The NIST Cybersecurity and Privacy Program develops and maintains an extensive collection of standards, guidelines, recommendations, and research on the security and privacy of information and information systems. This catalog includes the following NIST technical publication series:
FIPS | Federal Information Processing Standards Security standards. Learn more |
|
SP | NIST Special Publications Guidelines, technical specifications, recommendations and reference materials, comprising multiple sub-series: SP 800 Computer security Learn more
SP 1800 Cybersecurity practice guides Learn more SP 500 Information technology (only pubs on cybersecurity and privacy) |
|
IR | NIST Interagency or Internal Reports (NIST IR) Reports of research findings, including background information for FIPS and SPs. The subset IRs listed here are related to the NIST Cybersecurity and Privacy Program. |
|
CSWP | NIST Cybersecurity White Papers General white papers, thought pieces, and official cybersecurity- and privacy-related papers not published as a FIPS, SP, or IR. |
|
Project Descriptions | Project Descriptions from the National Cybersecurity Center of Excellence (NCCoE). | |
ITL Bulletin | NIST Information Technology Laboratory (ITL) Bulletins (1990-2020) Monthly overviews of NIST's security and privacy publications, programs and projects. |
|
Some publications in this catalog are from other NIST technical series: |
||
AI | Artificial Intelligence: NIST AI series reports focused on cybersecurity and privacy. See the NIST Trustworty & Responsible AI Resource Center for all NIST AI series publications. |
|
GCR | Grant/Contract Reports: Work perfromed solely by an external person/organization under a grant or contract with NIST. | |
TN | Technical Notes: Studies or reports that are very restrictive in their treatment of a subject. | |
VTS | NIST Voting Technology Series: Reports related to the design, operations and use of voting technology. |
Find more of our research in: Journal Articles, Conference Papers, Books, and Other miscellaneous papers. More of these publications from before 2008 will be added to this database.
See NIST Publications for additional Cybersecurity Publications.
Inclusive language. We recognize that some NIST publications contain potentially biased terminology. As we revise publications, we are reviewing and editing that language based on NIST’s inclusive language guidance. New publications in development will also follow that guidance.
* "Relevance" merely indicates the search engine's score for a document. It is based on the search parameters and information in the document's detailed record.