Nist 800 27
61 community-sourced questions and answers. Free — no login.
SP 800-14
generally Accepted Principles and Practices for Securing Information Technology Systems, provides best practices and security principles that can direct the security team in the development of a security ____.
SP 800-18,
Guide for Developing Security Plans
SP 800-18 Rev. 1
The Guide for Developing Security Plans for Federal Information Systems, must be customized to fit the particular needs of a(n) organization.
SP 800-27, rev. A
Engineering Principles for IT Security - Common Criteria
SP 800-30, rev. 1
Conducting Risk Assessments
SP 800-34
Contingency Planning Guide for Federal IT Systems
SP 800-37 Rev 1
Applying RMF
SP 800-45, rev. 2
Guidelines on email and security
SP 800-39
Managing Information Security Risk
SP 800-40, rev. 3
Patch and Vulnerability Management Program
SP 800-41, rev. 1
Firewalls and Firewall Policy
SP 800-47
Interconnecting IT systems
SP 800-50
IT Security Awareness and Training Program
SP 800-53, rev. 4
Security Controls for Federal IT Systems
SP 800-53A, rev 4
Assessing Security Controls
SP 800-55, rev 1
Performance Measurement Guide for Information Systems
SP 800-59
Guideline for identifying a system as a National Security System
SP 800-60
Mapping Information types to Security Categories
SP 800-61, rev. 2
Computer Security Incident Handling Guide
SP 800-64, rev 2
Security in SDLC
SP 800-65
Integration of IT Security and Capital Planning
SP 800-66, rev 1
HIPAA
SP 800-70, rev 2
National Checklist Program
SP-800-83
Malware Incident Prevention and Handling
SP 800-88, rev. 1
Media Sanitization
SP 800-92
Computer Security Log Management
SP 800-94
IDS/IPS (IDPS)
SP 800-100
Information Security Handbook: Managers
SP 800-115
Technical Guide to Information Security Testing and Assessment
SP 800-122
Guide to Protecting Confidentiality of PII
SP 800-128
Configuration Management
SP 800-137
Continuous Monitoring (ISCM)
SP 800-144
Security and Privacy in Public Cloud Computing
FIPS 140-2
Cryptography
FIPS 180-2
Secure hash Standard
FIPS 181
- Automated Password Generator Specifies a routine for an automated password generator. Three basic parts: • Unit Table: defines the alphabetic characters and specific rules • Diagram Table: defines the rules of all possible pairs of units and juxtaposition of units • Random Number Generator: uses a DES subroutine to produce double precision floating point values
FIPS 186-2
Digital Signature Standard
FIPS 190
Advanced Authentication (Factors)
FIPS 191
LAN Security (Confidentiality, Integrity, and Availability of the data)
FIPS 197
AES (AES is symmetric)
FIPS-198-1
HMAC (Keyed-Hash Message Authentication Code)
FIPS 199
Security Categorization based on impact levels
FIPS 200
Minimum Security Requirements for Federal Information and Information Systems (Baselines)
FIPS 201-2
Personal Identity Verification PIV (smart cards)
HSPD-1
Creates Homeland Security Council and functions
HSPD-3
HOmeland Security Advisory Team
HSPD-5
Management of Domestic Incidents
HSPD-7
Critical Infrastructure Identification, Prioritization, and Protection
HSPD-8
National Preparedness
HSPD-12
Common Identification Standard for Federal Employees
HSPD-20/NSPD-51
National Continuity Policy
HSPD-24
Biometrics for Identification for National Security
IR 7581
System and Network Security (Acronyms and Abbreviations)
IR 7564
Directions in Security Metrics Research
IR 7816-2011
Computer Security Division Annual Report
IR 7359
Information Security Guide for Gov Execs
IR 7536
NIST Computer Security Division (CSD) 2008 Annual Report
IR 7358
Program Review for Information Security Management Assistance (PRISMA)
IR 7316
Assessment of Access Control Systems
IR 7298
Glossary of Key Information Security Terms
IR 7206
Smart Cards and Mobile Device Authentication
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials