| # | Number | Release Date | Status | Title |
| 1 | 800-140C Rev. 1 | 2021-08-20 | Draft | CMVP Approved Security Functions: CMVP Validation Authority Updates to ISO/IEC 24759 |
| 2 | 800-140D Rev. 1 | 2021-08-20 | Draft | CMVP Approved Sensitive Parameter Generation and Establishment Methods: CMVP Validation Authority Updates to ISO/IEC 24759 |
| 3 | 800-140F Rev. 1 | 2021-08-20 | Draft | CMVP Approved Non-Invasive Attack Mitigation Test Metrics: CMVP Validation Authority Updates to ISO/IEC 24759 |
| 4 | 800-204B | 2021-08-06 | Final | Attribute-based Access Control for Microservices-based Applications using a Service Mesh |
| 5 | 800-160 Vol. 2 Rev. 1 | 2021-08-05 | Draft | Developing Cyber-Resilient Systems: A Systems Security Engineering Approach |
| 6 | 800-53A Rev. 5 | 2021-08-03 | Draft | Assessing Security and Privacy Controls in Information Systems and Organizations |
| 7 | 800-47 Rev. 1 | 2021-07-20 | Final | Managing the Security of Information Exchanges |
| 8 | 800-216 | 2021-06-07 | Draft | Recommendations for Federal Vulnerability Disclosure Guidelines |
| 9 | 800-161 Rev. 1 | 2021-04-29 | Draft | Cyber Supply Chain Risk Management Practices for Systems and Organizations |
| 10 | 800-66 Rev. 2 | 2021-04-29 | Draft | PRE-DRAFT Call for Comments: Implementing the HIPAA Security Rule |
| 11 | 800-172A | 2021-04-27 | Draft | Assessing Enhanced Security Requirements for Controlled Unclassified Information |
| 12 | 800-82 Rev. 3 | 2021-04-23 | Draft | PRE-DRAFT Call for Comments: Guide to Industrial Control Systems (ICS) Security |
| 13 | 800-172 | 2021-02-02 | Final | Enhanced Security Requirements for Protecting Controlled Unclassified Information: A Supplement to NIST Special Publication 800-171 |
| 14 | 800-171 Rev. 2 | 2021-01-28 | Final | Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations |
| 15 | 800-213 | 2020-12-15 | Draft | IoT Device Cybersecurity Guidance for the Federal Government: Establishing IoT Device Cybersecurity Requirements |
| 16 | 800-53 Rev. 5 | 2020-12-10 | Final | Security and Privacy Controls for Information Systems and Organizations |
| 17 | 800-53B | 2020-12-10 | Final | Control Baselines for Information Systems and Organizations |
| 18 | 800-181 Rev. 1 | 2020-11-16 | Final | Workforce Framework for Cybersecurity (NICE Framework) |
| 19 | 800-208 | 2020-10-29 | Final | Recommendation for Stateful Hash-Based Signature Schemes |
| 20 | 800-209 | 2020-10-26 | Final | Security Guidelines for Storage Infrastructure |
| 21 | 800-55 Rev. 2 | 2020-09-24 | Draft | PRE-DRAFT Call for Comments: Performance Measurement Guide for Information Security |
| 22 | 800-46 Rev. 3 | 2020-09-10 | Draft | PRE-DRAFT Call for Comments: Guide to Enterprise Telework Security |
| 23 | 800-211 | 2020-08-24 | Final | 2019 NIST/ITL Cybersecurity Program Annual Report |
| 24 | 800-56C Rev. 2 | 2020-08-18 | Final | Recommendation for Key-Derivation Methods in Key-Establishment Schemes |
| 25 | 800-207 | 2020-08-11 | Final | Zero Trust Architecture |
| 26 | 800-210 | 2020-07-31 | Final | General Access Control Guidance for Cloud Systems |
| 27 | 800-77 Rev. 1 | 2020-06-30 | Final | Guide to IPsec VPNs |
| 28 | 800-63-4 | 2020-06-08 | Draft | PRE-DRAFT Call for Comments: Digital Identity Guidelines |
| 29 | 800-133 Rev. 2 | 2020-06-04 | Final | Recommendation for Cryptographic Key Generation |
| 30 | 800-204A | 2020-05-27 | Final | Building Secure Microservices-based Applications Using Service-Mesh Architecture |
