Email Protections

This sections covers protections from attacks against the primary attack vector for malicious users, email. Implementation Assessment ATP – Safe Attachments, Safe Links, and Anti-Phishing Policies or “All the policies you can shake a stick at” (Edit) This blog...

Web Browser Protections

This section covers web browser protections from attacks by malicious actors. Implementation Assessment Avast – What is a Proxy Server? (Edit) This knowledge base article from Avast describes proxy servers. Cybersecurity & Infrastructure Security Agency...

Secure Communications

This section is intended to help organizations ensure confidentiality and integrity of data in transit. Implementation Assessment Amazon – How to protect data in transitThis article provides guidance on protecting data in transit in or out of the Amazon Web...

Network Engineering

This section addresses secure design and architecture of the organization’s network from both management and operational perspectives Implementation Assessment Cisco – CLI Book 2: Cisco ASA Series Firewall CLI Configuration Guide, 9.4This is guidance for Cisco...