https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-95.pdf
This NIST Special Publication provides an understanding on integrating information security practices into service oriented architecture design and development based on Web services.
https://files.nc.gov/ncdit/documents/Statewide_Policies/SCIO_System_and_Communications_Protection.pdf
This policy describes the need to prevent unauthorized and unintended information transfer via shared system resource on NC information systems. See section SC-4 - Information in Shared Resources.
https://owasp.org/www-community/vulnerabilities/Unsafe_Mobile_Code
This article describes the security guidelines for mobile code.
https://owasp.org/www-project-mobile-security-testing-guide/
The Mobile Security Testing Guide, a part of the Open Web Application Security Project (OWASP), is aimed at providing a comprehensive testing standard for mobile app security.
https://www.paloaltonetworks.com/cyberpedia/what-is-network-segmentation
Defines network segmentation and the difference between logical and physical network segmentation and the use cases for it.
https://www.rev.com/blog/marketing/follow-these-7-video-conferencing-security-best-practices
This article describes several video conferencing security best practices.
https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blt0759f19972ec623e/5e9dd1fa33f6b8718946a2b9/acceptable_encryption_policy.pdf
This sample policy from SANS provides guidance that limits the use of encryption to those algorithms that have received substantial public review and have been proven to work effectively.
https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/bltc02245a703a85933/5e9de009674ec260f325c3d6/end_user_encryption_key_protection_policy.pdf
This SANS provided policy outlines the requirements for protecting encryption keys that are under the control of end users.
https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blt957812312514f63a/5e9df9554c47dc64d2a649d0/remote_access_policy.pdf
This sample policy provided by SANS can be customized and used to address remote access.
https://www.sans.org/media/score/checklists/FirewallChecklist.pdf
This SANS checklist provides a generic listing of security considerations to be used when auditing the technical aspects of a firewall.