The EI-ISAC’s Essential Guide to Election Security#
Introduction
Best Practices
- Index of Best Practices
- Addressing Physical Threats
- Asset Management
- Backups
- Building and Managing Staff
- Encrypt Data at Rest
- Endpoint Protection
- Exercising Plans
- Firewalls and Port Restrictions
- Formal Cybersecurity Assessments
- Implementing the CIS Controls
- Incident Response Planning
- Join the EI-ISAC
- Malicious Domain Blocking and Reporting
- Managing Infrastructure
- Managing Mis-, Dis-, and Malinformation
- Managing Remote Connections
- Managing Removable Media
- Managing Vendors
- Managing Wireless Networks
- Network Monitoring and Intrusion Detection
- Patching and Vulnerability Management
- Public-Facing Network Scanning
- User Management
- Website Security
Appendices
Glossary