NSA Cybersecurity publications
This page lists NSA Cybersecurity publications.
A zip file containing publications from both pages can be downloaded from https://github.com/nsacyber/nsacyber.github.io/releases/latest
* notes when authorization is required to access a publication.
Table of Contents
Title |
Location |
Date |
Size |
Patch Remote Desktop Services On Legacy Versions of Windows (more…) |
Current |
Jun 2019 |
416KB |
Limiting ptrace on Production Linux Systems (more…) |
Current |
May 2019 |
128KB |
Update Earlier Versions of Solaris to 11.4 (more…) |
Current |
Mar 2019 |
422KB |
Updated Guidance For Vulnerabilities Affecting Modern Processors (more…) |
Current |
Jan 2019 |
322KB |
NSA/CSS Technical Cyber Threat Framework v2 (more…) |
Current |
Nov 2018 |
2,150KB |
2018 Cybersecurity Highlights (more…) |
Current |
Oct 2018 |
416KB |
Identity Theft Threat and Mitigations (more…) |
Archive |
Sep 2018 |
316KB |
Best Practices for Keeping Your Home Network Secure (more…) |
Archive |
Sep 2018 |
291KB |
A Guide to Border Gateway Protocol (BGP) Best Practices (more…) |
Archive |
Sep 2018 |
222KB |
Best Practices for Keeping Your Home Network Secure (more…) |
Current |
Sep 2018 |
577KB |
A Guide to Border Gateway Protocol (BGP) Best Practices (more…) |
Current |
Sep 2018 |
1,117KB |
Identity Theft Threat and Mitigations (more…) |
Current |
Sep 2018 |
789KB |
Cloud Security Basics (more…) |
Archive |
Aug 2018 |
215KB |
Cloud Security Basics (more…) |
Current |
Aug 2018 |
628KB |
Blocking Unnecessary Advertising Web Content (more…) |
Archive |
Jul 2018 |
203KB |
Blocking Unnecessary Advertising Web Content (more…) |
Current |
Jul 2018 |
505KB |
WPA3 will Enhance Wi-Fi Security (more…) |
Archive |
Jun 2018 |
441KB |
Mobile Device Best Practices When Traveling OCONUS (more…) |
Archive |
Jun 2018 |
234KB |
How to fulfill the Requirement to Upgrade Symantec Proxy CAS (more…)* |
Current |
Jun 2018 |
|
WordPress Plugin WP Symposium Remote Code Execution CVE-2014-10021 (more…)* |
Current |
Jun 2018 |
|
WPA3 Will Enhance Wi-Fi Security (more…) |
Current |
Jun 2018 |
709KB |
Steps to Secure Web Browsing (more…) |
Archive |
May 2018 |
135KB |
Mobile Device Best Practices When Traveling OCONUS (more…) |
Current |
May 2018 |
319KB |
Steps to Secure Web Browsing (more…) |
Current |
May 2018 |
461KB |
Drupal Unauthenticated Remote Code Execution Vulnerability CVE-2018-7600 (more…) |
Archive |
Apr 2018 |
119KB |
Multiple Critical Vulnerabilities Identified in Cisco Smart Install (more…) |
Archive |
Apr 2018 |
493KB |
Windows 10 for Enterprises Security Benefits of Timely Adoption (more…) |
Archive |
Apr 2018 |
280KB |
Seven Steps to Effectively Defend Industrial Control Systems (more…) |
Archive |
Apr 2018 |
797KB |
Windows 10 for Enterprises Security Benefits of Timely Adoption (more…) |
Current |
Apr 2018 |
379KB |
Multiple Critical Vulnerabilities Identified in CISCO Smart Install (more…) |
Current |
Apr 2018 |
451KB |
Drupal Unauthenticated Remote Code Execution Vulnerability (more…) |
Current |
Apr 2018 |
289KB |
UNFETTER (more…) |
Archive |
Mar 2018 |
730KB |
NSA/CSS Technical Cyber Threat Framework v1 (more…) |
Archive |
Mar 2018 |
1,275KB |
NSAs Top Ten Cybersecurity Mitigation Strategies (more…) |
Archive |
Mar 2018 |
194KB |
NCTOC Top 5 Security Operations Center (SOC) Principles (more…) |
Current |
Mar 2018 |
126KB |
UNFETTER (more…) |
Current |
Mar 2018 |
494KB |
Top 10 Mitigation Strategies (more…) |
Current |
Mar 2018 |
348KB |
UEFI Lockdown Quick Guidance (more…) |
Current |
Mar 2018 |
416KB |
UEFI Advantages Over Legacy Mode (more…) |
Current |
Mar 2018 |
336KB |
Unified Extensible Firmware Interface (UEFI) Advantages (more…) |
Archive |
Feb 2018 |
352KB |
Cisco Updates Critical Remote Code Execution Vulnerability Advisory for ASA (more…) |
Archive |
Feb 2018 |
197KB |
CISCO Updates Critical Remote Code Execution Vulnerability for ASA (more…) |
Current |
Feb 2018 |
283KB |
Inspection and Sanitization Guidance for Exchangeable Image Format (EXIF) (more…) |
Archive |
Feb 2018 |
933KB |
Inspection and Sanitization Guidance for the DOD Electronic Biometric Transmission Specifications (EBTS) File Format (more…) |
Archive |
Feb 2018 |
1,672KB |
Analysis of Optical Character Recognition (OCR) Techniques for Security Marking Detection (more…) |
Archive |
Feb 2018 |
979KB |
Security Guidance for JSON and JSON Schema (more…) |
Archive |
Feb 2018 |
880KB |
Inspection and Sanitization Guidance for PNG (more…) |
Archive |
Feb 2018 |
931KB |
Inspection and Sanitization Guidance for MPEG-2 (more…) |
Archive |
Feb 2018 |
2,887KB |
UEFI Lockdown Quick Guidance (more…) |
Archive |
Jan 2018 |
464KB |
Verification, Inspection, and Sanitization Report Specification (more…) |
Archive |
Jan 2018 |
682KB |
Unicode Security Risks (more…) |
Archive |
Jan 2018 |
715KB |
Inspection and Sanitization Guidance for National Imagery Transmission Format (NITF) (more…) |
Archive |
Jan 2018 |
1,116KB |
DotNetNuke Remote Code Execution Vulnerability CVE-2017-9822 (more…) |
Archive |
Jan 2018 |
339KB |
Vulnerabilities Affecting Modern Processors (more…) |
Archive |
Jan 2018 |
288KB |
Vulnerabilities Affecting Modern Processors (more…) |
Current |
Jan 2018 |
512KB |
DotNetNuke Remote Code Execution Vulnerability (more…) |
Current |
Jan 2018 |
353KB |
Securing Kernel Modules on Linux Operating Systems (more…) |
Archive |
Dec 2017 |
238KB |
Bro NSM Hunting Tips (more…) |
Archive |
Dec 2017 |
1,141KB |
RSA SecurID Token Authentication Agent Vulnerabilities (more…) |
Archive |
Dec 2017 |
226KB |
RSA SecureID Token Authentication Agent Vulnerabilities (more…) |
Current |
Dec 2017 |
392KB |
Inspection and Sanitization Guidance for TIFF File Formats (more…) |
Archive |
Nov 2017 |
1,334KB |
RSA Key Generation Vulnerability Affecting Trusted Platform (more…) |
Archive |
Oct 2017 |
271KB |
Mitigations for Key Reinstallation Attacks Against Wi-Fi Protected Access II (WPA2) (more…) |
Archive |
Oct 2017 |
101KB |
Mitigations for Key Reinstallation Attacks Against WI-FI Protected Access II (WPA2) (more…) |
Current |
Oct 2017 |
338KB |
RSA Key Generation Vulnerability Affecting Trusted Platform Modules (more…) |
Current |
Oct 2017 |
342KB |
Cisco Smart Install Protocol Misuse (more…) |
Archive |
Aug 2017 |
270KB |
CISCO Smart Install Protocol Misuse (more…) |
Current |
Aug 2017 |
357KB |
Security Guidance for the Use of JSON and JSON Schemas (more…) |
Archive |
Jul 2017 |
1,041KB |
Juniper Network Announces Multiple Critical Vulnerabilities (more…) |
Archive |
Jul 2017 |
190KB |
UEFI Defensive Practices Guidance (more…) |
Current |
Jul 2017 |
1,790KB |
Cisco Simple Network Management Protocol Buffer Overflow Vulnerabilities (more…) |
Archive |
Jun 2017 |
119KB |
Frank B Rowlett Award for Organizational Excellence (more…) |
Archive |
Jun 2017 |
2,425KB |
Devices with Intel Atom C2000 Series Processors (more…) |
Archive |
Jun 2017 |
159KB |
National Security Cyber Assistance Program Cyber Incident Response Assistance Accreditation Instruction Manual (more…) |
Archive |
Jun 2017 |
1,461KB |
National Security Cyber Assistance Program Accredited Companies’ Contact Information (more…) |
Archive |
Jun 2017 |
86KB |
Advanced Concepts - Information Assurance Solutions at the Speed of Technology (more…) |
Archive |
Jun 2017 |
457KB |
Network Security Devices Utilizing Vulnerable Weak Signature Algorithms in TLS (more…) |
Archive |
Jun 2017 |
505KB |
Network Security Devices Utilizing Vulnerable Weak Signature Algorithms in TLS (more…) |
Current |
Jun 2017 |
527KB |
Whitelisting Windows IIS and WebDAV Traffic (more…) |
Archive |
May 2017 |
2,003KB |
Mitigations for WannaCrypt-WannaCry Ransomware (more…) |
Archive |
May 2017 |
185KB |
CVE-2017-5689: Intel AMT, Intel ISM Privilege Escalation (more…) |
Archive |
May 2017 |
191KB |
Faulty Intel Atom C2000 Processor (more…) |
Archive |
May 2017 |
493KB |
Privileged Access Management (more…) |
Archive |
Apr 2017 |
257KB |
Apply Kernel Protection on Windows 7 and Windows 7 SP1 - Updated (more…) |
Archive |
Apr 2017 |
115KB |
Establishing NSA’s position on the use of Trusted Platform Modules in National Security Systems (more…) |
Archive |
Apr 2017 |
185KB |
Least Privilege (more…) |
Archive |
Apr 2017 |
960KB |
March 2017 Patch Tuesday (more…) |
Archive |
Mar 2017 |
179KB |
Removal of Server Message Block 1.0 (more…) |
Archive |
Mar 2017 |
230KB |
Overview of Software Defined Networking Risks (more…) |
Archive |
Feb 2017 |
2,587KB |
Commercial Solutions for Classified Tri-fold (more…) |
Archive |
Jan 2017 |
111KB |
Commercial Solutions for Classified Brochure (more…) |
Archive |
Jan 2017 |
24,218KB |
Reducing the Risk of Simple Network Management Protocol Abuse (more…) |
Archive |
Jan 2017 |
540KB |
National Information Assurance Partnership 2016 Report (more…) |
Archive |
Jan 2017 |
545KB |
Community Gold Standard Brochure (more…) |
Archive |
Jan 2017 |
461KB |
Reducing the Risk of Vulnerabilities in Unix/Linux-Based Operating Systems (more…) |
Archive |
Jan 2017 |
222KB |
PowerShell: Security Risks and Defenses (more…) |
Archive |
Dec 2016 |
277KB |
Windows 10 for Enterprises (more…) |
Archive |
Dec 2016 |
463KB |
Long-lived Hashes for Active Directory SmartCard Required Accounts (more…) |
Archive |
Nov 2016 |
392KB |
Eliminating Control Flow Exploitation (more…) |
Archive |
Nov 2016 |
1,558KB |
Voice and Video over IP (more…) |
Archive |
Nov 2016 |
939KB |
Top Ten IA Mitigations (more…) |
Archive |
Nov 2016 |
1,544KB |
Overcoming Barriers to Adopting Top 10 IA Mitigations (more…) |
Archive |
Nov 2016 |
1,871KB |
Securely Configuring Adobe Acrobat (more…) |
Archive |
Nov 2016 |
1,120KB |
Mitigating Insider Threats (more…) |
Archive |
Nov 2016 |
931KB |
Comply to Connect (more…) |
Archive |
Nov 2016 |
1,106KB |
Application Whitelisting Best Practices (more…) |
Archive |
Nov 2016 |
1,394KB |
Algorithms to Support the Evolution of Information Assurance Needs (more…) |
Archive |
Nov 2016 |
119KB |
Application Isolation Containment (more…) |
Archive |
Nov 2016 |
907KB |
Building the Cyber Workforce Pipeline: Preparing for Today, Tomorrow, and the Day After Tomorrow (more…) |
Archive |
Nov 2016 |
1,589KB |
The NSA Codebreaker Challenge (more…) |
Archive |
Nov 2016 |
817KB |
Training and Certification:Impacting NSA’s Mission (more…) |
Archive |
Nov 2016 |
1,694KB |
Joint COMSEC Monitoring Activity Findings and Trends (more…) |
Archive |
Nov 2016 |
1,093KB |
Compliance Training for Technical Professionals: A Case Study (more…) |
Archive |
Nov 2016 |
2,243KB |
Third Party Services Your Risk Picture Just Got a Lot More Complex (more…) |
Archive |
Nov 2016 |
864KB |
Making Mitigations Matter Measuring Host Mitigation State (more…) |
Archive |
Nov 2016 |
613KB |
Defending Against the Malicious Use of Admin Tools: PowerShell (more…) |
Archive |
Nov 2016 |
850KB |
Blocking Macros from Internet Originated Microsoft Office Files (more…) |
Archive |
Nov 2016 |
189KB |
Hardening Authentication Update (more…) |
Archive |
Nov 2016 |
319KB |
Manageable Network Plan Teaser Update (more…) |
Archive |
Nov 2016 |
301KB |
Assess the Mess (more…) |
Archive |
Nov 2016 |
3,847KB |
Linux Kernel Privilege Escalation Vulnerability CVE-2016-5195 (more…) |
Archive |
Oct 2016 |
275KB |
Security Configuration Guide for Browser Updates (more…) |
Archive |
Oct 2016 |
721KB |
Best Practices for Keeping Your Home Network Secure (Update) (more…) |
Archive |
Sep 2016 |
341KB |
Recommendations to Mitigate IKEv1 Vulnerability in Cisco Network Devices (more…) |
Archive |
Sep 2016 |
216KB |
Outdated Network Devices and Unsecure Protocols and Services Expose Network Infrastructure to Compromise (more…) |
Archive |
Sep 2016 |
893KB |
Vulnerabilities in Cisco Adaptive Security Appliances Identified in Open-Source – Version 1 (more…) |
Archive |
Aug 2016 |
196KB |
Bluetooth for Unclassified Use: A Risk Discussion for IT Decision Makers (more…) |
Archive |
Aug 2016 |
348KB |
Bluetooth for Unclassified Use: Guidelines for Users (more…) |
Archive |
Aug 2016 |
313KB |
Bluetooth for Unclassified Use: Guidelines for Developers (more…) |
Archive |
Aug 2016 |
340KB |
Take Advantage of Software Improvement (more…) |
Archive |
Aug 2016 |
329KB |
Implementing a Secure Administrator Workstation Using Device Guard (more…) |
Archive |
Jul 2016 |
957KB |
Outdated Software and Protocols Updated (more…) |
Archive |
Jul 2016 |
448KB |
Recommendations to Mitigate Unauthorized Cisco ROMMON Access and Validate Boot ROMs (more…) |
Archive |
Jul 2016 |
160KB |
Filter Sidecar Protocol (FSP) Specification (more…) |
Archive |
Jul 2016 |
822KB |
Network Mitigations Package-Infrastructure (more…) |
Archive |
Jun 2016 |
1,010KB |
Perform Out-of-Band Network Management (more…) |
Archive |
Jun 2016 |
493KB |
Validate Integrity of Hardware and Software (more…) |
Archive |
Jun 2016 |
621KB |
Harden Network Devices (more…) |
Archive |
Jun 2016 |
459KB |
Secure Access to Infrastructure Devices (more…) |
Archive |
Jun 2016 |
496KB |
National Security Cyber Assistance Program Vulnerability Assessment Accreditation Scoresheet 1.0 (more…) |
Archive |
Jun 2016 |
56KB |
Protecting Virtual Private Network Traffic 2016 (more…) |
Archive |
Jun 2016 |
416KB |
Guidelines for ConfigurationPatch Management in Industrial Control Systems (more…) |
Archive |
May 2016 |
1,663KB |
ImageMagick Remote Code Execution Vulnerability CVE-2016-3714 (more…) |
Archive |
May 2016 |
277KB |
Information Assurance Advisory Information Sheet (more…) |
Archive |
May 2016 |
369KB |
Apple Quicktime Reaches End-of-Life for Windows Factsheet (more…) |
Archive |
May 2016 |
194KB |
National Security Cyber Assistance Program Cyber Incident Response Assistance Accreditation Instruction Manual 3.2 (more…) |
Archive |
May 2016 |
2,527KB |
National Security Cyber Assistance Program VAS Accreditation Instruction Manual (more…) |
Archive |
May 2016 |
1,343KB |
Wireless Intrusion Detection System Technical Brief (more…) |
Archive |
Apr 2016 |
307KB |
Ransomware - Locky (more…) |
Archive |
Apr 2016 |
418KB |
Guidelines for Application Whitelisting Industrial Control Systems (more…) |
Archive |
Apr 2016 |
1,065KB |
Joint Information Environment (more…) |
Archive |
Mar 2016 |
600KB |
Information Assurance Top 9 Architectural Tenets (more…) |
Archive |
Mar 2016 |
308KB |
Trusted Engineering Solutions (more…) |
Archive |
Mar 2016 |
739KB |
Security Highlights of Windows 10 (more…) |
Archive |
Feb 2016 |
664KB |
Network Device Integrity -NDI- Methodology (more…) |
Archive |
Feb 2016 |
231KB |
Network Device Integrity on Cisco IOS Devices (more…) |
Archive |
Feb 2016 |
361KB |
IAD’s Top 10 Information Assurance Mitigation Strategies (more…) |
Archive |
Feb 2016 |
463KB |
Position Zero: Integrity Checking Windows-Based ICS/SCADA Systems (more…) |
Archive |
Feb 2016 |
3,563KB |
2016 IAD’s Top Challenges and Efforts (more…) |
Archive |
Jan 2016 |
659KB |
Journal of Information Warfare, Vol. 14 Issue 2 (more…) |
Archive |
Jan 2016 |
2,868KB |
Commercial National Security Algorithm Suite and Quantum Computing FAQ (more…) |
Archive |
Jan 2016 |
253KB |
IAD Top Ten Mitigations Questions and Answers (more…) |
Archive |
Jan 2016 |
504KB |
Commercial National Security Algorithm Suite Factsheet (more…) |
Archive |
Dec 2015 |
344KB |
Seven Steps to Effectively Defend Industrial Control Systems (more…) |
Archive |
Dec 2015 |
1,383KB |
Recommendations for Configuring Adobe Acrobat Reader DC in a Windows Environment (more…) |
Archive |
Dec 2015 |
506KB |
Manageable Network Plan Guide (more…) |
Archive |
Dec 2015 |
5,533KB |
IAD’s Top 10 Information Assurance Mitigation Strategies (more…) |
Archive |
Nov 2015 |
331KB |
IAD Best Practices for Securing Wireless Devices and Networks in National Security Systems (more…) |
Archive |
Oct 2015 |
989KB |
Community Gold Standard 1.1.1 files (more…) |
Archive |
Oct 2015 |
25,692KB |
Securing Assets Within a Closed Industrial Control System Network (more…) |
Archive |
Oct 2015 |
1,354KB |
Securely Managing Industrial Control System Networks (more…) |
Archive |
Oct 2015 |
198KB |
Cyber Defense Exercise Winners (more…) |
Archive |
Sep 2015 |
141KB |
Microsoft’s Enhanced Mitigation Experience Toolkit: A Rationale for Enabling Modern Anti-Exploritation Mitigations in Windows (more…) |
Archive |
Sep 2015 |
1,275KB |
National Security Cyber Assistance Program Frequently Asked Questions (more…) |
Archive |
Sep 2015 |
833KB |
Scripting for Bash Vulnerability/Shellshock (more…) |
Archive |
Sep 2015 |
665KB |
Microsoft’s Enhanced Mitigation Experience Toolkit Guide (more…) |
Archive |
Sep 2015 |
1,488KB |
Host Mitigation Package (more…) |
Archive |
Sep 2015 |
1,288KB |
Security Highlights of Windows 7 (more…) |
Archive |
Sep 2015 |
412KB |
Application Whitelisting using Software Restriction Policies (more…) |
Archive |
Sep 2015 |
385KB |
Security Content Automation Protocol Content for Apple iOS 5 Security Configuration Recommendations (more…) |
Archive |
Sep 2015 |
29KB |
Recommendations for Configuring Adobe Acrobat Reader XI in a Windows Environment (more…) |
Archive |
Sep 2015 |
330KB |
Reducing the Effectiveness of Pass-the-Hash (more…) |
Archive |
Sep 2015 |
350KB |
Spotting the Adversary with Windows Event Log Monitoring (more…) |
Archive |
Sep 2015 |
871KB |
Defense in Depth (more…) |
Archive |
Sep 2015 |
670KB |
NSA Methodology for Adversary Obstruction (more…) |
Archive |
Aug 2015 |
741KB |
Adobe ColdFusion Guidance (more…) |
Archive |
Jul 2015 |
627KB |
Virtual Private Network Registration Form (more…) |
Archive |
Jun 2015 |
1,017KB |
Campus Wireless Local Area Network Registration Form (more…) |
Archive |
Jun 2015 |
1,017KB |
2014 Supplemental Guide to the National Manager’s Letter (more…) |
Archive |
May 2015 |
687KB |
Frank B. Rowlett Awards Program (more…) |
Archive |
Mar 2015 |
56KB |
Apply for Cyber Incident Response Assistance Accreditation Using the National Security Cyber Assistance Program Accreditation Portal (more…) |
Archive |
Mar 2015 |
234KB |
2015 IAD’s Top Technology Challenges (more…) |
Archive |
Feb 2015 |
266KB |
Inspection and Sanitization Guidance for the Graphics Interchange Format (GIF) (more…) |
Archive |
Feb 2015 |
997KB |
Accreditation Portal User’s Guide (more…) |
Archive |
Jan 2015 |
4,595KB |
Defensive Best Practices for Destructive Malware (more…) |
Archive |
Jan 2015 |
926KB |
Cyber Incident Response Assistance Accreditation (more…) |
Archive |
Dec 2014 |
9,086KB |
Bash Bug (ShellShock) (more…) |
Archive |
Oct 2014 |
337KB |
Scripting for Bash Vulnerability/Shellshock (more…) |
Archive |
Oct 2014 |
665KB |
Microsoft’s Enhanced Mitigation Experience Toolkit Guide (more…) |
Archive |
Oct 2014 |
1,488KB |
Wireless Vulnerabilities Article (more…) |
Archive |
Oct 2014 |
28KB |
Understanding the Enhanced Mitigation Experience Toolkit Frequently Asked Questions (more…) |
Archive |
Oct 2014 |
396KB |
Microsoft’s Enhanced Mitigation Experience Toolkit: A Rationale for Enabling Modern Anti-Exploritation Mitigations in Windows (more…) |
Archive |
Oct 2014 |
1,275KB |
National Security Cyber Assistance Program Brochure (more…) |
Archive |
Sep 2014 |
3,370KB |
How National Security Cyber Assistance Program Benefits Service Providers and National Security System Owners (more…) |
Archive |
Sep 2014 |
108KB |
Critical Focus Areas of Cyber Incident Response Assistance (more…) |
Archive |
Sep 2014 |
846KB |
Cisco Adaptive Security Appliance Out-of-the-Box Security Configuration Guide (more…) |
Archive |
Sep 2014 |
310KB |
Inspection and Sanitization Guidance for Simple Mail Transfer Protocol (SMTP), Internet Message Format (IMF), and Multipurpose Internet Mail Extensions (MIME) (more…) |
Archive |
Sep 2014 |
1,105KB |
Email Filtering Best Practices Guide Version 1.0 (more…) |
Archive |
Sep 2014 |
418KB |
Application Whitelisting Using Microsoft AppLocker (more…) |
Archive |
Aug 2014 |
