text
stringlengths
51
4.95k
embedding
listlengths
1.54k
1.54k
example_idx
int64
0
2.23k
According to Machine Learning for Access Control Policy Verification: Machine learning has been used for device control, system analysis, and business forecasting. However, the use of ML for software testing is in the early stages [AWCS, CAT5]. In particular, ML applications for model proof are still elusive and have ...
[ -0.013073117, 0.023563141, 0.03895255, -0.015777482, 0.05452387, 0.004102024, -0.038637243, -0.0033683286, -0.0025239724, 0.057579923, 0.03199154, -0.03783685, -0.011053938, 0.038418956, -0.047756895, -0.039801456, 0.03065755, 0.013776494, -0.012212086, 0.033398297, 0.0350233...
200
, and academic organizations. ## Supplemental Content NIST has established an Incident Response project page that hosts links to resources with additional information on incident response activities. By moving links from this document to a website, NIST can update and expand them as needed without having to release a ...
[ -0.0160928, -0.01955644, 0.057769023, -0.027584083, 0.008852915, -0.035261612, -0.014767363, 0.010372166, -0.029534725, 0.031985532, 0.053617656, -0.006298949, 0.018968746, -0.025033243, 0.010803558, 0.018293524, 0.011303722, -0.023520244, -0.023932882, 0.02244489, -0.0166679...
201
According to Digital Identity Guidelines_ Identity Proofing and Enrollment: 3.15.4. 3.15.4.
[ 0.045822863, -0.003939615, 0.024706526, 0.041629743, 0.018019456, -0.020705247, 0.0078997845, 0.011668112, -0.024130998, 0.045740645, 0.032859817, -0.009688027, -0.0044466266, -0.029214816, 0.00060592993, 0.029954778, 0.03305166, 0.037299592, -0.03757365, 0.044836245, 0.05749...
202
According to Summary Report for “Workshop on Updating Manufacturer Guidance for Securable Connected Product Development”: n Updating Manufacturer Guidance for Securable Connected Product Development' (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) NIST IR 85...
[ 0.011074197, 0.025644194, 0.038154166, -0.032585856, 0.0116172945, -0.018452832, 0.0016558234, 0.0022816341, -0.0018274921, -0.001420169, 0.021698933, 0.0016417778, -0.04729319, -0.05882933, 0.0153815225, 0.0154564325, -0.00003260244, -0.012372637, -0.031212505, 0.032585856, ...
203
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations: Information technologySecurity techniques-Information security management systems-Requirements and ISO/IEC 15408, Information technology -- Security techniques -- Evaluation criteria for...
[ -0.04415619, 0.0071929963, 0.01652334, -0.0060303733, 0.04035124, -0.0075864093, 0.014268557, 0.017662477, -0.0026981076, 0.008420209, 0.016311955, -0.007968078, -0.040867962, -0.0057191662, 0.011450076, -0.045166146, -0.0106749935, 0.0034937412, -0.0027259989, 0.0020199108, ...
204
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations: INCLUDES UPDATES AS OF 1 1 -01 -2024; SEE APPENDIX K Boyens J, Smith A, Bartol N, Winkler K, Holbrook A, Fallon M (2022) Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations. (National Instit...
[ -0.029298041, -0.008848835, 0.054048944, -0.02184435, 0.010896339, 0.0003229502, 0.021870187, 0.009623916, -0.037643075, 0.014687775, 0.001623632, 0.015088232, -0.0449805, -0.0052350224, 0.018640684, -0.016108755, 0.012000829, 0.013150532, -0.03480111, -0.023200741, 0.0083773...
205
ards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analyses to advance the development and productive use of information technology. ITL's responsibilities include the development of management, administrative, technical, and physical standards and gui...
[ 0.005798577, -0.015223585, 0.041239824, -0.021684326, 0.034704823, -0.032303706, -0.0044061756, 0.011838503, 0.010111926, 0.010953555, 0.032377966, -0.0019184193, -0.022006124, -0.07346927, 0.01835494, 0.011139208, -0.018565347, -0.028961942, -0.041512117, 0.03977935, 0.03945...
206
According to Validating the Integrity of Computing Devices: | | Intel | HP Inc. Elitebook 360 830 G5, Lenovo ThinkPad T480, Transparent Supply Chain Tools, Key Generation Facility, Cloud Based Storage, TSCVerify and AutoVerify software tools | | National Security Agency (NSA) | Host Inte...
[ 0.023163833, 0.036805995, 0.05495842, 0.038727034, 0.040898643, -0.025001349, -0.016189625, -0.007809441, 0.023957307, 0.01921039, 0.03786396, 0.0022794937, -0.05025327, 0.024639413, -0.048972573, -0.018208109, -0.01046131, 0.029316725, -0.009013571, 0.031989478, 0.052174307,...
207
According to Validating the Integrity of Computing Devices: | Technology Partner/Collaborator | Build Involvement | |-----------------------------------|------------...
[ -0.008552458, 0.016538529, 0.08003062, 0.028064525, 0.0197811, -0.00943036, -0.04103481, 0.020942194, -0.011087044, 0.011710071, 0.044659693, -0.014428734, -0.067116976, 0.0014920783, -0.00029580496, 0.029990243, -0.015108399, 0.024694515, -0.057771575, 0.032595627, 0.0203616...
208
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations: SP 800-53 Revision 4 has been updated to reflect the evolving technology and threat space. Example areas include issues particular to mobile and cloud computing; insider threats; applica...
[ -0.038923908, 0.005636231, 0.053184047, -0.002996087, 0.014136822, -0.0008043751, 0.016849836, -0.002495805, -0.0028657615, 0.011883451, -0.0027256263, 0.0052382476, -0.033901468, 0.029417146, -0.0018834148, -0.035695195, 0.015594226, 0.006227601, -0.0053307367, 0.0022856023, ...
209
According to Federal Cybersecurity Role-Based Training Approaches, Successes, and Challenges: Almost two-thirds (65%) of survey participants measure RBT effectiveness by using training completion rates, and just under half evaluate success via audit reports or evaluations (Figure 14). Less than half (46%) gauge effect...
[ 0.0030878268, 0.026812136, 0.09416702, 0.0023232815, 0.013393586, -0.011028176, 0.012707055, 0.059915386, 0.029433433, 0.06545756, 0.019197889, 0.015340836, 0.02151961, -0.035424974, 0.00061280647, -0.04516122, -0.015540553, -0.010815975, -0.051052902, 0.035424974, 0.03939436...
210
According to Zero Trust Architecture: forma estricta antes de permitir el acceso . Se trata de un ciclo constante de acceso, escaneo y evaluación de amenazas, adaptación y reevaluación continua de la confianza en permanente comunicación. Así, se espera que la empresa que implemente una ZTA cuente con una gestión de la...
[ 0.022867287, 0.05811036, 0.05020102, 0.02322786, 0.037243668, -0.0077406815, -0.014899794, 0.04747928, -0.033568155, 0.026217123, -0.0072754263, 0.009287654, 0.008037281, -0.023041757, -0.0035068602, 0.0036057269, -0.011067255, 0.0051265294, -0.024449155, -0.0044170152, -0.00...
211
According to Recommendations for Federal Vulnerability Disclosure Guidelines: There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in this publication, including concepts and methodologies, may ...
