Information Assurance Menu

About IA at NSA Partners Rowlett Awards Award Recipients Background Nomination Procedures Links IA Client and Partner Support IA News IA Events IA Mitigation Guidance Media Destruction Guidance Security Configuration Guides Applications Archived Guides Cisco Router Guides Database Servers Fact Sheets Industrial Control Systems (ICS) IPv6 Operating Systems Supporting Documents Switches VoIP and IP Telephony Vulnerability Technical Reports Wireless System Level IA Guidance TEMPEST Overview TEMPEST Products: Level I Certified Confirmed Deficiencies Suspended Terminated No Longer Produced TEMPEST Products: Level II Certified Confirmed Deficiencies Suspended Terminated No Longer Produced TEMPEST Company POCs Certified Suspended Terminated Trusted Computing IA Academic Outreach National Centers of Academic Excellence in IA Education CAE/IAE Program Criteria CAE-R Program Criteria Colloquium Institutions SEAL Program Applying FAQs IA Courseware Evaluation Program Institutions FAQs Student Opportunities IA Business and Research IA Business Affairs Office Certified Product Sales and Support Commercial COMSEC Evaluation Program Commercial Satellite Protection Program Independent Research and Development Program User Partnership Program Partnerships with Industry NIAP and COTS Product Evaluations IA Programs Commercial Solutions for Classified Program Global Information Grid High Assurance Platform HAP Technology Overview HAP Technology Partner Program HAP Resource Library Inline Media Encryptor Suite B Cryptography NSA Mobility Program IA Careers Contact Information
.
Skip Search Box

Operating Systems

NSA has developed and distributed configuration guidance for operating systems. These guides are currently being used throughout the government and by numerous entities as a security baseline for their systems.

Apple Mac   |   Linux   |   Microsoft Windows   |   Sun Solaris


Apple

Apple iOS 5 Devices

This guide provides security configuration recommendations for Apple iOS 5 devices such as iPhone, iPad, and iPod Touch.

Title Last Reviewed File Size Revised
Security Configuration Recommendations for Apple iOS 5 Devices MAY 2012 232KB MAY 2012
Associated SCAP Content MAY 2012 29KB
zipped
MAY 2012

Apple Mac OS X 10.6 'Snow Leopard'

The recommendations in Apple's Mac OS X Security Configuration for Version 10.6 'Snow Leopard' tracks closely with the security level historically represented in NSA guidelines. It is our belief that this guide establishes the best practices for securing the product and recommends that traditional customers of our security recommendations use the Apple guide when securing Mac OS X 10.6 systems

Title Last Reviewed File Size Revised
Hardening Tips for MAC OS X 10.6 Snow Leopard June 2012 544K Oct 2010
Mac OS X Security Configuration for Version 10.6 Snow Leopard June 2012 3.37MB June 2012

Return to Top


Linux

Red Hat Enterprise Linux 5

NSA has developed and distributed configuration guidance for Red Hat Enterprise Linux 5 that is currently being used throughout the government and by numerous entities as a security baseline for their Red Hat Enterprise Linux 5 systems.

Title Last Reviewed File Size Revised
Guide to the Secure Configuration of Red Hat Enterprise Linux 5 June 2012 1.12MB Aug 11
Hardening Tips for the Red Hat Enterprise Linux 5 June 2012 239KB Nov 07

Return to Top


Microsoft Windows

Microsoft Windows Applications

Software Restriction Policies (SRP) enables administrators to control which applications are allowed to run on Microsoft Windows. SRP is a feature of Windows XP and later operating systems. It can be configured as a local computer policy or as domain policy using Group Policy with Windows Server 2003 domains and later. Using this guide, administrators can configure SRP to prevent all applications in their domain from running except applications they explicitly allow. Utilizing SRP as an application whitelisting technique significantly increases the security posture of the domain by preventing some malicious programs from executing.

Title Last Reviewed File Size Revised
Application Whitelisting Using SRP.pdf June 2012 390KB Aug 10

Return to Top

Microsoft Windows 7

As part of a change in our development strategy for security guidance, NSA does not intend to publish a separate guide for Windows 7 beyond what was produced as a cooperative effort between the vendor and the security community. The Special Security – Limited Functionality (SSLF) settings in Microsoft's Windows 7 Security Guide track closely with the security level historically represented in the NSA guidelines. It is our belief that this guide establishes the latest best practices for securing the product and recommend that traditional customers of our security recommendations use the Microsoft Security Compliance Management Toolkit when securing Windows 7.

