This blog is now archived
Posted by:
, Posted on:
-
Categories:
Enterprise IT, Identity Management, Online services, Risk management
Please note that this blog is no longer being updated.
Please note that this blog is no longer being updated.
Back in November 2014, we published an alpha set of principles on “Risk management of cyber security in technology projects”. You may have noticed that we recently issued a beta version following analysis of feedback and some further testing
The CESG Digital team is working to propose an alternative approach for making sensible security decisions that relate to OFFICIAL technology.
A few weeks ago, CESG began using the approach set out in the Service Design Manual to help develop our services.
Recent Comments