Guidelines for Media Sanitization: NIST Publishes SP 800-88r2

NIST has released Special Publication (SP) 800-88r2 (Revision 2), Guidelines for Media Sanitization.

Media sanitization is a process that renders access to the target data on media infeasible for a given level of effort. This guide will assist organizations and system owners in setting up a media sanitization program with proper and applicable methods and controls for sanitization and disposal based on the sensitivity of their information.

Important revisions in this version compared to SP 800-88r1 (2014) are as follows:

  • The document’s focus has shifted from providing guidelines for hands-on sanitization decisions to maintaining the confidentiality of sensitive information by establishing an agency or enterprise media sanitization program as part of media disposal or reuse.
  • Program-focused guidelines now improve the alignment of media sanitization with cybersecurity standards (e.g., SP 800-53, ISO/IEC 27040), update certain sanitization methods to be in tune with the state of practice, and address trust establishment in the vendor’s implementation of sanitization techniques for clear and purge sanitization methods.
  • Apart from cryptographic erase (CE), which is commonly used across all encrypted media, all sanitization techniques and tool details have been replaced with recommendations to comply with IEEE 2883, NSA specifications, or an organizationally approved standard.
  • A focused set of guidelines have been added to the CE technique to expand the types of cryptographic keys that may be used for CE, consolidate content from different parts of text to a dedicated section, provide guidelines for key sanitization using the state of practice ISO/IEC 19790 zeroization, and clarify when the use of externally managed keys is potentially acceptable.
Read More

Materials Now Available: NCCoE DevSecOps Virtual Event

The National Cybersecurity Center of Excellence (NCCoE) hosted a virtual event on August 27, 2025, to discuss and gather feedback on the NCCoE Development, Security and Operations (DevSecOps) project.  

Recap: This virtual event focused on the preliminary draft of NIST Special Publication (SP) 1800-44, Secure Software Development, Security, and Operations Practices. Key discussion topics included an overview of the NCCoE project as well as an overview of the Secure Software Development Framework (SSDF). This event also featured two panel discussions focused on cybersecurity challenges and recommendations for software producers and consumers, and the use of AI and Zero Trust in DevSecOps. 

The feedback gathered during this event will help to shape the final version of NIST SP 1800-44.  

Post Event Materials Now Available! 

To access the event recording and slides from this event, please visit the NCCoE event page. To stay up to date on this project and contribute to future events, please consider joining the NCCoE DevSecOps Community of Interest (COI). 

View the Materials

Vulnerability in Nx (build system) Package Could Allow for Sensitive Data Exfiltration

A vulnerability has been discovered in Nx (build system) Package, which could allow for sensitive data exfiltration. Nx is a smart, fast, and extensible build system designed for managing monorepos efficiently by providing features like dependency graph analysis, computation caching, distributed task execution, and codebase upgrades. Successful exploitation of this vulnerability could allow threat actors to perform network reconnaissance and leak sensitive data.
Threat Intelligence
According to StepSecurity: Threat Actors have successfully injected malicious code into the Nx build system package and several related plugins to collect host information, cryptocurrency wallets, and development credentials.
Systems Affected
nx/devkit 21.5.0, 20.9.0
nx/enterprise 3.2.0
nx/eslint 21.5.0
nx/js 21.5.0, 20.9.0
nx/key 3.2.0
nx/node 21.5.0, 20.9.0
nx/workspace 21.5.0, 20.9.0
Risk
Government:
– Large and medium government entities: High
– Small government entities: Medium
Businesses:
– Large and medium business entities: High
– Small business entities: Medium
Home Users: Low
Recommendations
Review Stepsecurity.io immediate remediation steps. Apply appropriate updates provided by Nx or other vendors which use this software to vulnerable systems immediately after appropriate testing. Use vulnerability scanning to find potentially exploitable software vulnerabilities to remediate them.
Reference
CVE:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10894

Joint Guidance for Securing OT

The Cybersecurity and Infrastructure Security Agency, in collaboration with the Federal Bureau of Investigation, the United Kingdom’s National Cyber Security Centre, and other international partners, released new Joint Cybersecurity Guidance: Creating and Maintaining a Definitive View of Your Operational Technology (OT) Architecture.
Building on the recent Foundations for OT Cybersecurity: Asset Inventory Guidance for Owners and Operators, this guidance explains how organizations can leverage data sources, such as asset inventories, and manufacturer-provided resources, such as  software bill of materials , to establish and maintain an accurate, up-to-date view of their OT systems.
A definitive OT record enables organizations to conduct more comprehensive risk assessments, prioritize critical and exposed systems, and implement appropriate security controls. The guidance also addresses managing third-party risks, securing OT information, and designing effective architectural controls.
Key recommendations include:
Collaborating Across Teams: Foster coordination between OT and IT teams; Aligning with Standards: Follow international standards such as IEC 62443 and ISO/IEC 27001.
Organizations are encouraged to use this guidance to strengthen their OT security posture and reduce risks. For additional details, review the full guidance.
To learn more about developing an OT Asset Inventory, attend CISA’s webinar on September 30 at 2:00 p.m. (ET).

You’re Invited: NCCoE Mobile Driver’s License Project Update Webinar

Event Date/Time: October 21, 2025 | 10:30 a.m. – 11:30 a.m. ET 

The NCCoE is making progress in accelerating the adoption of mobile driver’s license (mDL) standards and best practices. Join us for a webinar where we’ll be sharing newly available project resources and announcing our second project use case. 

Discover the Latest mDL Project Updates 

During this virtual event, our mDL project team will provide an overview of recently published resources that can aid financial institutions in adopting mDLs to meet Know Your Customer (KYC) requirements.  