1,748KB |
Defending Against the Exploitation of SQL Vulnerabilities to Compromise a Network (more…) |
Archive |
Jul 2014 |
2,988KB |
2014 IAD’s Top Technology Challenges (more…) |
Archive |
Jul 2014 |
173KB |
Information Assurance Guidance for Microsoft Windows XP End of Life (more…) |
Archive |
Jul 2014 |
417KB |
Community Gold Standard 2.0 (more…) |
Archive |
Jun 2014 |
1,558KB |
Identity Theft Threat and Mitigations (more…) |
Archive |
May 2014 |
2,374KB |
Factsheet: Mitigations for OpenSSL TLS/DTLS Heartbeat Extension Vulnerability (more…) |
Archive |
May 2014 |
236KB |
Best Practices for Keeping Your Home Network Secure (more…) |
Archive |
May 2014 |
1,894KB |
Journal of Information Warfare, Vol. 13 Issue 2 (more…) |
Archive |
Apr 2014 |
3,484KB |
Supplemental Guide to the National Manager’s Letter 2014 (more…) |
Archive |
Mar 2014 |
773KB |
Supplemental Guide to the National Manager’s Letter 2015 (more…) |
Archive |
Mar 2014 |
1,862KB |
Random Number Generators: Introduction for Operating System Developers (more…) |
Archive |
Mar 2014 |
644KB |
Random Number Generators: Introduction for Application Developers (more…) |
Archive |
Mar 2014 |
582KB |
Inspection and Sanitization Guidance for the Wavelet Scalar Quantization (WSQ) Biometric Image Format (more…) |
Archive |
Jan 2014 |
610KB |
Spotting the Adversary with Windows Event Log Monitoring (more…) |
Archive |
Dec 2013 |
871KB |
Host Mitigation Package (more…) |
Archive |
Dec 2013 |
1,288KB |
Reducing the Effectiveness of Pass-the-Hash (more…) |
Archive |
Nov 2013 |
350KB |
Web Domain Name System Reputation (more…) |
Archive |
Oct 2013 |
712KB |
Segregate Networks and Functions (more…) |
Archive |
Oct 2013 |
414KB |
Secure Host Baseline (more…) |
Archive |
Oct 2013 |
491KB |
Limit Workstation-to-Workstation Communication (more…) |
Archive |
Oct 2013 |
502KB |
Host Intrusion Prevention Systems (more…) |
Archive |
Oct 2013 |
618KB |
Control Administrative Privileges (more…) |
Archive |
Oct 2013 |
655KB |
Cloud Security Considerations (more…) |
Archive |
Oct 2013 |
1,046KB |
Application Whitelisting (more…) |
Archive |
Oct 2013 |
597KB |
Anti-Virus File Reputation Services (more…) |
Archive |
Oct 2013 |
528KB |
Anti-Exploitation Features (more…) |
Archive |
Oct 2013 |
520KB |
Recommendations for Configuring Adobe Acrobat Reader XI in a Windows Environment (more…) |
Archive |
Jul 2013 |
330KB |
Building Web Applications Security Recommendations for Developers (more…) |
Archive |
Apr 2013 |
534KB |
Host Based Security System Application Whitelisting Technical Implementation Guide (more…) |
Archive |
Mar 2013 |
7,020KB |
Inspection and Sanitization Guidance for HyperText Transport Protocol (HTTP) (more…) |
Archive |
Nov 2012 |
1,004KB |
Inspection and Sanitization Guidance for JPEG 2000 (more…) |
Archive |
Nov 2012 |
743KB |
Deploying Signed BIOSes to Enterprise Client Systems (more…) |
Archive |
Nov 2012 |
359KB |
Inspection and Sanitization Guidance for JPEG File Interchange Format (more…) |
Archive |
Nov 2012 |
639KB |
JavaScript Security Risks (more…) |
Archive |
Nov 2012 |
1,021KB |
Configuring Windows To Go as a Mobile Desktop Solution (more…) |
Archive |
Nov 2012 |
420KB |
Deploying and Securing Google Chrome in a Windows Enterprise (more…) |
Archive |
Oct 2012 |
725KB |
Community Gold Standard Brochure (more…) |
Archive |
Oct 2012 |
4,396KB |
Securing Data and Handling Spillage Events (more…) |
Archive |
Oct 2012 |
673KB |
Hardening Authentication (more…) |
Archive |
Sep 2012 |
708KB |
Mobile Device Management: Capability Gaps for High-Security Use Cases (more…) |
Archive |
Aug 2012 |
734KB |
Mobile Device Management: A Risk Discussion for IT Decision Makers (more…) |
Archive |
Aug 2012 |
734KB |
Defending Against Compromised Certificates (more…) |
Archive |
Jul 2012 |
306KB |
Guidelines for Regular Expressions in XML Schemas (more…) |
Archive |
Jun 2012 |
964KB |
XSLT 1.0 Recommendations for Making XSLT Programs Behave as Expected (more…) |
Archive |
Jun 2012 |
684KB |
Using Schematron for Cross Domain Security Policy Enforcement (more…) |
Archive |
Jun 2012 |
623KB |
Basic XML Security Considerations (more…) |
Archive |
Jun 2012 |
278KB |
Frank B. Rowlett Award for Individual Excellence Nomination Form (more…) |
Archive |
May 2012 |
2,425KB |
Security Content Automation Protocol Content for Apple iOS 5 Security Configuration Recommendations (more…) |
Archive |
May 2012 |
29KB |
New Smartphones and the Risk Picture (more…) |
Archive |
Apr 2012 |
982KB |
Security Configuration Recommendations for Apple iOS 5 Devices (more…) |
Archive |
Mar 2012 |
235KB |
Inspection and Sanitization Guidance for HyperText Markup Language (HTML) (more…) |
Archive |
Mar 2012 |
1,559KB |
Inspection and Sanitization Guidance for Cascading Style Sheets (more…) |
Archive |
Mar 2012 |
937KB |
Inspection and Sanitization Guidance for Bitmap File Format (more…) |
Archive |
Mar 2012 |
654KB |
Inspection and Sanitization Guidance for Waveform Audio File Format (more…) |
Archive |
Mar 2012 |
1,397KB |
Inspection and Sanitization Guidance for Rich Text Format (RTF) (more…) |
Archive |
Mar 2012 |
1,068KB |
Mitigation Monday #3: Defense against Malware on Removable Media (more…) |
Archive |
Mar 2012 |
692KB |
Security Tips for Personally Managed Apple iPhones and iPads (more…) |
Archive |
Jan 2012 |
255KB |
Redaction of Portable Document Format Files Using Adobe Acrobat Professional X (more…) |
Archive |
Nov 2011 |
809KB |
Hardening Deployed Web Applications (more…) |
Archive |
Sep 2011 |
6,311KB |
Protect Against Cross Site Scripting Attacks (more…) |
Archive |
Sep 2011 |
349KB |
Guide to the Secure Configuration of Red Hat Enterprise Linux 5 (more…) |
Archive |
Aug 2011 |
867KB |
Enforcing No Internet or E-mail from Privileged Accounts (more…) |
Archive |
Aug 2011 |
539KB |
Host Protection Technology Study (more…) |
Archive |
Jun 2011 |
3,398KB |
Security Guidance for the use of XML Schema 1.0/1.1 and RELAX NG (more…) |
Archive |
May 2011 |
1,146KB |
Inspection and Sanitization Guidance for Portable Document Format (more…) |
Archive |
May 2011 |
2,141KB |
Guidelines for Implementation of REST (more…) |
Archive |
Mar 2011 |
708KB |
BIND 9 Domain Name System Security (more…) |
Archive |
Feb 2011 |
225KB |
Unified Communications Technical Primer (more…) |
Archive |
Jan 2011 |
433KB |
Security Highlights of Windows 7 (more…) |
Archive |
Oct 2010 |
412KB |
Securing Lotus Sametime (more…) |
Archive |
Sep 2010 |
494KB |
A Framework for Assessing and Improving the Security Posture of Industrial Control Systems (more…) |
Archive |
Aug 2010 |
936KB |
Inspection and Sanitization Guidance for Microsoft Office 2003 (more…) |
Archive |
Aug 2010 |
1,070KB |
Cisco Unified Presence Server (more…) |
Archive |
Aug 2010 |
535KB |
Application Whitelisting using Software Restriction Policies (more…) |
Archive |
Aug 2010 |
385KB |
Application Whitelisting (more…) |
Archive |
Aug 2010 |
543KB |
Inspection and Sanitization Guidance for Microsoft Office 2007 and Office Open XML (OOXML) (more…) |
Archive |
Jun 2010 |
1,222KB |
Activating Authentication and Encryption for Cisco Unified Communications Manager Express 7.0/4.3 (more…) |
Archive |
Apr 2010 |
551KB |
Mathematical routines for the National Institute of Standards and Technology prime elliptic curves (more…) |
Archive |
Apr 2010 |
205KB |
Host and Network Integrity through Trusted Computing (more…) |
Archive |
Apr 2010 |
560KB |
Defense in Depth (more…) |
Archive |
Mar 2010 |
670KB |
Hardening Tips for Mac OS X 10.6 Snow Leopard (more…) |
Archive |
Mar 2010 |
485KB |
Suite B Implementer’s Guide to Federal Information Processing Standard 186-3 (more…) |
Archive |
Feb 2010 |
177KB |
Publications
Patch Remote Desktop Services On Legacy Versions of Windows
Return to the Table of Contents.
Limiting ptrace on Production Linux Systems
Return to the Table of Contents.
Update Earlier Versions of Solaris to 11.4
Return to the Table of Contents.
Updated Guidance For Vulnerabilities Affecting Modern Processors
Return to the Table of Contents.
NSA/CSS Technical Cyber Threat Framework v2
Return to the Table of Contents.
2018 Cybersecurity Highlights
Return to the Table of Contents.
Identity Theft Threat and Mitigations
- Abstract: Identity theft is a crime that involves using another person’s personal information to take malicious actions, such as conducting fraud or stealing funds. The information provided in this document is designed to help individuals protect themselves against identity theft and mitigate the risk.
- Date: 09/26/2018
- Link: https://apps.nsa.gov/iaarchive/library/supporting-documents/faq/identity-theft-threat-and-mitigations.cfm
- Category: Supporting Documents > FAQ
- SHA256: A21522119003950A314994BCEE67A6E6FEB9EA92D8E48FF5980555B0AA4C6DB2
- Size: 316KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Best Practices for Keeping Your Home Network Secure
- Abstract: Electronic computing devices including computers, laptops, printers, mobile phones, tablets, security cameras, home appliances, cars and other “Internet of Things” devices must all be secured in order to prevent attack. Most home entertainment and utility devices, such as home monitoring systems, baby monitors, Internet of Things (IoT), Smart Devices, Blu-ray players, streaming video players, and video game consoles are capable of accessing the Internet, recording audio, and/or capturing video. Implemented security measures can ensure these devices don’t become the weak link in your home protection.
- Date: 09/26/2018
- Link: https://apps.nsa.gov/iaarchive/library/supporting-documents/faq/best-practices-for-keeping-your-home-network-secure.cfm
- Category: Supporting Documents > FAQ
- SHA256: D96931DCEF3EF5963CE5940710E0BF86D1BC20708C04CA351D38EE914E47A29D
- Size: 291KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
A Guide to Border Gateway Protocol (BGP) Best Practices
- Abstract: The dominant routing protocol on the Internet is the Border Gateway Protocol (BGP). BGP has been deployed since the commercialization of the Internet and version 4 of BGP is over a decade old. BGP works well in practice, and its simplicity and resilience enabled it to play a fundamental role within the global Internet. However, BGP inherently provides few performance or security protections.
With BGP being the primary protocol driving the Internet, the security of devices dedicated to running the protocol is vital. Unfortunately, there are many vulnerabilities that can be exploited if proper mitigations are not configured. This error seems to be far more common than it should. For that reason this guidance paper is provided.
- Date: 09/17/2018
- Link: https://apps.nsa.gov/iaarchive/library/reports/a-guide-to-border-gateway-protocol-bgp-best-practices.cfm
- Category: Reports
- SHA256: FCC3E54DB7CC8F51C00B0FA3991579CF846B90955A5CA1BB444C8B5D30940679
- Size: 222KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Best Practices for Keeping Your Home Network Secure
Return to the Table of Contents.
A Guide to Border Gateway Protocol (BGP) Best Practices
Return to the Table of Contents.
Identity Theft Threat and Mitigations
Return to the Table of Contents.
Cloud Security Basics
- Abstract: Cloud services provide enterprise organizations flexibility and new capabilities, however they introduce new risks that must be understood and addressed before procuring a cloud service provider (CSP). Department of Defense (DoD) organizations are charged with handling sensitive data ranging from Personally Identifiable Information (PII) to national security information. As more sensitive data is considered for storage and manipulation in cloud environments, organizations must address new security threats before deploying in an operational environment.
- Date: 08/29/2018
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/cloud-security-basics.cfm
- Category: IA Guidance > Security Tips
- SHA256: 893077B6054F891039D23E04841792DC7C08814A361884705F649BC33F75DF85
- Size: 215KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Cloud Security Basics
Return to the Table of Contents.
Blocking Unnecessary Advertising Web Content
- Abstract: Cyber adversaries can leverage malicious advertising (“malvertising”) to install malware. Exploit kits in malicious ads can take advantage of unpatched vulnerabilities to silently install malware. Administrators should ensure that software updates are implemented promptly to prevent malware installation. Blocking potentially malicious web advertisements further mitigates malvertising. Additionally, blocking such content can decrease traffic across the network boundary, streamlining incident forensics and enhancing network performance.
- Date: 07/10/2018
- Link: https://apps.nsa.gov/iaarchive/library/supporting-documents/blocking-unnecessary-advertising-web-content.cfm
- Category: Supporting Documents
- SHA256: E42B47B5A620224DC151FF8B3B42917A5A27C050C44D5104912CDFD7D170C01D
- Size: 203KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Blocking Unnecessary Advertising Web Content
Return to the Table of Contents.
WPA3 will Enhance Wi-Fi Security
- Abstract: On January 8th 2018, the Wi-Fi alliance announced new enhancements to Wi-Fi Protected Access II (WPA2) security specification and a new WPA3 security specification. Enhancements to WPA2 will include improvements in authentication, encryption, and configuration requirements. WPA3 will build on the WPA2 enhancements and will offer enhanced protection for Wi-Fi networks that use password-based authentication, improved privacy on open networks, mitigations against denial-of-service attacks, and will deliver stronger cryptographic strengths that comply with Commercial National Security Algorithm (CNSA) requirements. A mechanism to provision IoT devices with limited or no displays into the network will also be introduced along with WPA3.
- Date: 06/28/2018
- Link: https://apps.nsa.gov/iaarchive/library/reports/wpa3-will-enhance-wi-fi-security.cfm
- Category: Reports
- SHA256: EEEA5D1699E35A5930A187928D88DF4836C900D68DA74286AB75F3479AF3CDAD
- Size: 441KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Mobile Device Best Practices When Traveling OCONUS
- Abstract: In their brief history, mobile devices have evolved to become the critical link between a remote user and the home office, providing travelers with access to business applications and data they would otherwise lack. Ensuring that this line of communication is private and secure is imperative. The security guidance outlined below applies to U.S. Government personnel using Government-issued commercial mobile devices in a public network as they travel in foreign countries. The purpose is to minimize an adversary’s ability to obtain sensitive data through mobile devices and limit damage should one be compromised. The mitigations address a range of threats that might be encountered in foreign countries.
- Date: 06/07/2018
- Link: https://apps.nsa.gov/iaarchive/library/supporting-documents/mobile-device-best-practices-when-traveling-oconus.cfm
- Category: Supporting Documents
- SHA256: 25E996411BD23C0B3F8E406078F159C0BCB358D1EDE0058B23F646A2C7A74BAE
- Size: 234KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
How to fulfill the Requirement to Upgrade Symantec Proxy CAS
Return to the Table of Contents.
WordPress Plugin WP Symposium Remote Code Execution CVE-2014-10021
Return to the Table of Contents.
WPA3 Will Enhance Wi-Fi Security
Return to the Table of Contents.
Steps to Secure Web Browsing
- Abstract: Web browsers pose a unique risk to enterprise infrastructure because of their frequent exposure to untrusted dynamic content. Configuring browser security settings is challenging due to uncertainty of both attack mitigation effectiveness and impact on end users. A key goal of this paper is to avoid impact to users while mitigating as many attacks as possible. The following guidance uses a statistics-based approach to identify three mitigations in commonly-used web browsers that, in combination, will ward off nearly all publicly known attacks. Further mitigations are provided at the end of the document for administrators seeking to defend against adversaries with significant resources.
- Date: 05/18/2018
- Link: https://apps.nsa.gov/iaarchive/library/reports/steps-to-secure-web-browsing.cfm
- Category: Reports
- SHA256: FB41B117D2AA411F4684575203412A0BE5DA3CFE99128F00EB5636CB09E2D4CB
- Size: 135KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Mobile Device Best Practices When Traveling OCONUS
Return to the Table of Contents.
Steps to Secure Web Browsing
Return to the Table of Contents.
Drupal Unauthenticated Remote Code Execution Vulnerability CVE-2018-7600
- Abstract: On March 28, 2018, the Drupal project announced that a vulnerability had been discovered in Drupal 7.x and 8.5.x (as well as prior, unsupported versions) that allows an unauthenticated attacker to execute arbitrary commands on Drupal installations. In some situations, Drupal installations not directly connected to the Internet could be vulnerable to exploitation through a Cross-Site Request Forgery (CSRF) attack.
- Date: 04/23/2018
- Link: https://apps.nsa.gov/iaarchive/library/ia-advisories-alerts/drupal-unauthenticated-remote-code-execution-vulnerability.cfm
- Category: IA Advisories
- SHA256: 61D612D03766FC45C3DB020B5631295A5B19447FD71710980040D8217118FC50
- Size: 119KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Multiple Critical Vulnerabilities Identified in Cisco Smart Install
- Abstract: Cisco recently released multiple critical vulnerabilities associated with the Smart Install Protocol (CVE-2018-0171 and CVE-2018-0156). The two CVEs cover remote code execution and Denial of Service vulnerabilities due to malformed Smart Install packets. This is a followup to a previously released IAA advising users to not use the insecure Smart Install protocol (IAA U/OO/801020-17).
- Date: 04/09/2018
- Link: https://apps.nsa.gov/iaarchive/library/ia-advisories-alerts/multiple-critical-vulnerabilities-identified-in-cisco-smart-install.cfm
- Category: IA Advisories
- SHA256: 34AEBC2B71A10A228424C8498C7AF077C2900C75B735D413EBFC555EFC195328
- Size: 493KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Windows 10 for Enterprises Security Benefits of Timely Adoption
- Abstract: This document describes features present in Windows 10 Enterprise 64-bit that can disrupt exploitation techniques and tools used against National Security Systems today and how the timely adoption of new releases can help to protect systems in the future. The functionality of many of these features has been evaluated through the National Information Assurance Partnership (NIAP).
- Date: 04/06/2018
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/windows-10-for-enterprises-security-benefits-of-timely-adoption.cfm
- Category: IA Guidance > Security Tips
- SHA256: D2B4DF4B06D61D40D37095083D5E00DFBFD100D4B933D14217FC153C4A21D1CD
- Size: 280KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Seven Steps to Effectively Defend Industrial Control Systems
- Abstract: Cyber intrusions into US Critical Infrastructure systems are happening with increased frequency. For many industrial control systems (ICS), it’s not a matter of if an intrusion will take place, but when. The capabilities of our adversaries have been demonstrated and cyber incidents are increasing in frequency and complexity. Simply building a network with a hardened perimeter is no longer adequate. Securing ICSs against the modern threat requires well-planned and well-implemented strategies that will provide network defense teams a chance to quickly and effectively detect, counter, and expel an adversary. This paper presents seven strategies that can be implemented today to counter common exploitable weaknesses in “as-built” control systems.
