Topic

Design and configuration

Activities relating to the design, procurement, build and configuration of a secure enterprise IT system.

Latest

  • Cloud computing

    NCSC IT: Networking in the cloud

    Blog post28 Mar 2017AuthorJon HTopicsDesign and configuration

    In the fourth blog about the NCSC’s IT system, we look at how the networking topologies and practices differ from traditional approaches.

  • Administrator workstation

    Protect your management interfaces

    Blog post22 Mar 2017AuthorRichard CTopicsDesign and configuration

    Why it's important to protect the interfaces used to manage your infrastructure, and some some recommendations on how you might do this.

  • Design Principles: Understanding your service

    Guidance25 Sep 2016TopicsDesign and configuration, Digital services

    To securely design a service, there are a number of areas you need to have a good understanding of

  • Design Principles: Making services hard to compromise

    Guidance25 Sep 2016TopicsDesign and configuration, Digital services

    Designing with security in mind means using concepts and techniques which make it harder for attackers to compromise your service using commodity techniques

  • Design Principles: Reducing the impact of compromise

    Guidance25 Sep 2016TopicsDesign and configuration, Digital services

    Creating services which naturally minimise the degree of any compromise

Share this page