text stringlengths 51 4.95k | embedding listlengths 1.54k 1.54k | example_idx int64 0 2.23k |
|---|---|---|
According to Machine Learning for Access Control Policy Verification:
Machine learning has been used for device control, system analysis, and business forecasting. However, the use of ML for software testing is in the early stages [AWCS, CAT5]. In particular, ML applications for model proof are still elusive and have ... | [
-0.013073117,
0.023563141,
0.03895255,
-0.015777482,
0.05452387,
0.004102024,
-0.038637243,
-0.0033683286,
-0.0025239724,
0.057579923,
0.03199154,
-0.03783685,
-0.011053938,
0.038418956,
-0.047756895,
-0.039801456,
0.03065755,
0.013776494,
-0.012212086,
0.033398297,
0.0350233... | 200 |
, and academic organizations. ## Supplemental Content
NIST has established an Incident Response project page that hosts links to resources with additional information on incident response activities.
By moving links from this document to a website, NIST can update and expand them as needed without having to release a ... | [
-0.0160928,
-0.01955644,
0.057769023,
-0.027584083,
0.008852915,
-0.035261612,
-0.014767363,
0.010372166,
-0.029534725,
0.031985532,
0.053617656,
-0.006298949,
0.018968746,
-0.025033243,
0.010803558,
0.018293524,
0.011303722,
-0.023520244,
-0.023932882,
0.02244489,
-0.0166679... | 201 |
According to Digital Identity Guidelines_ Identity Proofing and Enrollment:
3.15.4. 3.15.4. | [
0.045822863,
-0.003939615,
0.024706526,
0.041629743,
0.018019456,
-0.020705247,
0.0078997845,
0.011668112,
-0.024130998,
0.045740645,
0.032859817,
-0.009688027,
-0.0044466266,
-0.029214816,
0.00060592993,
0.029954778,
0.03305166,
0.037299592,
-0.03757365,
0.044836245,
0.05749... | 202 |
According to Summary Report for “Workshop on Updating Manufacturer Guidance for Securable Connected Product Development”:
n Updating Manufacturer Guidance for Securable Connected Product Development' (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) NIST IR 85... | [
0.011074197,
0.025644194,
0.038154166,
-0.032585856,
0.0116172945,
-0.018452832,
0.0016558234,
0.0022816341,
-0.0018274921,
-0.001420169,
0.021698933,
0.0016417778,
-0.04729319,
-0.05882933,
0.0153815225,
0.0154564325,
-0.00003260244,
-0.012372637,
-0.031212505,
0.032585856,
... | 203 |
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations:
Information technologySecurity techniques-Information security management systems-Requirements and ISO/IEC 15408, Information technology -- Security techniques -- Evaluation criteria for... | [
-0.04415619,
0.0071929963,
0.01652334,
-0.0060303733,
0.04035124,
-0.0075864093,
0.014268557,
0.017662477,
-0.0026981076,
0.008420209,
0.016311955,
-0.007968078,
-0.040867962,
-0.0057191662,
0.011450076,
-0.045166146,
-0.0106749935,
0.0034937412,
-0.0027259989,
0.0020199108,
... | 204 |
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations:
INCLUDES UPDATES AS OF 1 1 -01 -2024; SEE APPENDIX K
Boyens J, Smith A, Bartol N, Winkler K, Holbrook A, Fallon M (2022) Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations. (National Instit... | [
-0.029298041,
-0.008848835,
0.054048944,
-0.02184435,
0.010896339,
0.0003229502,
0.021870187,
0.009623916,
-0.037643075,
0.014687775,
0.001623632,
0.015088232,
-0.0449805,
-0.0052350224,
0.018640684,
-0.016108755,
0.012000829,
0.013150532,
-0.03480111,
-0.023200741,
0.0083773... | 205 |
ards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analyses to advance the development and productive use of information technology.
ITL's responsibilities include the development of management, administrative, technical, and physical standards and gui... | [
0.005798577,
-0.015223585,
0.041239824,
-0.021684326,
0.034704823,
-0.032303706,
-0.0044061756,
0.011838503,
0.010111926,
0.010953555,
0.032377966,
-0.0019184193,
-0.022006124,
-0.07346927,
0.01835494,
0.011139208,
-0.018565347,
-0.028961942,
-0.041512117,
0.03977935,
0.03945... | 206 |
According to Validating the Integrity of Computing Devices:
|
| Intel | HP Inc.
Elitebook 360 830 G5, Lenovo ThinkPad T480, Transparent Supply Chain Tools, Key Generation Facility, Cloud Based Storage, TSCVerify and AutoVerify software tools |
| National Security Agency (NSA) | Host Inte... | [
0.023163833,
0.036805995,
0.05495842,
0.038727034,
0.040898643,
-0.025001349,
-0.016189625,
-0.007809441,
0.023957307,
0.01921039,
0.03786396,
0.0022794937,
-0.05025327,
0.024639413,
-0.048972573,
-0.018208109,
-0.01046131,
0.029316725,
-0.009013571,
0.031989478,
0.052174307,... | 207 |
According to Validating the Integrity of Computing Devices:
| Technology Partner/Collaborator | Build Involvement |
|-----------------------------------|------------... | [
-0.008552458,
0.016538529,
0.08003062,
0.028064525,
0.0197811,
-0.00943036,
-0.04103481,
0.020942194,
-0.011087044,
0.011710071,
0.044659693,
-0.014428734,
-0.067116976,
0.0014920783,
-0.00029580496,
0.029990243,
-0.015108399,
0.024694515,
-0.057771575,
0.032595627,
0.0203616... | 208 |
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations:
SP 800-53 Revision 4 has been updated to reflect the evolving technology and threat space. Example areas include issues particular to mobile and cloud computing; insider threats; applica... | [
-0.038923908,
0.005636231,
0.053184047,
-0.002996087,
0.014136822,
-0.0008043751,
0.016849836,
-0.002495805,
-0.0028657615,
0.011883451,
-0.0027256263,
0.0052382476,
-0.033901468,
0.029417146,
-0.0018834148,
-0.035695195,
0.015594226,
0.006227601,
-0.0053307367,
0.0022856023,
... | 209 |
According to Federal Cybersecurity Role-Based Training Approaches, Successes, and Challenges:
Almost two-thirds (65%) of survey participants measure RBT effectiveness by using training completion rates, and just under half evaluate success via audit reports or evaluations (Figure 14). Less than half (46%) gauge effect... | [
0.0030878268,
0.026812136,
0.09416702,
0.0023232815,
0.013393586,
-0.011028176,
0.012707055,
0.059915386,
0.029433433,
0.06545756,
0.019197889,
0.015340836,
0.02151961,
-0.035424974,
0.00061280647,
-0.04516122,
-0.015540553,
-0.010815975,
-0.051052902,
0.035424974,
0.03939436... | 210 |
According to Zero Trust Architecture:
forma estricta antes de permitir el acceso . Se trata de un ciclo constante de acceso, escaneo y evaluación de amenazas, adaptación y reevaluación continua de la confianza en permanente comunicación.
