Recently we've been spending our time looking at the official configuration guidance for secure protocol configuration provided by various countries and government organizations. It is usually the case that such advice is binding, which naturally influences how services are configured. What became obvious is that this advice is not always easy to find, and that's why we've decided to publish our current list and to continue building it in public.
We wish to thank the following people who have helped us maintain this list: Christian Fomm.