,
0.02976311,
0.038551103,
-0.03777732,
0.0073716897,
0.029569663,
0.02676469,
-0.015254631,
-0.0068673473,
-0.018791936,
0.05239634,
-0.019151194,
-0.05792338,
-0.009333788,
0.014757196,
0.033466227,
-0.020740217,
0.038440563,
0.012774372,
0.029680206,
-0.00162615... | 176 |
According to Access Control on NoSQL Databases:
## 3.3. Access Control Model Implementations
For data at rest, some NoSQL databases may allow users backdoor access to other users' data due to poor logging and log analysis methods [ZA]. In some systems, authorization is applied at a per-database level using a role-bas... | [
-0.013665944,
0.051928308,
0.05625947,
0.015409806,
0.051700354,
0.015626363,
-0.022043316,
0.022738582,
-0.017780544,
-0.04048493,
0.031891003,
-0.016401414,
0.017506998,
0.025850177,
-0.022373853,
-0.009602634,
0.01661797,
-0.007317378,
-0.003160036,
0.023456642,
0.00974510... | 177 |
According to Addressing Visibility Challenges with TLS 1.3 within the Enterprise_ High-Level Document:
..................................................................... | 5.4 Specific Details ...........................................................................................................
| 29 ... | [
0.01464458,
0.020370899,
0.106635556,
-0.009514182,
0.030083722,
0.01200746,
-0.029837133,
0.0031200217,
-0.018658483,
-0.0031165967,
0.05392055,
0.028576795,
-0.01241844,
-0.01017175,
-0.0021439446,
0.0066852714,
0.010089554,
0.019411946,
0.015206252,
0.03707038,
0.059126295... | 178 |
& Company | U.S. Bank Corporation |
| Technology Partner/Collaborator | Build Involvement |
|-----------------------------------|---------------------|
| Mira Security, Inc.
| |
## DOCUMENT CONVENTIONS
The terms 'shall' and 'shall not' indicate requirements to be followe... | [
0.017877337,
0.017521273,
0.07542604,
0.01900487,
0.0063905916,
-0.028737264,
-0.024731552,
-0.0073771835,
-0.024271639,
-0.028559232,
0.0374163,
-0.03397436,
0.014902727,
-0.00063191936,
-0.024108443,
0.025087615,
0.011156646,
-0.025636546,
-0.011638815,
0.009101864,
0.02283... | 179 |
According to Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations:
Approved by the NIST Editorial Review Board on 2024-04-23 Supersedes NIST Special Publication 800-171r2 (February 2020; Includes updates as of 01-28-2021) https://doi.org/10.6028/NIST.SP.800-171r2
Additional informati... | [
-0.012744497,
0.032769687,
0.035472073,
-0.030198487,
0.031405378,
0.004696376,
-0.0063263336,
0.010094586,
-0.017027644,
0.01730313,
0.029096544,
0.0006214828,
-0.017578615,
0.03169398,
0.012416537,
-0.040745657,
0.034527548,
0.015860109,
-0.016463554,
0.028466862,
0.0215010... | 180 |
According to Assessing Enhanced Security Requirements for Controlled Unclassified Information:
| CHAPTERONE INTRODUCTION...................................................................................................... | CHAPTERONE INTRODUCTION.......................................................................... | [
0.03428543,
0.038844522,
0.05217921,
-0.014217516,
0.035945676,
0.011424084,
-0.009348775,
-0.00733276,
-0.028461387,
0.021438276,
0.03344213,
-0.0151267,
-0.0030009632,
0.028197855,
0.03136023,
-0.028224207,
0.016655182,
0.024179002,
-0.013222686,
0.018526254,
0.023889117,
... | 181 |
tise, and understanding. Appendix E provides three tables that identify specific assurance-related controls that are included in the low-, moderate-, and high-impact baselines described in Appendix D.
