﻿{
  "title": "NIST Draft Publications Open for Comment",
  "subtitle": "Many of NIST's cybersecurity and privacy publications are posted as drafts for public comment. Comment periods are still open for the following publications. Visit the links for downloads, related content, and instructions for submitting comments. Your thoughtful reviews and comments are greatly appreciated and help us to improve our standards and guidance.",
  "updated": "2026-04-04T05:00:49.9357413-04:00",
  "id": "https://csrc.nist.gov/csrc/media/feeds/pubs/drafts-open-for-comment.xml",
  "link": "https://csrc.nist.gov/publications/drafts-open-for-comment",
  "entries": [
    {
      "id": "https://csrc.nist.gov/pubs/other/2026/03/24/devsecops-practices/iprd",
      "title": "Other Secure Software Development, Security, and Operations (DevSecOps) PracticesInitial Preliminary Draft",
      "summary": "<p>The NIST National Cybersecurity Center of Excellence (NCCoE) is releasing this live document as part of its Secure Software Development, Security, and Operations (DevSecOps) project. This project demonstrates how organizations can implement the security practices and tasks recommended in the <a data-csrc-link=\"true\" data-node-guid=\"92b05c5d-001d-4ef5-920f-f6c7bbab7c05\" href=\"/Projects/ssdf\">NIST Secure Software Development Framework</a> (SSDF) using modern DevSecOps pipelines and commercially available technology. The live document is open for public comment until <b>April 24, 2026.</b><o></o></p>\n<p>This release provides several components of the NCCoE DevSecOps demonstration, including:<o></o></p>\n<ol>\n<li>An updated <a href=\"https://pages.nist.gov/nccoe-devsecops/executive-summary.html#executive-summary\">Executive Summary and Introduction</a>, highlighting the purpose and background of this project.<o></o></li>\n<li>A <a href=\"https://pages.nist.gov/nccoe-devsecops/notational-reference-model.html\">notional reference model</a> for DevSecOps to demonstrate the NIST SSDF.<o></o></li>\n<li>Details on the <a href=\"https://pages.nist.gov/nccoe-devsecops/example-implementations.html\">first example implementation</a>, which demonstrates DevSecOps practices in a Microsoft Azure-based environment.<o></o></li>\n<li>An <a href=\"https://pages.nist.gov/nccoe-devsecops/appendix-c.html\">appendix</a> highlighting industry collaborators in the project and their technologies used in the demonstration environment.<o></o></li>\n</ol>\n<h5><b>Background</b><o></o></h5>\n<p>The live document shares findings from the NCCoE's collaborative, demonstrative applied research project with 14 technology companies, who contributed technologies, expertise, and operational insights. This project demonstrates and documents practical approaches for integrating SSDF practices into modern DevSecOps pipelines using commercially available technologies. By automating and standardizing security considerations throughout the development lifecycle, the project aims to help organizations improve efficiency, strengthen software supply chain security, and provide greater assurance that secure software development practices are consistently applied.<o></o></p>\n<p>As part of NIST&rsquo;s response to&nbsp;<a href=\"https://www.whitehouse.gov/presidential-actions/2025/06/sustaining-select-efforts-to-strengthen-the-nations-cybersecurity-and-amending-executive-order-13694-and-executive-order-14144/\">Executive Order (EO) 14306</a>,&nbsp;<i>Sustaining Select Efforts to Strengthen the Nation's Cybersecurity and Amending Executive Order 13694 and Executive Order 14144</i>, this project will showcase examples of secure software development practices that fundamentally bolster the security of DevSecOps practices by implementing the SSDF's recommendations.<o></o></p>\n<h5><b>Next Steps</b><o></o></h5>\n<p>Unlike traditional static publications, this live document will be updated on a rolling basis with additional implementations and technical findings as the work with collaborators in the laboratory continues. In the coming months, the NCCoE will publish use case scenarios for the initial example implementation, as well as details on other example implementations showcasing several development platforms and tools. The NCCoE will also release an analysis that decomposes NIST SSDF practices and tasks into more granular and actionable tasks, illustrating their application within the project's DevSecOps model.<o></o></p>",
      "published": "2026-03-24T00:00:00",
      "updated": "2026-03-24T00:00:00",
      "link": "https://csrc.nist.gov/pubs/other/2026/03/24/devsecops-practices/iprd",
