NSA Guides to Securing your O/S
Operating Systems
NSA has developed and makes online guides to making your O/s secure. These guides are currently being used throughout the U.S.government and by numerous entities as a security baseline for their systems.
Apple Mac
Apple Mac OS X 10.5 ‘Leopard’
The recommendations in Apple’s Mac OS X Security Configuration For Version 10.5 Leopard Second Edition track closely with the security level historically represented in NSA guidelines. It is our belief that this guide establishes the best practices for securing the product and recommends that traditional customers of our security recommendations use the Apple guide when securing Mac OS X 10.5 systems.
Title | Last Reviewed | File Size | Revised |
---|---|---|---|
Mac OS X Security Configuration for Version 10.5 Leopard Second Edition | Mar 09 | 3.5MB | |
Hardening Tips for the Default Installation of Mac OS X 10.5 “Leopard” | Mar 09 | 304KB | Sep 08 |
Apple Mac OS X 10.4 ‘Tiger’
As part of a change in our development strategy for security guidance, NSA does not intend to publish separate security guides for the Macintosh OS X operating system beyond that produced by the vendor, beginning with Tiger, OS X version 10.4.x. The recommendations in Apple’s Mac OS X Security Configuration For Version 10.4 or Later and Mac OS X Server Security Configuration For Version 10.4 or Later track closely with the security level historically represented in the NSA guidelines. It is our belief that these guides establish the latest best practices for securing the products and recommend that traditional customers of our security recommendations use the Apple guides when securing Macintosh OS X 10.4.x and Macintosh OS X Server 10.4.x.
Title | Last Reviewed | File Size | Revised |
---|---|---|---|
Mac OS X Security Configuration For Version 10.4 or Later, Second Edition | Mar 09 | 2.98MB | |
Mac OS X Server Security Configuration For Version 10.4 or Later, Second Edition | Mar 09 | 5.98MB |
Apple Mac OS X 10.3 ‘Panther’
Apple Mac OS X 10.3 “Panther” Mac OS X 10.3 is no longer supported by Apple. It does not receive security updates and is NOT RECOMMENDED for use. The following guides are intended only for historical reference.
Title | Last Reviewed | File Size | Revised |
---|---|---|---|
Apple Mac OS X v10.3.x “Panther” Security Configuration Guide | Mar 09 | 2533KB | |
Apple Mac OS X Server v10.3.x “Panther” Security Configuration Guide | Mar 09 | 876KB |
Linux
Red Hat Enterprise Linux 5
NSA has developed and distributed configuration guidance for Red Hat Enterprise Linux 5 that is currently being used throughout the government and by numerous entities as a security baseline for their Red Hat Enterprise Linux 5 systems.
Title | Last Reviewed | File Size | Revised |
---|---|---|---|
Guide to the Secure Configuration of Red Hat Enterprise Linux 5 | Mar 09 | 996KB | 19 Nov 07 |
Hardening Tips for the Red Hat Enterprise Linux 5 | Mar 09 | 239KB | Nov 07 |
Microsoft Windows
Microsoft Windows Vista
As part of a change in our development strategy for security guidance, NSA does not intend to publish a separate guide for Windows Vista beyond what was produced as a cooperative effort between the vendor and the security community. The “Specialized Security – Limited Functionality” (SSLF) security settings in Microsoft’s Windows Vista Security Guide track closely with the security level historically represented in the NSA guidelines. It is our belief that this guide establishes the latest best practices for securing the product and recommend that traditional customers of our security recommendations use the Microsoft guide when securing Windows Vista. Windows Vista FAQs
Title | Last Reviewed | File Size | Revised |
---|---|---|---|
Windows Vista Security Guide.msi | Mar 09 | 1650KB | 13 Nov 06 |
Microsoft Windows Server 2003
As part of a change in our development strategy for security guidance, NSA does not intend to publish a separate security guide for Windows Server 2003 beyond what was produced as a cooperative effort between the vendor and the security community. The Special Security – Limited Functionality (SSLF) settings in Microsoft’s Windows Server 2003 Security Guide track closely with the security level historically represented in the NSA guidelines. It is our belief that this guide establishes the latest best practices for securing the product and recommend that traditional customers of our security recommendations use the Microsoft guide when securing Windows Server 2003.
