In this episode, we continue with our new format in Q&A fashion. Questions about today’s DevSecOps environment, as well as, questions about previous episodes.
In this episode, we try a new format in Q&A fashion. Questions about today’s DevSecOps environment, as well as, questions about previous episodes.
First Watch Episode 3. Our discussion about strategies in Enterprise Configuration Management or ECM. Whether you choose Chef, Puppet, Ansible or Docker, here are some key concepts to help you choose.
Find out the differences between Hardening Policies, Security Policies and Compliance Policies, when they differ, and when they don’t.
What is Hardening, and what problems does it present? This short discussion talks about the concepts surrounding the Hardening of a Server, Instance, Environment or Application.
Could this be just another acronym in the age of the cloud, S-N-a-a-S. Will this agile-derived “as a Service” deliver on its promise, or should you avoid it. The answer is both, it delivers its service, yet you may be better served to escape its clutches entirely.
Not everyone has to suffer, there are a few simple things you can do to escape with your sanity..
Find out how to escape SNaaS forever. Hardening, Compliance...
Explaining Hardening To Novices
The concept of Hardening and Hardness is borrowed from military and battle vocabulary. A military target is said to be hard or soft depending on how well it is defended or fortified. When you step into an IT Security role, it helps to think of your own servers or assets as potential targets to your enemies. As a defender of these assets, it becomes important to harden these targets, to thwart y...