| 31 | 800-137A | 2020-05-21 | Final | Assessing Information Security Continuous Monitoring (ISCM) Programs: Developing an ISCM Program Assessment |
| 32 | 800-57 Part 1 Rev. 5 | 2020-05-04 | Final | Recommendation for Key Management: Part 1 – General |
| 33 | 800-175B Rev. 1 | 2020-03-31 | Final | Guideline for Using Cryptographic Standards in the Federal Government: Cryptographic Mechanisms |
| 34 | 800-124 Rev. 2 | 2020-03-24 | Draft | Guidelines for Managing the Security of Mobile Devices in the Enterprise |
| 35 | 800-140 | 2020-03-20 | Final | FIPS 140-3 Derived Test Requirements (DTR): CMVP Validation Authority Updates to ISO/IEC 24759 |
| 36 | 800-140A | 2020-03-20 | Final | CMVP Documentation Requirements: CMVP Validation Authority Updates to ISO/IEC 24759 |
| 37 | 800-140B | 2020-03-20 | Final | CMVP Security Policy Requirements: CMVP Validation Authority Updates to ISO/IEC 24759 and ISO/IEC 19790 Annex B |
| 38 | 800-140C | 2020-03-20 | Final | CMVP Approved Security Functions: CMVP Validation Authority Updates to ISO/IEC 24759 |
| 39 | 800-140D | 2020-03-20 | Final | CMVP Approved Sensitive Parameter Generation and Establishment Methods: CMVP Validation Authority Updates to ISO/IEC 24759 |
| 40 | 800-140E | 2020-03-20 | Final | CMVP Approved Authentication Mechanisms: CMVP Validation Authority Requirements for ISO/IEC 19790 Annex E and ISO/IEC 24579 Section 6.17 |
| 41 | 800-140F | 2020-03-20 | Final | CMVP Approved Non-Invasive Attack Mitigation Test Metrics: CMVP Validation Authority Updates to ISO/IEC 24759 |
| 42 | 800-206 | 2020-03-13 | Final | Annual Report 2018: NIST/ITL Cybersecurity Program |
| 43 | 800-63-3 | 2020-03-02 | Final | Digital Identity Guidelines |
| 44 | 800-63A | 2020-03-02 | Final | Digital Identity Guidelines: Enrollment and Identity Proofing |
| 45 | 800-63B | 2020-03-02 | Final | Digital Identity Guidelines: Authentication and Lifecycle Management |
| 46 | 800-63C | 2020-03-02 | Final | Digital Identity Guidelines: Federation and Assertions |
| 47 | 800-189 | 2019-12-17 | Final | Resilient Interdomain Traffic Exchange: BGP Security and DDoS Mitigation |
| 48 | 800-160 Vol. 2 | 2019-11-27 | Final | Developing Cyber Resilient Systems: A Systems Security Engineering Approach |
| 49 | 800-186 | 2019-10-31 | Draft | Recommendations for Discrete Logarithm-Based Cryptography: Elliptic Curve Domain Parameters |
| 50 | 800-128 | 2019-10-10 | Final | Guide for Security-Focused Configuration Management of Information Systems |
| 51 | 800-52 Rev. 2 | 2019-08-29 | Final | Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations |
| 52 | 800-204 | 2019-08-07 | Final | Security Strategies for Microservices-based Application Systems |
| 53 | 800-162 | 2019-08-02 | Final | Guide to Attribute Based Access Control (ABAC) Definition and Considerations |
| 54 | 800-205 | 2019-06-18 | Final | Attribute Considerations for Access Control Systems |
| 55 | 800-57 Part 2 Rev. 1 | 2019-05-23 | Final | Recommendation for Key Management: Part 2 – Best Practices for Key Management Organizations |
| 56 | 800-163 Rev. 1 | 2019-04-19 | Final | Vetting the Security of Mobile Applications |
| 57 | 800-131A Rev. 2 | 2019-03-21 | Final | Transitioning the Use of Cryptographic Algorithms and Key Lengths |
| 58 | 800-56B Rev. 2 | 2019-03-21 | Final | Recommendation for Pair-Wise Key-Establishment Using Integer Factorization Cryptography |
| 59 | 800-38G Rev. 1 | 2019-02-28 | Draft | Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption |
| 60 | 800-177 Rev. 1 | 2019-02-26 | Final | Trustworthy Email |
