Publications

Information security references

2015 Australian Government Information Security Manual

  • Executive Companion
  • Principles
  • Controls

Strategies to Mitigate Targeted Cyber Intrusions

  • Mitigation strategies
  • Top 4 mitigation strategies
  • Implementation guides
  • Mandatory requirement explained
  • Catch, Patch, Match educational video

Evaluated Products List and emanation security

BYOD and cloud computing

Title - click headers to sort Audience / type Published
ASD Cyber Security Bulletin, May 2015 (PDF) Bulletin 20150530
ASD Cyber Security Bulletin, June 2014 (PDF) Bulletin 20140625
ASD Cyber Security Bulletin, December 2013 (PDF) Bulletin 20131212
ASD Cyber Security Bulletin, August 2013 (PDF) Bulletin 20130828
Catch, Patch, Match educational video Everyone 20140115
CyberSense educational video Everyone 20100513
Cyber Adversaries Targeting Defence Contractors Everyone 20121220
Detecting Socially-Engineered Emails Everyone 20120812
Know and Minimise Your Vulnerabilities Before They Are Used Against You Everyone 20121220
Top Security Tips for Home Users Everyone 20140115
Bring Your Own Device (BYOD) Considerations for Executives Senior managers 20140215
Cyber Security Advice for High Profile Events Senior managers 20120820
Questions Senior Management Need to be Asking about Cyber Security Senior managers 20120820
Top 4 Mitigation Strategies Senior managers 20121015
Wireless Network Security Senior managers 20120130
Cost of Compromise Government agencies 20140618
Cyber Security Incidents: Are You Ready? Government agencies 20140320
Cyber Security Picture 2013 Government agencies 20140623
G20 Cyber Security Advice Government agencies 20131112
Implications of Using Webmail for Government Business Government agencies 20130228
Personal Computing and the Implications for Agency Networks Government agencies 20120820
Preparing for and Responding to Cyber Security Incidents Government agencies 20120913
Preparing for and Responding to Denial of Service Activities Government agencies 20141024
Security Tips for the Use of Social Media Websites Government agencies 20121112
Travelling Overseas with an Electronic Device Government agencies 20121220
BlackBerry Hardening Guide (PDF) Hardening guide 20110728
Hardening Microsoft Office 2013 Hardening guide 20150729
Hardening Microsoft Windows 7 SP1 Standard Operating Environments Hardening guide 20150729
Hardening Microsoft Windows 8 Standard Operating Environments Hardening guide 20150729
HGSDV Hardening Guide (PDF) Hardening guide 20090306
iOS Hardening Configuration Guide for iPod Touch, iPhones and iPads running iOS version 8 or higher Hardening guide 20150417
Additional Security Considerations and Controls for Virtual Private Networks (VPNs) Technical advice 20130412
An Examination of the Redaction Functionality in Adobe Acrobat Pro (PDF), 2011 Technical advice 20111112
Data Spill Management Guide Technical advice 20120820
Data Spill Sanitisation Guide Technical advice 20120820
DNS Security Technical advice 20120820
Drive-by Downloads Technical advice 20121220
Email Filtering and Mitigating Circumvention Techniques (PDF) Technical advice 20040515
End of support for Microsoft Windows Server 2003 Technical advice 20150228
End of support for Microsoft Windows XP and Office 2003 Technical advice 20140716
Malicious Email Mitigation Guide Technical advice 20120904
Minimising the Threat from Java-based Intrusions Technical advice 20140624
Mitigating Spoofed Emails – Sender Policy Framework (SPF) Explained Technical advice 20121220
Mitigating the Use of Stolen Credentials to Access Agency Information Technical advice 20120820
Multi-factor Authentication Technical advice 20140627
Network Segmentation and Segregation Technical advice 20120904
Perfect Forward Secrecy Technical advice 20150210
Protecting Web Applications and Users – Technical guidance for improving web application security through implementing web browser-based mitigations Technical advice 20120228
Securing Content Management Systems (CMS) Technical advice 20150727
Travelling Overseas with an Electronic Device – Technical Advice Technical advice 20121220
Using Remote Desktop Clients Technical advice 20111215
Wireless Network Security – Technical Advice Technical advice 20120130
Rules to Protect the Privacy of Australians, 2012 Rules 20121002

Media