PYTEC technology pills

CN-PYTEC


The National Cryptologic Centre, through its ICT Security Products and Technologies department (CCN-PYTEC), prepares different supplements to accompany its newsletters. The aim of these pills is to explain, in a simple and concise way, different topics related to ICTs. This section of the portal contains all the supplements published so far. They are the following:


Icono

Secure Mobile Communications in 5G

This CCN-TEC pill aims to lay the groundwork to try to ensure that organisations can secure their 5G mobile communications.


Icono

The availability of ICT systems

Measures and mechanisms to ensure the availability of a system or service in the time period in which they are required.


Icono

Recommendations for a safe post-quantum transition

Measures so that, no matter when quantum computing becomes a reality (whether in the short/medium/long term), society as a whole is prepared to ensure the protection of information.


Icono

Security Recommendations for MACsec

MACsec, Media Access Control (MAC) Security, is a standard defined in IEEE 802.1AE, which specifies a set of protocols that provide security measures for the protection of data at the link layer (L2 OSI) of Ethernet local area networks (LANs).


Icono

Security Requirements for TLS

TLS (Transport Layer Security Protocol) is a cryptographic security protocol to protect communications.


Icono

Multi-Factor Authentication Security Recommendations

The concept of digital identity can be understood as the unique representation of a subject, in a given digital context.


Icono

Secure Remote Access Architectures

More and more companies and organisations are opting to implement teleworking policies, which entails the need to deploy and configure remote access solutions.


Icono

Security Recommendations for IPSec VPN

Today's technology makes it possible to deploy secure mobile communications systems capable of handling classified information. By using appropriate products, configurations and architectures it is possible to handle classified information up to LIMITED DIFFUSION grade in a correct manner.


Icono

Access control technologies

A large number of organisations in the public sector are currently undergoing a process of digital transformation. There is talk of disruptive technologies that bring with them a paradigm shift in which the traditional concept of security based on perimeter protection of systems or networks is diluted, due to the fact that current technological capabilities allow users to access organisational resources anywhere, at any time and from any device. In this context, aspects related to the control of user access to systems or data of a system become particularly important.


Icono

Secure Information Exchange Gateways

Secure Information Exchange Gateways are perimeter protection devices specially designed to control the exchange of information between systems with different levels of classification to prevent unauthorised information flows.


Icono

Secure Mobile Communications

Today's technology makes it possible to deploy secure mobile communications systems capable of handling classified information. By using appropriate products, configurations and architectures it is possible to handle classified information up to LIMITED DIFFUSION grade correctly


Icono

The Catalogue of ICT Security Products (CPSTIC)

The CCN publishes the Catalogue of ICT Security Products (CPSTIC), which offers a list of ICT Security products, with proven security guarantees, to Public Sector organisations or private entities that provide services to them and that are affected by the National Security Scheme (ENS) or handle classified information.