SecureByDesign-Playbook

The Space in Cyberspace

[To be … well, started really]

What is your space?

Areas of Responsibility; Areas of Interest; Areas of …

Include areas that you don’t control but your assets still exist in or move through.

Levels of Detail

Individual devices vs physical locations (eg ‘office’, ‘home’)

Stores and Connections

Map out the space - the computer networks - where your assets are located and moved through. Include:

technical links.

Include physical as well as virtual computer network locations

Example

(business with teams and large hands network)

(home with individual devices)

Existing Controls

What defences are already in place on each route to prevent unauthorised access?

Automatic Tools

Tools to explore, monitor and alert