nist-publications-raw / .gitattributes
ethanolivertroy's picture
Add COTS Security Protection Profile - Operating Systems (CSPP-OS) (Worked Example Applying Guidance of NISTIR-6462, CSPP) Version 1.0.pdf
4ebb140 verified
raw
history blame
14.9 kB
*.7z filter=lfs diff=lfs merge=lfs -text
*.arrow filter=lfs diff=lfs merge=lfs -text
*.bin filter=lfs diff=lfs merge=lfs -text
*.bz2 filter=lfs diff=lfs merge=lfs -text
*.ckpt filter=lfs diff=lfs merge=lfs -text
*.ftz filter=lfs diff=lfs merge=lfs -text
*.gz filter=lfs diff=lfs merge=lfs -text
*.h5 filter=lfs diff=lfs merge=lfs -text
*.joblib filter=lfs diff=lfs merge=lfs -text
*.lfs.* filter=lfs diff=lfs merge=lfs -text
*.lz4 filter=lfs diff=lfs merge=lfs -text
*.mds filter=lfs diff=lfs merge=lfs -text
*.mlmodel filter=lfs diff=lfs merge=lfs -text
*.model filter=lfs diff=lfs merge=lfs -text
*.msgpack filter=lfs diff=lfs merge=lfs -text
*.npy filter=lfs diff=lfs merge=lfs -text
*.npz filter=lfs diff=lfs merge=lfs -text
*.onnx filter=lfs diff=lfs merge=lfs -text
*.ot filter=lfs diff=lfs merge=lfs -text
*.parquet filter=lfs diff=lfs merge=lfs -text
*.pb filter=lfs diff=lfs merge=lfs -text
*.pickle filter=lfs diff=lfs merge=lfs -text
*.pkl filter=lfs diff=lfs merge=lfs -text
*.pt filter=lfs diff=lfs merge=lfs -text
*.pth filter=lfs diff=lfs merge=lfs -text
*.rar filter=lfs diff=lfs merge=lfs -text
*.safetensors filter=lfs diff=lfs merge=lfs -text
saved_model/**/* filter=lfs diff=lfs merge=lfs -text
*.tar.* filter=lfs diff=lfs merge=lfs -text
*.tar filter=lfs diff=lfs merge=lfs -text
*.tflite filter=lfs diff=lfs merge=lfs -text
*.tgz filter=lfs diff=lfs merge=lfs -text
*.wasm filter=lfs diff=lfs merge=lfs -text
*.xz filter=lfs diff=lfs merge=lfs -text
*.zip filter=lfs diff=lfs merge=lfs -text
*.zst filter=lfs diff=lfs merge=lfs -text
*tfevents* filter=lfs diff=lfs merge=lfs -text
# Audio files - uncompressed
*.pcm filter=lfs diff=lfs merge=lfs -text
*.sam filter=lfs diff=lfs merge=lfs -text
*.raw filter=lfs diff=lfs merge=lfs -text
# Audio files - compressed
*.aac filter=lfs diff=lfs merge=lfs -text
*.flac filter=lfs diff=lfs merge=lfs -text
*.mp3 filter=lfs diff=lfs merge=lfs -text
*.ogg filter=lfs diff=lfs merge=lfs -text
*.wav filter=lfs diff=lfs merge=lfs -text
# Image files - uncompressed
*.bmp filter=lfs diff=lfs merge=lfs -text
*.gif filter=lfs diff=lfs merge=lfs -text
*.png filter=lfs diff=lfs merge=lfs -text
*.tiff filter=lfs diff=lfs merge=lfs -text
# Image files - compressed
*.jpg filter=lfs diff=lfs merge=lfs -text
*.jpeg filter=lfs diff=lfs merge=lfs -text
*.webp filter=lfs diff=lfs merge=lfs -text
# Video files - compressed
*.mp4 filter=lfs diff=lfs merge=lfs -text
*.webm filter=lfs diff=lfs merge=lfs -text
Identifying[[:space:]]and[[:space:]]Estimating[[:space:]]Cybersecurity[[:space:]]Risk[[:space:]]for[[:space:]]Enterprise[[:space:]]Risk[[:space:]]Management.pdf filter=lfs diff=lfs merge=lfs -text
Guide[[:space:]]to[[:space:]]Information[[:space:]]Technology[[:space:]]Security[[:space:]]Services.pdf filter=lfs diff=lfs merge=lfs -text
