Technology at OFFICIAL
-
Security Procedures Egress Switch
Document07 Mar 2018Topics: IT infrastructure, Technology at OFFICIAL, End user technology, Secure communicationsThese Security Procedures provide guidance in the secure operation of Egress Switch.
-
NCSC IT: How the NCSC built its own IT system
Blog post29 Jan 2018: Topics: IT infrastructure, Technology at OFFICIAL, End user technologyThe first in a series of blogs about how we built an OFFICIAL IT system to meet the needs of the NCSC
-
NCSC IT: Don't leave your Windows open this Christmas
Blog post22 Dec 2017: Topics: IT infrastructure, Technology at OFFICIAL, End user deviceThe latest blog on NCSC's own IT, this time how we protect our Windows end user devices from malware.
-
Foundation Grade explained
Information27 Sep 2017Topics: Technology at OFFICIAL, AssuranceFoundation Grade is a way of describing security products that demonstrate good commercial security practice.
-
NCSC IT: The architecture behind NCSC's IT system
Blog post22 Feb 2017: Topics: IT infrastructure, Technology at OFFICIAL, End user technologyA look at the high-level design of the NCSC's new IT system, including the single sign-on architecture, our initial end user device choices, and how we tackled the captive portal problem.
-
strongSwan Assure Security Procedures
Document04 Oct 2016Topics: Technology at OFFICIAL, AssuranceSecurity procedures for the strongSwan Assure products assured through CPA
-
Process for performing CPA Foundation Grade evaluations
Document01 Aug 2016Topics: Technology at OFFICIAL, AssuranceThis document details the process for performing a CPA Foundation Grade evaluation of a commercial security product.