text
stringlengths
51
4.95k
embedding
listlengths
1.54k
1.54k
example_idx
int64
0
2.23k
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations: | 3.4.3. Enhancing Practices....................................................................................................................49 | ...
[ 0.009778906, 0.026356116, 0.07833271, 0.01907584, 0.044645585, 0.02111787, 0.01248047, 0.008605691, -0.024111154, 0.053016633, -0.009709147, -0.020103198, 0.01419273, -0.010000865, 0.0291972, -0.02335015, 0.022589145, 0.0043789456, -0.00793347, 0.03239342, 0.058495864, 0.06...
100
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: ............................................ 5 | | 2.1 DEVELOPMENTAPPROACH ..............................................................................
[ 0.017715218, 0.028639602, 0.051454652, -0.015903434, 0.060768563, 0.0064553176, -0.010763337, 0.01538003, -0.0412013, 0.016789194, 0.024465788, -0.0016071191, 0.008179868, 0.030706376, 0.014802943, -0.017916527, 0.045388535, 0.004989115, -0.033095248, 0.032343693, 0.03808772,...
101
NIST Special Publication NIST SP 800-63B-4 Digital Identity Guidelines Authentication and Authenticator Management David Temoshok James L. Fenton Yee-Yin Choong Naomi Lefkovitz Andrew Regenscheid Ryan Galluzzo Justin P. Richer This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.800-63B...
[ 0.010535017, -0.021707641, 0.019620925, -0.026315805, 0.021751113, -0.017490735, -0.0047059786, 0.017084986, -0.03251799, -0.018635532, 0.031271756, -0.0018693495, -0.05842804, -0.05025507, 0.026054965, 0.024794241, -0.023548007, 0.02008464, 0.0023348755, 0.007049911, 0.00299...
102
According to Security and Privacy Controls for Information Systems and Organizations: ............................................................. 16 3.1 ACCESS CONTROL .................................................................................................................. 18 3.2 AWARENESS AND TRAINING ...
[ -0.0040349783, 0.032724887, 0.06021379, 0.00015022767, 0.030970832, 0.0017851425, 0.018600825, 0.015721034, -0.010465418, 0.023614278, 0.047621254, -0.013966981, 0.019765832, -0.0032119476, 0.019792011, -0.026323898, 0.021624604, 0.033955343, 0.023954617, 0.024046246, 0.01608...
103
According to Digital Identity Guidelines_ Identity Proofing and Enrollment: 3.15.6. 3.15.6.
[ 0.047606837, -0.0037881518, 0.025678674, 0.039640427, 0.01520736, -0.018779926, 0.00926677, 0.0135648, -0.024501506, 0.044485975, 0.030195711, -0.0089382585, -0.005204859, -0.029976703, 0.0015681306, 0.033918843, 0.033426076, 0.038216874, -0.03769673, 0.04226852, 0.059405886,...
104
y and Privacy ## JOINT TASK FORCE This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.800-37r2 ## December 2018 <!-- image --> U.S. Department of Commerce Wilbur L. Ross, Jr., Secretary National Institute of Standards and Technology Walter Copan, NIST Director and Under Secretary of...
[ -0.032635845, 0.016317923, 0.034957107, 0.0024093462, 0.0040449384, -0.0021589124, -0.04186563, -0.012062275, -0.017064042, -0.010183157, 0.03982071, 0.011184894, -0.031419948, -0.012462969, -0.0015077844, 0.014950036, -0.011350698, -0.016400825, 0.032414775, 0.0035993387, -0...
105
According to Organizational Views of NIST Cryptographic Standards and Testing and Validation Programs: running up against is, how do you automate a test when the spec is so woolly? Then you have many degrees of freedom to implement to the spec and the test language can't accommodate all those degrees of freedom. There...
[ 0.002501615, 0.01587767, 0.074745014, -0.012942065, 0.036638606, 0.013640682, -0.005878266, -0.018658025, 0.012017632, 0.017091429, 0.047957618, 0.020408098, -0.051090814, -0.016625684, 0.015510719, -0.025658313, -0.005574826, 0.011311958, -0.011530717, -0.02389413, 0.0757047...
106
According to Contingency Planning Guide for Federal Information Systems: rocesses. Although information systems typically support mission/business processes, the processes also depend on a variety of other resources and capabilities not associated with information systems. Recovery of mission essential functions is ad...
[ -0.01576596, 0.034274828, 0.06758157, 0.022346634, 0.023695039, -0.0062234052, 0.02491667, 0.050063837, -0.0038406476, -0.013414895, 0.01344947, 0.004128768, 0.021159578, -0.012907803, -0.010262856, 0.003872341, -0.018889187, 0.020145392, -0.024225181, -0.012227839, -0.001789...
107
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations: 3.1.15. 3.1.15.
[ -0.006971334, 0.021733057, 0.048918135, 0.00077880436, 0.066124514, -0.01925714, -0.0086719645, 0.011066603, -0.026584854, 0.03191183, 0.0039670956, -0.005195676, -0.007246436, -0.02165803, 0.0046329675, -0.0051456573, 0.041290306, -0.012904784, -0.047767706, 0.005161288, 0.0...
108
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer: ent, or possibly with other organizations like municipal governments, prime contractors, universities, etc., you will likely be required to demonstrate you are taking adequate measure...
[ -0.008649043, 0.0029976794, 0.045061782, 0.015630636, 0.018504612, -0.011299337, -0.0037788723, 0.022680013, -0.044329733, 0.012153396, 0.049074505, 0.021324363, -0.000002204254, -0.022205535, 0.016728712, -0.0052938107, -0.014315656, -0.008255905, -0.031830646, 0.012804108, ...
109
According to Multi-Factor Authentication for Criminal Justice Information Systems_ Implementation Considerations for Protecting Criminal Justice Information: 3.1.3. 3.1.3. 3.1.3.
[ 0.0012094276, 0.031271562, 0.0543875, 0.019613523, 0.033322975, -0.01962603, 0.025892852, -0.009619132, 0.012002025, 0.044130426, 0.019500945, 0.0037557143, -0.002185882, 0.03302277, -0.017524583, -0.00087325834, 0.054037254, 0.0068046916, -0.024104118, -0.0042654406, -0.0369...
110
According to A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Cloud Environments: One of the basic tenets of zero trust is to remove the implicit trust in users, services, and devices based only on their network location, affiliation, and ownership. NIST Special Publication 8002...
[ -0.022102429, 0.0037432525, 0.06846212, 0.028640807, 0.048957802, -0.05309508, -0.03642283, 0.019738268, -0.011703821, 0.022176309, -0.010349354, -0.0013375356, 0.008200678, 0.0073449016, -0.020243116, -0.024072561, 0.021043481, 0.019775208, 0.0026519836, 0.041052643, -0.0042...
111
## NIST SPECIAL PUBLICATION 1800-26 ## Data Integrity: ## Detecting and Responding to Ransomware and Other Destructive Events Includes Executive Summary (A); Approach, Architecture, and Security Characteristics (B); and How-To Guides (C) Jennifer Cawthra Michael Ekstrom Lauren Lusty Julian Sexton John Sweetnam FIN...
[ 0.014597927, 0.019530043, 0.04362371, -0.0008167044, 0.012812162, -0.016596284, -0.006523006, 0.03526179, -0.03917347, -0.0072564455, 0.035403516, -0.011628738, -0.040760815, -0.020989835, 0.039456923, 0.017319094, 0.004616772, 0.01109726, -0.02586526, 0.04036398, 0.02705577,...
