Information Assurance Menu

About IA at NSA Partners Rowlett Awards Award Recipients Background Nomination Procedures Links IA Client and Partner Support IA News IA Events IA Mitigation Guidance Media Destruction Guidance Security Configuration Guides Applications Archived Guides Cisco Router Guides Database Servers Fact Sheets Industrial Control Systems (ICS) IPv6 Operating Systems Supporting Documents Switches VoIP and IP Telephony Vulnerability Technical Reports Wireless System Level IA Guidance TEMPEST Overview TEMPEST Products: Level I Certified Confirmed Deficiencies Suspended Terminated No Longer Produced TEMPEST Products: Level II Certified Confirmed Deficiencies Suspended Terminated No Longer Produced TEMPEST Company POCs Certified Suspended Terminated Trusted Computing IA Academic Outreach National Centers of Academic Excellence in IA Education Colloquium Institutions SEAL Program IA Courseware Evaluation Program Institutions Student Opportunities IA Business and Research IA Business Affairs Office Certified Product Sales and Support Commercial COMSEC Evaluation Program Commercial Satellite Protection Program Independent Research and Development Program User Partnership Program Partnerships with Industry NIAP and COTS Product Evaluations IA Programs Commercial Solutions for Classified Program Global Information Grid High Assurance Platform HAP Technology Overview HAP Technology Partner Program HAP Resource Library Inline Media Encryptor Suite B Cryptography NSA Mobility Program IA Careers Contact Information
.
Skip Search Box

Fact Sheets

Our fact sheets cover a wide variety of topics that provide information, discuss technology options, and provide recommendations.

Products that have aged, been superceded, or are no longer used are available in the Archived Security Guides section.

Fact Sheets Last Reviewed File Size Revised
Hardening Network Infrastructure Security Recommendations for System Accreditors May 2013 321KB May 2013
Building Web Applications Security Recommendations for Developers April 2013 260KB April 2013
Application Whitelisting Jan 2013 328KB Jan 2013
Configuring Windows To Go as a Mobile Desktop Solution Nov 2012 3197K Nov 2012
Securing Data and Handling Spillage Events Oct 2012 443K Oct 2012
Mobile Device Management: A Risk Discussion for IT Decision Makers Aug 2012 756KB Aug 2012
Mobile Device Management: Capability Gaps for High-Security Use Cases Aug 2012 738KB Aug 2012
Defending Against Compromised Certificates July 2012 365KB July 2012
Mitigation Monday #3: Defense Against Malware on Removable Media June 2012 1.01MB June 2012
New Smartphones and the Risk Picture June 2012 315KB Apr 2012
Security Tips for Personally-Managed Apple iPhones and iPads June 2012 513KB Jan 2012
Protect Against Cross Site Scripting (XSS) Attacks June 2012 373KB Nov 2011
Enforcing No Internet or E-mail from Privileged Accounts June 2012 852KB June 2011
Hardening Authentication Factsheet Aug 2012 755KB Sep 2012
Host Protection Technology Study June 2012 9969KB Apr 2011
Best Practices for Securing a Home Network July 2013 414KB July 2013
Unified Communications (UC) Technical Primer June 2012 481KB Jan 2011
Securing Supervisory Control and Data Acquisition (SCADA) and Control Systems (CS) June 2012 107KB Feb 09
So Your Boss Bought you a New Laptop...How do you identify and disable wireless capabilities June 2012 883KB May 07

 

 

Date Posted: Jan 15, 2009 | Last Modified: July 11, 2013 | Last Reviewed: July 11, 2013

 
bottom