Add COTS Security Protection Profile - Operating Systems (CSPP-OS) (Worked Example Applying Guidance of NISTIR-6462, CSPP) Version 1.0.pdf
4ebb140
verified
| *.7z filter=lfs diff=lfs merge=lfs -text | |
| *.arrow filter=lfs diff=lfs merge=lfs -text | |
| *.bin filter=lfs diff=lfs merge=lfs -text | |
| *.bz2 filter=lfs diff=lfs merge=lfs -text | |
| *.ckpt filter=lfs diff=lfs merge=lfs -text | |
| *.ftz filter=lfs diff=lfs merge=lfs -text | |
| *.gz filter=lfs diff=lfs merge=lfs -text | |
| *.h5 filter=lfs diff=lfs merge=lfs -text | |
| *.joblib filter=lfs diff=lfs merge=lfs -text | |
| *.lfs.* filter=lfs diff=lfs merge=lfs -text | |
| *.lz4 filter=lfs diff=lfs merge=lfs -text | |
| *.mds filter=lfs diff=lfs merge=lfs -text | |
| *.mlmodel filter=lfs diff=lfs merge=lfs -text | |
| *.model filter=lfs diff=lfs merge=lfs -text | |
| *.msgpack filter=lfs diff=lfs merge=lfs -text | |
| *.npy filter=lfs diff=lfs merge=lfs -text | |
| *.npz filter=lfs diff=lfs merge=lfs -text | |
| *.onnx filter=lfs diff=lfs merge=lfs -text | |
| *.ot filter=lfs diff=lfs merge=lfs -text | |
| *.parquet filter=lfs diff=lfs merge=lfs -text | |
| *.pb filter=lfs diff=lfs merge=lfs -text | |
| *.pickle filter=lfs diff=lfs merge=lfs -text | |
| *.pkl filter=lfs diff=lfs merge=lfs -text | |
| *.pt filter=lfs diff=lfs merge=lfs -text | |
| *.pth filter=lfs diff=lfs merge=lfs -text | |
| *.rar filter=lfs diff=lfs merge=lfs -text | |
| *.safetensors filter=lfs diff=lfs merge=lfs -text | |
| saved_model/**/* filter=lfs diff=lfs merge=lfs -text | |
| *.tar.* filter=lfs diff=lfs merge=lfs -text | |
| *.tar filter=lfs diff=lfs merge=lfs -text | |
| *.tflite filter=lfs diff=lfs merge=lfs -text | |
| *.tgz filter=lfs diff=lfs merge=lfs -text | |
| *.wasm filter=lfs diff=lfs merge=lfs -text | |
| *.xz filter=lfs diff=lfs merge=lfs -text | |
| *.zip filter=lfs diff=lfs merge=lfs -text | |
| *.zst filter=lfs diff=lfs merge=lfs -text | |
| *tfevents* filter=lfs diff=lfs merge=lfs -text | |
| # Audio files - uncompressed | |
| *.pcm filter=lfs diff=lfs merge=lfs -text | |
| *.sam filter=lfs diff=lfs merge=lfs -text | |
| *.raw filter=lfs diff=lfs merge=lfs -text | |
| # Audio files - compressed | |
| *.aac filter=lfs diff=lfs merge=lfs -text | |
| *.flac filter=lfs diff=lfs merge=lfs -text | |
| *.mp3 filter=lfs diff=lfs merge=lfs -text | |
| *.ogg filter=lfs diff=lfs merge=lfs -text | |
| *.wav filter=lfs diff=lfs merge=lfs -text | |
| # Image files - uncompressed | |
| *.bmp filter=lfs diff=lfs merge=lfs -text | |
| *.gif filter=lfs diff=lfs merge=lfs -text | |
| *.png filter=lfs diff=lfs merge=lfs -text | |
| *.tiff filter=lfs diff=lfs merge=lfs -text | |
| # Image files - compressed | |
| *.jpg filter=lfs diff=lfs merge=lfs -text | |
| *.jpeg filter=lfs diff=lfs merge=lfs -text | |
| *.webp filter=lfs diff=lfs merge=lfs -text | |
| # Video files - compressed | |
| *.mp4 filter=lfs diff=lfs merge=lfs -text | |
| *.webm filter=lfs diff=lfs merge=lfs -text | |
| Identifying[[:space:]]and[[:space:]]Estimating[[:space:]]Cybersecurity[[:space:]]Risk[[:space:]]for[[:space:]]Enterprise[[:space:]]Risk[[:space:]]Management.pdf filter=lfs diff=lfs merge=lfs -text | |