Así, se espera que la empresa que implemente una ZTA cuente con una gestión de la... | [
0.022867287,
0.05811036,
0.05020102,
0.02322786,
0.037243668,
-0.0077406815,
-0.014899794,
0.04747928,
-0.033568155,
0.026217123,
-0.0072754263,
0.009287654,
0.008037281,
-0.023041757,
-0.0035068602,
0.0036057269,
-0.011067255,
0.0051265294,
-0.024449155,
-0.0044170152,
-0.00... | 211 |
According to Recommendations for Federal Vulnerability Disclosure Guidelines:
There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in this publication, including concepts and methodologies, may ... | [
-0.0057034832,
0.041819066,
0.10332989,
0.014328342,
0.024018757,
-0.004281661,
0.00592372,
0.008654008,
-0.02811257,
0.0061925384,
0.036352012,
0.027594365,
-0.03184364,
-0.049255293,
0.010642615,
0.0019270713,
0.021350006,
0.0069568893,
-0.034149647,
-0.0031675221,
0.031325... | 212 |
According to Audit and Evaluation of Computer Security II_ System Vulnerabilities and Controls:
| | 5.1.1 | Business Cycles as an Auditing Framework | 9-16 | |------------------------------------------------------------------------------------------|---------------------------------------------------------------------... | [
-0.024283383,
0.04836701,
0.07865569,
-0.019576527,
0.035307664,
0.02864066,
-0.00014318769,
0.012603638,
0.0138209285,
0.013983234,
0.034958083,
-0.0662206,
0.003963997,
-0.0051282262,
0.01635539,
-0.008564731,
0.008808189,
0.045220777,
-0.0057618413,
0.040326647,
0.06711952... | 213 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
NIST SP 800-172, Enhanced Security Requirements for Protecting Controlled Unclassified Information provides enhanced security requirements to help protect CUI associated with critical... | [
-0.027711315,
0.021571606,
0.060914047,
0.027075734,
0.038516186,
-0.007379091,
0.0059903474,
0.040473774,
-0.0056534894,
0.02641473,
0.046397384,
0.0041503413,
-0.016575942,
-0.013016691,
0.029973982,
-0.02405037,
-0.011662904,
0.021724146,
-0.035058625,
0.011770953,
0.04627... | 214 |
According to Assessing Security and Privacy Controls in Information Systems and Organizations:
The National Institute of Standards and Technology (NIST) Information Technology Laboratory
(ITL) promotes the U.S. economy and public welfare by providing technical leadership for the
Nation’s measurement and standards infr... | [
-0.030294264,
-0.025942199,
0.04658412,
-0.0118101435,
0.042645376,
-0.024702225,
-0.032701273,
0.006838091,
-0.039484657,
-0.008728444,
0.032652646,
0.006333592,
-0.026015138,
-0.03063465,
0.028033135,
-0.018222753,
-0.011196235,
0.01615613,
0.015049879,
0.03080484,
0.057330... | 215 |
According to Automated Secure Configuration Guidance from the macOS Security Compliance Project (mSCP):
```
title: "Limit SSHD to FIPS 140 Validated Ciphers" discussion: | If SSHD is enabled, then it _MUST_ be configured to limit the ciphers to algorithms that are FIPS 140-validated. FIPS 140-2 is the current standard... | [
0.005335852,
-0.011016695,
0.064398214,
0.02058443,
0.046711706,
0.041674845,
-0.020055445,
0.030451156,
-0.004927614,
0.006825061,
0.021136414,
0.0325671,
-0.05703842,
0.056210443,
-0.010493459,
-0.0008955377,
0.0044618766,
0.0069860565,
-0.0051432326,
-0.006209828,
0.018008... | 216 |
According to Digital Identity Guidelines_ Identity Proofing and Enrollment:
3.15.3. 3.15.3. 3.15.3. | [
0.048537347,
-0.0052449033,
0.023551308,
0.04233821,
0.020411132,
-0.02337535,
0.008053464,
0.008270028,
-0.0223196,
0.040930547,
0.030345995,
-0.009346079,
-0.009989003,
-0.026447847,
0.00058074616,
0.032511633,
0.033323746,
0.0329989,
-0.03646392,
0.043150324,
0.058201507,
... | 217 |
According to Validating the Integrity of Computing Devices:
3.1.1 ID. 3.1.1 | Technology Configurations... 3.1.1 Technology Configurations
## 3. | [
0.020397985,
0.011110121,
0.045796584,
-0.008426176,
0.032913648,
-0.016273186,
0.0034220305,
-0.0058234553,
-0.015185481,
0.020058962,
0.042999633,
0.049186833,
-0.042123817,
0.019395037,
-0.008115403,
-0.0015379713,
-0.019945953,
0.016103672,
-0.003870532,
0.05082545,
0.010... | 218 |
According to Zero Trust Architecture:
| 1 INTRODUCCIÓN..................................................................................................................................................10 | 1 INTRODUCCIÓN....................................................................................................... | [
-0.011461441,
0.01398726,
0.035570413,
0.019272428,
0.04823024,
0.02016968,
-0.016887957,
0.015216369,
-0.042723827,
0.03102271,
0.0147370165,
-0.019727198,
-0.00070097623,
-0.015277824,
0.01375373,
0.017404184,
0.009156862,
-0.009273628,
-0.010410553,
0.007024358,
-0.0050485... | 219 |
According to Digital Identity Guidelines_ Identity Proofing and Enrollment:
3.14. Digital Injection Prevention and Forged Media Detection . . . . . . . . .
• Cryptographic verification of the source and integrity of digital evidence or
2. Based on the results of its privacy risk assessment, the CSP SHALL document ... | [
0.03118496,
0.0036638426,
0.028946308,
0.04735012,
0.037119996,
-0.016907038,
0.016607683,
0.032955058,
-0.01937997,
0.033814076,
0.030169757,
-0.017492732,
-0.015540419,
-0.025080726,
-0.0020922297,
0.029831357,
0.02228241,
0.017427655,
-0.017622886,
0.01954917,
0.04984908,
... | 220 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
ance. The decision to select a particular set of enhanced security requirements will be based on the mission and business needs of federal agencies and guided and informed b... | [
-0.029125402,
-0.0010971475,
0.05849805,
0.01783869,
0.04371283,
0.019173812,
-0.007880919,
0.00061849755,
-0.035034545,
0.020274049,
0.014921206,
-0.018110659,
-0.030435799,
0.02722162,
0.020088617,
-0.01777688,
0.016750814,
-0.015081915,
-0.0448996,
0.0032790801,
0.04272385... | 221 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
<!-- image -->
<!-- image -->
Howard Lutnick, Secretary of Commerce
<!-- image -->
Protecting Controlled Unclassified Information (CUI): NIST Special Publication 800-171, Revision... | [
-0.029982954,
-0.012517091,
0.02689492,
0.02363533,
0.017736396,
-0.031091478,
-0.009640206,
0.03977492,
-0.014358034,
0.012748034,
0.038771972,
0.002870287,
-0.026789347,
-0.007093238,
0.011560329,
-0.0057768654,
-0.012761231,
-0.0023374695,
-0.00986455,
0.027449183,
0.03322... | 222 |
According to High-Performance Computing Security_ Architecture, Threat Analysis, and Security Posture:
alleviate some of the stated impacts. For example, conduct scanning at write, and conduct subsequent batch scanning at read. Protection against ransomware attacks on HPC data is especially important.
It is recommende... | [
-0.009559738,
0.027640399,
0.08315789,
0.042788703,
0.026128197,
-0.020316087,
-0.053808045,
0.023761274,
-0.037555173,
-0.041237053,
0.039106824,
0.05083624,
0.0032052079,
0.0016773922,
-0.0059994916,
-0.023550881,
0.010670877,
0.008895685,
-0.011545323,
0.026417488,
0.01968... | 223 |
nce Level 1 . . . . . . . . . . . . . . . . . . . . . 2.1.1. Permitted Authenticator Types
. . . . . . . . . . . . . . . . . . 2.1.2. Authenticator and Verifier Requirements . . . . . . . . . . . . .
