The RSI security blog breaks down the actions in some element, but the procedure in essence goes like this: Create firewalls and router benchmarks, which established policies for letting and denying usage of your systems. Firewall configurations really should be reviewed bi-yearly to make sure there aren't any faulty accessibility https://www.nathanlabsadvisory.com/blog/tag/risk-management/