IT infrastructure
-
Denial of Service (DoS) guidance collection
Guidance16 Mar 2018Topics: IT infrastructure, Network securityGuidance to help organisations understand and mitigate against DoS attacks.
-
EUD Security Guidance: Windows 10 with Mobile Device Management
Guidance14 Mar 2018Topics: IT infrastructure, End user technology, End user deviceAlpha security configuration guidance for Windows 10 with MDM
-
NCSC IT: Installing software updates without breaking things
Blog post08 Mar 2018: Topics: IT infrastructure, Patch managementAndy P explains how the NCSC rolls out software updates without delays.
-
Security Procedures Egress Switch
Document07 Mar 2018Topics: IT infrastructure, Technology at OFFICIAL, End user technology, Secure communicationsThese Security Procedures provide guidance in the secure operation of Egress Switch.
-
DoS Guidance - Understand your service
Guidance31 Jan 2018Topics: IT infrastructure, Network securityUnderstand the points in your service where resources can be overloaded or exhausted. Determine whether you, or a supplier, are responsible for each.
-
DoS Guidance - Upstream defences
Guidance31 Jan 2018Topics: IT infrastructure, Network securityEnsure your service providers are ready to deal with resource exhaustion in places where they are uniquely placed to help.
-
DoS Guidance - Scaling
Guidance31 Jan 2018Topics: IT infrastructure, Network securityEnsure your service can scale to deal with surges in concurrent sessions.
-
DoS Guidance - Response plan
Guidance31 Jan 2018Topics: IT infrastructure, Network securityYou should design your service, and plan your response to an attack, so that the service can continue to operate, albeit in a degraded fashion.
-
DoS Guidance - Testing and monitoring
Guidance31 Jan 2018Topics: IT infrastructure, Network securityGain confidence in your defenses by testing them, and gain confidence you'll notice when attacks start by having the right tooling in place.
-
Understanding denial of service (DoS) attacks
Guidance31 Jan 2018Topics: IT infrastructure, Network securityAn introduction to denial of service (DoS) attacks.
-
NCSC IT: How the NCSC built its own IT system
Blog post29 Jan 2018: Topics: IT infrastructure, Technology at OFFICIAL, End user technologyThe first in a series of blogs about how we built an OFFICIAL IT system to meet the needs of the NCSC
-
A1. Governance
Guidance28 Jan 2018Topics: IT infrastructure, NIS Directive -
A2. Risk management
Guidance28 Jan 2018Topics: Operational security, IT infrastructure, NIS Directive -
A3. Asset management
Guidance28 Jan 2018Topics: IT infrastructure, Network security, NIS Directive -
NCSC IT: Don't leave your Windows open this Christmas
Blog post22 Dec 2017: Topics: IT infrastructure, Technology at OFFICIAL, End user deviceThe latest blog on NCSC's own IT, this time how we protect our Windows end user devices from malware.
-
TLS VPN Client: CPA SC
Document18 Dec 2017Topics: IT infrastructure, Network security, AssuranceProvides secure corporate network connectivity over a less-trusted network.
-
Modernising Windows 10 Management
Blog post21 Sep 2017: Topics: IT infrastructure, End user technology, End user deviceIntroducing our new Windows10 with MDM guidance
-
End User Devices: VPNs
Guidance01 Aug 2017Topics: IT infrastructure, End user technology, Secure communicationsIn this guidance we discuss the reasons for using VPNs and make recommendations on aspects of the underlying technology, such as protocols and cryptography. We also give risk management advice to organisations considering the use of VPNs.
-
Introducing new guidance on Virtual Private Networks (VPNs)
Blog post01 Aug 2017: Topics: IT infrastructure, Network security, End user technologyAn introduction to our new guidance on virtual private networks
-
Internet edge device security
Guidance12 May 2017Topics: Incident management, Operational security, IT infrastructureWhat to do if you suspect your internet edge router has been compromised
-
Global targeting of enterprises via managed service providers
Information03 Apr 2017Topics: IT infrastructure, Cyber attacks, The NCSC -
Advice on managing enterprise security published after major cyber campaign detected
News03 Apr 2017Topics: IT infrastructure, Cyber attacks, The NCSC -
NCSC IT: The architecture behind NCSC's IT system
Blog post22 Feb 2017: Topics: IT infrastructure, Technology at OFFICIAL, End user technologyA look at the high-level design of the NCSC's new IT system, including the single sign-on architecture, our initial end user device choices, and how we tackled the captive portal problem.
-
The UK public sector DNS service
News22 Feb 2017Topics: IT infrastructureDetails on how to register and use the new UK public sector DNS services
-
Registration now open for UK Public Sector DNS service
Blog post22 Feb 2017: Topics: IT infrastructure