The U.S. National Institute of Standards and Technology’s Computer Security Resource Center published security control baselines and a privacy control baseline for federal government systems. The baselines were updated following a 2017 interagency review and ongoing analysis of cyberattack data.
NIST: Control Baselines for Information Systems and Organizations

CIPM, CIPP/A, CIPP/C, CIPP/E, CIPP/G, CIPP/US, CIPT
Credits: 2
Related Stories
White Paper – The Skill Set Needed to Implement the NIST Privacy Framework
To offer insight into the professional skillset needed to implement the NIST Privacy Framework, the International Association of Privacy Professionals’ Westin Research Center mapped the Privacy Framework’s Core to the Body of Knowledge for a Certified Information Privacy Manager....
Web Conference: NIST’s New Privacy Framework: Everything You Need to Know
Original broadcast date: February 6, 2020
Join us for this informational web conference where we'll look at practical ways to implement NIST's new framework into your privacy program and how your organizations can enable better privacy engineering practices in support of privacy-by-design concepts....
NIST Blockchain Technology Overview
The U.S. National Institute of Standards and Technology published this document providing a high-level technical overview of blockchain technology. The purpose is to help readers understand how blockchain technology works.
Click to View (PDF)...
NIST Framework for Improving Critical Infrastructure Cybersecurity
This document, published by the National Institute of Standards and Technology, focuses on using business drivers to guide cybersecurity activities and considering cybersecurity risks as part of an organization’s risk management processes. The framework consists of three parts: the framework core, t...
Web Conference: Digital Identity and Privacy: An Update on the NIST Digital Identity Guidelines
Original broadcast date: December 20, 2017
These new guidelines are a robust overhaul of the previous version and, importantly, they explicitly include privacy requirements alongside security requirements. Of value to both privacy and security professionals, it is anticipated that the guidelines wi...