Recommendations[[:space:]]for[[:space:]]Discrete[[:space:]]Logarithm-based[[:space:]]Cryptography_[[:space:]]Elliptic[[:space:]]Curve[[:space:]]Domain[[:space:]]Parameters.pdf filter=lfs diff=lfs merge=lfs -text
Recommendation[[:space:]]for[[:space:]]Obtaining[[:space:]]Assurances[[:space:]]for[[:space:]]Digital[[:space:]]Signature[[:space:]]Applications.pdf filter=lfs diff=lfs merge=lfs -text
Summary[[:space:]]Report[[:space:]]for[[:space:]]the[[:space:]]Virtual[[:space:]]Workshop[[:space:]]Addressing[[:space:]]Public[[:space:]]Comment[[:space:]]on[[:space:]]NIST[[:space:]]Cybersecurity[[:space:]]for[[:space:]]IoT[[:space:]]Guidance.pdf filter=lfs diff=lfs merge=lfs -text
Interfaces[[:space:]]for[[:space:]]Personal[[:space:]]Identity[[:space:]]Verification_[[:space:]]Part[[:space:]]3[[:space:]]–[[:space:]]PIV[[:space:]]Client[[:space:]]Application[[:space:]]Programming[[:space:]]Interface.pdf filter=lfs diff=lfs merge=lfs -text
Discussion[[:space:]]on[[:space:]]the[[:space:]]Full[[:space:]]Entropy[[:space:]]Assumption[[:space:]]of[[:space:]]the[[:space:]]SP[[:space:]]800-90[[:space:]]Series.pdf filter=lfs diff=lfs merge=lfs -text
Verification[[:space:]]and[[:space:]]Test[[:space:]]Methods[[:space:]]for[[:space:]]Access[[:space:]]Control[[:space:]]Policies_Models.pdf filter=lfs diff=lfs merge=lfs -text
Annual[[:space:]]Report[[:space:]]2018_[[:space:]]NIST_ITL[[:space:]]Cybersecurity[[:space:]]Program.pdf filter=lfs diff=lfs merge=lfs -text
Trusted[[:space:]]Geolocation[[:space:]]in[[:space:]]the[[:space:]]Cloud_[[:space:]]Proof[[:space:]]of[[:space:]]Concept[[:space:]]Implementation.pdf filter=lfs diff=lfs merge=lfs -text
A[[:space:]]Profile[[:space:]]for[[:space:]]U.S.[[:space:]]Federal[[:space:]]Cryptographic[[:space:]]Key[[:space:]]Management[[:space:]]Systems[[:space:]](CKMS).pdf filter=lfs diff=lfs merge=lfs -text
Sample[[:space:]]Statement[[:space:]]of[[:space:]]Work[[:space:]]for[[:space:]]Federal[[:space:]]Computer[[:space:]]Security[[:space:]]Services_[[:space:]]For[[:space:]]use[[:space:]]In-House[[:space:]]or[[:space:]]Contracting[[:space:]]Out.pdf filter=lfs diff=lfs merge=lfs -text
Report_[[:space:]]Authentication[[:space:]]Diary[[:space:]]Study.pdf filter=lfs diff=lfs merge=lfs -text
Multi-Factor[[:space:]]Authentication[[:space:]]for[[:space:]]Criminal[[:space:]]Justice[[:space:]]Information[[:space:]]Systems_[[:space:]]Implementation[[:space:]]Considerations[[:space:]]for[[:space:]]Protecting[[:space:]]Criminal[[:space:]]Justice[[:space:]]Information.pdf filter=lfs diff=lfs merge=lfs -text
Report[[:space:]]on[[:space:]]the[[:space:]]Design-A-Thon_[[:space:]]Designing[[:space:]]Effective[[:space:]]and[[:space:]]Accessible[[:space:]]Approaches[[:space:]]for[[:space:]]Digital[[:space:]]Product[[:space:]]Cybersecurity[[:space:]]Education[[:space:]]and[[:space:]]Awareness.pdf filter=lfs diff=lfs merge=lfs -text
