The purpose of this guide is not so much providing complete cyber-security training, but highlighting some of the system setup aspects that are most important and/or specific to Platform security.
Essential check-list
If hosting in a cloud or VPS provider, disk encryption with a specific ephemeral key is used.
Backups are scheduled, monitored, encrypted and regularly tested.