Information Assurance Menu

About IA at NSA Partners Rowlett Awards Award Recipients Background Nomination Procedures Links IA Client and Partner Support IA News IA Events IA Mitigation Guidance Media Destruction Guidance Security Configuration Guides Applications Archived Guides Cisco Router Guides Database Servers Fact Sheets Industrial Control Systems (ICS) IPv6 Operating Systems Supporting Documents Switches VoIP and IP Telephony Vulnerability Technical Reports Wireless System Level IA Guidance TEMPEST Overview TEMPEST Products: Level I Certified Confirmed Deficiencies Suspended Terminated No Longer Produced TEMPEST Products: Level II Certified Confirmed Deficiencies Suspended Terminated No Longer Produced TEMPEST Company POCs Certified Suspended Terminated Trusted Computing IA Academic Outreach National Centers of Academic Excellence in IA Education Colloquium Institutions SEAL Program IA Courseware Evaluation Program Institutions Student Opportunities IA Business and Research IA Business Affairs Office Certified Product Sales and Support Commercial COMSEC Evaluation Program Commercial Satellite Protection Program Independent Research and Development Program User Partnership Program Partnerships with Industry NIAP and COTS Product Evaluations IA Programs Commercial Solutions for Classified Program Global Information Grid High Assurance Platform HAP Technology Overview HAP Technology Partner Program HAP Resource Library Inline Media Encryptor Suite B Cryptography NSA Mobility Program IA Careers Contact Information
.
Skip Search Box

NSA Part of Consortium of Cybersecurity Experts That Establishes Baseline Standard of Due Care for Cybersecurity--The Top Twenty Most Critical Controls

According to a Press Release dated February 23, 2009 and released by a consortium of federal agencies and private organizations, including NSA, Version 1 of the Consensus Audit Guidelines (CAG) is now available for public review. The guidelines "define the most critical security controls to protect federal and contractor information and information systems." The CAG initiative is part of a larger effort housed at the Center for Strategic and International Studies (CSIS) in Washington, D.C., "to advance key recommendations from the CSIS Commission report on Cybersecurity for the 44th Presidency."

 

Date Posted: Nov 19, 2009 | Last Modified: Nov 19, 2009 | Last Reviewed: Nov 19, 2009

 
bottom