IT infrastructure

The underlying hardware, software, network, resources and services that organisations need to in order to deliver IT solutions to employees, partners and customers.
Showing 1 - 25 of 56 results
Sort by: A-Z|Date
  • Import data not malware

    Import data, not malware

    Blog post16 Jul 2018AuthorRichard CTopicsIT infrastructure, Malware protection

    Richard C introduces new guidance on safe, malware-free data import

  • Pattern: Safely Importing Data

    Guidance16 Jul 2018TopicsIT infrastructure, Data in transit, Malware protection, Monitoring

    An architecture pattern for safely importing data into a system from an external source.

  • https locks

    Serve websites over HTTPS (always)

    Blog post06 Jun 2018AuthorJamie HTopicsIT infrastructure, Browser security

    You should be serving web pages over HTTPS. Are you?

  • EUD Security Guidance: Windows 10 with Mobile Device Management

    Guidance21 May 2018TopicsIT infrastructure, End user technology, End user device

    Alpha security configuration guidance for Windows 10 with MDM

  • A1. Governance

    Guidance30 Apr 2018TopicsIT infrastructure, NIS Directive
  • A2. Risk management

    Guidance30 Apr 2018TopicsOperational security, IT infrastructure, NIS Directive
  • A3. Asset management

    Guidance30 Apr 2018TopicsIT infrastructure, Network security, NIS Directive
  • Denial of Service (DoS) guidance collection

    Guidance16 Mar 2018TopicsIT infrastructure, Network security

    Guidance to help organisations understand and mitigate against DoS attacks.

  • Broken laptop

    NCSC IT: Installing software updates without breaking things

    Blog post08 Mar 2018AuthorAndy PTopicsIT infrastructure, Patch management

    Andy P explains how the NCSC rolls out software updates without delays.

  • Security Procedures Egress Switch

    Document07 Mar 2018TopicsIT infrastructure, Technology at OFFICIAL, End user technology, Secure communications

    These Security Procedures provide guidance in the secure operation of Egress Switch.

  • DoS Guidance - Understand your service

    Guidance31 Jan 2018TopicsIT infrastructure, Network security

    Understand the points in your service where resources can be overloaded or exhausted. Determine whether you, or a supplier, are responsible for each.

  • DoS Guidance - Upstream defences

    Guidance31 Jan 2018TopicsIT infrastructure, Network security

    Ensure your service providers are ready to deal with resource exhaustion in places where they are uniquely placed to help.

  • DoS Guidance - Scaling

    Guidance31 Jan 2018TopicsIT infrastructure, Network security

    Ensure your service can scale to deal with surges in concurrent sessions.

  • DoS Guidance - Response plan

    Guidance31 Jan 2018TopicsIT infrastructure, Network security

    You should design your service, and plan your response to an attack, so that the service can continue to operate, albeit in a degraded fashion.

  • DoS Guidance - Testing and monitoring

    Guidance31 Jan 2018TopicsIT infrastructure, Network security

    Gain confidence in your defenses by testing them, and gain confidence you'll notice when attacks start by having the right tooling in place.

  • Understanding denial of service (DoS) attacks

    Guidance31 Jan 2018TopicsIT infrastructure, Network security

    An introduction to denial of service (DoS) attacks.

  • NCSC IT: Agile infrastructure

    NCSC IT: How the NCSC built its own IT system

    Blog post29 Jan 2018AuthorRichard CTopicsIT infrastructure, Technology at OFFICIAL, End user technology

    The first in a series of blogs about how we built an OFFICIAL IT system to meet the needs of the NCSC

  • Remote timber cabin on Iceland set in snow again a mountain backdrop

    NCSC IT: Don't leave your Windows open this Christmas

    Blog post22 Dec 2017AuthorStuart GTopicsIT infrastructure, Technology at OFFICIAL, End user device

    The latest blog on NCSC's own IT, this time how we protect our Windows end user devices from malware.

  • TLS VPN Client: CPA SC

    Document18 Dec 2017TopicsIT infrastructure, Network security, Assurance

    Provides secure corporate network connectivity over a less-trusted network.

  • EUD: Windows 10 MDM

    Modernising Windows 10 Management

    Blog post21 Sep 2017AuthorStuart GTopicsIT infrastructure, End user technology, End user device

    Introducing our new Windows10 with MDM guidance

  • End User Devices: VPNs

    Guidance01 Aug 2017TopicsIT infrastructure, End user technology, Secure communications

    In this guidance we discuss the reasons for using VPNs and make recommendations on aspects of the underlying technology, such as protocols and cryptography. We also give risk management advice to organisations considering the use of VPNs.

  • virtual private networks

    Introducing new guidance on Virtual Private Networks (VPNs)

    Blog post01 Aug 2017AuthorAndy PTopicsIT infrastructure, Network security, End user technology

    An introduction to our new guidance on virtual private networks

  • Internet edge device security

    Guidance12 May 2017TopicsIncident management, Operational security, IT infrastructure

    What to do if you suspect your internet edge router has been compromised

  • NCSC building with logo

    Advice on managing enterprise security published after major cyber campaign detected

    News03 Apr 2017TopicsIT infrastructure, Cyber attacks, The NCSC
  • Global targeting of enterprises via managed service providers

    Information03 Apr 2017TopicsIT infrastructure, Cyber attacks, The NCSC