Email Protections

This sections covers protections from attacks against the primary attack vector for malicious users, email. Implementation Assessment ATP – Safe Attachments, Safe Links, and Anti-Phishing Policies or “All the policies you can shake a stick at” (Edit) This blog...

Web Browser Protections

This section covers web browser protections from attacks by malicious actors. Implementation Assessment Avast – What is a Proxy Server? (Edit) This knowledge base article from Avast describes proxy servers. Cybersecurity & Infrastructure Security Agency...

Software Management

The practice of software asset management involves managing, maintaining, and optimizing the purchase, deployment, maintenance, utilization, and disposal of applications within an organization. Implementation Assessment Aspera USU – 8 Best Practices for...

Hardware Management

Hardware asset management is the process of managing the components of computers, networks, and systems. This lifecycle process starts with acquisition, is maintained through maintenance, and completes with the hardware’s disposal. Implementation Assessment CIO...

Corrective Action Plans / POA&Ms

The Department of Homeland Security indicates that a Plan of Action and Milestones (POA&M) is mandated by the Federal Information Systems Management Act of 2002 (FISMA) as a corrective action plan for tracking and planning the resolution of information security...

System Security Plans

NIST describes that the purpose of the system security plan is to provide an overview of the security requirements of the system and describe the controls in place or planned for meeting those requirements. The system security plan also delineates responsibilities and...