The National Institute of Standards and Technology(NIST) instituted the 800 Series Special Publications relating to Information Security in 1990 and has issued dozens of guidelines over that time frame in collaboration with industry, government, and academic organizations. While NIST guidance is most commonly associated with FISMA and Federal Government usage – these standards have been widely leveraged outside of the Federal Government. For example, most non-federal government entities have some form of Security Certification & Accreditation policy that is aligns with or borrows heavily from NIST 800-37.
Pivot Point Security’s ISMS practice area has worked extensively with the following NIST guidance:
NIST | Title/Link | Usage |
SP 800-37SP 800-53
SP 800-30 SP 800-37 |
Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach sp800-37-rev1-final.pdf Guide for Assessing the Security Controls in Federal Information Systems and Organizations, Building Effective Security Assessment Plans sp800-53A-rev1-final.pdf DRAFT Guide for Conducting Risk Assessments SP800-30-Rev1-ipd.pdf Guide for Developing Security Plans for Federal Information Systems sp800-18-Rev1-final.pdf Security Considerations in the System Development Life Cycle SP800-64-Revision2.pdf |
Leverage this guidance in our Security Certification & Accreditation Practice predominantly for large scale government projects |
SP 800-153SP 800-120 | DRAFT Guidelines for Securing Wireless Local Area Networks (WLANs) Draft-SP800-153.pdf Recommendation for EAP Methods Used in Wireless Network Access Authentication sp800-120.pdf |
Leverage this guidance when conducting WLAN Surveys & Configuration reviews in the government, utilities, and private sectors |
SP 800-144SP 800-145
SP 800-146 |
DRAFT Cloud Computing Synopsis and Recommendations Draft-NIST-SP800-146.pdf A NIST Definition of Cloud Computing SP800-145.pdf DRAFT Guidelines on Security and Privacy in Public Cloud Computing Draft-SP-800-144_cloud-computing.pdf |
Leverage this guidance in the assessment of a County’s Private Cloud Offering |
SP 800-137SP 800-128 | Information Security Continuous Monitoring for Federal Information Systems and Organizations SP800-137-Final.pdf Guide for Security-Focused Configuration Management of Information Systems sp800-128.pdf |
Leverage this guidance in our 27001 Practice Area to support ISMS metricizing/monitoring |
800-133+SP 800-82
SP 800-127 |
Assorted Cryptographic Key Management and Hashing SP’sGuide to Securing WiMAX Wireless Communications sp800-127.pdf Guide to Industrial Control Systems (ICS) Security SP800-82-final.pdf |
Leverage during reviews of Wireless Distribution Networks in Utilities transiting DNP3/SCADA traffic |
SP 800-125 | Guide to Security for Full Virtualization Technologies SP800-125-final.pdf |
Leverage this guidance in performing a design review of a State entity’s VM migration |
SP 800-124SP 800-121
SP 800-111 |
Guidelines on Cell Phone and PDA Security SP800-124.pdf DRAFT Guide to Bluetooth Security Draft-SP800-121_Rev1.pdf Guide to Storage Encryption Technologies for End User Devices SP800-111.pdf |
Leverage this guidance in performing mobile device security gap assessments for multiple health-care organizations |
SP 800-122 | Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) sp800-122.pdf |
Leverage this guidance in all of our PII focused Gap Assessments |
SP 800-115 | Technical Guide to Information Security Testing and Assessment SP800-115.pdf |
Leverage this guidance in multiple Third Party Attestation focused Security Assessments |
SP 800-95 | Guide to Secure Web Services SP800-95.pdf |
Leverage this guidance in multiple SOA-focused Design Reviews in the government sector |