2.1.3. Reauthentication . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2. Authentication Assurance Level 2 . . .... | [
0.009899045,
0.033500314,
0.040729042,
-0.0152936205,
0.02442394,
0.0048719756,
0.0116253095,
-0.04490984,
0.012218713,
0.06942818,
0.033931877,
-0.025044316,
-0.005620473,
0.028159684,
-0.008557145,
-0.0031979717,
0.045071676,
0.029022815,
-0.026028825,
0.027256092,
0.001883... | 224 |
## NISTIR 8259B
## IoT Non-Technical Supporting Capability Core Baseline
Michael Fagan Jeffrey Marron Kevin G. Brady, Jr. Barbara B. Cuthill Katerina N. Megas Rebecca Herold
This publication is available free of charge from:
https://doi.org/10.6028/NIST.IR.8259B
<!-- image -->
## NISTIR 8259B
## Internet of Thin... | [
-0.0017590208,
0.010007031,
0.03141627,
-0.018824266,
0.0043838304,
-0.010113263,
0.0023601155,
0.0032028875,
0.0032825612,
-0.0078894785,
0.024773246,
-0.018186877,
-0.020155706,
-0.02820099,
0.028725067,
0.008321487,
0.008994289,
-0.029291635,
-0.008420637,
0.042266075,
0.0... | 225 |
According to Guide to Enterprise Patch Management Planning_ Preventive Maintenance for Technology:
In addition, there are administrative activities occurring throughout the software vulnerability management life cycle, such as updating documentation, audit logging, and generating actionable insights and reports as par... | [
0.010271876,
0.0640133,
0.08441167,
0.002243653,
-0.0027762582,
0.027242558,
0.05135379,
-0.00018819424,
-0.0071237725,
0.008230921,
0.042563703,
0.044084635,
-0.015365876,
-0.020006953,
-0.016238175,
0.005284117,
0.0043251477,
0.038224574,
-0.030083122,
-0.030709386,
0.04059... | 226 |
According to Guidelines for Media Sanitization:
..................................13 |
| 3.2.4. Quality of Cryptographic Implementations................................................................................15 |
| 3.2.5.
Traceability of CE Operations............................................ | [
0.030177766,
0.04254793,
0.045402586,
-0.014001396,
0.0076803775,
0.020227259,
0.00037446088,
0.029769959,
0.010936041,
-0.009569886,
0.051873133,
-0.025746256,
-0.043771353,
0.007157024,
0.048665047,
-0.022701293,
0.016380275,
0.002482529,
-0.044804465,
0.059159297,
0.065412... | 227 |
According to Automated Secure Configuration Guidance from the macOS Security Compliance Project (mSCP):
The macOS Security Compliance Project (mSCP) provides resources that system administrators, security professionals, security policy authors, information security officers, and auditors can leverage to secure and ass... | [
0.00590003,
0.02008994,
0.07806644,
-0.011741557,
-0.015140583,
-0.011308635,
0.009103071,
0.0051511913,
-0.0057362216,
0.025624325,
-0.013900319,
0.021575917,
-0.04521114,
0.0032966456,
0.0038611998,
-0.00357746,
-0.043011423,
0.006610842,
-0.0076872976,
-0.013853516,
0.0038... | 228 |
According to Analyzing Collusion Threats in the Semiconductor Supply Chain:
## Analyzing Collusion Threats in the Semiconductor Supply Chain
Rekhi S, Amberiadis K, Akib AA, Srivastava A (2025) Analyzing Collusion Threats in the Semiconductor Supply Chain. (National Institute of Standards and Technology, Gaithersburg,... | [
-0.031622212,
-0.0107972035,
0.009700812,
-0.025172103,
0.053396147,
0.00305675,
0.009367407,
-0.007770909,
-0.029955186,
-0.011399898,
0.027339237,
-0.015708521,
-0.052011233,
0.00041515374,
0.02903191,
-0.046522867,
0.019824794,
0.0075080316,
0.0010555164,
0.017144728,
0.02... | 229 |
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations:
3.1.1. 3.1.10. 3.1.11. | [
-0.00784808,
0.022775067,
0.06408536,
-0.0011662685,
0.056731302,
-0.020823989,
-0.007429099,
0.0105433175,
-0.029066037,
0.029166093,
0.0068913023,
-0.0040334756,
-0.01618393,
-0.02453854,
0.0055468106,
-0.006978851,
0.045925338,
-0.012294283,
-0.04052236,
0.008404638,
0.039... | 230 |
................................................................... | Executive Summary.................................................................................................................
| Executive Summary....................................................................................................... | [
0.015658226,
0.038797006,
0.0982929,
0.034373023,
0.011039853,
0.021141285,
-0.016073812,
0.024814533,
-0.0025739549,
-0.015390106,
0.015497353,
-0.009819906,
-0.028635249,
-0.032442555,
0.018326022,
0.040512975,
0.02001518,
0.028313503,
-0.008861376,
0.0013498181,
0.00504401... | 231 |
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations:
The NIST Risk Management Framework (RMF), described in NIST Special Publication 800-37 Revision 1, Guide for Applying the Risk Management Framework to Federal Information Systems: a Secu... | [
-0.023182461,
0.02939285,
0.04190331,
-0.012600139,
0.0095285745,
-0.004719447,
0.01406866,
0.013048543,
-0.002288259,
0.040244214,
-0.01029086,
0.011826643,
-0.011339004,
0.028854767,
0.024348311,
-0.059413467,
-0.008138523,
0.0014993493,
-0.0014306875,
0.031590026,
0.042418... | 232 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
<!-- image -->
<!-- image -->
Howard Lutnick, Secretary of Commerce
<!-- image -->
Protecting Controlled Unclassified Information (CUI): NIST Special Publication 800-171, Revision... | [
-0.029982954,
-0.012517091,
0.02689492,
0.02363533,
0.017736396,
-0.031091478,
-0.009640206,
0.03977492,
-0.014358034,
0.012748034,
0.038771972,
0.002870287,
-0.026789347,
-0.007093238,
0.011560329,
-0.0057768654,
-0.012761231,
-0.0023374695,
-0.00986455,
0.027449183,
0.03322... | 233 |
According to Digital Identity Guidelines_ Authentication and Authenticator Management:
3.2.6. 3.2.6. | [
0.022840122,
0.020449428,
0.035860404,
0.00093426637,
0.026130538,
-0.015578068,
-0.0031040458,
-0.0028662616,
-0.0026943502,
0.042775422,
-0.0032823838,
-0.02391979,
-0.027274473,
-0.027917132,
-0.019472586,
0.043546613,
0.03084766,
0.019909594,
-0.02827702,
0.02029519,
0.01... | 234 |
According to Analyzing Collusion Threats in the Semiconductor Supply Chain:
nd sensitive data are loaded into the manufactured IC. Standard data are generic and mostly available open source, but the sensitive data are anything whose disclosure would compromise IP or security.
For example, keys of crypto modules or log... | [
0.051993947,
0.014894506,
0.033594083,
-0.021071231,
0.04370619,
-0.01016423,
0.012705288,
0.015480904,
-0.021866126,
-0.04675546,
0.06677117,
-0.0020800836,
-0.070107125,
-0.013070158,
0.014972692,
-0.07558017,
-0.005238488,
0.029059274,
-0.025006613,
-0.013500183,
0.0602035... | 235 |
According to Guidelines for Media Sanitization:
outcomes from storage sanitization activities (e.g., identification of specific, acceptable sanitization techniques [13])
- Documentation or evidence associated with sanitization activities (see Sec.
