Find an IT Download

IT Downloads Results for Type : Policies

Showing 1-3 of 3 Results    

Considerations for Identity Management in Public Safety Networks

  |   POLICIES  |   Apr 02, 2015

This document analyzes approaches to identity management for public safety networks in an effort to assist individuals developing technical and policy requirements for public safety use.


Risk Management for Replication Devices

  |   POLICIES  |   Feb 24, 2015

This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed, stored, or transmitted on replication devices.


Vetting the Security of Mobile Applications

  |   POLICIES  |   Jan 26, 2015

The purpose of this document is to help organizations understand the process for vetting the security of mobile applications, plan for the implementation of an app vetting process, develop app security requirements, and understand the types of app vulnerabilities and the testing methods used to detect those vulnerabilities.