Cybersecurity Resources and References Guide by U.S. Department of Defense

The purpose of this document is to provide a useful reference of both U.S. and International resources, in
order to develop cybersecurity programs and to build and maintain strong network protection. Extensive
reference materials exist that support efforts to build and operate trusted networks and ensure information systems maintain an appropriate level of confidentiality, integrity, authentication, non-repudiation, and availability among international and U.S. stakeholders. The resources compiled here support security cooperation and shared best practices to help achieve collective cybersecurity goals. This guide provides readily available and unclassified information pertaining to cybersecurity norms, best practices, security cooperation, policies and standards authored and adopted by the United States Government (USG), the U.S.
Department of Defense (DoD), and recognized international institutes and workforce development training resources provided by government, industry, and academia.

In order to maintain strong network defenses and to ensure information remains a shared strategic asset,
the DoD CIO promotes cybersecurity collaboration with international partners by sharing information. This includes standards and best practices for building and defending networks, incident recovery, and
developing strong cyber workforces. Regardless of architecture, security control automation, workforce
development, or other initiatives put in place in an organization, good network security cannot be achieved without good network operations. Developing effective monitoring and analysis capabilities, incident response procedures, efficient communication management and control, and timely reporting are the fundamental characteristics of healthy network operations on which strong network security can be built.
The resources compiled here reflect the DoD CIO’s commitment to support security cooperation, share
best practices, and assist partners in the development of cybersecurity programs and the creation and
maintenance of strong network protection.

Leave a Reply

Your email address will not be published.