SP 800 Series — Computer Security
The cornerstone of federal cybersecurity guidance. SP 800 publications cover security controls, risk management, incident response, cloud security, identity management, and more.
An Introduction to Information Security
Provides a broad overview of information security for federal information systems. Introduces fundamental concepts, the NIST security framework, security governance, and the relationship between NIST publications. Serves as an entry point for understanding federal cybersecurity requirements.
Guide for Conducting Risk Assessments
Provides guidance on conducting risk assessments as part of the Risk Management Framework. Covers threat identification, vulnerability analysis, likelihood determination, impact analysis, and risk determination. Defines a risk model with threat sources, events, vulnerabilities, and predisposing conditions.
Risk Management Framework for Information Systems and Organizations
Defines the seven-step Risk Management Framework (RMF): Prepare, Categorize, Select, Implement, Assess, Authorize, and Monitor. Rev. 2 aligned RMF with the NIST Cybersecurity Framework and privacy risk management, and added the Prepare step for organization-wide readiness.
Managing Information Security Risk
Establishes a three-tier risk management approach: organizational, mission/business process, and information system levels. Provides the strategic framework within which SP 800-37 (RMF) and SP 800-30 (risk assessment) operate.
Guide to Enterprise Patch Management Planning
Provides guidance on creating and maintaining an enterprise patch management program. Rev. 4 shifted focus from individual system patching to enterprise-level risk-based strategies, addressing the reality that organizations cannot patch everything immediately.
Guidelines on Firewalls and Firewall Policy
Provides recommendations for configuring and managing firewalls, including packet filtering, stateful inspection, application proxy, and dedicated proxy servers. Covers firewall planning, policy creation, and management best practices.
Guide to Enterprise Telework, Remote Access, and BYOD Security
Provides guidance on securing remote access technologies including VPN, remote desktop, and direct application access. Covers BYOD security policies, mobile device management, and telework security planning for enterprise environments.
Managing the Security of Information Exchanges
Provides guidance on managing security when connecting IT systems between different organizations. Covers Interconnection Security Agreements (ISAs), Memoranda of Understanding (MOUs), and risk management for system interconnections.
Building an Information Technology Security Awareness and Training Program
Provides guidance for building and maintaining an IT security awareness and training program. Covers needs assessment, program development, training material creation, and program evaluation. Emphasizes role-based training tailored to different user populations.
Security and Privacy Controls for Information Systems and Organizations
The comprehensive catalog of security and privacy controls for federal information systems. Contains over 1,000 controls across 20 families. Rev. 5 integrated privacy controls alongside security controls for the first time and made the catalog outcome-based rather than system-specific.
Assessing Security and Privacy Controls in Information Systems and Organizations
Provides assessment procedures for the controls in SP 800-53. Defines methods (examine, interview, test) and objects for each control, enabling consistent and repeatable assessments. Used by auditors, assessors, and organizations to evaluate control effectiveness.
Control Baselines for Information Systems and Organizations
Establishes three security control baselines (Low, Moderate, High) and one privacy baseline for federal information systems. Defines which SP 800-53 controls apply at each impact level per FIPS 199 categorization.
Recommendation for Key Management
Provides comprehensive guidance on cryptographic key management including key generation, distribution, storage, use, revocation, and destruction. Defines key types, key states, and recommended key lifetimes for various cryptographic algorithms.
Guide for Mapping Types of Information and Information Systems to Security Categories
Provides guidance for mapping information types to security categories (confidentiality, integrity, availability) per FIPS 199. Appendices catalog hundreds of information types with recommended impact levels, enabling consistent system categorization across the federal government.
Computer Security Incident Handling Guide
Provides guidance on establishing and operating an incident response capability. Rev. 3 emphasizes coordination, information sharing, and updated guidance for modern threats. Covers preparation, detection, analysis, containment, eradication, recovery, and post-incident activity.
Digital Identity Guidelines
Comprehensive guidelines for digital identity services. Defines three assurance levels for identity proofing (IAL), authentication (AAL), and federation (FAL). Rev. 4 introduced risk-based approaches and expanded phishing-resistant authenticator requirements.
Digital Identity Guidelines: Enrollment and Identity Proofing
Defines requirements for identity proofing at three assurance levels (IAL1-3). Covers evidence collection, validation, verification, and address confirmation. Rev. 4 added equity considerations and expanded remote proofing options.
Digital Identity Guidelines: Authentication and Lifecycle Management
Defines authentication requirements at three assurance levels (AAL1-3). Covers authenticator types (passwords, OTP, FIDO2, PKI), session management, and lifecycle events. Rev. 4 deprecated SMS-only authentication and emphasized phishing-resistant methods.
Guide to Operational Technology (OT) Security
Provides guidance on securing industrial control systems (ICS), SCADA systems, and other operational technology. Rev. 3 broadened scope to all OT and updated guidance for converged IT/OT environments, including threat landscape, risk management, and security architecture.
