Checklist to ensure good standards of cyber security
Last updated
"It should not require an expert to make the system secure, it should require an expert to make it insecure."
From high value add-high priority to high value add-lesser priority, a GOOD project should check all these boxes!
Checklist:
What can you do to make your open source solution more secure?
If you want to learn more about open source risk and how to mitigate it, here are some steps you can take:
Read the annual "" (OSSRA) report to understand the current state of open source vulnerabilities and risks.
Research and consulting firms that can provide guidance and tools for identifying and addressing open source risks in your own organisation.
Look for articles, blogs, and webinars online that offer .
, to get personalised advice and guidance tailored to your organisation's specific needs.
Consider implementing , to help you detect and resolve vulnerabilities, and to stay compliant with open source licenses.
By taking these steps, you can learn more about open source risk and take the necessary steps to mitigate it, ensuring the security and compliance of your organisation's software.
📌 Remember! Best practices for installation for cyber security practises should be a requirement instead of just bare minimum technical documentation to get the software running.
🔴 Even secure software can be made insecure with bad installation.