Information Assurance Menu


Digital Media Center
Skip Search Box
INFORMATION ASSURANCE NSA's Information Assurance Mission delivers technology, products, and services to secure our clients' information and information systems.
Our Vision: To be the decisive advantage enabling America and its allies to outmaneuver network adversaries.
Our Mission: Measurably improve the security of critical operations and information by providing know-how and technology to our suppliers and clients when and where they need it.
Our Value: is founded on a unique and deep understanding of risks, vulnerabilities, mitigations, and threats.

In 2014 and 2015, the Information Assurance Directorate (IAD) of the NSA collaborated with Peregrine Technical Solutions to craft the Journal of Information Warfare. Both editions bring you articles from highly technical subject matter experts from NSA. The 2014 edition focuses on cybersecurity efforts that attempt to realize Confidence in Cyberspace; the 2015 edition focuses on creating Cyber Situational Awareness in the Future of Cyber Defense.

National Security Cyber Assistance Program

The National Security Agency (NSA) / Information Assurance Directorate (IAD) has established a National Security Cyber Assistance Program wherein commercial organizations can receive accreditation for cyber incident response services. This accreditation in Cyber Incident Response Assistance will validate that an organization has established processes, effective tools and knowledgeable people with the proper skill set and expertise to perform cyber incident response for national security systems. The accreditation will only be issued to organizations that meet the criteria set forth in the NSA/IAD Accreditation Instruction Manual.

For more information, please see the NSCAP webpage.

2015 IAD Top Technology Challenges

  1. Resiliency - Resilient Architecture and Operations
  2. Automated Risk Detection - Monitoring heuristic / Behavioral - Large scale / Real-time / Multi-domain
  3. Automated Risk Mitigation - One respond to risks at network speed, proactive and predictive mitigation
  4. Secure Mobility - Usable and assured; spanning endpoints, links, infrastructure
  5. Secure Operations - Security operations for cloud-hosted user environments (e.g., blue, forensic, incident, . . .)
  6. Threat Mechanisms - Detection and response mechanisms for insider threats (timely, fine-grained)
  7. Secure Government Services - Operate secure government services on public/commercial clouds
  8. Cryptography Foundations - Foundations of future Cryptography
  9. Secure Composite Systems - Engineering, testing, and operating secure composite systems
  10. Leverage Classified Knowledge - Leverage classified knowledge/signatures in a host-based system
  11. Developing and Deploying Advanced Cyber Tradecraft - Developing, deploying, and operating countermeasures for advanced cyber tradecraft

NSA's Commercial Solutions for Classified (CSfC)

NSA's Commercial Solutions for Classified (CSfC) program was established to use commercial products in layered solutions to protect classified data on National Security Systems (NSS).

For more information on CSfC, see the CSfC website at

IAD's Latest Security Guide Helps Customers Protect Home Networks

The Information Assurance Directorate (IAD) at NSA recently released a new technical guide entitled Best Practices for Securing a Home Network. This guidance could not be more timely in light of the increasing threats to U.S. public and private networks, alike. Over the past ten years, IAD has provided many guidance documents to customers outlining practical tips for improving the security of all kinds of applications, operating systems, routers, databases, and more. Recently, Best Practices was produced in video format. Take a moment to view the guide, or watch the video.


Date Posted: Jan 15, 2009 | Last Modified: Aug 14, 2015 | Last Reviewed: Aug 14, 2015