TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Ask HN: Can you recommend any OPSEC resources/books/guides?

12 pointsby philippnagelalmost 9 years ago

1 comment

equaluniquealmost 9 years ago
I can tell you about the resources, books, and guides that I&#x27;m familiar with - they are specific to the United States public sector. Not all of it is specific to Operational Security, but one could say that it is all related. Many federal departments and agencies must implement security programs based on guidelines and recommendations from Department of Commerce&#x27;s National Institute of Standards and Technology, who created the Special Publication 800 Series for Computer Security, also the Special Publication 1800 Series for Cybersecurity Practice Guidelines. (<a href="http:&#x2F;&#x2F;csrc.nist.gov&#x2F;publications&#x2F;PubsSPs.html" rel="nofollow">http:&#x2F;&#x2F;csrc.nist.gov&#x2F;publications&#x2F;PubsSPs.html</a>) These departments and agencies are also required to report their cyber security incidents to the United States Computer Emergency Readiness Team (US-CERT) so that security events, incidents, and responses may be coordinated across departments and agencies. (<a href="https:&#x2F;&#x2F;www.us-cert.gov&#x2F;government-users&#x2F;compliance-and-reporting" rel="nofollow">https:&#x2F;&#x2F;www.us-cert.gov&#x2F;government-users&#x2F;compliance-and-repo...</a>) Today&#x27;s federal departments and agencies are connected to trusted internet connections (TICs) that are all held up to high standards of incident reporting and security management. (<a href="https:&#x2F;&#x2F;www.dhs.gov&#x2F;trusted-internet-connections" rel="nofollow">https:&#x2F;&#x2F;www.dhs.gov&#x2F;trusted-internet-connections</a>) Same goes for the providers of their PKI infrastructure (<a href="https:&#x2F;&#x2F;www.idmanagement.gov&#x2F;IDM&#x2F;servlet&#x2F;fileField?entityId=ka0t0000000TNYYAA4&amp;field=File__Body__s" rel="nofollow">https:&#x2F;&#x2F;www.idmanagement.gov&#x2F;IDM&#x2F;servlet&#x2F;fileField?entityId=...</a> ). Other key pieces of computing and communications infrastructure are also held to standards, such as the ones published by Federal Network Resilience group, but are not made available publicly. The CAESARS Framework (<a href="http:&#x2F;&#x2F;csrc.nist.gov&#x2F;publications&#x2F;drafts&#x2F;nistir-7756&#x2F;Draft-NISTIR-7756_second-public-draft.pdf" rel="nofollow">http:&#x2F;&#x2F;csrc.nist.gov&#x2F;publications&#x2F;drafts&#x2F;nistir-7756&#x2F;Draft-N...</a>) is the best example of a highly-integrated continuous monitoring program which integrates security operations with executive-level risk management. Lots of money has been invested in creating great frameworks, but many agencies and departments struggle to implement these in practice.
评论 #11920094 未加载