Authoritative Resources
Best practices resources from government, military, and industry.
Information Assurance Directorate (IAD) of the National Security Agency (NSA)
- NSA Methodology for Adversary Obstruction SHA1: 0BDE813ACCBB0031F5079884025697DA6DF201A7
- Security Highlights of Windows 10 SHA1: 5BFE9A1F8734042D5C4EE5823A26D1FD09AF1B1F
- IADS Top 10 Information Assurance Mitigation StrategiesSHA1: 979CAAA32E04493CC6D4A6FFC4C5537DC13C3007
- Information for IT Decision Makers, Staff, and Software/Hardware Developers
Federal Bureau of Investigation (FBI)
- Best Practices for Maintaining the Integrity of Digital Images and Digital Video SHA1: 0B6618463C2A78EA4076E4807151A945633281B8
- Best Practices in Supply Chain Risk Management for the U.S. Government
National Institute of Standards and Technology (NIST)
- Security and Privacy Controls for Federal Information Systems and Organizations SHA1: F081A0B78793E936866D74155E8E737453491472
- Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations SHA1: D109E8C183591D38B5B0072AEB9F8DAECA5E9626
Security Technical Implementation Guides (STIGs)
Department of Homeland Security (DHS)
- Strategic Principles for Securing the Internet of Things SHA1: 1BF81BB4F5A0EFFEC6AA3A5A9FA61D211D28AF09
- IOT Fact Sheet SHA1: F038897D2A70AE24A7EED539F70821E666C9D451
* Click here for more information on how to check SHA1 and MD5 hashes