| Guide[[:space:]]to[[:space:]]Information[[:space:]]Technology[[:space:]]Security[[:space:]]Services.pdf filter=lfs diff=lfs merge=lfs -text | |
| Recommendations[[:space:]]for[[:space:]]Discrete[[:space:]]Logarithm-based[[:space:]]Cryptography_[[:space:]]Elliptic[[:space:]]Curve[[:space:]]Domain[[:space:]]Parameters.pdf filter=lfs diff=lfs merge=lfs -text | |
| Recommendation[[:space:]]for[[:space:]]Obtaining[[:space:]]Assurances[[:space:]]for[[:space:]]Digital[[:space:]]Signature[[:space:]]Applications.pdf filter=lfs diff=lfs merge=lfs -text | |
| Summary[[:space:]]Report[[:space:]]for[[:space:]]the[[:space:]]Virtual[[:space:]]Workshop[[:space:]]Addressing[[:space:]]Public[[:space:]]Comment[[:space:]]on[[:space:]]NIST[[:space:]]Cybersecurity[[:space:]]for[[:space:]]IoT[[:space:]]Guidance.pdf filter=lfs diff=lfs merge=lfs -text | |
| Interfaces[[:space:]]for[[:space:]]Personal[[:space:]]Identity[[:space:]]Verification_[[:space:]]Part[[:space:]]3[[:space:]]–[[:space:]]PIV[[:space:]]Client[[:space:]]Application[[:space:]]Programming[[:space:]]Interface.pdf filter=lfs diff=lfs merge=lfs -text | |
| Discussion[[:space:]]on[[:space:]]the[[:space:]]Full[[:space:]]Entropy[[:space:]]Assumption[[:space:]]of[[:space:]]the[[:space:]]SP[[:space:]]800-90[[:space:]]Series.pdf filter=lfs diff=lfs merge=lfs -text | |
| Verification[[:space:]]and[[:space:]]Test[[:space:]]Methods[[:space:]]for[[:space:]]Access[[:space:]]Control[[:space:]]Policies_Models.pdf filter=lfs diff=lfs merge=lfs -text | |
| Annual[[:space:]]Report[[:space:]]2018_[[:space:]]NIST_ITL[[:space:]]Cybersecurity[[:space:]]Program.pdf filter=lfs diff=lfs merge=lfs -text | |
| Trusted[[:space:]]Geolocation[[:space:]]in[[:space:]]the[[:space:]]Cloud_[[:space:]]Proof[[:space:]]of[[:space:]]Concept[[:space:]]Implementation.pdf filter=lfs diff=lfs merge=lfs -text | |
| A[[:space:]]Profile[[:space:]]for[[:space:]]U.S.[[:space:]]Federal[[:space:]]Cryptographic[[:space:]]Key[[:space:]]Management[[:space:]]Systems[[:space:]](CKMS).pdf filter=lfs diff=lfs merge=lfs -text | |
| Sample[[:space:]]Statement[[:space:]]of[[:space:]]Work[[:space:]]for[[:space:]]Federal[[:space:]]Computer[[:space:]]Security[[:space:]]Services_[[:space:]]For[[:space:]]use[[:space:]]In-House[[:space:]]or[[:space:]]Contracting[[:space:]]Out.pdf filter=lfs diff=lfs merge=lfs -text | |
| Report_[[:space:]]Authentication[[:space:]]Diary[[:space:]]Study.pdf filter=lfs diff=lfs merge=lfs -text | |
| Multi-Factor[[:space:]]Authentication[[:space:]]for[[:space:]]Criminal[[:space:]]Justice[[:space:]]Information[[:space:]]Systems_[[:space:]]Implementation[[:space:]]Considerations[[:space:]]for[[:space:]]Protecting[[:space:]]Criminal[[:space:]]Justice[[:space:]]Information.pdf filter=lfs diff=lfs merge=lfs -text | |
| Report[[:space:]]on[[:space:]]the[[:space:]]Design-A-Thon_[[:space:]]Designing[[:space:]]Effective[[:space:]]and[[:space:]]Accessible[[:space:]]Approaches[[:space:]]for[[:space:]]Digital[[:space:]]Product[[:space:]]Cybersecurity[[:space:]]Education[[:space:]]and[[:space:]]Awareness.pdf filter=lfs diff=lfs merge=lfs -text | |
