Document Tag: guideline

G595 – Public Online File Storage Service

ITA Guideline G595 provides best practices for using public online file storage services, ensuring data security and efficient file management.

Read Full Article

G590C – Public-Facing Webserver Setup

ITA Guideline G590C provides a security baseline for state server administrators to use in setting up public-facing web servers.

Read Full Article

G591B – SQL Injection Attacks – Information and Avoidance

ITA Guideline G591B provides background information regarding SQL Injection Attacks so agencies understand related risks and techniques to avoid attacks.

Read Full Article

G590B – Public-Facing SQL Server Setup

ITA Guideline G590B provides a security baseline for state server administrators to use in hardening their SQL servers to comply with state requirements.

Read Full Article

G590A – Server Operating System Initial Security Requirements

ITA Guideline G590A outlines initial security requirements for server operating systems, ensuring robust protection and compliance for state agency servers.

Read Full Article

G570 – Patching and Vulnerability Management

ITA Guideline G570 outlines procedures for patching and vulnerability management, ensuring state agency systems are secure and up-to-date against threats.

Read Full Article

G550 – Cleansing Data from Surplus Computer Equipment

ITA Guideline G550 outlines procedures for cleansing data from surplus computer equipment, ensuring secure and compliant disposal of state-owned devices.

Read Full Article

G540 – Mobile Devices

ITA Guideline G540 provides a framework for managing and administering policies for mobile and handheld devices to ensure security and efficient use.

Read Full Article

G536 – Firewall – Ports, Protocols, and Services Request

ITA Guideline G536 outlines the process for requesting firewall ports, protocols, and services, ensuring secure network configurations for state agencies.

Read Full Article

G535 – Firewall Configuration

ITA Guideline G535 mandates firewall mechanisms in the DMZ to control access, ensuring secure routing, authentication, and traffic control for state networks.

Read Full Article
1 2 3