- Date: 04/06/2018
- Link: https://apps.nsa.gov/iaarchive/library/reports/seven-steps-to-effectively-defend-industrial-control-systems.cfm
- Category: Reports
- SHA256: 8C9FB5FC0B66B0CA4EF553BDCAAB698241DB48FD0FFAC775AA321E56061FFFD8
- Size: 797KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Windows 10 for Enterprises Security Benefits of Timely Adoption
Return to the Table of Contents.
Multiple Critical Vulnerabilities Identified in CISCO Smart Install
Return to the Table of Contents.
Drupal Unauthenticated Remote Code Execution Vulnerability
Return to the Table of Contents.
UNFETTER
- Abstract: Unfetter is bringing Net Defenders and Threat Analysts together for the first time. Net Defenders need the ability to make operational decisions based on complex threat data published by Threat Analysts. A unique platform that unifies the Net Defender and Threat Analyst communities, Unfetter breaks down barriers through seamless data sharing across the enterprise.
By enabling the real-time exchange of threat data and analytics based on the MITRE ATT&CKTM Framework, Unfetter allows organizations to evaluate and implement defensive measures based on effectiveness and value.
- Date: 03/29/2018
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/unfetter.cfm
- Category: IA Guidance > Security Tips
- SHA256: 73E7B23FE2D1C78AA751F0E0FB4E8188FB537BCD4B160F449A36548899A508DF
- Size: 730KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
NSA/CSS Technical Cyber Threat Framework v1
- Abstract: This framework was designed to help NSA characterize and categorize adversary activity by using a common technical lexicon that is operating system agnostic and closely aligned with industry definitions. This common technical cyber lexicon supports sharing, product development, operational planning, and knowledge driven operations across the IC. Public dissemination of the technical cyber lexicon allows for collaboration within the whole community. Use of the NTCTF facilitates organizing and examining adversary activity to support knowledge management and enable analytic efforts.
- Date: 03/08/2018
- Link: https://apps.nsa.gov/iaarchive/library/reports/nsa-css-technical-cyber-threat-framework-v1.cfm
- Category: Reports
- SHA256: 49E1DAC671D980DA612BDBFFBE224E7AEF3EB5D70017FF1CC385AF039C7D01F1
- Size: 1,275KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
NSAs Top Ten Cybersecurity Mitigation Strategies
- Abstract: NSA’s Top Ten Mitigation Strategies counter a broad range of exploitation techniques used by Advanced Persistent Threat (APT) actors. NSA’s mitigations set priorities for enterprise organizations and required measures to prevent mission impact. The mitigations also build upon the NIST Cybersecurity Framework functions to manage cybersecurity risk and promote a defense-in-depth security posture. The mitigation strategies are ranked by effectiveness against known APT tactics. Additional strategies and best practices will be required to mitigate the occurrence of new tactics.
- Date: 03/06/2018
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/nsas-top-ten-cybersecurity-mitigation-strategies.cfm
- Category: IA Guidance > Security Tips
- SHA256: FF066507B744A2899043D55B0E90027DCE0422F07F040F9308D68DAF717C17A8
- Size: 194KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
NCTOC Top 5 Security Operations Center (SOC) Principles
Return to the Table of Contents.
UNFETTER
Return to the Table of Contents.
Top 10 Mitigation Strategies
Return to the Table of Contents.
UEFI Lockdown Quick Guidance
Return to the Table of Contents.
UEFI Advantages Over Legacy Mode
Return to the Table of Contents.
Unified Extensible Firmware Interface (UEFI) Advantages
- Abstract: Device vendors have redefined the interface between the OS and platform firmware. The interface, defined in various UEFI specifications, replaces the older Basic Input/Output System (BIOS). Old BIOS computers need to be replaced, and newer UEFI computers should switch to UEFI native mode for several technical advantages: Secure Boot; GUID Partition Table (GPT) Support; Platform and Architecture Independence; Consistent Variables and Services; Improved Boot Performance.
- Date: 02/07/2018
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/cfs-u-oo-111747-18.cfm
- Category: IA Guidance > Security Tips
- SHA256: 1E4DE2E77D7DD36C218A923519CD21DCB311F5ABA8A086BB167CF3DC4C4172F4
- Size: 352KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Cisco Updates Critical Remote Code Execution Vulnerability Advisory for ASA
- Abstract: Cisco recently updated a vulnerability advisory affecting Cisco Adaptive Security Appliance (ASA) and Firepower Appliance, CVE-2018-0101. The updated release informed users that devices continue to be vulnerable after the 29 January 2018 advisory and software release. Furthermore, Cisco disclosed the existence of additional vulnerable features. The updated advisory, released 5 February 2018, recommends users again install updated software since the versions released on 29 January 2018 do not include fixes for the newly disclosed vulnerabilities. This IAA addresses Cisco ASA vulnerabilities in CVE-2018-0101.
- Date: 02/07/2018
- Link: https://apps.nsa.gov/iaarchive/library/ia-advisories-alerts/iaa-u-oo-11303-18.cfm
- Category: IA Advisories
- SHA256: 7331277943368231CA4487E525D0A5712AEBD1890F29E2EAC7B45A4283E7EF0E
- Size: 197KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
CISCO Updates Critical Remote Code Execution Vulnerability for ASA
Return to the Table of Contents.
- Abstract: Exif is structured, tagged metadata contained within some media file formats. This data is used by digital camera manufacturers and applications that process digital images to provide additional information about media files. The metadata includes manufacturer specific information such as the make, model and lens information of the device that generated the file; image information (e.g. date/time of capture) and geolocation information (e.g. latitude/longitude) can also be recorded. Exif data is found in two image standards: Joint Photographic Experts Group (JPEG) File Interchange Format (JFIF) (as defined in International Standards Organization/International Electrotechnical Commission (ISO/IEC) 10918-1) and TIFF Revision 6.01. The Exif format is also defined for audio files in the format of Resource Interchange File Format (RIFF) Waveform Audio File Format (WAVE). This guidance document examines the Exif specifications for data attack, data hiding, and data disclosure risks that exist within the metadata structure. It provides a breakdown of each component of Exif metadata and provides recommendations that can help assure that Exif data is not only compliant with the specifications, but also free of risk.
- Date: 02/01/2018
- Link: https://apps.nsa.gov/iaarchive/library/reports/inspection_and_sanitization_guidance_for_exchangeable_image_format.cfm
- Category: Reports
- SHA256: 8A7D792870CEB303BB17DCAC650C20D66F9633DAE657326A3C42B932104E3E4C
- Size: 933KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
- Abstract: The purpose of this document is to provide guidance for the development of sanitization and analysis software for Department of Defense (DOD) Electronic Biometric Transmission Specification (EBTS) biometric files. This document analyzes elements and objects contained within the EBTS file structure and then discusses the data hiding, data attack, and data disclosure risks. It describes how identified elements can be a cause for concern for hiding sensitive data to ensure EBTS files are safer for users to open and conform to the specification.
- Date: 02/01/2018
- Link: https://apps.nsa.gov/iaarchive/library/reports/inspection_and_sanitization_for_dod_ebts_file_format.cfm
- Category: Reports
- SHA256: 11FE11F0EEBFA30994DD1440FC70F26746E8E6C11FC715B1F477335CE602BECD
- Size: 1,672KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Analysis of Optical Character Recognition (OCR) Techniques for Security Marking Detection
- Abstract: This document deconstructs the problem of automated character recognition and defines a methodology for conducting optical character recognition (OCR) on images for boundary protection devices to determine their classification. This research can be leveraged in order to make determinations on the transfer of images between security domains.
- Date: 02/01/2018
- Link: https://apps.nsa.gov/iaarchive/library/reports/analysis_of_optical_character_recognition_techniques.cfm
- Category: Reports
- SHA256: A8C38EF0B296A1F3FC8C1C5CBA47F79917C712FE3FA813BEA1F171C2EBD3C63D
- Size: 979KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Security Guidance for JSON and JSON Schema
- Abstract: This paper provides guidance for creating JSON schemas. Validating JSON instance documents against properly designed JSON schemas can reduce the risk of transferring unauthorized or malicious data. Note that schema validation alone is not enough to prevent transfer of unauthorized data; users must perform other content filtering such as dirty word and anti-virus checks, in conjunction with schema validation.
- Date: 02/01/2018
- Link: https://apps.nsa.gov/iaarchive/library/reports/security_guidance_for_json.cfm
- Category: Reports
- SHA256: 347F2BFD7A276C1075A6159FDBC65283599ED9F63CC5A43A911A20CD2A289BA9
- Size: 880KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Inspection and Sanitization Guidance for PNG
- Abstract: The purpose of this document is to provide guidance for the development of a sanitization or analysis software tool for Portable Network Graphics (PNG) files. This document analyzes the various elements contained within the PNG images and then discusses data attack, data disclosure, and data hiding risks. It describes how these elements can then be a cause for concern from hidden sensitive data or from attempts to exploit a system. This report provides numerous recommendations and mitigations that could be used to ensure the use of PNG is safe and that files conform to the specification.
- Date: 02/01/2018
- Link: https://apps.nsa.gov/iaarchive/library/reports/inspection_and_sanitization_guidance_for_png.cfm
- Category: Reports
- SHA256: 86EF456BC3323D3FFF0660A9CE37FB318D21E4967CEF82BF3937690304906CB0
- Size: 931KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Inspection and Sanitization Guidance for MPEG-2
- Abstract: MPEG-2 is a standard for the generic coding of moving pictures and associated audio information. It describes a combination of lossy compression methods for storage and transmission of audio and video using available storage media and transmission bandwidth. It includes an analysis of the issues with the H.264 advanced video coding, part 10 of MPEG-4. It also provides for inclusion of metadata such as Key-Length-Value, which can be obtained from unmanned aerial vehicle platforms capturing motion imagery. The MPEG-2 standard contains detail down to the bit level, fields that include metadata, conditional information, and variable length content require inspection to ensure data is not hidden or unintentionally disclosed. Given the typically large amount of data contained in MPEG-2 files, inspection and sanitization are critical to ensure that all content within the files can be displayed to end users and that files have no malicious content.
- Date: 02/01/2018
- Link: https://apps.nsa.gov/iaarchive/library/reports/inspection_and_sanitization_guidance_for-mpeg-2.cfm
- Category: Reports
- SHA256: 7CCC0827D1C9038E03945D05178CCFB3A73C56431A54602370A4CAE4A5BCCEF5
- Size: 2,887KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
UEFI Lockdown Quick Guidance
- Abstract: Unified Extensible Firmware Interface (UEFI) provides multiple levels of password-based boot control. Three password levels are used to interact with machine firmware prior to the operating system boot. Failure to secure these accounts can open machines up to unauthorized, undesired, and repudiated boot device changes, device/component firmware configuration changes, and unauthorized connectivity to peripheral devices.
- Date: 01/25/2018
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/uefi_lockdown_quick_guidance.cfm
- Category: IA Guidance > Security Tips
- SHA256: F4EC2715ECE77CE2E82706BEA7B701B8423B2F5916070AB11EAA6E59F32CEC3C
- Size: 464KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Verification, Inspection, and Sanitization Report Specification
- Abstract: The Verification, Inspection and Sanitization (VIS) Report Specification provides a standardized XML-based mechanism to describe the results of all the verification, inspection, sanitization, transformation, and transliteration filter actions performed by a Filter Orchestration Engine (FOE) and its associated filters on a given set of data. The initial use case for the VIS report Specification was to support the filter reporting requirements of the Filter Sidecar Protocol (FSP). However, a VIS Report has general applicability to any system (or component) performing filtering including local and distributed filters, filter orchestration engines, Filter Sidecars, Cross Domain Solutions (CDS), and other boundary protection devices (e.g. firewalls, web proxies, mail gateways).
- Date: 01/19/2018
- Link: https://apps.nsa.gov/iaarchive/library/reports/verification-inspection-and-sanitization-report-specification.cfm
- Category: Reports
- SHA256: 9A138EA75CB23601F586F021A1DC571C8D4490B804F0151B5A30147888F35585
- Size: 682KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Unicode Security Risks
- Abstract: Fundamentally, computers process numbers, not letters, so when a computer processes text, the characters must be converted into numbers prior to processing. There are many schemes for encoding characters as numbers. US-ASCII is one well-known scheme, but it encodes only the English (Latin) alphabet. By contrast, Unicode is an international standard that assigns a unique number to each of the characters in the world’s languages. This document provides a brief overview of Unicode and discusses the potential security risks posed by using Unicode. It includes background on the growth of Unicode, definitions of commonly used Unicode terms, tips for creating filters to avoid visual spoofing attacks, and links to tools and further information.
- Date: 01/19/2018
- Link: https://apps.nsa.gov/iaarchive/library/reports/unicode-security-risks.cfm
- Category: Reports
- SHA256: 3F0F69504B8A80FED5554DB147A11078D745A6E94802319B5D426C82F5982460
- Size: 715KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
- Abstract: This Inspection and Sanitization Guidance (ISG) for National Imagery Transmission Format (NITF) document provides guidelines and specifications for developing file inspection and sanitization software for NITF files, which are formally defined by the National Imagery Transmission Format Standard (NITFS). The latest NITF 2.1 standard is defined in MIL-STD-2500C. NITF files contain numerous segments of data that include images, graphics, text, as well as custom data in a strict format. As with prior ISG documents, this document is concerned with data hiding, data disclosure, and data attack risks. For example, although the NITF standard is well-defined and contains detail down to the byte level, there remain fields that include metadata, conditional information, and variable length content that require inspection to ensure nothing is hidden within the file. The nature of NITF files is to include a variety of imagery and associated data that could potentially be displayed to an end user. Information can be selectively displayed to the user based on capability and the information that was requested. With potentially a large amount of data located in these files, inspection and sanitization is key to ensuring that information contained in the file is authorized for display to the user and that the data cannot be used to attack the system.
- Date: 01/19/2018
- Link: https://apps.nsa.gov/iaarchive/library/reports/inspection-and-sanitization-guidance-for-national-imagery-transmission-format.cfm
- Category: Reports
- SHA256: 85B89926B210A40A36309AC98C1087D197A5F62D68CCF69058BF21BD72F484E8
- Size: 1,116KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
DotNetNuke Remote Code Execution Vulnerability CVE-2017-9822
- Abstract: DotNetNuke (DNN), also known as DNN Evoq and DNN Evoq Engage, is a web-based Content Management System (CMS) developed on the Microsoft .NET framework. DNN is a web application commonly deployed on local or cloud Microsoft IIS servers. On July 7, 2017, security researchers revealed a vulnerability within DNN versions 5.2.0 through 9.1.0 that allows an attacker to forge valid DNN credentials and execute arbitrary commands on DNN web servers.
- Date: 01/09/2018
- Link: https://apps.nsa.gov/iaarchive/library/ia-advisories-alerts/dotnetnuke-remote-code-execution-vulnerability-cve2-2017-9822.cfm
- Category: IA Advisories
- SHA256: 0641E3C9183180EDD9139D97152E31334F7B11B206DFED7156328DA0679CE73E
- Size: 339KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Vulnerabilities Affecting Modern Processors
- Abstract: Three vulnerabilities affecting modern Intel, AMD, and ARM processors have been disclosed. CVE-2017-5753 (bounds check bypass) and CVE-2017-5715 (branch target injection), also known as Spectre, have been confirmed to affect Intel, AMD, and ARM processors. CVE-2017-5754 (rogue data cache load), also known as Meltdown, has been confirmed to affect Intel processors. The vulnerabilities could be leveraged to read privileged system memory from an unprivileged context. The vulnerable processors are present in systems widely used across the Department of Defense (DoD). Software patches have been released by vendors to mitigate the hardware vulnerabilities.
- Date: 01/06/2018
- Link: https://apps.nsa.gov/iaarchive/library/ia-advisories-alerts/vulnerabilities_affecting_modern_processors.cfm
- Category: IA Advisories
- SHA256: 5B3AC55B4A2721D542BC273816E9013D466EDC4B7F4680510D6305768A3F906F
- Size: 288KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Vulnerabilities Affecting Modern Processors
Return to the Table of Contents.
DotNetNuke Remote Code Execution Vulnerability
Return to the Table of Contents.
Securing Kernel Modules on Linux Operating Systems
- Abstract: The Linux kernel is the core component of a family of Operating Systems (OS) that underpins a large number of government and commercial servers and infrastructure devices. Kernel functionality is commonly enhanced through the use of modules, which can be loaded at boot time or during normal system operation. Modules run at the same privilege level as the kernel. Any vulnerabilities in kernel modules present a serious risk. System owners are advised to 1) ensure that only signed kernel modules are loaded, and 2) prevent loading of unnecessary kernel modules. Although it reduces attack surface, preventing module loading is not practical for many general-purpose systems and thus is not suitable for use in compliance baselines.
- Date: 12/16/2017
- Link: https://apps.nsa.gov/iaarchive/library/reports/securing-kernel-modules-on-linux-operating-systems.cfm
- Category: Reports
- SHA256: 07461C562D137F680029ABE58B388D473910474E62FB582B1A3096317552EE7F
- Size: 238KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Bro NSM Hunting Tips
- Abstract: The Bro Network Security Monitor (NSM) is used on networks worldwide for in-depth network monitoring and hunting for potential malicious activities. This document provides tips for analysts on how to raise a notice when irregular activity is observed on a network.
- Date: 12/13/2017
- Link: https://apps.nsa.gov/iaarchive/library/reports/bro-nsm-hunting-tips.cfm
- Category: Reports
- SHA256: 5BB9DD43E796E4FD5C537075480C60818203526448F4CDB127757A99034832E3
- Size: 1,141KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
RSA SecurID Token Authentication Agent Vulnerabilities
- Abstract: A recent error handling vulnerability has been discovered in two RSA (Rivest Shamir Adleman) Authentication Agent toolkits and in one Authentication Agent product. This vulnerability can result in authentication bypass and affects a limited number of applications. These toolkits and product are used to deploy RSA SecurID Token Authentication to authenticate users to workstations, web servers, and network devices.
- Date: 12/13/2017
- Link: https://apps.nsa.gov/iaarchive/library/ia-advisories-alerts/rsa-securid-token-authentication-agent-vulnerabilities.cfm
- Category: IA Advisories
- SHA256: 4C3B9E7DB35C20D71DFC3D9A94EA490E7909F699C63547F6F4FC9DF11584DC2E
- Size: 226KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
RSA SecureID Token Authentication Agent Vulnerabilities
Return to the Table of Contents.
- Abstract: The purpose of this Inspection, Sanitization, and Guidance (ISG) document is to provide guidance for the development of a sanitization and analysis software tool for different versions of Tag Image File Format (TIFF), BigTIFF, and GeoTIFF. This document analyzes various elements and objects that are contained within the TIFF file structure and then discusses data hiding, data attack, and data disclosure risks. It will describe how these elements can be a cause for concern from hidden, sensitive data or from possible attempts to exploit a system. This document provides numerous recommendations and mitigations that could be used to ensure the TIFF file is safer and more accurately conforms to the specification.
- Date: 11/17/2017
- Link: https://apps.nsa.gov/iaarchive/library/reports/tiff_inspection_and_sanitization_guidance_v1_1_1-20171206.cfm
- Category: Reports
- SHA256: 8CB9094ACB55D8D31BE63597C46FA742CDCD2C089B0787C1042E46DDFE257906
- Size: 1,334KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
- Abstract: A vulnerability in a cryptographic library used to generate Rivest-Shamir-Adleman (RSA) encryption keys was recently disclosed. The vulnerability allows recovery of a private key when only possessing a public key. The vulnerable library is included in the firmware of specific Infineon Trusted Platform Modules (TPM) present in systems produced by a number of Original Equipment Manufacturers (OEM) commonly used in the Department of Defense (DoD). Much of the published guidance focuses on Windows but the vulnerability is not in Windows. All systems and devices that include or use the vulnerable library are affected.
- Date: 10/25/2017
- Link: https://apps.nsa.gov/iaarchive/library/ia-advisories-alerts/rsa-key-generation-vulnerability-affecting-trusted-platform.cfm
- Category: IA Advisories
- SHA256: 066C7462C752A1AD944F8D7169FEA3C1ADF0E787EC75FB9219D66BF4CCDCE890
- Size: 271KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Mitigations for Key Reinstallation Attacks Against Wi-Fi Protected Access II (WPA2)
- Abstract: On October 16, 2017, a vulnerability in the Wi-Fi Protected Access II (WPA2) mechanism used for authentication and session key agreement was released. The vulnerability affects the following WPA2 handshakes: the Four-way, Group Key, Fast BSS Transition (FT), Peerkey, TDLS, and WMN Sleep Mode Response handshakes.
- Date: 10/18/2017
- Link: https://apps.nsa.gov/iaarchive/library/ia-advisories-alerts/mitigations-key-reinstallation-attacks-against-wpa2.cfm
- Category: IA Advisories
- SHA256: 7F0ED294770F4769FFE2102E140FB021C72D858C29A3D40A705246150527E563
- Size: 101KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Mitigations for Key Reinstallation Attacks Against WI-FI Protected Access II (WPA2)
Return to the Table of Contents.
Return to the Table of Contents.
Cisco Smart Install Protocol Misuse
- Abstract: Adversaries are likely exfiltrating copies of configuration files on internet accessible switches using the Cisco Smart Install functionality. This protocol exposes infrastructure devices to increased operational risk, which could compromise device integrity. Malicious Smart Install protocol messages can allow an unauthenticated, remote attacker to change the startup-config file, force a reload of the device, load a new IOS image on the device, and execute high-privilege CLI commands on switches running Cisco IOS and IOS XE Software.
