Cyber Defense Services

Objective

Establish MOU for defensive services and threat monitoring protection services.

Key Considerations

  • Sign an MOU with IT Research and Prototyping.
  • Follow onboarding guidance.

Validation

  • Confirmation from IT Research and Prototyping that the MOU has been signed by the borrower.

Applicable Service Models

  • All lab devices

References

  1. Related security controls: SI‑2, SI‑4