Topic

Network security

Monitoring and preventing unauthorised access to a computer network, and network-accessible end user devices.

Latest

  • Using TLS to protect data

    Guidance07 Oct 2016TopicsNetwork security, Digital services

    How to configure the services that must be able to receive incoming connections from unknown clients or services.

  • Provisioning and securing security certificates

    Guidance26 Sep 2016TopicsNetwork security, Secure communications

    How certificates should be initially provisioned, and how supporting infrastructure should be securely operated.

  • Using IPsec to protect data

    Guidance24 Sep 2016TopicsData in transit, Network security

    Guidance for organisations wishing to deploy or buy network encryption, using IPsec.

  • Security Characteristics for Virtualisation

    Document09 Sep 2016TopicsIT infrastructure, Network security, Cloud security, Assurance

    Security Characteristics (SCs) for use with Commercial Product Assurance assessments. Product developers need these to fully understand which security enforcing functions will be assessed by the test labs. Purchasers can use these to know more about what functionality has and has not been assessed ...

  • Security Characteristics for VPNs

    Document09 Sep 2016TopicsIT infrastructure, Network security, Secure communications, Assurance

    Security Characteristics (SCs) for use with Commercial Product Assurance assessments. Product developers need these to fully understand which security enforcing functions will be assessed by the test labs. Purchasers can use these to know more about what functionality has and has not been assessed ...

Share this page