Software Engineering
Best Practices & Reference Documents

Release Date sort icon Title
2015 NIST Solicits Comments on its Electronic Authentica ...

NIST requests comments on SP 800-63-2, 

2015 NIST IR 8053 DRAFT De-Identification of Personally ...

NIST requests comments on an initial public draft report on NISTIR 8053, De-identification of personally Identifiable Information. This document describes terminology, process and procedur ...

2015 NIST SP 800-161 - Supply Chain Risk Management Prac ...

This publiciation (i) provides guidance to federal agencies on identifying, assessing, and mi ...

2014 DoDI 8500.01 and DoDI 8510.01

DoDI 8500.01, "Cybersecurity," replacing previous information assurance (IA) guidance.


DoDI 8510.01, "Risk Management Framework (RMF) for DoD Informa ...

2014 US-CERT Bulletins

Bulletins provide weekly summaries of new vulnerabilities. Patch information is provided when available.

2014 Managing Operational Resilience - SPRUCE / SEI

Organizations have invested a tremendous amount of resources in cybersecurity, yet cyber attackers continue to penetrate systems. An organization should pursue a strategic approach that balance ...

2013 Monitoring Software-Intensive System Acquisition (S ...

Effective program management requires maintaining an accurate understanding of a program's status, quickly identifying issues that threaten program objectives, and dealing with them efficie ...

2013 Agile at Scale (AAS) - SPRUCE / SEI

Agile practices have been used for well over a decade and have enjoyed much success and broad adoption in the commercial sector. But business and mission goals are larger than a single developm ...

2013 Safety-Critical (SC) Systems - SPRUCE / SEI

For safety-critical systems, failure may cause serious injury to people, damage to equipment, or environmental harm. As the needs for real-time and fail-safe performance become more stringent, ...

2010 Defense Acquisition Guidebook

The Defense Acquisition System exists to manage the Nation's investments in technologies, programs, and product support necessary to achieve the National Security Strategy and support the U ...