Guías de configuración de seguridad de la NSA

Hola

El amigo Xavi ha enlazado un montón de guías de configuración de seguridad de la NSA, y lo ha hecho mucho mejor que yo, ya que las ha publicado ordenadas por temáticas, distinguiendo documentos PDF, de ejecutables y de meros artículos en texto. También se ha molestado en datar los documentos, e indicar tamaños.

Yo he sido mucho más cutre, y he arañado todos los enlaces del artículo de Xavi con un scriptcillo, y los reproduzco aquí :)

La NSA es una agencia del Gobierno de Estados Unidos, dependiente del Departamento de Defensa, y es mundialmente conocida por los excelentes documentos técnicos sobre seguridad de la información que suele publicar, así como sus contribuciones al I+D+i en seguridad en general.

Estos documentos, siempre recomendables, son los siguientes:

Oracle Application Server Security Recommendations and DoDI 8500.2 IA Controls
Oracle Application Server on Windows 2003 Security Guide
Security Guidance for Using Mail Clients
Mail Client Security Cheat Sheet
Secure Instant Messaging
BEA WebLogic Platform Security Guide
Guide to Microsoft .NET Framework Security
Microsoft Office XP/2003 Executable Content Security Risks and Countermeasures Guide
CIS Exchange Server 2003 Benchmark, Version 1.0
Guide to Secure Configuration and Administration of Microsoft Exchange 2000
Microsoft Office 2000 Executable Content Security Risk and Countermeasures
Guide to Using DoD PKI Certificates in Outlook 2000, version 2.0
Systems Management Server 2003 Security Guide
Web Application Security Overview
How to Securely Configure Microsoft Windows Vista BitLocker
Configuring a PC to Remotely Administer a Cisco Router Using the Router Console
Configuring a Cisco Router for Remote Administration Using the Router Console
Biometrics Security Considerations
Disabling USB Storage Drives
The 60 minute Network Security Guide
Outlook E-mail Security in the Midst of Malicious Code Attacks
Defense in Depth
Guide to Sun Microsystems Java Plug-in Security
The Case for Using Layered Defenses to Stop Worms
So Your Boss Bought you a New Laptop…How do you identify and disable wireless capabilities
Enterprise Firewall Types
Desktop or Enterprise Firewall?
Enterprise Firewalls in Encrypted Environments
Zipped Supporting Documents Security Configuration Guide
Guide to Secure Configuration of Solaris 8
Guide to Secure Configuration of Solaris 9
Apple Mac OS X v10.3.x “Panther” Security Configuration Guide
Apple Mac OS X Server v10.3.x “Panther” Security Configuration Guide
Mac OS X Security Configuration For Version 10.4 or Later, Second Edition
Mac OS X Server Security Configuration For Version 10.4 or Later, Second Edition
Hardening Tips for the Red Hat Enterprise Linux 5
Guide to the Secure Configuration of Red Hat Enterprise Linux 5
NSA Windows XP Security Guide Addendum
Zipped Windows XP Security Configuration Guides
SCERegVl.INF
W2kDC.INF
W2K DOMAIN POLICY.INF
W2k Server.INF
W2k Workstation.INF
ISA.INF
Microsoft Windows 2000 Network Architecture Guide
Guide to Securing Microsoft Windows 2000 Group Policy
Guide to Securing Microsoft Windows 2000 Group Policy: Security Configuration Tool Set 1.2.2
Group Policy Reference
Guide to Securing Microsoft Windows 2000 Active Directory
Guide to Securing Microsoft Windows 2000 DNS
Guide to Securing Microsoft Windows 2000 Encrypting File System
Guide to Securing Microsoft Windows 2000 File and Disk Resources
Guide to Securing Microsoft Windows 2000 Schema
Guide to Securing Microsoft Windows NT/9x Clients in a Windows 2000 Network
Guide to Secure Configuration and Administration of Microsoft ISA Server 2000
Guide to Secure Configuration and Administration of Microsoft Windows 2000 Certificate Services
Guide to Secure Configuration and Administration of Microsoft Windows 2000 Certificate Services (Checklist Format)
Guide to Secure Configuration and Administration of Microsoft Internet Information Services 5.0
Guide to Using DoD PKI Certificates in Outlook 2000, version 2.0
Guide to Windows 2000 Kerberos Settings
Microsoft Windows 2000 Router Configuration Guide
Guide to Securing Microsoft Windows 2000 DHCP
Guide to Securing Microsoft Windows 2000 Terminal Services
Microsoft Windows 2000 IPsec Guide
Guide to Secure Configuration and Administration of Microsoft Exchange 2000
Zipped Windows 2000 Security Configuration Guides
The Windows Server 2003 – Security Guide, v2.1
The Windows Server 2003 – Security Guide – Read Me, v2.1
The Windows Server 2003 – Security Guide – Release Notes, v2.1
NSA Windows Server 2003 Security Guide Addendum
The Windows Server 2003 – Security Guide – Tools and Templates, v2.1
Windows Vista Security Guide.msi
Guide to Secure Configuration and Administration of Oracle9i Database Server
Center for Internet Security Benchmark for Oracle 9i/10g Version. 2.0
Guide to Secure Configuration and Administration of Microsoft SQL Server 2000
Zipped Database Security Configuration Guide
Router Security Configuration Guide Supplement – Security for IPv6 Routers, Version 1.0
Router Security Configuration Guide, Executive Summary
Router Security Configuration Guide, Version 1.1c
Zipped Router Security Configuration Guide
Microsoft Windows 2000 Router Configuration Guide
Guide to the Secure Configuration and Administration of Microsoft Internet Information Services 5.0 version 1.4
Guide to Securing Microsoft Internet Explorer 5.5 Using Group Policy
Guide to Securing Netscape 7.02
Zipped Web Servers and Browser Security Configuration Guide
Security Guidance for Bluetooth Wireless Keyboards and Mice
Guidelines for the Development and Evaluation of IEEE 802.11 Intrusion Detection Systems (IDS)
Recommended 802.11 Wireless Local Area Network Architecture
Cisco IOS Switch Security Configuration Guide
Security Guidance for Deploying IP Telephony Systems
Recommended IP Telephony Architecture
Data Execution Prevention (DEP)
Redacting with Confidence: How to Safely Publish Sanitized Reports Converted from Word to PDF
Center for Internet Security Benchmark for Oracle 9i/10g, v2.0
CIS Exchange Server 2003 Benchmark, v 1.0

Espero os sean de utilidad. Muchas gracias, Xavi.

Un pensamiento en “Guías de configuración de seguridad de la NSA

Comentarios cerrados.