| 61 | 800-37 Rev. 2 | 2018-12-20 | Final | Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy |
| 62 | 800-179 Rev. 1 | 2018-10-19 | Draft | Guide to Securing Apple macOS 10.12 Systems for IT Professionals: A NIST Security Configuration Checklist |
| 63 | 800-71 | 2018-07-02 | Draft | Recommendation for Key Establishment Using Symmetric Block Ciphers |
| 64 | 800-203 | 2018-07-02 | Final | 2017 NIST/ITL Cybersecurity Program Annual Report |
| 65 | 800-116 Rev. 1 | 2018-06-29 | Final | Guidelines for the Use of PIV Credentials in Facility Access |
| 66 | 800-171A | 2018-06-13 | Final | Assessing Security Requirements for Controlled Unclassified Information |
| 67 | 800-125A Rev. 1 | 2018-06-07 | Final | Security Recommendations for Server-based Hypervisor Platforms |
| 68 | 800-202 | 2018-05-10 | Final | Quick Start Guide for Populating Mobile Test Devices |
| 69 | 800-193 | 2018-05-04 | Final | Platform Firmware Resiliency Guidelines |
| 70 | 800-87 Rev. 2 | 2018-04-19 | Final | Codes for Identification of Federal and Federally-Assisted Organizations |
| 71 | 800-56A Rev. 3 | 2018-04-16 | Final | Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography |
| 72 | 800-160 Vol. 1 | 2018-03-21 | Final | Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems |
| 73 | 800-70 Rev. 4 | 2018-02-15 | Final | National Checklist Program for IT Products: Guidelines for Checklist Users and Developers |
| 74 | 800-126 Rev. 3 | 2018-02-14 | Final | The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3 |
| 75 | 800-126A | 2018-02-14 | Final | SCAP 1.3 Component Specification Version Updates: An Annex to NIST Special Publication 800-126 Revision 3 |
| 76 | 800-90B | 2018-01-10 | Final | Recommendation for the Entropy Sources Used for Random Bit Generation |
| 77 | 800-187 | 2017-12-21 | Final | Guide to LTE Security |
| 78 | 800-67 Rev. 2 | 2017-11-17 | Final | Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher |
| 79 | 800-195 | 2017-09-28 | Final | 2016 NIST/ITL Cybersecurity Program Annual Report |
| 80 | 800-190 | 2017-09-25 | Final | Application Container Security Guide |
| 81 | 800-192 | 2017-06-27 | Final | Verification and Test Methods for Access Control Policies/Models |
| 82 | 800-12 Rev. 1 | 2017-06-22 | Final | An Introduction to Information Security |
| 83 | 800-121 Rev. 2 | 2017-05-08 | Final | Guide to Bluetooth Security |
| 84 | 800-184 | 2016-12-22 | Final | Guide for Cybersecurity Event Recovery |
| 85 | 800-185 | 2016-12-22 | Final | SHA-3 Derived Functions: cSHAKE, KMAC, TupleHash, and ParallelHash |
| 86 | 800-188 | 2016-12-15 | Draft | De-Identifying Government Datasets (2nd Draft) |
| 87 | 800-179 | 2016-12-05 | Final | Guide to Securing Apple OS X 10.10 Systems for IT Professionals: A NIST Security Configuration Checklist |
| 88 | 800-38B | 2016-10-06 | Final | Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication |
| 89 | 800-150 | 2016-10-04 | Final | Guide to Cyber Threat Information Sharing |
| 90 | 800-178 | 2016-10-03 | Final | A Comparison of Attribute Based Access Control (ABAC) Standards for Data Service Applications: Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC) |
| 91 | 800-175A | 2016-08-22 | Final | Guideline for Using Cryptographic Standards in the Federal Government: Directives, Mandates and Policies |
| 92 | 800-182 | 2016-08-10 | Final | Computer Security Division 2015 Annual Report |
| 93 | 800-114 Rev. 1 | 2016-07-29 | Final | User’s Guide to Telework and Bring Your Own Device (BYOD) Security |