[ -0.0057034832, 0.041819066, 0.10332989, 0.014328342, 0.024018757, -0.004281661, 0.00592372, 0.008654008, -0.02811257, 0.0061925384, 0.036352012, 0.027594365, -0.03184364, -0.049255293, 0.010642615, 0.0019270713, 0.021350006, 0.0069568893, -0.034149647, -0.0031675221, 0.031325...
212
According to Audit and Evaluation of Computer Security II_ System Vulnerabilities and Controls: | | 5.1.1 | Business Cycles as an Auditing Framework | 9-16 | |------------------------------------------------------------------------------------------|---------------------------------------------------------------------...
[ -0.024283383, 0.04836701, 0.07865569, -0.019576527, 0.035307664, 0.02864066, -0.00014318769, 0.012603638, 0.0138209285, 0.013983234, 0.034958083, -0.0662206, 0.003963997, -0.0051282262, 0.01635539, -0.008564731, 0.008808189, 0.045220777, -0.0057618413, 0.040326647, 0.06711952...
213
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer: NIST SP 800-172, Enhanced Security Requirements for Protecting Controlled Unclassified Information provides enhanced security requirements to help protect CUI associated with critical...
[ -0.027711315, 0.021571606, 0.060914047, 0.027075734, 0.038516186, -0.007379091, 0.0059903474, 0.040473774, -0.0056534894, 0.02641473, 0.046397384, 0.0041503413, -0.016575942, -0.013016691, 0.029973982, -0.02405037, -0.011662904, 0.021724146, -0.035058625, 0.011770953, 0.04627...
214
According to Assessing Security and Privacy Controls in Information Systems and Organizations: The National Institute of Standards and Technology (NIST) Information Technology Laboratory (ITL) promotes the U.S. economy and public welfare by providing technical leadership for the Nation’s measurement and standards infr...
[ -0.030294264, -0.025942199, 0.04658412, -0.0118101435, 0.042645376, -0.024702225, -0.032701273, 0.006838091, -0.039484657, -0.008728444, 0.032652646, 0.006333592, -0.026015138, -0.03063465, 0.028033135, -0.018222753, -0.011196235, 0.01615613, 0.015049879, 0.03080484, 0.057330...
215
According to Automated Secure Configuration Guidance from the macOS Security Compliance Project (mSCP): ``` title: "Limit SSHD to FIPS 140 Validated Ciphers" discussion: | If SSHD is enabled, then it _MUST_ be configured to limit the ciphers to algorithms that are FIPS 140-validated. FIPS 140-2 is the current standard...
[ 0.005335852, -0.011016695, 0.064398214, 0.02058443, 0.046711706, 0.041674845, -0.020055445, 0.030451156, -0.004927614, 0.006825061, 0.021136414, 0.0325671, -0.05703842, 0.056210443, -0.010493459, -0.0008955377, 0.0044618766, 0.0069860565, -0.0051432326, -0.006209828, 0.018008...
216
According to Digital Identity Guidelines_ Identity Proofing and Enrollment: 3.15.3. 3.15.3. 3.15.3.
[ 0.048537347, -0.0052449033, 0.023551308, 0.04233821, 0.020411132, -0.02337535, 0.008053464, 0.008270028, -0.0223196, 0.040930547, 0.030345995, -0.009346079, -0.009989003, -0.026447847, 0.00058074616, 0.032511633, 0.033323746, 0.0329989, -0.03646392, 0.043150324, 0.058201507, ...
217
According to Validating the Integrity of Computing Devices: 3.1.1 ID. 3.1.1 | Technology Configurations... 3.1.1 Technology Configurations ## 3.
[ 0.020397985, 0.011110121, 0.045796584, -0.008426176, 0.032913648, -0.016273186, 0.0034220305, -0.0058234553, -0.015185481, 0.020058962, 0.042999633, 0.049186833, -0.042123817, 0.019395037, -0.008115403, -0.0015379713, -0.019945953, 0.016103672, -0.003870532, 0.05082545, 0.010...
218
According to Zero Trust Architecture: | 1 INTRODUCCIÓN..................................................................................................................................................10 | 1 INTRODUCCIÓN.......................................................................................................
[ -0.011461441, 0.01398726, 0.035570413, 0.019272428, 0.04823024, 0.02016968, -0.016887957, 0.015216369, -0.042723827, 0.03102271, 0.0147370165, -0.019727198, -0.00070097623, -0.015277824, 0.01375373, 0.017404184, 0.009156862, -0.009273628, -0.010410553, 0.007024358, -0.0050485...
219
According to Digital Identity Guidelines_ Identity Proofing and Enrollment: 3.14. Digital Injection Prevention and Forged Media Detection . . . . . . . . . • Cryptographic verification of the source and integrity of digital evidence or 2. Based on the results of its privacy risk assessment, the CSP SHALL document ...
[ 0.03118496, 0.0036638426, 0.028946308, 0.04735012, 0.037119996, -0.016907038, 0.016607683, 0.032955058, -0.01937997, 0.033814076, 0.030169757, -0.017492732, -0.015540419, -0.025080726, -0.0020922297, 0.029831357, 0.02228241, 0.017427655, -0.017622886, 0.01954917, 0.04984908, ...
220
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: ance. The decision to select a particular set of enhanced security requirements will be based on the mission and business needs of federal agencies and guided and informed b...
[ -0.029125402, -0.0010971475, 0.05849805, 0.01783869, 0.04371283, 0.019173812, -0.007880919, 0.00061849755, -0.035034545, 0.020274049, 0.014921206, -0.018110659, -0.030435799, 0.02722162, 0.020088617, -0.01777688, 0.016750814, -0.015081915, -0.0448996, 0.0032790801, 0.04272385...
221
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer: <!-- image --> <!-- image --> Howard Lutnick, Secretary of Commerce <!-- image --> Protecting Controlled Unclassified Information (CUI): NIST Special Publication 800-171, Revision...
[ -0.029982954, -0.012517091, 0.02689492, 0.02363533, 0.017736396, -0.031091478, -0.009640206, 0.03977492, -0.014358034, 0.012748034, 0.038771972, 0.002870287, -0.026789347, -0.007093238, 0.011560329, -0.0057768654, -0.012761231, -0.0023374695, -0.00986455, 0.027449183, 0.03322...
222
According to High-Performance Computing Security_ Architecture, Threat Analysis, and Security Posture: alleviate some of the stated impacts. For example, conduct scanning at write, and conduct subsequent batch scanning at read. Protection against ransomware attacks on HPC data is especially important. It is recommende...
[ -0.009559738, 0.027640399, 0.08315789, 0.042788703, 0.026128197, -0.020316087, -0.053808045, 0.023761274, -0.037555173, -0.041237053, 0.039106824, 0.05083624, 0.0032052079, 0.0016773922, -0.0059994916, -0.023550881, 0.010670877, 0.008895685, -0.011545323, 0.026417488, 0.01968...
223
nce Level 1 . . . . . . . . . . . . . . . . . . . . . 2.1.1. Permitted Authenticator Types . . . . . . . . . . . . . . . . . . 2.1.2. Authenticator and Verifier Requirements . . . . . . . . . . . . . 2.1.3. Reauthentication . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2. Authentication Assurance Level 2 . . ....
[ 0.009899045, 0.033500314, 0.040729042, -0.0152936205, 0.02442394, 0.0048719756, 0.0116253095, -0.04490984, 0.012218713, 0.06942818, 0.033931877, -0.025044316, -0.005620473, 0.028159684, -0.008557145, -0.0031979717, 0.045071676, 0.029022815, -0.026028825, 0.027256092, 0.001883...
