NIST SP 800-124r2 Guidelines for Managing the Security
May 2023 of Mobile Devices in the Enterprise
50
[41] Souppaya MP, Scarfone KA (2022) Guide to Enterprise Patch Management Planning:
Preventive Maintenance for Technology. (National Institute of Standards and Technology,
Gaithersburg, MD), NIST Special Publication (SP) 800-40, Rev. 4.
https://doi.org/10.6028/NIST.SP.800-40r4
[42] Scarfone KA, Jansen W, Tracy MC (2008) Guide to General Server Security. (National
Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP)
800-123. https://doi.org/10.6028/NIST.SP.800-123
[43] Souppaya MP, Scarfone KA, Dodson DF (2022) Secure Software Development
Framework (SSDF) Version 1.1: Recommendations for Mitigating the Risk of Software
Vulnerabilities. (National Institute of Standards and Technology, Gaithersburg, MD),
NIST Special Publication (SP) 800-218. https://doi.org/10.6028/NIST.SP.800-218
[44] Barker EB, Dang QH, Frankel SE, Scarfone KA, Wouters P (2020) Guide to IPsec VPNs.
(National Institute of Standards and Technology, Gaithersburg, MD), NIST Special
Publication (SP) 800-77, Rev. 1. https://doi.org/10.6028/NIST.SP.800-77r1
[45] Frankel SE, Hoffman P, Orebaugh AD, Park R (2008) Guide to SSL VPNs. (National
Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP)
800-113. https://doi.org/10.6028/NIST.SP.800-113
[46] Petersen R, Santos D, Wetzel KA, Smith MC, Witte GA (2017) Workforce Framework for
Cybersecurity (NICE Framework). (National Institute of Standards and Technology,
Gaithersburg, MD), NIST Special Publication (SP) 800-181, Rev. 1.
https://doi.org/10.6028/NIST.SP.800-181r1
[47] Souppaya MP, Scarfone KA (2016) Draft NIST SP 800-154, Guide to Data-Centric
System Threat Modeling. (National Institute of Standards and Technology, Gaithersburg,
MD), Draft NIST Special Publication (SP) 800-154. Available at
http://csrc.nist.gov/publications/drafts/800-154/sp800_154_draft.pdf
[48] Souppaya MP, Scarfone KA (2016) Guide to Enterprise Telework, Remote Access, and
Bring Your Own Device (BYOD) Security. (National Institute of Standards and
Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-46, Rev. 2.
https://doi.org/10.6028/NIST.SP.800-46r2
[49] Franklin J, Howell G, Boeckl K, Lefkovitz N, Nadeau E, Shariati B, Ajmo J, Brown C,
Dog S, Javar F, Peck M, Sandlin K (2020) Mobile Device Security: Corporate-Owned
Personally-Enabled (COPE) (National Institute of Standards and Technology,
Gaithersburg, MD), NIST Special Publication (SP) 1800-21.
https://doi.org/10.6028/NIST.SP.1800-21
[50] Boeckl K, Grayson N, Howell G, Lefkovitz N, Ajmo J, McGinnis M, Sandlin K, Slivina
O, Snyder J, Ward P (2022) Mobile Device Security: Bring Your Own Device (BYOD)
(National Institute of Standards and Technology, Gaithersburg, MD), Second Draft NIST
Special Publication (SP) 1800-22. Available at
https://www.nccoe.nist.gov/sites/default/files/2022-11/mdse-nist-sp1800-22-draft-2.pdf
[51] Rose SW, Borchert O, Mitchell S, Connelly S (2020) Zero Trust Architecture. (National
Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP)
800-207. https://doi.org/10.6028/NIST.SP.800-207