Protecting[[:space:]]Controlled[[:space:]]Unclassified[[:space:]]Information[[:space:]](CUI)_[[:space:]]NIST[[:space:]]Special[[:space:]]Publication[[:space:]]800-171,[[:space:]]Revision[[:space:]]3.[[:space:]]Small[[:space:]]Business[[:space:]]Primer.pdf filter=lfs diff=lfs merge=lfs -text
Federal[[:space:]]Cybersecurity[[:space:]]Role-Based[[:space:]]Training[[:space:]]Approaches,[[:space:]]Successes,[[:space:]]and[[:space:]]Challenges.pdf filter=lfs diff=lfs merge=lfs -text
Recommendation[[:space:]]for[[:space:]]Cryptographic[[:space:]]Key[[:space:]]Generation.pdf filter=lfs diff=lfs merge=lfs -text
Best[[:space:]]Practices[[:space:]]for[[:space:]]Privileged[[:space:]]User[[:space:]]PIV[[:space:]]Authentication.pdf filter=lfs diff=lfs merge=lfs -text
Guidelines[[:space:]]for[[:space:]]the[[:space:]]Creation[[:space:]]of[[:space:]]Interoperable[[:space:]]Software[[:space:]]Identification[[:space:]](SWID)[[:space:]]Tags.pdf filter=lfs diff=lfs merge=lfs -text
Codes[[:space:]]for[[:space:]]Identification[[:space:]]of[[:space:]]Federal[[:space:]]and[[:space:]]Federally-Assisted[[:space:]]Organizations.pdf filter=lfs diff=lfs merge=lfs -text
User's[[:space:]]Guide[[:space:]]to[[:space:]]Telework[[:space:]]and[[:space:]]Bring[[:space:]]Your[[:space:]]Own[[:space:]]Device[[:space:]](BYOD)[[:space:]]Security.pdf filter=lfs diff=lfs merge=lfs -text
Derived[[:space:]]Personal[[:space:]]Identity[[:space:]]Verification[[:space:]](PIV)[[:space:]]Credentials.pdf filter=lfs diff=lfs merge=lfs -text
Derived[[:space:]]Personal[[:space:]]Identity[[:space:]]Verification[[:space:]](PIV)[[:space:]]Credentials[[:space:]](DPC)[[:space:]]Proof[[:space:]]of[[:space:]]Concept[[:space:]]Research.pdf filter=lfs diff=lfs merge=lfs -text
Establishing[[:space:]]Wireless[[:space:]]Robust[[:space:]]Security[[:space:]]Networks_[[:space:]]A[[:space:]]Guide[[:space:]]to[[:space:]]IEEE[[:space:]]802.11i.pdf filter=lfs diff=lfs merge=lfs -text
Interfaces[[:space:]]for[[:space:]]Personal[[:space:]]Identity[[:space:]]Verification_[[:space:]]Part[[:space:]]1[[:space:]]–[[:space:]]PIV[[:space:]]Card[[:space:]]Application[[:space:]]Namespace,[[:space:]]Data[[:space:]]Model[[:space:]]and[[:space:]]Representation.pdf filter=lfs diff=lfs merge=lfs -text
Specification[[:space:]]for[[:space:]]Asset[[:space:]]Reporting[[:space:]]Format[[:space:]]1.1.pdf filter=lfs diff=lfs merge=lfs -text
Security[[:space:]]Segmentation[[:space:]]in[[:space:]]a[[:space:]]Small[[:space:]]Manufacturing[[:space:]]Environment.pdf filter=lfs diff=lfs merge=lfs -text
NIST[[:space:]]Test[[:space:]]Personal[[:space:]]Identity[[:space:]]Verification[[:space:]](PIV)[[:space:]]Cards.pdf filter=lfs diff=lfs merge=lfs -text
Mobile[[:space:]]Device[[:space:]]Security_[[:space:]]Cloud[[:space:]]and[[:space:]]Hybrid[[:space:]]Builds.pdf filter=lfs diff=lfs merge=lfs -text
Guidelines[[:space:]]on[[:space:]]Electronic[[:space:]]Mail[[:space:]]Security.pdf filter=lfs diff=lfs merge=lfs -text
2nd[[:space:]]Annual[[:space:]]PKI[[:space:]]Research[[:space:]]Workshop[[:space:]]Proceedings.pdf filter=lfs diff=lfs merge=lfs -text
