Amazon – How to protect data in transit 3.13 3.13.8 csc12 csc7 csc9 System and Communications Protection
This article provides guidance on protecting data in transit in or out of the Amazon Web Services (AWS) environment.
This article provides guidance on protecting data in transit in or out of the Amazon Web Services (AWS) environment.
This Confluence page identifies the top 10 secure coding practices from the SEI CERT Coding Standards.
This is a summary page for the 140+ configuration guidelines for various technology groups to safeguard systems developed by CIS.
This is guidance for Cisco on how to control network access by using ASA rules on how to configure your firewalls.
This article describes the ways to secure webcams to prevent spying.
This sample document serves as an example network firewall implementation policy to help protect internal networks and manage traffic in and out of the network.
In this paper the authors propose virtually partitioning the execution of applications, and adapting the defenses being deployed based on the executing partition.
This abstract paper from Cornell introduces the Swift system, a way to write web applications that are secure by construction.
This document provides techniques and procedures for the secure use of Voice over Internet Protocol (VoIP) within the Department of Homeland Security (DHS) Information Technology (IT) Program. It is published as an Attachment to the DHS 4300A Sensitive Systems Handbook, which is based on DHS Sensitive Systems Policy Directive 4300A.
Web Content Filtering (WCF) provides protection at the application layer for web traffic by blocking access to suspicious websites, preventing malware from running on systems and networks, and detecting and blocking phishing attempts as well as malicious web content.