🔐Cyber security

Checklist to ensure good standards of cyber security

"It should not require an expert to make the system secure, it should require an expert to make it insecure."

From high value add-high priority to high value add-lesser priority, a GOOD project should check all these boxes!

What can you do to make your open source solution more secure?

📌 Remember! Best practices for installation for cyber security practises should be a requirement instead of just bare minimum technical documentation to get the software running.

🔴 Even secure software can be made insecure with bad installation.

Last updated