An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Secure Sockets Layer (SSL) Virtual Private Networks (VPNs) provide users with secure remote access to an organization's resources. An SSL VPN consists of one or
This bulletin summarizes the information that was disseminated by the National Institute of Standards and Technology (NIST) in a November 2007 Federal Register
This bulletin summarizes information disseminated in revised NIST Special Publication (SP) 800-61-1, Computer Security Incident Handling Guide: Recommendations
The Federal Desktop Core Configuration (FDCC) was jointly developed by the National Institute of Standards and Technology (NIST), the Department of Defense (DOD
This bulletin summarizes the contents of NIST Special Publication 800-44, Version 2, Guidelines on Securing Public Web Servers. The publication details the
This bulletin summarizes the recommendations developed by NIST to help workers secure their external devices that they need for teleworking. The bulletin covers
This bulletin summarizes the guidance developed by NIST and published in SP 800-111 to help organizations secure their end user devices, and deter unauthorized
This bulletin summarizes the guidance developed by NIST and published in NISTIR 7435 to help IT managers to make sense of data about the vulnerabilities of
This bulletin provides information on current and emerging standards that have been developed for Web services, and provides background information on the most
The Border Gateway Protocol (BGP) plays a critical role in the effective operation of the Internet. BGP is used to update routing information between major
The data that is captured on mobile phones can be a source of valuable information to organizations that are investigating crimes, policy violations and other
This bulletin summarizes the recommendations developed by NIST to assist organizations in establishing and maintaining robust security for wireless local area
This bulletin summarizes the recommendations developed by NIST to assist organizations in designing, implementing and operating email systems that are secure
This bulletin summarizes the recommendations developed by NIST for organizations in the effective use of intrusion detection and prevention systems (IDPS)
This bulletin summarizes the information provided in NIST SP 800-53, concerning the guidance developed for federal agencies in selecting and specifying security
This bulletin summarizes the information provided in NIST SP 800-84, concerning the need to design, develop, conduct, and evaluate Test, Training, and Exercise
This bulletin summarizes the information provided in NIST SP 800-69 concerning the need to secure Windows XP Home Edition computers, and discusses the security
NIST SP 800-92 helps organizations develop, implement and maintain effective processes for managing logs, which contain information about specific events
This bulletin explains the need for the use of digital forensic techniques, which can help organizations respond more effectively to information security
This bulletin explains the need for media sanitization, which is the process for removing confidential data from storage media, with reasonable assurance that
This bulletin discusses the cryptographic methods that have been used to maintain the confidentiality and integrity of information, to verify that information
This bulletin summarizes NIST SP 800-77, Guide to IPsec VPNs, which was issued by NIST to help network architects, network administrators, security staff
This bulletin provides information on the applicability and implementation of FIPS 200, Minimum Security Requirements for Federal Information and Information
This bulletin provides information for organizational security managers who are responsible for designing and implementing security patch and vulnerability
This bulletin provides information about testing and validation of personal identity verification (PIV) components and subsystems for conformance to Federal
This bulletin provides information about "malware," a term used to describe malicious code and malicious software that are covertly inserted into an information
This bulletin summarizes NIST Special Publication 800-68, Guidance for Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration