Awareness
Guidelines
Guidelines for Secure Application Design, Development, Implementation & Operations
One of the key reason for vulnerabilities in the applications are lack of secure design, development, implementation, and operations. Relying solely on post-development audits for security is inadequate.
Guidelines on Information Security Practices for Government Entities
Security Advisory(SA)
-
CSKSA-01: DDOS amplification attack vulnerability in exposed NTP mode 6
https://www.csk.gov.in/sa/cska/cska_01
-
CSKSA-02: Sensitive Data exposure by SSL 3.0 Protocol Vulnerability and POODLE Attack
https://www.csk.gov.in/sa/cska/cska_02
-
CSKSA-03: DDOS vulnerability leading to DNS Amplification attack in open dns resolver
https://www.csk.gov.in/sa/cska/cska_03
-
CSKSA-04: DDOS vulnerability and UDP amplification attacks in open netbios service
https://www.csk.gov.in/sa/cska/cska_04
-
CSKSA-05: Information disclosure vulnerability in misconfigured/open NAT-PMP
https://www.csk.gov.in/sa/cska/cska_05
-
CSKSA-06: DoS/DDoS attacks using Open SNMP Vulnerability
https://www.csk.gov.in/sa/cska/cska_06
-
CSKSA-07: Unauthenticated access and UDP Amplification attack vulnerability in open MSSQL
https://www.csk.gov.in/sa/cska/cska_07
-
CSKSA-08: Sensitive Data exposure and DDoS attack vulnerability in misconfigured Memcached
https://www.csk.gov.in/sa/cska/cska_08
-
CSKSA-09: DDoS reflection attack vulnerability in exposed portmapper service
https://www.csk.gov.in/sa/cska/cska_09