I am currently working on a task which involves designing protocols for operational security. I am using various sources to try and piece together a solid easy plan for others to follow. It is very interesting work but can be quite daunting as it brings a great level of responsibility.
Here is a good resource if anyone is interested to learn some basics on this topic:
https://www.wbdg.org/resources/threat-vulnerability-assessments-and-risk-analysis
