Network Security

Part of the Cyber Maturity series of articles, this section focuses on the Network Security.

Quoting the 10 Steps to Cyber Security Guidance Sheets:

Connecting to untrusted networks (such as the Internet) exposes corporate networks to attacks that seek to compromise the confidentiality, integrity and availability of Information and Communications Technologies (ICT) and the information they store and process. This can be prevented by developing policies and risk management approaches to protect corporate networks by applying security controls that are commensurate with the risks that have been identified and the organisation’s risk appetite.

The specific recommendations are:

  • Police the network perimeter
  • Install firewalls
  • Prevent malicious content (see also Step 6 – Malware Prevention)
  • Protect the internal network
  • Segregate network assets
  • Secure wireless devices
  • Protect internal Internet Protocol (IP) addresses
  • Enable secure administration
  • Configure the exception handling processes
  • Monitor the network (see also Step 8 – Monitoring)
  • Assurance processes

What are your experiences in this area? How are you managing these controls?
Please share with the community in the comments area below.


Where is good practice referenced? Please let the community know in the comments area below.

The pages referenced in this series of blog articles are derived from the  10 Steps to Cyber Security Guidance Sheets published by BIS and GCHQ in this press release.
The documents are Crown Copyright and used here with permission under the government open license.

Please join the discussion, we welcome your views...

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: