Chapters
this folder will have 16 folders/Chapters
1-8 Is scoring for bottom to top infrastructure . organization scoring
- operating system / workstation environment / e.g. diskless / remote etc/ NFS / shared data e.g. if hardware is missing is the data encrypted on the device? where are the decrypt keys stored / etc / remote logging
- administrator / master keys / who - how are thoses handled. 2nd level of logging / tracing
- Backup
- Authentication / Authentication services / 3rd party authentication /password checkers / ldap schemes - profile - roles
- Data Storage / Handling / Api / cloud / NAS / S3 / policies / BACKUP / document management / data encryption
- Networking / vpn / zero trust policies / NIS NIS2
- logging / monitoring / black boxes
- software - application - main scopes - protocol of operations (supervisors) / Secrets - vaults /
9-10 will be for software complete lifecycle (from implementation, design, deployment ci/cd to decommisiong)
"black box" application in the lifecycle api security auditing ktl 10.
- chapter for application company development
-
11 crypto /blockchain oriented-infrastructure
-
12 maybe hardware oriented /iot security / audit
-
13 maybe very hard --- interfacing protocols such as (b2b) (b2gov) (gov2b) e.g. api-api specific e.g. MQTT / trusted data /
-
14 security policy (ουσιαστικα ο εσωτερικός κανονισμός) maybe (without τεχνικα ποιος κανει τι κτλ)
-
15 AI oriented (training imlementation) ethics how it was made
-
16 AI oriented (live systems etc) ethics