4.6)
- The identification of roles and responsibilities (see Sec. 4.7) ... | [
0.002099985,
0.0499821,
0.0176104,
-0.019820912,
-0.008510466,
-0.028810322,
-0.0021675285,
-0.00021107307,
0.05531189,
0.0152648045,
0.06931179,
0.015473574,
-0.04177865,
-0.044504948,
0.045438275,
0.00046013927,
-0.01718058,
0.007472754,
-0.04860667,
0.018863024,
0.07324158... | 236 |
According to Guidelines on Mobile Device Forensics:
The objective of the guide is twofold: to help organizations evolve appropriate policies and procedures for dealing with mobile devices and to prepare forensic specialists to conduct forensically sound examinations involving mobile devices. This guide is ... | [
-0.0071936464,
0.031492043,
0.022704748,
-0.034590457,
0.008609518,
-0.030323792,
-0.015720626,
-0.018120624,
0.017003164,
0.027199984,
0.06252695,
0.00600952,
-0.017104752,
-0.035809502,
0.017815862,
-0.0020396814,
-0.0058888854,
-0.011244438,
-0.020660305,
0.009066661,
0.04... | 237 |
According to Status Report on the First Round of the Additional Digital Signature Schemes for the NIST Post-Quantum Cryptography Standardization Process:
NIST Internal Report
NIST IR 8528
Status Report on the First Round of the
Additional Digital Signature Schemes for
the NIST Post-Quantum Cryptography
Standardization... | [
0.0011174093,
0.0073966854,
0.027572984,
-0.028321689,
-0.011391928,
0.03198776,
-0.016045514,
0.016148783,
-0.019014515,
-0.024758887,
0.03418224,
-0.0029512516,
-0.08638502,
-0.02264186,
0.023610013,
0.019776128,
-0.012953881,
-0.00022227169,
-0.013270144,
0.039887883,
0.06... | 238 |
and technology usage are monitored to find potentially adverse events [DE.CM-03] ## Respond: - Incident Management: Incidents are escalated or elevated as needed [RS.MA-04] - Incident Response Reporting and Communication: Internal and external stakeholders are notified of incidents [RS.CO-02] ## Recover: - Incident Rec... | [
-0.03445024,
0.0035391827,
0.060208905,
-0.011529505,
0.021044144,
-0.011371477,
0.008237242,
0.0009654561,
0.00042758265,
0.031605724,
0.026891204,
-0.015776524,
-0.057311714,
0.0041515436,
0.051649023,
0.0052544517,
-0.007960692,
0.0022107547,
-0.029788395,
0.0027013018,
0.... | 239 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
...... 4 |
| CHAPTERTWO THE FUNDAMENTALS.................................................................... | [
0.007915597,
0.024607038,
0.05921694,
-0.0106697185,
0.07196725,
0.011790039,
-0.016551401,
0.0055582565,
-0.049747564,
0.013223782,
0.02380681,
-0.0006918646,
0.0011303233,
0.035610188,
0.004064496,
-0.023980193,
0.042252086,
0.010109559,
-0.020792615,
0.036650483,
0.0252338... | 240 |
According to Strategies for the Integration of Software Supply Chain Security in DevSecOps CI_CD Pipelines:
There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in this publication, including co... | [
0.023611976,
-0.010502042,
0.06648944,
-0.031294677,
0.03465439,
-0.0084404005,
0.020029064,
-0.004032244,
-0.033573642,
0.01838445,
0.025538525,
-0.011418329,
-0.024481272,
-0.03183505,
0.022625206,
0.00079073687,
0.003720942,
0.0042759995,
-0.023705954,
0.011195131,
0.03521... | 241 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
ent, or possibly with other organizations like municipal governments, prime contractors, universities, etc., you will likely be required to demonstrate you are taking adequate measure... | [
-0.008671726,
0.0030063111,
0.04503878,
0.015622656,
0.018495165,
-0.0113071175,
-0.0037803305,
0.022654884,
-0.0443071,
0.012147191,
0.04907655,
0.021299927,
0.000009983547,
-0.022207748,
0.016706621,
-0.005277558,
-0.014321897,
-0.008272014,
-0.031895693,
0.01281112,
0.0477... | 242 |
ociated with products and services that may potentially contain malicious functionality, are counterfeit, or are vulnerable due to poor manufacturing and development practices within the supply chain.
These risks are associated with an enterprise's decreased visibility into and understanding of how the technology they ... | [
-0.010577573,
-0.0009874146,
0.07388293,
-0.002054869,
0.033271946,
-0.03755716,
0.025046313,
0.010115805,
-0.0549689,
0.03462647,
0.012646295,
-0.008139436,
-0.042310294,
-0.020046903,
0.03901019,
-0.009851058,
-0.0059444974,
0.002866042,
-0.014591879,
0.02033012,
0.05427932... | 243 |
According to Report on the Design-A-Thon_ Designing Effective and Accessible Approaches for Digital Product Cybersecurity Education and Awareness:
The NIST Internet of Things (IoT) Cybersecurity Program has defined an IoT cybersecurity baseline for both technical capabilities and non-technical capabilities. Technical ... | [
0.0045455275,
0.023017008,
0.016325315,
0.0059200367,
0.04444248,
-0.023330491,
0.0027384693,
0.027851906,
0.027273163,
0.037159987,
0.021160213,
0.002483763,
-0.033976912,
-0.07948042,
0.024644716,
0.013491897,
-0.02179924,
0.0046660984,
-0.017121084,
0.0247894,
0.04335734,
... | 244 |
es and
cause damage to equipment and/or injuries to workers. Furthermore, these incidents could significantly impact productivity and raise operating costs, depending on the extent of a cyber attack.
## This practice guide can help your organization:
- detect and prevent unauthorized software installation
- prote... | [
-0.013345787,
0.04037016,
0.040696163,
-0.007722219,
0.0080957655,
-0.03963665,
-0.0043535116,
-0.0035622725,
-0.040505994,
0.037137285,
0.06541813,
-0.003633586,
-0.03990832,
-0.0330079,
0.020103578,
-0.0107445475,
-0.0190984,
-0.001976399,
-0.048112754,
0.0021512867,
0.0406... | 245 |
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations:
...........................................................64 | |
| A.1.2.
Selecting, Tailoring,... | [
0.01941807,
0.035604246,
0.070887975,
0.002004909,
0.03902311,
-0.0008209109,
-0.009648938,
-0.004119996,
-0.056731746,
0.04628819,
0.007452051,
-0.034856368,
0.012179697,
0.024639847,
0.031303957,
-0.032158673,
0.036485672,
0.010436879,
-0.018830452,
0.022329444,
0.051069256... | 246 |
According to NIST Cybersecurity Framework 2.0_ Quick-Start Guide for Cybersecurity Supply Chain Risk Management (C-SCRM):
- Identity Management, Authentication, and Access Control: Identities and credentials for authorized users, services, and hardware are managed by the organization [PR.AA-01]
- Awareness and Trainin... | [
0.007037623,
0.046331014,
0.059282195,
0.008473249,
0.066466436,
-0.015797997,
-0.0053698528,
0.056349855,
-0.010586979,
0.02232246,
0.023128854,
0.0146617135,
0.008735938,
0.0077523813,
0.040906183,
-0.0114972275,
-0.016665481,
0.009200226,
-0.01070916,
0.008742047,
0.051169... | 247 |
. Participants used the information on the Product Data Cards to develop a strategy for cybersecurity education and awareness for the product. The team's designs and ideas are documented in Section 4.
