![NTIA logo wht_0](/sites/default/files/styles/large/public/2022-09/NTIA%20logo%20wht_0.png?itok=X77etyKz)
Below are links to Cloud Services, 5G, Internet for All, Climate Risks, and Grant Information that have articles, videos and PDF documents that will help you navigate your way through those issues.
NTIA Initiatives
In this practice guide, the National Cybersecurity Center of Excellence (NCCoE) applies standards, best 270 practices, and commercially available technology to demonstrate various mechanisms for trusted 271 network-layer onboarding of IoT devices. This guide shows how to provide network credentials to IoT 272 devices in a trusted manner and maintain a secure device posture throughout the device lifecycle.
This resource discusses the value of SBOM-driven transparency for SaaS and offers recommendations for advancing transparency in SaaS software
Maturing your cyber threat hunting capability requires resource planning and a fully integrated supply chain risk management program. This resource provides an overview of the Cyber Threat Hunting Maturity Model (HMM) which helps to identify the level of security controls in an organization.
This guidance outlines significant foreign adversarial supply chain attack methods utilized by the People's Republic of China (PRC), critical lessons learned, and suggests mitigations that corporate security stakeholders can tailor for their own risk management strategy.
The CSF can help an organization become a smart acquirer and supplier of technology products and services to improve your organizations' Cybersecurity Supply Chain Risk Management (C-SCRM).
In this report, you will find a concise explanation of cloud security and risk management.
This lecture provides an overview of cloud computing, including concepts and best practices for cloud architecture, design, security, and operation.
To ensure the safety of your business and your customers' information, the FTC has provided six helpful tips for businesses to follow when using cloud services.
This document divides cloud vulnerabilities into four classes (misconfiguration, poor access control, shared tenancy vulnerabilities, and supply chain vulnerabilities) that encompass the vast majority of known vulnerabilities.
This publication provides an overview of the security and privacy challenges pertinent to public cloud computing. While the document is written with Federal agencies in mind, it also highlights considerations all organizations should take when outsourcing data, applications, and infrastructure to a public cloud environment.