Activities relating to the design, procurement, build and configuration of a secure enterprise IT system.
In the fourth blog about the NCSC’s IT system, we look at how the networking topologies and practices differ from traditional approaches.
Why it's important to protect the interfaces used to manage your infrastructure, and some some recommendations on how you might do this.
To securely design a service, there are a number of areas you need to have a good understanding of
Designing with security in mind means using concepts and techniques which make it harder for attackers to compromise your service using commodity techniques
Creating services which naturally minimise the degree of any compromise