Title | Last Reviewed | File Size | Revised |
---|---|---|---|
The Windows Server 2003 – Security Guide, v2.1 | Mar 09 | 4526KB | 26 Apr 06 |
The Windows Server 2003 – Security Guide – Read Me, v2.1 | Mar 09 | 20KB | 26 Apr 06 |
The Windows Server 2003 – Security Guide – Release Notes, v2.1 | Mar 09 | 24KB | 26 Apr 06 |
NSA Windows Server 2003 Security Guide Addendum | Mar 09 | 49KB | 12 Sep 06 |
The Windows Server 2003 – Security Guide – Tools and Templates, v2.1 (exe file) | Mar 09 | 320KB | 26 Apr 06 |
Microsoft Windows XP
As part of a change in our development strategy for security guidance, NSA is no longer maintaining and updating security guides for Windows XP Professional beyond what was produced as a cooperative effort between the vendor and the security community. The “Specialized Security – Limited Functionality” (SSLF) security settings in Microsoft’s Windows XP Security Guide track closely with the security level historically represented in the NSA guidelines. It is our belief that this guide establishes the latest best practices for securing the product and recommend that traditional customers of our security recommendations use the Microsoft guide when securing Windows XP.
Title | Last Reviewed | File Size | Revised |
---|---|---|---|
NSA Windows XP Security Guide Addendum | Mar 09 | 50 KB | 12 Sep 06 |
Zipped Windows XP Security Configuration Guides** (zip file) | Mar 09 | 980 KB | 12 Sep 06 |
Microsoft Windows 2000
Windows 2000 is NOT RECOMMENDED for security-critical environments. It lacks important security features that are available in Windows XP and Vista. Microsoft currently provides security patches for Windows 2000, but the product is in its Extended Support Period, and this will end in June 2010. NSA recommends upgrading as soon as possible.
To assist our Windows 2000 user community, NSA has developed security configuration guidance for Windows 2000, with the cooperation of other government agencies and industry partners who provided their expertise and extensive technical review. The configuration guide for Microsoft Windows 2000 is being posted on the NSA web site and is presented in three parts: “.INF” files, configuration guides, and supporting documents..
NOTE: Follow these instructions to ensure that Microsoft Exchange will work with the Windows 2000 Security Configuration Guide.
A description of the files and how to modify the settings is available in the Guide to Securing Microsoft Windows 2000 Group Policy: Security Configuration Tool Set.
Sun Solaris
Sun Solaris 10
As part of a change in our development strategy for security guidance, NSA does not intend to publish its own security configuration guide for the Solaris 10 operating system. The recommendations in the documents below track closely with the security level historically represented in the NSA guidelines. It is our belief that these guides establish the latest best practices for securing the products and we recommend that traditional customers of our security recommendations use these guides when securing Solaris 10 systems.
Title | Last Reviewed | File Size | Revised |
---|---|---|---|
CIS Solaris 10 Benchmark v4.0 * | Mar 09 | 409KB | 24 Sep 07 |
An Overview of Solaris 10 Operating System Security Controls * | Mar 09 | 853KB | 25 Sep 07 |
**To download and uncompress zipped files you need to have winzip loaded on your local machine.
Sun Solaris 9
NSA has developed and distributed configuration guidance for Sun Solaris 9 that is currently being used throughout the government and by numerous entities as a security baseline for their Sun Solaris systems.
Title | Last Reviewed | File Size | Revised |
---|---|---|---|
Guide to Secure Configuration of Solaris 9 | Mar 09 | 1,200KB |