NIST SP 800-53: SC-2 Application Partitioning 3.13 3.13.3 System and Communications Protection
This special publication from NIST provides guidance on application partitioning.
This special publication from NIST provides guidance on application partitioning.
This special publication from NIST provides an overview of session authenticity.
NIST resource that define requirements for proper protection of information at rest (e.g, encryption, off-line storage, physical protection)
The information system: a. Monitors and controls communications at the external boundary of the system and at key internal boundaries within the system; b. Implements subnetworks for publicly accessible system components that are [Selection: physically; logically] separated from internal organizational networks; and c. Connects to external networks or information systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security architecture.
This publication describes VOIP, its security challenges, and potential countermeasures for related vulnerabilities.
This NIST Special Publication offers recommendations for designing, configuring, and managing IPSec VPN solutions.
This NIST Special Publication provides an understanding on integrating information security practices into service oriented architecture design and development based on Web services.
This policy describes the need to prevent unauthorized and unintended information transfer via shared system resource on NC information systems. See section SC-4 - Information in Shared Resources.
This article describes the security guidelines for mobile code.
The Mobile Security Testing Guide, a part of the Open Web Application Security Project (OWASP), is aimed at providing a comprehensive testing standard for mobile app security.