{"id":21195,"date":"2022-03-04T20:32:56","date_gmt":"2022-03-04T20:32:56","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=21195"},"modified":"2023-04-17T18:30:50","modified_gmt":"2023-04-17T18:30:50","slug":"network-security-guidance","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/network-security-guidance\/","title":{"rendered":"U.S. Security Agencies Release Network Security, Vulnerability Guidance"},"content":{"rendered":"<p>The U.S. National Security Agency (NSA) released comprehensive <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-network-security-tools\/\">network security<\/a> guidance on March 3, on the same day that the Cybersecurity and Infrastructure Security Agency (CISA) released its longest-ever list of exploited vulnerabilities.<\/p>\n<p>With organizations around the world on <a href=\"https:\/\/www.esecurityplanet.com\/networks\/critical-infrastructure-security-steps-russia\/\">heightened alert<\/a> in the wake of Russia&#8217;s unprovoked war against Ukraine, government agencies have stepped up efforts too. The U.S. Senate has also been active, passing the &#8220;<a href=\"https:\/\/www.hsgac.senate.gov\/imo\/media\/doc\/BillText_PetersStrengtheningAmericanCybersecurityAct.pdf\" target=\"_blank\" rel=\"noopener\">Strengthening America Cybersecurity Act<\/a>,&#8221; which requires critical infrastructure owners to report cyber attacks within 72 hours and <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">ransomware<\/a> payments within 24. The legislation must still be approved by the House.<\/p>\n<p>The 95 vulnerabilities added to CISA&#8217;s <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" target=\"_blank\" rel=\"noopener\">Known Exploited Vulnerabilities Catalog<\/a> (sort by date) are by far the most yet, growing the list to 478.<\/p>\n<p>Among the latest additions are:<\/p>\n<ul>\n<li>Cisco Small Business RV routers and IOS software (38 new Cisco vulnerabilities in all)<\/li>\n<li>Privilege and other vulnerabilities in Microsoft Windows, Exchange Server, Excel, Office, PowerPoint, Malware Protection Engine, Internet Explorer and more (27 in all)<\/li>\n<li>The <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-5195\" target=\"_blank\" rel=\"noopener\">Linux Kernel<\/a> and Apache Tomcat<\/li>\n<li>Oracle Java SE and VirtualBox<\/li>\n<\/ul>\n<p>CISA urges organizations to prioritize fixes identified in the Catalog, a priority also included in the recent <a href=\"https:\/\/www.cisa.gov\/shields-up\" target=\"_blank\" rel=\"noopener\">Shields Up<\/a> guidance outlining steps to take to prepare for any Russian cyberattacks that might occur as a fallout from the war.<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/products\/internet-security-software\/\">Top Vulnerability Management Tools<\/a><\/p>\n<h2>Segmentation Figures Prominently in NSA Guidance<\/h2>\n<p>SANS Institute officials have been active lately with <a href=\"https:\/\/www.esecurityplanet.com\/networks\/critical-infrastructure-security-steps-russia\/\">network security advice<\/a> in response to the war in Ukraine, and some of that advice has sparked considerable interest among cybersecurity pros.<\/p>\n<p>The NSA&#8217;s 58-page <a href=\"https:\/\/media.defense.gov\/2022\/Mar\/01\/2002947139\/-1\/-1\/0\/CTR_NSA_NETWORK_INFRASTRUCTURE_SECURITY_GUIDANCE_20220301.PDF\" target=\"_blank\" rel=\"noopener\">Network Infrastructure Security Guidance<\/a> (PDF) is more of a catalog of network security best practices, based on principles of <a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\">zero trust<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-software\/\">segmentation<\/a>, following up on brief <a href=\"https:\/\/www.cisa.gov\/sites\/default\/files\/publications\/layering-network-security-segmentation_infographic_508_0.pdf\" target=\"_blank\" rel=\"noopener\">January guidance<\/a> (PDF) on segmentation that discussed the Purdue Enterprise Reference Architecture (image below).<\/p>\n<figure id=\"attachment_21201\" aria-describedby=\"caption-attachment-21201\" style=\"width: 500px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-21201\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/03\/purdue-network-architecture-1-657x1024.jpg\" alt=\"Purdue network architecture\" width=\"500\" height=\"779\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/purdue-network-architecture-1-657x1024.jpg 657w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/purdue-network-architecture-1-192x300.jpg 192w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/purdue-network-architecture-1-768x1197.jpg 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/purdue-network-architecture-1-986x1536.jpg 986w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/purdue-network-architecture-1-150x234.jpg 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/purdue-network-architecture-1-300x468.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/purdue-network-architecture-1-696x1085.jpg 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/purdue-network-architecture-1-1068x1664.jpg 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/purdue-network-architecture-1.jpg 1094w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><figcaption id=\"caption-attachment-21201\" class=\"wp-caption-text\">Purdue network architecture<\/figcaption><\/figure>\n<p>The new guidance is significantly more comprehensive and in-depth, addressing network architecture, maintenance, authentication, routing, ports, remote logging, monitoring and administration. Here&#8217;s some of the advice detailed in the document.