| Protecting[[:space:]]Controlled[[:space:]]Unclassified[[:space:]]Information[[:space:]](CUI)_[[:space:]]NIST[[:space:]]Special[[:space:]]Publication[[:space:]]800-171,[[:space:]]Revision[[:space:]]3.[[:space:]]Small[[:space:]]Business[[:space:]]Primer.pdf filter=lfs diff=lfs merge=lfs -text | |
| Federal[[:space:]]Cybersecurity[[:space:]]Role-Based[[:space:]]Training[[:space:]]Approaches,[[:space:]]Successes,[[:space:]]and[[:space:]]Challenges.pdf filter=lfs diff=lfs merge=lfs -text | |
| Recommendation[[:space:]]for[[:space:]]Cryptographic[[:space:]]Key[[:space:]]Generation.pdf filter=lfs diff=lfs merge=lfs -text | |
| Best[[:space:]]Practices[[:space:]]for[[:space:]]Privileged[[:space:]]User[[:space:]]PIV[[:space:]]Authentication.pdf filter=lfs diff=lfs merge=lfs -text | |
| Guidelines[[:space:]]for[[:space:]]the[[:space:]]Creation[[:space:]]of[[:space:]]Interoperable[[:space:]]Software[[:space:]]Identification[[:space:]](SWID)[[:space:]]Tags.pdf filter=lfs diff=lfs merge=lfs -text | |
| Codes[[:space:]]for[[:space:]]Identification[[:space:]]of[[:space:]]Federal[[:space:]]and[[:space:]]Federally-Assisted[[:space:]]Organizations.pdf filter=lfs diff=lfs merge=lfs -text | |
| User's[[:space:]]Guide[[:space:]]to[[:space:]]Telework[[:space:]]and[[:space:]]Bring[[:space:]]Your[[:space:]]Own[[:space:]]Device[[:space:]](BYOD)[[:space:]]Security.pdf filter=lfs diff=lfs merge=lfs -text | |
| Derived[[:space:]]Personal[[:space:]]Identity[[:space:]]Verification[[:space:]](PIV)[[:space:]]Credentials.pdf filter=lfs diff=lfs merge=lfs -text | |
| Derived[[:space:]]Personal[[:space:]]Identity[[:space:]]Verification[[:space:]](PIV)[[:space:]]Credentials[[:space:]](DPC)[[:space:]]Proof[[:space:]]of[[:space:]]Concept[[:space:]]Research.pdf filter=lfs diff=lfs merge=lfs -text | |
| Establishing[[:space:]]Wireless[[:space:]]Robust[[:space:]]Security[[:space:]]Networks_[[:space:]]A[[:space:]]Guide[[:space:]]to[[:space:]]IEEE[[:space:]]802.11i.pdf filter=lfs diff=lfs merge=lfs -text | |
| Interfaces[[:space:]]for[[:space:]]Personal[[:space:]]Identity[[:space:]]Verification_[[:space:]]Part[[:space:]]1[[:space:]]–[[:space:]]PIV[[:space:]]Card[[:space:]]Application[[:space:]]Namespace,[[:space:]]Data[[:space:]]Model[[:space:]]and[[:space:]]Representation.pdf filter=lfs diff=lfs merge=lfs -text | |
| Specification[[:space:]]for[[:space:]]Asset[[:space:]]Reporting[[:space:]]Format[[:space:]]1.1.pdf filter=lfs diff=lfs merge=lfs -text | |
| Security[[:space:]]Segmentation[[:space:]]in[[:space:]]a[[:space:]]Small[[:space:]]Manufacturing[[:space:]]Environment.pdf filter=lfs diff=lfs merge=lfs -text | |
| NIST[[:space:]]Test[[:space:]]Personal[[:space:]]Identity[[:space:]]Verification[[:space:]](PIV)[[:space:]]Cards.pdf filter=lfs diff=lfs merge=lfs -text | |
| Mobile[[:space:]]Device[[:space:]]Security_[[:space:]]Cloud[[:space:]]and[[:space:]]Hybrid[[:space:]]Builds.pdf filter=lfs diff=lfs merge=lfs -text | |
| Guidelines[[:space:]]on[[:space:]]Electronic[[:space:]]Mail[[:space:]]Security.pdf filter=lfs diff=lfs merge=lfs -text | |
| 2nd[[:space:]]Annual[[:space:]]PKI[[:space:]]Research[[:space:]]Workshop[[:space:]]Proceedings.pdf filter=lfs diff=lfs merge=lfs -text | |