224
## NISTIR 8259B ## IoT Non-Technical Supporting Capability Core Baseline Michael Fagan Jeffrey Marron Kevin G. Brady, Jr. Barbara B. Cuthill Katerina N. Megas Rebecca Herold This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8259B <!-- image --> ## NISTIR 8259B ## Internet of Thin...
[ -0.0017590208, 0.010007031, 0.03141627, -0.018824266, 0.0043838304, -0.010113263, 0.0023601155, 0.0032028875, 0.0032825612, -0.0078894785, 0.024773246, -0.018186877, -0.020155706, -0.02820099, 0.028725067, 0.008321487, 0.008994289, -0.029291635, -0.008420637, 0.042266075, 0.0...
225
According to Guide to Enterprise Patch Management Planning_ Preventive Maintenance for Technology: In addition, there are administrative activities occurring throughout the software vulnerability management life cycle, such as updating documentation, audit logging, and generating actionable insights and reports as par...
[ 0.010271876, 0.0640133, 0.08441167, 0.002243653, -0.0027762582, 0.027242558, 0.05135379, -0.00018819424, -0.0071237725, 0.008230921, 0.042563703, 0.044084635, -0.015365876, -0.020006953, -0.016238175, 0.005284117, 0.0043251477, 0.038224574, -0.030083122, -0.030709386, 0.04059...
226
According to Guidelines for Media Sanitization: ..................................13 | | 3.2.4. Quality of Cryptographic Implementations................................................................................15 | | 3.2.5. Traceability of CE Operations............................................
[ 0.030177766, 0.04254793, 0.045402586, -0.014001396, 0.0076803775, 0.020227259, 0.00037446088, 0.029769959, 0.010936041, -0.009569886, 0.051873133, -0.025746256, -0.043771353, 0.007157024, 0.048665047, -0.022701293, 0.016380275, 0.002482529, -0.044804465, 0.059159297, 0.065412...
227
According to Automated Secure Configuration Guidance from the macOS Security Compliance Project (mSCP): The macOS Security Compliance Project (mSCP) provides resources that system administrators, security professionals, security policy authors, information security officers, and auditors can leverage to secure and ass...
[ 0.00590003, 0.02008994, 0.07806644, -0.011741557, -0.015140583, -0.011308635, 0.009103071, 0.0051511913, -0.0057362216, 0.025624325, -0.013900319, 0.021575917, -0.04521114, 0.0032966456, 0.0038611998, -0.00357746, -0.043011423, 0.006610842, -0.0076872976, -0.013853516, 0.0038...
228
According to Analyzing Collusion Threats in the Semiconductor Supply Chain: ## Analyzing Collusion Threats in the Semiconductor Supply Chain Rekhi S, Amberiadis K, Akib AA, Srivastava A (2025) Analyzing Collusion Threats in the Semiconductor Supply Chain. (National Institute of Standards and Technology, Gaithersburg,...
[ -0.031622212, -0.0107972035, 0.009700812, -0.025172103, 0.053396147, 0.00305675, 0.009367407, -0.007770909, -0.029955186, -0.011399898, 0.027339237, -0.015708521, -0.052011233, 0.00041515374, 0.02903191, -0.046522867, 0.019824794, 0.0075080316, 0.0010555164, 0.017144728, 0.02...
229
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations: 3.1.1. 3.1.10. 3.1.11.
[ -0.00784808, 0.022775067, 0.06408536, -0.0011662685, 0.056731302, -0.020823989, -0.007429099, 0.0105433175, -0.029066037, 0.029166093, 0.0068913023, -0.0040334756, -0.01618393, -0.02453854, 0.0055468106, -0.006978851, 0.045925338, -0.012294283, -0.04052236, 0.008404638, 0.039...
230
................................................................... | Executive Summary................................................................................................................. | Executive Summary.......................................................................................................
[ 0.015658226, 0.038797006, 0.0982929, 0.034373023, 0.011039853, 0.021141285, -0.016073812, 0.024814533, -0.0025739549, -0.015390106, 0.015497353, -0.009819906, -0.028635249, -0.032442555, 0.018326022, 0.040512975, 0.02001518, 0.028313503, -0.008861376, 0.0013498181, 0.00504401...
231
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations: The NIST Risk Management Framework (RMF), described in NIST Special Publication 800-37 Revision 1, Guide for Applying the Risk Management Framework to Federal Information Systems: a Secu...
[ -0.023182461, 0.02939285, 0.04190331, -0.012600139, 0.0095285745, -0.004719447, 0.01406866, 0.013048543, -0.002288259, 0.040244214, -0.01029086, 0.011826643, -0.011339004, 0.028854767, 0.024348311, -0.059413467, -0.008138523, 0.0014993493, -0.0014306875, 0.031590026, 0.042418...
232
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer: <!-- image --> <!-- image --> Howard Lutnick, Secretary of Commerce <!-- image --> Protecting Controlled Unclassified Information (CUI): NIST Special Publication 800-171, Revision...
[ -0.029982954, -0.012517091, 0.02689492, 0.02363533, 0.017736396, -0.031091478, -0.009640206, 0.03977492, -0.014358034, 0.012748034, 0.038771972, 0.002870287, -0.026789347, -0.007093238, 0.011560329, -0.0057768654, -0.012761231, -0.0023374695, -0.00986455, 0.027449183, 0.03322...
233
According to Digital Identity Guidelines_ Authentication and Authenticator Management: 3.2.6. 3.2.6.
[ 0.022840122, 0.020449428, 0.035860404, 0.00093426637, 0.026130538, -0.015578068, -0.0031040458, -0.0028662616, -0.0026943502, 0.042775422, -0.0032823838, -0.02391979, -0.027274473, -0.027917132, -0.019472586, 0.043546613, 0.03084766, 0.019909594, -0.02827702, 0.02029519, 0.01...
234
According to Analyzing Collusion Threats in the Semiconductor Supply Chain: nd sensitive data are loaded into the manufactured IC. Standard data are generic and mostly available open source, but the sensitive data are anything whose disclosure would compromise IP or security. For example, keys of crypto modules or log...
[ 0.051993947, 0.014894506, 0.033594083, -0.021071231, 0.04370619, -0.01016423, 0.012705288, 0.015480904, -0.021866126, -0.04675546, 0.06677117, -0.0020800836, -0.070107125, -0.013070158, 0.014972692, -0.07558017, -0.005238488, 0.029059274, -0.025006613, -0.013500183, 0.0602035...
235
According to Guidelines for Media Sanitization: outcomes from storage sanitization activities (e.g., identification of specific, acceptable sanitization techniques [13]) - Documentation or evidence associated with sanitization activities (see Sec. 4.6) - The identification of roles and responsibilities (see Sec. 4.7) ...
[ 0.002099985, 0.0499821, 0.0176104, -0.019820912, -0.008510466, -0.028810322, -0.0021675285, -0.00021107307, 0.05531189, 0.0152648045, 0.06931179, 0.015473574, -0.04177865, -0.044504948, 0.045438275, 0.00046013927, -0.01718058, 0.007472754, -0.04860667, 0.018863024, 0.07324158...
