accesskey _ mod _ content

New CCN-STIC guides for public administrations

04 september 2014

The Centre National Cryptologic (CCN) has published at the end of august and september new CCN-STIC Guides.

CCN-STIC 850A guide Implementation of the NHIS in Windows 7 in order to provide security templates, depending on the safety levels set out in the National security , for customers who have installed the operating system Windows 7, any version in an environment of domain.

Includes core operations of administration for the implementation of the same, as well as a series of recommendations for use. In particular, the document includes a description of the NHIS and nature of the measures and the templates, mechanisms for the implementation of configurations, step-by-step guide for each level of security, implementing firewalls with advanced security and a checklist to verify the degree of fulfilment of a server with regard to security conditions set out in the guide.

As annexes, and for the implementation of the guide, for purposes of satisfying the NHIS, have added some templates applicable to our security Windows 7 for the three levels set out in the national security: low, medium and high. This document is part of the set of standards developed by the NCC for the implementation of the NHIS (CCN-STIC-800) remain for the Public administration and having as their object the protection of the services provided to citizens and between the different administrations.

Five new CCN-STIC guides, manuals of the new version of the tool pillar of risk analysis:

  • CCN-STIC-470G1 Manual de la Herramienta de Análisis de Riesgos PILAR 5.4
  • Manual CCN-STIC-470G2 PILLAR 5.4. Impact analysis and continuity of operations
  • CCN-STIC-471D user Manual RMAT 5.4
  • CCN-STIC-472E user Manual Pillar Basic 5.4
  • CCN-STIC-473D Manual de la Herramienta de Análisis de Riesgos microPILAR 5.4

These five documents have been updated according to the new version of the tool PILLAR (5.4), developed and financed by the Centre National Cryptologic, and the model MAGERIT (analysis and risk Management information systems) .

Guides CCN-STIC 455 and 454 for iPhone and iPad. They offer safety recommendations for the configuration of mobile devices based on the operating system iOS (iPhone, iPad and iPod Touch), as a way of protecting the device itself, its communications and information and data that manage and store.

Original source of news (Opens in new window) (RSS)

  • Security