Securing Networks
Overview
Securing networks is a preventative measure in the fight against cybercrime and attacks. The federal enterprise depends on information technology (IT) systems and computer networks for essential operations. Keeping networks safe protects the vital information and operational processes that live and depend on these systems. Networks face large and diverse cyber threats that range from unsophisticated hackers to technically competent intruders using state-of-the-art intrusion techniques. Many malicious attacks are designed to steal information and disrupt, deny access to, degrade, or destroy critical information systems. Securing a network involves continuous monitoring, assessments, and mitigation across various interrelated components, including servers, the cloud, Internet of Things (IoT), internet connections and the many physical assets used to access networks.
CISA’s Role
CISA works with each federal civilian department and agency to promote the adoption of common policies and best practices that are risk-based and able to effectively respond to the pace of ever-changing threats. When networks are protected, alerts can be issued at machine speed to help protect related or similar networks across the government information technology enterprise and the private sector. CISA provides the coordinating efforts and broad reach needed to create an enterprise approach to securing networks. This enterprise approach transforms the way federal agencies and private sectors manage cyber networks through strategically sourced tools and services that enhance the speed and cost effectiveness of federal cybersecurity procurements and allow consistent application of best practices.
Featured Content
Continuous Diagnostics and Mitigation (CDM) Program
Improve your security posture with CDM program cybersecurity tools, integration services, and dashboards designed to dynamically fortify the cybersecurity of government networks and systems.
Trusted Internet Connections
Including new CISA guidance, tips, and use cases, TIC 3.0 reflects modern processes and technological innovations while recognizing the challenges and IT constraints of the federal government and its agencies.
Software Bill of Materials (SBOM)
SBOMs are key building blocks in software security and supply chain risk management. Learn how CISA is working to advance the software and security communities' understanding of SBOM creation, use, and implementation.
Secure Cloud Business Applications (SCuBA) Project
The SCuBA project provides guidance and capabilities to secure agencies’ cloud business application environments and protect federal information that is created, accessed, shared and stored in those environments.
CISA in Action
Discover the latest security tips and how CISA is keeping networks secure.
Executive Order on Improving the Nation's Cybersecurity
Check Pulse Connect Secure Products
Privacy and Mobile Device Apps
Training
CISA offers a variety of trainings to help you and your organization secure your networks.
High Value Assets Assessment (HVA) Training
Services
CISA services offer tailored expertise and guidance based on your organization's needs and requirements.
Account Management
Disaster Recovery Consultation, Documentation, & Testing
Creation/Maintenance of Security Documentation and/or Procedures
Resources, Tools, and Publications
CISA offers guides, tools, and other resources to support network security.
Vulnerability Exploitability eXchange (VEX) Status Justification Document (June 2022)
CDM Program Shared Services Platform
Layering Network Security Through Segmentation Infographic
Continuous Diagnostics and Mitigation (CDM) Program: AWARE
Contact Us
Need CISA's help but don't know where to start?
Organizations can also report anomalous cyber activity and/or cyber incidents 24/7 to SayCISA@cisa.dhs.gov or 1-844-Say-CISA.