Resources

Flat Iron Technologies, LLC has assembled a helpful list of websites that provide quality content in relation to the broader subject of information security.  From portals that sell industry leading products, to technical guides and other essential information, you’ll find our list of resources to be an invaluable asset for your information security endeavors. Staying in the “know” about information security is important for ensuring the safety and security of organizational assets, so trust Flat Iron Technologies, LLC for keeping you informed at all times with helpful and relevant information & resources.

The National Institute of Standards and Technology (NIST) Special Publications 800
Special Publications in the 800 series (established in 1990) are of general interest to the computer security community. This series reports on ITL's research, guidelines, and outreach efforts in computer security, and its collaborative activities with industry, government, and academic organizations.
http://csrc.nist.gov/publications/PubsSPs.html 

National Security Agency (NSA) Central Security Service Hardening Guidelines
The National Security Agency (NSA) develops and distributes configuration guidance for a wide variety of software, both open source and proprietary. According to the NSA, they “…strive to provide NSA customers and the software development community the best possible security options for the most widely used products.”
https://www.nsa.gov/ia/mitigation_guidance/security_configuration_guides/ 

Defense Intelligence Agency (DIA)
DIA provides military intelligence to warfighters, defense policymakers and force planners in the Department of Defense and the Intelligence Community, in support of U.S. military planning and operations and weapon systems acquisition. We plan, manage, and execute intelligence operations during peacetime, crisis, and war. http://www.dia.mil/

Defense Information Systems Agency (DISA)
DISA is a combat support agency of the Department of Defense (DoD). The agency is composed of nearly 6,000 civilian employees; more than 1,500 active duty military personnel from the Army, Air Force, Navy, and Marine Corps; and approximately 7,500 defense contractors.
http://www.disa.mil/ 

Federal Cloud Computing Information
The U.S. Governments’ One Stop Source for Federal Cloud Computing Information
http://cloud.cio.gov/ 

FedRAMP
The Federal Risk and Authorization Management Program - FedRAMP - is the culmination of cybersecurity and cloud computing initiatives from the likes of GSA, NIST, DHS, DOD, NSA, OMB, along with numerous private sector entities.
http://cloud.cio.gov/fedramp 

United States Department of Homeland Security (DHS) Cyber Security
Comprehensive resource portal offered by DHS that provides excellent information on the topic of cyber security.
http://www.dhs.gov/topic/cybersecurity# 

United States Special Operations Command
The Department of Defense (DoD) activated U.S. Special Operations Command (USSOCOM) April 16, 1987, at MacDill Air Force Base, Fla. DoD created the new unified command in response to congressional action in the Goldwater-Nichols Defense Reorganization Act of 1986 and the Nunn-Cohen Amendment to the National Defense Authorization Act of 1987. Congress mandated a new four-star command be activated to prepare Special Operations Forces (SOF) to carry out assigned missions and, if directed by the president or secretary of defense (SECDEF), to plan for and conduct special operations.
http://www.socom.mil/default.aspx 

Learn more about our signature product, the Global Information Security Compliance Packet (GISCP)the world's most complete security policy packet containing over 2,850 + pages of in-depth information security policies, procedures, forms, checklists, templates, provisioning and hardening documents, and much more.

Learn more today about the GISCP by viewing sample policies, forms, hardening documents, and more.

GISCP - PREMIER Edition ($1,479.00)

Click below to view table of contents

GISCP cover