112
According to Approaches and Challenges of Federal Cybersecurity Awareness Programs: | EXECUTIVE SUMMARY......................................................................................................... iii | EXECUTIVE SUMMARY..............................................................................
[ 0.020063087, -0.030119836, 0.07546342, 0.008223093, 0.032237045, -0.0042281193, -0.007592971, 0.034102205, -0.021814827, 0.054745007, 0.02564597, -0.041688878, 0.00851295, -0.021764416, 0.031052416, 0.035362452, 0.0020195413, 0.00872089, -0.010793991, 0.008790203, 0.014959098...
113
According to Recommendations for Federal Vulnerability Disclosure Guidelines: ................................................................... | Executive Summary................................................................................................................. | |-------------------------------------...
[ 0.0006310159, 0.026401473, 0.096774176, 0.030563083, 0.023337135, 0.00657026, -0.018600125, 0.017328894, -0.000872299, 0.009634597, 0.021276401, 0.0013657376, -0.026829677, -0.023176558, 0.0034925416, 0.02850235, 0.039876528, 0.033828143, -0.008744735, 0.021303166, 0.01765004...
114
According to Digital Identity Guidelines: NFC (communications protocol) Near-Field Communication approved cryptography An encryption algorithm, hash function, random bit generator, or similar technique that is Federal Information Processing Standards (FIPS)-approved or NIST-recommended. Approved algorithms and techni...
[ -0.008304, -0.011567889, 0.03470367, -0.004203299, 0.050426763, -0.01372244, -0.016479753, 0.025623772, -0.014940788, -0.009875027, 0.022135451, 0.0052100387, -0.0576086, 0.0025681483, 0.0063738814, -0.011458879, -0.016608, 0.008592556, 0.016646475, 0.005796769, 0.017877646, ...
115
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations: | 1. Introduction.....................................................................................................................................1 | |-----------------------------------------------------------------...
[ 0.015706683, 0.018023662, 0.1005813, 0.013048253, 0.035632707, 0.0013879013, -0.0023825257, 0.0022575308, -0.049851645, 0.055363618, -0.0018840702, -0.031827983, -0.0041248333, -0.004893095, 0.021901553, -0.02238934, 0.02447462, 0.0088533005, -0.015048172, 0.029511003, 0.0559...
116
nodes. The main purpose of smart contracts is to satisfy common contractual conditions, as well as minimize exceptions (both malicious and accidental) and the need for trusted intermediaries [IR8202]. Every blockchain node that executes the smart contract should arrive at the same result given the same input. Blockchai...
[ 0.0069873077, 0.012710639, 0.019881045, 0.034021042, 0.04706244, -0.0024142535, -0.050133787, -0.082548276, 0.016148182, 0.056796238, -0.0070109335, 0.00012052811, -0.011919177, 0.012982335, 0.012356253, 0.0023581425, -0.02096783, 0.0055077467, 0.02679157, -0.05717425, 0.0208...
117
According to Guide to Malware Incident Prevention and Handling for Desktops and Laptops: There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in this publication, including concepts and methodol...
[ -0.018419834, 0.0074785315, 0.045661174, -0.027043844, -0.0074851145, -0.046029832, 0.007070372, 0.013304676, -0.020065637, -0.011020301, 0.02646452, 0.0046872483, -0.048873782, -0.0048551206, -0.009808989, -0.0009850134, 0.001533066, -0.0037491405, -0.014180243, 0.03365339, ...
118
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: systems, but such standards and guidelines shall not apply to national security systems without the express approval of the appropriate federal officials exercising policy a...
[ 0.005651286, 0.016780078, 0.037313778, -0.011518057, 0.02336977, 0.00050482736, -0.023467086, -0.011949029, -0.026372667, 0.0049665975, 0.02512146, 0.021075891, -0.027874116, -0.00428886, 0.0053419597, -0.0070415162, -0.00080807135, -0.017169343, -0.021381741, 0.0153898485, 0...
119
According to Recommendation for Pair-Wise Key-Establishment Using Integer Factorization Cryptography: 3.1.2 rsakpg1-prime-factor ... 3.1.2 rsakpg1-prime-factor rsakpg1-prime-factor is the generator in the RSAKPG1 family such that the private key is in the prime factor format ( p , q , d ). 3.1.2).
[ 0.03297544, -0.02396366, 0.04792732, -0.007430767, 0.044245813, 0.0053133373, -0.00073686556, 0.043206863, -0.03789917, -0.0070976247, 0.032614067, -0.017910633, -0.037763655, -0.01457921, 0.054296546, -0.0040569957, 0.005900571, -0.03740228, -0.03663436, 0.030942708, 0.00157...
120
According to Control Baselines for Information Systems and Organizations: | CONTROL NUMBER | CONTROL NAME CONTROL ENHANCEMENT NAME | PRIVACY CONTROL BASELINE | SECURITY CONTROL BASELINES | SECURITY CONTROL BASELINES | SECURITY CONTROL BASELINES | |------------------|----------------------------------------------------...
[ -0.016074128, 0.039532226, 0.08045061, 0.011335859, 0.033481102, 0.010509494, -0.0161541, -0.0284696, -0.0019709466, 0.03628008, 0.04670294, -0.03326785, 0.007843801, 0.00045733294, 0.013188516, -0.013661676, 0.014914552, 0.029375935, 0.00971645, 0.02404455, 0.031561803, 0....
121
Technology (NIST), Amy Wohl Phillips, Dean Gallup, and David Lynes of Booz Allen Hamilton, wish to thank their colleagues who reviewed drafts of this document and contributed to its technical content. The authors would like to acknowledge Kelley Dempsey, Esther Katzman, Peter Mell, Murugiah Souppaya, Lee Badger, and El...
[ 0.023243828, 0.033713657, -0.00030823337, -0.008071335, 0.033902302, -0.02002338, -0.01951134, -0.016223518, -0.019632613, -0.016910726, 0.027326657, 0.024901213, -0.059611995, -0.00881918, 0.03147686, 0.049964122, 0.011722974, -0.0021525805, 0.034576036, 0.018568113, 0.00896...
122
According to Blockchain for Access Control Systems: There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in this publication, including concepts and methodologies, may be used by federal ag...
[ -0.014217658, -0.004995562, 0.039764427, 0.007759065, 0.04234036, 0.0068399813, -0.018956877, 0.010228711, 0.0034418737, -0.022395626, 0.023446007, 0.01072264, -0.04504134, 0.0021961092, 0.011104029, -0.014292685, -0.033036985, -0.0126358345, 0.024796495, 0.006502359, -0.0019...
123
According to High-Performance Computing Security_ Architecture, Threat Analysis, and Security Posture: HPC file systems in the data storage zone provide superior data access speed and much larger storage capacity compared to average enterprise file systems. Hard disk failure is a threat due to the large number of disk...
[ -0.019543301, 0.045464426, 0.07171854, 0.04702687, 0.03445051, -0.017084379, -0.033887006, 0.0047673616, -0.0017193238, 0.0027886983, 0.061063208, 0.0151505405, -0.015534746, 0.011180407, -0.001500006, -0.022937125, 0.00079082494, 0.014638266, -0.014190025, 0.00556459, 0.0309...
124
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer: | Access Control | Maintenance | Security Assessment and Monitoring | |-----------------------------------|---------------------|-------------------------...
[ -0.023050858, 0.021448392, 0.052462276, 0.022841305, -0.0024745774, -0.016776588, -0.016640995, 0.049725756, 0.005907553, 0.005926043, 0.03249308, -0.007260404, 0.010274273, -0.02101696, 0.039617892, 0.015580901, -0.034563962, 0.027587071, -0.02625579, 0.028055483, 0.03219724...
