The order also said that all sensitive technical information, including ICT architecture diagrams, system configurations, vulnerability assessments, IP addressing schemes and strategic technology plans, must be classified as confidential and handled exclusively through approved secure channels
The order also said that all sensitive technical information, including ICT architecture diagrams, system configurations, vulnerability assessments, IP addressing schemes and strategic technology plans, must be classified as confidential and handled exclusively through approved secure channels