These resources include: 

  • Building Assurance in the mDL Ecosystem – This document highlights security and trust considerations related to the enrollment, issuance and presentation of mDLs and includes NIST 800-63-4 controls that can be applied to the MDL issuance ceremony. 
  • mDL Interaction Diagrams – These diagrams correspond to our previously published wireframes videos and illustrate how data flows between different components when a user interacts with our simulated bank using their mDL. 
  • Privacy Risk Assessment Methodology (PRAM) – This tool is designed to help organizations assess and prioritize privacy risks associated with mDLs. It provides a tailored version of the NIST PRAM, a widely used framework for managing privacy risk. 

The mDL Project team will also announce the start of the NCCoE’s second mDL project use case which will demonstrate how mDLs can support identity verification to facilitate secure access to government applications. 

Save your spot for this informative webinar and stay ahead of the curve in mDL adoption. 

Register Now! 

We encourage you to register for this informative virtual event to learn about the latest NCCoE mDL project publications – secure your spot today! 

Register Now!

Widespread Supply Chain Compromise Impacting npm Ecosystem

The Cybersecurity and Infrastructure Security Agency (CISA) released this Alert to provide guidance in response to a widespread software supply chain compromise involving the world’s largest JavaScript registry, npmjs.com. A self-replicating worm—publicly known as Shai-Hulud—has compromised over 500 packages.
After gaining initial access, the malicious cyber actor deployed malware that scanned the environment for sensitive credentials. The cyber actor then targeted GitHub Personal Access Tokens (PATs) and application programming interface (API) keys for cloud services, including Amazon Web Services (AWS), Google Cloud Platform (GCP), and Microsoft Azure.
The malware then:
Exfiltrated the harvested credentials to an endpoint controlled by the actor. Uploaded the credentials to a public repository named Shai-Hulud via the GitHub/user/repos API. Leveraged an automated process to rapidly spread by authenticating to the npm registry as the compromised developer, injecting code into other packages, and publishing compromised versions to the registry.
CISA urges organizations to implement the recommendations found in the alert to detect and remediate this compromise.
The following resources provide additional guidance on this compromise:
GitHub: Our plan for a more secure npm supply chain
Palo Alto Networks Unit 42: Shai-Hulud Worm Compromises npm Ecosystem in Supply Chain Attack (Updated September 18)
Socket: Updated and Ongoing Supply Chain Attack Targets CrowdStrike npm Packages
ReversingLabs: Malware found on npm infecting local package with reverse shell

The 2025 NY Metro Joint Cyber Security Conference


The 2025 NY Metro Joint Cyber Security Conference is in the planning stage, celebrating our 12th year featuring keynotes, panels and sessions aimed at educating everyone on the various aspects of information security and technology. Workshops featuring in-depth extended classroom-style educational courses to expand your knowledge and foster security discussions will take place virtually post-conference.

Call for speakers and sponsors in open.

You can find out more at InfoSecurity.NYC

Invitation to Attend KCFC 2025 – October 25 at Bluegrass Community and Technical College (BCTC)

AS a Member of the advisory board I invite you to the Kentucky Cybersecurity and Forensics Conference (KCFC 2025), scheduled for Saturday, October 25, 2025, at Bluegrass Community and Technical College in Lexington, Kentucky.

KCFC brings together academia, industry, and government to collaborate in building awareness of cybersecurity and digital forensics. The conference provides a platform for professionals, educators, and students to exchange ideas, share research, and discuss the latest trends and challenges in cybersecurity.

Registration is now open at www.Ky-cfc.com. Please see our tentative agenda for this event.

We look forward to your participation in this important event and your contribution to advancing our shared mission of fostering a stronger and more secure digital environment.

We hope to see you there!

Draft CSF 2.0 Quick-Start Guide on Emerging Cybersecurity Risks

NIST has released the initial public draft (IPD) of Special Publication (SP) 1331, Quick-Start Guide for Using CSF 2.0 to Improve the Management of Emerging Cybersecurity Risks, for public comment. The document highlights the topic of emerging cybersecurity risks and explains how organizations can improve their ability to address such risks through existing practices within the cyber risk discipline in conjunction with the NIST Cybersecurity Framework (CSF) 2.0. The guide also emphasizes the importance of integrating these practices with organizational enterprise risk management (ERM) to proactively address emerging risks before they occur. 

The comment period is open through September 21, 2025, at 11:59 PM. Please send your feedback about this draft publication to csf@nist.gov.

This publication is the most recent in a portfolio of CSF 2.0 Quick-Start Guides released since February 26, 2024. These resources provide different audiences with tailored pathways into the CSF 2.0 and make the Framework easier to put into action. View all CSF 2.0 quick-start guides here

Read the Quick-Start Guide

Recommendations for Key-Encapsulation Mechanisms: NIST Publishes SP 800-227

NIST has published the final version of Special Publication (SP) 800-227, Recommendations for Key-Encapsulation Mechanisms. A key-encapsulation mechanism (KEM) is a set of algorithms that can be used by two parties under certain conditions to securely establish a shared secret key over a public channel. This publication describes the basic definitions, properties, and applications of KEMs and provides recommendations for implementing and using KEMs securely.

NIST greatly appreciates all the feedback and discussion and has incorporated several updates to SP 800-227 based on the comments received. The public comment period on the initial public draft (IPD) was open through March 7, 2025, and the feedback received is now linked from the SP 800-227 publication details. NIST also held a virtual Workshop on Guidance for KEMs on February 25-26, 2025, to gather additional input on SP 800-227. Presentations and the recording of the workshop are available on the event web page.

Read More