『Network Infrastructure Security Guidance』のカバーアート

Network Infrastructure Security Guidance

National Security Agency Cybersecurity Technical Report

プレビューの再生
期間限定

2か月無料体験

聴き放題対象外タイトルです。プレミアムプラン登録で、非会員価格の30%OFFで購入できます。
タイトルを¥1,330 で購入し、プレミアムプランを2か月間無料で試す
期間限定:2025年10月14日(日本時間)に終了
2025年10月14日までプレミアムプラン2か月無料体験キャンペーン開催中。詳細はこちら
オーディオブック・ポッドキャスト・オリジナル作品など数十万以上の対象作品が聴き放題。
オーディオブックをお得な会員価格で購入できます。
無料体験後は月額1,500円で自動更新します。いつでも退会できます。

Network Infrastructure Security Guidance

著者: National Security Agency
ナレーター: Tom Brooks
タイトルを¥1,330 で購入し、プレミアムプランを2か月間無料で試す

無料体験終了後は月額1,500円で自動更新します。いつでも退会できます。

¥1,900 で購入

¥1,900 で購入

このコンテンツについて

Introduction

Guidance for securing networks continues to evolve as new vulnerabilities are exploited by adversaries, new security features are implemented, and new methods of securing devices are identified. Improper configuration, incorrect handling of configurations, and weak encryption keys can expose vulnerabilities in the entire network. All networks are at risk of compromise, especially if devices are not properly configured and maintained. An administrator’s role is critical to securing the network against adversarial techniques and requires dedicated people to secure the devices, applications, and information on the network.

This report presents best practices for overall network security and protection of individual network devices, and will assist administrators in preventing an adversary from exploiting their network. While the guidance presented here is generic and can be applied to many types of network devices, sample commands for Cisco Internetwork Operating System (IOS) devices are provided which can be executed to implement the recommendations.

1.1 Regarding Zero Trust

Zero Trust is a security model, a set of system design principles, and a coordinated cybersecurity and system management strategy based on an acknowledgement that threats exist both inside and outside traditional network boundaries. The National Security Agency (NSA) fully supports the Zero Trust security model, and much of the guidance in this report can be applied at different boundaries as recommended in Zero Trust guidance. However, this report is focused on providing guidance to mitigate common vulnerabilities and weaknesses on existing networks. As system owners introduce new network designs intended to achieve more mature Zero Trust principles, this guidance may need to be modified.

PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.

©2022 Tom Brooks (P)2022 Tom Brooks
セキュリティ・暗号化 工学
まだレビューはありません