certified



D.O.l’s security framework
No weak codes
Secure-coding practices from the planning phase of your software. Review regularly!
no unnecessary ports
Shutdown unused ports and services. If you don’t need it up, shut it down!
proactive
Prevention is better than cure and if you must cure, be ready! Build and test your incident response and contigency plans
assurance
Your systems are working but are they working as intended? Are results reliable? – Audit
accountability
IT systems should log everything so you can trace actions back to the source
No SPOF!
Avoid single points of failure! Implement job rotation, dual controls, MFA, Separation of duties, layered security, least privilege & Need-to-know
screen
One thorough vetting won’t cut it. People change, circumstances change. Implement continuous vetting!
Minimal
Keep information and permissions to the minimum necessary. Don’t collect more than you need, don’t process more than necessary. Don’t hire more than you need. Keep your attack surface minimal
Weakest link
Your security like a chain is as strong as your weakest link. Identify your weak links and fortify them.




