Console Login

Security & Compliance Articles

Technical insights and best practices for Security & Compliance

Security & Compliance

The 'It Won't Happen To Me' Syndrome: Disaster Recovery Strategies for Nordic Systems

Hardware fails. It is a mathematical certainty. In 2014, relying solely on RAID is professional negligence. We dissect the difference between redundancy and recovery, explore robust rsync strategies, and explain why keeping your data inside Norway borders (Datatilsynet) is your best legal defense.

The Perimeter is Dead: Why Your Firewall Won't Save You (And How to Build Zero Trust)

It is 2014, and the trusted network is a myth. Learn how to implement the Forrester Zero Trust model on your VPS infrastructure using KVM isolation, iptables, and private networking.

Automating Compliance: Hardening CentOS 6 for Norwegian Data Standards

Manual security hardening is a liability in 2014. Learn how to automate server compliance using Puppet to satisfy Datatilsynet requirements and secure your infrastructure against intrusions.

Escaping the Jail: Hardening LXC and OpenVZ Environments in Production

While the buzz around Docker and lightweight virtualization grows, the security implications of shared kernels remain a massive blind spot. We dive deep into hardening LXC, managing cgroups, and why KVM isolation is the superior choice for Norwegian data sovereignty.

Kill the Perimeter: Why "Zero Trust" is the Only Strategy for Norwegian Systems in 2013

The traditional firewall is dead. In the wake of PRISM and global surveillance, relying on perimeter security is negligence. Learn how to implement a Zero Trust architecture using iptables, SSL mutual auth, and KVM isolation on CentOS 6.

Automating Security Compliance: From 'Personopplysningsloven' to PCI-DSS on Linux

Manual security audits are a liability. Learn how to automate server hardening using Puppet and OSSEC on CentOS 6 to satisfy Datatilsynet requirements while maintaining peak performance on your Norwegian VPS.

Kill the DMZ: Implementing a Zero-Trust Network on Linux in 2013

The 'castle and moat' security model is dead. Learn how to secure your Norwegian VPS infrastructure using iptables, OpenVPN, and 2FA, treating your internal LAN with the same suspicion as the public internet.

Trust No One: Architecting 'Zero Trust' Infrastructure Post-PRISM

The perimeter is dead. Following the recent Snowden leaks, relying on firewalls alone is negligence. Learn how to implement a Zero-Trust model using KVM, OpenVPN, and aggressive iptables rules to secure your Norwegian VPS.

Securing the Cage: Hardening Linux Containers (LXC/OpenVZ) for Production Environments

Container virtualization offers speed, but default configurations leave you wide open. We dive into capability dropping, cgroups resource control, and why KVM isolation is the ultimate security layer for Norwegian mission-critical data.

LXC vs. KVM: Locking Down Container Security in a Hostile Environment

It is 2013, and Linux Containers (LXC) are exploding in popularity. But shared kernels mean shared risks. We explore capability dropping, cgroups, and why KVM remains the isolation king for Norwegian enterprise data.

Automating Server Hardening: Meeting Norwegian Compliance Without the Headache (2013 Edition)

Manual security audits are a liability. Learn how to automate compliance with the Norwegian Personal Data Act using Puppet and standard Linux hardening techniques on high-performance KVM architecture.

Surviving the Audit: Automating Server Security and Compliance in a Post-PRISM World

With the recent leaks regarding NSA surveillance, keeping data within Norwegian borders is no longer just complianceβ€”it's survival. Here is how to automate server hardening using Puppet and iptables on KVM infrastructure.

Locking Down Linux Containers: A Survival Guide for the Paranoiac SysAdmin (May 2013 Edition)

Container virtualization (LXC/OpenVZ) offers speed, but shared kernels invite disaster. Learn how to harden your isolation, drop kernel capabilities, and why KVM might be the safer bet for critical Norwegian workloads.

Automating Compliance: Why Manual Server Hardening Will Get You Fired

Stop relying on manual checklists for server security. Learn how to automate compliance with Puppet and shell scripting to satisfy Datatilsynet requirements while keeping your sanity intact.

Stop Trusting the LAN: Implementing the Zero-Trust Model on Linux in 2013

The traditional perimeter is dead. Discover how to harden your infrastructure by assuming every network interface is hostile, using iptables, SSH keys, and SSL everywhere on CoolVDS KVM instances.

