This series of documents contains recommended strategies and guidance for securing nationally significant information.
- Application Whitelisting Explained [PDF, 213 KB]
- Assessing Security Vulnerabilities And Patches [PDF, 640 KB]
- Bring Your Own Devices (BYOD) [PDF, 218 KB]
- Classified Document Handling [PDF, 281 KB]
- Malicious Email Strategies [PDF, 1.1 MB]
- Restricting Administrative Privileges Explained [PDF, 269 KB]
- Top Four in a Linux Environment [PDF, 295 KB]
- Top Four Mitigation Strategies to Protect Your IT System [PDF, 380 KB]
- Traffic Light Protocol [PDF, 833 KB]