When looking for Endpoint Privilege Management (EPM) solutions, there are not a lot of options out there. The main market players are CyberArk, BeyondTrust, Delinea (previously Thycotic) and the Microsoft Intune Endpoint Privilege Management. The best solution may differ based on the operating systems, organization size, industry, and whether the company has many developers needing admin access. These factors can also affect the implementation difficulty.
What is an EPM software? An EPM software allows you to remove local admin rights on end-user devices and control which applications can be run as standard user, with elevated privileges/as admin or should be blocked.
Transitioning from ISO27001 certification to SOC2 compliance is a natural progression for many organizations. Whether you’ve already obtained ISO27001 or have it in your sights, SOC2 is likely on the horizon, being one of the most coveted certifications for demonstrating robust security controls. Chances are, your organization is already fielding inquiries from customers’ security compliance teams about SOC2 readiness. And if crafting comprehensive security policies poses a challenge due to limited security governance staff in your security department, I present here a solid base to kickstart your journey towards SOC2 compliance.
Introducing the MacOS Security Compliance Project The MacOS Security Compliance Project (mSCP) is an open source framework for programmatically generating security guidance. This project contains security baselines of technical security controls such as CIS Benchmark, NIST-800-171, NIST-800-53, DISA STIG which can be adapted to the specific needs of any organization. The workflow is quite simple:
Where tailoring is used to select which rules to include in a benchmark, customizing is modifying the rules themselves.
Compliance as Code Compliance as Code (CaC) can be simply put as IT security compliance policies written as code. Systems configuration can be audited by these CaC policies to demonstrate your infrastructure’s compliance against regulations and industry standards such as CIS Benchmarks, DISA STIG, PCI DSS, HIPAA, and more. Organizations can automate assessment, monitoring and remediation of these compliance controls on various systems with the Security Content Automation Protocol (SCAP) developed by Red Hat and the National Institute of Standards and Technology (NIST).
In today’s competitive job market, a well-crafted resume is the key to getting that first interview. A resume isn’t everything, but it’s what gets you from the screening stage to the first interview with the recruiter. There are plenty of resume builders available online, however most of them are not free or just have a free trial period of 14 days, and today I want to prove that there are excellent free alternatives out there.
Containers are ubiquitous in modern production environments within Kubernetes clusters hosted on various cloud platforms such as AWS EKS, Azure AKS, or GCP GKE. By consequence securing Docker images is a necessity for all companies. Both customers and vendors must ensure that the images they use are free from vulnerabilities that could compromise their systems and their data or, respectively, tarnish their reputation if they ship vulnerable images. Nowadays, it’s well known that there are vulnerabilities in Docker images that can be exploited to escape the Docker environment and achieve privilege escalation on the host or just leak confidential data.