Document Tag: security
G595 – Public Online File Storage Service
ITA Guideline G595 provides best practices for using public online file storage services, ensuring data security and efficient file management.
Read Full ArticleG590B – Public-Facing SQL Server Setup
ITA Guideline G590B provides a security baseline for state server administrators to use in hardening their SQL servers to comply with state requirements.
Read Full ArticleG570 – Patching and Vulnerability Management
ITA Guideline G570 outlines procedures for patching and vulnerability management, ensuring state agency systems are secure and up-to-date against threats.
Read Full ArticleG550 – Cleansing Data from Surplus Computer Equipment
ITA Guideline G550 outlines procedures for cleansing data from surplus computer equipment, ensuring secure and compliant disposal of state-owned devices.
Read Full ArticleG540 – Mobile Devices
ITA Guideline G540 provides a framework for managing and administering policies for mobile and handheld devices to ensure security and efficient use.
Read Full ArticleG536 – Firewall – Ports, Protocols, and Services Request
ITA Guideline G536 outlines the process for requesting firewall ports, protocols, and services, ensuring secure network configurations for state agencies.
Read Full ArticleG535 – Firewall Configuration
ITA Guideline G535 mandates firewall mechanisms in the DMZ to control access, ensuring secure routing, authentication, and traffic control for state networks.
Read Full ArticleG530 – Wireless Local Area Network (LAN) Security
ITA Guideline G530 outlines measures for security of wireless LANs for state agency networks.
Read Full ArticleG515 – Critical Security Controls 1-6 Written Policy Template
ITA Guideline G515 establishes a baseline of template language for use by agencies for written
policy development in support of CSCs 1-6.