| 94 | 800-46 Rev. 2 | 2016-07-29 | Final | Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security |
| 95 | 800-183 | 2016-07-28 | Final | Networks of ‘Things’ |
| 96 | 800-166 | 2016-06-06 | Final | Derived PIV Application and Data Model Test Guidelines |
| 97 | 800-156 | 2016-05-20 | Final | Representation of PIV Chain-of-Trust for Import and Export |
| 98 | 800-90C | 2016-04-13 | Draft | Recommendation for Random Bit Generator (RBG) Constructions |
| 99 | 800-85A-4 | 2016-04-13 | Final | PIV Card Application and Middleware Interface Test Guidelines (SP 800-73-4 Compliance) |
| 100 | 800-38G | 2016-03-29 | Final | Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption |
| 101 | 800-154 | 2016-03-14 | Draft | Guide to Data-Centric System Threat Modeling |
| 102 | 800-125B | 2016-03-07 | Final | Secure Virtual Network Configuration for Virtual Machine (VM) Protection |
| 103 | 800-180 | 2016-02-18 | Draft | NIST Definition of Microservices, Application Containers and System Virtual Machines |
| 104 | 800-73-4 | 2016-02-12 | Final | Interfaces for Personal Identity Verification |
| 105 | 800-152 | 2015-10-28 | Final | A Profile for U.S. Federal Cryptographic Key Management Systems (CKMS) |
| 106 | 800-167 | 2015-10-28 | Final | Guide to Application Whitelisting |
| 107 | 800-176 | 2015-08-20 | Final | Computer Security Division 2014 Annual Report |
| 108 | 800-79-2 | 2015-07-30 | Final | Guidelines for the Authorization of Personal Identity Verification Card Issuers (PCI) and Derived PIV Credential Issuers (DPCI) |
| 109 | 800-90A Rev. 1 | 2015-06-24 | Final | Recommendation for Random Number Generation Using Deterministic Random Bit Generators |
| 110 | 800-82 Rev. 2 | 2015-06-03 | Final | Guide to Industrial Control Systems (ICS) Security |
| 111 | 800-78-4 | 2015-05-29 | Final | Cryptographic Algorithms and Key Sizes for Personal Identity Verification |
| 112 | 800-161 | 2015-04-08 | Final | Supply Chain Risk Management Practices for Federal Information Systems and Organizations |
| 113 | 800-53 Rev. 4 | 2015-01-22 | Final | Security and Privacy Controls for Federal Information Systems and Organizations |
| 114 | 800-57 Part 3 Rev. 1 | 2015-01-22 | Final | Recommendation for Key Management, Part 3: Application-Specific Key Management Guidance |
| 115 | 800-157 | 2014-12-19 | Final | Guidelines for Derived Personal Identity Verification (PIV) Credentials |
| 116 | 800-53A Rev. 4 | 2014-12-18 | Final | Assessing Security and Privacy Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans |
| 117 | 800-88 Rev. 1 | 2014-12-17 | Final | Guidelines for Media Sanitization |
| 118 | 800-170 | 2014-09-04 | Final | Computer Security Division 2013 Annual Report |
| 119 | 800-147B | 2014-08-28 | Final | BIOS Protection Guidelines for Servers |
| 120 | 800-85B-4 | 2014-08-06 | Draft | PIV Data Model Test Guidelines |
| 121 | 800-168 | 2014-07-02 | Final | Approximate Matching: Definition and Terminology |
| 122 | 800-101 Rev. 1 | 2014-05-15 | Final | Guidelines on Mobile Device Forensics |
| 123 | 800-16 Rev. 1 | 2014-03-14 | Draft | A Role-Based Model for Federal Information Technology/Cybersecurity Training (3rd Draft) |
| 124 | 800-81-2 | 2013-09-18 | Final | Secure Domain Name System (DNS) Deployment Guide |
| 125 | 800-130 | 2013-08-15 | Final | A Framework for Designing Cryptographic Key Management Systems |
| 126 | 800-165 | 2013-07-22 | Final | Computer Security Division 2012 Annual Report |
| 127 | 800-40 Rev. 3 | 2013-07-22 | Final | Guide to Enterprise Patch Management Technologies |
