Building Blocks

Building blocks address broad technology gaps that affect multiple sectors. These projects rely on insight and passion from members of various industries who share a common goal of meeting a particular cybersecurity need. Below are the NCCoE's building block projects. If you're interested in learning more about a building block, or you would like to engage with the center to help develop a new building block, contact us today.

5G Security

Demonstrates how the components of 5G architectures can be used securely to mitigate risks and meet industry sectors’ compliance requirements for a number of 5G use case scenarios Learn more about this project.

Adversarial Machine Learning

Aims to secure applications of Artifical Intelligence, specifically Adversarial Machine Learning, and features a taxonomy of concepts and terminologies. Learn more about this project.

Data Security

Consists of a series of projects that work together to identify, protect, detect, respond to and recover from critical events. Learn more about this project.

Derived PIV Credentials

Enables personal identity verification (PIV) -based access to secured information and resources on mobile devices. Learn more about this project.

Improves the cybersecurity of connected devices and the environments in which they are deployed in conjunction with NIST’s Cybersecurity for the Internet of Things (IoT) ProgramLearn more about this project.

Enterprise-class protection for organization-issued and personally owned mobile platforms that access corporate networks. Learn more about this project.

Patching the Enterprise

Examines how commercial and open source tools can be used to aid with the most challenging aspects of patching general IT systems. Learn more about this project.

Post-Quantum Cryptography

Developing practices to ease the migration from the current set of public-key cryptographic algorithms to replacement algorithms that are resistant to quantum computer-based attacks. Learn more about this project.

Supply Chain Assurance

Demonstrates how organizations can verify that the internal components of their purchased computing devices are genuine and have not been altered during the manufacturing and distribution processes. Learn more about this project.

TLS Server Certificate Management

Demonstrates how medium and large enterprises that rely on TLS to secure customer-facing and internal applications can better manage TLS server certificates Learn more about this project.

Trusted Geolocation in the Cloud

A way to determine the physical location of cloud computing servers to monitor and control workloads, anticipate and mitigate risks, and reduce the likelihood that unauthorized parties will obtain data. Learn more about this project.

Zero Trust Architecture

Supports a design approach to architecting an information technology environment that could reduce an organization’s risk exposure in a “perimeterless” world. Learn more about this project.