NSA Telework and Mobile Security Guidance

 

End User Telework and Network Security Guides  |  NSA’s Top Ten Cybersecurity Mitigation Strategies



End User Telework and Network Security Guides

Updated 14 Aug 2020 - Here are a subset of NSA’s cybersecurity products focused on telework and general network security guidance compiled below for ease of access. While all include resources applicable to the general end user, some delve into more technical solutions as well.

To view all of NSA's published cybersecurity products, go to our Cybersecurity Advisories & Technical Guidance page here.

ImageTitleDescription
 TENS Virtual Machine GuideTENS Virtual Machine GuideThe United States Air Force Trusted End Node Security (TENS) solution allows authorized DoD teleworkers to connect to DoD sites and services from untrusted devices, such as personal computers. This guide provides detailed instructions for configuring a virtual machine to boot TENS until TENS is able to load when a computer uses UEF Secure Boot.
Page 2 of 2

NSA’s Top Ten Cybersecurity Mitigation Strategies

These strategies detail methods to counter a broad range of advanced cyber threats. The information included will help drive robust conversation about network security and risk management on your organization’s networks and are also helpful for individuals looking to better understand any of these mitigations. The Top 10 are ranked based on threat intelligence findings and cybersecurity expertise for effectiveness against known adversary tactics.

ImageTitleDescriptionPublication Number
 Info Sheet: Top 10 Mitigation Strategies (March 2018)Info Sheet: Top 10 Mitigation Strategies (March 2018)Info Sheet: Top 10 Mitigation Strategies (March 2018)
 Info Sheet: Update and Upgrade Software Immediately (August 2019)Info Sheet: Update and Upgrade Software Immediately (August 2019)NSA Cybersecurity Information on best practice of updating and upgrading software immediately.1
 Info Sheet: Transition to Multi-Factor Authentication (August 2019)Info Sheet: Transition to Multi-Factor Authentication (August 2019)NSA Cybersecurity Information on best practice of transitioning to multi-factor authentication.10
 Info Sheet: Defend Privileges and Accounts (August 2019)Info Sheet: Defend Privileges and Accounts (August 2019)NSA Cybersecurity Information on best practices for defending privileges and accounts.2
 Info Sheet: Enforce Signed Software Execution Policies (August 2019)Info Sheet: Enforce Signed Software Execution Policies (August 2019)NSA Cybersecurity Information on best practices for enforcing signed software execution policies.3
 Info Sheet: Exercise a System Recovery Plan (August 2019)Info Sheet: Exercise a System Recovery Plan (August 2019)NSA Cybersecurity Information on best practice of exercising a system recovery plan.4
 Info Sheet: Actively Manage Systems and Configurations (August 2019)Info Sheet: Actively Manage Systems and Configurations (August 2019)NSA Cybersecurity Information on best practice of actively managing systems and configurations.5
 Info Sheet: Continuously Hunt for Network Intrusions (August 2019)Info Sheet: Continuously Hunt for Network Intrusions (August 2019)NSA Cybersecurity Information on best practice of continuously hunting for network intrusions.6
 Info Sheet: Leverage Modern Hardware Security Features (August 2019)Info Sheet: Leverage Modern Hardware Security Features (August 2019)NSA Cybersecurity Information on best practice of leveraging modern hardware security features.7
 Info Sheet: Segment Networks and Deploy Application-Aware Defenses (September 2019)Info Sheet: Segment Networks and Deploy Application-Aware Defenses (September 2019)NSA Cybersecurity Information on best practice of segmenting networks and deploying application-aware defenses.8
 Info Sheet: Integrate Threat Reputation Services (August 2019)Info Sheet: Integrate Threat Reputation Services (August 2019)NSA Cybersecurity Information on best practice of integrating threat reputation services.9
Page 1 of 1