UEFI Advantages Over Legacy Mode
Device vendors have redefined the interface between the OS and platform firmware. The interface, defined in various UEFI specifications, replaces the older Basic Input/Output System (BIOS). Old BIOS computers need to be replaced, and newer UEFI computers should switch to...
07 February 2018 2 page(s) pdf
UEFI Lockdown Quick Guidance
Unified Extensible Firmware Interface (UEFI) provides multiple levels of password-based boot control. Three password levels are used to interact with machine firmware prior to the operating system boot. Failure to secure these accounts can open machines up to unauthorized, undesired,...
25 January 2018 1 page(s) pdf
The Information Assurance (IA) at the National Security Agency provides security solution guidance based upon our unique and deep understanding of risks, vulnerabilities, mitigations, and threats. This information can be utilized to harden and defend network and system infrastructure, while...
15 May 2015
Concise technology information and recommendations for developers, IT staff, or decision makers.
15 May 2015
Securing Kernel Modules on Linux Operating Systems
The Linux kernel is the core component of a family of Operating Systems (OS) that underpins a large number of government and commercial servers and infrastructure devices. Kernel functionality is commonly enhanced through the use of modules, which can be...
15 December 2017 pdf
Configuring Windows To Go as a Mobile Desktop Solution
Windows To Go is a new feature of Windows 8 Enterprise that allows a fully functional Windows 8 instance to be run from an external USB flash drive. When a host machine is booted from a Windows To Go drive,...
01 November 2012 4 page(s) pdf
Information for IT Decision Makers, Staff, and Software/Hardware Developers
Site content of special interest to IT Decision Makers, Staff, and Software/Hardware Developers.
15 May 2015
Information for Business
IAD.gov content of special interest to business clients and partners.
15 May 2015
Reducing the Effectiveness of Pass-the-Hash (version 1)
This document discusses mitigations administrators can deploy, in the interim, to reduce PtH’s effectiveness by addressing some of the properties it depends upon.
19 November 2013 17 page(s) pdf
NSA's Top Ten Cybersecurity Mitigation Strategies
NSA’s Top Ten Mitigation Strategies counter a broad range of exploitation techniques used by Advanced Persistent Threat (APT) actors. NSA’s mitigations set priorities for enterprise organizations and required measures to prevent mission impact. The mitigations also build upon the NIST...
05 March 2018 2 page(s) pdf
Manageable Network Plan Guide (version 4.0)
A Manageable Network Plan is a series of milestones that can take an unmanageable, insecure network and make it more defensible, more secure and more manageable. Because the plan is intended to be a long-term solution, implementing milestones may require...
01 December 2015 58 page(s) pdf
NSA/CSS Technical Cyber Threat Framework v1
This framework was designed to help NSA characterize and categorize adversary activity by using a common technical lexicon that is operating system agnostic and closely aligned with industry definitions. This common technical cyber lexicon supports sharing, product development, operational planning,...
08 March 2018
1-13 of 13 results returned for: "UEFI"