<\/p>\n<h3>Network Architecture and Design<\/h3>\n<p>The network architecture outlined in the document is based on zero trust principles, but the NSA noted that it&#8217;s intended not so much for building new networks as it is for mitigating &#8220;common vulnerabilities and weaknesses on existing networks. As system owners introduce new network designs intended to achieve more mature Zero Trust principles, this guidance may need to be modified.&#8221; Architecture recommendations include:<\/p>\n<ul>\n<li>Install a border router to facilitate a connection to the external network, such as an Internet service provider (ISP)<\/li>\n<li>Implement multiple layers of <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-ngfw\/\">next-generation firewalls<\/a> throughout the network to restrict inbound traffic, restrict outbound traffic, and examine all internal activity between disparate network regions<\/li>\n<li>Each layer should utilize different vendors to protect against an adversary exploiting the same <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\">unpatched vulnerability<\/a> in an attempt to access the internal network<\/li>\n<li>Place publicly accessible systems and outbound proxies in between the firewall layers in one or more demilitarized zone (<a href=\"https:\/\/www.esecurityplanet.com\/networks\/dmz-network\/\">DMZ<\/a>) subnets, where access can be appropriately controlled between external devices, DMZ devices, and internal systems<\/li>\n<li>Implement a <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-network-monitoring-tools\/\">network monitoring solution<\/a> to log and track inbound and outbound traffic, such as a <a href=\"https:\/\/www.esecurityplanet.com\/products\/intrusion-detection-and-prevention-systems\/\">network intrusion detection system (NIDS)<\/a>, a traffic inspector, or a full-packet capture device<\/li>\n<li>Deploy multiple dedicated remote log servers to enable <a href=\"https:\/\/www.esecurityplanet.com\/products\/siem-tools\/\">activity correlation<\/a> among devices and detection of lateral movement<\/li>\n<li>Implement redundant devices in core areas to ensure availability, which can be load-balanced to increase network throughput and decrease latency<\/li>\n<li>Group similar network systems<\/li>\n<li>Remove backdoor connections<\/li>\n<li>Implement strict <a href=\"https:\/\/www.esecurityplanet.com\/products\/network-access-control-solutions\/\">perimeter access control and NAC<\/a><\/li>\n<li>Limit and encrypt <a href=\"https:\/\/www.esecurityplanet.com\/products\/enterprise-vpn-solutions\/\">VPNs<\/a><\/li>\n<\/ul>\n<figure id=\"attachment_21197\" aria-describedby=\"caption-attachment-21197\" style=\"width: 696px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-21197\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/03\/network-perimeter-defense-1024x505.jpg\" alt=\"network perimeter defense\" width=\"696\" height=\"343\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/network-perimeter-defense-1024x505.jpg 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/network-perimeter-defense-300x148.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/network-perimeter-defense-768x379.jpg 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/network-perimeter-defense-1536x757.jpg 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/network-perimeter-defense-150x74.jpg 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/network-perimeter-defense-696x343.jpg 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/network-perimeter-defense-1068x526.jpg 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/network-perimeter-defense.jpg 1552w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><figcaption id=\"caption-attachment-21197\" class=\"wp-caption-text\">NSA: Network perimeter defense<\/figcaption><\/figure>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-software\/\">Top Microsegmentation Tools<\/a><\/p>\n<h3>Network Operation and Management<\/h3>\n<p>Network operations and management make up the bulk of the report. Recommendations include:<\/p>\n<ul>\n<li>Verify the integrity of operating system files<\/li>\n<li>Implement patching and <a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\">vulnerability management<\/a><\/li>\n<li>Use proper file system and boot management<\/li>\n<li>Use centralized authentication, authorization, and accounting (AAA) servers to manage administrative access to devices<\/li>\n<li>Apply least privilege principles<\/li>\n<li>Limit authentication attempts<\/li>\n<li>Change default passwords and remove unnecessary accounts<\/li>\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-password-managers\/\">Store passwords<\/a> with secure algorithms<\/li>\n<li>Implement remote logging and monitoring<\/li>\n<li>For remote admin and network services, disable clear text administration services, use adequate encryption and secure protocols (TLS 1.2 or higher), use timeouts and TCP keep-alive, and disable outbound connections, unnecessary services and discovery protocols<\/li>\n<li>Disable