NSA Methodology for Adversary Obstruction
The NSA Information Assurance Directorate's methodology for adversary obstruction.
Use Case Group Material
Use Case Team Assignments Here
Damage Containment
Segregating Networks and Functions SlickSheet
DEF-LOGIX Inc Vector SlickSheet
Defense of Accounts
5 Steps to Secure Cloud Access for Enterprises
Limiting Workstation to Workstation Communication
SunStone A New Approach to Cyber Security on the Web
SunStone Next-Gen Controls and Event Detection
Secure and Available Transport
Using Classified Intelligence to Defend Unclassified Networks
Device Integrity
DEF-LOGIX Inc Shimmix
Anti-Virus Files Reputation Services
Application Whitelisting
Host Intrusion Prevention Systems