An official website of the United States government
Here's how you know

Official websites use .gov

A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS

A lock (lock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Home Logo: National Security Agency I Central Security Service Home
National Security Agency/Central Security Service
NSA/CSS
Search
Search
Search
  • About
    • Leadership
    • Mission & Combat Support
    • Cybersecurity
    • Signals Intelligence
    • Central Security Service
    • Locations
    • Research
    • Cybersecurity Collaboration Center
      • Collaborative Partnerships
      • Enduring Security Framework
      • DIB Cybersecurity Services
      • Standards and Certifications
      • Artificial Intelligence Security Center
  • Press Room
    • Press Releases & Statements
    • News & Highlights
    • Podcast
    • Declassification & Transparency Initiatives
    • Cybersecurity Advisories & Guidance
    • Telework and Mobile Security Guidance
    • DoD Microelectronics Guidance
    • Research Publications
  • Careers
  • History
    • National Cryptologic Museum
    • Cryptologic History
    • National Cryptologic Memorial

  • Upload Date
  • Document Date
  • Title
Clear Search 85 results found.

CSI: Deploying AI Systems Securely
U/OO/143395-24 | PP-24-1538 | April 2024 Ver. 1.0

CSI: Deploying AI Systems Securely

PRC State-Sponsored Cyber Activity: Actions for Critical Infrastructure Leaders
Version 1.1 | March 2024

PRC State-Sponsored Cyber Activity: Actions for Critical Infrastructure Leaders

CSI: Use Secure Cloud Identity and Access Management Practices
U/OO/126063-24 | PP-24-0832 | March 2024 Ver. 1.0

CSI: Use Secure Cloud Identity and Access Management Practices

CSI: Account for Complexities Introduced by Hybrid Cloud and Multi-Cloud Environments
U/OO/126161-24 | PP-24-0103 | March 2024 Ver. 1.0

CSI: Account for Complexities Introduced by Hybrid Cloud and Multi-Cloud Environments

CSI: Manage Cloud Logs for Effective Threat Hunting
U/OO/126083-24 | PP-24-0822 | March 2024 Ver. 1.0

CSI: Manage Cloud Logs for Effective Threat Hunting

CSI: Uphold the Cloud Shared Responsibility Model
U/OO/126062-24 | PP-24-0580 | March 2024 Ver. 1.0

CSI: Uphold the Cloud Shared Responsibility Model

CSI: Secure Data in the Cloud
U/OO/126071-24 | PP-24-0581 | March 2024 Ver. 1.0

CSI: Secure Data in the Cloud

CSI: Implement Network Segmentation and Encryption in Cloud Environments
U/OO/126067-24 | PP-24-0102 | March 2024 Ver. 1.0

CSI: Implement Network Segmentation and Encryption in Cloud Environments

CSI: NSA’s Top Ten Cloud Security Mitigation Strategies
U/OO/126059-24 | PP-24-0616 | March 2024 Ver. 1.1

CSI: NSA’s Top Ten Cloud Security Mitigation Strategies

CSI: Mitigate Risks from Managed Service Providers in Cloud Environments
U/OO/126084-24 | PP-23-4631 | March 2024 Ver. 1.0

CSI: Mitigate Risks from Managed Service Providers in Cloud Environments

CSI: Use Secure Cloud Key Management Practices
U/OO/126065-24 | PP-24-0082 | March 2024 Ver. 1.0

CSI: Use Secure Cloud Key Management Practices

CSI: Enforce Secure Automated Deployment Practices through Infrastructure as Code
U/OO/126073-24 | PP-24-0540 | March 2024 Ver. 1.0

CSI: Enforce Secure Automated Deployment Practices through Infrastructure as Code

Cybersecurity Information Sheet: Advancing Zero Trust Maturity Throughout the Network and Environment Pillar
U/OO/125052-24 | PP-24-0689 | MAR 2024 Ver. 1.0

CSI: Advancing Zero Trust Maturity Throughout the Network and Environment Pillar

CSA: Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations

CSA: Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations

CSA: SVR Adapt Tactics for Initial Cloud Access

CSA: SVR Adapt Tactics for Initial Cloud Access

CTR: Joint Guidance: Identifying and Mitigating Living Off the Land Techniques
Version 1.0 | February 2024

CTR: Joint Guidance: Identifying and Mitigating Living Off the Land Techniques

CSA: PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure
Version 1.0 | February 2024

CSA: PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure

CSI: Engaging with Artificial Intelligence
Publication led by the Australian Signals Directorate's Australian Cyber Security Centre in cooperation with international co-authors.

CSI: Engaging with Artificial Intelligence

NSA 2023 Cybersecurity Year in Review
Version 1.3 | March 2024

NSA 2023 Cybersecurity Year in Review

CSI: Recommendations for Software Bill of Materials (SBOM) Management
U/OO/238782-23 | PP-23-4432 | JAN 2024 Ver. 1.1

CSI: Recommendations for Software Bill of Materials (SBOM) Management (Jan 2024 Update)

  • FIRST
  • 1
  • 2 (current)
  • 3
  • 4
  • 5
  • LAST
NSA.GOV
  • About
  • Leadership
  • Cybersecurity Collaboration
    Center
  • National Cryptologic Museum
  • Contact NSA
  • Accessibility
  • ABA Notice
  • Site Policies
CULTURE
  • Operating Authorities
  • Civil Liberties, Privacy, & Transparency Office
  • Compliance

  • General Counsel
  • NSA Inspector General
HELPFUL LINKS
  •  
  • NSA Freedom of Information Act
  • Privacy Act Requests
  • Request a Speaker
  • Prepublication Review
  • Media Inquiry
  • Frequently Asked Questions
  • Scams & Safety
RESOURCES
  • Classified Materiel Conversion
  • Commercial Solutions for Classified Program (CSfC)​
  • Cryptographic Support Services
  • Media Destruction Guidance
  • NSA Open Source
RELATED LINKS
  • DNI.gov
  • Defense.gov
  • IC on the Record
  • Intelligence.gov
  • NSA.GOV
    • About
    • Leadership
    • Cybersecurity Collaboration Center
    • National Cryptologic Museum
    • Contact NSA
    • Accessibility
    • ABA Notice
    • Site Policies
  • CULTURE
    • Operating Authorities
    • Civil Liberties & Privacy
    • General Counsel
    • NSA Inspector General
  • HELPFUL LINKS
    • NSA Freedom of Information Act
    • Frequently Asked Questions
    • Privacy Act Requests
    • Request a Speaker
    • Prepublication Review
    • Media Inquiry
  • RESOURCES
    • Commercial Solutions for Classified Material (CSFC)
    • Media Destruction Guidance
    • Classified Materiel Conversion
    • Cross Domain Services
    • NSA Open Source
    • NSA Exhibit Roadshow
  • RELATED LINKS
    • DNI.gov
    • Defense.gov
    • IC on the Record
    • Intelligence.gov
  • Privacy & Security     Links Disclaimer     Section 508     Web Policy     Plain Writing Act    DOD IG    No FEAR Act    Imagery Use    FOIA    Open GOV    Strategic Plan    USA.gov    Small Business Act    Site Map  
 
Hosted by Defense Media Activity - WEB.mil Veterans Crisis Line number. Dial 988 then Press 1