The Information Assurance (IA) at the National Security Agency provides security solution guidance based upon our unique and deep understanding of risks, vulnerabilities, mitigations, and threats. This information can be utilized to harden and defend network and system infrastructure, while providing for a sustained presence.
Defense in Depth
This paper provides an overview of the major elements of the strategy and provides links to resources that provide additional insight.
12 March 2010 5 page(s) pdf
Hardening Tips for Mac OS X 10.6 "Snow Leopard" (version 1.0)
This trifold contains, in order of importance, high-impact tips designed for use by an administrative user of Mac OS X 10.6 Snow Leopard.
01 March 2010 2 page(s) pdf
Suite B Implementer’s Guide to FIPS 186-3 (ECDSA)
This document specifies the Elliptic Curve Digital Signature Algorithm (ECDSA) from the "Digital Signature Standard" [FIPS186-3] that will be used in future and existing cryptographic protocols for Suite B products. It also includes the Suite B elliptic curve domain parameters, (NIST curves P-256 and P-384), along with example data for the ECDSA signature algorithm on these curves and auxiliary functions...
03 February 2010 35 page(s) pdf