Cybersecurity Advisories & Technical Guidance

NSA Leverages its elite technical capability to develop advisories and mitigations on evolving cybersecurity threats.

Browse or search our repository of advisories, info sheets, tech reports, and operational risk notices listed below. Some resources have access requirements.

For a subset of cybersecurity products focused on telework and general network security for end users, view our Telework and Mobile Security Guidance page here.

ImageTitlePublication Date
 CSI_SECURING_WIRELESS_DEVICES_IN_PUBLIC.PDFCSI: Securing Wireless Devices in Public Settings (July 2021)7/29/2021
 CTR_DEPLOYING SECURE VVOIP SYSTEMS.PDFCTR: Deploying Secure Unified Communications/Voice and Video over IP Systems (June 2021)6/17/2021
 CTR_KUBERNETES HARDENING GUIDANCE.PDFCTR: Kubernetes Hardening Guidance8/3/2021
 AUTHENTICATION_MECHANISMS_CSA_EXEC_U_OO_198854_20.PDFCybersecurity Advisory: (Abridged) Detecting Abuse of Authentication Mechanisms (December 2020)12/17/2020
 AUTHENTICATION_MECHANISMS_CSA_U_OO_198854_20.PDFCybersecurity Advisory: (Full) Detecting Abuse of Authentication Mechanisms (December 2020)12/17/2020
 CSA_CHINESE_EXPLOIT_VULNERABILITIES_UOO179811.PDFCybersecurity Advisory: Chinese State-Sponsored Actors Exploit Publicly Known Vulnerabilities (October 2020)10/20/2020
 ADVISORY FURTHER TTPS ASSOCIATED WITH SVR CYBER ACTORS.PDFCybersecurity Advisory: Further TTPs associated with SVR cyber actors5/7/2021
 DDD-200730-216-040.PDFCybersecurity Advisory: Mitigate the GRUB2 BootHole Vulnerability7/30/2020
 CSA_DROVORUB_RUSSIAN_GRU_MALWARE_AUG_2020.PDFCybersecurity Advisory: Russian GRU 85th GTsSS Deploys Previously Undisclosed Drovorub Malware8/13/2020
 CSA_VMWARE ACCESS_U_OO_195076_20.PDFCybersecurity Advisory: Russian State-Sponsored Actors Exploiting Vulnerability in VMware Workspace ONE Access Using Compromised Credentials (December 2020)12/7/2020
Page 4 of 10

Additional Documents

The following resources require use of a Federal/DoD Public Key Infrastructure (PKI), Personal Identity Verification (PIV) or Common Access Card (CAC) client certificate. Read more information about these access requirements.