Guidelines for Media Sanitization
Provides guidance on sanitizing media (clearing, purging, destroying) before disposal or reuse. Defines sanitization methods for different media types including magnetic, flash, optical, and paper. Includes decision flow charts for selecting appropriate sanitization methods.
Information Security Handbook: A Guide for Managers
Provides guidance for information security program managers on establishing and managing an information security program. Covers governance, planning, budgeting, risk management, certification and accreditation, and performance measurement.
Technical Guide to Information Security Testing and Assessment
Provides guidance on planning and conducting technical security testing, including vulnerability scanning, penetration testing, and security assessment. Covers testing techniques, target identification, analysis methods, and reporting of findings.
Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)
Provides guidance on protecting PII held by federal agencies. Defines PII, establishes confidentiality impact levels, and recommends safeguards for PII in storage, transit, and disposal. Covers operational and privacy-specific safeguards.
Guide to General Server Security
Provides guidance on securing server operating systems and server software. Covers OS hardening, patch management, access control, logging, and backup. Addresses both initial deployment security and ongoing server maintenance.
Guidelines for Managing the Security of Mobile Devices in the Enterprise
Provides recommendations for securing mobile devices used in enterprise environments. Rev. 2 covers modern mobile threats, mobile device management (MDM), mobile threat defense, and zero-trust approaches to mobile security.
Guide to Security for Full Virtualization Technologies
Provides guidance on securing virtualization technologies including hypervisors, virtual machines, and virtual networks. Covers guest OS hardening, hypervisor security, virtual network configuration, and image management.
Guide for Security-Focused Configuration Management of Information Systems
Provides guidance on establishing and maintaining secure configurations for federal information systems. Covers configuration management planning, baseline configuration, change control, monitoring, and security impact analysis of configuration changes.
Transitioning the Use of Cryptographic Algorithms and Key Lengths
Provides transition guidance for moving from legacy to stronger cryptographic algorithms. Specifies minimum key lengths, deprecated algorithms, and timelines for transitioning. Addresses the sunset of SHA-1, 1024-bit RSA, and other weakening algorithms.
Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations
Defines the ISCM process for maintaining ongoing awareness of information security, vulnerabilities, and threats. Establishes the monitoring strategy, metrics, frequencies, and reporting requirements to support risk-based security decisions.
Guidelines on Security and Privacy in Public Cloud Computing
Provides guidance on the security and privacy challenges of public cloud computing. Covers governance, compliance, trust, identity management, data protection, and incident response considerations specific to cloud environments.
The NIST Definition of Cloud Computing
Establishes the canonical definition of cloud computing used across the federal government. Defines five essential characteristics, three service models (IaaS, PaaS, SaaS), and four deployment models (public, private, hybrid, community).
Guide to Cyber Threat Information Sharing
Provides guidance on establishing and participating in cyber threat information sharing relationships. Covers threat indicators, defensive measures, sharing architectures (STIX/TAXII), and trust models for sharing sensitive threat intelligence.
Guidelines for Derived Personal Identity Verification (PIV) Credentials
Provides guidelines for issuing derived PIV credentials on mobile devices and other platforms where traditional PIV cards cannot be used. Enables strong authentication for mobile users while maintaining PIV assurance levels.
Systems Security Engineering
Addresses security from a systems engineering perspective, integrating security into every phase of the system development life cycle. Provides engineering-driven solutions for building trustworthy, resilient systems rather than bolt-on security.
Cybersecurity Supply Chain Risk Management Practices
Provides guidance on identifying, assessing, and mitigating cybersecurity risks throughout the supply chain. Rev. 1 expanded coverage to include software supply chain security, supplier assessment frameworks, and integration with the C-SCRM lifecycle.
Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
Defines 110 security requirements for protecting CUI when it resides in nonfederal systems. This is the cornerstone of the CMMC framework and DFARS 252.204-7012 compliance. Rev. 3 restructured controls to align with SP 800-53 Rev. 5.
Assessing Security Requirements for Controlled Unclassified Information
Defines assessment procedures for the 110 CUI security requirements in SP 800-171. Provides specific examination, interview, and testing methods for each requirement, enabling consistent evaluation of contractor compliance.
Enhanced Security Requirements for Protecting Controlled Unclassified Information
Defines enhanced security requirements beyond SP 800-171 for CUI associated with critical programs or high-value assets. Addresses advanced persistent threats (APTs) with requirements for penetration-resistant architecture, damage-limiting operations, and cyber resiliency.
Guideline for Using Cryptographic Standards in the Federal Government
Provides guidance on selecting and implementing NIST-approved cryptographic algorithms and protocols. Covers symmetric encryption (AES), hashing (SHA), digital signatures (RSA, ECDSA), key establishment, and random number generation.
Workforce Framework for Cybersecurity (NICE Framework)
Establishes a common lexicon for describing cybersecurity work through Tasks, Knowledge, and Skills (TKS). Defines work roles, competency areas, and capability indicators. Used for workforce development, training, recruitment, and retention across the cybersecurity field.
