Topic

Design and configuration

Activities relating to the design, procurement, build and configuration of a secure enterprise IT system.

Latest

  • Administrator workstation

    Protect your management interfaces

    Blog post22 Mar 2017AuthorRichard CTopicsDesign and configuration

    Why it's important to protect the interfaces used to manage your infrastructure, and some some recommendations on how you might do this.

  • Design Principles: Understanding your service

    Guidance25 Sep 2016TopicsDesign and configuration, Digital services

    To securely design a service, there are a number of areas you need to have a good understanding of

  • Design Principles: Making services hard to compromise

    Guidance25 Sep 2016TopicsDesign and configuration, Digital services

    Designing with security in mind means using concepts and techniques which make it harder for attackers to compromise your service using commodity techniques

  • Design Principles: Reducing the impact of compromise

    Guidance25 Sep 2016TopicsDesign and configuration, Digital services

    Creating services which naturally minimise the degree of any compromise

  • Design Principles: Making compromise easy to detect

    Guidance25 Sep 2016TopicsDesign and configuration, Digital services

    Even if you take all available precautions, there’s a chance your system will be compromised by a new or unknown attack. If this happens you want to be well positioned to detect the compromise

Share this page