| Digital[[:space:]]Identity[[:space:]]Guidelines_[[:space:]]Authentication[[:space:]]and[[:space:]]Authenticator[[:space:]]Management.pdf filter=lfs diff=lfs merge=lfs -text | |
| A[[:space:]]Data[[:space:]]Structure[[:space:]]for[[:space:]]Integrity[[:space:]]Protection[[:space:]]with[[:space:]]Erasure[[:space:]]Capability.pdf filter=lfs diff=lfs merge=lfs -text | |
| Technical[[:space:]]Guide[[:space:]]to[[:space:]]Information[[:space:]]Security[[:space:]]Testing[[:space:]]and[[:space:]]Assessment.pdf filter=lfs diff=lfs merge=lfs -text | |
| Cryptographic[[:space:]]Module[[:space:]]Validation[[:space:]]Program[[:space:]](CMVP)[[:space:]]Security[[:space:]]Policy[[:space:]]Requirements_[[:space:]]CMVP[[:space:]]Validation[[:space:]]Authority[[:space:]]Updates[[:space:]]to[[:space:]]ISO_IEC[[:space:]]24759[[:space:]]and[[:space:]]ISO_IEC[[:space:]]19790[[:space:]]Anne.pdf filter=lfs diff=lfs merge=lfs -text | |
| NIST[[:space:]]Cybersecurity[[:space:]]Framework[[:space:]]2.0_[[:space:]]Quick-Start[[:space:]]Guide[[:space:]]for[[:space:]]Using[[:space:]]the[[:space:]]CSF[[:space:]]Tiers.pdf filter=lfs diff=lfs merge=lfs -text | |
| Security[[:space:]]Property[[:space:]]Verification[[:space:]]by[[:space:]]Transition[[:space:]]Model.pdf filter=lfs diff=lfs merge=lfs -text | |
| Data[[:space:]]Integrity_[[:space:]]Recovering[[:space:]]from[[:space:]]Ransomware[[:space:]]and[[:space:]]Other[[:space:]]Destructive[[:space:]]Events.pdf filter=lfs diff=lfs merge=lfs -text | |
| Information[[:space:]]Security[[:space:]]Handbook_[[:space:]]A[[:space:]]Guide[[:space:]]for[[:space:]]Managers.pdf filter=lfs diff=lfs merge=lfs -text | |
| Maintenance[[:space:]]Testing[[:space:]]for[[:space:]]the[[:space:]]Data[[:space:]]Encryption[[:space:]]Standard.pdf filter=lfs diff=lfs merge=lfs -text | |
| Automation[[:space:]]Support[[:space:]]for[[:space:]]Control[[:space:]]Assessments_[[:space:]]Project[[:space:]]Update[[:space:]]and[[:space:]]Vision.pdf filter=lfs diff=lfs merge=lfs -text | |
| Transitioning[[:space:]]to[[:space:]]the[[:space:]]Security[[:space:]]Content[[:space:]]Automation[[:space:]]Protocol[[:space:]](SCAP)[[:space:]]Version[[:space:]]2.pdf filter=lfs diff=lfs merge=lfs -text | |
| Automation[[:space:]]Support[[:space:]]for[[:space:]]Security[[:space:]]Control[[:space:]]Assessments_[[:space:]]Volume[[:space:]]1_[[:space:]]Overview.pdf filter=lfs diff=lfs merge=lfs -text | |
| An[[:space:]]Introduction[[:space:]]to[[:space:]]Information[[:space:]]Security.pdf filter=lfs diff=lfs merge=lfs -text | |
| Foundational[[:space:]]Cybersecurity[[:space:]]Activities[[:space:]]for[[:space:]]IoT[[:space:]]Device[[:space:]]Manufacturers.pdf filter=lfs diff=lfs merge=lfs -text | |
| Status[[:space:]]Report[[:space:]]on[[:space:]]the[[:space:]]Third[[:space:]]Round[[:space:]]of[[:space:]]the[[:space:]]NIST[[:space:]]Post-Quantum[[:space:]]Cryptography[[:space:]]Standardization[[:space:]]Process.pdf filter=lfs diff=lfs merge=lfs -text | |
| Introduction[[:space:]]to[[:space:]]Cybersecurity[[:space:]]for[[:space:]]Commercial[[:space:]]Satellite[[:space:]]Operations.pdf filter=lfs diff=lfs merge=lfs -text | |