IP source routing and enable unicast reverse-path forwarding (uRPF) and routing authentication<\/li>\n<li>Disable dynamic trunking and default VLAN, unused ports, port monitoring and proxy address resolution protocol (ARP), and enable port security<\/li>\n<\/ul>\n<p>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-network-monitoring-tools\/\">Best Network Monitoring Tools<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6f044806a4-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6f044806a4\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6f044806a4\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6f044806a4\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6f044806a4\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6f044806a4\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6f044806a4\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The U.S. National Security Agency (NSA) released comprehensive network security guidance on March 3, on the same day that the Cybersecurity and Infrastructure Security Agency (CISA) released its longest-ever list of exploited vulnerabilities. With organizations around the world on heightened alert in the wake of Russia&#8217;s unprovoked war against Ukraine, government agencies have stepped up [&hellip;]<\/p>\n","protected":false},"author":163,"featured_media":21197,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14,15],"tags":[23707,3414],"b2b_audience":[33,35],"b2b_industry":[],"b2b_product":[395],"class_list":["post-21195","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networks","category-threats","tag-critical-infrastructure-cybersecurity","tag-network-security","b2b_audience-awareness-and-consideration","b2b_audience-implementation-and-support","b2b_product-firewalls-and-intrusion-prevention-and-detection"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>U.S. Security Agencies Release Network Security, Vulnerability Guidance | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"The U.S. government has responded to fears of Russian cyberattacks with in-depth network security guidance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/network-security-guidance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"U.S. Security Agencies Release Network Security, Vulnerability Guidance | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"The U.S. government has responded to fears of Russian cyberattacks with in-depth network security guidance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/network-security-guidance\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-04T20:32:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-17T18:30:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/network-perimeter-defense.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1552\" \/>\n\t<meta property=\"og:image:height\" content=\"765\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Paul Shread\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Paul Shread\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/network-security-guidance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/network-security-guidance\/\"},\"author\":{\"name\":\"Paul Shread\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04\"},\"headline\":\"U.S. Security Agencies Release Network Security, Vulnerability Guidance\",\"datePublished\":\"2022-03-04T20:32:56+00:00\",\"dateModified\":\"2023-04-17T18:30:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/network-security-guidance\/\"},\"wordCount\":763,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/network-security-guidance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/network-perimeter-defense.jpg\",\"keywords\":[\"Critical Infrastructure Cybersecurity\",\"network security\"],\"articleSection\":[\"Networks\",\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/network-security-guidance\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/network-security-guidance\/\",\"name\":\"U.S. Security Agencies Release Network Security, Vulnerability Guidance | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/network-security-guidance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/network-security-guidance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/network-perimeter-defense.jpg\",\"datePublished\":\"2022-03-04T20:32:56+00:00\",\"dateModified\":\"2023-04-17T18:30:50+00:00\",\"description\":\"The U.S. government has responded to fears of Russian cyberattacks with in-depth network security guidance.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/network-security-guidance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/network-security-guidance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/network-security-guidance\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/network-perimeter-defense.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/network-perimeter-defense.jpg\",\"width\":1552,\"height\":765,\"caption\":\"NSA: Network perimeter defense\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/network-security-guidance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"U.S. Security Agencies Release Network Security, Vulnerability Guidance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04\",\"name\":\"Paul Shread\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg\",\"caption\":\"Paul Shread\"},\"description\":\"Former eSecurityPlanet Editor Paul Shread has covered nearly every aspect of enterprise technology in his 20+ years in IT journalism, including award-winning articles on endpoint security and virtual data centers. