[CISA SCRM] Cybersecurity And Infrastructure Security Agency Supply Chain Risk Management (SCRM) Example |
[CNSSI 1253] Categorization And Control Selection For National Security Systems, July 29, 2022. |
[CSF v1.1] National Institute of Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity (Cybersecurity Framework), Version 1.1, April 2018. |
[CSF v2.0] National Institute of Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity (Cybersecurity Framework), Version 2.0, February 26, 2024. |
[DAAPM v2.2] Defense Counterintelligence and Security Agency Assessment and Authorization Process Manual v2.2 August 31, 2020 |
[DCSA RAR] DCSA Risk Assessment Report (RAR) Template |
DoD Cybersecurity Chart Department of Defense Cybersecurity Policy Chart |
[FedRAMP SAR] FedRAMP Security Assessment Report (SAR) Template |
[FIPS 199] National Institute of Standards and Technology Federal Information Processing Standards Publication 199, Standards for Security Categorization of Federal Information and Information Systems, February 2004. |
[FIPS 200] National Institute of Standards and Technology Federal Information Processing Standards Publication 200, Minimum Security Requirements for Federal Information and Information Systems, March 2006. |
[IR 8011 v1] National Institute of Standards and Technology Interagency Report 8011, Volume 1, Automation Support for Security Control Assessments: Overview, June 2017. |
[IR 8062] National Institute of Standards and Technology Internal Report 8062, An Introduction to Privacy Engineering and Risk Management in Federal Systems, January 2017. |
[IR 8179] National Institute of Standards and Technology Internal Report 8179, Criticality Analysis Process Model: Prioritizing Systems and Components, April 2018. |
[JSIG Rev 4] DoD Joint Special Access Program (SAP) Implementation Guide (JSIG) Revision 4 |
[NARA CUI] National Archives and Records Administration, Controlled Unclassified Information (CUI) Registry. |
[NARA RECM] National Archives and Records Administration, NARA Records Management Guidance and Regulations. |
[NIST AI 600-1] NIST Trustworthy and Responsible AI (NIST AI 600-1) – Artificial Intelligence Risk Management Framework: Generative Artificial Intelligence Profile |
[NIST CUI POA&M Template] National Institute of Standards and Technology example CUI Plan of Actions and Milestones (POA&M) Template. |
[NIST SSP Template] National Institute of Standards and Technology example CUI System Security Plan Template. |
[OMB A-130] Office of Management and Budget Circular A-130, Managing Information as a Strategic Resource, July 2016. |
[OMB FEA] Office of Management and Budget, Federal Enterprise Architecture (FEA). |
[OMB M-13-13] Office of Management and Budget Memorandum M-13-13, Open Data Policy-Managing Information as an Asset, May 2013. |
[SP 800-18] National Institute of Standards and Technology Special Publication 800-18, Revision 1, Guide for Developing Security Plans for Federal Information Systems, February 2006. |
[SP 800-30] National Institute of Standards and Technology Special Publication 800-30, Revision 1, Guide for Conducting Risk Assessments, September 2012. |
[SP 800-37 Rev 2] National Institute of Standards and Technology Special Publication 800-37, Revision 2, Risk Management Framework for Information Systems and Organizations, December 2018. |
[SP 800-39] National Institute of Standards and Technology Special Publication 800-39, Managing Information Security Risk: Organization, Mission, and Information System View, March 2011. |
[SP 800-47] National Institute of Standards and Technology Special Publication 800-47, Security Guide for Interconnecting Information Technology Systems, August 2002. |
[SP 800-53 Rev 5] National Institute of Standards and Technology Special Publication 800-53, Revision 5, Security and Privacy Controls for Information Systems and Organizations, September 2020. |
[SP 800-53A Rev 5] National Institute of Standards and Technology Special Publication 800-53A, Revision 5, Assessing Security and Privacy Controls in Information Systems and Organizations, January 2022. |
[SP 800-53B] “National Institute of Standards and Technology Special Publication 800-53B, Control Baselines for Information
Systems and Organizations, October 2020.” |
[SP 800-55] National Institute of Standards and Technology Special Publication 800-55, Revision 1, Performance Measurement Guide for Information Security, December 2014. |
[SP 800-59] National Institute of Standards and Technology Special Publication 800-59, Guideline for Identifying an Information System as a National Security System, August 2003. |
[SP 800-60 v1] National Institute of Standards and Technology Special Publication 800-60, Volume 1, Revision 1, Guide for Mapping Types of Information and Information Systems to Security Categories, August 2008. |
[SP 800-60 v2] National Institute of Standards and Technology Special Publication 800-60, Volume 2, Revision 1, Guide for Mapping Types of Information and Information Systems to Security Categories: Appendices, August 2008. |
[SP 800-61] National Institute of Standards and Technology Special Publication 800-61, Revision 2, Computer Security Incident Handling Guide, August 2012. |
[SP 800-64] National Institute of Standards and Technology Special Publication 800-64, Revision 2, Security Considerations in the System Development Life Cycle, October 2008. |
[SP 800-82] National Institute of Standards and Technology Special Publication 800-82, Revision 2, Guide to Industrial Control Systems (ICS) Security, May 2015. |
[SP 800-88] National Institute of Standards and Technology Special Publication 800-88, Guidelines for Media Sanitization, December 2014. |
[SP 800-128] National Institute of Standards and Technology Special Publication 800-128, Guide for Security-Focused Configuration Management of Information Systems, August 2011. |
[SP 800-137] National Institute of Standards and Technology Special Publication 800-137, Revision 2, Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy, December 2018. |
[SP 800-160v1r1] National Institute of Standards and Technology Special Publication 800-160, Volume 1, Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems, November 2016. |
[SP 800-161] National Institute of Standards and Technology Special Publication 800-161, Supply Chain Risk Management Practices for Federal Information Systems and Organizations, April 2015. |
[SP 800-181] National Institute of Standards and Technology Special Publication 800-181, National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework, August 2017. |