Building and operating a secure online service

Online services consist of various critical components that need effective security measures to ensure the overall integrity of the service. This section discusses a comprehensive array of topics, from data management to securing individual service elements. Although no system can claim to be completely secure, the goal should be to create an online service that…

Read More

Cyber security for high profile conferences

Overview This document provides additional context to the existing NCSC Cyber Security Guidance for Major Events, which should be reviewed beforehand. It encompasses critical elements such as governance, risk management, incident response, testing, and practical exercises. We will delve into cyber risk evaluation, supplier selection, and the process of assurance. This guidance aims to address…

Read More

Cyber security for high profile conferences

Overview This document builds on the existing NCSC Cyber Security Guidance for Major Events, which should be reviewed beforehand. It focuses on key components such as governance, risk assessment, incident management, and the importance of testing. The emphasis here is on cyber risk analysis, supplier selection, and the assurance process, recognizing that high-profile conferences present…

Read More

Cyber security for high profile conferences

Overview This document elaborates on the existing NCSC Cyber Security Guidelines for Major Events. It is essential to read the associated guidelines prior to this document and addresses fundamental topics including governance, risk assessment, incident management, testing, and conducting exercises. In this guidance, we will concentrate on analyzing cyber risks, selecting suppliers, and the processes…

Read More

Dealing with the SolarWinds Orion compromise

SolarWinds Orion is a widely used IT system management platform that has faced a serious security compromise, potentially allowing attackers to exploit connected systems. An attacker managed to introduce a malicious and unauthorized modification to SolarWinds Orion products, granting them the ability to send administrator-level commands to any compromised installation. This modification: forces the Orion…

Read More

Design guidelines for high assurance products

This document outlines the recommended strategies for the design, development, and security evaluation of products and systems designed to withstand heightened threats. It presents a collection of fundamental principles that can be applied to establish high-level security targets, which can subsequently inform design choices and development workflows. It is intended for organizations vulnerable to these…

Read More

Design Pattern: Safely Exporting Data

Organizations frequently need to engage in external communication, which involves transferring data beyond their own boundaries. However, facilitating this transfer without compromising sensitive information can pose significant challenges. This guide outlines a structural pattern designed to enable secure data sharing while protecting the integrity of your essential networks and systems. Creating a Secure Export Solution…

Read More

Design Pattern: Safely Exporting Data

Many organizations must communicate with external parties, transferring data across various boundaries. However, facilitating this process safely while preventing the unauthorized disclosure of sensitive data poses significant challenges. This guide outlines an architecture pattern designed to enable data sharing while protecting the integrity of your core networks and systems. Establishing a Comprehensive Export Solution This…

Read More

GDPR security outcomes

Your organization has established effective structures, policies, and processes designed to understand, assess, and systematically manage security risks associated with personal data. You maintain thorough data protection and information security policies and procedures. If necessary, you retain records of processing activities and have appointed a Data Protection Officer. Efforts are made to identify, assess, and…

Read More

GDPR security outcomes

Your organization has established robust structures, policies, and processes to recognize, evaluate, and effectively manage security risks associated with personal data. You have detailed data protection and information security policies in place. When necessary, you maintain detailed records of processing activities and designate a Data Protection Officer. You actively identify, assess, and comprehend security risks…

Read More
Back To Top