Teams were successful in planning strategies that utilize novel techniques and sound best practices. From the participa... | [
0.03566483,
0.009335794,
0.017301762,
0.0019066492,
0.021855507,
-0.032406867,
0.010650086,
0.04289652,
0.020127797,
0.05997615,
0.05948252,
-0.008681733,
-0.055237293,
-0.0661959,
0.039416425,
0.029889349,
-0.03946579,
-0.0048869457,
-0.027495239,
0.015142127,
0.043291427,
... | 248 |
According to Data Integrity_ Detecting and Responding to Ransomware and Other Destructive Events:
Ransomware, destructive malware, insider threats, and even honest mistakes present an ongoing threat to organizations that manage data in various forms. Database records and structure, system files, configurations, user f... | [
-0.004490903,
0.057631206,
0.07328169,
0.03991367,
0.019353947,
-0.03892936,
-0.004653929,
0.03774819,
-0.06525959,
0.02330348,
0.043358747,
0.005016892,
0.003139018,
-0.025665818,
0.005349096,
0.008538867,
0.0010835072,
0.010003025,
-0.060534913,
-0.0068101776,
0.028987857,
... | 249 |
According to Zero Trust Architecture:
3.1.2 | ZTA y el uso de la microsegmentación... 3.1.2 ZTA y el uso de la microsegmentación
Una empresa puede o... | [
0.007025526,
0.033833772,
0.07613203,
0.014341262,
0.040460255,
-0.01717082,
-0.013809209,
0.054608043,
-0.03131861,
0.02217696,
-0.006795775,
0.015659304,
0.017884256,
-0.0013603643,
-0.0069046044,
-0.023640107,
0.02222533,
-0.02120959,
-0.022261607,
0.037896726,
-0.00117218... | 250 |
According to Workshop on Enhancing Security of Devices and Components Across the Supply Chain:
The National Institute of Standards and Technology (NIST) hosted an in-person, all-day workshop on February 27, 2024, to discuss existing and emerging cybersecurity threats and mitigation techniques for semiconductors throug... | [
-0.004053554,
-0.0052112755,
0.012279794,
-0.0063231774,
0.040957082,
0.013293946,
0.013892662,
0.00033620518,
-0.013025135,
-0.009060166,
0.064368114,
0.026270205,
-0.010098755,
-0.022201378,
-0.028616196,
-0.06378161,
-0.015371125,
0.023484342,
-0.016531901,
-0.016226433,
0... | 251 |
ncern to the public at large during this time Interval. In response to this need. Government laws and regulations in this arena have continued to grow and place legal requirements on computer systems.
For example:
- o The Privacy Act (1974), which specified the appropriate handling of personal records by Federal agenc... | [
0.0018772199,
0.019744834,
0.08763679,
0.017487524,
-0.0025145784,
0.006270678,
0.011352948,
0.016013632,
-0.0077810846,
0.04477443,
0.04769566,
-0.0025660319,
-0.015110707,
-0.01336461,
0.0032199882,
-0.023555707,
-0.02846868,
0.039914574,
0.021484293,
-0.02024941,
0.0360904... | 252 |
According to Guidelines on Mobile Device Forensics:
ations prevailed. An important characteristic of a forensic tool is its ability to maintain the integrity of the original data source being acquired and also that of the extracted data.
The former is done by blocking or otherwise eliminating write requ... | [
0.041103594,
0.041849997,
0.004420502,
0.021323936,
0.03703699,
-0.050317798,
-0.02011425,
-0.010797093,
0.005755661,
0.019419324,
0.06722767,
0.043677393,
-0.021478364,
-0.031657744,
0.0037770523,
0.018158162,
-0.005620537,
-0.01019225,
-0.034231547,
0.002704099,
0.043883298... | 253 |
According to Digital Identity Guidelines_ Authentication and Authenticator Management:
3.2.3. 3.2.3 requires a physical authenticator to be
authenticated along with a biometric comparison. 3.2.3 requires a physical authenticator to be
authenticated along with the biometric comparison. | [
0.013362922,
0.034576707,
0.033471946,
-0.0051300926,
0.037091807,
0.012328677,
0.0379145,
-0.022248032,
0.009143671,
0.04574186,
-0.015055324,
0.0009879689,
-0.006563933,
-0.022882681,
-0.042733144,
0.016829995,
0.013315911,
0.0003977585,
-0.022106998,
0.011511858,
-0.001227... | 254 |
blication 800-series reports on ITL’s research, guidelines, and outreach efforts in
information system security, and its collaborative activities with industry, government,
and academic organizations.
i
NIST SP 800-63A-4
July 2025
Patent Disclosure Notice
Digital Identity Guidelines
Identity Proofing and Enrollment... | [
0.040282317,
-0.009612826,
0.058807876,
-0.011517889,
0.023076167,
-0.023870505,
0.011800619,
0.011066867,
-0.034789275,
0.009962873,
0.044779073,
-0.018969849,
-0.030642565,
-0.030911833,
0.00600465,
0.005540165,
0.038505156,
0.04138631,
-0.008724245,
0.036377948,
0.01440577... | 255 |
According to Assessing Security and Privacy Controls in Information Systems and Organizations:
........................................................................................ 6
2.1 ASSESSMENTS WITHIN THE SYSTEM DEVELOPMENT LIFE CYCLE ..................................................
6
2.2 CONTROL STRUCTU... | [
0.010930803,
0.026161054,
0.05237069,
0.021181466,
0.022566034,
0.02783711,
0.00307277,
-0.0035039294,
0.005453256,
0.0098073585,
0.048168402,
-0.043553174,
0.034055524,
-0.0035069657,
-0.00705644,
-0.04445193,
0.020938559,
0.036314555,
0.02010053,
-0.015533885,
0.028978772,
... | 256 |
According to Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations:
| Table 1. Security Requirement Families .......................................................................................................4 |
|------------------------------------------------------------... | [
-0.0064467806,
0.051680915,
0.06698785,
-0.010353517,
0.036133975,
0.017653646,
-0.007846805,
-0.00077084696,
-0.022920405,
0.024293764,
0.03485395,
-0.019920353,
0.026053796,
0.025333783,
0.014760261,
-0.05685434,
0.04677416,
0.024760438,
-0.020213692,
0.034187272,
0.0292538... | 257 |
According to Workshop on Enhancing Security of Devices and Components Across the Supply Chain:
The National Institute of Standards and Technology (NIST) hosted an in-person, all-day workshop on February 27, 2024, to discuss existing and emerging cybersecurity threats and mitigation techniques for semiconductors throug... | [
-0.013840754,
-0.0017117864,
0.02785238,
0.004363377,
0.039252084,
0.008604702,
0.0011198317,
0.006133138,
-0.010612465,
-0.014170296,
0.058731664,
0.011338677,
-0.007451305,
-0.026705088,
-0.033076227,
-0.060245115,
-0.018112592,
0.020456,
0.00013521129,
-0.019955585,
0.0386... | 258 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
systems, but such standards and guidelines shall not apply to national security systems without the express approval of the appropriate federal officials exercising policy a... | [
0.005651286,
0.016780078,
0.037313778,
-0.011518057,
0.02336977,
0.00050482736,
-0.023467086,
-0.011949029,
-0.026372667,
0.0049665975,
0.02512146,
0.021075891,
-0.027874116,
-0.00428886,
0.0053419597,
-0.0070415162,
-0.00080807135,
-0.017169343,
-0.021381741,
0.0153898485,
0... | 259 |
According to Audit and Evaluation of Computer Security:
The increasing use of computers by Government and private organiza-
tions for the storage and manipulation of records of all kinds— personal
as well as of a business nature— has placed computers and the systems in
which they reside in an extremely sensitive posit... | [
-0.0004458011,
0.036576074,
0.05624115,
0.016017132,
0.052134193,
-0.0013060727,
-0.0029715041,
0.044282656,
-0.022890244,
0.024158569,
0.048703674,
-0.0021017955,
-0.0179015,
-0.030439798,
0.012109483,
-0.04478999,
-0.0023207325,
0.0425674,
0.012804042,
-0.010025806,
0.02197... | 260 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
............................................ 5 |
| 2.1 DEVELOPMENTAPPROACH .............................................................................. | [
0.017715218,
0.028639602,
0.051454652,
-0.015903434,
0.060768563,
0.0064553176,
-0.010763337,
0.01538003,
-0.0412013,
0.016789194,
0.024465788,
-0.0016071191,
0.008179868,
0.030706376,
0.014802943,
-0.017916527,
0.045388535,
0.004989115,
-0.033095248,
0.032343693,
0.03808772,... | 261 |
According to Status Report on the Fourth Round of the NIST Post-Quantum Cryptography Standardization Process:
. . . . . . . . . . . . . . . | 10 |
| 3.2. | BIKE . . . . . . . . . . . . . . . . . . . . . . . . . . . . | 12 |
| 3.3. | Classic McEliece . . . . . . . . . . . . . . . . . .
