Cybersecurity Advisories & Technical Guidance

NSA Leverages its elite technical capability to develop advisories and mitigations on evolving cybersecurity threats.

Browse or search our repository of advisories, info sheets, tech reports, and operational risk notices listed below. Some resources have access requirements.

For a subset of cybersecurity products focused on telework and general network security for end users, view our Telework and Mobile Security Guidance page here.

ImageTitlePublication Date
 ADVISORY FURTHER TTPS ASSOCIATED WITH SVR CYBER ACTORS.PDFCybersecurity Advisory: Further TTPs associated with SVR cyber actors5/7/2021
 CSA_STOP-MCA-AGAINST-OT_UOO13672321.PDFCSA: Stop Malicious Cyber Activity Against Connected Operational Technology4/29/2021
 CSA_SVR_TARGETS_US_ALLIES_UOO13234021.PDFCSA: Russian SVR Targets U.S. and Allied Networks4/15/2021
 CSI_EMBRACING_ZT_SECURITY_MODEL_UOO115131-21.PDFInfo Sheet: Embracing a Zero Trust Security Model (February 2021)2/25/2021
 CSI_ADOPTING_ENCRYPTED_DNS_U_OO_102904_21.PDFInfo Sheet: Adopting Encrypted DNS in Enterprise Environments (January 2021)1/14/2021
 ELIMINATING_OBSOLETE_TLS_UOO197443-20.PDFInfo Sheet: Eliminating Obsolete TLS Protocol Configurations (January 2021)1/5/2021
 AUTHENTICATION_MECHANISMS_CSA_EXEC_U_OO_198854_20.PDFCybersecurity Advisory: (Abridged) Detecting Abuse of Authentication Mechanisms (December 2020)12/17/2020
 AUTHENTICATION_MECHANISMS_CSA_U_OO_198854_20.PDFCybersecurity Advisory: (Full) Detecting Abuse of Authentication Mechanisms (December 2020)12/17/2020
 CSA_VMWARE ACCESS_U_OO_195076_20.PDFCybersecurity Advisory: Russian State-Sponsored Actors Exploiting Vulnerability in VMware Workspace ONE Access Using Compromised Credentials (December 2020)12/7/2020
 CSI_ SELECTING_AND_USING_COLLABORATION_SERVICES_SECURELY_FULL_20200814.PDFInfo Sheet: (Full) Selecting and Safely Using Collaboration Services for Telework (November 2020 update)11/5/2020
Page 2 of 10

Additional Documents

The following resources require use of a Federal/DoD Public Key Infrastructure (PKI), Personal Identity Verification (PIV) or Common Access Card (CAC) client certificate. Read more information about these access requirements.