- Date: 08/11/2017
- Link: https://apps.nsa.gov/iaarchive/library/ia-advisories-alerts/cisco-smart-install-protocol-misuse.cfm
- Category: IA Advisories
- SHA256: 38084F7B32399DEA30A1C41502AF9D0FF6FD0FCA92815ECF530977AB402B98EC
- Size: 270KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
CISCO Smart Install Protocol Misuse
Return to the Table of Contents.
Security Guidance for the Use of JSON and JSON Schemas
- Abstract: This paper provides guidance for creating JSON schemas. Validating JSON instance documents against properly designed JSON schemas can reduce the risk of transferring unauthorized or malicious data. Note that schema validation alone is not enough to prevent transfer of unauthorized data; users must perform other content filtering such as dirty word and anti-virus checks, in conjunction with schema validation. The intended audience of this paper includes system engineers, designers, and testers who work with JSON and/or JSON schemas.
- Date: 07/26/2017
- Link: https://apps.nsa.gov/iaarchive/library/supporting-documents/security-guidance-use-json-andjson-schemas.cfm
- Category: Supporting Documents
- SHA256: 3E4BB3F0E7D09EE348F59EABFAFF21AFF05E14ACA88517C086991C012F8378FC
- Size: 1,041KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Juniper Network Announces Multiple Critical Vulnerabilities
- Abstract: Juniper Networks recently published 22 security advisories for Junos OS and ScreenOS, at least four advisories are “critical” and 11 are “high” severity. Some of the reported vulnerabilities can affect Junos OS across all products and platforms. These vulnerabilities could result in denial of service, remote code execution, privilege escalation, or unauthorized access.
- Date: 07/14/2017
- Link: https://apps.nsa.gov/iaarchive/library/ia-advisories-alerts/juniper-network-announces-multiple-critical-vulnerabilities.cfm
- Category: IA Advisories
- SHA256: B1B2054992D0A7B0BDA8A3C81C4806D597AFFF4595C3566B37F84E954CF9B958
- Size: 190KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
UEFI Defensive Practices Guidance
Return to the Table of Contents.
Cisco Simple Network Management Protocol Buffer Overflow Vulnerabilities
- Abstract: Various Cisco product lines are affected by buffer overflow vulnerabilities in the underlying SNMP platform. According to Cisco, these vulnerabilities can allow attackers with knowledge of community strings or passwords to gain remote code execution on routers or conduct denial of service attacks. Vulnerabilities are exploitable if SNMP is enabled and authentication is successful. To ensure a Cisco router is not at risk, MIBs and software versions need to be immediately checked for a wide range of affected products. The MIB whitelisting mitigation actions listed in this IAA should be implemented regardless of platform and operating system version.
- Date: 06/30/2017
- Link: https://apps.nsa.gov/iaarchive/library/ia-advisories-alerts/cisco-snmp-buffer-overflow-vulnerabilities.cfm
- Category: IA Advisories
- SHA256: 251B8AEB7A375F85E99C4ECD0FFC99C3686D77F12EB1BB251C21A03AF2DA3B99
- Size: 119KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Frank B Rowlett Award for Organizational Excellence
Return to the Table of Contents.
Devices with Intel Atom C2000 Series Processors
- Abstract: Devices with Intel Atom C2000 series processors can fail suddenly, impacting the availability of critical infrastructure and/or national security system networks. Intel Atom C2000 series processors manufactured since September 2013 (with B-0 stepping/version) could experience failure at above acceptable rates. The Low Pin Count (LPC) clock signal gradually degrades with use, potentially causing the device to cease operation and fail to boot. These processors are embedded in several types of network and enterprise devices (i.e., security appliances, network routers, and data storage devices). Suppliers are working with customers to replace or repair affected products. NSA recommends working with system suppliers as soon as possible to determine if devices are affected and create an appropriate replacement or repair strategy, depending on the criticality of the network system and use condition.
- Date: 06/16/2017
- Link: https://apps.nsa.gov/iaarchive/library/ia-advisories-alerts/devices-with-intel-atom-c2000-series-processors.cfm
- Category: IA Advisories
- SHA256: 7AFDDDB739E44913DF142CC7064FE8C7A328AFC21EB02731444D837EFC0F3DF4
- Size: 159KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
National Security Cyber Assistance Program Cyber Incident Response Assistance Accreditation Instruction Manual
Return to the Table of Contents.
Return to the Table of Contents.
- Abstract: With the accelerating pace of innovation and the convergence of new technologies such as the Internet of Things (IoT), it is increasingly difficult to manage growing IA risk. With security sometimes underinvested when bringing technologies quickly to market, potential IA vulnerabilities can be exploited at alarming rates, globally impacting civilian entities, government entities, and organizations across all industries.
- Date: 06/13/2017
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/advanced-concepts-ia-solutions-speed-of-technology.cfm
- Category: IA Guidance > Security Tips
- SHA256: 5AE059DF0CD2F0623C79203D8C89971BFF5F83304BB3FC9A0074EA78859CE2AD
- Size: 457KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Network Security Devices Utilizing Vulnerable Weak Signature Algorithms in TLS
Return to the Table of Contents.
Network Security Devices Utilizing Vulnerable Weak Signature Algorithms in TLS
Return to the Table of Contents.
Whitelisting Windows IIS and WebDAV Traffic
- Abstract: Since web servers typically serve as the public face of an organization, they are a frequent target of attacks. For this reason, web server security is essential. Microsoft’s Internet Information Services (IIS) web server includes a Request Filtering module that can filter HTTP requests in order to reduce a web server’s attack surface. This document provides guidance on how to use Request Filtering to better secure IIS web servers through a strategy of HTTP and WebDAV verb whitelisting.
- Date: 05/19/2017
- Link: https://apps.nsa.gov/iaarchive/library/reports/whitelisting_windows_iis.cfm
- Category: Reports
- SHA256: C23777AA6D4D2EA1C93EE64B6960EE235A86A6B4DF1DC8FD521393E4779436A9
- Size: 2,003KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Mitigations for WannaCrypt-WannaCry Ransomware
- Abstract: Guidance in Information Assurance Advisory No. IAA U/OO/800900-17, “March 2017 Patch Tuesday” recommended the immediate application of Microsoft’s March 2017 Patch Tuesday release on all supported platforms. The release patched several zero-day vulnerabilities.
In response to widespread ransomware attacks against unpatched or unsupported platforms, Microsoft has also released the same security updates for specific unsupported Windows platforms. Its immediate installation is critical for Department of Defense networks and other National Security Systems.
Microsoft and Windows are trademarks or registered trademarks of Microsoft Corp.
- Date: 05/16/2017
- Link: https://apps.nsa.gov/iaarchive/library/ia-advisories-alerts/mitigations-for-wannacrypt-wannacry-ransomware.cfm
- Category: IA Advisories
- SHA256: 452E94F21D2450CDF0EA40C6789FC85622370A663D5489469A5D022DF72DCD9F
- Size: 185KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
CVE-2017-5689: Intel AMT, Intel ISM Privilege Escalation
- Abstract: Intel published a security advisory regarding this vulnerability (Intel ID is INTEL-SA-00075). The vulnerability allows an unprivileged network attacker to perform a remote privilege escalation. It also allows an unprivileged local user to perform the privilege escalation. The vulnerability affects Intel manageability SKU platforms dating back to the 1st Generation Core architecture CPU. Intel has released detection and mitigation guidance recommending that system owners seek firmware updates from the Original Equipment Manufacturers (OEMs). The Common Vulnerabilities and Exposures (CVE) number associated with this vulnerability is CVE-2017-5689.
- Date: 05/04/2017
- Link: https://apps.nsa.gov/iaarchive/library/ia-advisories-alerts/intel-ism-privilege-escalation.cfm
- Category: IA Advisories
- SHA256: 85BDC6F673E43F98D5E547CB16C4F0CC0336E49596CD605A75FD4E6F062ABB12
- Size: 191KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Faulty Intel Atom C2000 Processor
- Abstract: The Intel Atom C2000 processor series has a critical flaw, the clock signal component degrades after 18-36 months of operational usage. As a consequence, the degradation of the processor will likely result in abrupt device failure. This processor supplies critical clock signal timing to other hardware components, including the boot ROM. These processors have been embedded in several network and enterprise devices, which provide communication security and data storage services. Vendors are cooperating with customers to replace affected products. NSA recommends to immediately remove and replace affected devices from operational networks.
- Date: 05/03/2017
- Link: https://apps.nsa.gov/iaarchive/library/ia-advisories-alerts/faulty-intel-atom-c2000-processor.cfm
- Category: IA Advisories
- SHA256: 703CAA77C214F5468E0AFD34021703B0B46C960C9522DAF7716BF2F5869946B2
- Size: 493KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Privileged Access Management
- Abstract: Privileged Access Management (PAM) solutions protect and track the use of sensitive or critical capabilities such as administrative or service accounts. PAM solutions provide a centralized management interface for authentication and access control throughout the network. This unification provides simplified device management as well as an improved, granular least privilege implementation. In some cases, access controls and management functions can be automated.
- Date: 04/26/2017
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/privileged-access-management.cfm
- Category: IA Guidance > Security Tips
- SHA256: 4DBAF8CA8701CB1A75D61DFAC1A7693DCF503086CCC843867902751966F1383B
- Size: 257KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Apply Kernel Protection on Windows 7 and Windows 7 SP1 - Updated
- Abstract: User mode and Kernel mode software may inadvertently or purposely access the NULL (0x00000000) memory page. This memory location has been leveraged in attacks to successfully exploit a system. Microsoft developed and released the KB28131702 patch (MS13-031) for 64-bit and 32-bit versions of Windows 7 and Windows 7 SP1 to mitigate this exploitation vector. The NULL page protection is part of Windows beginning with Windows 8 and onwards. IAVA 2013-A-0080 (KB2813170) was superseded by IAVA 2015-A-0009 and IAVA 2015-A-0033. However, those IAVAs do not address the requisite post-configuration registry value stated in the IAA document.
NOTE: This document supersedes IAA-U-OO-800824-17.
- Date: 04/26/2017
- Link: https://apps.nsa.gov/iaarchive/library/ia-advisories-alerts/apply-kernel-protection-windows7-windows7sp1-updated.cfm
- Category: IA Advisories
- SHA256: 391A2170C4A7CD9DC767F5EEAE69BE3EF850433284A4C3091818C28F2110D123
- Size: 115KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
- Abstract: Cryptographic components manufactured to conform to the Trusted Computing Group’s (TCG) Trusted Platform Module (TPM) specification have been widely deployed in commercial computing devices including personal computers, servers, and tablets. In 2007 the DoD Chief Information Officer issued a policy memorandum, which requires that “all new computer assets (e.g. server, desktop, laptop, and PDA) procured to support the DoD enterprise include a Trusted Platform Module (TPM) version 1.2 or higher where such technology is available.”
- Date: 04/14/2017
- Link: https://apps.nsa.gov/iaarchive/library/ia-advisories-alerts/nsa-position-trusted-platform-modules-national-security-systems.cfm
- Category: IA Advisories
- SHA256: F26AB3BDCC9587173F8257B8797BBABFE7015C9A543D858F602CA71FFEA19591
- Size: 185KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Least Privilege
- Abstract: The least privilege principle is the practice of restricting capabilities to only those who require them. On information systems, these capabilities may include: The ability to access or log into machines or services; The ability to access resources such as files or data; The ability to install, update, or execute programs, processes, or applications; The ability to add or remove users, devices, or processes to a network
- Date: 04/10/2017
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/least-privilege.cfm
- Category: IA Guidance > Security Tips
- SHA256: 6989A36EB6032DCB6860AC42FA6F870113C1B161FB403238D8411E4C220537D6
- Size: 960KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
March 2017 Patch Tuesday
- Abstract: Microsoft’s March 2017 Patch Tuesday release contains a significant number of critical patches including the delayed February Patch Tuesday patches. March’s Patch Tuesday includes fixes for three publicly known zero-day vulnerabilities that have had proof of concept exploitation code available for a number of weeks. Immediate installation of all March 2017 Patch Tuesday patches is critical for Department of Defense networks and other National Security Systems.
- Date: 03/16/2017
- Link: https://apps.nsa.gov/iaarchive/library/ia-advisories-alerts/march-2017-patch-tuesday.cfm
- Category: IA Advisories
- SHA256: 3BABFBFB9EBF5CC4295988AB537284FE712D11B9584A24521AFF041C4395C3CB
- Size: 179KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Removal of Server Message Block 1.0
- Abstract: Server Message Block (SMB) 1.0 is a vulnerable, legacy file and print sharing protocol that has been deprecated by Microsoft. The SMB 1.0 protocol is susceptible to downgrade and man-in-the-middle attacks, and uses MD5 for hashing which is susceptible to collision and pre-image attacks. All supported versions of the Windows operating system support at least SMB 2.0 and do not require SMB 1.0 for regular file and print sharing functionality. At a minimum, Microsoft recommends disabling SMB 1.0, but complete removal is recommended when an operating system supports removal. If SMB 1.0 is still needed, then administrators should identify systems, devices, and software that only support SMB 1.0 and prioritize their removal, upgrade, or replacement.
- Date: 03/16/2017
- Link: https://apps.nsa.gov/iaarchive/library/ia-advisories-alerts/iaa-removal-of-server-message-block-1-0.cfm
- Category: IA Advisories
- SHA256: C302FED63C645F1EB6D1069B2D52DAFBD5133FAB50D7388ACE9D6EB82556AAB1
- Size: 230KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Overview of Software Defined Networking Risks
- Abstract: Software Defined Networking (SDN) is an emerging technology, defined by the Open Network Foundation (ONF) as “the physical separation of the network control plane from the forwarding plane, and where the control plane controls several devices.” While SDN offers new capabilities, it also introduces new risks. This document provides technical background, an overview of risks, and guidance for decision makers regarding SDN. For some networks, it may be impossible to mitigate critical risks due to architectural or implementation challenges.
- Date: 02/24/2017
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/overview-of-software-defined-networking-risks.cfm
- Category: IA Guidance > Security Tips
- SHA256: FE5C5100925883A375ABEB779C8B23830FA985F2B96E3276A91056CB419AF327
- Size: 2,587KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Commercial Solutions for Classified Tri-fold
- Abstract: Given constantly evolving mission requirements and the rapid pace of technology advancement, protecting national security systems and deploying information assurance solutions requires an agile, scalable process. CSfC enables U.S. government customers to access the latest technologies in order to achieve their mission objectives.
The CSfC process enables commercial products to be used in layered solutions to protect classified National Security Systems (NSS) information. This provides the ability to securely communicate based on commercial standards in a solution that can be fielded in months, not years.
- Date: 01/31/2017
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/commercial-solutions-for-classified-trifold.cfm
- Category: IA Guidance > Security Tips
- SHA256: 863E53325E64AA40BE7DCDEB310BB6556937B8E752F95F12D81C702722CAD5FC
- Size: 111KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Commercial Solutions for Classified Brochure
- Abstract: Given constantly evolving mission requirements and the rapid pace of technology advancement, protecting national security systems and deploying information assurance solutions requires an agile, scalable process. CSfC enables U.S. government customers to access the latest technologies in order to achieve their mission objectives.
The CSfC process enables commercial products to be used in layered solutions to protect classified National Security Systems (NSS) information. This provides the ability to securely communicate based on commercial standards in a solution that can be fielded in months, not years.
- Date: 01/31/2017
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/commercial-solutions-for-classified.cfm
- Category: IA Guidance > Security Tips
- SHA256: B5F50CF7495A51C7C00903CA9A3791C9C526686CEA11F8BD78D884F39DC19762
- Size: 24,218KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Reducing the Risk of Simple Network Management Protocol Abuse
- Abstract: SNMP provides a standardized framework for a common language that is used for monitoring and managing devices in a network. This protocol relies on the usage of a secure string, referred to as a community string, which grants access to a portion of a device’s management plane.
There are several differences between SNMPv1, v2, and v3: SNMPv2 is nearly identical to SNMPv1, except 64-bit counters were added in order to support faster interfaces. SNMPv3 replaces the simple/clear text password sharing that was used in SNMPv2 with more securely encoded parameters. All versions run over user datagram protocol (UDP).
SNMPv3 should be the only utilized version of SNMP because it has the ability to authenticate and encrypt payloads. When either SNMPv1 or SNMPv2 are utilized, the community string could be determined by an adversary by sniffing network traffic, which could then potentially lead to a man-in-the-middle and/or replay attack.
Using SNMPv3 by itself is not enough to prevent abuse of the protocol. Combining SNMPv3 with a Management Information Base (MIB) whitelisting approach using SNMP views can ensure that even with exposed credentials, information cannot be read from or written to the device unless the information is needed for monitoring or normal device re-configuration. The majority of devices that support SNMP contain a generic set of MIBs that are vendor agnostic, which allows for the Object Identifier (OID) to be applied to devices regardless of manufacturer.
- Date: 01/31/2017
- Link: https://apps.nsa.gov/iaarchive/library/ia-advisories-alerts/reducing-the-risk-of-snmp-abuse.cfm
- Category: IA Advisories
- SHA256: B98D06F413398FCE49CBAF16CBBC8D939BF55FA2F7C631FFE3E2C09800FD6F92
- Size: 540KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
- Abstract: 2016 was a year of growth for National Information Assurance Partnership (NIAP) – increasing evaluated products available for National Security System procurement, collaborating with industry and government in the development of Protection Profiles which define security requirements and assurance activities for a wide range of commercial technologies, and representing the US in the Common Criteria Recognition Arrangement (CCRA), including serving as the CCRA Development Board chair.
- Date: 01/28/2017
- Link: https://apps.nsa.gov/iaarchive/library/reports/niap-2016-report.cfm
- Category: Reports
- SHA256: 27FD1EF076B030CA7AD3CC310E8160AE84B264F981CEFAF6C80EA02B368EAF1A
- Size: 545KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Community Gold Standard Brochure
Return to the Table of Contents.
Reducing the Risk of Vulnerabilities in Unix/Linux-Based Operating Systems
- Abstract: Unix/Linux is a family of operating systems that underpin a large portion of government and commercial servers and infrastructure devices. Due to the prevalence of Unix/Linux systems in public and private infrastructure, and the existence of many exploits and implants that are available, ensure system security by following community best practices and understanding current threats and risks.
- Date: 01/04/2017
- Link: https://apps.nsa.gov/iaarchive/library/ia-advisories-alerts/reducing-the-risk-of-vulnerabilities-in-unix_linux-based-operating-systems.cfm
- Category: IA Advisories
- SHA256: 9A608B6080E95E27C24ABE65B8A29196704BAD07A173E1F26AE0C53C64A9A823
- Size: 222KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
PowerShell: Security Risks and Defenses
- Abstract: This document is in response to the Technical Report “Defending Against the Malicious Use of Admin Tools: Powershell CTR-U-OO802243-16. This paper provides a strategy for hardening, defending, and detecting anomalous and malicious use of administrator tool sets.
- Date: 12/01/2016
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/powershell-security-risks-and-defenses.cfm
- Category: IA Guidance > Security Tips
- SHA256: 45E1F703C357886D200A60243B064295525716E2BD55ABA08A8CED879B52D316
- Size: 277KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Windows 10 for Enterprises
- Abstract: This document describes features present in Windows 10 Enterprise 64-bit that can disrupt exploitation techniques and tools used against national Security Systems today and how the timely adoption of new releases can help to protect systems in the future.
- Date: 12/01/2016
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/windows-10-enterprises.cfm
- Category: IA Guidance > Security Tips
- SHA256: 3FADDEBEBBABE539AA1BE83197B4D23B6B105E40F7706AB884021F9695DE6AA7
- Size: 463KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Long-lived Hashes for Active Directory SmartCard Required Accounts
- Abstract: It is well-known that passwords and their hashes can often be copied and reused by malicious cyber actors. Requiring smartcards or other hard tokens enables stronger authentication because they cannot be copied. Such a token can used by an adversary while the legitimate user is using it if an adversary has compromised the user’s device, but not at other times or directly from other devices. When smartcards, are required to login to Windows Active Directory (AD) Domains, a random password is created and its hash is associated with the account. This allows the device (via the user’s account) to use legacy authentication protocols such as NTLM to gain access to resources. In this case, the long random password is better than most user-chosen.
- Date: 11/22/2016
- Link: https://apps.nsa.gov/iaarchive/library/ia-advisories-alerts/long-lived-hashes-for-ad-smartcard-required-accounts.cfm
- Category: IA Advisories
- SHA256: 50C59F19E6F384AC9C744395661C92C5C6152996D25BD9F70437AA15F3A15ED4
- Size: 392KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Eliminating Control Flow Exploitation
- Abstract: Many attacks rely on the ability of an adversary to manipulate the normal, expected flow of the legitimate software executing on a platform. This talk will summarize the mitigations NSA is developing with industry to address this attack vector at a fundamental level and in a way that is largely invisible to the end user and administrator.
- Date: 11/21/2016
- Link: https://apps.nsa.gov/iaarchive/library/ias/adversary-mitigations/eliminating-control-flow-exploitation.cfm
- Category: IA Symposium > Adversary Mitigations
- SHA256: AB3EEF36C47AA6937C72A5F59504BEACDAC1A024F22D005CE121993981332CC4
- Size: 1,558KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Voice and Video over IP
- Abstract: An overview of Video and Voice Over Internet Protocol (VVOIP) will be presented along with security concerns and NSA’s recommendations on how to build a secure VoIP architecture.
- Date: 11/21/2016
- Link: https://apps.nsa.gov/iaarchive/library/ias/adversary-mitigations/voice-and-video-over-ip.cfm
- Category: IA Symposium > Adversary Mitigations
- SHA256: 43DB1DBAA499413A8F7E6F8ADBE6C8987E77A62D36C23C8FD8F73AC20CD882C0
- Size: 939KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Top Ten IA Mitigations
- Abstract: Learn about how NSA’s Top 10 Information Assurance Mitigations obstruct the intrusion lifecycle into networks and have been applied in response to real intrusions in order to mitigate the threat techniques used.