. . . | 1... | [
0.02137855,
0.023721203,
0.03866114,
-0.0035195048,
0.042167757,
0.03659843,
-0.03659843,
0.0138864815,
-0.013503406,
-0.00067222357,
0.056400478,
-0.0235444,
-0.07478809,
0.008177185,
0.01223631,
-0.00781621,
-0.009311678,
-0.01631017,
-0.0036300072,
0.056665685,
0.014903104... | 262 |
According to Guidelines for the Use of PIV Credentials in Facility Access:
The evaluation of specific PACS architectures or implementations is also outside the scope of this publication, as is the standardization of PACS. Unless normatively referenced, this document is a best practice guideline.
As per OMB policy, i... | [
-0.04590931,
-0.02244709,
0.0508327,
-0.00380357,
0.023259196,
-0.005602256,
-0.04093517,
-0.03474287,
0.0564413,
-0.06344571,
0.021609608,
-0.019414386,
-0.048827816,
0.056238275,
0.013501246,
-0.032128904,
0.030682344,
-0.015721846,
-0.019249428,
0.024870718,
0.017219165,
... | 263 |
According to Multi-Factor Authentication for Criminal Justice Information Systems_ Implementation Considerations for Protecting Criminal Justice Information:
There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities.... | [
-0.0023263243,
0.046936817,
0.060199846,
0.007339669,
0.02393169,
-0.0017902439,
0.020556368,
-0.0202784,
0.006118597,
0.04071564,
0.009920796,
-0.0272673,
-0.045719057,
0.029967558,
0.009384716,
-0.025056796,
0.024064055,
0.0048677423,
-0.014997015,
-0.0015453676,
-0.0246332... | 264 |
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations:
The NIST Risk Management Framework (RMF), described in NIST Special Publication 800-37 Revision 1, Guide for Applying the Risk Management Framework to Federal Information Systems: a Secu... | [
-0.018737257,
0.044273783,
0.045597732,
0.007158305,
0.010524279,
-0.010047433,
0.026546316,
0.032919228,
-0.017660145,
0.054394145,
-0.009907184,
0.014462469,
-0.0157752,
0.018681157,
0.037137914,
-0.032156274,
0.0060531436,
0.008858122,
-0.0018877506,
0.03693596,
0.03296410... | 265 |
According to Protecting Information and System Integrity in Industrial Control System Environments_ Cybersecurity for the Manufacturing Sector:
Many manufacturing organizations rely on industrial control systems (ICS) to monitor and control their machinery, production lines, and other physical processes that produce g... | [
-0.025170593,
0.026365709,
0.047780223,
0.033146158,
0.029731544,
-0.047487542,
-0.025536444,
0.011646277,
-0.055024087,
0.005280459,
0.05151191,
0.008188979,
-0.049853384,
-0.050828986,
-0.0021021226,
-0.023707187,
-0.0050975326,
0.0042042453,
-0.07463373,
-0.002870411,
0.01... | 266 |
According to Control Baselines for Information Systems and Organizations:
| DATE | TYPE | REVISION ... | [
-0.0070843245,
0.01901241,
0.074650906,
-0.051338688,
0.0010547161,
0.012620976,
-0.01545082,
-0.02164151,
-0.01265983,
0.02111051,
0.034294866,
0.009532107,
-0.012109403,
-0.0048146206,
0.028725835,
-0.008988156,
-0.0022907492,
0.001190704,
-0.022509243,
0.0109114135,
0.0098... | 267 |
The main audience for this publication is IoT device manufacturers, especially with the emerging role of product security officers. This publication may also help IoT device customers or integrators.
## Patent Disclosure Notice
NOTICE: ITL has requested that holders of patent claims whose use may be required for compl... | [
0.01501391,
0.009918516,
0.040996533,
-0.041904107,
-0.017412506,
-0.046286408,
-0.03303579,
0.009963894,
-0.013989645,
-0.029146174,
0.030624228,
-0.0029155898,
0.015221356,
-0.019396208,
0.0060840044,
-0.003439067,
0.032880202,
-0.041800383,
-0.028679421,
0.03306172,
0.0119... | 268 |
he detecting effort. In other words, instead of checking by retracing the interrelations between rules after the policy is completed, it only checks the new added rule against previous 'correct' ones.
Even though this method does not require comprehensive large numbers
of test cases, requirements, or an oracle, the tr... | [
-0.012336932,
0.02344082,
0.020221926,
-0.027957655,
0.009786477,
0.020715144,
-0.018223096,
-0.008164051,
0.0114673115,
0.059186123,
0.042183094,
-0.046362463,
-0.025790093,
0.04485685,
-0.028113408,
-0.025141124,
0.01305729,
0.00730741,
0.011668492,
0.02523198,
0.034109898,... | 269 |
ine if additional supplier requirements are needed based on existing criticality criteria, such as your mission or business, data type being processed, or digital product or service being provided. 2.
Create CSF Target Profiles for Each Supplier Criticality Level. The next page explains how to express supplier requirem... | [
-0.032148127,
-0.025206756,
0.07437371,
-0.01705819,
0.013141368,
-0.008187931,
0.028264109,
0.00031738073,
-0.0045761876,
0.01533925,
0.024248874,
-0.011494596,
-0.054323774,
-0.009237666,
0.021611415,
0.0008906344,
0.04088717,
0.000747936,
-0.040414788,
0.0113568185,
0.0316... | 270 |
According to Guide to a Secure Enterprise Network Landscape:
Access to multiple cloud services, the geographic spread of enterprise Information Technology (IT) resources (including multiple data centers), and the emergence of microservices-based applications (as opposed to monolithic ones) have significantly altered t... | [
-0.00216281,
0.0073376405,
0.1081434,
0.004759629,
0.03696597,
-0.0125804655,
-0.024813725,
0.075876296,
-0.02311241,
0.024975754,
-0.018679734,
-0.011353668,
0.013089702,
-0.01778857,
-0.035461403,
-0.034072578,
0.01246473,
0.018702881,
-0.0015971521,
-0.021735156,
0.0314800... | 271 |
and the project documentation wiki is at https://github.com/usnistgov/macos\_security/wiki. ## Trademark Information
All registered trademarks or trademarks belong to their respective organizations.
