2

Building a Secure Foundation

In the previous chapter, we took a closer look at what ransomware is, how it works, what attack vectors are, and how some of the different ransomware groups operate. In this chapter, we will start by exploring what a secure foundation should look like from an architectural perspective; we will also explore some of the common best practices in terms of networking design, identity access, and publishing external services.

This chapter will focus more on the high-level design and different security best practices, which we will then go on to elaborate upon in later chapters when we implement the different features mentioned in this chapter. Lastly, we will be looking closely at some of the key components of building ...

Get Windows Ransomware Detection and Protection now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.