Cybersecurity Fundamentals

This page offers essential resources for safeguarding organizations within the Defense Industrial Base (DIB). Explore the top-10 high-value controls, learn about protecting sensitive data in the cloud, and access a wealth of tailored resources, benchmarks, policies, and guides. Additionally, access training material to dive deeper into some of the foundational elements of cybersecurity curated to help your organization stay ahead of the evolving cyber threat landscape and enhance your security posture.

Top 10 High Value Controls

The DIB SCC Task Force Working Group Top 10 high value controls are a set of prioritized controls that is used to enhance contractual and regulatory requirements. It builds additional rigor around specific foundational controls already required and additional rigor, specificity and/or inclusion of high-value Advanced Persistent Threat (APT) focused controls.

Protecting Data in the Cloud

The DIB SCC Cloud Working Group has developed frequently asked questions regarding cloud security. These FAQs are provided to assist organizations with implementing cloud solutions.

The Microsoft Cloud Services Working Group brought ND-ISAC members together with Microsoft subject matter experts to elaborate common challenges, understand features, and provide updates on Microsoft Cloud Services roadmap. The Microsoft Reference Identity Architecture for US Defense Industrial Base is a result of months of collaboration among the Microsoft Cloud Services Working Group. It provides the group’s consensus on common challenges coupled with guidance on potential ways to overcome those challenges.

Helpful Links

Resources

Benchmarks, Policies, and Guides

Training