Activities relating to the design, procurement, build and configuration of a secure enterprise IT system.
Incorporating the Communications Hub Function and the Gas Proxy Function
In the fourth blog about the NCSC’s IT system, we look at how the networking topologies and practices differ from traditional approaches.
Why it's important to protect the interfaces used to manage your infrastructure, and some some recommendations on how you might do this.
To securely design a service, there are a number of areas you need to have a good understanding of