Effective Date: January 03, 2022
Expiration Date: January 03, 2027
|| TOC | Preface | Chapter1 | Chapter2 | Chapter3 | Chapter4 | Chapter5 | Chapter6 | AppendixA | AppendixB | AppendixC | AppendixD | AppendixE | ALL ||
D.1 Office of Management and Budget (OMB) Memorandum M-04-04, E-Authentication Guidance for Federal Agencies, December 2003.
D.2 OMB Memorandum M-0524, Implementation of Homeland Security Directive (HSPD) 12.
D.3 OMB Memorandum M-06-16, Protection of Sensitive Agency Information.
D.4 NPD 1600.2 NASA Security Policy.
D.5 NPD 1600.3, Policy on Prevention of and Response to Workplace Violence.
D.6 NPR 1040, NASA Continuity of Operations Planning (COOP) Procedural Requirements.
D.7 NPR 1382, NASA Privacy Procedural Requirements.
D.8 NPR 1620.2, Physical Security Vulnerability.
D.9 NPR 1620.3, Physical Security Requirements for NASA Facilities and Property.
D.10 NPR 7120.5, NASA Space Flight Program and Project Management Requirements.
D.11 NPR 7120.7, NASA Information Technology and Institutional Infrastructure Program and Project Management Requirements.
D.12 NPR 7123.1, NASA Systems Engineering Processes and Requirements.
D.13 NPR 7150.2, NASA Software Engineering Requirements.
D.14 NPR 8831.2, Facilities Maintenance and Operation Management.
D.15 HSPD-20, National Continuity Policy, May 2007.
D.16 NIST SP 800-21, Guideline for Implementing Cryptography in the Federal Government.
D.17 NIST SP 800-30, Risk Management Guide for Information Technology Systems.
D.18 NIST SP 800-34, Contingency Planning Guide for Information Technology Systems.
D.19 NIST SP 800-47, Security Guide for Interconnecting Information Technology Systems.
D.20 NIST SP 800-55, Performance Measurement Guide for Information Security.
D.21 NIST SP 800-58, Security Considerations for. Voice Over IP Systems.
D.22 NIST SP 800-61, Computer Security Incident Handling Guide.
D.23 NIST SP 800-63, Electronic Authentication Guideline. NIST SP 800-64, Security Considerations in the System Development Life Cycle.
D.24 NIST SP 800-81, Secure Domain Name System (DNS) Deployment Guide.
D.25 NIST SP 800-83, Guide to Malware Incident Prevention and Handling.
D.26 NIST SP 800-88, Guidelines for Media Sanitization.
D.27 NIST SP 800-97, Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i.
D.28 NIST SP 800-171, Protecting Controlled Unclassified Information.
D.29 X.509 Certificate Policy for the U.S. Federal PKI Common Policy Framework, Federal Public Key Infrastructure Policy Authority.
D.30 FIPS Publication 140-2, Security Requirements for Cryptographic Modules.
D.31 FIPS Publication 199, Standards for Security Categorization of Federal Information and Information Systems.
D.32 FIPS Publication 201, Personal Identity Verification (PIV) of Federal Employees and Contractors.
| TOC | Preface | Chapter1 | Chapter2 | Chapter3 | Chapter4 | Chapter5 | Chapter6 | AppendixA | AppendixB | AppendixC | AppendixD | AppendixE | ALL |
|| NODIS Library | Legal Policies(2000s) | Search ||
This document does not bind the public, except as authorized by law or as incorporated into a contract. This document is uncontrolled when printed. Check the NASA Online Directives Information System (NODIS) Library to verify that this is the correct version before use: https://nodis3.gsfc.nasa.gov.