Information Technology Reference
In-Depth Information
Control 
Reference
Description of 
Applicability a
Category/Document
AU
SP 800-100: Information Security 
Handbook for Managers
AU
SP 800-92: Guide to Computer Security 
Log Management
AU
SP 800-89: Recommendation for 
Obtaining Assurances for Digital 
Signature Applications
AU
SP 800-86: Guide to Integrating Forensic 
Techniques into Incident Response
AU
SP 800-83: Guide to Malware Incident 
Prevention and Handling
AU
SP 800-72: Guidelines on PDA Forensics
AU
SP 800-68: Guidance for Securing 
Microsoft Windows XP Systems for IT 
Professionals: A NIST Security 
Configuration Checklist
AU
SP 800-66: An Introductory Resource 
Guide for Implementing the Health 
Insurance Portability and Accountability 
Act (HIPAA) Security Rule
AU
SP 800-57: Recommendation on Key 
Management
AU
SP 800-52: Guidelines on the Selection 
and Use of Transport Layer Security
AU
SP 800-49: Federal S/MIME V3 Client 
Profile
AU
SP 800-45: Guidelines on Electronic Mail 
Security
AU
SP 800-44: Guidelines on Securing Public 
Web Servers
AU
SP 800-42: Guideline on Network Security 
Testing
AU
SP 800-19: Mobile Agent Security
 
Search WWH ::




Custom Search