NIST Releases Final Version Of New Cybersecurity Recommendations For GovernmentNIST Releases Final Version Of New Cybersecurity Recommendations For Government
NIST Special Publication 800-53, "Recommended Security Controls for Federal Information Systems and Organizations," was released in draft form for public review in June
August 6, 2009
The National Institute of Standards and Technology (NIST) today released its final version of a publication which represents a major step toward building a unified information security framework for the entire federal government.
The document, NIST Special Publication 800-53, Recommended Security Controls for Federal Information Systems and Organizations, was released in draft form for public review in June.
"This final publication represents a solidification of the partnership between the Department of Defense, the Intelligence Community, and NIST and their efforts to bring common security solutions to the federal government and its support contractors," said Ron Ross, of NIST's computer security division. "The aim is to provide greater protection for federal information systems against cyber attacks."
Comments received from the public since June did not result in any major changes in the final publication, according to Ross.
Historically, information systems at civilian agencies have operated under different security controls than military and intelligence information systems. When complete, the unified framework will result in the defense, intelligence and civil communities using a common strategy to protect critical federal information systems and associated infrastructure.
A copy of the publication is available at www.csrc.nist.gov/publications/PubsSPs.html. For further background, see "NIST, DOD, Intelligence Agencies Join Forces to Secure U.S. Cyber Infrastructure," NIST Tech Beat, June 16, 2009.
Media Contact: Chad Boutin, [email protected], (301) 975-4261
Read more about:2009
Tricks to Boost Your Threat Hunting GameNov 06, 2023
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
Protecting Critical Infrastructure: The 2021 Energy, Utilities, and Industrials Cyber Threat Landscape Report
2021 Banking and Financial Services Industry Cyber Threat Landscape Report
5 Reasons To Move your PKI Deployment to the Cloud