125
According to Data Integrity_ Detecting and Responding to Ransomware and Other Destructive Events: | 1 | Summary..............................................................................................1 | Summary..............................................................................................1 | |----...
[ -0.014490258, 0.040540006, 0.042366624, -0.00019914733, 0.013720079, -0.038249917, -0.05970586, 0.026963057, -0.03623246, 0.04141242, 0.040921688, 0.0064306483, -0.009139904, -0.026308747, 0.013488345, 0.0022798642, -0.010693892, 0.011280046, -0.049863935, 0.012002514, 0.0371...
126
According to Zero Trust Architecture: 3.1.3 | ZTA y el uso de una infraestructura de red y perímetros definidos a través de software... 3.1.3 ZTA y e...
[ -0.018583568, 0.033638608, 0.03594391, 0.011156022, 0.050810765, -0.023123603, 0.0030933407, 0.051751707, -0.03947244, 0.031921394, -0.011897012, 0.050669625, 0.0021876858, -0.01054441, 0.026510987, -0.024934912, 0.036179148, -0.0036373215, -0.019183416, 0.017971955, 0.006727...
127
..................11 | | | 3.4.4. | SCAP Generation Script ........................................................................................11 ...
[ 0.034429472, 0.014452049, 0.09712443, -0.036484133, -0.032930125, -0.0029414291, -0.01796441, -0.03081993, -0.03043121, -0.03584552, 0.011668537, -0.04070452, -0.008024288, 0.032319278, 0.027807351, 0.035956584, 0.046868507, 0.013320596, -0.039788254, 0.01085639, 0.023642495,...
128
According to IoT Non-Technical Supporting Capability Core Baseline: 1 One resource supporting both Information Reception and Information Dissemination to others in the ecosystem about vulnerabilities is found in Draft NIST SP 800-216: Federal Vulnerability Disclosure Guidelines [17] . This document recommends guidanc...
[ -0.006800808, 0.039552234, 0.11367155, 0.012810824, 0.022142166, -0.007306915, -0.004048853, 0.0067185657, 0.013842016, 0.0025890518, 0.002193656, 0.009717247, -0.036515594, -0.009369299, 0.020560583, 0.012829803, 0.026924873, 0.033630785, -0.021142606, 0.01775169, -0.0020022...
129
10, ACPT], data structure [MARG], system simulation [VK13, ACRLCS], and test oracle [ACTS] to verify the expected functional logic implied in policy rules [AS15]. The model proof method converts policy to a finite state machine (FSM) and verifies test access cases against it to detect policy faults, such as rule confli...
[ -0.017047342, 0.050914727, 0.034174908, 0.0060534775, -0.0021793856, 0.019119764, -0.045031723, -0.03666181, 0.04468409, 0.02101837, 0.06637099, -0.034388833, 0.009031748, 0.0018668511, -0.02560444, -0.008797766, 0.005284676, 0.0017949848, 0.0016754863, 0.020242883, 0.0395765...
130
h incorporating cybersecurity incident response recommendations and considerations throughout their cybersecurity risk management activities as described by the NIST Cybersecurity Framework (CSF) 2.0. Doing so can help organizations prepare for incident responses, reduce the number and impact of incidents that occur, a...
[ -0.03541107, -0.0022923946, 0.06771381, -0.0076453006, 0.045644656, -0.046553247, 0.0053020967, 0.028142357, -0.013879896, 0.060349457, 0.009599963, -0.0043247654, -0.015386242, -0.024938384, 0.023898289, -0.005592008, -0.006808442, -0.0045160474, -0.00091083086, 0.023910243, ...
131
According to Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations: ...................94 | | Table 5. Audit and Accountability (AU).......................................................................................................95 | | Table 6. Assessment, Autho...
[ -0.029629523, 0.043773428, 0.08273905, -0.02065681, 0.01012575, 0.026512833, -0.012585559, 0.009385011, -0.030272428, 0.0031691012, 0.049391855, -0.024108928, 0.021034166, 0.029685428, 0.025702214, -0.0138364285, 0.011215893, 0.01863026, -0.02982519, 0.029238189, 0.021872737,...
132
CONTRIBUTIONS TO NIST SPECIAL PUBLICATION 800-53 The authors wanted to acknowledge the many individuals who contributed to previous versions of Special Publication 800-53 since its inception in 2005. They include Marshall Abrams, Dennis Bailey, Lee Badger, Curt Barker, Matthew Barrett, Nadya Bartol, Frank Belz, Paul B...
[ 0.038423203, -0.028268864, 0.019313656, -0.027656542, -0.013866541, -0.013968594, -0.0072394316, 0.027095247, -0.01561421, -0.015320806, 0.057558265, 0.010479636, -0.014300269, 0.025679253, 0.024735255, 0.035234027, 0.035540186, -0.0069141355, 0.0072649447, 0.051792234, 0.019...
133
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations: The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation's measurement and stand...
[ -0.017407201, -0.006206511, 0.067109674, -0.0035677205, 0.05693238, -0.019548463, -0.009220023, 0.011443157, -0.057436205, 0.021525983, 0.009358575, 0.017747285, -0.032320462, -0.027055476, 0.03642665, -0.01996412, -0.0058254926, 0.0007293674, -0.0206065, 0.027836407, 0.06454...
134
According to Protecting Information and System Integrity in Industrial Control System Environments_ Cybersecurity for the Manufacturing Sector: ## Protecting Information and System Integrity in Industrial Control System Environments: Cybersecurity for the Manufacturing Sector The first draft of this publication is av...
[ -0.008703578, 0.022194125, 0.031332884, -0.019631404, 0.007301335, 0.0019719044, -0.0042339284, 0.0383441, -0.057637032, 0.016693948, 0.0364825, -0.01666977, -0.016911536, -0.015521382, 0.02843169, -0.010571222, -0.01703242, -0.00015034828, -0.050432403, 0.03769133, 0.0321065...
135
According to Risk Management Framework for Information Systems and Organizations_ A System Life Cycle Approach for Security and Privacy: assess; authorization to operate; authorization to use; authorizing official; categorize; common control; common control authorization; common control provider; continuous monitoring...
[ 0.02950279, 0.037636265, 0.0689072, 0.046552774, 0.048548255, 0.00944064, -0.00862603, 0.02192502, 0.0006500307, 0.06158202, 0.026749533, -0.03642382, 0.0027722013, -0.026699014, 0.010299454, -0.030993085, 0.00289534, 0.0124086, 0.032028712, -0.009699548, 0.015496543, 0.030...
136
ft publications during the designated public comment periods and provide feedback to NIST. Many NIST publications, other than the ones noted above, are available at https://csrc.nist.gov/publications. Submit comments on this publication to: sec-cert@nist.gov National Institute of Standards and Technology Attn: Compute...
[ -0.005666914, -0.004566604, 0.06309291, -0.046938073, -0.0012950902, -0.015442499, -0.016854458, 0.014094142, 0.011015819, -0.016332923, 0.028162844, -0.0013459715, -0.024283139, -0.008325466, 0.017452314, -0.0075304443, -0.0018555804, 0.009145929, 0.0071297535, 0.02617847, 0...
137
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations: 3.1.4. 3.1.4.
