Contents Menu Expand Light mode Dark mode Auto light/dark mode
Essential Guide to Election Security
Light Logo Dark Logo
Essential Guide to Election Security

Introduction

  • The Essential Guide to Election Security

Maturity

  • Maturities
  • Determine Maturity
  • Prioritizing Best Practices

Best Practices

  • Index of Best Practices
  • Addressing Physical Threats
  • Asset Management
  • Backups
  • Building and Managing Staff
  • Encrypt Data at Rest
  • Endpoint Protection
  • Exercising Plans
  • Firewalls and Port Restrictions
  • Formal Cybersecurity Assessments
  • Implementing the CIS Controls
  • Incident Response Planning
  • Join the EI-ISAC
  • Malicious Domain Blocking and Reporting
  • Managing Infrastructure
  • Managing Mis-, Dis-, and Malinformation
  • Managing Remote Connections
  • Managing Removable Media
  • Managing Vendors
  • Managing Wireless Networks
  • Network Monitoring and Intrusion Detection
  • Patching and Vulnerability Management
  • Public-Facing Network Scanning
  • User Management
  • Website Security

Appendices

  • Index of Appendices
  • About the Essential Guide to Election Security
  • How to Use the Essential Guide to Election Security
  • Acronyms
  • Level 1 Worksheets
  • Mapping to the Handbook for Election Infrastructure Security

Glossary

  • Glossary
Back to top
Copyright © 2022, Center for Internet Security
Made with Sphinx and @pradyunsg's Furo