Console Login

Security & Compliance Articles

Technical insights and best practices for Security & Compliance

Security & Compliance

Automating Security Compliance: Surviving Schrems II with OpenSCAP and Ansible in Norway

Manual security audits are a liability in 2022. Learn how to automate CIS benchmarks and GDPR compliance checks on Linux infrastructure using OpenSCAP and Ansible, ensuring your data stays secure within Norwegian borders.

Automating CIS Compliance: Surviving Schrems II with OpenSCAP and Ansible in Norway

Manual security audits are a liability in the post-Schrems II era. Learn how to automate CIS Level 2 hardening on AlmaLinux 8 using OpenSCAP and Ansible, while ensuring true data sovereignty on Norwegian soil.

Zero-Trust Architecture in 2022: Surviving Schrems II with Norwegian Data Sovereignty

The 'castle-and-moat' security model is obsolete. Learn how to implement actionable Zero-Trust principles on Linux infrastructure using WireGuard, mTLS, and compliant Norwegian hosting to satisfy Datatilsynet.

Zero-Trust Architecture: Why Your VPN Is a Liability in Post-Schrems II Norway

Perimeter security is dead. Learn how to implement a pragmatic Zero-Trust model using WireGuard, Nginx mTLS, and Norwegian data sovereignty to satisfy Datatilsynet and secure your infrastructure.

Disaster Recovery in 2022: Why Your 'Backups' Are Not a Strategy

A technical deep-dive into building compliant, resilient disaster recovery architectures in Norway. From Schrems II compliance to immutable backups with Borg and ZFS.

Automating Compliance: Why Manual Audits and US Clouds Are a Liability in 2022

Stop treating compliance as a PDF checklist. In the post-Schrems II era, we explore how to automate CIS benchmarks, enforce sovereignty, and secure your Nordic infrastructure using Ansible, OpenSCAP, and KVM isolation.

Surviving Schrems II: Automating Infrastructure Compliance in a Post-Privacy Shield World

With the Austrian DSB declaring Google Analytics illegal in early 2022, reliance on US hyperscalers is now a liability. Here is how to automate strict compliance on sovereign Norwegian infrastructure using OpenSCAP and Ansible.

Disaster Recovery in 2022: Compliance, Ransomware, and the Oslo Advantage

A pragmatic CTO's guide to building a legally compliant disaster recovery plan in Norway. We analyze RTO/RPO strategies, Schrems II implications, and technical implementations using immutable backups.

Automating CIS & GDPR Compliance: A CTO’s Guide to Surviving Audits in 2022

Manual server hardening is a liability. Learn how to automate CIS benchmarks and GDPR technical controls using Ansible and OpenSCAP on Norwegian infrastructure.

Automating Security Compliance in a Post-Schrems II World: A CTO's Survival Guide (2022 Edition)

Manual security audits are a liability. Learn how to automate CIS benchmarks and GDPR compliance checks using OpenSCAP and Ansible on Norwegian infrastructure.

Building a Zero-Trust Infrastructure on Linux: A Post-Log4Shell Survival Guide (2022)

The perimeter is dead. After the Log4j nightmare, relying on firewalls is negligence. Learn how to implement Zero-Trust principles using WireGuard, mTLS, and nftables on Norwegian infrastructure.

Container Security Post-Log4j: Hardening Docker for the Norwegian Enterprise

The 'Log4Shell' vulnerability exposed the fragility of default container configurations. This guide details strictly technical hardening strategies—from kernel capabilities to network isolation—ensuring your Norwegian infrastructure survives the next zero-day.

Automating Compliance in the Post-Schrems II Era: A CTO's Guide to Hardening Infrastructure in Norway

Manual server hardening is a liability in 2021. Learn how to automate CIS-level security on Norwegian VPS infrastructure using Ansible and OpenSCAP to satisfy Datatilsynet and GDPR requirements without sacrificing velocity.

Container Security in Late 2021: Surviving Log4Shell and Hardening the Runtime

It is December 2021, and the internet is on fire. Here is a battle-tested guide to locking down Docker and Kubernetes, ensuring valid isolation, and why running containers on shared-kernel VPS is a ticking time bomb.

