Skip to main content
U.S. flag

An official website of the United States government

Here’s how you know

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

HTTPS

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Free Cyber ServicesSecure by design Secure Our WorldShields UpReport A Cyber Issue

Cybersecurity & Infrastructure Security Agency logo America’s Cyber Security Defense Agency National Coordinator For Critical Infrastructure Security and ResilienceCybersecurity & Infrastructure Security Agency logo America’s Cyber Security Defense Agency National Coordinator For Critical Infrastructure Security and Resilience
CISA Logo

Search

 

America's Cyber Defense Agency
 
  • Topics
    Cybersecurity Best Practices
    Cyber Threats and Advisories
    Critical Infrastructure Security and Resilience
    Election Security
    Emergency Communications
    Industrial Control Systems
    Information and Communications Technology Supply Chain Security
    Partnerships and Collaboration
    Physical Security
    Risk Management
    How can we help?
    GovernmentEducational InstitutionsIndustryState, Local, Tribal, and TerritorialIndividuals and FamiliesSmall and Medium BusinessesFind Help LocallyFaith-Based CommunityExecutivesHigh-Risk Communities
  • Spotlight
  • Resources & Tools
    All Resources & Tools
    Services
    Programs
    Resources
    Training
    Groups
  • News & Events
    News
    Events
    Cybersecurity Alerts & Advisories
    Directives
    Request a CISA Speaker
    Congressional Testimony
    CISA Conferences
    CISA Live!
  • Careers
    Benefits & Perks
    HireVue Applicant Reasonable Accommodations Process
    Hiring
    Resume & Application Tips
    Students & Recent Graduates
    Veteran and Military Spouses
  • About
    Divisions & Offices
    Regions
    Leadership
    Doing Business with CISA
    Site Links
    CISA GitHub
    CISA Central
    Contact Us
    Subscribe
    Transparency and Accountability
    Policies & Plans

Free Cyber ServicesSecure by design Secure Our WorldShields UpReport A Cyber Issue

Breadcrumb
  1. Home
  2. Topics
  3. Cyber Threats and Advisories
  4. Securing Networks
Share:
Digital illustration of cityscape with connecting links surrounding a globe

Securing Networks

CISA works with government and private sector entities to secure networks through an enterprise approach, enhancing the strength of all networks by sharing information.

Cyber Threats and Advisories

  • Malware, Phishing, and Ransomware
  • Shields Ready
  • Shields Up
  • Incident Detection, Response, and Prevention
  • Information Sharing
  • Securing Networks
  • Nation-State Cyber Actors

Overview

Securing networks is a preventative measure in the fight against cybercrime and attacks. The federal enterprise depends on information technology (IT) systems and computer networks for essential operations. Keeping networks safe protects the vital information and operational processes that live and depend on these systems. Networks face large and diverse cyber threats that range from unsophisticated hackers to technically competent intruders using state-of-the-art intrusion techniques. Many malicious attacks are designed to steal information and disrupt, deny access to, degrade, or destroy critical information systems. Securing a network involves continuous monitoring, assessments, and mitigation across various interrelated components, including servers, the cloud, Internet of Things (IoT), internet connections and the many physical assets used to access networks.

CISA’s Role

CISA works with each federal civilian department and agency to promote the adoption of common policies and best practices that are risk-based and able to effectively respond to the pace of ever-changing threats. When networks are protected, alerts can be issued at machine speed to help protect related or similar networks across the government information technology enterprise and the private sector. CISA provides the coordinating efforts and broad reach needed to create an enterprise approach to securing networks. This enterprise approach transforms the way federal agencies and private sectors manage cyber networks through strategically sourced tools and services that enhance the speed and cost effectiveness of federal cybersecurity procurements and allow consistent application of best practices.

Featured Content

Continuous Diagnostics and Mitigation (CDM) Program

Improve your security posture with CDM program cybersecurity tools, integration services, and dashboards designed to dynamically fortify the cybersecurity of government networks and systems.