[ -0.011167151, 0.018168826, 0.048466537, 0.0009946605, 0.064736396, -0.020643609, -0.0059664315, 0.009727611, -0.032539718, 0.029060319, 0.006983298, -0.00003450492, -0.003819374, -0.021758486, 0.0040062075, -0.011651081, 0.04140973, -0.014309634, -0.041336223, 0.00487912, 0.0...
138
.................61 | | List of Tables | | Table 1. Example of a phased MFA deployment................................................................................16 ...
[ -0.0034375272, 0.023527337, 0.057141844, 0.009171435, 0.049111556, 0.0033195382, -0.025541954, 0.006864488, 0.002423175, 0.07061019, 0.0069490173, -0.01841331, -0.012742801, -0.013299285, 0.026753541, 0.005237298, 0.027767893, 0.012080654, -0.02540107, 0.03279739, -0.00282116...
139
## Transitioning to the Security Content Automation Protocol (SCAP) Version 2 David Waltermire Computer Security Division Information Technology Laboratory Jessica Fitzgerald-McKay Cybersecurity Solutions National Security Agency Fort Meade, MD This publication is available free of charge from: https://doi.org/10.60...
[ 0.013048666, 0.009574712, 0.068349525, -0.014985936, 0.0016015316, -0.008386082, -0.0019241364, -0.006120461, -0.013488656, 0.01565577, 0.03094379, -0.03706425, -0.053797014, 0.018072434, 0.029551582, -0.0058249454, 0.051643033, 0.019280765, -0.018072434, 0.011525117, 0.00876...
140
According to Recommendation for Pair-Wise Key-Establishment Using Integer Factorization Cryptography: Many U.S. Government Information Technology (IT) systems need to employ strong cryptographic schemes to protect the integrity and confidentiality of the data that they process. Algorithms such as the Advanced Encrypt...
[ -0.004872709, -0.02122006, 0.04266245, 0.018823849, 0.061165158, 0.022479925, -0.010387702, 0.046491448, -0.011215259, -0.0025382552, 0.02751938, -0.022195838, -0.06872434, -0.012320728, 0.024715565, -0.040167425, 0.010251834, -0.0077444576, -0.046936106, -0.0065772305, -0.00...
141
According to Workshop on Enhancing Security of Devices and Components Across the Supply Chain: cycle. The last panel member was Matthew Areno, Senior Principal Engineer for Intel Corporation. Matthew admitted that there is no industry standard to describe the phases of the supply chain for ICs. However, his expertise ...
[ -0.000197138, -0.0053813113, 0.029530501, -0.016202092, 0.0033492078, 0.01306841, 0.040532596, 0.025890505, -0.029585239, 0.009886834, 0.053368375, 0.025890505, -0.0067839418, -0.0015736829, 0.014888409, -0.049290486, 0.041764174, 0.020375773, -0.05090522, 0.0062331525, 0.046...
142
According to Audit and Evaluation of Computer Security II_ System Vulnerabilities and Controls: | VULNERABILITIES | VULNERABILITIES | 6-5 | | 3.1 | Targets | Targets | 6-5 | | | 3.1.1 | Vul nerabl llties of Data and Prog ranis •••••••••••«••«•••••••«••••••••• | 6~5 | | | | Vulnerabilities of Terminals | 6-7 | | | 3.1....
[ -0.031794794, 0.06539084, 0.11997417, -0.010882553, 0.033896253, 0.027892085, 0.01765771, 0.022529272, -0.008951668, 0.0006149154, 0.02708698, -0.011749064, 0.012001512, -0.0063487245, -0.010459532, -0.052427296, 0.04333917, 0.040337086, -0.01206974, 0.041155837, 0.023757398,...
143
According to Overview and Considerations of Access Control Based on Attribute Encryption: In addition to functionalities like revocation, accountability, attribute privacy protection, policy updating, decentralization (multi-authorities), and key hierarchy for practical access control system deployments [ZDXSLZ], the ...
[ 0.020395068, 0.055101592, 0.07734169, 0.01770232, 0.041837316, 0.044554997, -0.0127905505, 0.026378952, -0.012678352, 0.024247194, 0.030069014, -0.055650115, -0.006202046, 0.027800124, -0.02715187, -0.023224946, 0.02199077, -0.0016502428, -0.0053013465, 0.03283656, -0.0211679...
144
According to Guide to Malware Incident Prevention and Handling for Desktops and Laptops: 3.5.2 | Sandbo...
[ -0.02141996, 0.0166411, 0.058462176, 0.03924971, 0.015282644, -0.059675086, 0.0054520224, 0.03556247, 0.031559873, 0.04652716, -0.013657346, -0.0253983, 0.009606233, -0.018048074, -0.025543848, -0.009903396, -0.03842493, 0.025058683, -0.031050451, -0.0029685928, 0.06341084, ...
145
According to Audit and Evaluation of Computer Security II_ System Vulnerabilities and Controls: | 3. | POLICY | AND CONTROL STANDARDS | 3-6 | |------|----------------|----------------------------------------------------------...
[ -0.006502703, 0.051262878, 0.098542325, 0.0019457723, 0.021470182, 0.01932435, 0.021956256, 0.0033076648, -0.0046473285, -0.0031031587, 0.031582862, -0.019466614, 0.024896402, -0.016787289, -0.011600537, -0.04668668, 0.018482614, 0.034167346, 0.012946129, 0.023900546, 0.03739...
146
## NIST Special Publication 800-83 Revision 1 ## Guide to Malware Incident Prevention and Handling for Desktops and Laptops Murugiah Souppaya Karen Scarfone ## C O M P U T E R S E C U R I T Y <!-- image --> ## NIST Special Publication 800-83 Revision 1 ## Guide to Malware Incident Prevention an...
[ 0.022090774, 0.02426277, 0.038619123, 0.008946234, -0.009668025, -0.05051212, 0.012058543, -0.00568162, -0.040473264, 0.025203085, 0.034592986, -0.030275486, -0.069450855, 0.0076417127, 0.0014617922, 0.02313704, 0.0098733045, -0.012952505, 0.0276532, 0.013919307, 0.05003534, ...
147
171A. | | What products, vendors, or solutions are 'NIST SP 800 -171 compliant' or 'CMMC - certified'? | NIST does not identify or track implementation of or compliance with the security requirements. | | What is the relationship between NIST and CMMC? | The Cybersecurity Maturity Model Certification (CMMC) is a DOD pr...
[ -0.03644712, -0.015303543, 0.077884816, -0.006039126, 0.02115685, -0.004542617, 0.00084614125, 0.013405532, 0.022749586, 0.041517332, 0.026678335, 0.00014361588, -0.029863808, 0.019192474, -0.007512407, 0.008607414, -0.02570942, -0.006573356, 0.010631516, 0.047782093, 0.03711...
148
According to Control Baselines for Information Systems and Organizations: In working with the Office of Management and Budget to develop standards and guidelines required by FISMA, NIST consults with federal agencies; state, local, and tribal governments; and private sector organizations to improve information securi...
[ -0.005681209, 0.030570315, 0.08253739, 0.013920192, 0.018863581, -0.009542463, -0.02172878, -0.024249664, -0.02887333, 0.0029266835, 0.010341768, 0.0068309773, -0.045818582, -0.014178429, 0.02185175, -0.00788237, -0.020597456, -0.0107352715, 0.011300933, -0.012616711, 0.03910...
149
According to Approaches and Challenges of Federal Cybersecurity Awareness Programs: | EXECUTIVE SUMMARY......................................................................................................... iii | EXECUTIVE SUMMARY..............................................................................