- Date: 11/21/2016
- Link: https://apps.nsa.gov/iaarchive/library/ias/adversary-mitigations/top-ten-ia-mitigations.cfm
- Category: IA Symposium > Adversary Mitigations
- SHA256: 5A296EA36EF6A2D05B9B39AD4EC8315D2F3AA9F16E1629C5A6BC96B050488B60
- Size: 1,544KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Overcoming Barriers to Adopting Top 10 IA Mitigations
Return to the Table of Contents.
Securely Configuring Adobe Acrobat
- Abstract: Adobe Reader is the predominant PDF reader, one that added numerous security features over the last few years. This talk will highlight the security features in the most current version along with our recommended settings.
- Date: 11/19/2016
- Link: https://apps.nsa.gov/iaarchive/library/ias/adversary-mitigations/securely-configuring-adobe-acrobat.cfm
- Category: IA Symposium > Adversary Mitigations
- SHA256: 2DC76AC9863E66DBFC58EA699FD4D910C18CBC8F08CE68BCF46DA323C7E2AA33
- Size: 1,120KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Mitigating Insider Threats
- Abstract: External cyber intrusions can be difficult to defend against. Internal intrusions by insiders are even more difficult to defend against. Learn about mitigations that can be effective against insider threats.
- Date: 11/19/2016
- Link: https://apps.nsa.gov/iaarchive/library/ias/adversary-mitigations/mitigating-insider-threats.cfm
- Category: IA Symposium > Adversary Mitigations
- SHA256: 21EE5E2FCC14DB7CEAEFB0AF24E936C554CCA7CC34ADBFE021ADCADF9EE5A5E1
- Size: 931KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Comply to Connect
- Abstract: Ensuring that devices on a network are not vulnerable is hard to do. Comply to Connect (C2C) simplifies this by enforcing that patches and hardened configuration are applied to devices before they connect and updated continually. Learn about the benefits of C2C and how easily it can be leveraged to improve most networks.
- Date: 11/19/2016
- Link: https://apps.nsa.gov/iaarchive/library/ias/adversary-mitigations/comply-to-connect.cfm
- Category: IA Symposium > Adversary Mitigations
- SHA256: CAB1F1EE31F4EAD6613ECAA66C13CE38A2577490928A9E11C40836DB349B5FB3
- Size: 1,106KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Application Whitelisting Best Practices
- Abstract: Cyber defense is not easy. Application Whitelisting is the number one mitigation from the NSA’s Information Assurance Top 10, yet many network owners find it a challenge to implement. Learn about some of the common barriers to implementing Application Whitelisting and the best practices for overcoming them. This presentation will be at the Intermediate level.
- Date: 11/19/2016
- Link: https://apps.nsa.gov/iaarchive/library/ias/adversary-mitigations/application-whitelisting-best-practices.cfm
- Category: IA Symposium > Adversary Mitigations
- SHA256: 99A8000927736863332DFD55EB759E32E93915428FB51DBBF8B747C3DCCA7C74
- Size: 1,394KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Return to the Table of Contents.
Application Isolation Containment
- Abstract: Given that writing fully secure code remains an elusive goal, other techniques such as isolating processes to limit the adverse effect of a compromise are promising. This talk will summarize some of the techniques, both integrated into the operating system and available as third party add-ons, to provide this isolation.
- Date: 11/19/2016
- Link: https://apps.nsa.gov/iaarchive/library/ias/adversary-mitigations/application-isolation-containment.cfm
- Category: IA Symposium > Adversary Mitigations
- SHA256: 6027A24D701D5D36CC9107FA33DB0B4E54077E9735DA7606A1DD2EA1922EE04D
- Size: 907KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Building the Cyber Workforce Pipeline: Preparing for Today, Tomorrow, and the Day After Tomorrow
Return to the Table of Contents.
The NSA Codebreaker Challenge
- Abstract: In this presentation we’ll discuss the NSA Codebreaker Challenge, a reverse engineering challenge problem aimed at both strengthening the nations skills in this area while also providing NSA with a new avenue to identify and recruit top talent. We’ll talk about our experiences with holding the Codebreaker Challenge over the last three years, discuss the design of both the technical aspects involved and the supporting incentive structures that encouraged participation, and we’ll present lessons learned along the way.
- Date: 11/18/2016
- Link: https://apps.nsa.gov/iaarchive/library/ias/building-national-capacity/nsacodebreakerchallenge.cfm
- Category: IA Symposium > Building National Capacity
- SHA256: 7C2E494D3012A14E5FC0A1443646998F9CB5409C84EADA157C491D33C072AEFC
- Size: 817KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Training and Certification:Impacting NSA’s Mission
- Abstract: The National Security Agency (NSA) knows that its workforce is the critical component to completing its mission of protecting our nation and its allies. To do this, key workforce functions must be capable of performing each of its tasks at a one hundred percent proficiency. Certifying mission-critical employees requires a comprehensive approach that is customized for each functional position. The critical tasks must be current and use the best learning technologies and management capabilities in the industry.
- Date: 11/18/2016
- Link: https://apps.nsa.gov/iaarchive/library/ias/building-national-capacity/certificationimpact.cfm
- Category: IA Symposium > Building National Capacity
- SHA256: FE8F8DB1E1CCED1590CC4E73413585DFB94B6D4C7E23A63E8C049526A204CC2C
- Size: 1,694KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Joint COMSEC Monitoring Activity Findings and Trends
- Abstract: JCMA frequently discovers critical sensitive network information that could jeopardize US Military and VIP Civilian Leadership tactical intentions including PII data, tactical travel plans, joint force locations of ships and aircraft. This briefing will advise of Top 10 disclosures and mitigation that thwarts the use of the disclosed unclassified information.
- Date: 11/18/2016
- Link: https://apps.nsa.gov/iaarchive/library/ias/defense-at-cyber-speed/jcma-findings-and-trends.cfm
- Category: IA Symposium > Defense At Cyber Speed
- SHA256: 79C5033460B94D56905651C81425451F0F1781EA7BA530BEF7EB77BA3034CB08
- Size: 1,093KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Compliance Training for Technical Professionals: A Case Study
- Abstract: Technical professionals need more than a list of requirements to build internal controls into systems – they need to learn what questions to ask up front to ensure they have the right compliance requirements. Explore the evolution and development of Mission Compliance for Technical Professionals, an online training program designed for individuals that are building privacy compliance into systems, software, tools, and analytics. Learn about the challenge of incorporating Subject Matter Experts appropriate to each of the various technical work roles; training topics and key messages; recognizing and mitigating errors in all phases of the IT lifecycle – building, maintaining, and updating.
- Date: 11/18/2016
- Link: https://apps.nsa.gov/iaarchive/library/ias/building-national-capacity/compliance-training.cfm
- Category: IA Symposium > Building National Capacity
- SHA256: 7215022AE22BD30A4B3957CA1B532BFF94B108C442CB7AC92AD9E5FAAFAAC916
- Size: 2,243KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Third Party Services Your Risk Picture Just Got a Lot More Complex
- Abstract: For some time now, the U.S. Government has sought the best means to protect national security interests without inappropriately undermining the value (i.e., innovation, efficiency) produced by the global information and communications technology (ICT) supply chain. While past efforts have focused on managing supply chain risk associated with manufactured equipment and software, the new emerging concern is managing the risks associated with outsourced services.
- Date: 11/18/2016
- Link: https://apps.nsa.gov/iaarchive/library/ias/defense-at-cyber-speed/third-party-services-your-risk-picture-just-got-a-lot-more-complex.cfm
- Category: IA Symposium > Defense At Cyber Speed
- SHA256: E70A48E43B01AFD2B6BF0201B926B72C7010F5C7770AA7E5CFE000229014990E
- Size: 864KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Making Mitigations Matter Measuring Host Mitigation State
- Abstract: Mitigations are a significant factor when considering the risks applicable to a network and must be accounted for in order to provide a sense of priority to any additional mitigations that should be applied. This talk will explore means created or under development by NSA to accurately represent the state of mitigations on a network using automated risk scoring systems, with the results tied to the list of mitigations NSA believes are particularly critical. Specific topics include the Splunk Assessment of Mitigation Implementations (SAMI) capability and how mitigations can be covered in vulnerability assessment systems like DISA’s Continuous Monitoring and Risk Scoring (CMRS) effort and DHS’s Contiguous Diagnostics and Monitoring (CDM) program.
- Date: 11/18/2016
- Link: https://apps.nsa.gov/iaarchive/library/ias/adversary-mitigations/t2_making-mitigations-matter.cfm
- Category: IA Symposium > Adversary Mitigations
- SHA256: 961D28FB4A10AFF788BCA78CFD4735E3E4007318699CABC2E33ED03D91094514
- Size: 613KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
- Abstract: Malicious actors are using our own tools against us. Why reinvent the wheel or drop something new, something distinguishable, when the tools used on every network every day will provide you all you need? This paper provides a strategy for hardening, defending, and detecting anomalous, and malicious, use of administrator toolsets. In particular, this paper will focus on Microsoft’s PowerShell and will provide a methodology for hardening and defending it from adversarial use.
- Date: 11/11/2016
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/tech-briefs/defending-against-the-malicious-use-of-admin-tools-powershell.cfm
- Category: IA Guidance > Technical Briefs
- SHA256: 8EC2924D1DF2E9E698AE2089C028075FD6E2902E3F8F3E00C11395D831EC7A06
- Size: 850KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Blocking Macros from Internet Originated Microsoft Office Files
- Abstract: Microsoft Office files and documents may contain a macro, an embedded program written in Visual Basic for Applications (VBA). Although VBA macros have legitimate uses, macros in Microsoft Office have proven themselves to be a long-lasting and increasingly popular attack vector. In response to this threat, Microsoft has recently provided an ability to block the execution of VBA macros, in files downloaded from the Internet, for Office3 2013 and 2016.
- Date: 11/10/2016
- Link: https://apps.nsa.gov/iaarchive/library/ia-advisories-alerts/blocking-macros-from-internet-originated-microsoft-office-files.cfm
- Category: IA Advisories
- SHA256: 154AA5CD26BCB59D0B35B80A7A9AABEFD5216DBEA81A813B299806825F75C235
- Size: 189KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Hardening Authentication Update
- Abstract: On many networks, in order for users to be granted access to network resources, a user must prove that he or she is an authorized user. This is the process of user authentication. A user can be authenticated by what he has (e.g. an ID card or token), what he knows (e.g. a PIN or password), or what he is (e.g. biometric data). More robust authentication processes use two or more of these factors, called multi-factor authentication.
- Date: 11/03/2016
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/hardening-authentication-update.cfm
- Category: IA Guidance > Security Tips
- SHA256: 66153221D88CDC59AF94B5EF0CFEA30F9BB696DBAF7DB715EE7DD21339672753
- Size: 319KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Manageable Network Plan Teaser Update
Return to the Table of Contents.
Assess the Mess
- Abstract: This is a technical document/manual for use by DoD, government, and industry ICS owners and operators. It provides methodologies to collect and analyze host and network data on ICS networks in order to baseline and secure these infrastructures.
- Date: 11/01/2016
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-configuration/industrial-control-systems/assess-the-mess.cfm
- Category: IA Guidance > Security Configuration > Industrial Control Systems
- SHA256: 7D9941ADED47603940E9670CDD8A13D9B894028AF781A645D2FC5D492AA2DF24
- Size: 3,847KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Linux Kernel Privilege Escalation Vulnerability CVE-2016-5195
- Abstract: On 17 October 2016 CVE-2016-5195 was released, affecting all older Linux kernel versions from 2.6.22 to 4.8.3. This vulnerability affects systems world-wide and is of National concern. This privilege escalation vulnerability allows any unprivileged user, defined as a user with restricted permissions, to gain full root access. The vulnerability is also known by the moniker, Dirty COW, which is derived from Copy of Write.
- Date: 10/27/2016
- Link: https://apps.nsa.gov/iaarchive/library/ia-advisories-alerts/linux-kernel-privilege-escalation-vulnerability-cve-2016-5195.cfm
- Category: IA Advisories
- SHA256: 7DF27B900121C4FC6C285A072E0569655D0E8BB30AA3EF5D6C2AB4C3387F843E
- Size: 275KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Security Configuration Guide for Browser Updates
- Abstract: Web browsers must be updated on a frequent basis in order to resist highly-scalable, low cost attacks. This document provides a per-browser approach for administrators to keep each major browser updated. Technical details provided in this guide are subject to change as operating systems and browser software evolve, but the overall strategies are likely to remain consistent.
- Date: 10/14/2016
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-configuration/applications/security-configuration-guide-for-browser-updates.cfm
- Category: IA Guidance > Security Configuration > Applications
- SHA256: F009EB5B3F17426DF20E2CFD50489AED85F257ADF7A7D09266E2F02370845A75
- Size: 721KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Best Practices for Keeping Your Home Network Secure (Update)
Return to the Table of Contents.
Recommendations to Mitigate IKEv1 Vulnerability in Cisco Network Devices
Return to the Table of Contents.
Outdated Network Devices and Unsecure Protocols and Services Expose Network Infrastructure to Compromise
- Abstract: Outdated network devices have known and unknown vulnerabilities that expose the network to severe risk. Unsupported, also called end-of-life, devices and software versions will not receive patches from vendors even for known vulnerabilities. Improperly secured communication protocols and services and insecure credentials increase the risk of unauthorized access and modification to the network infrastructure. When network infrastructure devices are deployed, these devices remain online for several years and are rarely rebooted, patched, or upgraded. Network infrastructure devices include routers, switches, access points, gateways, proxies, firewalls, and others. Common improperly secured protocols are Simple Network Management Protocol (SNMP), Secure Shell (SSH), Telnet, and others. Networks must not use vulnerable devices and software versions or unsecured protocols unless absolutely necessary, and, if necessary, ONLY along with supplemental mitigations to detect and prevent compromise and lateral movement.
- Date: 09/02/2016
- Link: https://apps.nsa.gov/iaarchive/library/ia-advisories-alerts/outdated-network-devices-and-unsecure-protocols-and-services.cfm
- Category: IA Advisories
- SHA256: 5DBEC3809884EC3E5CD7841050E3C7B018FCA8AAD649CFAC63D227C61633F9DE
- Size: 893KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Vulnerabilities in Cisco Adaptive Security Appliances Identified in Open-Source – Version 1
- Abstract: On 15 August 2016, exploits targeting vulnerabilities previously not publicly known in Cisco Adaptive Security Appliances and other security devices were released on the Internet. On 17 August 2016, Cisco published an advisory (cisco-sa-20160817-asa-snmp) and released a patch for a vulnerability in its ASA devices, determined to be an SNMP Remote Code Execution Vulnerability, due to a buffer overflow.
- Date: 08/20/2016
- Link: https://apps.nsa.gov/iaarchive/library/ia-advisories-alerts/vulnerability-in-cisco-adaptive-security-appliances-identified-in-open-source-v1.cfm
- Category: IA Advisories
- SHA256: 7EF98A2E0F4AAF1FBF1437C06BD7EF46311406BDD8006211799DDDF82F185040
- Size: 196KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Bluetooth for Unclassified Use: A Risk Discussion for IT Decision Makers
- Abstract: Bluetooth is a short-range wireless technology found in many commercial devices used for computing, communication, and healthcare. The decision to add Bluetooth devices to an IT landscape must be based on well-informed consideration of the risks and benefits. Different types and implementations of Bluetooth devices may incur varying levels of risk, so a good Bluetooth policy likely lies somewhere between permitting all and prohibiting all Bluetooth devices. This document provides information about the operation of Bluetooth and the threats against it, and suggests questions that decision-makers can ask in order to identify the devices most likely to behave in accordance with a secure Bluetooth policy.
- Date: 08/04/2016
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/tech-briefs/bluetooth-for-unclassified-use_a-risk-discussion-for-it-decision-makers.cfm
- Category: IA Guidance > Technical Briefs
- SHA256: F0BE2479934EE6C9F4B6D24012B7E1D95A9CA5241107B8D93F6FF14003FF8CCA
- Size: 348KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Bluetooth for Unclassified Use: Guidelines for Users
- Abstract: Bluetooth is a short-range wireless technology found in many commercial devices used for computing, communication, and healthcare. Bluetooth offers the convenience of low-power wireless device-to-device communication, opening the door for diverse and exciting use cases for recreation and business.
As with other technologies, threats exist today that endanger the integrity, confidentiality, and availability of the information transferred to and from devices using Bluetooth. This document provides background on Bluetooth functionality and includes recommendations for using Bluetooth securely to mitigate possible risks.
- Date: 08/04/2016
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/tech-briefs/bluetooth-for-unclassified-use_guidelines-for-users.cfm
- Category: IA Guidance > Technical Briefs
- SHA256: 32F40FB74577D04032FF55653119D37441BA5E5A9128A246A5284CBCA05FA2B0
- Size: 313KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Bluetooth for Unclassified Use: Guidelines for Developers
- Abstract: Bluetooth offers the convenience of low-power wireless device-to-device communication, opening the door for diverse and exciting use cases for recreational and business users. The proliferation of Bluetooth into a broad range of modern personal devices has generated a demand for software applications that enable users to interact with it.
As with other technologies, threats exist today that endanger the integrity, confidentiality, and availability of the information transferred to and from devices using Bluetooth. The design of any software involved in transferring data via Bluetooth should include measures to protect the user’s device and data. This document provides background on Bluetooth functionality and recommendations for developing secure Bluetooth applications.
- Date: 08/04/2016
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/tech-briefs/bluetooth-for-unclassified-use_guidelines-for-developers.cfm
- Category: IA Guidance > Technical Briefs
- SHA256: 3193DD7ACC7B435DB21380D31CE7E9C005068B5523A4C54AC32FD731CD4A158C
- Size: 340KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Take Advantage of Software Improvement
- Abstract: New security technologies and software development methodologies have drastically improved the security posture of software and systems released over the last decade. Specifically, new software antiexploitation features in conjunction with the adoption of systematic development processes have contributed to this improvement. Obtaining value from software improvements is only possible through product upgrades and timely deployment of patches.
- Date: 08/03/2016
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/take-advantage-of-software-improvement.cfm
- Category: IA Guidance > Security Tips
- SHA256: F8355E80378E6E2F92CCB07C349293191F3A8AE51692FF81BA2A40CF6933B629
- Size: 329KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Implementing a Secure Administrator Workstation Using Device Guard
- Abstract: Defenders must raise the cost for an adversary to obtain high-value domain credentials after an initial intrusion. One such way is through a dedicated administrator workstation for performing highly-privileged tasks subsequently referred to as a Secure Administrator Workstation (SAW). SAWs address credential theft techniques by limiting highly-privileged credentials to specific hardened systems. This guide will help DoD administrators configure a hardened admin workstation using Windows 10 and Device Guard.
- Date: 07/27/2016
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-configuration/operating-systems/windows-10-device-guard.cfm
- Category: IA Guidance > Security Configuration > Operating Systems
- SHA256: A2A83354BA9120EC2F3892CE8FD9C2A2D672DD37F0CD5B02CE8EC63F6EE06F8D
- Size: 957KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Outdated Software and Protocols Updated
- Abstract: Outdated and unsupported software and protocols have known and unknown vulnerabilities that expose the network to severe risk. Older software versions were not developed with modern secure coding practices and do not incorporate the most recent mitigations designed to prevent and contain intrusions.
- Date: 07/19/2016
- Link: https://apps.nsa.gov/iaarchive/library/ia-advisories-alerts/outdated-software-and-protocols-update.cfm
- Category: IA Advisories
- SHA256: 48F933C244AB102F006E115B8FD3D0F3D61831A19A3A2F16DFE83FA3FF153624
- Size: 448KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Recommendations to Mitigate Unauthorized Cisco ROMMON Access and Validate Boot ROMs
- Abstract: New attack methods have been observed targeting networking devices running Cisco Internetwork Operating System (IOS) Classic platforms. Adversaries access the device with valid administrative credentials and then upload malicious code. Compromised devices are used to establish persistence and manipulate device behavior. Refer to the Cisco Security Activity Bulletin for additional threat information. This Information Assurance Advisory includes recommendations and procedures to identify the loaded ROM image and recover with a trusted ROM image, improving assurance in the device.
- Date: 07/15/2016
- Link: https://apps.nsa.gov/iaarchive/library/ia-advisories-alerts/recommendations-to-mitigate-unauthorized-cisco-rommon-access-and-validate-boot-roms.cfm
- Category: IA Advisories
- SHA256: BA1BC155A943A6404F097F8176EB2300773AB67F6754A6CED04C65E6551F3365
- Size: 160KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Filter Sidecar Protocol (FSP) Specification
- Abstract: The purpose of this document is to describe the cross domain solution (CDS) Filter Sidecar Protocol (FSP). A filter sidecar is generally considered to be a network connected system, usually on a trusted operating system, that provides high assurance content inspection and sanitization functions for Cross Domain Solutions. The Filter Sidecar Protocol is intended to provide a mechanism for making new filtering capabilities available to an existing cross domain solution by adding a certified sidecar platform. As long as the CDS is tested to properly implement the Filter Sidecar Protocol, users should be able to add new content types without having to completely recertify the CDS since the filter sidecar would be separately certified.
- Date: 07/07/2016
- Link: https://apps.nsa.gov/iaarchive/library/reports/filter_sidecar_protocol_spec_v1_0_6-20171212.cfm
- Category: Reports
- SHA256: 2DB650174AB073705D518AFE7D7CEBB72F42F64EF215FAA5FF75FC1653AD1B8C
- Size: 822KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Network Mitigations Package-Infrastructure
- Abstract: The security community continues to address emerging network threats. The new security model now consists of prevention, detection, containment, and response to mitigate threats. The Network Mitigations Package-Infrastructure (NMP-I) focuses on layering information system network defenses enabling communications while controlling adversaries’ ability to move laterally through the network. The NPM-I provides guidance to aid organizations as well as system administrators in hardening core network infrastructure to protect network infrastructure access, network availability, and critical information.
