Guide: Services and Acquisitions Topic Cluster
Services and Acquisitions
A collection of documents to assist with understanding security issues concerning purchasing and obtaining items. Also covers considerations for acquiring services, including assistance with a system at any point in its life cycle, from external sources.
NIST FIPS 201-1 | Personal Identity Verification for Federal Employees and Contractors |
---|---|
NIST FIPS 140-2 | Security Requirements for Cryptographic Modules |
NIST SP 800-97 | Guide to IEEE 802.11i: Robust Security Networks |
NIST SP 800-85 | PIV Middleware and PIV Card Application Conformance Test Guidelines |
NIST SP 800-79 | Guidelines for the Certification and Accreditation of PIV Card Issuing Organizations |
NIST SP 800-78 | Cryptographic Algorithms and Key Sizes for Personal Identity Verification |
NIST SP 800-76 | Biometric Data Specification for Personal Identity Verification |
NIST SP 800-73 Rev 1 | Integrated Circuit Card for Personal Identification Verification |
NIST SP 800-70 | Security Configuration Checklists Program for IT Products |
NIST SP 800-66 | An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule |
NIST SP 800-65 | Integrating Security into the Capital Planning and Investment Control Process |
NIST SP 800-58 | Security Considerations for Voice Over IP Systems |
NIST SP 800-48 | Wireless Network Security: 802.11, Bluetooth, and Handheld Devices |
NIST SP 800-36 | Guide to Selecting Information Technology Security Products |
NIST SP 800-35 | Guide to Information Technology Security Services |
NIST SP 800-25 | Federal Agency Use of Public Key Technology for Digital Signatures and Authentication |
NIST SP 800-21 Rev 1 | Guideline for Implementing Cryptography in the Federal Government |
NIST SP 800-15 | Minimum Interoperability Specification for PKI Components (MISPC), Version 1 |
NIST IR 7284 | Personal Identity Verification Card Management Report |
NIST IR 7250 | Cell Phone Forensic Tools: An Overview and Analysis |
NIST IR 7100 | PDA Forensic Tools: An Overview and Analysis |
NIST IR 6887 | Government Smart Card Interoperability Specification (GSC-IS), v2.1 |
NIST SB 2006-01 | Testing and Validation Of Personal Identity Verification (PIV) Components and Subsystems For Conformance To Federal Information Processing Standard 201 |
NIST SB 2005-08 | Implementation Of FIPS 201, Personal Identity Verification (PIV) Of Federal Employees and Contractors |
NIST SB 2005-06 | NIST's Security Configuration Checklists Program For IT Products |
NIST SB 2005-03 | Personal Identity Verification (PIV) Of Federal Employees and Contractors: Federal Information Processing Standard (FIPS) 201 |
NIST SB 2005-01 | Integrating It Security Into The Capital Planning and Investment Control Process |
NIST SB 2004-10 | Securing Voice Over Internet Protocol (IP) Networks |
NIST SB 2004-06 | Information Technology Security Services: How To Select, Implement, and Manage |
NIST SB 2004-04 | Selecting Information Technology Security Products |
NIST SB 2002-07 | Overview: The Government Smart Card Interoperability Specification |
NIST SB 2000-02 | Guideline for Implementing Cryptography in the Federal Government |
Original source for tables: Guide to NIST Security Documents.