- NIST Special Publication (SP) 800-61 Rev. 3, Incident Response . . .
This publication seeks to assist organizations with incorporating cybersecurity incident response recommendations and considerations throughout their cybersecurity risk management activities as described by the NIST Cybersecurity Framework (CSF) 2 0 Doing so can help organizations prepare for incident responses, reduce the number and impact of incidents that occur, and improve the efficiency
- NVD - CVE-2025-55182
NVD enrichment efforts reference publicly available information to associate vector strings CVSS information contributed by other sources is also displayed
- NVD - Products
CPE is a structured naming scheme for information technology systems, software, and packages Based upon the generic syntax for Uniform Resource Identifiers (URI), CPE includes a formal name format, a method for checking names against a system, and a description format for binding text and tests to a name
- NVD - General
The NVD is the U S government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP) This data enables automation of vulnerability management, security measurement, and compliance The NVD includes databases of security checklist references, security related software flaws, product names, and impact metrics Originally
- NVD - CVSS v3 Calculator
NVD MENU Information Technology Laboratory National Vulnerability Database Vulnerability Metrics CVSS Version 3 0 CVSS Version 3 1
- Hash Functions | CSRC | CSRC
Approved Algorithms | SHA-3 Derived Functions | Security Strengths | Testing Implementations Approved Algorithms A hash algorithm is used to map a message of arbitrary length to a fixed-length message digest Approved hash algorithms for generating a condensed representation of a message (message digest) are specified in two Federal Information Processing Standards: FIPS 180-4, Secure Hash
- NVD - Vulnerabilities
Here's how you know NVD MENU Information Technology Laboratory National Vulnerability Database
- OSCAL - Open Security Controls Assessment Language - NIST
The Open Security Controls Assessment Language (OSCAL) is a NIST-led initiative developed in collaboration with industry to modernize and automate the processes of security and compliance It provides open, machine-readable formats available in XML, JSON, and YAML that streamline control-based risk assessments By supporting automation, OSCAL dramatically reduces audit durations from months to
|