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds market analyst and cybersecurity certifications. In a previous life he worked for daily newspapers, including the Baltimore Sun, and spent 7 years covering the federal government. Al Haig once compared him to Bob Woodward (true story - just ask Google).\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/paul-shread-2\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"U.S. Security Agencies Release Network Security, Vulnerability Guidance | eSecurity Planet","description":"The U.S. government has responded to fears of Russian cyberattacks with in-depth network security guidance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/network-security-guidance\/","og_locale":"en_US","og_type":"article","og_title":"U.S. Security Agencies Release Network Security, Vulnerability Guidance | eSecurity Planet","og_description":"The U.S. government has responded to fears of Russian cyberattacks with in-depth network security guidance.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/network-security-guidance\/","og_site_name":"eSecurity Planet","article_published_time":"2022-03-04T20:32:56+00:00","article_modified_time":"2023-04-17T18:30:50+00:00","og_image":[{"width":1552,"height":765,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/network-perimeter-defense.jpg","type":"image\/jpeg"}],"author":"Paul Shread","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Paul Shread","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/network-security-guidance\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/network-security-guidance\/"},"author":{"name":"Paul Shread","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04"},"headline":"U.S. Security Agencies Release Network Security, Vulnerability Guidance","datePublished":"2022-03-04T20:32:56+00:00","dateModified":"2023-04-17T18:30:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/network-security-guidance\/"},"wordCount":763,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/network-security-guidance\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/network-perimeter-defense.jpg","keywords":["Critical Infrastructure Cybersecurity","network security"],"articleSection":["Networks","Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/network-security-guidance\/","url":"https:\/\/www.esecurityplanet.com\/networks\/network-security-guidance\/","name":"U.S. Security Agencies Release Network Security, Vulnerability Guidance | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/network-security-guidance\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/network-security-guidance\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/network-perimeter-defense.jpg","datePublished":"2022-03-04T20:32:56+00:00","dateModified":"2023-04-17T18:30:50+00:00","description":"The U.S. government has responded to fears of Russian cyberattacks with in-depth network security guidance.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/network-security-guidance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/network-security-guidance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/networks\/network-security-guidance\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/network-perimeter-defense.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/network-perimeter-defense.jpg","width":1552,"height":765,"caption":"NSA: Network perimeter defense"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/network-security-guidance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"U.S. Security Agencies Release Network Security, Vulnerability Guidance"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04","name":"Paul Shread","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg","caption":"Paul Shread"},"description":"Former eSecurityPlanet Editor Paul Shread has covered nearly every aspect of enterprise technology in his 20+ years in IT journalism, including award-winning articles on endpoint security and virtual data centers. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds market analyst and cybersecurity certifications. In a previous life he worked for daily newspapers, including the Baltimore Sun, and spent 7 years covering the federal government. Al Haig once compared him to Bob Woodward (true story - just ask Google).","url":"https:\/\/www.esecurityplanet.com\/author\/paul-shread-2\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/21195"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/163"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=21195"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/21195\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/21197"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=21195"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=21195"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=21195"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=21195"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=21195"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=21195"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}