IT infrastructure

The underlying hardware, software, network, resources and services that organisations need to in order to deliver IT solutions to employees, partners and customers.
Showing 1 - 25 of 42 results
Sort by: A-Z|Date
  • Remote timber cabin on Iceland set in snow again a mountain backdrop

    NCSC IT: Don't leave your Windows open this Christmas

    Blog post22 Dec 2017AuthorStuart GTopicsIT infrastructure, Technology at OFFICIAL, End user device

    The latest blog on NCSC's own IT, this time how we protect our Windows end user devices from malware.

  • TLS VPN Client: CPA SC

    Document18 Dec 2017TopicsIT infrastructure, Network security, Assurance

    Provides secure corporate network connectivity over a less-trusted network.

  • EUD Security Guidance: Windows 10 with Mobile Device Management

    Guidance21 Sep 2017TopicsIT infrastructure, End user technology, End user device

    Alpha security configuration guidance for Windows 10 with MDM

  • EUD: Windows 10 MDM

    Modernising Windows 10 Management

    Blog post21 Sep 2017AuthorStuart GTopicsIT infrastructure, End user technology, End user device

    Introducing our new Windows10 with MDM guidance

  • End User Devices: VPNs

    Guidance01 Aug 2017TopicsIT infrastructure, End user technology, Secure communications

    In this guidance we discuss the reasons for using VPNs and make recommendations on aspects of the underlying technology, such as protocols and cryptography. We also give risk management advice to organisations considering the use of VPNs.

  • virtual private networks

    Introducing new guidance on Virtual Private Networks (VPNs)

    Blog post01 Aug 2017AuthorAndy PTopicsIT infrastructure, Network security, End user technology

    An introduction to our new guidance on virtual private networks

  • Internet edge device security

    Guidance12 May 2017TopicsIncident management, Operational security, IT infrastructure

    What to do if you suspect your internet edge router has been compromised

  • NCSC building with logo

    Advice on managing enterprise security published after major cyber campaign detected

    News03 Apr 2017TopicsIT infrastructure, Cyber attacks, The NCSC
  • Global targeting of enterprises via managed service providers

    Information03 Apr 2017TopicsIT infrastructure, Cyber attacks, The NCSC
  • NCSC IT: Architecture

    NCSC IT: The architecture behind NCSC's IT system

    Blog post22 Feb 2017AuthorRichard CTopicsIT infrastructure, Technology at OFFICIAL, End user technology

    A look at the high-level design of the NCSC's new IT system, including the single sign-on architecture, our initial end user device choices, and how we tackled the captive portal problem.

  • UK DNS service

    The UK public sector DNS service

    News22 Feb 2017TopicsIT infrastructure

    Details on how to register and use the new UK public sector DNS services

  • UK DNS service

    Registration now open for UK Public Sector DNS service

    Blog post22 Feb 2017AuthorRob GTopicsIT infrastructure
  • NCSC IT: Agile infrastructure

    NCSC IT: How the NCSC built its own IT system

    Blog post13 Feb 2017AuthorRichard CTopicsIT infrastructure, Technology at OFFICIAL, End user technology

    The first in a series of blogs about how we built an OFFICIAL IT system to meet the needs of the NCSC

  • Infographic: Navigating the cyber security marketplace

    Information10 Nov 2016TopicsIT infrastructure

    Infographic showing the interactions of the certified cyber security products and services and how they could help you safeguard your systems

  • Approaching enterprise technology with cyber security in mind

    Guidance24 Sep 2016TopicsIT infrastructure, Cyber attacks

    How organisations can approach enterprise technology in order to deter cyber attacks.

  • Security operations centre (SOC) buyers guide

    Guidance24 Sep 2016TopicsIT infrastructure, Monitoring

    Guidance is for organisations that are considering procuring a Security Operations Centre (SOC) from a third party.

  • Secure sanitisation of storage media

    Guidance24 Sep 2016TopicsIT infrastructure, Destruction and disposal

    Why sanitisation is necessary, the risks to manage, and how to sanitise affordably.

  • Security Characteristics for Virtualisation

    Document09 Sep 2016TopicsIT infrastructure, Network security, Cloud security, Assurance

    Security Characteristics (SCs) for use with Commercial Product Assurance assessments. Product developers need these to fully understand which security enforcing functions will be assessed by the test labs. Purchasers can use these to know more about what functionality has and has not been assessed ...

  • Security Characteristics for VPNs

    Document09 Sep 2016TopicsIT infrastructure, Network security, Secure communications, Assurance

    Security Characteristics (SCs) for use with Commercial Product Assurance assessments. Product developers need these to fully understand which security enforcing functions will be assessed by the test labs. Purchasers can use these to know more about what functionality has and has not been assessed ...

  • Security Characteristics for firewalls

    Document09 Sep 2016TopicsIT infrastructure, Network security, Assurance

    Security Characteristics (SCs) for use with Commercial Product Assurance assessments. Product developers need these to fully understand which security enforcing functions will be assessed by the test labs. Purchasers can use these to know more about what functionality has and has not been assessed ...

  • Security Characteristics for email encryption

    Document09 Sep 2016TopicsIT infrastructure, End user technology, Assurance

    Security Characteristics (SCs) for use with Commercial Product Assurance assessments. Product developers need these to fully understand which security enforcing functions will be assessed by the test labs. Purchasers can use these to know more about what functionality has and has not been assessed ...

  • Full Disk Encryption - Authorisation Acquisition (CC Mapping): CPA SC

    Document08 Aug 2016TopicsIT infrastructure, Design and configuration, Secure storage, Assurance

    Full disk encryption protects the confidentiality of data at rest. Such solutions come in two parts – an encryption engine component that performs the bulk encryption and decryption of information, and an “Authorisation Acquisition” component covered by this Security ...

  • Full Disk Encryption - Encryption Engine (CC Mapping): CPA SC

    Document08 Aug 2016TopicsIT infrastructure, Secure storage, Assurance

    Full disk encryption solutions protect the confidentiality of data at rest. Such solutions come in two parts – an authorisation gathering component and an “Encryption Engine” which performs the bulk encryption and decryption of information. This combination protects data ...

  • CPA Security Procedures Cisco ISR Series Cisco ASR Series

    Document01 Aug 2016TopicsIT infrastructure, Network security

    This document describes the manner in which this product should be implemented to ensure it complies with the requirements of the CPA SC that it was assessed against.

  • Security Procedures Windows Server 2012 Hyper-V

    Document01 Aug 2016TopicsIT infrastructure, Network security

    These Security Procedures provide guidance in the secure operation of Windows Server 2012 in relation to Server Virtualisation.