Quoting the 10 Steps to Cyber Security Guidance Sheets:
Identify, group and isolate critical business information assets and services and apply appropriate network security controls to them.
What are your experiences in this area? How are you managing this controls?
Please share with the community in the comments area below.
- Applications for Data Diodes
Where is good practice referenced? Please let the community know in the comments area below.
The pages referenced in this series of blog articles are derived from the 10 Steps to Cyber Security Guidance Sheets published by BIS and GCHQ in this press release.
The documents are Crown Copyright and used here with permission under the government open license.