1-20 of 29 results returned for: indexed term: Guide/Plan
-
Commercial National Security Algorithm Suite
The Commercial National Security Algorithm Suite (CNSA Suite) will provide new algorithms for those customers who are looking for mitigations to perform, replacing the current Suite B algorithms.
16 December 2015
-
Activating Authentication and Encryption for Cisco Unified Communications Manager Express (CUCME) 7.0/4.3
The intent of this document is to provide step-by-step instructions for configuring authentication and encryption for Cisco Unified Communications Manager Express (CUCME) releases 4.2, and 7.0/4.3.
28 April 2010 30 page(s) pdf
-
Community Gold Standard 2.0 (version 2.0)
CGS provides comprehensive IA guidance for securing NSS enterprises and enables the mission in the face of continuous attack. CGS characterizes the best practice for IA capabilities in accordance with policies and standards, while considering the limitations set forth by...
26 June 2014 104 page(s) pdf
-
Suite B Implementer’s Guide to FIPS 186-3 (ECDSA)
This document specifies the Elliptic Curve Digital Signature Algorithm (ECDSA) from the "Digital Signature Standard" [FIPS186-3] that will be used in future and existing cryptographic protocols for Suite B products. It also includes the Suite B elliptic curve domain parameters,...
03 February 2010 35 page(s) pdf
-
Deploying and Securing Google Chrome in a Windows Enterprise (version 1)
This paper contains deployment guidance, recommended policies, and technical details for United States government and Department of Defense administrators who want to use the enterprise version of the Google Chrome web browser in their Windows Active Directory domain. Chrome 20.0.1132.47,
22 October 2012 37 page(s) pdf
-
Deploying Signed BIOSes to Enterprise Client Systems (version 1)
This guide is meant to assist United States government and Department of Defense Windows system administrators deploy BIOSes to their enterprise client systems that support signed BIOSes and signed BIOS update mechanisms but do not have signed BIOSes installed by...
16 November 2012 32 page(s) pdf
-
Guidelines for Implementation of REST
This paper tries to help identify and explain the security risks (positive and negative) with REST, to facilitate development of more robust REST solutions.
25 March 2011 19 page(s) pdf
-
BIND 9 DNS Security
Vulnerability Technical Reports such as BIND 9 Security provide our customers with value-added information regarding a plethora of technologies. These reports identify vulnerabilities and provide recommendations to improve or eliminate the identified vulnerabilities. These reports also prioritize vulnerabilities and identify...
14 February 2011 15 page(s) pdf
-
2014 Supplemental Guide to the National Manager's Letter
National Security Directive 42 (NSD-42) and Executive Order 13587 (Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Infomation) mandates the National Manager develop effective technical safeguarding policies and standards that address...
20 May 2015 5 page(s) pdf
-
Redaction of PDF Files Using Adobe Acrobat Professional X
This document describes a procedure using Adobe Acrobat Professional X to redact information from PDF documents. The original source of the document can be any application, but the process described applies to documents that are already in PDF.
22 November 2011 13 page(s) pdf
-
Supplemental Guide to the National Manager's Letter 2015
National Security Directive 42 (NSD-42) and Executive Order 13587 (Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Infomation) mandates the National Manager develop effective technical safeguarding policies and standards that address...
20 March 2014 5 page(s) pdf
-
Securing Assets Within a Closed Industrial Control System (ICS) Network
The second in a series, this document focuses on system security within a "closed" ICS perimeter. It provides a systematic approach for implementing the access control concept of Least Privilege.
01 October 2015 17 page(s) pdf
-
Recommendations for Configuring Adobe Acrobat Reader DC in a Windows Environment
This document provides guidance on configuring Adobe Reader DC in a Windows environment. Adobe Reader DC is the latest version of Adobe Reader and replaces Adobe Reader XI. The “DC” in the title stands for “Document Cloud” which refers to...
02 December 2015 13 page(s) pdf
-
Security Configuration Guide for Browser Updates
Web browsers must be updated on a frequent basis in order to resist highly-scalable, low cost attacks. This document provides a per-browser approach for administrators to keep each major browser updated. Technical details provided in this guide are subject to...
14 October 2016 6 page(s) pdf
-
Position Zero: Integrity Checking Windows-Based ICS/SCADA Systems
This document outlines several techniques that utilize functionality available within the Microsoft Windows operating system to establish an operational foundation ('position zero') of ICS/SCADA servers and workstations.
09 February 2016 24 page(s) pdf
-
Seven Steps to Effectively Defend Industrial Control Systems
Securing Industrial Control Systems (ICSs) against the modern threat requires well-planned and well-implemented strategies. This paper presents seven steps that can be implemented today to counter common exploitable weaknesses in "as-built" control systems.
23 December 2015 7 page(s) pdf
-
Manageable Network Plan Guide (version 4.0)
A Manageable Network Plan is a series of milestones that can take an unmanageable, insecure network and make it more defensible, more secure and more manageable. Because the plan is intended to be a long-term solution, implementing milestones may require...
01 December 2015 58 page(s) pdf
-
Security Configuration Recommendations for Apple iOS 5 Devices (version 0)
This document provides security-related usage and configuration recommendations for Apple iOS devices such as the iPhone, iPad, and iPod touch.
28 March 2012 37 page(s) pdf
-
Assess the Mess
This is a technical document/manual for use by DoD, government, and industry ICS owners and operators. It provides methodologies to collect and analyze host and network data on ICS networks in order to baseline and secure these infrastructures.
01 November 2016 99 page(s) pdf
-
Cisco ASA Out-of the Box Security Configuration Guide (version 1)
This document provides security guidance for network administrator to assist in the initial out-of-the-box configuration of Cisco Adaptive Security Appliance (ASA) 5500 Next Generation Firewalls (software version 9.1). The guidance provided is based on a basic and simplistic security policy...
10 September 2014 22 page(s) pdf