Information Technology Reference
In-Depth Information
Control
Reference
Description of
Applicability
a
Category/Document
CP
SP 800-43:
Systems Administration
Guidance for Securing Microsoft
Windows 2000 Professional System
CP
SP 800-41:
Guidelines on Firewalls and
Firewall Policy
CP
SP 800-34:
Contingency Planning Guide
for Information Technology Systems
CP
SP 800-25:
Federal Agency Use of Public
Key Technology for Digital Signatures
and Authentication
CP
SP 800-24:
PBX Vulnerability Analysis:
Finding Holes in Your PBX before
Someone Else Does
CP
SP 800-21, Rev 1:
Guideline for
Implementing Cryptography in the
Federal Government
CP
SP 800-14:
Generally Accepted Principles
and Practices for Securing Information
Technology Systems
CP
SP 800-13:
Telecommunications Security
Guidelines for Telecommunications
Management Network
CP
SP 800-12:
An Introduction to Computer
Security: The NIST Handbook
iA
identification and Authentication
IA
FIPS 201-1:
Personal Identity Verification
for Federal Employees and Contractors
IA
FIPS 200:
Security Controls for Federal
Information Systems
IA
FIPS 190:
Guideline for the Use of
Advanced Authentication Technology
Alternatives
IA
FIPS 140-2:
Security Requirements for
Cryptographic Modules