Cyber security
Checklist to ensure good standards of cyber security
"It should not require an expert to make the system secure, it should require an expert to make it insecure."
From high value add-high priority to high value add-lesser priority, a GOOD project should check all these boxes!
📌 Remember! Best practices for installation for cyber security practises should be a requirement instead of just bare minimum technical documentation to get the software running.
🔴 Even secure software can be made insecure with bad installation.
Last updated