Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Special Publication (NIST SP)

NIST 2025 Rapid Microbial Testing Methods Workshop Report

Author(s)
Jason Kralj, Kirsten Parratt, Tyler Laird, Stephanie Servetas, Nancy Lin, Dawn Henke, Scott Jackson
In 2020, the National Institute of Standards and Technology (NIST)-led Rapid Microbial Testing Methods (RMTM) Consortium was established to develop standards...

Guidelines for Media Sanitization

Author(s)
Ramaswamy Chandramouli, Eric Hibbard
Media sanitization refers to a process that renders access to target data on the media infeasible for a given level of effort. This guide will assist...

Recommendation for Random Bit Generator (RBG) Constructions

Author(s)
Elaine Barker, John Kelsey, Kerry McKay, Allen Roginsky, Meltem Sonmez Turan
The NIST Special Publication (SP) 800-90 series of documents supports the generation of high-quality random bits for cryptographic and non-cryptographic use. SP...

NIST 2024 Rapid Microbial Testing Methods Workshop Report

Author(s)
Jason Kralj, Nancy Lin, Kirsten Parratt, Stephanie Servetas, Dawn Henke, Scott Jackson
The NIST-led Rapid Microbial Testing Methods (RMTM) Consortium launched in 2020 to develop standards and measurement-based solutions to advance the use of RMTMs...

NIST SP 800-63-4: Digital Identity Guidelines

Author(s)
David Temoshok, Yee-Yin Choong, Ryan Galluzzo, Marie LaSalle, Andrew Regenscheid, Diana Proud-Madruga, Sarbari Gupta, Naomi Lefkovitz
These guidelines cover identity proofing, authentication, and federation of users (such as employees, contractors, or private individuals) interacting with...

NIST SP 800-63C-4:Digital Identity Guidelines - Federation and Assertions

Author(s)
Justin Richer, James L. Fenton, Naomi Lefkovitz, David Temoshok, Ryan Galluzzo, Andrew Regenscheid, Yee-Yin Choong
This guideline focuses on the use of federated identity and the use of assertions to implement identity federations. Federation allows a given credential...

Estimating How Big: The Metric Estimation Game

Author(s)
Elizabeth Benham, Kristen Dill, Dinelka Jagoda, Maryanne Amanze, Yoon Thwel
The metric system (International System of Units, SI) is easy to use and learn. The Metric System Estimation Game is a fun, hands-on activity that helps...

Guidelines for API Protection for Cloud-Native Systems

Author(s)
Ramaswamy Chandramouli, Zack Butcher
Modern enterprise IT systems rely on a family of application programming interfaces (APIs) for integration to support organizational business processes. Hence...

Implementing a Zero Trust Architecture: High-Level Document

Author(s)
Alper Kerman, Oliver Borchert, Gema Howell, Scott Rose, Murugiah Souppaya, Jason Ajmo, Yemi Fashina, Parisa Grayeli, Joseph Hunt, Jason Hurlburt, Nedu Irrechukwu, Joshua Klosterman, Oksana Slivina, Susan Symington, Allen Tan, Karen Scarfone, William Barker, Peter Gallagher, Aaron Palermo, Madhu Balaji, Adam Cerini, Rajarshi Das, Jacob Barosin, Kyle Black, Scott Gordon, Jerry Haskins, Keith Luck, Dale McKay, Sunjeet Randhawa, Brian Butler, Mike Delaguardia, Matthew Hyatt, Randy Martin, Peter Romness, Corey Bonnell, Dean Coclin, Ryan Johnson, Dung Lam, Darwin Tolbert, Tim Jones, Tom May, Christopher Altman, Alex Bauer, Marco Genovese, Andrew Campagna, John Dombroski, Adam Frank, Nalini Kannan, Priti Patil, Harmeet Singh, Mike Spisak, Krishna Yellepeddy, Nicholas Herrmann, Corey Lund, Farhan Saifudin, Madhu Dodda, Tim LeMaster, Ken Durbin, James Elliott, Earl Matthews, David Pricer, Joey Cruz, Tarek Dawoud, Carmichael Patton, Alex Pavlovsky, Brandon Stephenson, Clay Taylor, Bob Lyons, Vinu Panicker, Peter Bjork, Hans Drolshagen, Imran Bashir, Ali Haider, Nishit Kothari, Sean Morgan, Seetal Patel, Norman Wong, Zack Austin, Shawn Higgins, Rob Woodworth, Mitchell Lewars, Bryan Rosensteel, Don Coltrain, Wade Ellery, Deborah McGinn, Frank Briguglio, Ryan Tighe, Chris Jensen, Joshua Moll, Jason White, Joe Brown, Gary Bradt, Jeffrey Adorno, Syed Ali, Bob Smith
A zero trust architecture (ZTA) enables secure authorized access to enterprise resources that are distributed across on-premises and multiple cloud environments...
Was this page helpful?