236
According to Guidelines on Mobile Device Forensics: The objective of the guide is twofold: to help organizations evolve appropriate policies and procedures for dealing with mobile devices and to prepare forensic specialists to conduct forensically sound examinations involving mobile devices. This guide is ...
[ -0.0071936464, 0.031492043, 0.022704748, -0.034590457, 0.008609518, -0.030323792, -0.015720626, -0.018120624, 0.017003164, 0.027199984, 0.06252695, 0.00600952, -0.017104752, -0.035809502, 0.017815862, -0.0020396814, -0.0058888854, -0.011244438, -0.020660305, 0.009066661, 0.04...
237
According to Status Report on the First Round of the Additional Digital Signature Schemes for the NIST Post-Quantum Cryptography Standardization Process: NIST Internal Report NIST IR 8528 Status Report on the First Round of the Additional Digital Signature Schemes for the NIST Post-Quantum Cryptography Standardization...
[ 0.0011174093, 0.0073966854, 0.027572984, -0.028321689, -0.011391928, 0.03198776, -0.016045514, 0.016148783, -0.019014515, -0.024758887, 0.03418224, -0.0029512516, -0.08638502, -0.02264186, 0.023610013, 0.019776128, -0.012953881, -0.00022227169, -0.013270144, 0.039887883, 0.06...
238
and technology usage are monitored to find potentially adverse events [DE.CM-03] ## Respond: - Incident Management: Incidents are escalated or elevated as needed [RS.MA-04] - Incident Response Reporting and Communication: Internal and external stakeholders are notified of incidents [RS.CO-02] ## Recover: - Incident Rec...
[ -0.03445024, 0.0035391827, 0.060208905, -0.011529505, 0.021044144, -0.011371477, 0.008237242, 0.0009654561, 0.00042758265, 0.031605724, 0.026891204, -0.015776524, -0.057311714, 0.0041515436, 0.051649023, 0.0052544517, -0.007960692, 0.0022107547, -0.029788395, 0.0027013018, 0....
239
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: ...... 4 | | CHAPTERTWO THE FUNDAMENTALS....................................................................
[ 0.007915597, 0.024607038, 0.05921694, -0.0106697185, 0.07196725, 0.011790039, -0.016551401, 0.0055582565, -0.049747564, 0.013223782, 0.02380681, -0.0006918646, 0.0011303233, 0.035610188, 0.004064496, -0.023980193, 0.042252086, 0.010109559, -0.020792615, 0.036650483, 0.0252338...
240
According to Strategies for the Integration of Software Supply Chain Security in DevSecOps CI_CD Pipelines: There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in this publication, including co...
[ 0.023611976, -0.010502042, 0.06648944, -0.031294677, 0.03465439, -0.0084404005, 0.020029064, -0.004032244, -0.033573642, 0.01838445, 0.025538525, -0.011418329, -0.024481272, -0.03183505, 0.022625206, 0.00079073687, 0.003720942, 0.0042759995, -0.023705954, 0.011195131, 0.03521...
241
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer: ent, or possibly with other organizations like municipal governments, prime contractors, universities, etc., you will likely be required to demonstrate you are taking adequate measure...
[ -0.008671726, 0.0030063111, 0.04503878, 0.015622656, 0.018495165, -0.0113071175, -0.0037803305, 0.022654884, -0.0443071, 0.012147191, 0.04907655, 0.021299927, 0.000009983547, -0.022207748, 0.016706621, -0.005277558, -0.014321897, -0.008272014, -0.031895693, 0.01281112, 0.0477...
242
ociated with products and services that may potentially contain malicious functionality, are counterfeit, or are vulnerable due to poor manufacturing and development practices within the supply chain. These risks are associated with an enterprise's decreased visibility into and understanding of how the technology they ...
[ -0.010577573, -0.0009874146, 0.07388293, -0.002054869, 0.033271946, -0.03755716, 0.025046313, 0.010115805, -0.0549689, 0.03462647, 0.012646295, -0.008139436, -0.042310294, -0.020046903, 0.03901019, -0.009851058, -0.0059444974, 0.002866042, -0.014591879, 0.02033012, 0.05427932...
243
According to Report on the Design-A-Thon_ Designing Effective and Accessible Approaches for Digital Product Cybersecurity Education and Awareness: The NIST Internet of Things (IoT) Cybersecurity Program has defined an IoT cybersecurity baseline for both technical capabilities and non-technical capabilities. Technical ...
[ 0.0045455275, 0.023017008, 0.016325315, 0.0059200367, 0.04444248, -0.023330491, 0.0027384693, 0.027851906, 0.027273163, 0.037159987, 0.021160213, 0.002483763, -0.033976912, -0.07948042, 0.024644716, 0.013491897, -0.02179924, 0.0046660984, -0.017121084, 0.0247894, 0.04335734, ...
244
es and cause damage to equipment and/or injuries to workers. Furthermore, these incidents could significantly impact productivity and raise operating costs, depending on the extent of a cyber attack. ## This practice guide can help your organization: -  detect and prevent unauthorized software installation -  prote...
[ -0.013345787, 0.04037016, 0.040696163, -0.007722219, 0.0080957655, -0.03963665, -0.0043535116, -0.0035622725, -0.040505994, 0.037137285, 0.06541813, -0.003633586, -0.03990832, -0.0330079, 0.020103578, -0.0107445475, -0.0190984, -0.001976399, -0.048112754, 0.0021512867, 0.0406...
245
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations: ...........................................................64 | | | A.1.2. Selecting, Tailoring,...
[ 0.01941807, 0.035604246, 0.070887975, 0.002004909, 0.03902311, -0.0008209109, -0.009648938, -0.004119996, -0.056731746, 0.04628819, 0.007452051, -0.034856368, 0.012179697, 0.024639847, 0.031303957, -0.032158673, 0.036485672, 0.010436879, -0.018830452, 0.022329444, 0.051069256...
246
According to NIST Cybersecurity Framework 2.0_ Quick-Start Guide for Cybersecurity Supply Chain Risk Management (C-SCRM): - Identity Management, Authentication, and Access Control: Identities and credentials for authorized users, services, and hardware are managed by the organization [PR.AA-01] - Awareness and Trainin...
[ 0.007037623, 0.046331014, 0.059282195, 0.008473249, 0.066466436, -0.015797997, -0.0053698528, 0.056349855, -0.010586979, 0.02232246, 0.023128854, 0.0146617135, 0.008735938, 0.0077523813, 0.040906183, -0.0114972275, -0.016665481, 0.009200226, -0.01070916, 0.008742047, 0.051169...
247
. Participants used the information on the Product Data Cards to develop a strategy for cybersecurity education and awareness for the product. The team's designs and ideas are documented in Section 4. Teams were successful in planning strategies that utilize novel techniques and sound best practices. From the participa...
[ 0.03566483, 0.009335794, 0.017301762, 0.0019066492, 0.021855507, -0.032406867, 0.010650086, 0.04289652, 0.020127797, 0.05997615, 0.05948252, -0.008681733, -0.055237293, -0.0661959, 0.039416425, 0.029889349, -0.03946579, -0.0048869457, -0.027495239, 0.015142127, 0.043291427, ...
248
According to Data Integrity_ Detecting and Responding to Ransomware and Other Destructive Events: Ransomware, destructive malware, insider threats, and even honest mistakes present an ongoing threat to organizations that manage data in various forms. Database records and structure, system files, configurations, user f...