- Date: 06/23/2016
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/network-mitigations-package-infrastructure.cfm
- Category: IA Guidance > Security Tips
- SHA256: 50BE84C7A0CAB53E5F1386F1B7C9547B059E20BC61E07A1D210659A2B2322D11
- Size: 1,010KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
- Abstract: Out-of-Band (OoB) network management is a concept that utilizes an alternate communication path to remotely manage network infrastructure. These alternate channels are designed and implemented to isolate management traffic from normal user traffic, so compromised user devices and communications cannot affect network operations or compromised network devices.
- Date: 06/23/2016
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/perform-out-of-band-network-management.cfm
- Category: IA Guidance > Security Tips
- SHA256: 1C46633A5616CC67165233BECD6AC0A8AE23AD7A0EB7A2448FDE8C10C1627A14
- Size: 493KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Validate Integrity of Hardware and Software
- Abstract: Grey market devices are network infrastructure devices acquired through unofficial channels. These devices can cause a loss of intellectual property and damage to reputation. Counterfeit hardware and software have appeared across many industries. They are often introduced into the supply chain through non-reputable re-sellers. Unknowingly using grey market devices can significantly comprise your network by introducing vulnerabilities such as logic bombs, back doors, and altered security functions. It is important to confirm the integrity of devices and software throughout the entire supply chain.
- Date: 06/23/2016
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/validate-integrity-of-hardware-and-software.cfm
- Category: IA Guidance > Security Tips
- SHA256: 69EF0B09E524A26C82613CA5ED876B8976F02A64F1330838A2674B1E0400E688
- Size: 621KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Harden Network Devices
- Abstract: There are several ways to access network devices: through an administration connection, console line, auxiliary line, and virtual terminal connection. Each method to access network devices should be secured to prevent any unauthorized access to the network device.
- Date: 06/23/2016
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/harden-network-devices.cfm
- Category: IA Guidance > Security Tips
- SHA256: 0DD459107C40F0120A4852AAC8FD97DAD9EA8EBD4B5817E522BCA0A92B8CF7F3
- Size: 459KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Secure Access to Infrastructure Devices
- Abstract: Secure access enables an administrator to maintain positive control of user accessing network infrastructure. There are multiple secure access devices and techniques that are scalable and can be used to keep your networks secure depending on which method fits the requirement.
- Date: 06/23/2016
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/secure-access-to-infrastructure-devices.cfm
- Category: IA Guidance > Security Tips
- SHA256: 77B96DA10FE641B9017EB2AE3050D6C11B32ECE8CB9DD168507A11971530FCF9
- Size: 496KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
National Security Cyber Assistance Program Vulnerability Assessment Accreditation Scoresheet 1.0
Return to the Table of Contents.
Protecting Virtual Private Network Traffic 2016
- Abstract: In March 2015 IAD released the Information Assurance Advisory (IAA) “Protecting Virtual Private Network (VPN) Traffic”. That advisory recommended utilizing a key size of 4096 bits or DH group 16. Since the release of that IAA, IAD released an advisory memo. To maintain consistency this IAA updates the previous one and includes the new guidance of a minimum key size of 3072.
- Date: 06/07/2016
- Link: https://apps.nsa.gov/iaarchive/library/ia-advisories-alerts/iaa-protecting-vpn-traffic-2016-unclassified.cfm
- Category: IA Advisories
- SHA256: FC208B84F6AEA24E69ACB1CFE758D5A6EF97CEC4AB1BB5ED1312826A7A3F84F6
- Size: 416KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Guidelines for ConfigurationPatch Management in Industrial Control Systems
- Abstract: This document was written with contributions from Subject Matter Experts at the Department of Homeland Security (DHS) and the National Security Agency (NSA). This document serves as an appendix to “Seven Strategies to Defend Industrial Control Systems”. Application Whitelisting (AWL) can detect and prevent attempted exectution of malware uploaded by adversaries. The static nature of some industrial control systems (ICS) computers, such as database servers and human-machine interfaces, makes these ideal candidates to run AWL. In some situations deploying AWL on ICS computers is simple, but it can be challenging in others. Operators are thus encouraged to work with vendors to baseline and calibrate AWL deployments.
- Date: 05/20/2016
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/tech-briefs/guidelines-for-configuration-and-patch-management-in-industrial-control-systems.cfm
- Category: IA Guidance > Technical Briefs
- SHA256: 01CA1AED067F0627D12E6AD815741F3178EB7F569ED61E7ACF58BDB8B537C90B
- Size: 1,663KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
ImageMagick Remote Code Execution Vulnerability CVE-2016-3714
Return to the Table of Contents.
Return to the Table of Contents.
Apple Quicktime Reaches End-of-Life for Windows Factsheet
- Abstract: Apple has officially ended support for QuickTime on Microsoft Windows. In January of 2016, Apple released the final update of QuickTime for Windows and removed the QuickTime plugin from browsers to help mitigate future vulnerabilities. In April of 2016, two new vulnerabilities were released, ZDI-16-241 and ZDI-16-242, that affect the most recent version of QuickTime for Windows. The vulnerabilities allow an attacker to remotely exploit a system by sending the victim a malicious .MOV file that is then viewed with QuickTime. Because Apple has ended support, Apple will no longer be deploying patches or future releases on Windows leaving the software unpatched. Windows systems running QuickTime are vulnerable until the software is removed. Apple and QuickTime are registered trademarks of Apple, Inc. and Microsoft and Windows are registered trademarks of Microsoft Corp.
- Date: 05/09/2016
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/iaa-apple-quicktime-reaches-end-of-life-for-windows.cfm
- Category: IA Guidance > Security Tips
- SHA256: A896C06B83356E0813DB559BE90A193A00BA60CC4A79C5AB9413C060508EB83C
- Size: 194KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
National Security Cyber Assistance Program Cyber Incident Response Assistance Accreditation Instruction Manual 3.2
Return to the Table of Contents.
National Security Cyber Assistance Program VAS Accreditation Instruction Manual
- Abstract: The purpose of this document is to provide application instructions and accreditation guidelines to organizations interested in applying for and receiving this accreditation. This accreditation is associated with two general VA activities: Certification and Accreditation (C&A), including C&A renewals, and Security Posture Assessments.
- Date: 05/02/2016
- Link: https://apps.nsa.gov/iaarchive/library/supporting-documents/nscap-vas-accreditation-instruction-manual.cfm
- Category: Supporting Documents
- SHA256: 42CA8FD920726DA7F1B25A43270CD109C91EB931FFDAC35ECBD0D66DFBFD5038
- Size: 1,343KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Wireless Intrusion Detection System Technical Brief
- Abstract: This document describes current capabilities and limitations of commercial Wireless Intrusion Detection Systems (WIDS). It includes the general types of attacks that WIDS can and cannot detect.
- Date: 04/23/2016
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/tech-briefs/wids_tech_brief.cfm
- Category: IA Guidance > Technical Briefs
- SHA256: F47010A478C53E22E1DC98929324791B4A4AC642D603D435EB8DD8BF7EE4BE29
- Size: 307KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Ransomware - Locky
- Abstract: Malware placemats summarize a particular piece of malware based on researched, collected and fused information and analysis. Placemats are intended to inform customers of the past, present, and potential future infections, characteristics, and best practices/mitigations on particular pieces of malware. They are also meant to be eye-catching and easy to digest reports for decision makers and cyber defense practitioners. This placemat focuses on the ransomware Locky. Locky’s infection rate accounts for a large portion of the ransomware infections currently seen across industry.
- Date: 04/11/2016
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/tech-briefs/ransomware-locky.cfm
- Category: IA Guidance > Technical Briefs
- SHA256: 5ADDBFD4DA2E0CC3606B570DBC47A79946681E2115C811FBE1DA5402F222E7BB
- Size: 418KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Guidelines for Application Whitelisting Industrial Control Systems
- Abstract: This document serves as an appendix to the “Seven Steps to Defend Industrial Control Systems” document, providing additional conceptual-level guidance on implementing application whitelisting. Application Whitelisting (AWL) can detect and prevent attempted execution of malware uploaded by adversaries. The static nature of some industrial control system (ICS) components, such as database servers and human-machine interfaces, makes these ideal candidates to run AWL. Operators are thus encouraged to work with vendors to baseline and calibrate AWL deployments.
- Date: 04/01/2016
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-configuration/industrial-control-systems/guidelines-for-application-whitelisting-industrial-control-systems.cfm
- Category: IA Guidance > Security Configuration > Industrial Control Systems
- SHA256: 6E69708A77F5F44B9BEA68E9C2F5ACEC8D96A41803CEF2A27F2FB4543A5AC610
- Size: 1,065KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
- Abstract: NSA is the Security Advisor for the development of the Joint Information Environment (JIE) cyber security architecture. This document provides an overview of the JIE development process and Cyber Security Reference Architecture (CS RA) security framework.
- Date: 03/16/2016
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/secure-architecture/joint-information-environment.cfm
- Category: IA Guidance > Secure Architecture
- SHA256: 3ACF7EF4E4FFCAECAB82E0C106684A7BC4E805D9432AF1CEA69E0765CB562C97
- Size: 600KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Return to the Table of Contents.
Trusted Engineering Solutions
Return to the Table of Contents.
Security Highlights of Windows 10
Return to the Table of Contents.
Network Device Integrity -NDI- Methodology
- Abstract: The Network Device Integrity (NDI) Methodology attempts to answer “How do I know if my network device has been compromised?”, and provides methods for detecting unauthorized access, software modifications, and hardware modifications
- Date: 02/23/2016
- Link: https://apps.nsa.gov/iaarchive/library/reports/network-device-integrity-methodology.cfm
- Category: Reports
- SHA256: CCF09EEC22673602CF7EEBE68F150531318F7363E4303A97B07767669837DD90
- Size: 231KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Network Device Integrity on Cisco IOS Devices
Return to the Table of Contents.
- Abstract: Fundamental aspects of network security involve protection, detection and response measures. This provides guidance for organizations to secure and manage networks thus making the networks defensible and recommends proactive mitigation advise to counter cyber threats.
- Date: 02/18/2016
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/iads-top-10-information-assurance-mitigation-strategies.cfm
- Category: IA Guidance
- SHA256: DCA3B517BEEF02981091FC1E80E0D743A542952768A545BA73A2D0953919E8D8
- Size: 463KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Position Zero: Integrity Checking Windows-Based ICS/SCADA Systems
Return to the Table of Contents.
2016 IAD’s Top Challenges and Efforts
Return to the Table of Contents.
- Abstract: Once again, Peregrine is collaborating with the NSA on a new special edition of the Journal of Information Warfare (JIW). In this publication, we bring you 9 articles from subject matter experts at NSA, all of which focus on cyber-security efforts that attempt to realize their theme of Confidence in Cyberspace.
- Date: 01/14/2016
- Link: https://apps.nsa.gov/iaarchive/library/supporting-documents/journal-of-information-warfare-14-2.cfm
- Category: Supporting Documents
- SHA256: 531107745DD175479026BC9DF70BB3F89DBF75523AF1A8A4F443BB9684E5A827
- Size: 2,868KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Commercial National Security Algorithm Suite and Quantum Computing FAQ
Return to the Table of Contents.
IAD Top Ten Mitigations Questions and Answers
- Abstract: This document answers the eight most commonly asked questions regarding IAD’s Top Ten Mitigations. It also provides links to additional information resources and depicts the Intrusion Lifecycle and Mitigations.
- Date: 01/02/2016
- Link: https://apps.nsa.gov/iaarchive/library/supporting-documents/faq/iad-top-10-mitigations-qa.cfm
- Category: Supporting Documents > FAQ
- SHA256: BA18C8393112B46F470246C6413B6A815716D98867135FBD90CA431051E58BD5
- Size: 504KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Commercial National Security Algorithm Suite Factsheet
Return to the Table of Contents.
Seven Steps to Effectively Defend Industrial Control Systems
Return to the Table of Contents.
Recommendations for Configuring Adobe Acrobat Reader DC in a Windows Environment
Return to the Table of Contents.
Manageable Network Plan Guide
- Abstract: A Manageable Network Plan is a series of milestones that can take an unmanageable, insecure network and make it more defensible, more secure and more manageable. Because the plan is intended to be a long-term solution, implementing milestones may require additional resources and time. Once manageable, your network can be secured more efficiently and effectively.
- Date: 12/01/2015
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-configuration/networks/manageable-network-plan.cfm
- Category: IA Guidance > Security Configuration > Networks
- SHA256: 11F067F6131AA9DDF11D1D80C4E05345798231F4679B85964532BDCA8F88CD9E
- Size: 5,533KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Return to the Table of Contents.
IAD Best Practices for Securing Wireless Devices and Networks in National Security Systems
- Abstract: IAD has developed a set of best practices for establishing, operating, and using wireless communications devices, either as a component of, or in close proximity to, NSS networks. By implementing the outlined measures, network owners and operators will be better positioned to optimize security, manage risk, and implement vulnerabilities.
- Date: 10/24/2015
- Link: https://apps.nsa.gov/iaarchive/library/reports/securing-wireless-devices-and-networks.cfm
- Category: Reports
- SHA256: EB7133497D6C5960BD6F1E47019BD269A445FA874AE2AE82A8157BFF8C54CD31
- Size: 989KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Community Gold Standard 1.1.1 files
Return to the Table of Contents.
Securing Assets Within a Closed Industrial Control System Network
Return to the Table of Contents.
Securely Managing Industrial Control System Networks
Return to the Table of Contents.
Cyber Defense Exercise Winners
- Abstract: This document lists the past winners of the Cyber Defense Exercise (CDX), an annual competition designed to sharpen the skills of our nation’s next generation of cyber warriors.
- Date: 09/23/2015
- Link: https://apps.nsa.gov/iaarchive/library/supporting-documents/cdx-winners.cfm
- Category: Supporting Documents
- SHA256: 4CF890406AEE299F9C26ACA866A9A00FAD5312BEBF4C789BD17FE6D450D7F5E5
- Size: 141KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
- Abstract: Microsoft’s Enhanced Mitigation Experience Toolkit (EMET) is an enhancement to the Windows operating system that stops broad classes of malware from executing. EMET implements a set of anti-exploitation mitigations that prevent the successful exploitation of memory corruption vulnerabilities in software, including many zero-day and buffer overflow attacks.
- Date: 09/16/2015
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-configuration/operating-systems/microsofts-emet-a-rationale-for-enabling-modern-2.cfm
- Category: IA Guidance > Security Configuration > Operating Systems
- SHA256: 1D0A10F5C35908D01A16F1A39E8491421043CBEE931D59706C1DC0045CB86C29
- Size: 1,275KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
National Security Cyber Assistance Program Frequently Asked Questions
Return to the Table of Contents.
Scripting for Bash Vulnerability/Shellshock
- Abstract: Security researchers, vendors, and other reporting organizations have commented on the GNU Bash (Bourne Again shell) vulnerability, the severity of the vulnerability, and the critical need to patch vulnerable versions of Bash. Central to their message is the need to test for the vulnerability by issuing the exploit, and then patching the affected systems. This technical report presents an introduction for technical and non-technical managers who are unfamiliar with the Bash vulnerability. In particular, this note introduces a few sample code fragments that can test for the vulnerability without exploiting the vulnerability.
- Date: 09/15/2015
- Link: https://apps.nsa.gov/iaarchive/library/reports/scripting-for-bash-vulnerability-shellshock.cfm
- Category: Reports
- SHA256: 99C1174E894EBACCC9884038F347398FD91B064C60F7B34201614EC26870F5F4
- Size: 665KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
- Abstract: Anti-exploitation mitigations like EMET are increasing in importance. By specifically restricting access to broad classes of exploits, EMET protects software from memory corruption attacks used by many APT actors, protects software in between patch cycles, and protects legacy software even without access to the source code.
- Date: 09/15/2015
- Link: https://apps.nsa.gov/iaarchive/library/reports/microsoft-enhanced-mitigation-experience-toolkit-a.cfm
- Category: Reports
- SHA256: 07E804BA9FABCE06FAC0649B64733F5C6F39C6462C4BE03B8E84DA28B430EDAD
- Size: 1,488KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Host Mitigation Package
- Abstract: Host Mitigations Package (HMP) is designed to aid organizations and system administrators in hardening their host systems.
- Date: 09/15/2015
- Link: https://apps.nsa.gov/iaarchive/library/reports/host-mitigation-package.cfm
- Category: Reports
- SHA256: BA098FD3774DD98FC45E4948213F32580DEA0C751885002AC7541CB8AD41B499
- Size: 1,288KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Security Highlights of Windows 7
Return to the Table of Contents.
Application Whitelisting using Software Restriction Policies
- Abstract: Software Restriction Policies (SRP) enables administrators to control which applications are allowed to run on Microsoft Windows. SRP is a feature of Windows XP and later operating systems. It can be configured as a local computer policy or as domain policy using Group Policy with Windows Server 2003 domains and later. Using this guide, administrators can configure SRP to prevent all applications in their domain from running except applications they explicitly allow. Utilizing SRP as an application whitelisting technique significantly increases the security posture of the domain by preventing many malicious programs from executing.
- Date: 09/15/2015
- Link: https://apps.nsa.gov/iaarchive/library/reports/application-whitelisting-using-srp.cfm
- Category: Reports
- SHA256: 3194220BFBF72D090512A55194F3FEA5927A914D2F2969A631482EB4A8F418B5
- Size: 385KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Security Content Automation Protocol Content for Apple iOS 5 Security Configuration Recommendations
Return to the Table of Contents.
Recommendations for Configuring Adobe Acrobat Reader XI in a Windows Environment
- Abstract: This document includes information for using Adobe’s Customization Wizard (CW) or Microsoft’s PowerShell to configure the necessary settings for uniform distribution of the software throughout an enterprise or on a standalone system.
Appendix A lists all of the ARXI security-related settings with recommendations for the environments that should configure those settings.
- Date: 09/15/2015
- Link: https://apps.nsa.gov/iaarchive/library/reports/recommendations-for-configuring-adobe-acrobat-reader-xi-in-a.cfm
- Category: Reports
- SHA256: EE255022F471D504707C704E7E4B93C5CA72AD5D54F49F5352F650BCA163B3DC
- Size: 330KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Reducing the Effectiveness of Pass-the-Hash
Return to the Table of Contents.
Spotting the Adversary with Windows Event Log Monitoring
- Abstract: This paper focuses on using the built-in tools already available in the Microsoft Windows operating system (OS). Central event log collection requires a Windows Server operating system version 2003 R2 or above. Many commercially available tools exist for central event log collection. Using a Windows Server 2008 R2 or above server version is recommended. There are no additional licensing costs for using the event log collection feature. The cost of using this feature is based on the amount of additional storage hardware needed to support the amount of log data collected. This factor is dependent on the number of workstations within the local log collection network.
- Date: 09/14/2015
- Link: https://apps.nsa.gov/iaarchive/library/reports/spotting-the-adversary-with-windows-event-log-monitoring.cfm
- Category: Reports
- SHA256: E7FF70328E660A05F0BE079DB72AEBA04AF5769E4856FFD34FBD1EFF77EFA95B
- Size: 871KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Defense in Depth
- Abstract: This paper provides an overview of the major elements of the strategy and provides links to resources that provide additional insight.
- Date: 09/14/2015
- Link: https://apps.nsa.gov/iaarchive/library/reports/defense-in-depth.cfm
- Category: Reports
- SHA256: C7DE6ACB92CBFFCF387AE9F055CE5F54C178F51A2FC6F58F74DF73C44534E9E0
- Size: 670KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
NSA Methodology for Adversary Obstruction
Return to the Table of Contents.
Adobe ColdFusion Guidance
- Abstract: Adobe ColdFusion has major vulnerabilities. These vulnerabilities enable an adversary to exploit the weakness and potentially gain and expand a foothold onto the owner’s network.
- Date: 07/01/2015
- Link: https://apps.nsa.gov/iaarchive/library/reports/adobe-coldfusion-guidance.cfm
- Category: Reports
- SHA256: BD68206364094C1DDC7CCD5A741CB97B3E876AAE771C5102EB7487BF45BE689A
- Size: 627KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Return to the Table of Contents.
Return to the Table of Contents.
2014 Supplemental Guide to the National Manager’s Letter
- Abstract: National Security Directive 42 (NSD-42) and Executive Order 13587 (Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Infomation) mandates the National Manager develop effective technical safeguarding policies and standards that address the safeguarding of information within NSS and assess the overall security posture of NSS.
- Date: 05/20/2015
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/ia-standards/cgs/supplemental-guide-to-the-national-managers-letter.cfm
- Category: IA Guidance > IA Standards > Community Gold Standard
- SHA256: CE52C6307F8E855A7FE9A8F33BF9C09565BC93C354E0850B0EBF38DA9B0C2451
- Size: 687KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Frank B. Rowlett Awards Program
Return to the Table of Contents.
Apply for Cyber Incident Response Assistance Accreditation Using the National Security Cyber Assistance Program Accreditation Portal
Return to the Table of Contents.
2015 IAD’s Top Technology Challenges
Return to the Table of Contents.
- Abstract: This guidance document examines the GIF specifications for data attack, data hiding, and data disclosure risks that exist within the file structure. It provides a breakdown of each component of a GIF file and provides recommendations that can help assure that the GIF file is not only compliant with the specifications but also mitigates these various risks.
- Date: 02/04/2015
- Link: https://apps.nsa.gov/iaarchive/library/reports/gif_isg_v1_0_-20171212.cfm
- Category: Reports
- SHA256: BDDC7B6630A4F089C191740A99C1E08B7A0E19CAB938030A2C5FE7142DA13101
- Size: 997KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Accreditation Portal User’s Guide
Return to the Table of Contents.
Defensive Best Practices for Destructive Malware
Return to the Table of Contents.
