Skip to main content

Government Contracting by — NIST Publication

NIST standards and guidelines define the cybersecurity, cryptographic, and risk management requirements that shape federal IT procurement. From SP 800-171 (CMMC) to FIPS 140 (cryptographic validation), these publications determine what contractors must implement to win and maintain government contracts.

150M+ government records · 160+ gov/news sources · Updated daily

57 key publicationsRefreshed hourly

Market Summary

Check back soon — new records are indexed daily from federal procurement databases. As data accumulates, this section will show market trends, competitive landscape, and opportunity signals for Government Contracting by.

Get alerts for Government Contracting by

SP 800 Series — Computer Security

The cornerstone of federal cybersecurity guidance. SP 800 publications cover security controls, risk management, incident response, cloud security, identity management, and more.

SP 800-12

An Introduction to Information Security

Provides a broad overview of information security for federal information systems. Introduces fundamental concepts, the NIST security framework, security governance, and the relationship between NIST publications. Serves as an entry point for understanding federal cybersecurity requirements.

FISMASP 800-53FIPS 199FIPS 200
SP 800-30

Guide for Conducting Risk Assessments

Provides guidance on conducting risk assessments as part of the Risk Management Framework. Covers threat identification, vulnerability analysis, likelihood determination, impact analysis, and risk determination. Defines a risk model with threat sources, events, vulnerabilities, and predisposing conditions.

SP 800-37SP 800-39SP 800-53FISMA
SP 800-37

Risk Management Framework for Information Systems and Organizations

Defines the seven-step Risk Management Framework (RMF): Prepare, Categorize, Select, Implement, Assess, Authorize, and Monitor. Rev. 2 aligned RMF with the NIST Cybersecurity Framework and privacy risk management, and added the Prepare step for organization-wide readiness.

SP 800-53SP 800-30FIPS 199FIPS 200
SP 800-39

Managing Information Security Risk

Establishes a three-tier risk management approach: organizational, mission/business process, and information system levels. Provides the strategic framework within which SP 800-37 (RMF) and SP 800-30 (risk assessment) operate.

SP 800-37SP 800-30SP 800-53CSF
SP 800-40

Guide to Enterprise Patch Management Planning

Provides guidance on creating and maintaining an enterprise patch management program. Rev. 4 shifted focus from individual system patching to enterprise-level risk-based strategies, addressing the reality that organizations cannot patch everything immediately.

SP 800-53SP 800-137FedRAMPCMMC
SP 800-41

Guidelines on Firewalls and Firewall Policy

Provides recommendations for configuring and managing firewalls, including packet filtering, stateful inspection, application proxy, and dedicated proxy servers. Covers firewall planning, policy creation, and management best practices.

SP 800-53SP 800-123FISMA
SP 800-46

Guide to Enterprise Telework, Remote Access, and BYOD Security

Provides guidance on securing remote access technologies including VPN, remote desktop, and direct application access. Covers BYOD security policies, mobile device management, and telework security planning for enterprise environments.

SP 800-53SP 800-124SP 800-63B
SP 800-47

Managing the Security of Information Exchanges

Provides guidance on managing security when connecting IT systems between different organizations. Covers Interconnection Security Agreements (ISAs), Memoranda of Understanding (MOUs), and risk management for system interconnections.

SP 800-53SP 800-37FedRAMP
SP 800-50

Building an Information Technology Security Awareness and Training Program

Provides guidance for building and maintaining an IT security awareness and training program. Covers needs assessment, program development, training material creation, and program evaluation. Emphasizes role-based training tailored to different user populations.

SP 800-53SP 800-181FISMACMMC
SP 800-53

Security and Privacy Controls for Information Systems and Organizations

The comprehensive catalog of security and privacy controls for federal information systems. Contains over 1,000 controls across 20 families. Rev. 5 integrated privacy controls alongside security controls for the first time and made the catalog outcome-based rather than system-specific.

SP 800-53ASP 800-53BFIPS 199FIPS 200
SP 800-53A

Assessing Security and Privacy Controls in Information Systems and Organizations

Provides assessment procedures for the controls in SP 800-53. Defines methods (examine, interview, test) and objects for each control, enabling consistent and repeatable assessments. Used by auditors, assessors, and organizations to evaluate control effectiveness.

SP 800-53SP 800-53BFedRAMPFISMA
SP 800-53B

Control Baselines for Information Systems and Organizations

Establishes three security control baselines (Low, Moderate, High) and one privacy baseline for federal information systems. Defines which SP 800-53 controls apply at each impact level per FIPS 199 categorization.

SP 800-53SP 800-53AFIPS 199FIPS 200
SP 800-57

Recommendation for Key Management

Provides comprehensive guidance on cryptographic key management including key generation, distribution, storage, use, revocation, and destruction. Defines key types, key states, and recommended key lifetimes for various cryptographic algorithms.