[ -0.004490903, 0.057631206, 0.07328169, 0.03991367, 0.019353947, -0.03892936, -0.004653929, 0.03774819, -0.06525959, 0.02330348, 0.043358747, 0.005016892, 0.003139018, -0.025665818, 0.005349096, 0.008538867, 0.0010835072, 0.010003025, -0.060534913, -0.0068101776, 0.028987857, ...
249
According to Zero Trust Architecture: 3.1.2 | ZTA y el uso de la microsegmentación... 3.1.2 ZTA y el uso de la microsegmentación Una empresa puede o...
[ 0.007025526, 0.033833772, 0.07613203, 0.014341262, 0.040460255, -0.01717082, -0.013809209, 0.054608043, -0.03131861, 0.02217696, -0.006795775, 0.015659304, 0.017884256, -0.0013603643, -0.0069046044, -0.023640107, 0.02222533, -0.02120959, -0.022261607, 0.037896726, -0.00117218...
250
According to Workshop on Enhancing Security of Devices and Components Across the Supply Chain: The National Institute of Standards and Technology (NIST) hosted an in-person, all-day workshop on February 27, 2024, to discuss existing and emerging cybersecurity threats and mitigation techniques for semiconductors throug...
[ -0.004053554, -0.0052112755, 0.012279794, -0.0063231774, 0.040957082, 0.013293946, 0.013892662, 0.00033620518, -0.013025135, -0.009060166, 0.064368114, 0.026270205, -0.010098755, -0.022201378, -0.028616196, -0.06378161, -0.015371125, 0.023484342, -0.016531901, -0.016226433, 0...
251
ncern to the public at large during this time Interval. In response to this need. Government laws and regulations in this arena have continued to grow and place legal requirements on computer systems. For example: - o The Privacy Act (1974), which specified the appropriate handling of personal records by Federal agenc...
[ 0.0018772199, 0.019744834, 0.08763679, 0.017487524, -0.0025145784, 0.006270678, 0.011352948, 0.016013632, -0.0077810846, 0.04477443, 0.04769566, -0.0025660319, -0.015110707, -0.01336461, 0.0032199882, -0.023555707, -0.02846868, 0.039914574, 0.021484293, -0.02024941, 0.0360904...
252
According to Guidelines on Mobile Device Forensics: ations prevailed. An important characteristic of a forensic tool is its ability to maintain the integrity of the original data source being acquired and also that of the extracted data. The former is done by blocking or otherwise eliminating write requ...
[ 0.041103594, 0.041849997, 0.004420502, 0.021323936, 0.03703699, -0.050317798, -0.02011425, -0.010797093, 0.005755661, 0.019419324, 0.06722767, 0.043677393, -0.021478364, -0.031657744, 0.0037770523, 0.018158162, -0.005620537, -0.01019225, -0.034231547, 0.002704099, 0.043883298...
253
According to Digital Identity Guidelines_ Authentication and Authenticator Management: 3.2.3. 3.2.3 requires a physical authenticator to be authenticated along with a biometric comparison. 3.2.3 requires a physical authenticator to be authenticated along with the biometric comparison.
[ 0.013362922, 0.034576707, 0.033471946, -0.0051300926, 0.037091807, 0.012328677, 0.0379145, -0.022248032, 0.009143671, 0.04574186, -0.015055324, 0.0009879689, -0.006563933, -0.022882681, -0.042733144, 0.016829995, 0.013315911, 0.0003977585, -0.022106998, 0.011511858, -0.001227...
254
blication 800-series reports on ITL’s research, guidelines, and outreach efforts in information system security, and its collaborative activities with industry, government, and academic organizations. i NIST SP 800-63A-4 July 2025 Patent Disclosure Notice Digital Identity Guidelines Identity Proofing and Enrollment...
[ 0.040282317, -0.009612826, 0.058807876, -0.011517889, 0.023076167, -0.023870505, 0.011800619, 0.011066867, -0.034789275, 0.009962873, 0.044779073, -0.018969849, -0.030642565, -0.030911833, 0.00600465, 0.005540165, 0.038505156, 0.04138631, -0.008724245, 0.036377948, 0.01440577...
255
According to Assessing Security and Privacy Controls in Information Systems and Organizations: ........................................................................................ 6 2.1 ASSESSMENTS WITHIN THE SYSTEM DEVELOPMENT LIFE CYCLE .................................................. 6 2.2 CONTROL STRUCTU...
[ 0.010930803, 0.026161054, 0.05237069, 0.021181466, 0.022566034, 0.02783711, 0.00307277, -0.0035039294, 0.005453256, 0.0098073585, 0.048168402, -0.043553174, 0.034055524, -0.0035069657, -0.00705644, -0.04445193, 0.020938559, 0.036314555, 0.02010053, -0.015533885, 0.028978772, ...
256
According to Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations: | Table 1. Security Requirement Families .......................................................................................................4 | |------------------------------------------------------------...
[ -0.0064467806, 0.051680915, 0.06698785, -0.010353517, 0.036133975, 0.017653646, -0.007846805, -0.00077084696, -0.022920405, 0.024293764, 0.03485395, -0.019920353, 0.026053796, 0.025333783, 0.014760261, -0.05685434, 0.04677416, 0.024760438, -0.020213692, 0.034187272, 0.0292538...
257
According to Workshop on Enhancing Security of Devices and Components Across the Supply Chain: The National Institute of Standards and Technology (NIST) hosted an in-person, all-day workshop on February 27, 2024, to discuss existing and emerging cybersecurity threats and mitigation techniques for semiconductors throug...
[ -0.013840754, -0.0017117864, 0.02785238, 0.004363377, 0.039252084, 0.008604702, 0.0011198317, 0.006133138, -0.010612465, -0.014170296, 0.058731664, 0.011338677, -0.007451305, -0.026705088, -0.033076227, -0.060245115, -0.018112592, 0.020456, 0.00013521129, -0.019955585, 0.0386...
258
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: systems, but such standards and guidelines shall not apply to national security systems without the express approval of the appropriate federal officials exercising policy a...
[ 0.005651286, 0.016780078, 0.037313778, -0.011518057, 0.02336977, 0.00050482736, -0.023467086, -0.011949029, -0.026372667, 0.0049665975, 0.02512146, 0.021075891, -0.027874116, -0.00428886, 0.0053419597, -0.0070415162, -0.00080807135, -0.017169343, -0.021381741, 0.0153898485, 0...
259
According to Audit and Evaluation of Computer Security: The increasing use of computers by Government and private organiza- tions for the storage and manipulation of records of all kinds— personal as well as of a business nature— has placed computers and the systems in which they reside in an extremely sensitive posit...
[ -0.0004458011, 0.036576074, 0.05624115, 0.016017132, 0.052134193, -0.0013060727, -0.0029715041, 0.044282656, -0.022890244, 0.024158569, 0.048703674, -0.0021017955, -0.0179015, -0.030439798, 0.012109483, -0.04478999, -0.0023207325, 0.0425674, 0.012804042, -0.010025806, 0.02197...
260
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: ............................................ 5 | | 2.1 DEVELOPMENTAPPROACH ..............................................................................
[ 0.017715218, 0.028639602, 0.051454652, -0.015903434, 0.060768563, 0.0064553176, -0.010763337, 0.01538003, -0.0412013, 0.016789194, 0.024465788, -0.0016071191, 0.008179868, 0.030706376, 0.014802943, -0.017916527, 0.045388535, 0.004989115, -0.033095248, 0.032343693, 0.03808772,...