[ 0.020063087, -0.030119836, 0.07546342, 0.008223093, 0.032237045, -0.0042281193, -0.007592971, 0.034102205, -0.021814827, 0.054745007, 0.02564597, -0.041688878, 0.00851295, -0.021764416, 0.031052416, 0.035362452, 0.0020195413, 0.00872089, -0.010793991, 0.008790203, 0.014959098...
150
According to Guidelines for the Use of PIV Credentials in Facility Access: ## Guidelines for the Use of PIV Credentials in Facility Access ## Guidelines for the Use of PIV Credentials in Facility Access The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIS...
[ -0.036420528, -0.019905513, 0.0598806, -0.012816909, 0.05433002, -0.021901533, -0.038225148, 0.012324739, -0.0065417504, -0.042162504, 0.014792422, 0.048451334, -0.046592027, -0.0076217884, 0.014259238, -0.0138285905, -0.017485682, 0.008455742, -0.014423295, 0.02087618, 0.038...
151
According to Federal Cybersecurity Awareness Programs_ A Mixed Methods Research Study: | Focus Group Design................................................................................................... | 3 ...
[ 0.010825076, -0.009401576, 0.045966133, 0.013419731, 0.032429937, -0.013976189, -0.015930267, 0.030048808, 0.008942173, 0.031291135, 0.030980553, -0.041592106, 0.0019831953, -0.017754937, -0.012216225, 0.023565408, 0.007130445, -0.012022112, -0.0050501926, -0.011187422, 0.021...
152
n activities; provides scientific and technological advisory services and assistance to Federal agencies; and provides the technical foundation for computer-related policies of the Federal Government. The Institute consists of the following centers: Programming Science and Technology - Computer Systems Engineering. 'H...
[ -0.006180744, 0.013373423, 0.060213476, 0.0056284782, 0.0035616164, -0.01752699, 0.041376922, 0.0011458682, -0.03251422, -0.021548277, 0.009352137, 0.013141935, -0.028863315, -0.011838986, 0.015780905, 0.037831843, -0.008373271, 0.03740855, 0.035265625, 0.03611221, 0.00687851...
153
According to Guide to a Secure Enterprise Network Landscape: inks to malicious websites or to websites infected with malware. They centralize control, visibility, and reporting across many locations and types of users. They are not a replacement for WAFs, - a. Virtualized server-based approach: This approach is only ...
[ -0.05548419, 0.037007008, 0.06890778, 0.0017881675, 0.023991385, -0.031032192, -0.05174664, 0.017990248, -0.017279588, 0.053089, -0.0038198023, 0.007692246, -0.018174494, -0.008192341, -0.029058134, -0.045508616, 0.013831566, 0.013897369, -0.022754308, -0.003944826, 0.0394285...
154
on, DC 20234 ## Reports on Computer Science and Technology The National Bureau of Standards has a special responsibility within the Federal Government for computer science and technology activities. The programs of the NBS Institute for Computer Sciences and Technology are designed to provide ADP standards, guideline...
[ 0.0047471127, 0.033066813, 0.086717166, 0.0047020344, 0.0026336247, 0.0044072904, -0.0040605324, -0.01755981, -0.017629161, -0.011332042, 0.020888684, -0.007524642, -0.06003069, -0.0001641681, 0.021041257, 0.02252538, 0.012212806, 0.04191607, 0.03337196, -0.0020580068, 0.0261...
155
According to IoT Non-Technical Supporting Capability Core Baseline: Document maintenance requirements for the IoT device, such as: a. Cybersecurity maintenance expectations and associated instructions or procedures for the customer (e.g., account management, local and/or remote maintenance activities, and vulnerabilit...
[ 0.007854987, 0.05156315, 0.06667055, 0.00072766235, 0.020003317, 0.004847496, 0.010254525, -0.016183427, 0.00878037, 0.040264882, 0.039619267, 0.009705751, -0.0035293642, -0.053844325, -0.02227373, 0.003949014, -0.031290825, -0.0035535747, -0.037402652, -0.017549979, 0.069855...
156
According to Guidelines for the Use of PIV Credentials in Facility Access: 3 OMB Memorandum [M-05-24] and credentialing guidance issued the Office of Personnel Management (OPM) clarifies the eligibility requirements for a PIV Card. Figure 5-3 depicts a security posture of an FSL I or II campus. It includes one or mo...
[ -0.009775224, 0.021917298, 0.06687375, 0.042493835, 0.030509098, 0.003066301, -0.03699399, -0.0013775268, 0.038526285, -0.009870993, 0.04908818, 0.01831914, -0.036720365, 0.04309581, 0.01164955, -0.019468362, 0.029113613, 0.023695854, -0.021397412, 0.020166103, -0.014967243, ...
157
other than the ones noted above, are available at Organizations are encouraged to review all draft publications during public comment periods and provide feedback https://csrc.nist.gov/publications. ## Authority This publication has been developed by NIST in accordance with its statutory responsibilities under the Fe...
[ -0.025712207, 0.030769693, 0.043167837, -0.049300537, 0.02086711, -0.008342861, -0.031778537, -0.015477766, -0.015504315, -0.011057444, 0.03451303, -0.011289743, -0.016367141, -0.020707818, 0.00977648, 0.015106088, 0.019393668, -0.0050574862, 0.003580727, 0.029813947, 0.01265...
158
2 23 23 24 iii NIST SP 800-63A-4 July 2025 Digital Identity Guidelines Identity Proofing and Enrollment 3.7. Additional Requirements for Federal Agencies . . . . . . . . . . . . . . 3.8. 3.9. Requirements for Confirmation Codes . . . . . . . . . . . . . . . . . . . Requirements for Continuation Codes . . . . ....
[ 0.019044552, 0.0064517125, 0.05779718, 0.008421108, 0.02404216, 0.0017920444, 0.013319892, 0.0017673386, -0.0062223026, 0.04102555, 0.05373133, -0.0039917324, -0.041872602, -0.009536394, 0.000034742367, 0.0028164478, 0.037524402, 0.034644425, -0.010856383, 0.0326115, 0.004778...
159
According to Ascon-Based Lightweight Cryptography Standards for Constrained Devices_ Authenticated Encryption, Hash, and Extendable Output Functions: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | 15 | | 4.2. Implementation Options . . . . . . . . . . ....
[ 0.035589408, 0.009319332, 0.075184055, -0.019539844, 0.021456638, 0.02324469, -0.008668481, -0.009483834, 0.026005445, -0.03610437, 0.021513855, -0.023444952, -0.028623154, 0.022086032, -0.013846683, -0.01603526, 0.0032453164, -0.012072935, 0.024560697, 0.019067798, -0.003349...
160
According to Guidelines for the Use of PIV Credentials in Facility Access: + Enhanced trust. PIV Cards are issued in accordance with standardized, audited processes, which exceeds the level for low- and moderate-impact legacy applications, and equals best practice reached for high-impact applications. + Resistance to ...
[ -0.0031736346, -0.0012812664, 0.049518153, 0.020739663, 0.036640912, -0.0016521801, -0.014036443, -0.0025105576, 0.0320545, -0.044830937, 0.033717703, 0.023587272, -0.065520205, 0.04218493, 0.027064882, -0.023801474, -0.020008862, 0.028425688, -0.018055856, 0.012360638, 0.005...
161
Just as preventive maintenance on corporate fleet vehicles can help avoid costly breakdowns, patching should be viewed as a normal and necessary part of reliably achieving the organization's missions. If an organization needs a particular technology to support its mission, it also needs to maintain that technology thro...
