Guide: Risk Assessment Family
Risk Assessment
NIST FIPS 200 | Security Controls for Federal Information Systems |
---|---|
NIST FIPS 199 | Standards for Security Categorization of Federal Information and Information Systems |
NIST SP 800-100 | Information Security Handbook for Managers |
NIST SP 800-83 | Guide to Malware Incident Prevention and Handling |
NIST SP 800-66 | An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule |
NIST SP 800-65 | Integrating Security into the Capital Planning and Investment Control Process |
NIST SP 800-63 | Recommendation for Electronic Authentication |
NIST SP 800-60 | Guide for Mapping Types of Information and Information Systems to Security Categories |
NIST SP 800-59 | Guideline for Identifying an Information System as a National Security System |
NIST SP 800-53A | Guide for Assessing the Security Controls in Federal Information Systems |
NIST SP 800-51 | Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme |
NIST SP 800-48 | Wireless Network Security: 802.11, Bluetooth, and Handheld Devices |
NIST SP 800-46 | Security for Telecommuting and Broadband Communications |
NIST SP 800-45 | Guidelines on Electronic Mail Security |
NIST SP 800-44 | Guidelines on Securing Public Web Servers |
NIST SP 800-42 | Guideline on Network Security Testing |
SP 800-40, Ver 2 | Creating a Patch and Vulnerability Management Program |
NIST SP 800-40 | Procedures for Handling Security Patches |
NIST SP 800-37 | Guidelines for the Security Certification and Accreditation of Federal Information Technology Systems |
NIST SP 800-36 | Guide to Selecting Information Technology Security Products |
NIST SP 800-34 | Contingency Planning Guide for Information Technology Systems |
NIST SP 800-32 | Introduction to Public Key Technology and the Federal PKI Infrastructure |
NIST SP 800-31 | Intrusion Detection Systems (IDSs) |
NIST SP 800-30 | Risk Management Guide for Information Technology Systems |
NIST SP 800-28 | Guidelines on Active Content and Mobile Code |
NIST SP 800-26 | Security Self-Assessment Guide for Information Technology Systems |
NIST SP 800-25 | Federal Agency Use of Public Key Technology for Digital Signatures and Authentication |
NIST SP 800-24 | PBX Vulnerability Analysis: Finding Holes in Your PBX Before Someone Else Does |
NIST SP 800-23 | Guideline to Federal Organizations on Security Assurance and Acquisition/Use of Tested/Evaluated Products |
NIST SP 800-19 | Mobile Agent Security |
NIST SP 800-14 | Generally Accepted Principles and Practices for Securing Information Technology Systems |
NIST SP 800-13 | Telecommunications Security Guidelines for Telecommunications Management Network |
NIST SP 800-12 | An Introduction to Computer Security: The NIST Handbook |
Original source for tables: Guide to NIST Security Documents.