Zero-Trust Architecture: Building Sovereign Infrastructure in a Post-Schrems II World

Perimeter security is dead. Learn how to implement a Zero-Trust network using WireGuard, mTLS, and KVM isolation on Norwegian soil to satisfy Datatilsynet and secure your stack.

Zero-Trust Architecture in 2022: A Pragmatic Implementation Guide for Norwegian Enterprises

Move beyond the perimeter. Learn how to implement a Zero-Trust security model using mTLS, Kubernetes NetworkPolicies, and strict infrastructure isolation compliant with Schrems II.

Automating Security Compliance: From "Schrems II" Anxiety to DevSecOps Reality

Manual security audits are a liability in 2021. Learn how to automate CIS benchmarks and GDPR technical safeguards using OpenSCAP and Ansible on sovereign Norwegian infrastructure.

The Perimeter is Dead: Implementing Zero-Trust on Linux Infrastructure in 2021

The 'castle-and-moat' security strategy failed us. Here is how to architect a true Zero-Trust environment using WireGuard, SSH keys, and strict kernel-level isolation, compliant with Norway's strict data standards.

Zero Trust Architecture in 2021: Beyond the VPN for Nordic Enterprises

Perimeter security is obsolete. In the wake of Schrems II, moving to a Zero Trust model isn't just about security—it's about compliance. Here is the pragmatic roadmap for implementation on Linux infrastructure.

Disaster Recovery in 2021: Surviving Root Failures and GDPR Audits

Hope is not a strategy. We dissect a battle-tested 3-2-1 backup architecture using WireGuard, BorgBackup, and Norwegian NVMe infrastructure to keep your RTO under 15 minutes.

Container Security in 2021: Hardening Docker & Kubernetes for Production

Stop running containers as root. A battle-hardened guide to immutable infrastructure, network policies, and why the underlying VPS architecture dictates your security posture in the post-Schrems II era.

Automated Security Compliance in a Post-Schrems II World: A Practical Guide for CTOs

Manual security audits are a liability. Learn how to automate CIS benchmarks and GDPR compliance checks using OpenSCAP and Ansible on Norwegian infrastructure.

Zero-Trust Architecture: Why Your "Private" Network is a Lie (and How to Fix It)

Perimeter security is dead. Learn how to implement a true Zero-Trust model using mTLS, nftables, and WireGuard on Linux, ensuring compliance with Norway's strict data sovereignty laws.

Container Security in 2021: Hardening Strategies for Norwegian DevOps

Stop trusting default configurations. From non-root users to immutable infrastructure, here is the battle-tested guide to securing your container workloads in the post-Schrems II era.

Automating GDPR Compliance: Surviving 'Schrems II' with Infrastructure as Code

Manual security audits are a liability in 2021. Learn how to automate CIS benchmarks and guarantee data residency in Norway using Ansible, OpenSCAP, and local infrastructure.

Automating Compliance: Surviving Schrems II with Ansible and OpenSCAP in 2021

Manual security hardening is a liability. Learn how to automate CIS benchmarks on Ubuntu 20.04, navigate the post-Schrems II legal landscape in Norway, and enforce drift detection without drowning in paperwork.

Disaster Recovery in the Post-Schrems II Era: A CTO's Survival Guide

Disaster recovery isn't just about backups anymore; it's about data sovereignty and survival. We explore architecting resilient infrastructure in Norway following the 2021 datacenter incidents.

Zero Trust is Not a Product, It's a Survival Strategy: Implementing BeyondCorp Principles in the Norwegian Cloud

Perimeter security is obsolete. Learn how to architect a Zero Trust environment using WireGuard, SSH Certificates, and Norwegian data sovereignty principles to satisfy Schrems II and secure your infrastructure.

Zero-Trust Architecture on Linux: Beyond the VPN in a Post-Schrems II World

The castle-and-moat security model is dead. In the wake of SolarWinds and Schrems II, we dismantle traditional VPNs and implement a true Zero-Trust model using WireGuard, mTLS, and KVM-isolated infrastructure in Norway.

Hardening Docker & Kubernetes: A 2021 Survival Guide for Nordic DevOps

Containers are not virtual machines. Learn how to lock down your Docker runtime, survive Schrems II compliance in Norway, and why running as root is a death sentence for your infrastructure.