Draft: Assessing Threats to Mobile Devices & Infrastructure NISTIR 8144 |
mtc-nistir-8144-draft.pdf (1.57 MB) |
September, 2015 |
Draft: Authentication for Law Enforcement Vehicle Systems |
psfr-alevs-project-description-draft.pdf (349.01 KB) |
September, 2015 |
Draft: IT Asset Management NIST SP 1800-5 Practice Guide |
Executive Summary (485.21 KB)
Approach, Architecture, and Security Characteristics (1.03 MB)
How-To Guides (2.17 MB)
All Volumes (1.91 MB)
fs-itam-nist-sp1800-5-draft.zip (3.33 MB) |
October, 2015 |
Draft: Privacy-Enhanced Identity Brokers Project Description |
privacy-enhanced-identity-brokers-project-description-draft.pdf (593.3 KB) |
October, 2015 |
Draft: Mobile Device Security NIST SP 1800-4 Practice Guide |
Executive Summary (161.17 KB)
Approach, Architecture, and Security Characteristics (825.03 KB)
How-To Guide (10.61 MB)
All Volumes (5.29 MB)
mds-nist-sp1800-4-draft.zip (10.66 MB) |
November, 2015 |
Draft: Data Integrity Project Description |
data-integrity-project-description-draft.pdf (284.39 KB) |
November, 2015 |
Final: Wireless Medical Infusion Pumps Project Description |
hit-infusion-pump-project-description-final.pdf (658.65 KB) |
December, 2015 |
Final: Trusted Geolocation in the Cloud: Proof of Concept Implementation |
nistir-7904-final.pdf (2.36 MB) |
December, 2015 |
Draft: DNS-Based Secure Email NIST SP 1800-6 Practice Guide |
Executive Summary (214.46 KB)
Approach, Architecture, and Security Characteristics (1.76 MB)
How-To Guides (4.92 MB)
All Volumes (5.38 MB) |
January, 2016 |
NCCoE Fact Sheet |
nccoe-fact-sheet.pdf (365.92 KB) |
February, 2016 |