## Patent Disclosure Notice
NOTICE: ITL has requested that holders of patent claims whose use may be required for compl... | [
0.014487958,
0.055179525,
0.04984817,
-0.008796736,
-0.020645672,
-0.012781924,
-0.023764515,
0.0061710435,
-0.03340094,
-0.022111796,
0.013121798,
0.02496407,
-0.019446118,
-0.03116177,
0.0051047727,
0.007577189,
0.003362086,
-0.0041451287,
-0.0093565285,
0.027136598,
-0.003... | 272 |
According to Data Integrity_ Detecting and Responding to Ransomware and Other Destructive Events:
3.2.2 Resolution
The build provides several mechanisms to detect and mitigate this use case. | [
-0.031359185,
0.07063118,
0.05650495,
0.012055097,
-0.016064612,
-0.020844165,
-0.038767494,
0.040997952,
-0.035846654,
0.0035116444,
0.050769486,
-0.009393151,
-0.030615699,
-0.008151795,
0.030456379,
-0.007348564,
0.03828954,
0.0028976046,
-0.053876195,
0.03244786,
0.055602... | 273 |
According to Guidelines on Mobile Device Forensics:
There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in this publication, including concepts and methodologies, may be used by Federal agencie... | [
0.0082606375,
0.014236282,
0.03453165,
-0.0193711,
-0.021142611,
-0.013132296,
0.023543138,
-0.0037644631,
0.0034627926,
-0.0027326858,
0.029884638,
0.02019267,
-0.029037394,
-0.011649617,
-0.012124588,
-0.015404453,
-0.019820396,
-0.025699763,
0.0029204276,
0.025468696,
0.01... | 274 |
According to Strategies for the Integration of Software Supply Chain Security in DevSecOps CI_CD Pipelines:
- Subverting, removing, or introducing a step within the SSC to maliciously modify or sabotage the resulting software product
- Stealing credentials from the build system to mint and sign unauthorized malicious ... | [
0.025387058,
0.020692278,
0.07068603,
0.0004924485,
0.03295157,
-0.042139746,
0.02315924,
0.00035065322,
-0.06831976,
-0.027539358,
0.063134104,
0.004389557,
-0.021925759,
-0.034461956,
0.018703604,
-0.00646319,
0.037382033,
-0.0075141666,
-0.0645438,
0.0030317837,
0.03526749... | 275 |
Barrett, Kathleen Coupe, Jeff Eisensmith, Chris Enloe, Ned Goren, Matthew Halstead, Jody Jacobs, Ralph Jones, Martin Kihiko, Raquel Leone, and the scientists, engineers, and research staff from the Computer Security Division and the Applied Cybersecurity Division for their exceptional contributions in helping to improv... | [
0.058460303,
0.016365701,
0.028885331,
-0.0000811799,
0.030238088,
-0.0014737752,
-0.017532786,
0.05724017,
-0.027187753,
-0.04901753,
0.06678904,
-0.010841946,
-0.0054010795,
0.01429678,
0.029177101,
0.018686607,
0.012731826,
0.00092256005,
0.018103065,
0.060635325,
-0.04421... | 276 |
According to Digital Identity Guidelines_ Identity Proofing and Enrollment:
3.13. Requirements for the Validation of Physical Evidence . . . . . . . . . . .
• Physical or digital address: A physical (i.e., mailing address) or digital (e.g., phone
number or email) address at which the applicant can receive communicati... | [
0.049269736,
0.019894995,
0.037844144,
0.05338594,
0.027117064,
-0.015978362,
0.014406719,
0.0089808125,
-0.016277723,
0.055730928,
0.016439876,
0.006299042,
-0.016365036,
-0.035050113,
0.0059061316,
0.023312692,
0.04220982,
0.046400864,
-0.02464734,
0.018996913,
0.06760556,
... | 277 |
According to Zero Trust Architecture:
| 1 INTRODUCCIÓN..................................................................................................................................................10 | 1 INTRODUCCIÓN....................................................................................................... | [
-0.01144645,
0.013971672,
0.035635754,
0.019304747,
0.04821886,
0.020164922,
-0.016896263,
0.015249644,
-0.042738326,
0.031015394,
0.014745829,
-0.019710258,
-0.00067738653,
-0.015274221,
0.013750485,
0.017400078,
0.0091608465,
-0.009277584,
-0.010408098,
0.007010413,
-0.0050... | 278 |
According to Guidelines for Media Sanitization:
..................................13 |
| 3.2.4. Quality of Cryptographic Implementations................................................................................15 |
| 3.2.5.
Traceability of CE Operations............................................ | [
0.030177265,
0.042574413,
0.04542902,
-0.014001164,
0.0076802503,
0.020240517,
0.00038847284,
0.029769465,
0.0108746905,
-0.009569728,
0.051872272,
-0.025773017,
-0.04377063,
0.007143312,
0.04863705,
-0.022700917,
0.016380003,
0.0025113737,
-0.044803724,
0.059158318,
0.065411... | 279 |
According to Guidelines for the Use of PIV Credentials in Facility Access:
credential; e-authentication; identity credential; issuance; personal identity verification (PIV); physical access control system (PACS); PIV authentication mechanisms; PIV cards; public key infrastructure (PKI); validation
This document is in... | [
-0.010666588,
-0.022148978,
0.047098868,
0.0408444,
0.014698002,
0.0034654515,
-0.020000704,
-0.0002023567,
0.03578644,
-0.028199496,
0.033230264,
0.005730997,
-0.05607267,
0.035487313,
0.029314423,
0.0034246615,
0.03197937,
0.003932837,
-0.016356796,
0.011795112,
-0.01521467... | 280 |
weak authorization mechanisms. As access control is a fundamental data protection requirement of any database management system DBMS, this document focuses on access control on NoSQL database systems.
## Keywords
access control; attribute-based access control; authorization; database systems; No-SQL; SQL. ## Reports o... | [
-0.019901106,
0.044281237,
0.06418234,
0.0009901247,
0.040667478,
-0.020880893,
-0.035959415,
0.013946044,
-0.04489201,
-0.03336362,
0.035603132,
-0.015307565,
-0.014862208,
0.012667232,
-0.020766372,
0.0028725544,
0.042779744,
0.006483129,
0.040743828,
0.008283645,
0.0244946... | 281 |
|
| 5.1.1. Benefits.................................................................................................................. | 5.1.1.
Benefits.................................................................................................................. | 6 ... | [
-0.0048257727,
0.006745704,
0.1128534,
-0.010140794,
0.005600417,
0.023128128,
-0.0021293445,
-0.00022562897,
0.020503975,
0.039673634,
0.06594481,
-0.0015159302,
-0.047471967,
-0.010340942,
0.005730142,
0.05657496,
0.016412076,
0.03727187,
-0.017316444,
0.045040548,
0.048391... | 282 |
According to Validating the Integrity of Computing Devices:
3.1.2 | Asset Inventory and Discovery ... 3.1.2 Asset Inventory and Discovery
Organizational members with access to the enterpris... | [
0.0118486695,
0.05187688,
0.039385054,
0.012518348,
0.034690674,
-0.0074924435,
-0.04169246,
0.012352586,
-0.022172328,
0.010171157,
0.01117236,
0.0051054703,
0.01130497,
-0.038218092,
-0.0029439335,
0.0004939708,
-0.006179608,
0.016814899,
-0.048694253,
0.020050574,
0.053043... | 283 |
According to Guide for Developing Security Plans for Federal Information Systems:
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology promotes the United States economy and public welfare by providing technical leadership for the Nation's measurement and standards infrastr... | [
-0.060014818,
0.007075459,
0.1035602,
-0.018015105,
0.021572823,
-0.036536552,
-0.014124269,
-0.0061926926,
-0.035870314,
0.0034544496,
0.007948233,
0.020546814,
-0.008960916,
-0.009867001,
-0.011352714,
-0.01499038,
-0.0006508323,
0.010479941,
-0.020799985,
0.0004971809,
0.0... | 284 |
According to Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule_ A Cybersecurity Resource Guide:
| Standard | Sections | Implementation Specifications (R) = Required, (A) = Addressable | |-----------------------------------------------------|---------------------------|---------... | [
0.0041298415,
0.053445008,
0.07344213,
0.03863895,
0.05145041,
0.020073842,
-0.006929951,
-0.01175023,
0.011366653,
-0.004906584,
0.01164155,
-0.026696932,
0.022081226,
0.025188196,
-0.018718539,
-0.048816517,
-0.008604902,
-0.012459847,
-0.013258965,
0.034394037,
0.0507344,
... | 285 |
According to Guide to Enterprise Patch Management Planning_ Preventive Maintenance for Technology:
1. Know when new software vulnerabilities affect your organization's assets, including applications, operating systems, and firmware. This involves knowing what assets your organization uses and which software and softwa... | [
-0.015766196,
0.034586318,
0.10507487,
0.0050898744,
-0.0011312556,
-0.0030306478,
0.01967671,
0.021874046,
-0.015269623,
0.037888527,
0.0467027,
0.025312815,
-0.022010604,
-0.038534075,
-0.0020825034,
-0.011613604,
0.018509762,
0.019937411,
-0.04603233,
-0.014276477,
0.03053... | 286 |
............................................................ 18 | REFERENCES............................................................................................................................