      "content": "Comments Due 04/24/2026"
    },
    {
      "id": "https://csrc.nist.gov/pubs/sp/1347/ipd",
      "title": "SP 1347, NIST Cybersecurity Framework 2.0: Informative References Quick-Start GuideInitial Public Draft",
      "summary": "<p>The Initial Public Draft of SP 1347, <em>NIST Cybersecurity Framework 2.0:&nbsp;</em><i>Informative References</i> <i>Quick‑Start Guide, </i>explains what informative references are and how they support achieving the outcomes of the NIST Cybersecurity Framework (CSF) 2.0. The guide also introduces readers to NIST tools available for accessing, viewing, and using informative references for cybersecurity risk management, including direct download, the CSF 2.0 Reference Tool, and the Online Informative References Program. The draft contains two sample use cases and provides an overview of how artificial intelligence tools can support reference data use.<i><o></o></i></p>",
      "published": "2026-03-23T00:00:00",
      "updated": "2026-03-23T00:00:00",
      "link": "https://csrc.nist.gov/pubs/sp/1347/ipd",
      "content": "Comments Due 05/06/2026"
    },
    {
      "id": "https://csrc.nist.gov/pubs/sp/1800/42/ipd",
      "title": "SP 1800-42, Digital Identities – Mobile Driver’s License (mDL): Accelerating Development and Adoption of Digital Identity for Financial InstitutionsInitial Public Draft",
      "summary": "<p>Today, the NCCoE published technical resources to help financial institutions use mobile driver&rsquo;s licenses (mDLs) for customer identification. NIST Special Publication 1800-42 ipd provides an updated reference architecture, implementation details, and key findings from the project. <o></o></p>\n<p>Compared to physical driver&rsquo;s licenses, mobile driver&rsquo;s licenses (mDLs) are easier to use for digital transactions and offer improved protections against fraud, identity theft, and unauthorized access. The NCCoE&rsquo;s technology demonstration is tackling the security, privacy, and interoperability issues with mDLs. <!-- [if !supportAnnotations]--><!--[endif]-->&nbsp;<o></o></p>\n<p>This publication reflects insights from industry collaborators and lessons learned by developing a functional online demonstration using mDLs for customer identification. The publication provides a practical roadmap to enable adoption and implementation of mDLs for online financial management.</p>\n<h4>Feedback</h4>\n<p>You can improve this guide by contributing feedback. As an initial public draft, this document intends to&nbsp;gain critical feedback from stakeholders across government and industry on the implementation of mDL to support Customer Identification Programs and high assurance use cases more broadly. Comments are&nbsp;welcome on all aspects of this document and specifically encouraged on the following areas:</p>\n<ol>\n<li><strong>Implementation and Adoption Challenges.</strong> This document highlights challenges to the adoption of mDL technology learned through engagement with collaborators and stakeholders spanning technology providers, financial institutions, standards bodies and government agencies. However, additional insights on barriers to adoption can help focus the project and future&nbsp;phases of work and NIST&rsquo;s engagement with standards development organizations.</li>\n<li><strong>Regulatory and Compliance Alignment.</strong> This document offers insights into the ways in which mDL online presentation aligns with existing regulatory structures. Additional insights on other regulatory mappings, views on the degree to which alignment is achieved, and suggested&nbsp;clarifications are encouraged.</li>\n<li><strong>Technology Transfer and Resources.</strong> This document as well as supporting resources are&nbsp;intended to aid in implementation of the technology in real world environments. The project team is highly interested in additional resources and tools which may further aid in both technical implementation and broader adoption of the technology.</li>\n<li><strong>Threats and Threat Model. </strong>The threat model proposed here is intended to act as a starting&nbsp;point for members of the ecosystem to identify and prepare for how attacks may shift in an mDL environment. Input on approach, specific threats, and mitigations will be highly valuable in&nbsp;maturing this view and providing greater visibility into future risks.&nbsp;</li>\n</ol>",
      "published": "2026-03-18T00:00:00",
      "updated": "2026-03-18T00:00:00",
      "link": "https://csrc.nist.gov/pubs/sp/1800/42/ipd",
      "content": "Comments Due 05/08/2026"
    }
  ]
}