Steps to Secure Web Browsing
Web browsers pose a unique risk to enterprise infrastructure because of their frequent
exposure to untrusted dynamic content. Configuring browser security settings is
challenging due to uncertainty of both attack mitigation effectiveness and impact on end
users. A key goal...
18 May 2018 3 page(s) pdf
Implementing a Secure Administrator Workstation Using Device Guard
Defenders must raise the cost for an adversary to obtain high-value domain credentials after an initial intrusion. One such way is through a dedicated administrator workstation for performing highly-privileged tasks subsequently referred to as a Secure Administrator Workstation (SAW). SAWs...
27 July 2016 8 page(s) pdf
IAD.gov Library Archive
The IAD.gov library is no longer being updated as of October 1, 2018. NSA Cybersecurity (formerly "information assurance") information from October 1, 2018 onward will be available at http://www.nsa.gov/what-we-do/cybersecurity. The library houses all site files, which includes: Information Assurance (IA)...
06 February 2015
Add all new keywords to this page so they will show in the keyword list for all pages below.
22 December 2015
1-4 of 4 results returned for: "keywords:"Secure Guidance""