Short, actionable notes. Each card includes a concise source so teams can go deeper.
Adopt MFA Everywhere First
Enable phishing-resistant MFA for admins and remote access as a first control. It reduces common credential-theft risk and raises the bar for attackers.
Source (APA): CISA. (2021). Implementing phishing-resistant MFA. https://www.cisa.gov/
Prioritize Known Exploited Vulnerabilities
Patch cycles should explicitly track the “known exploited” list in addition to vendor advisories. Treat those items as expedited changes.
Source (APA): CISA. (2024). Known Exploited Vulnerabilities Catalog. https://www.cisa.gov/
3-2-1 Backups With Restoration Drills
Keep three copies, on two media types, with one off-site or offline. Test restores quarterly to verify objectives and operator familiarity.
Source (APA): NIST. (2010). SP 800-34 Rev.1: Contingency Planning Guide for Federal Information Systems. https://csrc.nist.gov/
Log What You Want To Answer
Define questions first (who did what, from where, and when), then instrument systems and retain logs long enough to investigate effectively.
Source (APA): NIST. (2006). SP 800-92: Guide to Computer Security Log Management. https://csrc.nist.gov/
Build Against the OWASP Top 10
Use the Top 10 as a lightweight threat model for web apps and APIs. Add automated checks for injection, auth, and sensitive data exposure.
Source (APA): OWASP. (2021). OWASP Top Ten. https://owasp.org/
Use an SBOM for Dependency Risk
Generate a software bill of materials during CI to surface vulnerable components and license issues before deployment.
Source (APA): NIST. (2022). SP 800-218: Secure Software Development Framework (SSDF). https://csrc.nist.gov/
Role-Based Access, Least Privilege
Map roles to tasks and grant only what is necessary. Review high-risk permissions on a schedule and require approvals for escalation.
Source (APA): NIST. (2014). SP 800-53 Rev.4/5: Security and Privacy Controls. https://csrc.nist.gov/
Clarify Cloud Shared Responsibility
Vendors operate infrastructure; customers own identity, data, and configuration. Document this early to prevent gaps.
Source (APA): Cloud Security Alliance. (2017). Security Guidance v4. https://cloudsecurityalliance.org/