|
Preliminary Version 2 Draft: Securing Small-Business and Home Internet of Things (IoT) Devices: Mitigating Network-Based Attacks Using Manufacturer Usage Description (MUD) NIST SP 1800-15 Practice Guide |
Executive Summary (209.36 KB)
Approach, Architecture, and Security Characteristics (3.85 MB)
How-To Guides (4.91 MB)
Functional Demonstration Results Supplement to Volume B (3.16 MB)
All Volumes (11.64 MB) |
November, 2019 |
|
Draft: Validating the Integrity of Computing Devices |
tpm-sca-draft-project-description.pdf (526.94 KB) |
November, 2019 |
|
Data Confidentiality: Identifying and Protecting Assets and Data Against Data Breaches |
dc-ip-fact-sheet.pdf (297.91 KB) |
November, 2019 |
|
Final: Data Confidentiality: Detect, Respond to, and Recover from Data Breaches |
dc-drr-project-description-final.pdf (368.93 KB) |
December, 2019 |
|
Final: Data Confidentiality: Identifying and Protecting Assets and Data Against Data Breaches |
dc-ip-project-description-final.pdf (418.79 KB) |
December, 2019 |
|
Preliminary Draft: Mitigating IoT-Based Distributed Denial of Service (DDOS) Fact Sheet |
iot-ddos-fact-sheet.pdf (390.35 KB) |
January, 2020 |
|
Draft: Data Integrity: Identifying and Protecting Assets Against Ransomware and Other Destructive Events NIST SP 1800-25 Practice Guide |
Executive Summary (247.7 KB)
Approach, Architecture, and Security Characteristics (615.9 KB)
How-To Guides (41.96 MB)
All Volumes (42.53 MB) |
January, 2020 |
|
Draft: Data Integrity: Detecting and Responding to Ransomware and Other Destructive Events NIST SP 1800-26 Practice Guide |
Executive Summary (260.53 KB)
Approach, Architecture, and Security Characteristics (704.09 KB)
How-To Guides (41.51 MB)
All Volumes (42.16 MB) |
January, 2020 |
|
Securing the Industrial Internet of Things |
( bytes) |
January, 2020 |
|
Trusted Cloud: VMware Hybrid Cloud IaaS Environments Fact Sheet |
Trusted-Cloud-Fact-Sheet.pdf (291.56 KB) |
February, 2020 |