Citadel Information Group

  • Home
  • About Us
    • About Citadel
    • Who We Are
    • When To Call Citadel
  • Services
    • Overview: Delivering Information Peace of Mind ® to Business and the Nonprofit Community
    • Citadel’s Information Peace of Mind ® Program
    • Assessments and Reviews
    • Information Security Policies and Standards
    • Secure The Human
    • Phishing Defense Training
    • CCPA and Defendable Security Procedures and Practices
    • Privacy: Information Inventory / Data Mapping
    • Security Management of the IT Network / Infrastructure
    • Incident Response / Business Continuity
    • Secure Application Development — Learn By Doing
    • Litigation Support
    • Keynotes
    • Client Success Stories
  • Blog
  • Resources
    • Information Security Library
      • Citadel Guides
      • Awareness Posters
      • For Boards and the C Suite
      • Cybersecurity Law
      • Cybersecurity Surveys
      • HIPAA HITECH
      • Insurance and Risk Management
      • National Cybersecurity
      • Online Bank Security
      • Payment Card Industry Data Security Standard
      • Personal Cybersecurity
      • Securing the IT Network
      • Helpful Links
    • Blogs
      • Cybersecurity Blogs
      • Leadership and Culture Change Blogs
  • Contact
You are here: Home / Resources / Information Security Library / Securing the IT Network

Securing the IT Network

  • Assessing Security Vulnerabilities and Patching Australian Defense, 2011
  • iOS5 Hardening Guide Australian Defense, 2012
  • Minimizing Administrative Privileges – Australian Defense, 2011
  • NSA Defense In Depth
  • Top 4 Mitigation Strategies to Protect Sensitive Information, Australian Defense, 2011
  • Top 35 Mitigation Strategies to Protect Sensitive Information, Australian Defense, 2011
  • Top 35 Mitigation Strategies Summary, Australian Defense, 2011

Cloud Security

Citadel Guide

  • Eight Security Concerns Before Jumping Into the Cloud, Citadel, 2012

Other Practices

  • Amazon Web Services Risk and Compliance Whitepaper, 2012
  • Security Guide: Cloud Security Alliance v3.0
  • Cloud Controls Matrix — Cloud Security Alliance v1.2, 2011

Secure System Development

  • Software Assurance Maturity Model
  • Open Source Security Testing Methodology Manual
  • OWASP ASVS Web Application Standard Release, 2009
  • OWASP Top 10 – 2010

Additional Government Documents

  • Definition of Cloud Computing, NIST-SP800-145, 2011
  • Guide to Intrusion Detection and Prevention Systems, NIST-SP800-94, 2007
  • Computer Security Incident Handling Guide, NIST-SP800-61, 2012
  • Guide to Protecting Confidentiality of Personally Identifiable Information, NIST-SP800-122, 2010
  • Guide to General Server Security, NIST-SP800-123, 2008
  • Guidelines on Security and Privacy in Public Cloud Computing, NIST-SP800-144, 2001
  • Guidelines for Securing Wireless Local Area Networks, NIST-SP800-153, 2012
  • National Strategy for Trusted Identities in Cyberspace, 2010
  • Guidelines on Cell Phone and PDA Security, NIST-SP800-124, 2008
  • White House Cybersecurity Initiative
  • NSA Information Assurance Roadmap, 2004
  • Glossary of Key Information Security Terms, NIST-7298, 2006
  • Building Information Security Awareness Program, NIST-SP800-50, 2003
  • Information Categorization Guide Vol. 1, NIST-SP800-60, 2008
  • Managing Risk from Information Systems, NIST-SP800-39, 2008
  • Guide for Security Certification and Accreditation of Federal Information Systems, NIST-SP800-37, 2004
  • Risk Management Guide for IT Systems, NIST-SP800-30, 2002
  • Minimum Security Requirements for Federal Information and Information Systems, FIPS 200, 2006
  • Standards for Security Categorization of Federal Information and Information Systems, FIPS PUB 999, 2002
  • 60 Minutes Network Security Guide, NSA, 2002

Call us for a free confidential consultation:
323-428-0441

Get our newsletter

A weekly report of critical security updates and the latest cybersecurity news delivered to your inbox from Secure The Village.

Sign Up

Resources

  • Information Security Library
    • Citadel Guides
    • Awareness Posters
    • For Boards and the C Suite
    • Cybersecurity Law
    • Cybersecurity Surveys
    • HIPAA HITECH
    • Insurance and Risk Management
    • National Cybersecurity
    • Online Bank Security
    • Payment Card Industry Data Security Standard
    • Personal Cybersecurity
    • Securing the IT Network
    • Helpful Links
  • Blogs

Get in touch

323 428 0441
info@citadel-information.com

Citadel Information Group
Citadel on Linkedin
SecureTheVillage on Linkedin

About Us

Citadel Information Group is a full service integrated information security management / governance firm. We work either consultatively or as part of a client’s senior management team, assisting our clients cost-effectively manage the confidentiality, privacy, integrity and availability of their information. Learn more.

Key Resources

  • The Citadel Way to Information Security Management
  • Creating a Cybersecurity Aware Culture
  • Secure Application Development: The CISO’s Role – a webinar with WhiteHat Security
  • Information Security Library

Copyright © 2018 by Citadel Information Group  All Rights Reserved | Privacy Policy