Security
- Cyber Hygiene Handbook
- Security Guidelines & Rules
- Development Processes
- External Resources
Cyber Hygiene Handbook
It would be handy to collect resources and advice on training users in best practices for cyber hygiene (applies broadly to staff, trainees, community, and more). Compile this into a concise resource with clear visuals and minimal complexity.
Topics and structure could be outlined as follows:
Users:
- Identifying phishing attacks
- Credential management
Admins:
- Identifying what's on the network
- Account management
- Staying up to date
Developers:
- Authentication management
- Dependency management
- Scanning
- SSH, TLS/SSL, SSO, cryptography, hashes, salts