| Proceedings[[:space:]]of[[:space:]]the[[:space:]]Cybersecurity[[:space:]]in[[:space:]]Cyber-Physical[[:space:]]Systems[[:space:]]Workshop,[[:space:]]April[[:space:]]23-24,[[:space:]]2012.pdf filter=lfs diff=lfs merge=lfs -text | |
| Summary[[:space:]]Report[[:space:]]for[[:space:]]“Workshop[[:space:]]on[[:space:]]Updating[[:space:]]Manufacturer[[:space:]]Guidance[[:space:]]for[[:space:]]Securable[[:space:]]Connected[[:space:]]Product[[:space:]]Development”.pdf filter=lfs diff=lfs merge=lfs -text | |
| Derived[[:space:]]PIV[[:space:]]Application[[:space:]]and[[:space:]]Data[[:space:]]Model[[:space:]]Test[[:space:]]Guidelines.pdf filter=lfs diff=lfs merge=lfs -text | |
| ISCMA_[[:space:]]An[[:space:]]Information[[:space:]]Security[[:space:]]Continuous[[:space:]]Monitoring[[:space:]]Program[[:space:]]Assessment.pdf filter=lfs diff=lfs merge=lfs -text | |
| The[[:space:]]Common[[:space:]]Misuse[[:space:]]Scoring[[:space:]]System[[:space:]](CMSS)_[[:space:]]Metrics[[:space:]]for[[:space:]]Software[[:space:]]Feature[[:space:]]Misuse[[:space:]]Vulnerabilities.pdf filter=lfs diff=lfs merge=lfs -text | |
| Recommendation[[:space:]]for[[:space:]]Block[[:space:]]Cipher[[:space:]]Modes[[:space:]]of[[:space:]]Operation_[[:space:]]Three[[:space:]]Variants[[:space:]]of[[:space:]]Ciphertext[[:space:]]Stealing[[:space:]]for[[:space:]]CBC[[:space:]]Mode.pdf filter=lfs diff=lfs merge=lfs -text | |
| Control[[:space:]]Baselines[[:space:]]for[[:space:]]Information[[:space:]]Systems[[:space:]]and[[:space:]]Organizations.pdf filter=lfs diff=lfs merge=lfs -text | |
| Report[[:space:]]on[[:space:]]the[[:space:]]Block[[:space:]]Cipher[[:space:]]Modes[[:space:]]of[[:space:]]Operation[[:space:]]in[[:space:]]the[[:space:]]NIST[[:space:]]SP[[:space:]]800-38[[:space:]]Series.pdf filter=lfs diff=lfs merge=lfs -text | |
| Guide[[:space:]]to[[:space:]]Bluetooth[[:space:]]Security.pdf filter=lfs diff=lfs merge=lfs -text | |
| The[[:space:]]Common[[:space:]]Configuration[[:space:]]Scoring[[:space:]]System[[:space:]](CCSS)_[[:space:]]Metrics[[:space:]]for[[:space:]]Software[[:space:]]Security[[:space:]]Configuration[[:space:]]Vulnerabilities.pdf filter=lfs diff=lfs merge=lfs -text | |
| Secure[[:space:]]Hash[[:space:]]Standard[[:space:]](SHS).pdf filter=lfs diff=lfs merge=lfs -text | |
| Assessing[[:space:]]Security[[:space:]]Requirements[[:space:]]for[[:space:]]Controlled[[:space:]]Unclassified[[:space:]]Information.pdf filter=lfs diff=lfs merge=lfs -text | |
| Computer[[:space:]]Security[[:space:]]Division[[:space:]]2012[[:space:]]Annual[[:space:]]Report.pdf filter=lfs diff=lfs merge=lfs -text | |
| Ordered[[:space:]]t-way[[:space:]]Combinations[[:space:]]for[[:space:]]Testing[[:space:]]State-based[[:space:]]Systems.pdf filter=lfs diff=lfs merge=lfs -text | |
| COTS[[:space:]]Security[[:space:]]Protection[[:space:]]Profile[[:space:]]-[[:space:]]Operating[[:space:]]Systems[[:space:]](CSPP-OS)[[:space:]](Worked[[:space:]]Example[[:space:]]Applying[[:space:]]Guidance[[:space:]]of[[:space:]]NISTIR-6462,[[:space:]]CSPP)[[:space:]]Version[[:space:]]1.0.pdf filter=lfs diff=lfs merge=lfs -text | |