Trusted Internet Connections

Including new CISA guidance, tips, and use cases, TIC 3.0 reflects modern processes and technological innovations while recognizing the challenges and IT constraints of the federal government and its agencies.

Software Bill of Materials (SBOM)

SBOMs are key building blocks in software security and supply chain risk management. Learn how CISA is working to advance the software and security communities' understanding of SBOM creation, use, and implementation. 

Secure Cloud Business Applications (SCuBA) Project

The SCuBA project provides guidance and capabilities to secure agencies’ cloud business application environments and protect federal information that is created, accessed, shared and stored in those environments.

CISA in Action

Discover the latest security tips and how CISA is keeping networks secure.

View All Cyber Threats/Advisories News

CISA Update on Treasury Breach

JAN 06, 2025 | PRESS RELEASE

Executive Order on Improving the Nation's Cybersecurity

Key points of and CISA's role in the Executive Order on strengthening the cybersecyrity of federal networks and critical infrastructure.
View All Cyber Threats/Advisories News

Training

CISA offers a variety of trainings to help you and your organization secure your networks.

View All Cyber Threats/Advisories Training

High Value Assets Assessment 3.0 (HVA 3.0) Training

CUSTOMIZABLE | VIRTUAL/ONLINE
The High Value Assets (HVA) course is designed to empower students to evaluate the federal government’s approach to managing risk and to provide an unbiased, third-party review of the government’s most critical HVA’s cybersecurity posture and operations.
View All Cyber Threats/Advisories Training

Services

CISA services offer tailored expertise and guidance based on your organization's needs and requirements.

View All Securing Network Services

Account Management

INCREASE YOUR RESILIENCE
Contact: esslob@hhs.gov
Ensure that a concept of separation of duties is implemented and logical access controls and account lockout/disabling controls are in place.
Foundational

Disaster Recovery Consultation, Documentation, & Testing

INCREASE YOUR RESILIENCE
Contact: iss_services@esc.gov
Obtain a customized contingency plan tailored for the unique needs and a structure of specific systems built in accordance with NIST 800-37 and 800-53.
Foundational

Creation/Maintenance of Security Documentation and/or Procedures

OTHER
Contact: esc-cyberservices@faa.gov
Create, update, and consult on information protection processes and procedures to develop the required documentation for a new or continuously monitored system needed for a security control assessment.
Foundational
View All Securing Network Services

Resources, Tools, and Publications

CISA offers guides, tools, and other resources to support network security.

View All Securing Networks Resources

Secure by Design Alert: Eliminating Buffer Overflow Vulnerabilities

FEB 12, 2025 | FACT SHEET, PUBLICATION
This Secure by Design Alert is part of an ongoing series aimed at advancing industry-wide best practices to eliminate entire classes of vulnerabilities during the design and development phases of the product lifecycle.
Download File (PDF, 521.92 KB)

Guidance and Strategies to Protect Network Edge Devices

FEB 04, 2025 | EXTERNAL, PUBLICATION
View Files
View All Securing Networks Resources

Contact Us

Need CISA's help but don't know where to start?

Organizations can also report anomalous cyber activity and/or cyber incidents 24/7 to SayCISA@cisa.dhs.gov or 1-844-Say-CISA.

Return to top
  • Topics
  • Spotlight
  • Resources & Tools
  • News & Events
  • Careers
  • About
Cybersecurity & Infrastructure Security Agency
  • Facebook
  • X
  • LinkedIn
  • YouTube
  • Instagram
  • RSS
CISA Central 1-844-Say-CISA SayCISA@cisa.dhs.gov
DHS Seal
CISA.gov
An official website of the U.S. Department of Homeland Security
  • About CISA
  • Budget and Performance
  • DHS.gov
  • FOIA Requests
  • No FEAR Act
  • Office of Inspector General
  • Privacy Policy
  • Subscribe
  • The White House
  • USA.gov
  • Website Feedback