https://informationsecurityprogram.com/network-security-best-practices/
This article discusses best practices for network security such as network basics, network segmentation, and a network security checklist.
https://learn.microsoft.com/en-us/compliance/regulatory/offering-fips-140-2
This article from Microsoft speaks to Microsoft's approach to FIPS 140-2 validation.
https://learn.microsoft.com/en-us/previous-versions/tn-archive/cc700820(v=technet.10)
This article covers the design, deployment, and use of both network and host-based firewalls.
https://learn.microsoft.com/en-us/previous-versions/tn-archive/cc700828(v=technet.10)
This module helps you to select a suitable firewall product for your organization's perimeter network.
https://www.commoncriteriaportal.org/files/epfiles/st_vid10753-st.pdf
Section 6.4.2 Memory Management and Object Reuse explains how Microsoft Windows 10 builds this capability in.
https://learn.microsoft.com/en-us/windows/security/security-foundations/certification/validations/cc-windows11
This is the Windows 11 Common Criteria Evaluation report.
National Security Agency (NSA) / Cybersecurity and Infrastructure Security Agency (CISA) — Selecting and Hardening Remote Access VPN Solutions
3.13 3.13.7 System and Communications Protection
https://media.defense.gov/2021/Sep/28/2002863184/-1/-1/0/CSI_SELECTING-HARDENING-REMOTE-ACCESS-VPNS-20210928.PDF?utm
A focused advisory on VPN use and configuration best practices, which directly supports the split tunneling control.
https://www.networkworld.com/article/837985/lan-wan-what-is-transport-layer-security-protocol.html
This article provides a simple explanation of TLS, along with its use cases.
NIST – Implementation Guidance for FIPS PUB 140-2 and the Cryptographic Module Validation Program
3.13 3.13.11 System and Communications Protection
https://csrc.nist.gov/csrc/media/projects/cryptographic-module-validation-program/documents/fips140-2/fips1402ig.pdf
This NIST document is intended to provide programmatic guidance of the CMVP.
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-111.pdf
This NIST Special Publication provides recommendations to facilitate more efficient and effective storage encryption solution design, implementation, and management for Federal departments and agencies.