In many ways, this objective translates into understanding and following best security practices when designing or configuring systems and networks. Thus, key considerations include
Security should be part and parcel of any design or configuration from its inception. When tightly integrated, security works much better than when applied as an afterthought.
Review all designs and configurations against local security policy to make sure it conforms in every possible way. This is particularly important for networks or systems where sensitive data is stored, or that straddle the boundary between internal and external networks.
Be aware that security is an ongoing ...