[ 0.028898371, 0.03584895, 0.08533173, 0.027481522, 0.022241855, 0.027174093, 0.008574609, 0.012170197, -0.014529385, 0.029112235, 0.025824076, 0.0238993, -0.0020818321, -0.018272003, 0.00962388, -0.0025580137, 0.022308687, -0.022081457, -0.020704707, -0.007391674, 0.023458205,...
162
According to The Federal Cybersecurity Awareness Workforce_ Professional Backgrounds, Knowledge, Skills, and Development Activities: The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing t...
[ -0.038186636, -0.03789214, 0.046800718, -0.009301244, 0.064249754, -0.027339276, 0.0050647603, 0.037180435, -0.029130809, 0.020295855, 0.030357886, 0.037524015, -0.040100876, -0.036198772, 0.050604656, 0.021768346, -0.049303956, -0.016209688, -0.0075587947, 0.014786278, 0.034...
163
According to Protecting Information and System Integrity in Industrial Control System Environments_ Cybersecurity for the Manufacturing Sector: NIST's Cybersecurity for IoT program has defined a set of device cybersecurity capabilities that device manufacturers should consider integrating into their IoT devices and th...
[ -0.0039558634, -0.0025946617, 0.03560277, 0.0040025646, 0.0549865, -0.012856556, 0.018856281, -0.00080696866, 0.011680786, 0.035317067, 0.033580884, 0.013790579, -0.039756425, -0.055030454, -0.024042858, -0.026877893, -0.046239648, -0.002373518, -0.015944326, 0.040789347, 0.0...
164
According to Zero Trust Architecture: | 1 INTRODUCCIÓN..................................................................................................................................................10 | 1 INTRODUCCIÓN.......................................................................................................
[ -0.011461441, 0.01398726, 0.035570413, 0.019272428, 0.04823024, 0.02016968, -0.016887957, 0.015216369, -0.042723827, 0.03102271, 0.0147370165, -0.019727198, -0.00070097623, -0.015277824, 0.01375373, 0.017404184, 0.009156862, -0.009273628, -0.010410553, 0.007024358, -0.0050485...
165
According to Data Integrity_ Detecting and Responding to Ransomware and Other Destructive Events: NIST Cybersecurity Practice Guides (Special Publication 1800 series) target specific cybersecurity challenges in the public and private sectors. They are practical, user-friendly guides that facilitate the adoption of sta...
[ -0.017151479, 0.017901402, 0.07741147, -0.002857572, 0.020901097, -0.04905952, -0.0061989655, 0.026174754, -0.048237022, 0.023271823, 0.03664949, 0.0067493124, -0.013631676, -0.0447777, 0.012216498, 0.0054913764, -0.02544902, 0.0004944053, -0.040471684, 0.015216192, 0.0513818...
166
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: | FAMILY | FAMILY | |-----------------------------------|--------------------------------------| | Access Control ...
[ 0.037914764, 0.057977535, 0.043579873, -0.005644381, 0.008829277, 0.034184087, 0.0046253526, 0.019496258, -0.025948955, -0.009775764, 0.032277294, 0.0129882945, 0.016511714, 0.03882671, 0.0039172145, -0.044906337, 0.027137244, 0.0076271687, -0.02882296, 0.05344545, 0.03277471...
167
According to IoT Device Cybersecurity Capability Core Baseline: | 1. The ability to change the device's software configuration settings 2. The ability to restrict configuration changes to authorized entities only 3. The ability for authorized entities to restore the device to a secure configuration defined by an autho...
[ 0.019769575, 0.029671898, 0.04594585, -0.021780437, 0.021815509, -0.010434267, -0.022201315, -0.0014898789, 0.020856842, 0.009960779, 0.0267959, -0.014356616, 0.00523467, 0.019769575, -0.0010653475, -0.026328256, -0.01018291, 0.034044355, -0.025229298, -0.0024171257, 0.034091...
168
According to Planning for a Zero Trust Architecture_ A Planning Guide for Federal Administrators: Assessing the SP 800-53controls of the system itself should ideally have a continual assessment component utilizing a monitoring program [13]. Frequent automated checks or scans should be conducted to detect changes in t...
[ -0.04683284, 0.04215735, 0.053612303, -0.0030374462, 0.027221752, 0.021117637, 0.004451458, 0.025351554, 0.024234632, 0.06467763, 0.016714882, 0.0024919722, -0.0020114356, 0.04530032, 0.026013916, 0.00213644, -0.0000320121, 0.03293624, -0.023325508, -0.013052414, 0.016961645,...
169
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: systems, but such standards and guidelines shall not apply to national security systems without the express approval of the appropriate federal officials exercising policy a...
[ 0.005641308, 0.016767511, 0.037288945, -0.011518975, 0.023371631, 0.00047749522, -0.02348286, -0.011963883, -0.026360864, 0.004970469, 0.025109557, 0.021091472, -0.027862431, -0.0042787744, 0.005342385, -0.007035125, -0.0008194322, -0.017184613, -0.021411251, 0.015391074, 0.0...
170
According to IoT Non-Technical Supporting Capability Core Baseline: | Non-Technical Supporting Capability | Common Actions | Rationale | IoT Reference Examples | |------------------------------------------------------------------------------------------------------------------------------------------------------------...
[ 0.0017603821, 0.016713826, 0.01807748, -0.0072768494, 0.031303726, -0.020394487, -0.01407099, 0.013552076, 0.005807602, 0.02326661, 0.019815234, -0.002682056, -0.03497232, -0.06970329, 0.0216616, -0.012327201, -0.023857929, -0.005943364, -0.024075149, 0.017498229, 0.07071698,...
171
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer: <!-- image --> <!-- image --> Howard Lutnick, Secretary of Commerce <!-- image --> Protecting Controlled Unclassified Information (CUI): NIST Special Publication 800-171, Revision...
[ -0.029982954, -0.012517091, 0.02689492, 0.02363533, 0.017736396, -0.031091478, -0.009640206, 0.03977492, -0.014358034, 0.012748034, 0.038771972, 0.002870287, -0.026789347, -0.007093238, 0.011560329, -0.0057768654, -0.012761231, -0.0023374695, -0.00986455, 0.027449183, 0.03322...
172
oval of the appropriate federal officials exercising policy authority over such systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130. Nothing in this publication should be taken to contradict the standards and guidelines made mandatory and binding on fe...
[ 0.016718213, 0.007896658, 0.02385113, -0.015176717, 0.004656015, 0.0073641413, -0.016914403, -0.036519416, -0.004841695, 0.009276996, 0.050392866, 0.004656015, -0.06339748, -0.038789615, 0.027957112, 0.045151785, -0.0027606771, -0.01823168, 0.021791132, 0.0039623426, 0.019843...
173
According to IoT Non-Technical Supporting Capability Core Baseline: | Non-Technical Supporting Capability | Common Actions | Rationale | IoT Reference Examples | |------------------------------------------------------------------------------------------------------------------------------------------------------------...
[ 0.0017603821, 0.016713826, 0.01807748, -0.0072768494, 0.031303726, -0.020394487, -0.01407099, 0.013552076, 0.005807602, 0.02326661, 0.019815234, -0.002682056, -0.03497232, -0.06970329, 0.0216616, -0.012327201, -0.023857929, -0.005943364, -0.024075149, 0.017498229, 0.07071698,...
174
According to IoT Device Cybersecurity Capability Core Baseline: | Data Protection : The IoT device can protect the data it stores and transmits from unauthorized access and modification.