261
According to Status Report on the Fourth Round of the NIST Post-Quantum Cryptography Standardization Process: . . . . . . . . . . . . . . . | 10 | | 3.2. | BIKE . . . . . . . . . . . . . . . . . . . . . . . . . . . . | 12 | | 3.3. | Classic McEliece . . . . . . . . . . . . . . . . . . . . . | 1...
[ 0.02137855, 0.023721203, 0.03866114, -0.0035195048, 0.042167757, 0.03659843, -0.03659843, 0.0138864815, -0.013503406, -0.00067222357, 0.056400478, -0.0235444, -0.07478809, 0.008177185, 0.01223631, -0.00781621, -0.009311678, -0.01631017, -0.0036300072, 0.056665685, 0.014903104...
262
According to Guidelines for the Use of PIV Credentials in Facility Access: The evaluation of specific PACS architectures or implementations is also outside the scope of this publication, as is the standardization of PACS. Unless normatively referenced, this document is a best practice guideline. As per OMB policy, i...
[ -0.04590931, -0.02244709, 0.0508327, -0.00380357, 0.023259196, -0.005602256, -0.04093517, -0.03474287, 0.0564413, -0.06344571, 0.021609608, -0.019414386, -0.048827816, 0.056238275, 0.013501246, -0.032128904, 0.030682344, -0.015721846, -0.019249428, 0.024870718, 0.017219165, ...
263
According to Multi-Factor Authentication for Criminal Justice Information Systems_ Implementation Considerations for Protecting Criminal Justice Information: There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities....
[ -0.0023263243, 0.046936817, 0.060199846, 0.007339669, 0.02393169, -0.0017902439, 0.020556368, -0.0202784, 0.006118597, 0.04071564, 0.009920796, -0.0272673, -0.045719057, 0.029967558, 0.009384716, -0.025056796, 0.024064055, 0.0048677423, -0.014997015, -0.0015453676, -0.0246332...
264
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations: The NIST Risk Management Framework (RMF), described in NIST Special Publication 800-37 Revision 1, Guide for Applying the Risk Management Framework to Federal Information Systems: a Secu...
[ -0.018737257, 0.044273783, 0.045597732, 0.007158305, 0.010524279, -0.010047433, 0.026546316, 0.032919228, -0.017660145, 0.054394145, -0.009907184, 0.014462469, -0.0157752, 0.018681157, 0.037137914, -0.032156274, 0.0060531436, 0.008858122, -0.0018877506, 0.03693596, 0.03296410...
265
According to Protecting Information and System Integrity in Industrial Control System Environments_ Cybersecurity for the Manufacturing Sector: Many manufacturing organizations rely on industrial control systems (ICS) to monitor and control their machinery, production lines, and other physical processes that produce g...
[ -0.025170593, 0.026365709, 0.047780223, 0.033146158, 0.029731544, -0.047487542, -0.025536444, 0.011646277, -0.055024087, 0.005280459, 0.05151191, 0.008188979, -0.049853384, -0.050828986, -0.0021021226, -0.023707187, -0.0050975326, 0.0042042453, -0.07463373, -0.002870411, 0.01...
266
According to Control Baselines for Information Systems and Organizations: | DATE | TYPE | REVISION ...
[ -0.0070843245, 0.01901241, 0.074650906, -0.051338688, 0.0010547161, 0.012620976, -0.01545082, -0.02164151, -0.01265983, 0.02111051, 0.034294866, 0.009532107, -0.012109403, -0.0048146206, 0.028725835, -0.008988156, -0.0022907492, 0.001190704, -0.022509243, 0.0109114135, 0.0098...
267
The main audience for this publication is IoT device manufacturers, especially with the emerging role of product security officers. This publication may also help IoT device customers or integrators. ## Patent Disclosure Notice NOTICE: ITL has requested that holders of patent claims whose use may be required for compl...
[ 0.01501391, 0.009918516, 0.040996533, -0.041904107, -0.017412506, -0.046286408, -0.03303579, 0.009963894, -0.013989645, -0.029146174, 0.030624228, -0.0029155898, 0.015221356, -0.019396208, 0.0060840044, -0.003439067, 0.032880202, -0.041800383, -0.028679421, 0.03306172, 0.0119...
268
he detecting effort. In other words, instead of checking by retracing the interrelations between rules after the policy is completed, it only checks the new added rule against previous 'correct' ones. Even though this method does not require comprehensive large numbers of test cases, requirements, or an oracle, the tr...
[ -0.012336932, 0.02344082, 0.020221926, -0.027957655, 0.009786477, 0.020715144, -0.018223096, -0.008164051, 0.0114673115, 0.059186123, 0.042183094, -0.046362463, -0.025790093, 0.04485685, -0.028113408, -0.025141124, 0.01305729, 0.00730741, 0.011668492, 0.02523198, 0.034109898,...
269
ine if additional supplier requirements are needed based on existing criticality criteria, such as your mission or business, data type being processed, or digital product or service being provided. 2. Create CSF Target Profiles for Each Supplier Criticality Level. The next page explains how to express supplier requirem...
[ -0.032148127, -0.025206756, 0.07437371, -0.01705819, 0.013141368, -0.008187931, 0.028264109, 0.00031738073, -0.0045761876, 0.01533925, 0.024248874, -0.011494596, -0.054323774, -0.009237666, 0.021611415, 0.0008906344, 0.04088717, 0.000747936, -0.040414788, 0.0113568185, 0.0316...
270
According to Guide to a Secure Enterprise Network Landscape: Access to multiple cloud services, the geographic spread of enterprise Information Technology (IT) resources (including multiple data centers), and the emergence of microservices-based applications (as opposed to monolithic ones) have significantly altered t...
[ -0.00216281, 0.0073376405, 0.1081434, 0.004759629, 0.03696597, -0.0125804655, -0.024813725, 0.075876296, -0.02311241, 0.024975754, -0.018679734, -0.011353668, 0.013089702, -0.01778857, -0.035461403, -0.034072578, 0.01246473, 0.018702881, -0.0015971521, -0.021735156, 0.0314800...
271
and the project documentation wiki is at https://github.com/usnistgov/macos\_security/wiki. ## Trademark Information All registered trademarks or trademarks belong to their respective organizations. ## Patent Disclosure Notice NOTICE: ITL has requested that holders of patent claims whose use may be required for compl...
[ 0.014487958, 0.055179525, 0.04984817, -0.008796736, -0.020645672, -0.012781924, -0.023764515, 0.0061710435, -0.03340094, -0.022111796, 0.013121798, 0.02496407, -0.019446118, -0.03116177, 0.0051047727, 0.007577189, 0.003362086, -0.0041451287, -0.0093565285, 0.027136598, -0.003...
272
According to Data Integrity_ Detecting and Responding to Ransomware and Other Destructive Events: 3.2.2 Resolution The build provides several mechanisms to detect and mitigate this use case.
[ -0.031359185, 0.07063118, 0.05650495, 0.012055097, -0.016064612, -0.020844165, -0.038767494, 0.040997952, -0.035846654, 0.0035116444, 0.050769486, -0.009393151, -0.030615699, -0.008151795, 0.030456379, -0.007348564, 0.03828954, 0.0028976046, -0.053876195, 0.03244786, 0.055602...
273
According to Guidelines on Mobile Device Forensics: There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in this publication, including concepts and methodologies, may be used by Federal agencie...