Digital[[:space:]]Identity[[:space:]]Guidelines_[[:space:]]Authentication[[:space:]]and[[:space:]]Authenticator[[:space:]]Management.pdf filter=lfs diff=lfs merge=lfs -text
A[[:space:]]Data[[:space:]]Structure[[:space:]]for[[:space:]]Integrity[[:space:]]Protection[[:space:]]with[[:space:]]Erasure[[:space:]]Capability.pdf filter=lfs diff=lfs merge=lfs -text
Technical[[:space:]]Guide[[:space:]]to[[:space:]]Information[[:space:]]Security[[:space:]]Testing[[:space:]]and[[:space:]]Assessment.pdf filter=lfs diff=lfs merge=lfs -text
Cryptographic[[:space:]]Module[[:space:]]Validation[[:space:]]Program[[:space:]](CMVP)[[:space:]]Security[[:space:]]Policy[[:space:]]Requirements_[[:space:]]CMVP[[:space:]]Validation[[:space:]]Authority[[:space:]]Updates[[:space:]]to[[:space:]]ISO_IEC[[:space:]]24759[[:space:]]and[[:space:]]ISO_IEC[[:space:]]19790[[:space:]]Anne.pdf filter=lfs diff=lfs merge=lfs -text
NIST[[:space:]]Cybersecurity[[:space:]]Framework[[:space:]]2.0_[[:space:]]Quick-Start[[:space:]]Guide[[:space:]]for[[:space:]]Using[[:space:]]the[[:space:]]CSF[[:space:]]Tiers.pdf filter=lfs diff=lfs merge=lfs -text
Security[[:space:]]Property[[:space:]]Verification[[:space:]]by[[:space:]]Transition[[:space:]]Model.pdf filter=lfs diff=lfs merge=lfs -text
Data[[:space:]]Integrity_[[:space:]]Recovering[[:space:]]from[[:space:]]Ransomware[[:space:]]and[[:space:]]Other[[:space:]]Destructive[[:space:]]Events.pdf filter=lfs diff=lfs merge=lfs -text
Information[[:space:]]Security[[:space:]]Handbook_[[:space:]]A[[:space:]]Guide[[:space:]]for[[:space:]]Managers.pdf filter=lfs diff=lfs merge=lfs -text
Maintenance[[:space:]]Testing[[:space:]]for[[:space:]]the[[:space:]]Data[[:space:]]Encryption[[:space:]]Standard.pdf filter=lfs diff=lfs merge=lfs -text
Automation[[:space:]]Support[[:space:]]for[[:space:]]Control[[:space:]]Assessments_[[:space:]]Project[[:space:]]Update[[:space:]]and[[:space:]]Vision.pdf filter=lfs diff=lfs merge=lfs -text
Transitioning[[:space:]]to[[:space:]]the[[:space:]]Security[[:space:]]Content[[:space:]]Automation[[:space:]]Protocol[[:space:]](SCAP)[[:space:]]Version[[:space:]]2.pdf filter=lfs diff=lfs merge=lfs -text
Automation[[:space:]]Support[[:space:]]for[[:space:]]Security[[:space:]]Control[[:space:]]Assessments_[[:space:]]Volume[[:space:]]1_[[:space:]]Overview.pdf filter=lfs diff=lfs merge=lfs -text
An[[:space:]]Introduction[[:space:]]to[[:space:]]Information[[:space:]]Security.pdf filter=lfs diff=lfs merge=lfs -text
Foundational[[:space:]]Cybersecurity[[:space:]]Activities[[:space:]]for[[:space:]]IoT[[:space:]]Device[[:space:]]Manufacturers.pdf filter=lfs diff=lfs merge=lfs -text
Status[[:space:]]Report[[:space:]]on[[:space:]]the[[:space:]]Third[[:space:]]Round[[:space:]]of[[:space:]]the[[:space:]]NIST[[:space:]]Post-Quantum[[:space:]]Cryptography[[:space:]]Standardization[[:space:]]Process.pdf filter=lfs diff=lfs merge=lfs -text
Introduction[[:space:]]to[[:space:]]Cybersecurity[[:space:]]for[[:space:]]Commercial[[:space:]]Satellite[[:space:]]Operations.pdf filter=lfs diff=lfs merge=lfs -text