The controls described assist organizations in defining the controls needed to satisfy minimum assurance requirements. ... | [
-0.02884311,
0.005428479,
0.08991821,
0.010925991,
0.0005126461,
-0.013806537,
0.011095435,
-0.01940446,
0.0054002386,
0.022655271,
0.0004494969,
-0.017120106,
-0.004383575,
-0.0047099115,
0.012450986,
-0.0404155,
0.047946338,
0.01248864,
0.012739668,
0.020006927,
0.026006494... | 182 |
According to Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography:
## Conformance Testing
Conformance testing for implementations of this Recommendation will be conducted within the framework of the Cryptographic Algorithm Validation Program (CAVP) and the Cryptographic Module ... | [
0.034371242,
-0.0024025547,
0.08364813,
-0.019441081,
0.028291307,
0.023192007,
0.04459436,
0.0008695471,
0.03603832,
0.0042197932,
0.023841677,
-0.022395242,
-0.024025546,
0.03949506,
-0.00090172415,
0.014672745,
0.0032330295,
0.010768593,
-0.02259137,
0.030448703,
0.0313557... | 183 |
According to High-Performance Computing Security_ Architecture, Threat Analysis, and Security Posture:
Continuous integration (CI) pipelines [22] and tests of scientific code on HPC platforms have recently become commonplace. Industry-standard identification of software weaknesses and the publication of Common Vulnera... | [
0.014151306,
-0.008571685,
0.10899844,
0.033310786,
0.048926022,
0.018658664,
-0.027044147,
-0.0031590029,
0.023564108,
0.019082433,
0.015961954,
0.00800666,
-0.0013660119,
-0.011461017,
0.02193324,
-0.03708618,
0.005990548,
0.0009976221,
0.0047577666,
0.03020315,
0.028867636... | 184 |
According to Cryptographic Module Validation Program (CMVP) Security Policy Requirements_ CMVP Validation Authority Updates to ISO_IEC 24759 and ISO_IEC 19790 Anne:
## 5.1 Integrity Techniques
- Integrity Techniques - Specify the approved integrity techniques or EDC [error detection code] employed
- Initiate on Dema... | [
-0.023436058,
0.07059683,
0.055201884,
-0.0063297977,
0.01109261,
0.04607488,
0.0051751765,
0.02837069,
0.026666248,
0.014405272,
0.057621088,
-0.011937957,
-0.051380638,
0.017951608,
-0.0071407817,
-0.006456943,
-0.011181955,
0.02952531,
-0.041373923,
0.02376595,
0.040631667... | 185 |
According to Transitioning to the Security Content Automation Protocol (SCAP) Version 2:
ovides a gap analysis of SCAP v1 and an overview of how SCAP v2 will address these gaps; describes the SCAP 2.0 architecture; and provides a plan for completing the work necessary to finalize SCAP v2.
| 1 ... | [
0.018195646,
0.017592672,
0.07207321,
-0.03676963,
0.004885868,
0.024473676,
-0.010735313,
-0.043106776,
-0.003455281,
0.0056632324,
0.034617838,
-0.011752094,
-0.05954079,
0.033979394,
0.0033754758,
-0.013631956,
0.05197405,
0.021316927,
-0.002479881,
0.013265442,
0.01663500... | 186 |
According to IoT Non-Technical Supporting Capability Core Baseline:
The non-technical supporting capabilities in Table 1 describe the intended recipient of the value of the capability as the customer (i.e., those with whom the communications take place). This stems from an assumption that the customer of an IoT device... | [
-0.019291209,
-0.0033094198,
0.027982853,
0.016382217,
0.038323317,
-0.023224825,
-0.023754803,
0.019255877,
0.0011872986,
0.008721087,
0.01933832,
0.012483933,
-0.010022478,
-0.04489505,
-0.0048787445,
-0.026451804,
-0.002464399,
-0.039077066,
-0.031892914,
0.00962205,
0.053... | 187 |
According to Incident Response Recommendations and Considerations for Cybersecurity Risk Management_ A CSF 2.0 Community Profile:
ent some incidents, prepare to handle incidents that do occur, reduce the impact of those incidents, and improve incident response and cybersecurity risk management practices based on lesso... | [
0.022386683,
-0.00023242754,
0.040821332,
0.03132172,
0.035519224,
-0.019207872,
0.005341998,
0.058617763,
0.008302956,
0.11124611,
0.03706567,
-0.02157664,
0.013181632,
0.0070449323,
0.029824365,
-0.012064753,
0.011021514,
0.024890458,
-0.037188407,
0.026633281,
-0.005817592... | 188 |
According to IoT Device Cybersecurity Capability Core Baseline:
ts, guidelines, and procedures, where they exist, remain operative. For planning and transition purposes, federal agencies may wish to closely follow the development of these new publications by NIST.
Organizations are encouraged to review all draft publi... | [
-0.0012989718,
0.022568287,
0.048821192,
-0.011658362,
0.04013931,
-0.021324728,
-0.023190066,
0.013057366,
0.0123665,
0.0031751047,
0.023074921,
0.010800538,
-0.034612384,
-0.034128778,
-0.008434322,
-0.016903186,
-0.025055405,
-0.021255642,
-0.0013198418,
0.03318459,
0.0312... | 189 |
. . . . . . . . . . . . . . . 4. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . Appendix A. List of Symbols, Abbreviations, and Acronyms
. . . . . . . . . . . . . . . 1
2
3... | [
0.039990906,
0.0028415467,
0.03898117,
-0.014441899,
-0.010296662,
0.025389576,
-0.020500323,
0.0340122,
-0.029813819,
0.018919287,
0.037838574,
-0.008702341,
-0.08003496,
-0.017178819,
0.03241788,
0.035659667,
-0.010608884,
-0.02837893,
-0.0069950875,
0.034490496,
0.04166494... | 190 |
According to Organizational Views of NIST Cryptographic Standards and Testing and Validation Programs:
2 | Background: NIST Cryptographic Standards and Testing/Validation Programs ... 1 Methodology..........................................................................................................
