Archive
NCCoE projects that are not currently active but may be updated again in the future.
Upon review, we recognize that some of the following NIST/NCCoE publications contain potentially biased terminology. As new publications are developed, they will follow NIST’s inclusive language guidance.
Previous Projects
-
Attribute-Based Access Control (ABAC)
An attribute exchange platform that provides fine-grained access control to data, systems, and networks— both in and among enterprises—based on a person’s title, division, certifications, and other characteristics. -
Consumer Home Internet of Things Product Security
Aims to provide data-driven cybersecurity information about the state of the consumer smart home market. -
Continuous Monitoring for IT Infrastructure
Explores capabilities that can effectively, efficiently and automatically detect when a malicious actor attempts to perform an action in an organization’s IT infrastructure that could result in financial, reputational, and operational impacts to the organ -
Derived PIV Credentials
Enables personal identity verification (PIV) -based access to secured information and resources on mobile devices. -
DNS-Based Secured Email
Prevents unauthorized parties from reading or modifying an organization's email, or using it as a vector for malware, by using the Domain Name System (DNS)-Based Authentication of Named Entities (DANE) protocol. -
Improving Cybersecurity of Managed Service Providers
Provides managed service providers with informed guidance that will enable them to adopt cybersecurity technologies and techniques that result in better security for themselves and their small business customers. -
Mitigating Cybersecurity Risk in Telehealth Smart Home Integration
Identifies and mitigates cybersecurity and privacy risks based on patient use of smart home devices interfacing with patient information systems -
Privacy-Enhanced Identity Brokers
Integrates privacy-enhancing technologies into identity broker solutions to meet the privacy objectives of users and organizations. Upon review, we recognize that this NIST/NCCoE publication contains potentially biased terminology. As new publications are -
Secure Inter-Domain Routing
Implementing BGP Route Origin Validation (ROV) based upon the Resource Public Key Infrastructure (RPKI) can mitigate accidental and malicious attacks associated with route hijacking. -
Security for IoT Sensor Networks
Aims to demonstrate how resource-constrained sensors can have their firmware securely updated over the air (OTA).