Networks of Things
Provides a conceptual framework for understanding IoT composed of five building blocks: sensor, aggregator, communication channel, external utility, and decision trigger. Analyzes trust, security, privacy, safety, and reliability considerations for IoT deployments.
De-Identifying Government Datasets
Provides guidance on de-identifying government datasets to enable open data sharing while protecting individual privacy. Covers statistical disclosure limitation, data masking, synthetic data generation, and risk assessment for re-identification.
Zero Trust Architecture
Defines zero trust architecture (ZTA) principles and deployment models. Zero trust assumes no implicit trust based on network location and requires continuous verification of every user, device, and transaction. Describes logical components and deployment approaches.
General Access Control Guidance for Cloud Systems
Provides access control guidance specific to cloud service models (IaaS, PaaS, SaaS). Covers identity federation, role-based access, attribute-based access, and shared responsibility considerations for access control in multi-tenant environments.
IoT Device Cybersecurity Guidance for the Federal Government
Establishes security requirements for IoT devices used by federal agencies. Defines device cybersecurity capabilities (identification, configuration, data protection, logical access, software update, event logging) and non-technical supporting capabilities.
Secure Software Development Framework (SSDF)
Defines practices for secure software development throughout the SDLC. Organized into four groups: Prepare the Organization, Protect the Software, Produce Well-Secured Software, and Respond to Vulnerabilities. EO 14028 mandates SSDF attestation for software sold to the government.
FIPS — Federal Information Processing Standards
Mandatory standards for federal information systems covering cryptographic modules, security categorization, encryption algorithms, and digital identity.
Security Requirements for Cryptographic Modules
Defines four levels of security requirements for cryptographic modules used by federal agencies. Covers module specification, module interfaces, roles/services, physical security, software/firmware security, operating environment, key management, EMI/EMC, self-tests, and design assurance.
Security Requirements for Cryptographic Modules (Current)
The successor to FIPS 140-2, aligning with ISO/IEC 19790:2012 and ISO/IEC 24759:2017. Maintains four security levels but modernizes requirements for contemporary cryptographic implementations. All new validations after April 2022 must use FIPS 140-3.
Standards for Security Categorization of Federal Information and Information Systems
Establishes security categories for federal information and information systems based on potential impact (Low, Moderate, High) across three security objectives: confidentiality, integrity, and availability. The categorization determines the security control baseline from SP 800-53B.
Minimum Security Requirements for Federal Information and Information Systems
Specifies minimum security requirements across 17 security-related areas for federal information systems based on FIPS 199 categorization. Links to SP 800-53 for the specific controls that satisfy each requirement area.
Personal Identity Verification (PIV) of Federal Employees and Contractors
Establishes requirements for a government-wide standard for secure and reliable identification and authentication of federal employees and contractors. Defines the PIV credential (smart card), biometric requirements, PKI certificates, and lifecycle management processes.
Digital Signature Standard (DSS)
Specifies algorithms for generating and verifying digital signatures: RSA, DSA, and ECDSA. Defines key pair generation, signature generation, and signature verification processes. FIPS 186-5 updated to remove DSA for signature generation and added EdDSA.
Advanced Encryption Standard (AES)
Specifies the Advanced Encryption Standard (AES) algorithm, a symmetric block cipher for encrypting and decrypting data. Supports key lengths of 128, 192, and 256 bits. AES is the most widely used encryption algorithm in federal systems.
SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions
Specifies the SHA-3 family of hash functions based on the Keccak algorithm. Provides four hash functions (SHA3-224, SHA3-256, SHA3-384, SHA3-512) and two extendable-output functions (SHAKE128, SHAKE256) as alternatives to SHA-2.
Cybersecurity Framework
The NIST Cybersecurity Framework provides a common language and structured approach for managing cybersecurity risk across all sectors.
AI Series — Artificial Intelligence
Frameworks and profiles for managing risks associated with artificial intelligence systems in federal procurement and operations.
Artificial Intelligence Risk Management Framework
Provides a voluntary framework for managing risks associated with AI systems. Organized around four functions: Govern, Map, Measure, and Manage. Addresses trustworthiness characteristics including safety, fairness, explainability, privacy, and security.
Artificial Intelligence Risk Management Framework: Generative AI Profile
Companion to AI RMF addressing unique risks of generative AI systems including hallucination, bias amplification, intellectual property concerns, and information security risks. Provides specific actions for managing generative AI risks across the govern-map-measure-manage functions.
About NIST and Government Contracting
The National Institute of Standards and Technology (NIST) develops cybersecurity standards, guidelines, and frameworks that are mandatory or strongly recommended for federal information systems. For government contractors, NIST publications define the technical security requirements that must be met to win contracts, maintain compliance, and avoid penalties.
The most impactful publications for contractors include SP 800-171 (CUI protection, required for CMMC compliance), SP 800-53 (comprehensive security controls for federal systems), FIPS 140-2/3 (cryptographic module validation), and the Cybersecurity Framework (risk management across all sectors). Understanding which NIST publications apply to a given contract is essential for accurate proposal pricing, technical approach development, and ongoing compliance.