| 128 | 800-83 Rev. 1 | 2013-07-22 | Final | Guide to Malware Incident Prevention and Handling for Desktops and Laptops |
| 129 | 800-76-2 | 2013-07-11 | Final | Biometric Specifications for Personal Identity Verification |
| 130 | 800-124 Rev. 1 | 2013-06-21 | Final | Guidelines for Managing the Security of Mobile Devices in the Enterprise |
| 131 | 800-38F | 2012-12-13 | Final | Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping |
| 132 | 800-164 | 2012-10-31 | Draft | Guidelines on Hardware-Rooted Security in Mobile Devices |
| 133 | 800-30 Rev. 1 | 2012-09-17 | Final | Guide for Conducting Risk Assessments |
| 134 | 800-107 Rev. 1 | 2012-08-24 | Final | Recommendation for Applications Using Approved Hash Algorithms |
| 135 | 800-61 Rev. 2 | 2012-08-06 | Final | Computer Security Incident Handling Guide |
| 136 | 800-94 Rev. 1 | 2012-07-25 | Draft | Guide to Intrusion Detection and Prevention Systems (IDPS) |
| 137 | 800-146 | 2012-05-29 | Final | Cloud Computing Synopsis and Recommendations |
| 138 | 800-126 Rev. 2 | 2012-03-19 | Final | The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.2 |
| 139 | 800-153 | 2012-02-21 | Final | Guidelines for Securing Wireless Local Area Networks (WLANs) |
| 140 | 800-135 Rev. 1 | 2011-12-23 | Final | Recommendation for Existing Application-Specific Key Derivation Functions |
| 141 | 800-144 | 2011-12-09 | Final | Guidelines on Security and Privacy in Public Cloud Computing |
| 142 | 800-155 | 2011-12-08 | Draft | BIOS Integrity Measurement Guidelines |
| 143 | 800-137 | 2011-09-30 | Final | Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations |
| 144 | 800-145 | 2011-09-28 | Final | The NIST Definition of Cloud Computing |
| 145 | 800-147 | 2011-04-29 | Final | BIOS Protection Guidelines |
| 146 | 800-39 | 2011-03-01 | Final | Managing Information Security Risk: Organization, Mission, and Information System View |
| 147 | 800-126 Rev. 1 | 2011-02-25 | Final | The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.1 |
| 148 | 800-51 Rev. 1 | 2011-02-25 | Final | Guide to Using Vulnerability Naming Schemes |
| 149 | 800-125 | 2011-01-28 | Final | Guide to Security for Full Virtualization Technologies |
| 150 | 800-119 | 2010-12-29 | Final | Guidelines for the Secure Deployment of IPv6 |
| 151 | 800-132 | 2010-12-22 | Final | Recommendation for Password-Based Key Derivation: Part 1: Storage Applications |
| 152 | 800-34 Rev. 1 | 2010-11-11 | Final | Contingency Planning Guide for Federal Information Systems |
| 153 | 800-38A Addendum | 2010-10-21 | Final | Recommendation for Block Cipher Modes of Operation: Three Variants of Ciphertext Stealing for CBC Mode |
| 154 | 800-142 | 2010-10-07 | Final | Practical Combinatorial Testing |
| 155 | 800-22 Rev. 1a | 2010-04-30 | Final | A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications |
| 156 | 800-122 | 2010-04-06 | Final | Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) |
| 157 | 800-38E | 2010-01-18 | Final | Recommendation for Block Cipher Modes of Operation: the XTS-AES Mode for Confidentiality on Storage Devices |
| 158 | 800-108 | 2009-10-01 | Final | Recommendation for Key Derivation Using Pseudorandom Functions (Revised) |
| 159 | 800-41 Rev. 1 | 2009-09-28 | Final | Guidelines on Firewalls and Firewall Policy |
| 160 | 800-102 | 2009-09-23 | Final | Recommendation for Digital Signature Timeliness |
| 161 | 800-106 | 2009-02-25 | Final | Randomized Hashing for Digital Signatures |
| 162 | 800-66 Rev. 1 | 2008-10-23 | Final | An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule |
