Bulk Data: 8-15 How is your system designed, implemented and operated?
8. No known vulnerable surfaces are exposed at the edges of your service....
Protecting Bulk Personal Data: Introduction
Whether they’re held by public service or private enterprise, these bulk data stores...
Bulk Data: 1-3 What are you protecting?
1. You have a well-defined catalogue of the data your service holds. You...
Digital Services: Building a secure digital service
Just designing a service to be secure is not enough. There will be security implications...
Digital Services: Operating a secure digital service
To remain secure a digital service needs to be well operated and maintained....
Digital Services: Managing cyber security risk in a digital service
Consider security as a factor in all the decisions you make whilst designing, building...
Digital Services: Designing a secure digital service
Good design should: Make services hard to compromise Designing with security in mind...
Design Principles: Designing to avoid disruption
1. Implement denial of service protections as far upstream as possible Denial of service protections...
Digital Services: Understanding your service
Before you can design a secure digital service it's important to understand a...
Design Principles: Introduction
Digital services provide us with quick, convenient access to a whole range of...
Design Principles: Making compromise easy to detect
1. Ensure that all relevant security events and logs are collected for analysis. Having the...
Design Principles: Making services hard to compromise
1. Validate or transform all external input before processing it. Simple data formats...
Protecting Bulk Personal Data
15 good practice measures for the protection of bulk data held by digital...
Design Principles: Reducing the impact of compromise
1. Build your service using a segmented approach. A system which requires multiple...
Bulk Data: 4-7 Who has access to your data?
4. All users with access to your data are individually known and referenced....
Design Principles: Understanding your service
1. Understand your service and the data you will need to operate it....
Systems administration architectures
Note Some models carry much more risk than others, and their use is...
End User Devices: Advice for End Users
This advice will need to be tailored to the particular device(s) being used,...
End User Devices: Security Principles
The EUD Security Framework describes twelve principles for securing devices, all of which must be...
Security governance, enabling sensible risk management decisions & communication
Security governance and business objectives Standard approaches to security and risk management are...
Secure sanitisation of storage media
This guidance is suitable for any organisation wishing to ensure that their data held...
Approaching enterprise technology with cyber security in mind
The majority of cyber attacks an organisation faces will be ineffective if enterprise...
End User Devices: Authentication Policy
There are three important parts to authentication that you should consider: User to...
End User Devices: Common Questions
Wi-Fi Captive portals Alternative ways of authenticating to Wi-Fi On-device sandboxing Device...
Cloud Security: Standards and Definitions
Security standards and definitions frequently referenced in our Cloud Security Guidance. Standard Guidance...
Using IPsec to protect data
This guide will help you deploy or buy network encryption, using IPsec. It provides recommendations for the...
Security operations centre (SOC) buyers guide
This guidance is for organisations that are considering procuring a Security Operations Centre (SOC) from...
Vulnerability management
All modern software contains vulnerabilities; either software defects that require patches to remedy, or...
A critical appraisal of risk methods and frameworks
This appraisal has been produced so practitioners and decision makers can better understand...
End User Devices Security Guidance: Introduction
Modern smartphones, laptops and tablets provide users with great flexibility and functionality, and...