Title Last Reviewed File Size Revised
Security Highlights of Windows 7 June 2012 431KB
Security Compliance Management Toolkit Series June 2012
CIS Windows 7 Benchmark v1.0.0 June 2012

Return to Top

Microsoft Windows Vista

As part of a change in our development strategy for security guidance, NSA does not intend to publish a separate guide for Windows Vista beyond what was produced as a cooperative effort between the vendor and the security community. The "Specialized Security - Limited Functionality" (SSLF) security settings in Microsoft's Windows Vista Security Guide track closely with the security level historically represented in the NSA guidelines. It is our belief that this guide establishes the latest best practices for securing the product and recommend that traditional customers of our security recommendations use the Microsoft guide when securing Windows Vista. Windows Vista FAQs

Title Last Reviewed File Size Revised
Windows Vista Security Guide.msi June 2012 1650KB 13 Nov 06

Return to Top

Microsoft Windows Server 2008/ Windows Server 2008 R2

As part of a change in our development strategy for security guidance, NSA does not intend to publish a separate guide for Windows Server 2008 beyond what was produced as a cooperative effort between the vendor and the security community. The Special Security – Limited Functionality (SSLF) settings in Microsoft's Windows Server 2008 Security Guide for Windows Server 2008 track closely with the security level historically represented in the NSA guidelines. It is our belief that this guide establishes the latest best practices for securing the product and recommend that traditional customers of our security recommendations use Microsoft's Security Compliance Management Toolkit when securing Windows Server 2008.

Title Last Reviewed File Size Revised
Security Compliance Management Toolkit Series June 2012
CIS Windows Server 2008 Benchmark v1.0.0 June 2012

Return to Top

Microsoft Windows Server 2003

As part of a change in our development strategy for security guidance, NSA does not intend to publish a separate security guide for Windows Server 2003 beyond what was produced as a cooperative effort between the vendor and the security community. The Special Security - Limited Functionality (SSLF) settings in Microsoft's Windows Server 2003 Security Guide track closely with the security level historically represented in the NSA guidelines. It is our belief that this guide establishes the latest best practices for securing the product and recommend that traditional customers of our security recommendations use the Microsoft guide when securing Windows Server 2003.

Title Last Reviewed File Size Revised
The Windows Server 2003 - Security Guide, v2.1 June 2012 4526KB 26 Apr 06
The Windows Server 2003 - Security Guide - Read Me, v2.1 June 2012 20KB 26 Apr 06
The Windows Server 2003 - Security Guide - Release Notes, v2.1 June 2012 24KB 26 Apr 06
NSA Windows Server 2003 Security Guide Addendum June 2012 49KB 12 Sep 06
The Windows Server 2003 - Security Guide - Tools and Templates, v2.1 (exe file) June 2012 320KB 26 Apr 06

Return to Top

Microsoft Windows XP

The XP Windows operating system is no longer recommended by the SNAC. Please see the Microsoft website for more information with regard to upgrading your operating system. As part of a change in our development strategy for security guidance, NSA is no longer maintaining and updating security guides for Windows XP Professional beyond what was produced as a cooperative effort between the vendor and the security community. The "Specialized Security - Limited Functionality" (SSLF) security settings in Microsoft's Windows XP Security Guide track closely with the security level historically represented in the NSA guidelines. It is our belief that this guide establishes the latest best practices for securing the product and recommend that traditional customers of our security recommendations use the Microsoft guide when securing Windows XP.

Title Last Reviewed File Size Revised
NSA Windows XP Security Guide Addendum
June 2012 50 KB 12 Sep 06
Zipped Windows XP Security Configuration Guides** (zip file) June 2012 980 KB 12 Sep 06

Return to Top


Sun Solaris

Sun Solaris 10

As part of a change in our development strategy for security guidance, NSA does not intend to publish its own security configuration guide for the Solaris 10 operating system. The recommendations in the documents below track closely with the security level historically represented in the NSA guidelines. It is our belief that these guides establish the latest best practices for securing the products and we recommend that traditional customers of our security recommendations use these guides when securing Solaris 10 systems.

Title Last Reviewed File Size Revised
CIS Solaris 10 Benchmark v4.0 * June 2012 409KB 24 Sep 07
An Overview of Solaris 10 Operating System Security Controls * June 2012 853KB 25 Sep 07

Return to Top


**To download and uncompress zipped files you need to have winzip loaded on your local machine.

Sun Solaris 9

NSA has developed and distributed configuration guidance for Sun Solaris 9 that is currently being used throughout the government and by numerous entities as a security baseline for their Sun Solaris systems.

 
Title Last Reviewed File Size Revised
Guide to Secure Configuration of Solaris 9 June 2012 1,200KB

Return to Top

 

Date Posted: Jan 15, 2009 | Last Modified: June 22, 2012 | Last Reviewed: June 22, 2012

 
bottom

National Security Agency / Central Security Service