| 163 | 800-115 | 2008-09-30 | Final | Technical Guide to Information Security Testing and Assessment |
| 164 | 800-60 Vol. 1 Rev. 1 | 2008-08-01 | Final | Guide for Mapping Types of Information and Information Systems to Security Categories |
| 165 | 800-60 Vol. 2 Rev. 1 | 2008-08-01 | Final | Guide for Mapping Types of Information and Information Systems to Security Categories: Appendices |
| 166 | 800-123 | 2008-07-25 | Final | Guide to General Server Security |
| 167 | 800-55 Rev. 1 | 2008-07-16 | Final | Performance Measurement Guide for Information Security |
| 168 | 800-113 | 2008-07-01 | Final | Guide to SSL VPNs |
| 169 | 800-28 Version 2 | 2008-03-07 | Final | Guidelines on Active Content and Mobile Code |
| 170 | 800-38D | 2007-11-28 | Final | Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC |
| 171 | 800-111 | 2007-11-15 | Final | Guide to Storage Encryption Technologies for End User Devices |
| 172 | 800-44 Version 2 | 2007-10-09 | Final | Guidelines on Securing Public Web Servers |
| 173 | 800-95 | 2007-08-29 | Final | Guide to Secure Web Services |
| 174 | 800-38C | 2007-07-20 | Final | Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality |
| 175 | 800-98 | 2007-04-06 | Final | Guidelines for Securing Radio Frequency Identification (RFID) Systems |
| 176 | 800-100 | 2007-03-07 | Final | Information Security Handbook: A Guide for Managers |
| 177 | 800-45 Version 2 | 2007-02-20 | Final | Guidelines on Electronic Mail Security |
| 178 | 800-94 | 2007-02-20 | Final | Guide to Intrusion Detection and Prevention Systems (IDPS) |
| 179 | 800-97 | 2007-02-07 | Final | Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i |
| 180 | 800-96 | 2006-12-29 | Final | PIV Card to Reader Interoperability Guidelines |
| 181 | 800-89 | 2006-11-30 | Final | Recommendation for Obtaining Assurances for Digital Signature Applications |
| 182 | 800-84 | 2006-09-21 | Final | Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities |
| 183 | 800-92 | 2006-09-13 | Final | Guide to Computer Security Log Management |
| 184 | 800-86 | 2006-09-01 | Final | Guide to Integrating Forensic Techniques into Incident Response |
| 185 | 800-85B | 2006-07-31 | Final | PIV Data Model Test Guidelines |
| 186 | 800-18 Rev. 1 | 2006-02-24 | Final | Guide for Developing Security Plans for Federal Information Systems |
| 187 | 800-58 | 2005-01-01 | Final | Security Considerations for Voice Over IP Systems |
| 188 | 800-72 | 2004-11-01 | Final | Guidelines on PDA Forensics |
| 189 | 800-35 | 2003-10-09 | Final | Guide to Information Technology Security Services |
| 190 | 800-50 | 2003-10-01 | Final | Building an Information Technology Security Awareness and Training Program |
| 191 | 800-59 | 2003-08-20 | Final | Guideline for Identifying an Information System as a National Security System |
| 192 | 800-49 | 2002-11-05 | Final | Federal S/MIME V3 Client Profile |
| 193 | 800-38A | 2001-12-01 | Final | Recommendation for Block Cipher Modes of Operation: Methods and Techniques |
| 194 | 800-32 | 2001-02-26 | Final | Introduction to Public Key Technology and the Federal PKI Infrastructure |
| 195 | 800-25 | 2000-10-01 | Final | Federal Agency Use of Public Key Technology for Digital Signatures and Authentication |
| 196 | 800-16 | 1998-04-01 | Final | Information Technology Security Training Requirements: a Role- and Performance-Based Model |
| 197 | 800-15 | 1998-01-01 | Final | MISPC Minimum Interoperability Specification for PKI Components, Version 1 |