Cyber Incident Response Assistance Accreditation
Return to the Table of Contents.
Bash Bug (ShellShock)
- Abstract: A serious vulnerability exists in GNU Bash (Bourne again shell) processes through version 4.3, and CVE-2014-6271 or CVE-2014-7169 exploitation may result in the ability for a remote attacker to override or bypass environment restrictions.
- Date: 10/30/2014
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/bash-bug-shellshock.cfm
- Category: IA Guidance > Security Tips
- SHA256: 34A6E7C947F756792CED6AF2FC92959F163429827CAB97D64670ED922CB70D14
- Size: 337KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Scripting for Bash Vulnerability/Shellshock
- Abstract: Security researchers, vendors, and other reporting organizations have commented on the GNU Bash (Bourne Again shell) vulnerability, the severity of the vulnerability, and the critical need to patch vulnerable versions of Bash. Central to their message is the need to test for the vulnerability by issuing the exploit, and then patching the affected systems. This technical report presents an introduction for technical and non-technical managers who are unfamiliar with the Bash vulnerability. In particular, this note introduces a few sample code fragments that can test for the vulnerability without exploiting the vulnerability.
- Date: 10/28/2014
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/tech-briefs/scripting-for-bash-vulnerability-shellshock.cfm
- Category: IA Guidance > Technical Briefs
- SHA256: 99C1174E894EBACCC9884038F347398FD91B064C60F7B34201614EC26870F5F4
- Size: 665KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
- Abstract: Anti-exploitation mitigations like EMET are increasing in importance. By specifically restricting access to broad classes of exploits, EMET protects software from memory corruption attacks used by many APT actors, protects software in between patch cycles, and protects legacy software even without access to the source code.
- Date: 10/22/2014
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/tech-briefs/microsoft-enhanced-mitigation-experience-toolkit-a.cfm
- Category: IA Guidance > Technical Briefs
- SHA256: 07E804BA9FABCE06FAC0649B64733F5C6F39C6462C4BE03B8E84DA28B430EDAD
- Size: 1,488KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Wireless Vulnerabilities Article
Return to the Table of Contents.
Return to the Table of Contents.
- Abstract: Microsoft’s Enhanced Mitigation Experience Toolkit (EMET) is an enhancement to the Windows operating system that stops broad classes of malware from executing. EMET implements a set of anti-exploitation mitigations that prevent the successful exploitation of memory corruption vulnerabilities in software, including many zero-day and buffer overflow attacks.
- Date: 10/01/2014
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-configuration/operating-systems/microsofts-emet-a-rationale-for-enabling-modern.cfm
- Category: IA Guidance > Security Configuration > Operating Systems
- SHA256: 1D0A10F5C35908D01A16F1A39E8491421043CBEE931D59706C1DC0045CB86C29
- Size: 1,275KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
National Security Cyber Assistance Program Brochure
- Abstract: This brochure provides an overview of the National Security Cyber Assistance Program, CIRA accreditation, and a description of the 21 NSCAP focus areas.
- Date: 09/12/2014
- Link: https://apps.nsa.gov/iaarchive/library/supporting-documents/brochures/nscap.cfm
- Category: Supporting Documents > Brochures
- SHA256: 689D8CF8FBD61A38723C6DF275C5DFDD19C78FF73372D4667E73100B2A431FC8
- Size: 3,370KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
How National Security Cyber Assistance Program Benefits Service Providers and National Security System Owners
Return to the Table of Contents.
Critical Focus Areas of Cyber Incident Response Assistance
Return to the Table of Contents.
Cisco Adaptive Security Appliance Out-of-the-Box Security Configuration Guide
- Abstract: This document provides security guidance for network administrator to assist in the initial out-of-the-box configuration of Cisco Adaptive Security Appliance (ASA) 5500 Next Generation Firewalls (software version 9.1). The guidance provided is based on a basic and simplistic security policy for common network architectures; however, the concepts discussed may be applied to complex policies and networks. It is the responsibility of an organization to develop a security policy that meets all of their specific needs. The topics overed are: secure management, interface configuration, auditing and logging, access control and hardening services provided by the Cisco ASA firewall.
- Date: 09/10/2014
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-configuration/networks/cisco-asa-out-of-the-box-security-configuration-guide.cfm
- Category: IA Guidance > Security Configuration > Networks
- SHA256: AB0CBCEB4D58CCF5F438399ABA45B527C6682F62F4FD99F3236A7C8847A69487
- Size: 310KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
- Abstract: Provide guidance for the development of an inspection and sanitization software filter for use with email messages. Email servers implement multiple specifications in order to send and receive email, three of which are covered by this document. The Simple Mail Transfer Protocol (SMTP) is used to transmit email from a client to a server. The Internet Message Format (IMF) specifies the format of the email messages, both the headers and the body. The Multipurpose Internet Mail Extensions (MIME) extends IMF beyond plain text. This document introduces the syntax of these standards and then discusses the components that have data hiding, data attack, and data disclosure risks. It provides an analysis of these components and recommendations to mitigate their risks.
- Date: 09/02/2014
- Link: https://apps.nsa.gov/iaarchive/library/reports/email_isg_v1_0-20171212.cfm
- Category: Reports
- SHA256: 51C1C0FAE193122F1A4FF1143DF7B2823B0219AC3B0E15972E00FFE8271A9DB8
- Size: 1,105KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Email Filtering Best Practices Guide Version 1.0
- Abstract: Provide best practices for filtering email messages in boundary protection devices (BPD), including commercial mail gateways, email attachment preprocessors or sidecars, and trusted guard (e.g. cross domain solution (CDS)) components. The guidance in this document is based on over ten years of experience at NSA in developing and testing email BPD’s. This experience has provided valuable insight into how email filtering should be implemented in boundary protection devices. This document is a supplement to “Inspection and Sanitization Guidance for Simple Mail Transfer Protocol (SMTP), Internet Message Format (IMF), and Multipurpose Internet Mail Extensions (MIME).”
- Date: 09/02/2014
- Link: https://apps.nsa.gov/iaarchive/library/reports/email_filtering_bpg_v1_0-20171212.cfm
- Category: Reports
- SHA256: 7EA8EFB77B04CD900C3845E6C28A4633179F8544225A4C7F225FC46A7B81EC9C
- Size: 418KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Application Whitelisting Using Microsoft AppLocker
- Abstract: This guide describes Microsoft AppLocker settings recommended by the NSA’s Information Assurance Directorate (IAD) for deploying location-based application whitelisting on your network. Alternative application whitelisting implementations that may support your organizational needs are commercially available. These alternative implementations may provide support to multiple different operating system platforms for a fee. This guide also provides administrators with a walkthrough on how to use AppLocker and implement the settings. Using AppLocker for application whitelisting enforcement will not stop all malicious software. It provides an additional layer in a defense-in-depth strategy. The intent of this guidance is to prevent users from unknowingly or accidentally executing malicious code or unauthorized software.
- Date: 08/01/2014
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/tech-briefs/application-whitelisting-using-microsoft-applocker.cfm
- Category: IA Guidance > Technical Briefs
- SHA256: 05D8F19F3A55E4F2C5BD27C8F1B262FC608ECE4F6FA5E63E04748EA344119072
- Size: 1,748KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Defending Against the Exploitation of SQL Vulnerabilities to Compromise a Network
- Abstract: United States Critical Infrastructure faces a significant risk from the exploitation of Structured Query Language (SQL) injection vulnerabilities. If executed successfully, an SQL injection may allow for the compromise of confidentiality, integrity, and availability of a database and its contents; an outcome that may carry a high cost in system recovery and reconstitution, data restoration, downtime, regulatory penalties, and negative publicity. Due to the manageable level of complexity of SQL injection, the array of freely available tools that automate the exploitation process, and the techniques’ demonstrated potential for impact, malicious cyber actors will continue relying on SQL injection vulnerabilities in public facing websites as a means of gaining access to critical infrastructure systems and networks.
- Date: 07/23/2014
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/tech-briefs/defending-against-the-exploitation-of-sql-vulnerabilities-to.cfm
- Category: IA Guidance > Technical Briefs
- SHA256: 398F0F97A7FBCA22C5C22B613ED3AF7AD66361C6B036D8FFC7A4CC7DA317471C
- Size: 2,988KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
2014 IAD’s Top Technology Challenges
Return to the Table of Contents.
Return to the Table of Contents.
Community Gold Standard 2.0
- Abstract: CGS provides comprehensive IA guidance for securing NSS enterprises and enables the mission in the face of continuous attack. CGS characterizes the best practice for IA capabilities in accordance with policies and standards, while considering the limitations set forth by current technologies and other constraints.
- Date: 06/26/2014
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/ia-standards/cgs/community-gold-standard-framework.cfm
- Category: IA Guidance > IA Standards > Community Gold Standard
- SHA256: 689EE4DE6E7C1DDA980D249DBE20D28E29A7161F1C94515A47779A87CFF8A43B
- Size: 1,558KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Identity Theft Threat and Mitigations
Return to the Table of Contents.
Factsheet: Mitigations for OpenSSL TLS/DTLS Heartbeat Extension Vulnerability
Return to the Table of Contents.
Best Practices for Keeping Your Home Network Secure
Return to the Table of Contents.
- Abstract: To all readers, we are very excited about this issue. This is a special edition of the Journal of Information Warfare (JIW) and the first of its kind where we have collaborated with the Information Assurance Directorate (IAD) of the National Security Agency (NSA). In this publication, we bring you 10 articles from current and highly technical subject matter experts from NSA, all of which focus on cyber-security efforts that attempt to realize their theme of Confidence in Cyberspace. We hope you enjoy this special issue, and it is our desire to continue this new effort as an annual tradition.
- Date: 04/01/2014
- Link: https://apps.nsa.gov/iaarchive/library/supporting-documents/journal-of-information-warfare.cfm
- Category: Supporting Documents
- SHA256: B41E3353C60FB848E712F11E9E2B83052C2868CE9B3C6CEB7AC85F5EA2C790CC
- Size: 3,484KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Supplemental Guide to the National Manager’s Letter 2014
Return to the Table of Contents.
Supplemental Guide to the National Manager’s Letter 2015
- Abstract: National Security Directive 42 (NSD-42) and Executive Order 13587 (Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Infomation) mandates the National Manager develop effective technical safeguarding policies and standards that address the safeguarding of information within NSS and assess the overall security posture of NSS.
- Date: 03/20/2014
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/ia-standards/cgs/supplemental-guide-to-the-national-managers-letter-15.cfm
- Category: IA Guidance > IA Standards > Community Gold Standard
- SHA256: 4030A6A6265A08AFD1280512D2F2A2BD848DEA8354B3B36D3269555E7C60F2D4
- Size: 1,862KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Random Number Generators: Introduction for Operating System Developers
- Abstract: Key material generation is as important to strong cryptosystems as the algorithms used. Weak random number generators (RNGs) have been known to create key material that is guessable by adversaries1, making the strength of the algorithms irrelevant in cryptographic attacks. This paper, intended for operating system developers, provides an overview of considerations developers should be making when designing and using RNGs, outlines how RNGs work, and gives recommendations for developing and using RNGs.
- Date: 03/01/2014
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/random-number-generators-introduction-for-operating-system.cfm
- Category: IA Guidance > Security Tips
- SHA256: A0CAFA06635E42C20F984502DD038B8DCD1088ED5499698D34A33F9F5058C153
- Size: 644KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Random Number Generators: Introduction for Application Developers
- Abstract: Key material generation is as important to strong cryptosystems as the algorithms used. Weak random number generators (RNGs) have been known to create key material that is guessable by adversaries1, making the strength of the algorithms irrelevant in cryptographic attacks. This paper, intended for application developers, provides an overview of considerations developers should be making when using RNGs, outlines how RNGs work, and gives guidance for applications needing RNG services.
- Date: 03/01/2014
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/random-number-generators-introduction-for-application.cfm
- Category: IA Guidance > Security Tips
- SHA256: 8E94365FB3B9B62D3FC4518694C7DF14D1C9F750A62B0BCFB2519DD9DD511324
- Size: 582KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
- Abstract: The purpose of this document is to provide guidance for the development of a sanitization and analysis software tool for Wavelet Scalar Quantization (WSQ) biometric files. WSQ is a compression algorithm formally defined in the Criminal Justice Information Services (CJIS), WSQ GRAY-SCALE Fingerprint Image Compression Specification, IAFIS-IC-0110(V3). This document also refers to WSQ as a file type, since the data representing the entire image defined in is also commonly stored within a file. This document analyzes various elements and objects that are contained within the WSQ file structure and then discusses the data hiding, data attack, and data disclosure risks. It describes how those elements can be a cause for concern for either hiding sensitive data or possibly attempting to exploit a system.
- Date: 01/22/2014
- Link: https://apps.nsa.gov/iaarchive/library/reports/wsq_isg_v1_0_20171212.cfm
- Category: Reports
- SHA256: 3955D27DD4680DEDF4F0E69BDF3489AA4DAA55213B33393F8CA7162A3D94B749
- Size: 610KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Spotting the Adversary with Windows Event Log Monitoring
- Abstract: This paper focuses on using the built-in tools already available in the Microsoft Windows operating system (OS). Central event log collection requires a Windows Server operating system version 2003 R2 or above. Many commercially available tools exist for central event log collection. Using a Windows Server 2008 R2 or above server version is recommended. There are no additional licensing costs for using the event log collection feature. The cost of using this feature is based on the amount of additional storage hardware needed to support the amount of log data collected. This factor is dependent on the number of workstations within the local log collection network.
- Date: 12/16/2013
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-configuration/applications/spotting-the-adversary-with-windows-event-log-monitoring.cfm
- Category: IA Guidance > Security Configuration > Applications
- SHA256: E7FF70328E660A05F0BE079DB72AEBA04AF5769E4856FFD34FBD1EFF77EFA95B
- Size: 871KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Host Mitigation Package
Return to the Table of Contents.
Reducing the Effectiveness of Pass-the-Hash
Return to the Table of Contents.
Web Domain Name System Reputation
Return to the Table of Contents.
Segregate Networks and Functions
- Abstract: After gaining initial access to a network, adversaries traverse the allowed communication paths between network devices to gain deeper access. However, a securely segregated network can greatly reduce an adversary’s ability to access sensitive portions of the network.
- Date: 10/31/2013
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/segregate-networks-and-functions.cfm
- Category: IA Guidance > Security Tips
- SHA256: F9CA6B526232EDD75189374954AB8A8405F541C54968E5F6920EA05AF200110D
- Size: 414KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Secure Host Baseline
- Abstract: A Secure Host Baseline (SHB) is a pre-configured and security hardened machine-ready image that contains an organization’s common Operating Systems (OS) and application software.
- Date: 10/31/2013
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/secure-host-baseline.cfm
- Category: IA Guidance > Security Tips
- SHA256: AE1ABE6B565A06481068200591DFF4F2A55FB2EAED6ED82061D635B33A291CEB
- Size: 491KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Limit Workstation-to-Workstation Communication
Return to the Table of Contents.
Host Intrusion Prevention Systems
Return to the Table of Contents.
Control Administrative Privileges
Return to the Table of Contents.
Cloud Security Considerations
- Abstract: Cloud services are a recent model for information technology implementation and management. The cost advantages are a driving force, with security often as a secondary consideration.
- Date: 10/31/2013
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/tech-briefs/cloud-security-considerations.cfm
- Category: IA Guidance > Technical Briefs
- SHA256: ACCE0635A0A94CD69029FC78F53DD368C2C16847880335346AF14D62490AFE0F
- Size: 1,046KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Application Whitelisting
- Abstract: Application Whitelisting is a proactive security technique that only allows a limited set of approved programs to run, while blocking all other programs (including most malware) from running by default.
- Date: 10/31/2013
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/application-whitelisting.cfm
- Category: IA Guidance > Security Tips
- SHA256: 786ABDB394F7FD5466467E43C4BCF689C78C806E6258E283D884867396E68F40
- Size: 597KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Anti-Virus File Reputation Services
- Abstract: In today’s netspeed environment, traditional antivirus protection is not enough. The majority of antivirus products rely on signature or hash-based methods of detecting “known-bad” activity or files.
- Date: 10/31/2013
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/anti-virus-reputation-services.cfm
- Category: IA Guidance > Security Tips
- SHA256: 8BF78496DB0B04D46C552AE41D44A9F2C3248989D36BDA060F719B4D6CF017B5
- Size: 528KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Anti-Exploitation Features
- Abstract: Cyber attackers want access to your sensitive information or intellectual property for strategic advantage, or more commonly, for monetary gain. They commonly attempt to exploit vulnerabilities in your computer system and network by using malware delivered via email or web servers.
- Date: 10/31/2013
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/anti-exploitation-features.cfm
- Category: IA Guidance > Security Tips
- SHA256: CBECB51432EF1C4C9EB1447CD043B0D09ACDDEB8E1546BEE0066629FAFC57532
- Size: 520KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Recommendations for Configuring Adobe Acrobat Reader XI in a Windows Environment
Return to the Table of Contents.
Building Web Applications Security Recommendations for Developers
Return to the Table of Contents.
Host Based Security System Application Whitelisting Technical Implementation Guide
Return to the Table of Contents.
Inspection and Sanitization Guidance for HyperText Transport Protocol (HTTP)
- Abstract: The purpose of this document is to provide guidance for the development of an inspection and sanitization software tool for the HyperText Transport Protocol (HTTP). It introduces the syntax of the protocol and then discusses the components that have data hiding, data attack, and data disclosure risks. This document provides an analysis of these components and recommendations to mitigate their risks.
- Date: 11/27/2012
- Link: https://apps.nsa.gov/iaarchive/library/reports/http_inspection_and_sanitization_guidance_v1_1-20171212.cfm
- Category: Reports
- SHA256: 9B0CB994A63A3195C944713721472F30CD22B5436E834D4BE3991127A1BA610C
- Size: 1,004KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Inspection and Sanitization Guidance for JPEG 2000
- Abstract: This document outlines the findings of potential areas of concern that exist within the JPEG 2000 file format. It also provides inspection and sanitization guidance for JPEG 2000 image files to address data attack, hiding, and disclosure risks. This document does not address any potential security risks of the JPEG 2000 compression/encoding algorithm, but focuses more on the actual format as a container for the compressed/encoded image data.
- Date: 11/27/2012
- Link: https://apps.nsa.gov/iaarchive/library/reports/jpeg_2000_inspection_and_sanitization_guidance_v1_4_4-20171206.cfm
- Category: Reports
- SHA256: E6ECA43D0CD60FE0AF1E8C5D3152C85DB36BCB048DF807B7EA69B907D75E2D43
- Size: 743KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Deploying Signed BIOSes to Enterprise Client Systems
- Abstract: This guide is meant to assist United States government and Department of Defense Windows system administrators deploy BIOSes to their enterprise client systems that support signed BIOSes and signed BIOS update mechanisms but do not have signed BIOSes installed by default due to these systems predating the NIST SP 800-147 standard. Vendors that implement signed BIOses currently ship systems with a signed BIOS already installed. This guide also provides information on tools for managing BIOSes that are freely available and officially supported by vendors for commercial use. The guide assumes administrators operate in a restrictive network environment where common remote management protocols may be blocked and common automation technologies may be disabled. Very basic techniques and technologies are used in this guide to apply to the widest audience possible and to allow easier integration into restrictive environments.
- Date: 11/16/2012
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-configuration/applications/deploying-signed-bioses-to-enterprise-client-systems.cfm
- Category: IA Guidance > Security Configuration > Applications
- SHA256: 4E9D20F3F7167ADD4BB92AB8510B6F6B536F4865FEF66012AB7E3AAEF2111D3A
- Size: 359KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
- Abstract: This document is meant to provide guidance for the development of software tools to analyze and mitigate potential security risks in the JPEG File Interchange Format (JFIF) version 1.02. These guidelines come from the evaluation of the format specification, not from any vendor specific implementation or software application.
- Date: 11/07/2012
- Link: https://apps.nsa.gov/iaarchive/library/reports/jfif_jpeg_inspection_and_sanitization_guidance_v1_0-20171206.cfm
- Category: Reports
- SHA256: 20CAFDB9909EEF5CF188004BF838B837DFAC006FA019C01A68A4DBF9AD2DEE50
- Size: 639KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
JavaScript Security Risks
- Abstract: This document addresses the issues that JavaScript introduces into a document format. It shows how basic JavaScript can be manipulated and obfuscated to evade signature detection, by using publically available and known methods. Code that introduces both a data hiding and data attack risk can be difficult to detect, especially when the code is obfuscated. This paper presents some known methods to mitigate the risk of running JavaScript; however, at the moment, more research is needed to develop a more robust solution.
- Date: 11/07/2012
- Link: https://apps.nsa.gov/iaarchive/library/reports/javascript_security_risks_v1_1-20171212.cfm
- Category: Reports
- SHA256: B633B5EF2BD465EBC00B599A51AC4D4167D438CB2CEDD59B1E90F7FEC9768269
- Size: 1,021KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Configuring Windows To Go as a Mobile Desktop Solution
- Abstract: Windows To Go is a new feature of Windows 8 Enterprise that allows a fully functional Windows 8 instance to be run from an external USB flash drive. When a host machine is booted from a Windows To Go drive, the user experience is the same as the Windows 8 Enterprise desktop. This document provides uses cases, security and administrative considerations, configuration recommendations, and instructions for creating a secure Windows To Go device.
- Date: 11/01/2012
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/configuring-windows-to-go-as-a-mobile-desktop-solution.cfm
- Category: IA Guidance > Security Tips
- SHA256: 468B4D87EB1290633139BDE1C116C5BA8B84EAD746DECF0B89CA75F800780CD4
- Size: 420KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Deploying and Securing Google Chrome in a Windows Enterprise
Return to the Table of Contents.
Community Gold Standard Brochure
Return to the Table of Contents.
