Resources

Reference papers on the best practices we strictly adhere to

The Principle of Least Privilege

Microsoft’s white paper on implementing this concept in
Windows OS

DOWNLOAD

The Protection of Information in Computer Systems

How to protect computer-stored information from unauthorized
use or modification

DOWNLOAD

The Saltzer and
Schroeder List

Eight design principles for
computer security

DOWNLOAD