Design and configuration

Activities relating to the design, procurement, build and configuration of a secure enterprise IT system.


  • Leaking pipe

    The leaky pipe of secure coding

    Blog post18 Sep 2018AuthorHelen LTopicsSociotechnical security, Design and configuration

    Helen L discusses how security can be woven more seamlessly into the development process.

  • Protecting system administration with PAM

    Protecting system administration with PAM

    Blog post15 Aug 2018AuthorToby WTopicsOperational security, Design and configuration, Digital services

    Toby W advocates for the Privileged Access Management (PAM) model for protecting remote systems administration

  • EUD Security Guidance: Chrome OS 65

    Guidance26 Jun 2018TopicsDesign and configuration, End user technology

    Secure configuration advice for Chrome OS 65

  • Building applications

    The NCSC's guide to developing, procuring and deploying applications

    Blog post09 May 2018AuthorTom WTopicsDesign and configuration

    Now with added Windows! The latest update to the NCSC's application development guidance.

  • Secure development and deployment

    Guidance11 Dec 2017TopicsSkills and training, Design and configuration, Digital services

    8 Principles to help you improve and evaluate your development practices, and those of your suppliers

Share this page