Securing Data and Handling Spillage Events
- Abstract: Data spillage is the transfer of classified or sensitive information to unaccredited or unauthorized systems, individuals, applications, or media. A spillage can be from a higher level classification to a lower one. The data itself may be residual (hidden) data or metadata. Spillage may result from improper handling of compartments, releasability controls, privacy data, or proprietary information.The trend towards increased information sharing has weakened access controls, giving users without a need-to-know access to large volumes of sensitive or classified data. Malware that propagates via removable media has increased the risk of large data transfers outside the network. The risk of data spillage is a problem largely because of inadequate end user security awareness, unmanageable networks, and poorly implemented data policies.
- Date: 10/01/2012
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/securing-data-and-handling-spillage-events.cfm
- Category: IA Guidance > Security Tips
- SHA256: BFD74146BB200A942CB0953BC073B85F41926E159C8B3006BA29A33B540C3C65
- Size: 673KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Hardening Authentication
- Abstract: This document contains information on how to harden authentication processes by limiting remote access, augmenting authentication measures, educating users, hardening the authentication servers, and establishing robust authentication policy.
- Date: 09/01/2012
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/hardening-authentication.cfm
- Category: IA Guidance > Security Tips
- SHA256: 1E7734A6F6EFCB7330010301E746CB1E5C8E05D1C2F847591CC44D254A393771
- Size: 708KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Mobile Device Management: Capability Gaps for High-Security Use Cases
Return to the Table of Contents.
Mobile Device Management: A Risk Discussion for IT Decision Makers
Return to the Table of Contents.
Defending Against Compromised Certificates
- Abstract: This guidance provides IT personnel with actionable information to defend against compromised CA and web site certificates, which could permit a malicious web server to impersonate the genuine one. Each operating system (OS) and browser may use different mechanisms to check and revoke trust in a certificate. Some use a Certificate Revocation List (CRL), while others use the Online Certificate Status Protocol (OCSP). Still others rely entirely on the issuance of software updates, whose prompt application remains fundamentally important. Variety also exists in how browsers handle certificate validation. Some query the OS certificate store, while others use their own certificate store and thus must be configured separately. Finally, note that some sites may become inaccessible when enforcing strict revocation checking.
- Date: 07/01/2012
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/defending-against-compromised-certificates.cfm
- Category: IA Guidance > Security Tips
- SHA256: 35352C620F1BF03BA3E32FA3AAF1F1206938711089051057940F9BF8BDBCE0A1
- Size: 306KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Guidelines for Regular Expressions in XML Schemas
- Abstract: This report informs developers about security issues with regular expressions. Armed with this knowledge, developers will be able to create safe regular expressions. This report also informs accreditors (particularly those who assess XML Schemas for compliance with security policies) about the kinds of security issues involved with regular expressions in XML Schemas.
- Date: 06/30/2012
- Link: https://apps.nsa.gov/iaarchive/library/reports/guidelines_for_regular_expressions_with_xml_schemas_v1_0.cfm
- Category: Reports
- SHA256: EC32D7FC3286B5DBEDD0FB73AF6BBD31A0911A2207586DF6EBA1EB9F35AEC2CE
- Size: 964KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
XSLT 1.0 Recommendations for Making XSLT Programs Behave as Expected
- Abstract: This paper provides recommendations for writing XSLT programs that will behave in an expected manner. However, it is not a general tutorial on how to write an XSLT program. The paper also identifies some known XML-related risks or concerns that can be mitigated with XSLT programs. In addition to a set of recommendations, the paper contains a “how to” section that shows how to use XSLT to perform common risk reduction tasks. These recommendations and samples of XSLT source code apply only to XSLT version 1.0.
- Date: 06/29/2012
- Link: https://apps.nsa.gov/iaarchive/library/reports/xslt-guidance_v1_0-20171212.cfm
- Category: Reports
- SHA256: F3BE3AE4F60C32912B8A9BE4BCA6C71827EED4210155335D0641BB3B94686543
- Size: 684KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Using Schematron for Cross Domain Security Policy Enforcement
- Abstract: This document provides recommendations for using Schematron schemas to enforce data constraints on the contents of Extensible Markup Language (XML) documents being transferred between security domains. Schematron is a rule-based schema language used for making assertions about patterns found in XML documents. The risk of transferring invalid or unauthorized XML data into or out of a sensitive security domain can be reduced by validating the XML data against a schema that fully describes and constrains the data. These more restrictive schemas are not necessarily the same as those that might be used to validate data being transferred within a single security domain. Schematron can be used as part of a Cross Domain Solution (CDS) to address security problems that may be difficult to solve using grammar-based XML Schema languages.
- Date: 06/29/2012
- Link: https://apps.nsa.gov/iaarchive/library/reports/schematron_cross_domain_policy_enforcement_v1_0-20171212.cfm
- Category: Reports
- SHA256: 8E0A585DE1B15A62FAA89E99654D46C2E273F2DB87EEE09AAF9FAD299ADD43AA
- Size: 623KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Basic XML Security Considerations
- Abstract: This document presents fundamental information about XML and discusses how these fundamental truths influence XML security. The document then describes a range of XML security issues, including several that are sometimes overlooked. By referring to this document, a reader can become better informed about which security concepts apply to a given use case and obtain recommendations for implementing those security concepts. Perhaps more importantly, the reader will become aware of what XML does not inherently provide.
- Date: 06/28/2012
- Link: https://apps.nsa.gov/iaarchive/library/reports/basic-xml-security-considerations_v1_0_20171212.cfm
- Category: Reports
- SHA256: 753B5C34F6F42F548C13AFBD4BDB10F8C26B9402F4617C2B2AD0C353259BEF74
- Size: 278KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Return to the Table of Contents.
Security Content Automation Protocol Content for Apple iOS 5 Security Configuration Recommendations
Return to the Table of Contents.
New Smartphones and the Risk Picture
- Abstract: Mobile phone platforms are susceptible to malicious attacks, both from the network and upon physical compromise. Understanding the vectors of such attacks, level of expertise required to carry them out, available mitigations, and impact of compromise provides a background for certain risk decisions. In general, comparing risks introduced by the new generation of mobile devices to those of traditional, widely-deployed desktop systems provides insight into how the risks to DoD networks are changing. Due to the larger cultural and technological shift to mobile devices, this may be more relevant than comparison of diff erent smartphone brands.
- Date: 04/01/2012
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/tech-briefs/new-smartphones-and-the-risk-picture.cfm
- Category: IA Guidance > Technical Briefs
- SHA256: B10DEDE4D95744C8D67EA818955C13AA3EE746CAB53647F921E30404288454F8
- Size: 982KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Security Configuration Recommendations for Apple iOS 5 Devices
Return to the Table of Contents.
Inspection and Sanitization Guidance for HyperText Markup Language (HTML)
- Abstract: The purpose of this document is to provide guidance for the development of a sanitization and analysis software tool for HyperText Markup Language. It introduces the syntax of various elements within the language and then discusses several elements that have data hiding, data attack, and data disclosure risks. This document provides an analysis of these elements and recommendations to mitigate their risks.
- Date: 03/02/2012
- Link: https://apps.nsa.gov/iaarchive/library/reports/html_inspection_and_sanitization_guidance_v1_0-20171212.cfm
- Category: Reports
- SHA256: FEE653A1BA7669684C4A96D8B1880D1390ABB6B368B614039D32400DEFD921C7
- Size: 1,559KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Inspection and Sanitization Guidance for Cascading Style Sheets
Return to the Table of Contents.
- Abstract: The purpose of this document is to provide guidance for the development of a sanitization and analysis software tool for the Bitmap (BMP) images as defined in the Microsoft Developer Network Bitmap Reference. It provides inspection and analysis on various elements that are contained within the BMP file structure and how they can be a cause for concern for either hiding sensitive data or attempts to exploit a system. This document provides an analysis of features in BMP and recommendations to mitigate these threats to provide a safer file. Although this report does not mention vulnerabilities related to a specific image editor, many were used in the analysis of the BMP file format. Numerous Common Vulnerabilities and Exposures (CVE)s have registered for BMP related vulnerabilities in applications.
- Date: 03/02/2012
- Link: https://apps.nsa.gov/iaarchive/library/reports/bmp_inspection_and_sanitization_guidance_v1_0-20171212.cfm
- Category: Reports
- SHA256: 9B84C729F13A4F016E3CFA03905E8A4147D2A462F3C2314D378935260CCC36B2
- Size: 654KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
- Abstract: The purpose of this document is to provide guidance for the development of a sanitization and analysis software tool for the WAVE file format. It provides inspection and analysis guidance on the various constituents that are contained within the WAVE file structure and describes how they can be a cause for concern for either hiding sensitive data or attempts to exploit a system.
- Date: 03/02/2012
- Link: https://apps.nsa.gov/iaarchive/library/reports/wave_inspection_and_sanitization_guidance_v1_0-20171206.cfm
- Category: Reports
- SHA256: 78EC7E3E1DCA47A1B142C2BF85D681C00978623D7DA92A3731BE288C9545AF9C
- Size: 1,397KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Inspection and Sanitization Guidance for Rich Text Format (RTF)
- Abstract: The purpose of this document is to provide guidance for the development of a sanitization and analysis software tool for the Rich Text Format (RTF). It provides analysis of the various elements and objects that are contained within the RTF file structure and how they can be a cause of concern for data attack, data hiding, and data disclosure. This document provides recommendations to mitigate these risks. Although this report does not cover vulnerabilities related to a specific RTF capable software application, a number of them were used in the analysis of the standard.
- Date: 03/02/2012
- Link: https://apps.nsa.gov/iaarchive/library/reports/rtf_inspection_and_sanitization_guidance_v1_0.cfm
- Category: Reports
- SHA256: F2E4DB9392CD878CB9F5669F6D055312411CAC1E1B40699E26EDDCBB9D0E053B
- Size: 1,068KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Return to the Table of Contents.
Security Tips for Personally Managed Apple iPhones and iPads
Return to the Table of Contents.
Return to the Table of Contents.
Hardening Deployed Web Applications
Return to the Table of Contents.
Protect Against Cross Site Scripting Attacks
- Abstract: Cross Site Scripting (XSS) is a vulnerability in web applications that allows an attacker to inject HTML, typically including JavaScript code, into a web page. XSS results from the intermingling of server code and user input. If user input is not sanitized correctly, it could contain code that runs along with server code in a client’s browser. In 2010, XSS was ranked the #2 web application security risk by the Open Web Application Security Project (OWASP) and the #1 software error by the SANS Institute. This factsheet explains ways to mitigate XXS attacks.
- Date: 09/01/2011
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-tips/protecting-against-xss-attacks.cfm
- Category: IA Guidance > Security Tips
- SHA256: FEC35BFD0AA0589B76C61C21A332B0DCF98FBCDCB721A1F98F272DEE24692A08
- Size: 349KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Guide to the Secure Configuration of Red Hat Enterprise Linux 5
- Abstract: The purpose of this guide is to provide security configuration recommendations for the Red Hat Enterprise Linux (RHEL) 5 operating system. The guidance provided here should be applicable to all variants (Desktop, Server, Advanced Platform) of the product. Recommended settings for the basic operating system are provided, as well as for many commonly-used services that the system can host in a network environment.
The guide is intended for system administrators. Readers are assumed to possess basic system administration skills for Unix-like systems, as well as some familiarity with Red Hat’s documentation and administration conventions. Some instructions within this guide are complex. All directions should be followed completely and with understanding of their effects in order to avoid serious adverse effects on the system and its security.
- Date: 08/26/2011
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-configuration/operating-systems/guide-to-the-secure-configuration-of-red-hat-enterprise.cfm
- Category: IA Guidance > Security Configuration > Operating Systems
- SHA256: AD051932BFED72FC72D58F3E502C869568B54A1AD3B14FD257788932D402ED9F
- Size: 867KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Enforcing No Internet or E-mail from Privileged Accounts
Return to the Table of Contents.
Host Protection Technology Study
- Abstract: This study examined the behavior and capabilities of the different technologies against various attack scenarios in order to determine their effectiveness. The various products were grouped into different technology categories (host firewall, virus scanner, etc) and installed in a controlled environment. A sample set of attack scenarios was constructed and tested against the various technologies. Because of the pervasive use of Microsoft windows on desktop hosts, this study focused on Windows attacks and protection tools. Results were recorded and analyzed and a summary is presented in this document.
- Date: 06/01/2011
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/tech-briefs/host-protection-technology-study.cfm
- Category: IA Guidance > Technical Briefs
- SHA256: 47BAA8F3F6F18DE5C90E21B8F7B55E6A9DDE09696D91A3F84048A6E3667E3044
- Size: 3,398KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Security Guidance for the use of XML Schema 1.0/1.1 and RELAX NG
- Abstract: This document provides guidance for creating Extensible Markup Language (XML) Schemas and Regular Language for XML Next Generation (RELAX NG) schemas that can be used to describe the format and contents of XML documents being transferred between security domains. The risk of transferring invalid or unauthorized XML data into or out of a sensitive security domain can be reduced by validating the XML data against a schema that fully describes and constrains the data. These more restrictive schemas are not necessarily the same as those that might be used to validate data being transferred within a security domain. As the popularity and usage of XML grows, so too will Cross Domain Solutions (CDS) that filter via schemas also grow; however, using poorly written schemas can undermine the security functionality of even the most well designed CDS.
- Date: 05/11/2011
- Link: https://apps.nsa.gov/iaarchive/library/reports/xml_schema_1-1_relax_ng_security_guidance_v1_0_1-20171212.cfm
- Category: Reports
- SHA256: 8E75584AB372AC93C531E6B39EC2A57E94D41459676AC4FCE02E3664B8838CD0
- Size: 1,146KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
- Abstract: The purpose of this document is to provide guidance for the development of a sanitization and analysis software tool for the Portable Document Format (PDF). It provides inspection and analysis on various elements and objects that are contained within the PDF file structure and how they can be a cause for concern for either hiding sensitive data or attempts to exploit a system. This document provides an analysis of numerous features in PDF and also provides recommendations to mitigate these threats to provide a safer file. Although this report does not mention vulnerabilities related to a specific PDF reader software application, however there were a number of them used in the analysis of the standard.
- Date: 05/02/2011
- Link: https://apps.nsa.gov/iaarchive/library/reports/pdf_inspection_and_sanitization_guidance_v1_0-20171206.cfm
- Category: Reports
- SHA256: 9240BD0B2F698DBDEB168630045203D05C72108C1DCD5E615650108A6E043A0B
- Size: 2,141KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Guidelines for Implementation of REST
Return to the Table of Contents.
BIND 9 Domain Name System Security
- Abstract: Vulnerability Technical Reports such as BIND 9 Security provide our customers with value-added information regarding a plethora of technologies. These reports identify vulnerabilities and provide recommendations to improve or eliminate the identified vulnerabilities. These reports also prioritize vulnerabilities and identify future initiatives in that particular technology arena. BIND is an open-source Domain Name Server (DNS) software package from the Internet Systems Consortium (ISC) commonly used to resolve host names to IP addresses and vice versa. As a key element in the Internet’s infrastructure, DNS servers have often been targets of attack by hackers, spammers and phishers. By taking a few simple steps, you, the customer, can help protect your networks and help protect the Internet as well.
- Date: 02/14/2011
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-configuration/applications/bind-9-dns-security.cfm
- Category: IA Guidance > Security Configuration > Applications
- SHA256: 22059B8076D4038980C85FE2D6F8D80BA3D30902809B5AFDC4971276E5A43EEA
- Size: 225KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Unified Communications Technical Primer
- Abstract: The purpose of this fact sheet is to provide IT managers with a brief introduction to Unified Communications (UC) and the technologies that make up UC. This fact sheet should be used as a starting point for IT managers who are researching whether to upgrade their current infrastructure to incorporate a UC solution. Once they make the decision to implement UC, they should follow recommendations from NSA’s IA Guidance for UC Deployments document.
- Date: 01/03/2011
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/tech-briefs/unified-communications-technical-primer.cfm
- Category: IA Guidance > Technical Briefs
- SHA256: 7EF6C440EAE5CBDB93F469C75670D9484CC8D560260E7864DBDA98EC2EF8537E
- Size: 433KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Security Highlights of Windows 7
Return to the Table of Contents.
Securing Lotus Sametime
- Abstract: This guide has been designed to provide a high-level security reference when deploying a Sametime solution. It is intended to be utilized in parallel with the security features already present in Lotus Domino and Sametime. There are many configurations for a Sametime deployment. Depending on the feature set desired, the environment can become complex. It is important to implement security throughout the deployment process and work out any bugs along the way. Successfully securing your Sametime environment can save time, money, and help protect your sensitive information from today’s most common threats.
- Date: 09/22/2010
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/archive/securing-ibm-lotus-sametime.cfm
- Category: IA Guidance > Archive
- SHA256: BBF6D32B1003EBA0F359A4DA59459DF836C70388C80A4A239CE72167755A67FF
- Size: 494KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
A Framework for Assessing and Improving the Security Posture of Industrial Control Systems
- Abstract: This publication is the first in a series intended to help Industrial Control System (ICS) owners and operators in need of improving the security posture of their systems. This document will focus the reader on aspects of network security and give them a framework for assessing their current operational risk. It will then offer the reader a quantifiable approach to help them make decisions for reducing risk and improving their systems security posture.
- Date: 08/20/2010
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-configuration/industrial-control-systems/a-framework-for-assessing-and-improving-the-security-posture.cfm
- Category: IA Guidance > Security Configuration > Industrial Control Systems
- SHA256: 4881083C3975EF44A16B556B70CE4E9030C35969EC5156C8364FF43FFBA45407
- Size: 936KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Inspection and Sanitization Guidance for Microsoft Office 2003
Return to the Table of Contents.
Cisco Unified Presence Server
- Abstract: This document goes over Cisco Unifed Presence Server (CUPS) and what it is, the functions, risks, etc.
- Date: 08/01/2010
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/archive/cups.cfm
- Category: IA Guidance > Archive
- SHA256: D73CF95F6B46F8852258AFAC99268F1B6317EDEDCA43B2A15E177A62BF51F33C
- Size: 535KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Application Whitelisting using Software Restriction Policies
- Abstract: Software Restriction Policies (SRP) enables administrators to control which applications are allowed to run on Microsoft Windows. SRP is a feature of Windows XP and later operating systems. It can be configured as a local computer policy or as domain policy using Group Policy with Windows Server 2003 domains and later. Using this guide, administrators can configure SRP to prevent all applications in their domain from running except applications they explicitly allow. Utilizing SRP as an application whitelisting technique significantly increases the security posture of the domain by preventing many malicious programs from executing.
- Date: 08/01/2010
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/security-configuration/operating-systems/application-whitelisting-using-srp.cfm
- Category: IA Guidance > Security Configuration > Operating Systems
- SHA256: 3194220BFBF72D090512A55194F3FEA5927A914D2F2969A631482EB4A8F418B5
- Size: 385KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Application Whitelisting
Return to the Table of Contents.
Inspection and Sanitization Guidance for Microsoft Office 2007 and Office Open XML (OOXML)
- Abstract: This Inspection and Sanitization Guidance for Microsoft Office 2007 document provides guidance and specifications for developing file inspection and sanitization software for Microsoft (MS) Office 2007 files (i.e., word processing, presentation, and spreadsheet documents). Client programs, such as MS Office Word 2007, can store arbitrary data in a MS Office 2007 document, including video, sounds, and hidden text. This presents a challenge for automated file processing software. This document addresses this challenge by delineating the various constructs with the Office 2007 file formats. The document provides specific guidelines for designing, building, and testing Office 2007 file inspection and sanitization applications.
- Date: 06/18/2010
- Link: https://apps.nsa.gov/iaarchive/library/reports/ms_office_2007_inspection_and_sanitization_guidance_v1_0-20171212.cfm
- Category: Reports
- SHA256: 00B28829861B994B42498600CC1FE1BCF40A157298BCF597E2F3809D502732B4
- Size: 1,222KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Activating Authentication and Encryption for Cisco Unified Communications Manager Express 7.0/4.3
Return to the Table of Contents.
Mathematical routines for the National Institute of Standards and Technology prime elliptic curves
Return to the Table of Contents.
Host and Network Integrity through Trusted Computing
Return to the Table of Contents.
Defense in Depth
- Abstract: This paper provides an overview of the major elements of the strategy and provides links to resources that provide additional insight.
- Date: 03/12/2010
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/archive/defense-in-depth.cfm
- Category: IA Guidance > Archive
- SHA256: C7DE6ACB92CBFFCF387AE9F055CE5F54C178F51A2FC6F58F74DF73C44534E9E0
- Size: 670KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.
Hardening Tips for Mac OS X 10.6 Snow Leopard
Return to the Table of Contents.
- Abstract: This document specifies the Elliptic Curve Digital Signature Algorithm (ECDSA) from the “Digital Signature Standard” [FIPS186-3] that will be used in future and existing cryptographic protocols for Suite B products. It also includes the Suite B elliptic curve domain parameters, (NIST curves P-256 and P-384), along with example data for the ECDSA signature algorithm on these curves and auxiliary functions that are necessary for ECDSA implementations to be in compliance with [FIPS186-3] and Suite B.
[FIPS186-3] defines methods for digital signature generation that can be used for the authentication of binary data (commonly called a message), and for the verification and validation of those digital signatures. One of the approved techniques is the Elliptic Curve Digital Signature Algorithm (ECDSA) but additional requirements are specified.
This document includes requirements for obtaining the assurances necessary for valid digital signatures. Methods for obtaining these assurances are provided in the NIST Special Publication [SP800-89].
- Date: 02/03/2010
- Link: https://apps.nsa.gov/iaarchive/library/ia-guidance/ia-solutions-for-classified/algorithm-guidance/suite-b-implementers-guide-to-fips-186-3-ecdsa.cfm
- Category: IA Guidance > IA Solutions For Classified > Algorithm Guidance
- SHA256: A27A08A1A76DB19109BD014CE172DC09B2184FDBE3B049E3DA0816312646032A
- Size: 177KB
- Location: Archive
- Access Controlled: False
Return to the Table of Contents.