[ -0.0017006835, 0.04240559, 0.03725868, 0.018824145, 0.06012243, -0.0020364628, -0.050771877, 0.029405037, 0.015061366, -0.0063054734, 0.034121327, 0.012703221, 0.0030758407, -0.028994923, -0.03311655, -0.02477077, -0.026985375, 0.008566217, -0.009463336, 0.033198573, 0.001777...
175
<!-- image --> ## NIST Special Publication NIST SP 800-140Br1 ## Cryptographic Module Validation Program (CMVP) Security Policy Requirements: CMVP Validation Authority Updates to ISO/IEC 24759 and ISO/IEC 19790 Annex B David Hawes Alexander Calis Roy Crombie This publication is available free of charge from: https...
[ 0.013105993, 0.02976311, 0.038551103, -0.03777732, 0.0073716897, 0.029569663, 0.02676469, -0.015254631, -0.0068673473, -0.018791936, 0.05239634, -0.019151194, -0.05792338, -0.009333788, 0.014757196, 0.033466227, -0.020740217, 0.038440563, 0.012774372, 0.029680206, -0.00162615...
176
According to Access Control on NoSQL Databases: ## 3.3. Access Control Model Implementations For data at rest, some NoSQL databases may allow users backdoor access to other users' data due to poor logging and log analysis methods [ZA]. In some systems, authorization is applied at a per-database level using a role-bas...
[ -0.013665944, 0.051928308, 0.05625947, 0.015409806, 0.051700354, 0.015626363, -0.022043316, 0.022738582, -0.017780544, -0.04048493, 0.031891003, -0.016401414, 0.017506998, 0.025850177, -0.022373853, -0.009602634, 0.01661797, -0.007317378, -0.003160036, 0.023456642, 0.00974510...
177
According to Addressing Visibility Challenges with TLS 1.3 within the Enterprise_ High-Level Document: ..................................................................... | 5.4 Specific Details ........................................................................................................... | 29 ...
[ 0.01464458, 0.020370899, 0.106635556, -0.009514182, 0.030083722, 0.01200746, -0.029837133, 0.0031200217, -0.018658483, -0.0031165967, 0.05392055, 0.028576795, -0.01241844, -0.01017175, -0.0021439446, 0.0066852714, 0.010089554, 0.019411946, 0.015206252, 0.03707038, 0.059126295...
178
& Company | U.S. Bank Corporation | | Technology Partner/Collaborator | Build Involvement | |-----------------------------------|---------------------| | Mira Security, Inc. | | ## DOCUMENT CONVENTIONS The terms 'shall' and 'shall not' indicate requirements to be followe...
[ 0.017877337, 0.017521273, 0.07542604, 0.01900487, 0.0063905916, -0.028737264, -0.024731552, -0.0073771835, -0.024271639, -0.028559232, 0.0374163, -0.03397436, 0.014902727, -0.00063191936, -0.024108443, 0.025087615, 0.011156646, -0.025636546, -0.011638815, 0.009101864, 0.02283...
179
According to Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations: Approved by the NIST Editorial Review Board on 2024-04-23 Supersedes NIST Special Publication 800-171r2 (February 2020; Includes updates as of 01-28-2021) https://doi.org/10.6028/NIST.SP.800-171r2 Additional informati...
[ -0.012744497, 0.032769687, 0.035472073, -0.030198487, 0.031405378, 0.004696376, -0.0063263336, 0.010094586, -0.017027644, 0.01730313, 0.029096544, 0.0006214828, -0.017578615, 0.03169398, 0.012416537, -0.040745657, 0.034527548, 0.015860109, -0.016463554, 0.028466862, 0.0215010...
180
According to Assessing Enhanced Security Requirements for Controlled Unclassified Information: | CHAPTERONE INTRODUCTION...................................................................................................... | CHAPTERONE INTRODUCTION..........................................................................
[ 0.03428543, 0.038844522, 0.05217921, -0.014217516, 0.035945676, 0.011424084, -0.009348775, -0.00733276, -0.028461387, 0.021438276, 0.03344213, -0.0151267, -0.0030009632, 0.028197855, 0.03136023, -0.028224207, 0.016655182, 0.024179002, -0.013222686, 0.018526254, 0.023889117, ...
181
tise, and understanding. Appendix E provides three tables that identify specific assurance-related controls that are included in the low-, moderate-, and high-impact baselines described in Appendix D. The controls described assist organizations in defining the controls needed to satisfy minimum assurance requirements. ...
[ -0.02884311, 0.005428479, 0.08991821, 0.010925991, 0.0005126461, -0.013806537, 0.011095435, -0.01940446, 0.0054002386, 0.022655271, 0.0004494969, -0.017120106, -0.004383575, -0.0047099115, 0.012450986, -0.0404155, 0.047946338, 0.01248864, 0.012739668, 0.020006927, 0.026006494...
182
According to Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography: ## Conformance Testing Conformance testing for implementations of this Recommendation will be conducted within the framework of the Cryptographic Algorithm Validation Program (CAVP) and the Cryptographic Module ...
[ 0.034371242, -0.0024025547, 0.08364813, -0.019441081, 0.028291307, 0.023192007, 0.04459436, 0.0008695471, 0.03603832, 0.0042197932, 0.023841677, -0.022395242, -0.024025546, 0.03949506, -0.00090172415, 0.014672745, 0.0032330295, 0.010768593, -0.02259137, 0.030448703, 0.0313557...
183
According to High-Performance Computing Security_ Architecture, Threat Analysis, and Security Posture: Continuous integration (CI) pipelines [22] and tests of scientific code on HPC platforms have recently become commonplace. Industry-standard identification of software weaknesses and the publication of Common Vulnera...
[ 0.014151306, -0.008571685, 0.10899844, 0.033310786, 0.048926022, 0.018658664, -0.027044147, -0.0031590029, 0.023564108, 0.019082433, 0.015961954, 0.00800666, -0.0013660119, -0.011461017, 0.02193324, -0.03708618, 0.005990548, 0.0009976221, 0.0047577666, 0.03020315, 0.028867636...
184
According to Cryptographic Module Validation Program (CMVP) Security Policy Requirements_ CMVP Validation Authority Updates to ISO_IEC 24759 and ISO_IEC 19790 Anne: ## 5.1 Integrity Techniques - Integrity Techniques - Specify the approved integrity techniques or EDC [error detection code] employed - Initiate on Dema...
[ -0.023436058, 0.07059683, 0.055201884, -0.0063297977, 0.01109261, 0.04607488, 0.0051751765, 0.02837069, 0.026666248, 0.014405272, 0.057621088, -0.011937957, -0.051380638, 0.017951608, -0.0071407817, -0.006456943, -0.011181955, 0.02952531, -0.041373923, 0.02376595, 0.040631667...
185
According to Transitioning to the Security Content Automation Protocol (SCAP) Version 2: ovides a gap analysis of SCAP v1 and an overview of how SCAP v2 will address these gaps; describes the SCAP 2.0 architecture; and provides a plan for completing the work necessary to finalize SCAP v2. | 1 ...
[ 0.018195646, 0.017592672, 0.07207321, -0.03676963, 0.004885868, 0.024473676, -0.010735313, -0.043106776, -0.003455281, 0.0056632324, 0.034617838, -0.011752094, -0.05954079, 0.033979394, 0.0033754758, -0.013631956, 0.05197405, 0.021316927, -0.002479881, 0.013265442, 0.01663500...
186
According to IoT Non-Technical Supporting Capability Core Baseline: The non-technical supporting capabilities in Table 1 describe the intended recipient of the value of the capability as the customer (i.e., those with whom the communications take place). This stems from an assumption that the customer of an IoT device...
