security-handbook
📖 Security Handbook
FAQ
How do I classify data correctly?
What is a Security Incident Management Plan?
🏫 Learning Paths
Threat Modelling
Security Journey
🗣️ Security COP talks (Made Tech internal only videos)
A Cyber Security showcase by Arnie Armstrong
Live demonstration of hacking challenge by Arnie Armstrong
Security Assurance Across Government by Reuben Hilyer
,
Deck
🌐 Our Blogs
Is your technical architecture driving the right outcomes
📚 Runbooks
Threat Management Checkpoints
Cloud Service Checkpoints
Secure By Design Checklist (Cabinet Office)
🌐 Learning Resources
Security Journey - Made Tech funded online training
Secure development and deployment guidance
NCSC - Secure by Default
The cloud security principles - NCSC.GOV.UK
Bow Ties and Attack Trees for Risk
Intro to threat modelling by Cormac Brady
Intro to threat modelling by Lawrence Goldstein
⚒️ Principles, Processes, Standards and Tools
DevSecOps
Threat Management Approaches
CIS 18 Security Controls
Risk Assessment template document