Surviving the Kernel Panic: A Manual for Disaster Recovery in 2013

Hardware fails. RAID controllers degrade. In this guide, we bypass the marketing fluff and deploy a battle-tested Disaster Recovery plan using MySQL replication, Rsync, and Norwegian infrastructure laws.

Securing the Cage: Hardening LXC and OpenVZ for High-Performance Hosting

Container virtualization offers raw speed, but shared kernels pose significant security risks. Learn how to lock down LXC and OpenVZ environments using cgroups, capabilities, and network isolation.

The Moat is Dry: Implementing the Zero Trust Security Model on Linux Infrastructure

The traditional 'castle and moat' security strategy is failing. Learn how to implement Forrester's Zero Trust model using iptables, SSL, and rigorous access controls on your Norwegian VPS infrastructure.

Surviving the Shared Kernel: Hardening LXC & OpenVZ for Production

Container virtualization is lightweight but risky. Learn how to lock down LXC and OpenVZ environments against root escalation and resource exhaustion using cgroups, iptables, and the new Kernel 3.8 user namespaces.

Trust is a Vulnerability: Why I Treat My Private LAN Like a Public WiFi

The 'crunchy shell, soft center' security model is dead. Learn how to implement a Zero-Trust architecture on your VPS using iptables, SSL everywhere, and Norwegian privacy standards. No firewalls between you and the truth.

LXC & OpenVZ Security: Locking Down The Shared Kernel Nightmare

It is 2013, and everyone wants lightweight virtualization. But running root inside a container often means root on the host. Here is how to secure LXC against kernel exploits and noisy neighbors before you deploy to production.

The Perimeter is Dead: Implementing "Zero Trust" Architecture on Linux Systems (2013 Edition)

Perimeter firewalls are no longer enough. Learn how to implement John Kindervag's Zero Trust model using IPTables, OpenVPN, and hardened SSH configurations on Ubuntu 12.04 and CentOS 6.

Beyond the Firewall: Implementing "Zero Trust" Architecture on Your Linux Infrastructure

The era of the trusted internal network is ending. In 2013, relying solely on a perimeter firewall is negligence. Learn how to implement defense-in-depth using iptables, SSL, and rigorous access control to secure your Norwegian VPS against sophisticated threats.

Compliance as Code: Automating Server Hardening for the Norwegian Data Protection Act

A pragmatic guide for CTOs on navigating EU Directive 95/46/EC and the Norwegian Personal Data Act using Puppet, IPTables, and KVM isolation in 2013.

LXC & OpenVZ Security: Hardening the Shared Kernel for Production

Container virtualization offers incredible density, but the shared kernel model exposes significant attack surfaces. We dive into manual cgroup limits, iptables isolation, and why KVM is still king for sensitive data under Norwegian privacy laws.

Paranoia as a Policy: Implementing Zero-Trust Networking on Linux

The traditional perimeter firewall is dead. Learn how to architect a 'Zero Trust' infrastructure on KVM VPS using IPTables, OpenVPN, and strict access controlsβ€”assuming your local network is already compromised.

Linux Server Hardening in 2013: Survival Guide for Norwegian Systems

A battle-hardened guide to securing your Linux VPS against modern threats. We cover SSH keys, IPTables strategies, and why kernel isolation matters for compliance in Norway.

FTP is Dead: Securing Your Data Transfer with SFTP on Linux

Stop sending passwords in cleartext. Learn how to configure a chrooted SFTP environment on CentOS 6 and Ubuntu 12.04 to comply with Norwegian privacy standards.

FTP is Dead: Securing File Transfers with Chrooted SFTP on CentOS 6

It is 2012. Sending passwords over port 21 is professional negligence. Learn how to configure a chrooted SFTP environment using OpenSSH's internal-sftp subsystem to satisfy Datatilsynet requirements and secure your infrastructure.

Fortress Norway: Essential Linux Server Hardening Guide for 2012

A battle-tested guide to securing your CentOS 6 and Debian 6 servers. From iptables to SSH keys, learn how to protect your infrastructure against rising botnets while leveraging Norwegian privacy standards.