[ -0.019291209, -0.0033094198, 0.027982853, 0.016382217, 0.038323317, -0.023224825, -0.023754803, 0.019255877, 0.0011872986, 0.008721087, 0.01933832, 0.012483933, -0.010022478, -0.04489505, -0.0048787445, -0.026451804, -0.002464399, -0.039077066, -0.031892914, 0.00962205, 0.053...
187
According to Incident Response Recommendations and Considerations for Cybersecurity Risk Management_ A CSF 2.0 Community Profile: ent some incidents, prepare to handle incidents that do occur, reduce the impact of those incidents, and improve incident response and cybersecurity risk management practices based on lesso...
[ 0.022386683, -0.00023242754, 0.040821332, 0.03132172, 0.035519224, -0.019207872, 0.005341998, 0.058617763, 0.008302956, 0.11124611, 0.03706567, -0.02157664, 0.013181632, 0.0070449323, 0.029824365, -0.012064753, 0.011021514, 0.024890458, -0.037188407, 0.026633281, -0.005817592...
188
According to IoT Device Cybersecurity Capability Core Baseline: ts, guidelines, and procedures, where they exist, remain operative. For planning and transition purposes, federal agencies may wish to closely follow the development of these new publications by NIST. Organizations are encouraged to review all draft publi...
[ -0.0012989718, 0.022568287, 0.048821192, -0.011658362, 0.04013931, -0.021324728, -0.023190066, 0.013057366, 0.0123665, 0.0031751047, 0.023074921, 0.010800538, -0.034612384, -0.034128778, -0.008434322, -0.016903186, -0.025055405, -0.021255642, -0.0013198418, 0.03318459, 0.0312...
189
. . . . . . . . . . . . . . . 4. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Appendix A. List of Symbols, Abbreviations, and Acronyms . . . . . . . . . . . . . . . 1 2 3...
[ 0.039990906, 0.0028415467, 0.03898117, -0.014441899, -0.010296662, 0.025389576, -0.020500323, 0.0340122, -0.029813819, 0.018919287, 0.037838574, -0.008702341, -0.08003496, -0.017178819, 0.03241788, 0.035659667, -0.010608884, -0.02837893, -0.0069950875, 0.034490496, 0.04166494...
190
According to Organizational Views of NIST Cryptographic Standards and Testing and Validation Programs: 2 | Background: NIST Cryptographic Standards and Testing/Validation Programs ... 1 Methodology.......................................................................................................... 2 | | Study ...
[ -0.019454157, -0.009733444, 0.061774585, -0.028875673, 0.053167906, 0.029766897, -0.004612087, -0.016844142, -0.008141972, 0.017799025, 0.041505598, 0.018881226, -0.031574808, -0.0017060583, 0.022675296, 0.012629923, 0.015889259, 0.0007141732, -0.0289266, 0.023923011, 0.07211...
191
According to Planning for a Zero Trust Architecture_ A Planning Guide for Federal Administrators: - I. All communication is secured regardless of network location. In zero trust, the network is always considered contested. A ZTA should be designed with the assumption that an attacker is present on the network and coul...
[ -0.029119642, 0.058077358, 0.04331513, 0.021657566, 0.024747647, -0.010349752, -0.015099573, 0.036109436, 0.00060469133, 0.024950054, 0.02171154, 0.01682678, 0.008521341, 0.029011691, 0.00848086, -0.014249464, 0.014586808, 0.026933644, -0.01689425, 0.009364704, 0.021279737, ...
192
pment of management, administrative, technical, and physical standards and guidelines for the costeffective security of other than national security-related information in federal information systems. The Special Publication 800-series reports on ITL's research, guidelines, and outreach efforts in information systems s...
[ -0.00083298096, -0.012322635, 0.05287221, 0.01320587, 0.007967379, -0.0031187295, 0.02512039, 0.015374362, -0.028555866, 0.007522716, 0.028580232, 0.008077022, -0.041274436, 0.006103451, 0.02473055, -0.014996703, 0.022464598, 0.010172418, 0.0010994739, 0.022074757, 0.02536404...
193
According to Profile of the IoT Core Baseline for Consumer IoT Products: osed of. - d. Vulnerability management options (e.g., configuration and patch management and anti-malware) available for the IoT product or its product components that could be used by customers. - e. Additional information customers can use to m...
[ 0.00005084659, 0.019345507, 0.073765576, 0.0028609552, -0.008694331, 0.006960419, 0.005502075, 0.02208261, 0.0397809, 0.015778601, 0.038790092, 0.002449151, -0.014490552, -0.025191268, -0.013289198, 0.005468016, -0.00043038177, -0.00042651143, -0.05523749, 0.056426458, 0.0213...
194
According to Status Report on the First Round of the Additional Digital Signature Schemes for the NIST Post-Quantum Cryptography Standardization Process: 3.6. PERK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.6. PERK
[ 0.025138808, 0.026505956, 0.01718702, 0.008753941, 0.0059638405, 0.049273178, -0.011111576, 0.05892693, 0.0033917162, 0.027273234, 0.04871516, -0.010769789, -0.06523255, -0.009374739, 0.041153986, -0.00005623797, 0.027510393, -0.015038643, -0.0017124243, 0.03515527, 0.0391730...
195
According to Proceedings of the Cybersecurity in Cyber-Physical Systems Workshop, April 23-24, 2012: Abstract -Over the past decade, there has been an explosion in the deployment of implantable medical devices (IMDs) to facilitate the management and treatment of a wide variety of human health conditions. While funct...
[ 0.036441036, 0.019450538, 0.034224294, 0.025357338, 0.028168812, -0.01669313, -0.0060352087, -0.0026374469, -0.014381774, -0.014895408, 0.021437492, -0.034359463, -0.01681478, 0.015436077, 0.008130298, -0.057851493, 0.014192539, -0.010684955, 0.018450301, 0.039766144, 0.02178...
196
...........12 | | 3. FORENSIC TOOLS.............................................................................................................15 | 3. FORENSIC TOOLS............................................................................................................
[ 0.03909242, 0.017358417, 0.01039202, -0.006527398, 0.008168243, -0.030226098, -0.02341803, -0.032644186, 0.0106079215, -0.006315096, 0.04939808, 0.0033644526, 0.01958939, -0.023432422, 0.048016317, -0.012320734, 0.014091119, 0.008909502, -0.033651724, 0.050664697, 0.008204226...
197
sions. This documentation is essential when examining the security considerations for organizational information systems with respect to the potential impact on an organization's mission and business. The resulting tailored baseline set of security controls and the supporting rationale for the selection decisions (incl...
[ -0.011142329, 0.008036125, 0.066501, -0.0022355255, -0.009100942, 0.007665499, 0.001835484, -0.0024531952, 0.018754883, 0.025273204, 0.029579531, -0.007665499, -0.019096093, -0.034991857, 0.0031326772, -0.017331205, 0.024520185, 0.016578186, 0.0061771097, -0.021202194, 0.0289...
198
According to Security and Privacy Controls for Information Systems and Organizations: ............................................................. 16 3.1 ACCESS CONTROL .................................................................................................................. 18 3.2 AWARENESS AND TRAINING ...
[ -0.0040349783, 0.032724887, 0.06021379, 0.00015022767, 0.030970832, 0.0017851425, 0.018600825, 0.015721034, -0.010465418, 0.023614278, 0.047621254, -0.013966981, 0.019765832, -0.0032119476, 0.019792011, -0.026323898, 0.021624604, 0.033955343, 0.023954617, 0.024046246, 0.01608...
199