FIPS 140-2SP 800-175BSP 800-131A
SP 800-60

Guide for Mapping Types of Information and Information Systems to Security Categories

Provides guidance for mapping information types to security categories (confidentiality, integrity, availability) per FIPS 199. Appendices catalog hundreds of information types with recommended impact levels, enabling consistent system categorization across the federal government.

FIPS 199SP 800-53BSP 800-37
SP 800-61

Computer Security Incident Handling Guide

Provides guidance on establishing and operating an incident response capability. Rev. 3 emphasizes coordination, information sharing, and updated guidance for modern threats. Covers preparation, detection, analysis, containment, eradication, recovery, and post-incident activity.

SP 800-53DFARS 252.204-7012CSFCMMC
SP 800-63

Digital Identity Guidelines

Comprehensive guidelines for digital identity services. Defines three assurance levels for identity proofing (IAL), authentication (AAL), and federation (FAL). Rev. 4 introduced risk-based approaches and expanded phishing-resistant authenticator requirements.

SP 800-63ASP 800-63BSP 800-157FIPS 201
SP 800-63A

Digital Identity Guidelines: Enrollment and Identity Proofing

Defines requirements for identity proofing at three assurance levels (IAL1-3). Covers evidence collection, validation, verification, and address confirmation. Rev. 4 added equity considerations and expanded remote proofing options.

SP 800-63SP 800-63BFIPS 201
SP 800-63B

Digital Identity Guidelines: Authentication and Lifecycle Management

Defines authentication requirements at three assurance levels (AAL1-3). Covers authenticator types (passwords, OTP, FIDO2, PKI), session management, and lifecycle events. Rev. 4 deprecated SMS-only authentication and emphasized phishing-resistant methods.

SP 800-63SP 800-63AFIPS 201M-22-09
SP 800-82

Guide to Operational Technology (OT) Security

Provides guidance on securing industrial control systems (ICS), SCADA systems, and other operational technology. Rev. 3 broadened scope to all OT and updated guidance for converged IT/OT environments, including threat landscape, risk management, and security architecture.

SP 800-53CSFIEC 62443
SP 800-88

Guidelines for Media Sanitization

Provides guidance on sanitizing media (clearing, purging, destroying) before disposal or reuse. Defines sanitization methods for different media types including magnetic, flash, optical, and paper. Includes decision flow charts for selecting appropriate sanitization methods.

SP 800-53SP 800-171CMMC
SP 800-100

Information Security Handbook: A Guide for Managers

Provides guidance for information security program managers on establishing and managing an information security program. Covers governance, planning, budgeting, risk management, certification and accreditation, and performance measurement.

SP 800-53SP 800-37FISMA
SP 800-115

Technical Guide to Information Security Testing and Assessment

Provides guidance on planning and conducting technical security testing, including vulnerability scanning, penetration testing, and security assessment. Covers testing techniques, target identification, analysis methods, and reporting of findings.

SP 800-53SP 800-53ASP 800-137FISMA
SP 800-122

Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)

Provides guidance on protecting PII held by federal agencies. Defines PII, establishes confidentiality impact levels, and recommends safeguards for PII in storage, transit, and disposal. Covers operational and privacy-specific safeguards.

SP 800-53SP 800-188OMB A-130
SP 800-123

Guide to General Server Security

Provides guidance on securing server operating systems and server software. Covers OS hardening, patch management, access control, logging, and backup. Addresses both initial deployment security and ongoing server maintenance.

SP 800-53SP 800-40SP 800-128
SP 800-124

Guidelines for Managing the Security of Mobile Devices in the Enterprise

Provides recommendations for securing mobile devices used in enterprise environments. Rev. 2 covers modern mobile threats, mobile device management (MDM), mobile threat defense, and zero-trust approaches to mobile security.

SP 800-53SP 800-46SP 800-157
SP 800-125

Guide to Security for Full Virtualization Technologies

Provides guidance on securing virtualization technologies including hypervisors, virtual machines, and virtual networks. Covers guest OS hardening, hypervisor security, virtual network configuration, and image management.

SP 800-53SP 800-145FedRAMP
SP 800-128

Guide for Security-Focused Configuration Management of Information Systems

Provides guidance on establishing and maintaining secure configurations for federal information systems. Covers configuration management planning, baseline configuration, change control, monitoring, and security impact analysis of configuration changes.

SP 800-53SP 800-137CMMCFedRAMP
SP 800-131A

Transitioning the Use of Cryptographic Algorithms and Key Lengths

Provides transition guidance for moving from legacy to stronger cryptographic algorithms. Specifies minimum key lengths, deprecated algorithms, and timelines for transitioning. Addresses the sunset of SHA-1, 1024-bit RSA, and other weakening algorithms.

