Secure Infrastructure: Employ Perimeter Security Do not allow any external Internet connections to terminate on any internal machines. DMZs must be used. This also goes for connections from partner networks. All Internet exposed machines should have locked down operating systems and applications. Components should be removed and permissions set so that the machines have the […]