This October I will make a public presentation in UNDISCLOSED explaining how to deploy a domestic information security laboratory indicating correct safety procedures to eliminate the risk of breach of the private infrastructure by improper handling of configuration items.
If the All Mighty Wills It, I will be posting the slides in this general in the future accompanied by the corresponding documentation.
Take care. Be well.