Подборка лучших практик для ИБ "новых" технологий
Виртуализация
Мобильные устройства
Виртуализация
- 2011 - NIST SP 800-125 Guide to Security for Full Virtualization Technologies
- 2011 - Information Supplement: PCI DSS Virtualization Guidelines
- 2011 - Chris Brenton Virtualization Security
- 2012 - NIST SP 800-153 Guidelines for Securing Wireless Local Area Networks (WLANs)
- 2011 - Information Supplement: PCI DSS Wireless Guidelines
- 2012 - DSD CSOC Protect Notice: Wireless Network Security
- 2012 - DSD CSOC Protect Notice: Wireless Network Security – Technical Advice
Мобильные устройства
- 2012 - ENISA Consumerization of IT: Risk Mitigation Strategies
- 2012 - ENISA Consumerization of IT: Top Risks and Opportunities
- 2011 - ENISA & OWASP Smartphone Secure Development Guidelines
- 2012 - CSA Security Guidance for Critical Areas of Mobile Computing
- 2012 - CSA Mobile Device Management: Key Components
- 2012 - CSA Top Threats to Mobile Computing
- 2013 - NIST SP 800-124r1 Guidelines for Managing the Security of Mobile Devices
- 2008 - NIST SP 800-124 Guidelines on Cell Phone and PDA Security
- 2013 - CIO Council Mobile Security Decision Framework: Worksheet
- 2013 - U.S. CIO Council Mobile Security Reference Architecture
- 2013 - DSD Risk Management of Enterprise Mobility including Bring Your Own Devic
- 2012 - DSD Travelling overseas with an electronic device
- 2012 - DSD Technical advice for travelling overseas with an agency-issued electronic device
- 2010 - ISACA Securing Mobile Devices
- 2015 - ISACA Securing Mobile Devices Using CobIT 5
- 2012 - PCI PCI Mobile Payment Acceptance Security Guidelines for Merchants as End-Users
- 2011 - CSA Security Guidance for Critical Areas of Focus in Cloud Computing
- 2014 - CSA Сloud Control Matrix
- 2013 - CSA The Notorious Nine: Cloud Computing Top Threats in 2013
- 2009 - ENISA Cloud Computing Risk Assessment
- 2009 - ISACA Security Considerations for Cloud Computing
- 2011 - NIST SP 800-144 Guidelines on Security and Privacy in Public Cloud Computing
- 2013 - Information Supplement: PCI DSS Cloud Computing Guidelines
- 2012 - DSD Cloud Computing Security Considerations
- 2011 - Microsoft Reference Architecture for Private Cloud
- 2010 - J.D. Meier's Cloud Security Threats and Countermeasures at a Glance
Социальные сети
- 2012 - DSD CSOC Protect Notice: Security Tips for the Use of Social Media Websites
- 2010 - ISACA Social Media: Business Benefits and Security, Governance and Assurance Perspectives
- 2011 - SANS Institute InfoSec Reading Room Risk Assessment of Social Media
- 2013 - CIO Council Privacy Best Practices for Social Media
- 2009 - CIO Council Guidelines for Secure Use of Social Media by Federal Departments and Agencies