Proceedings[[:space:]]of[[:space:]]the[[:space:]]Cybersecurity[[:space:]]in[[:space:]]Cyber-Physical[[:space:]]Systems[[:space:]]Workshop,[[:space:]]April[[:space:]]23-24,[[:space:]]2012.pdf filter=lfs diff=lfs merge=lfs -text
Summary[[:space:]]Report[[:space:]]for[[:space:]]“Workshop[[:space:]]on[[:space:]]Updating[[:space:]]Manufacturer[[:space:]]Guidance[[:space:]]for[[:space:]]Securable[[:space:]]Connected[[:space:]]Product[[:space:]]Development”.pdf filter=lfs diff=lfs merge=lfs -text
Derived[[:space:]]PIV[[:space:]]Application[[:space:]]and[[:space:]]Data[[:space:]]Model[[:space:]]Test[[:space:]]Guidelines.pdf filter=lfs diff=lfs merge=lfs -text
ISCMA_[[:space:]]An[[:space:]]Information[[:space:]]Security[[:space:]]Continuous[[:space:]]Monitoring[[:space:]]Program[[:space:]]Assessment.pdf filter=lfs diff=lfs merge=lfs -text
The[[:space:]]Common[[:space:]]Misuse[[:space:]]Scoring[[:space:]]System[[:space:]](CMSS)_[[:space:]]Metrics[[:space:]]for[[:space:]]Software[[:space:]]Feature[[:space:]]Misuse[[:space:]]Vulnerabilities.pdf filter=lfs diff=lfs merge=lfs -text
Recommendation[[:space:]]for[[:space:]]Block[[:space:]]Cipher[[:space:]]Modes[[:space:]]of[[:space:]]Operation_[[:space:]]Three[[:space:]]Variants[[:space:]]of[[:space:]]Ciphertext[[:space:]]Stealing[[:space:]]for[[:space:]]CBC[[:space:]]Mode.pdf filter=lfs diff=lfs merge=lfs -text
Control[[:space:]]Baselines[[:space:]]for[[:space:]]Information[[:space:]]Systems[[:space:]]and[[:space:]]Organizations.pdf filter=lfs diff=lfs merge=lfs -text
Report[[:space:]]on[[:space:]]the[[:space:]]Block[[:space:]]Cipher[[:space:]]Modes[[:space:]]of[[:space:]]Operation[[:space:]]in[[:space:]]the[[:space:]]NIST[[:space:]]SP[[:space:]]800-38[[:space:]]Series.pdf filter=lfs diff=lfs merge=lfs -text
Guide[[:space:]]to[[:space:]]Bluetooth[[:space:]]Security.pdf filter=lfs diff=lfs merge=lfs -text
The[[:space:]]Common[[:space:]]Configuration[[:space:]]Scoring[[:space:]]System[[:space:]](CCSS)_[[:space:]]Metrics[[:space:]]for[[:space:]]Software[[:space:]]Security[[:space:]]Configuration[[:space:]]Vulnerabilities.pdf filter=lfs diff=lfs merge=lfs -text
Secure[[:space:]]Hash[[:space:]]Standard[[:space:]](SHS).pdf filter=lfs diff=lfs merge=lfs -text
Assessing[[:space:]]Security[[:space:]]Requirements[[:space:]]for[[:space:]]Controlled[[:space:]]Unclassified[[:space:]]Information.pdf filter=lfs diff=lfs merge=lfs -text
Computer[[:space:]]Security[[:space:]]Division[[:space:]]2012[[:space:]]Annual[[:space:]]Report.pdf filter=lfs diff=lfs merge=lfs -text
Ordered[[:space:]]t-way[[:space:]]Combinations[[:space:]]for[[:space:]]Testing[[:space:]]State-based[[:space:]]Systems.pdf filter=lfs diff=lfs merge=lfs -text
COTS[[:space:]]Security[[:space:]]Protection[[:space:]]Profile[[:space:]]-[[:space:]]Operating[[:space:]]Systems[[:space:]](CSPP-OS)[[:space:]](Worked[[:space:]]Example[[:space:]]Applying[[:space:]]Guidance[[:space:]]of[[:space:]]NISTIR-6462,[[:space:]]CSPP)[[:space:]]Version[[:space:]]1.0.pdf filter=lfs diff=lfs merge=lfs -text