Reference
Overview pages that connect all sections — from attack-defense mapping to compliance checklists.
Reference Material
- Attack → Defense Mapping — Every attack technique linked to the right defense
- Implementation Priorities Matrix — Which measures first, based on impact and effort
- Incident Response Quick Reference — Step-by-step action protocol during an incident
Compliance
- Compliance & Governance — Overview of relevant laws and regulations
- Hardening Checklists — Actionable checklists per platform and technology
- Compliance Mapping Matrix — Measures linked to NIS2, ISO 27001, and BIO
- Secret Management and API Key Rotation — Practical playbook for key incidents, rotation, and governance assurance
- More Value for Users from Different Perspectives — Concrete format for consumers, technicians, and executives
- Security Architecture Principles — Design principles for trust, segmentation, privilege, and detection
- Reference Architectures — Reusable security patterns for web, network, and cloud
- ADR Security Decision-Making — Decision template and quality framework for architecture choices
- Threat Modeling in Practice — Practical method from dataflow to actionable mitigations