2 |
| Study ... | [
-0.019454157,
-0.009733444,
0.061774585,
-0.028875673,
0.053167906,
0.029766897,
-0.004612087,
-0.016844142,
-0.008141972,
0.017799025,
0.041505598,
0.018881226,
-0.031574808,
-0.0017060583,
0.022675296,
0.012629923,
0.015889259,
0.0007141732,
-0.0289266,
0.023923011,
0.07211... | 191 |
According to Planning for a Zero Trust Architecture_ A Planning Guide for Federal Administrators:
- I. All communication is secured regardless of network location. In zero trust, the network is always considered contested. A ZTA should be designed with the assumption that an attacker is present on the network and coul... | [
-0.029119642,
0.058077358,
0.04331513,
0.021657566,
0.024747647,
-0.010349752,
-0.015099573,
0.036109436,
0.00060469133,
0.024950054,
0.02171154,
0.01682678,
0.008521341,
0.029011691,
0.00848086,
-0.014249464,
0.014586808,
0.026933644,
-0.01689425,
0.009364704,
0.021279737,
... | 192 |
pment of management, administrative, technical, and physical standards and guidelines for the costeffective security of other than national security-related information in federal information systems.
The Special Publication 800-series reports on ITL's research, guidelines, and outreach efforts in information systems s... | [
-0.00083298096,
-0.012322635,
0.05287221,
0.01320587,
0.007967379,
-0.0031187295,
0.02512039,
0.015374362,
-0.028555866,
0.007522716,
0.028580232,
0.008077022,
-0.041274436,
0.006103451,
0.02473055,
-0.014996703,
0.022464598,
0.010172418,
0.0010994739,
0.022074757,
0.02536404... | 193 |
According to Profile of the IoT Core Baseline for Consumer IoT Products:
osed of. - d. Vulnerability management options (e.g., configuration and patch management and anti-malware) available for the IoT product or its product components that could be used by customers. - e.
Additional information customers can use to m... | [
0.00005084659,
0.019345507,
0.073765576,
0.0028609552,
-0.008694331,
0.006960419,
0.005502075,
0.02208261,
0.0397809,
0.015778601,
0.038790092,
0.002449151,
-0.014490552,
-0.025191268,
-0.013289198,
0.005468016,
-0.00043038177,
-0.00042651143,
-0.05523749,
0.056426458,
0.0213... | 194 |
According to Status Report on the First Round of the Additional Digital Signature Schemes for the NIST Post-Quantum Cryptography Standardization Process:
3.6. PERK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3.6. PERK | [
0.025138808,
0.026505956,
0.01718702,
0.008753941,
0.0059638405,
0.049273178,
-0.011111576,
0.05892693,
0.0033917162,
0.027273234,
0.04871516,
-0.010769789,
-0.06523255,
-0.009374739,
0.041153986,
-0.00005623797,
0.027510393,
-0.015038643,
-0.0017124243,
0.03515527,
0.0391730... | 195 |
According to Proceedings of the Cybersecurity in Cyber-Physical Systems Workshop, April 23-24, 2012:
Abstract -Over the past decade, there has been an explosion in the deployment of implantable medical devices (IMDs) to facilitate the management and treatment of a wide variety of human health conditions. While funct... | [
0.036441036,
0.019450538,
0.034224294,
0.025357338,
0.028168812,
-0.01669313,
-0.0060352087,
-0.0026374469,
-0.014381774,
-0.014895408,
0.021437492,
-0.034359463,
-0.01681478,
0.015436077,
0.008130298,
-0.057851493,
0.014192539,
-0.010684955,
0.018450301,
0.039766144,
0.02178... | 196 |
...........12 |
| 3. FORENSIC TOOLS.............................................................................................................15 | 3.
FORENSIC TOOLS............................................................................................................ | [
0.03909242,
0.017358417,
0.01039202,
-0.006527398,
0.008168243,
-0.030226098,
-0.02341803,
-0.032644186,
0.0106079215,
-0.006315096,
0.04939808,
0.0033644526,
0.01958939,
-0.023432422,
0.048016317,
-0.012320734,
0.014091119,
0.008909502,
-0.033651724,
0.050664697,
0.008204226... | 197 |
sions. This documentation is essential when examining the security considerations for organizational information systems with respect to the potential impact on an organization's mission and business.
The resulting tailored baseline set of security controls and the supporting rationale for the selection decisions (incl... | [
-0.011142329,
0.008036125,
0.066501,
-0.0022355255,
-0.009100942,
0.007665499,
0.001835484,
-0.0024531952,
0.018754883,
0.025273204,
0.029579531,
-0.007665499,
-0.019096093,
-0.034991857,
0.0031326772,
-0.017331205,
0.024520185,
0.016578186,
0.0061771097,
-0.021202194,
0.0289... | 198 |
According to Security and Privacy Controls for Information Systems and Organizations:
............................................................. 16
3.1 ACCESS CONTROL ..................................................................................................................
18
3.2 AWARENESS AND TRAINING ... | [
-0.0040349783,
0.032724887,
0.06021379,
0.00015022767,
0.030970832,
0.0017851425,
0.018600825,
0.015721034,
-0.010465418,
0.023614278,
0.047621254,
-0.013966981,
0.019765832,
-0.0032119476,
0.019792011,
-0.026323898,
0.021624604,
0.033955343,
0.023954617,
0.024046246,
0.01608... | 199 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.