Designing and managing your connected place architecture
Updated 10 July 2023
IT professionals and cyber security leads need to ensure that they are designing and managing a connected place's architecture to be secure. This guidance will help you understand the structures, principles and activities you need to consider and implement to give confidence in the architecture of a connected place.
This guidance is relevant to:
- IT professionals
- Cyber security leads
Zero Trust Architecture Design Principles
Owner: National Cyber Security Centre
About this guidance: This guidance outlines eight principles to help IT professionals and cyber security leads implement your own zero trust network architecture (an approach to system design where inherent trust in the network is removed, the network is assumed hostile, and each access request is verified, based on an access policy).
Security Architecture Anti-patterns White Paper
Owner: National Cyber Security Centre
About this guidance: This guidance provides advice to help IT professionals and cyber security leads build secure networks and systems by describing some common patterns often seen in system designs that should be avoided.
Security Principles for Cross Domain Solutions
Owner: National Cyber Security Centre
About this guidance: This guidance outlines thirteen security principles which IT professionals and cyber security leads can use to guide the design, development, assessment, and deployment of Cross Domain Solutions (CDS), which refers to the mechanisms and systems that are used to connect and share information across the different domains of a connected place and is used where different domains have been segregated to provide further resilience to the connected place as a whole.
Owner: National Cyber Security Centre
About this guidance: This guidance provides IT professionals and cyber security leads with an understanding of the importance of asset management for cyber security and outlines the properties and practices needed to achieve good cyber security outcomes.
Cloud Security Guidance: having confidence in cyber security
Owner: National Cyber Security Centre
About this guidance: This guidance provides guidelines on how to configure, deploy and use cloud services securely and will help IT professionals and cyber security leads determine how confident you can be that a cloud service is secure enough to handle your data.