Election Security Best Practices Guide

This guide serves as a comprehensive manual for Texas Election Authorities to identify and mitigate cyber threats and disaster risks, which other election jurisdictions can leverage. It defines four distinct election data classifications—Confidential, Sensitive, Internal Use, and Public Use—to help officials align security practices with the required protections for various information types. The resource details specific best practices across four categories: Policy and Processes, Election Processes, Network and IT Infrastructure, and Supporting Technology. Key teaching points include implementing two-person verification for all election functions and adhering to strict network segmentation and encryption standards to protect the integrity of the election process.

View Resource