Practice Guide
Data Integrity: Identifying and Protecting Assets Against Ransomware and Other Destructive Events NIST SP 1800-25 Practice Guide Draft
Authors
Jennifer Cawthra, Michael Ekstrom, Lauren Lusty, Julian Sexton, John Sweetnam, Anne Townsend
Files
Executive SummaryDocument Version
Executive Summary
Approach, Architecture, and Security CharacteristicsDocument Version
Approach, Architecture, and Security Characteristics
How-To GuidesDocument Version
How-To Guides
All VolumesDocument Version
All Volumes