[ 0.0082606375, 0.014236282, 0.03453165, -0.0193711, -0.021142611, -0.013132296, 0.023543138, -0.0037644631, 0.0034627926, -0.0027326858, 0.029884638, 0.02019267, -0.029037394, -0.011649617, -0.012124588, -0.015404453, -0.019820396, -0.025699763, 0.0029204276, 0.025468696, 0.01...
274
According to Strategies for the Integration of Software Supply Chain Security in DevSecOps CI_CD Pipelines: - Subverting, removing, or introducing a step within the SSC to maliciously modify or sabotage the resulting software product - Stealing credentials from the build system to mint and sign unauthorized malicious ...
[ 0.025387058, 0.020692278, 0.07068603, 0.0004924485, 0.03295157, -0.042139746, 0.02315924, 0.00035065322, -0.06831976, -0.027539358, 0.063134104, 0.004389557, -0.021925759, -0.034461956, 0.018703604, -0.00646319, 0.037382033, -0.0075141666, -0.0645438, 0.0030317837, 0.03526749...
275
Barrett, Kathleen Coupe, Jeff Eisensmith, Chris Enloe, Ned Goren, Matthew Halstead, Jody Jacobs, Ralph Jones, Martin Kihiko, Raquel Leone, and the scientists, engineers, and research staff from the Computer Security Division and the Applied Cybersecurity Division for their exceptional contributions in helping to improv...
[ 0.058460303, 0.016365701, 0.028885331, -0.0000811799, 0.030238088, -0.0014737752, -0.017532786, 0.05724017, -0.027187753, -0.04901753, 0.06678904, -0.010841946, -0.0054010795, 0.01429678, 0.029177101, 0.018686607, 0.012731826, 0.00092256005, 0.018103065, 0.060635325, -0.04421...
276
According to Digital Identity Guidelines_ Identity Proofing and Enrollment: 3.13. Requirements for the Validation of Physical Evidence . . . . . . . . . . . • Physical or digital address: A physical (i.e., mailing address) or digital (e.g., phone number or email) address at which the applicant can receive communicati...
[ 0.049269736, 0.019894995, 0.037844144, 0.05338594, 0.027117064, -0.015978362, 0.014406719, 0.0089808125, -0.016277723, 0.055730928, 0.016439876, 0.006299042, -0.016365036, -0.035050113, 0.0059061316, 0.023312692, 0.04220982, 0.046400864, -0.02464734, 0.018996913, 0.06760556, ...
277
According to Zero Trust Architecture: | 1 INTRODUCCIÓN..................................................................................................................................................10 | 1 INTRODUCCIÓN.......................................................................................................
[ -0.01144645, 0.013971672, 0.035635754, 0.019304747, 0.04821886, 0.020164922, -0.016896263, 0.015249644, -0.042738326, 0.031015394, 0.014745829, -0.019710258, -0.00067738653, -0.015274221, 0.013750485, 0.017400078, 0.0091608465, -0.009277584, -0.010408098, 0.007010413, -0.0050...
278
According to Guidelines for Media Sanitization: ..................................13 | | 3.2.4. Quality of Cryptographic Implementations................................................................................15 | | 3.2.5. Traceability of CE Operations............................................
[ 0.030177265, 0.042574413, 0.04542902, -0.014001164, 0.0076802503, 0.020240517, 0.00038847284, 0.029769465, 0.0108746905, -0.009569728, 0.051872272, -0.025773017, -0.04377063, 0.007143312, 0.04863705, -0.022700917, 0.016380003, 0.0025113737, -0.044803724, 0.059158318, 0.065411...
279
According to Guidelines for the Use of PIV Credentials in Facility Access: credential; e-authentication; identity credential; issuance; personal identity verification (PIV); physical access control system (PACS); PIV authentication mechanisms; PIV cards; public key infrastructure (PKI); validation This document is in...
[ -0.010666588, -0.022148978, 0.047098868, 0.0408444, 0.014698002, 0.0034654515, -0.020000704, -0.0002023567, 0.03578644, -0.028199496, 0.033230264, 0.005730997, -0.05607267, 0.035487313, 0.029314423, 0.0034246615, 0.03197937, 0.003932837, -0.016356796, 0.011795112, -0.01521467...
280
weak authorization mechanisms. As access control is a fundamental data protection requirement of any database management system DBMS, this document focuses on access control on NoSQL database systems. ## Keywords access control; attribute-based access control; authorization; database systems; No-SQL; SQL. ## Reports o...
[ -0.019901106, 0.044281237, 0.06418234, 0.0009901247, 0.040667478, -0.020880893, -0.035959415, 0.013946044, -0.04489201, -0.03336362, 0.035603132, -0.015307565, -0.014862208, 0.012667232, -0.020766372, 0.0028725544, 0.042779744, 0.006483129, 0.040743828, 0.008283645, 0.0244946...
281
| | 5.1.1. Benefits.................................................................................................................. | 5.1.1. Benefits.................................................................................................................. | 6 ...
[ -0.0048257727, 0.006745704, 0.1128534, -0.010140794, 0.005600417, 0.023128128, -0.0021293445, -0.00022562897, 0.020503975, 0.039673634, 0.06594481, -0.0015159302, -0.047471967, -0.010340942, 0.005730142, 0.05657496, 0.016412076, 0.03727187, -0.017316444, 0.045040548, 0.048391...
282
According to Validating the Integrity of Computing Devices: 3.1.2 | Asset Inventory and Discovery ... 3.1.2 Asset Inventory and Discovery Organizational members with access to the enterpris...
[ 0.0118486695, 0.05187688, 0.039385054, 0.012518348, 0.034690674, -0.0074924435, -0.04169246, 0.012352586, -0.022172328, 0.010171157, 0.01117236, 0.0051054703, 0.01130497, -0.038218092, -0.0029439335, 0.0004939708, -0.006179608, 0.016814899, -0.048694253, 0.020050574, 0.053043...
283
According to Guide for Developing Security Plans for Federal Information Systems: The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology promotes the United States economy and public welfare by providing technical leadership for the Nation's measurement and standards infrastr...
[ -0.060014818, 0.007075459, 0.1035602, -0.018015105, 0.021572823, -0.036536552, -0.014124269, -0.0061926926, -0.035870314, 0.0034544496, 0.007948233, 0.020546814, -0.008960916, -0.009867001, -0.011352714, -0.01499038, -0.0006508323, 0.010479941, -0.020799985, 0.0004971809, 0.0...
284
According to Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule_ A Cybersecurity Resource Guide: | Standard | Sections | Implementation Specifications (R) = Required, (A) = Addressable | |-----------------------------------------------------|---------------------------|---------...
[ 0.0041298415, 0.053445008, 0.07344213, 0.03863895, 0.05145041, 0.020073842, -0.006929951, -0.01175023, 0.011366653, -0.004906584, 0.01164155, -0.026696932, 0.022081226, 0.025188196, -0.018718539, -0.048816517, -0.008604902, -0.012459847, -0.013258965, 0.034394037, 0.0507344, ...
285
According to Guide to Enterprise Patch Management Planning_ Preventive Maintenance for Technology: 1. Know when new software vulnerabilities affect your organization's assets, including applications, operating systems, and firmware. This involves knowing what assets your organization uses and which software and softwa...
