An official website of the United States government
Here's how you know

Official websites use .gov

A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS

A lock (lock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Home Logo: National Security Agency I Central Security Service Home
National Security Agency/Central Security Service
NSA/CSS
Search
Search
Search
  • About
    • Leadership
    • Mission & Combat Support
    • Cybersecurity
    • Signals Intelligence
    • Central Security Service
    • Locations
    • Research
    • Cybersecurity Collaboration Center
      • Collaborative Partnerships
      • DIB Cybersecurity Services
      • Standards and Certifications
      • Artificial Intelligence Security Center
  • Press Room
    • Press Releases & Statements
    • News & Highlights
    • Podcast
    • Declassification & Transparency Initiatives
    • Cybersecurity Advisories & Guidance
    • Telework and Mobile Security Guidance
    • DoD Microelectronics Guidance
    • Research Publications
  • Careers
  • History
    • National Cryptologic Museum
    • Cryptologic History
    • National Cryptologic Memorial

  • Upload Date
  • Document Date
  • Title
ESF: Securing the Software Supply Chain: Recommended Practices for Software Bill of Materials Consumption

ESF: Securing the Software Supply Chain: Recommended Practices for Software Bill of Materials Consumption

CTR: DoD Microelectronics: NSA Evaluation of Commercially  Available Embedded FPGAs
U/OO/217325-23
PP-23-3645
Version 1.1 | December 2023

CTR: DoD Microelectronics: NSA Evaluation of Commercially Available Embedded FPGAs

Personal Assistance Services (PAS) Business Rules

Personal Assistance Services (PAS) Business Rules

APPLICANT REASONABLE ACCOMMODATION REQUEST

APPLICANT REASONABLE ACCOMMODATION REQUEST

CSI: Advancing Zero Trust Maturity Throughout the Device Pillar
U/OO/214644-23 | PP-23-3606 | OCT 2023 Ver. 1.0

CSI: Advancing Zero Trust Maturity Throughout the Device Pillar

Phishing Guidance: Stopping the Attack Cycle at Phase One. Cybersecurity Information Sheet.

CSI: Phishing Guidance: Stopping the Attack Cycle at Phase One

Improving Security of Open Source Software in Operational Technology and Industrial Control. Cybersecurity Information Sheet.

CSI: Improving Security of Open Source Software in Operational Technology and Industrial Control

Joint CSA: NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations
U/OO/208840-23 | PP-23-3322 | OCT 2023 Ver. 1.0

Joint CSA: NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations

ESF: Identity and Access Management: Developer and Vendor Challenges

ESF: Identity and Access Management: Developer and Vendor Challenges

Procurement and Acceptance Testing Guide for
Servers, Laptops, and Desktop Computers
U/OO/205637-23 | PP-23-2954 | SEP 2023 Ver. 1.0

CSI: Procurement and Acceptance Testing Guide for Servers, Laptops, and Desktop Computers

People's Republic of China-Linked Cyber Actors Hide in Router Firmware
U/OO/205179-23 | PP-23-3215 | SEP 2023 Ver. 1.0

CSA: People's Republic of China-Linked Cyber Actors Hide in Router Firmware

U/OO/199197-23 | PP-23-3076 | SEP 2023 Ver. 1.0

CSI: Contextualizing Deepfake Threats to Organizations

Infamous Chisel Malware Analysis Report
Version 1.0 | August 31, 2023

CSA: Infamous Chisel Malware Analysis Report

CTR: Cisco Firepower Hardening Guide

CTR: Cisco Firepower Hardening Guide

Joint CSA: Preventing Web Application Access Control Abuse
Version 1.0 | 27 July 2023
Product ID: AA23-208A

CSA: Preventing Web Application Access Control Abuse

ESF: 5G Network Slicing: Security Considerations for Design, Deployment, and Maintenance

ESF: 5G Network Slicing: Security Considerations for Design, Deployment, and Maintenance

CSI: Defending Continuous Integration/Continuous Delivery (CI/CD) Environments

CSI: Defending Continuous Integration/Continuous Delivery (CI/CD) Environments

CSI: BlackLotus Mitigation Guide

CSI: BlackLotus Mitigation Guide

CSI: Harden Baseboard Management Controllers

CSI: Harden Baseboard Management Controllers

ESF: Identity & Access Management Slicksheet

ESF: Identity & Access Management Slicksheet

  • FIRST
  • 6
  • 7
  • 8 (current)
  • 9
  • 10
  • LAST
NSA.GOV
  • About
  • Leadership
  • Cybersecurity Collaboration
    Center
  • National Cryptologic Museum
  • Contact NSA
  • Accessibility
  • ABA Notice
  • Site Policies
CULTURE
  • Operating Authorities
  • Civil Liberties, Privacy, & Transparency Office
  • Compliance

  • General Counsel
  • NSA Inspector General
HELPFUL LINKS
  •  
  • NSA Freedom of Information Act
  • Privacy Act Requests
  • Request a Speaker
  • Prepublication Review
  • Media Inquiry
  • Frequently Asked Questions
  • Scams & Safety
  • Reasonable Accommodations Process
  • Personal Assistance Services
RESOURCES
  • Classified Materiel Conversion
  • Commercial Solutions for Classified Program (CSfC)​
  • Cryptographic Support Services
  • Media Destruction Guidance
  • NSA Open Source
RELATED LINKS
  • DNI.gov
  • Defense.gov
  • IC on the Record
  • Intelligence.gov
  • NSA.GOV
    • About
    • Leadership
    • Cybersecurity Collaboration Center
    • National Cryptologic Museum
    • Contact NSA
    • Accessibility
    • ABA Notice
    • Site Policies
  • CULTURE
    • Operating Authorities
    • Civil Liberties & Privacy
    • General Counsel
    • NSA Inspector General
  • HELPFUL LINKS
    • NSA Freedom of Information Act
    • Frequently Asked Questions
    • Privacy Act Requests
    • Request a Speaker
    • Prepublication Review
    • Media Inquiry
    • Scams & Safety
    • Reasonable Accommodations Process
    • Personal Assistance Services
  • RESOURCES
    • Commercial Solutions for Classified Material (CSFC)
    • Media Destruction Guidance
    • Classified Materiel Conversion
    • Cross Domain Services
    • NSA Open Source
    • NSA Exhibit Roadshow
  • RELATED LINKS
    • DNI.gov
    • Defense.gov
    • IC on the Record
    • Intelligence.gov
  • Privacy & Security     Links Disclaimer     Section 508     Web Policy     Plain Writing Act    DOD IG    No FEAR Act    Imagery Use    FOIA    Open GOV    Strategic Plan    USA.gov    Small Business Act    Site Map  
 
Hosted by Defense Media Activity - WEB.mil Veterans Crisis Line number. Dial 988 then Press 1