Operational security

Advice and guidance covering the day to day management of an organisation's security activities.


  • Internet edge device security

    Guidance12 May 2017TopicsIncident management, Operational security, IT infrastructure

    What to do if you suspect your internet edge router has been compromised

  • Systems administration architectures

    Guidance25 Sep 2016TopicsOperational security, Design and configuration, Digital services

    There are a number of different architectural models that can be used to design the administration approach for IT systems. This section describes some common approaches and the risks associated with each.

  • HMG IA Maturity Model Independent Review

    Information01 Aug 2016TopicsOperational security, Risk management

    The Independent Review service involves an independent team of experienced CESG assessors conducting a detailed review of the Information Risk Management (IRM) arrangements within an organisation.

  • IA Maturity Model - Self Assessment and Supported Self Assessment

    Information01 Aug 2016TopicsOperational security, Risk management
  • What is a WARP

    Information01 Aug 2016TopicsOperational security, Risk management, Cyber attacks

    A WARP (Warning, Advice and Reporting Point) is a community-based service where members can receive and share up-to-date advice on information security threats, incidents and solutions.

Share this page