[ -0.015766196, 0.034586318, 0.10507487, 0.0050898744, -0.0011312556, -0.0030306478, 0.01967671, 0.021874046, -0.015269623, 0.037888527, 0.0467027, 0.025312815, -0.022010604, -0.038534075, -0.0020825034, -0.011613604, 0.018509762, 0.019937411, -0.04603233, -0.014276477, 0.03053...
286
............................................................ 18 | REFERENCES............................................................................................................................ 18 | | List of Appendices ...
[ 0.03457716, -0.0027836107, 0.060143635, 0.028144833, 0.00755188, 0.01507662, -0.024236582, 0.014018135, 0.0006081197, -0.0016352229, -0.042556506, -0.022228176, 0.017302152, -0.028144833, 0.008576439, 0.060632166, 0.05471551, -0.006096464, 0.013529604, 0.030261802, 0.01179260...
287
According to Multi-Factor Authentication for Criminal Justice Information Systems_ Implementation Considerations for Protecting Criminal Justice Information: | Executive Summary............................................................................................................................1 | |------...
[ -0.009343406, 0.020749815, 0.048713483, 0.014454328, 0.040887382, -0.015146432, -0.0008534842, -0.0056898943, 0.02001778, 0.06292824, 0.019032864, -0.01607811, -0.027098538, 0.016663738, -0.00809895, -0.013762224, 0.016730286, 0.019338986, -0.033034664, 0.0066115907, -0.03135...
288
According to Profile of the IoT Core Baseline for Consumer IoT Products: | Vulnerability | Relevant Consumer Profile Capabilities ...
[ 0.005595834, 0.04332343, 0.053793482, 0.002286223, 0.021136902, -0.024154585, -0.0088037625, -0.0046282075, 0.021241864, -0.03301083, 0.02147803, 0.016518535, 0.012923555, -0.021819161, -0.024220187, -0.014340554, 0.0039262683, -0.00326697, -0.07447117, 0.03524129, 0.03340444...
289
According to Approaches and Challenges of Federal Cybersecurity Awareness Programs: The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation's measurem...
[ -0.039508734, 0.005079077, 0.06264915, -0.0058031157, 0.04475351, -0.0041785315, 0.033629972, 0.04922022, -0.0073412475, 0.031324577, 0.023961715, 0.0037894957, 0.0028403206, -0.024206664, 0.0047116545, -0.032333188, -0.028284336, 0.0084507195, -0.026440017, 0.00549693, 0.051...
290
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer: | Access Control | Maintenance | Security Assessment and Monitoring | |-----------------------------------|---------------------|-------------------------...
[ -0.026636772, 0.032366775, 0.06380436, 0.027023934, 0.03159245, -0.01659636, 0.0028069273, 0.04129732, 0.00562676, 0.014699265, 0.048033945, 0.00019398448, -0.013357102, -0.003936151, 0.03216029, -0.024481568, -0.021590756, 0.026120555, -0.022907108, 0.017990146, 0.04310408, ...
291
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The...
[ -0.013223343, -0.013184432, 0.06360694, -0.041297816, 0.016822634, -0.0033885222, 0.0019552908, 0.011271294, -0.045085177, -0.006329565, 0.016900457, 0.028093928, -0.035046075, 0.008009234, 0.024501123, -0.025473904, -0.013956171, -0.0013286574, -0.007302346, 0.03987107, 0.02...
292
According to Assessing Security Requirements for Controlled Unclassified Information: other than the ones noted above, are available at Organizations are encouraged to review all draft publications during public comment periods and provide feedback https://csrc.nist.gov/publications. ## Authority This publication ha...
[ -0.023464909, 0.044466723, 0.04370683, -0.05321857, 0.01545985, 0.0057515884, -0.02890206, -0.022154752, -0.010284731, -0.010206121, 0.03969775, -0.013396353, -0.007860941, -0.0031787679, 0.01002925, -0.0029560414, 0.020582564, -0.0039796014, -0.010776039, 0.03165339, 0.00789...
293
According to Federal Cybersecurity Awareness Programs_ A Mixed Methods Research Study: □ Audit reports or FISMA (Federal Information Security Modernization Act of 2014) evaluations
[ -0.01216821, 0.009840846, 0.04980289, -0.0019624517, 0.056287218, 0.009302727, -0.022305021, 0.014838624, 0.033175018, 0.025775887, 0.01817496, -0.0385293, -0.03680732, -0.013378977, 0.0057881395, 0.01804043, 0.003780284, -0.03634992, -0.021296049, -0.015336383, 0.026932841, ...
294
| FORENSIC TOOL CAPABILITIES ........................................................................................ | 25 | | 4. PRESERVATION............................................................
[ 0.02641211, 0.050678935, 0.0099881245, 0.008999064, 0.009131403, -0.0031865877, -0.0040119663, -0.01781703, -0.009591107, -0.01590856, 0.06290986, -0.0014714026, 0.05563817, -0.039673887, 0.04925803, 0.031343486, 0.005112471, 0.043602273, -0.03727785, 0.017552352, 0.021062823...
295
According to Risk Management Framework for Information Systems and Organizations_ A System Life Cycle Approach for Security and Privacy: assess; authorization to operate; authorization to use; authorizing official; categorize; common control; common control authorization; common control provider; continuous monitoring...
[ 0.020529712, 0.013160397, 0.063485555, 0.02292251, 0.028179033, 0.0049478766, 0.0009203687, 0.0013849282, 0.023215247, 0.02710991, 0.03444104, -0.051852476, 0.007980241, -0.003907391, -0.0046487767, -0.06007454, 0.017627805, 0.027491739, 0.022807961, 0.0013149261, 0.034033757...
296
-88r1 (Revision 1) (December 2014) https://doi.org/10.6028/NIST.SP.800-88r1 ## How to Cite this NIST Technical Series Publication Chandramouli R, Hibbard EA (2025) Guidelines for Media Sanitization. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-88r2. htt...
[ 0.01453265, 0.0036491535, 0.0034508647, -0.03241702, 0.0068825404, -0.0053537977, 0.013176611, 0.03528261, 0.004381543, -0.008891014, 0.03725271, 0.008008309, -0.07486362, -0.01797392, 0.022924744, -0.009441106, 0.0043303715, 0.010611649, 0.00039837658, 0.046872914, 0.0293979...
297
According to Validating the Integrity of Computing Devices: Further, this project is not intended to cover the entire supply chain risk management process; it focuses on the acceptance testing portion of a more holistic defense-in-depth/defense-in breadth supply chain risk management strategy. The project enables veri...
[ 0.0005361109, 0.026224792, 0.047941174, 0.031978257, 0.00091003696, -0.019816035, -0.002673592, -0.0030700439, 0.011847682, 0.042358086, 0.021388736, 0.036303185, -0.0742315, -0.015556636, -0.016854115, -0.020353375, -0.003718783, 0.0022869697, -0.03368202, -0.0020248527, 0.0...
298
| | 3.3 Adoption of International Standards | in SCAP v2 ............................................ 6 | | 4 SCAP v2 Development ...
[ 0.024335582, 0.016392179, 0.09983031, -0.010606322, 0.000030877065, 0.014914938, -0.027678808, -0.040999882, -0.0030451873, 0.011908626, 0.0058376887, -0.052636385, -0.02015007, 0.039056145, 0.013981945, 0.0061422074, 0.06702004, -0.0023243849, -0.012880494, 0.01888016, 0.038...
299