FIPS 140-2SP 800-57SP 800-175B
SP 800-137

Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations

Defines the ISCM process for maintaining ongoing awareness of information security, vulnerabilities, and threats. Establishes the monitoring strategy, metrics, frequencies, and reporting requirements to support risk-based security decisions.

SP 800-53SP 800-37SP 800-115FedRAMP
SP 800-144

Guidelines on Security and Privacy in Public Cloud Computing

Provides guidance on the security and privacy challenges of public cloud computing. Covers governance, compliance, trust, identity management, data protection, and incident response considerations specific to cloud environments.

SP 800-145SP 800-210FedRAMP
SP 800-145

The NIST Definition of Cloud Computing

Establishes the canonical definition of cloud computing used across the federal government. Defines five essential characteristics, three service models (IaaS, PaaS, SaaS), and four deployment models (public, private, hybrid, community).

SP 800-144SP 800-210FedRAMP
SP 800-150

Guide to Cyber Threat Information Sharing

Provides guidance on establishing and participating in cyber threat information sharing relationships. Covers threat indicators, defensive measures, sharing architectures (STIX/TAXII), and trust models for sharing sensitive threat intelligence.

SP 800-53CSFSP 800-61
SP 800-157

Guidelines for Derived Personal Identity Verification (PIV) Credentials

Provides guidelines for issuing derived PIV credentials on mobile devices and other platforms where traditional PIV cards cannot be used. Enables strong authentication for mobile users while maintaining PIV assurance levels.

FIPS 201SP 800-63SP 800-63BSP 800-124
SP 800-160

Systems Security Engineering

Addresses security from a systems engineering perspective, integrating security into every phase of the system development life cycle. Provides engineering-driven solutions for building trustworthy, resilient systems rather than bolt-on security.

SP 800-53SP 800-37SP 800-218ISO 15288
SP 800-161

Cybersecurity Supply Chain Risk Management Practices

Provides guidance on identifying, assessing, and mitigating cybersecurity risks throughout the supply chain. Rev. 1 expanded coverage to include software supply chain security, supplier assessment frameworks, and integration with the C-SCRM lifecycle.

SP 800-53SP 800-218CSFEO 14028
SP 800-171

Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations

Defines 110 security requirements for protecting CUI when it resides in nonfederal systems. This is the cornerstone of the CMMC framework and DFARS 252.204-7012 compliance. Rev. 3 restructured controls to align with SP 800-53 Rev. 5.

CMMCDFARS 252.204-7012SP 800-53SP 800-172
SP 800-171A

Assessing Security Requirements for Controlled Unclassified Information

Defines assessment procedures for the 110 CUI security requirements in SP 800-171. Provides specific examination, interview, and testing methods for each requirement, enabling consistent evaluation of contractor compliance.

SP 800-171CMMCDFARS 252.204-7012
SP 800-172

Enhanced Security Requirements for Protecting Controlled Unclassified Information

Defines enhanced security requirements beyond SP 800-171 for CUI associated with critical programs or high-value assets. Addresses advanced persistent threats (APTs) with requirements for penetration-resistant architecture, damage-limiting operations, and cyber resiliency.

SP 800-171CMMCSP 800-53
SP 800-175B

Guideline for Using Cryptographic Standards in the Federal Government

Provides guidance on selecting and implementing NIST-approved cryptographic algorithms and protocols. Covers symmetric encryption (AES), hashing (SHA), digital signatures (RSA, ECDSA), key establishment, and random number generation.

FIPS 140-2SP 800-57SP 800-131A
SP 800-181

Workforce Framework for Cybersecurity (NICE Framework)

Establishes a common lexicon for describing cybersecurity work through Tasks, Knowledge, and Skills (TKS). Defines work roles, competency areas, and capability indicators. Used for workforce development, training, recruitment, and retention across the cybersecurity field.

SP 800-50CSFFISMA
SP 800-183

Networks of Things

Provides a conceptual framework for understanding IoT composed of five building blocks: sensor, aggregator, communication channel, external utility, and decision trigger. Analyzes trust, security, privacy, safety, and reliability considerations for IoT deployments.

SP 800-213SP 800-53CSF
SP 800-188

De-Identifying Government Datasets

Provides guidance on de-identifying government datasets to enable open data sharing while protecting individual privacy. Covers statistical disclosure limitation, data masking, synthetic data generation, and risk assessment for re-identification.

SP 800-122SP 800-53OMB A-130
SP 800-207

Zero Trust Architecture

Defines zero trust architecture (ZTA) principles and deployment models. Zero trust assumes no implicit trust based on network location and requires continuous verification of every user, device, and transaction. Describes logical components and deployment approaches.

