Information Technology Reference
In-Depth Information
Control
Reference
Description of
Applicability
a
Category/Document
PE
SP 800-100:
Information Security
Handbook for Managers
PE
SP 800-96:
PIV Card/Reader
Interoperability Guidelines
PE
SP 800-92:
Guide to Computer Security
Log Management
PE
SP 800-86:
Guide to Integrating Forensic
Techniques into
Incident Response
PE
SP 800-78:
Cryptographic Algorithms and
Key Sizes for Personal Identity
Veriication
PE
SP 800-76:
Biometric Data Specification
for Personal Identity Verification
PE
SP 800-73, Rev 1:
Integrated Circuit Card
for Personal Identification Verification
PE
SP 800-66:
An Introductory Resource
Guide for Implementing the Health
Insurance Portability and Accountability
Act (HIPAA) Security Rule
PE
SP 800-58:
Security Considerations for
Voice Over IP Systems
PE
SP 800-24:
PBX Vulnerability Analysis:
Finding Holes in Your PBX before
Someone Else Does
PE
SP 800-14:
Generally Accepted Principles
and Practices for Securing Information
Technology Systems
PE
SP 800-12:
An Introduction to Computer
Security: The NIST Handbook
pl
planning
PL
FIPS 199:
Standards for Security
Categorization of Federal Information
and Information Systems