The EI-ISAC’s Essential Guide to Election Security#
- Index of Best Practices
- Addressing Physical Threats
- Join the EI-ISAC
- Asset Management
- Encrypt Data at Rest
- Encrypt Data in Transit
- Managing Infrastructure with Secure Configurations
- User Management
- Backups
- Incident Response Planning
- Building and Managing Staff
- Patching and Vulnerability Management
- Remediate Penetration Test Findings
- Perform Internal Penetration Test
- Network Segmentation Based on Sensitivity
- Managing Remote Connections
- Firewalls and Port Restrictions
- Endpoint Protection
- Malicious Domain Blocking and Reporting
- Network Monitoring and Intrusion Detection
- Managing Wireless Networks
- Public-Facing Network Scanning
- Website Security
- Managing Removable Media
- Exercising Plans
- Formal Cybersecurity Assessments
- Implementing the CIS Controls
- Managing Mis-, Dis-, and Malinformation
- Managing Vendors
- Defense-in-Depth
- Artificial Intelligence in Elections