CSFSP 800-63M-22-09SP 800-53
SP 800-210

General Access Control Guidance for Cloud Systems

Provides access control guidance specific to cloud service models (IaaS, PaaS, SaaS). Covers identity federation, role-based access, attribute-based access, and shared responsibility considerations for access control in multi-tenant environments.

SP 800-53SP 800-145FedRAMP
SP 800-213

IoT Device Cybersecurity Guidance for the Federal Government

Establishes security requirements for IoT devices used by federal agencies. Defines device cybersecurity capabilities (identification, configuration, data protection, logical access, software update, event logging) and non-technical supporting capabilities.

SP 800-183SP 800-53IoT Cybersecurity Improvement Act
SP 800-218

Secure Software Development Framework (SSDF)

Defines practices for secure software development throughout the SDLC. Organized into four groups: Prepare the Organization, Protect the Software, Produce Well-Secured Software, and Respond to Vulnerabilities. EO 14028 mandates SSDF attestation for software sold to the government.

EO 14028SP 800-161SP 800-53M-22-18

FIPS — Federal Information Processing Standards

Mandatory standards for federal information systems covering cryptographic modules, security categorization, encryption algorithms, and digital identity.

FIPS 140-2

Security Requirements for Cryptographic Modules

Defines four levels of security requirements for cryptographic modules used by federal agencies. Covers module specification, module interfaces, roles/services, physical security, software/firmware security, operating environment, key management, EMI/EMC, self-tests, and design assurance.

SP 800-175BSP 800-57SP 800-131AFedRAMP
FIPS 140-3

Security Requirements for Cryptographic Modules (Current)

The successor to FIPS 140-2, aligning with ISO/IEC 19790:2012 and ISO/IEC 24759:2017. Maintains four security levels but modernizes requirements for contemporary cryptographic implementations. All new validations after April 2022 must use FIPS 140-3.

FIPS 140-2SP 800-175BSP 800-57
FIPS 199

Standards for Security Categorization of Federal Information and Information Systems

Establishes security categories for federal information and information systems based on potential impact (Low, Moderate, High) across three security objectives: confidentiality, integrity, and availability. The categorization determines the security control baseline from SP 800-53B.

SP 800-60SP 800-53BSP 800-37FIPS 200
FIPS 200

Minimum Security Requirements for Federal Information and Information Systems

Specifies minimum security requirements across 17 security-related areas for federal information systems based on FIPS 199 categorization. Links to SP 800-53 for the specific controls that satisfy each requirement area.

FIPS 199SP 800-53SP 800-53BSP 800-37
FIPS 201

Personal Identity Verification (PIV) of Federal Employees and Contractors

Establishes requirements for a government-wide standard for secure and reliable identification and authentication of federal employees and contractors. Defines the PIV credential (smart card), biometric requirements, PKI certificates, and lifecycle management processes.

SP 800-63SP 800-157SP 800-73SP 800-76
FIPS 186

Digital Signature Standard (DSS)

Specifies algorithms for generating and verifying digital signatures: RSA, DSA, and ECDSA. Defines key pair generation, signature generation, and signature verification processes. FIPS 186-5 updated to remove DSA for signature generation and added EdDSA.

FIPS 140-2SP 800-57SP 800-175B
FIPS 197

Advanced Encryption Standard (AES)

Specifies the Advanced Encryption Standard (AES) algorithm, a symmetric block cipher for encrypting and decrypting data. Supports key lengths of 128, 192, and 256 bits. AES is the most widely used encryption algorithm in federal systems.

FIPS 140-2SP 800-175BSP 800-171
FIPS 202

SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

Specifies the SHA-3 family of hash functions based on the Keccak algorithm. Provides four hash functions (SHA3-224, SHA3-256, SHA3-384, SHA3-512) and two extendable-output functions (SHAKE128, SHAKE256) as alternatives to SHA-2.

FIPS 180-4SP 800-175BFIPS 140-2

Cybersecurity Framework

The NIST Cybersecurity Framework provides a common language and structured approach for managing cybersecurity risk across all sectors.

AI Series — Artificial Intelligence

Frameworks and profiles for managing risks associated with artificial intelligence systems in federal procurement and operations.

About NIST and Government Contracting

The National Institute of Standards and Technology (NIST) develops cybersecurity standards, guidelines, and frameworks that are mandatory or strongly recommended for federal information systems. For government contractors, NIST publications define the technical security requirements that must be met to win contracts, maintain compliance, and avoid penalties.

The most impactful publications for contractors include SP 800-171 (CUI protection, required for CMMC compliance), SP 800-53 (comprehensive security controls for federal systems), FIPS 140-2/3 (cryptographic module validation), and the Cybersecurity Framework (risk management across all sectors). Understanding which NIST publications apply to a given contract is essential for accurate proposal pricing, technical approach development, and ongoing compliance.