Secure Communications

This section is intended to help organizations ensure confidentiality and integrity of data in transit. Implementation Assessment Amazon – How to protect data in transitThis article provides guidance on protecting data in transit in or out of the Amazon Web...

Network Engineering

This section addresses secure design and architecture of the organization’s network from both management and operational perspectives Implementation Assessment Cisco – CLI Book 2: Cisco ASA Series Firewall CLI Configuration Guide, 9.4This is guidance for Cisco...

Incident Response Exercises

Scheduled and unscheduled drills of security professionals and other stakeholders are an important way to ensure your organization has tested its incident response plans. Examples of such drills include table top exercises, simulated events, etc. Implementation...

Incident Response Management

This section includes processes and tools used for incident management as well as roles and responsibilities. Implementation Assessment SANS – Password Construction GuidelinesPasswords are a critical component of information security. Passwords serve to protect...

Insider Threat Awareness

NIST indicates that potential indicators and possible precursors of insider threat can include behaviors such as inordinate, long-term job dissatisfaction, attempts to gain access to information not required for job performance, unexplained access to financial...

Security Awareness and System Administrator Training

NIST points out that Security Awareness and System Administrator training helps explain proper rules of behavior for the use of agency information systems and information. The program communicates information technology (IT) security policies and procedures that need...