This page lists publications on the hardening of network infrastructure.
Defending Against the Malicious Use of the Tor Network
The Tor network is a system that conceals a user’s IP address. It allows anonymous – and often malicious – communication. This guidance shares advice on how to detect and prevent traffic from the Tor network.
Domain Name System Security for Domain Owners
This publication provides information on DNS security for domain owners. It also shared helpful strategies to reduce the risk of domain misuse.
Domain Name System Security for Domain Resolvers
This publication explores DNS security for recursive resolution servers. It also shares helpful strategies to reduce the risk of DNS resolver subversion or compromise.
Implementing Network Segmentation and Segregation
Learn about practical strategies to make it harder for malicious actors to access sensitive data. This guidance is for those responsible for an organisation’s network architecture and design.