18 |
| List of Appendices ... | [
0.03457716,
-0.0027836107,
0.060143635,
0.028144833,
0.00755188,
0.01507662,
-0.024236582,
0.014018135,
0.0006081197,
-0.0016352229,
-0.042556506,
-0.022228176,
0.017302152,
-0.028144833,
0.008576439,
0.060632166,
0.05471551,
-0.006096464,
0.013529604,
0.030261802,
0.01179260... | 287 |
According to Multi-Factor Authentication for Criminal Justice Information Systems_ Implementation Considerations for Protecting Criminal Justice Information:
| Executive Summary............................................................................................................................1 |
|------... | [
-0.009343406,
0.020749815,
0.048713483,
0.014454328,
0.040887382,
-0.015146432,
-0.0008534842,
-0.0056898943,
0.02001778,
0.06292824,
0.019032864,
-0.01607811,
-0.027098538,
0.016663738,
-0.00809895,
-0.013762224,
0.016730286,
0.019338986,
-0.033034664,
0.0066115907,
-0.03135... | 288 |
According to Profile of the IoT Core Baseline for Consumer IoT Products:
| Vulnerability | Relevant Consumer Profile Capabilities ... | [
0.005595834,
0.04332343,
0.053793482,
0.002286223,
0.021136902,
-0.024154585,
-0.0088037625,
-0.0046282075,
0.021241864,
-0.03301083,
0.02147803,
0.016518535,
0.012923555,
-0.021819161,
-0.024220187,
-0.014340554,
0.0039262683,
-0.00326697,
-0.07447117,
0.03524129,
0.03340444... | 289 |
According to Approaches and Challenges of Federal Cybersecurity Awareness Programs:
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation's measurem... | [
-0.039508734,
0.005079077,
0.06264915,
-0.0058031157,
0.04475351,
-0.0041785315,
0.033629972,
0.04922022,
-0.0073412475,
0.031324577,
0.023961715,
0.0037894957,
0.0028403206,
-0.024206664,
0.0047116545,
-0.032333188,
-0.028284336,
0.0084507195,
-0.026440017,
0.00549693,
0.051... | 290 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
| Access Control | Maintenance | Security Assessment and Monitoring |
|-----------------------------------|---------------------|-------------------------... | [
-0.026636772,
0.032366775,
0.06380436,
0.027023934,
0.03159245,
-0.01659636,
0.0028069273,
0.04129732,
0.00562676,
0.014699265,
0.048033945,
0.00019398448,
-0.013357102,
-0.003936151,
0.03216029,
-0.024481568,
-0.021590756,
0.026120555,
-0.022907108,
0.017990146,
0.04310408,
... | 291 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The... | [
-0.013223343,
-0.013184432,
0.06360694,
-0.041297816,
0.016822634,
-0.0033885222,
0.0019552908,
0.011271294,
-0.045085177,
-0.006329565,
0.016900457,
0.028093928,
-0.035046075,
0.008009234,
0.024501123,
-0.025473904,
-0.013956171,
-0.0013286574,
-0.007302346,
0.03987107,
0.02... | 292 |
According to Assessing Security Requirements for Controlled Unclassified Information:
other than the ones noted above, are available at
Organizations are encouraged to review all draft publications during public comment periods and provide feedback https://csrc.nist.gov/publications.
## Authority
This publication ha... | [
-0.023464909,
0.044466723,
0.04370683,
-0.05321857,
0.01545985,
0.0057515884,
-0.02890206,
-0.022154752,
-0.010284731,
-0.010206121,
0.03969775,
-0.013396353,
-0.007860941,
-0.0031787679,
0.01002925,
-0.0029560414,
0.020582564,
-0.0039796014,
-0.010776039,
0.03165339,
0.00789... | 293 |
According to Federal Cybersecurity Awareness Programs_ A Mixed Methods Research Study:
□ Audit reports or FISMA (Federal Information Security Modernization Act of 2014) evaluations | [
-0.01216821,
0.009840846,
0.04980289,
-0.0019624517,
0.056287218,
0.009302727,
-0.022305021,
0.014838624,
0.033175018,
0.025775887,
0.01817496,
-0.0385293,
-0.03680732,
-0.013378977,
0.0057881395,
0.01804043,
0.003780284,
-0.03634992,
-0.021296049,
-0.015336383,
0.026932841,
... | 294 |
| FORENSIC TOOL CAPABILITIES ........................................................................................
| 25 |
| 4. PRESERVATION............................................................ | [
0.02641211,
0.050678935,
0.0099881245,
0.008999064,
0.009131403,
-0.0031865877,
-0.0040119663,
-0.01781703,
-0.009591107,
-0.01590856,
0.06290986,
-0.0014714026,
0.05563817,
-0.039673887,
0.04925803,
0.031343486,
0.005112471,
0.043602273,
-0.03727785,
0.017552352,
0.021062823... | 295 |
According to Risk Management Framework for Information Systems and Organizations_ A System Life Cycle Approach for Security and Privacy:
assess; authorization to operate; authorization to use; authorizing official; categorize; common control; common control authorization; common control provider; continuous monitoring... | [
0.020529712,
0.013160397,
0.063485555,
0.02292251,
0.028179033,
0.0049478766,
0.0009203687,
0.0013849282,
0.023215247,
0.02710991,
0.03444104,
-0.051852476,
0.007980241,
-0.003907391,
-0.0046487767,
-0.06007454,
0.017627805,
0.027491739,
0.022807961,
0.0013149261,
0.034033757... | 296 |
-88r1 (Revision 1) (December 2014) https://doi.org/10.6028/NIST.SP.800-88r1
## How to Cite this NIST Technical Series Publication
Chandramouli R, Hibbard EA (2025) Guidelines for Media Sanitization.
(National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-88r2. htt... | [
0.01453265,
0.0036491535,
0.0034508647,
-0.03241702,
0.0068825404,
-0.0053537977,
0.013176611,
0.03528261,
0.004381543,
-0.008891014,
0.03725271,
0.008008309,
-0.07486362,
-0.01797392,
0.022924744,
-0.009441106,
0.0043303715,
0.010611649,
0.00039837658,
0.046872914,
0.0293979... | 297 |
According to Validating the Integrity of Computing Devices:
Further, this project is not intended to cover the entire supply chain risk management process; it focuses on the acceptance testing portion of a more holistic defense-in-depth/defense-in breadth supply chain risk management strategy. The project enables veri... | [
0.0005361109,
0.026224792,
0.047941174,
0.031978257,
0.00091003696,
-0.019816035,
-0.002673592,
-0.0030700439,
0.011847682,
0.042358086,
0.021388736,
0.036303185,
-0.0742315,
-0.015556636,
-0.016854115,
-0.020353375,
-0.003718783,
0.0022869697,
-0.03368202,
-0.0020248527,
0.0... | 298 |
|
| 3.3 Adoption of International Standards | in SCAP v2 ............................................
6 |
| 4 SCAP v2 Development ... | [
0.024335582,
0.016392179,
0.09983031,
-0.010606322,
0.000030877065,
0.014914938,
-0.027678808,
-0.040999882,
-0.0030451873,
0.011908626,
0.0058376887,
-0.052636385,
-0.02015007,
0.039056145,
0.013981945,
0.0061422074,
0.06702004,
-0.0023243849,
-0.012880494,
0.01888016,
0.038... | 299 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.