• Application allow list (ITSAP.10.095)
  • Defending against distributed denial of service (DDoS) attacks – ITSM.80.110
  • Best practices for passphrases and passwords (ITSAP.30.032)
  • Security considerations for edge devices (ITSM.80.101)
  • Recommended cyber security contract clauses for cloud services (ITSM.50.104)