Information Technology Reference
In-Depth Information
Control 
Reference
Description of 
Applicability a
Category/Document
RA
SP 800-59: Guideline for Identifying an 
Information System as a National 
Security System
RA
SP 800-53A: Guide for Assessing the 
Security Controls in Federal Information 
Systems
RA
SP 800-51: Use of the Common 
Vulnerabilities and Exposures (CVE) 
Vulnerability Naming Scheme
RA
SP 800-48: Wireless Network Security: 
802.11, Bluetooth, and Handheld 
Devices
RA
SP 800-46: Security for Telecommuting 
and Broadband Communications
RA
SP 800-45: Guidelines on Electronic Mail 
Security
RA
SP 800-44: Guidelines on Securing Public 
Web Servers
RA
SP 800-42: Guideline on Network Security 
Testing
RA
SP 800-40, Ver 2: Creating a Patch and 
Vulnerability Management Program
RA
SP 800-40: Procedures for Handling 
Security Patches
RA
SP 800-37: Guidelines for the Security 
Certification and Accreditation of 
Federal Information Technology Systems
RA
SP 800-36: Guide to Selecting Information 
Technology Security Products
RA
SP 800-34: Contingency Planning Guide 
for Information Technology Systems
RA
SP 800-32: Introduction to Public Key 
Technology and the Federal PKI 
Infrastructure
 
Search WWH ::




Custom Search