Console Login

Security & Compliance Articles

Technical insights and best practices for Security & Compliance

Security & Compliance

Automating GDPR Compliance: Surviving Schrems II with IaC and Norwegian Sovereignty

Manual security audits are a liability. Learn how to automate compliance using Ansible and OpenSCAP while keeping your data legally grounded in Norway.

Automating GDPR Compliance: Surviving Schrems II with Ansible & OpenSCAP

The CJEU ruling changed the hosting game for Norwegian CTOs. Learn how to automate security auditing and system hardening to satisfy Datatilsynet without burning your engineering budget.

Beyond the VPN: Implementing Zero-Trust Architecture in a Post-Schrems II World

The 'castle-and-moat' security model is dead. Learn how to architect a true Zero-Trust environment using mTLS, SSH certificates, and WireGuard on Norwegian infrastructure to satisfy GDPR and defeat lateral movement.

Zero Trust Infrastructure: Implementing Beyond-Corp Security on Linux in 2021

The perimeter is dead. Learn how to architect a Zero Trust environment using WireGuard, Nginx mTLS, and SSH Certificate Authorities on KVM-isolated infrastructure in Norway.

Zero-Trust Architecture in 2021: Implementing 'Never Trust, Always Verify' on Nordic Infrastructure

The castle-and-moat security model is dead. In the wake of Schrems II and SolarWinds, we explore how to implement a Zero-Trust network using WireGuard, Nginx, and mTLS, specifically tailored for Norwegian data sovereignty compliance.

Zero Trust Architecture in 2021: Implementing BeyondCorp Principles on Norwegian VPS

The castle-and-moat security model is dead. In the wake of Schrems II and the SolarWinds breach, we explore how to implement a true Zero Trust architecture using mTLS, WireGuard, and SSH certificates on Norwegian infrastructure.

Zero Trust in a Post-Schrems II World: Architecting Sovereign Security in Norway

The perimeter is dead. In 2021, relying on simple firewalls is negligence. We dismantle the 'Castle and Moat' strategy and implement a true Zero Trust architecture using WireGuard, mTLS, and Norwegian sovereign infrastructure.

Kill the VPN: Implementing Zero-Trust Networking on Linux Infrastructure in 2021

The 'castle-and-moat' security strategy is dead. Learn how to implement a Zero-Trust architecture using WireGuard, mTLS, and KVM isolation on Norwegian infrastructure, ensuring Schrems II compliance without sacrificing latency.

Automating GDPR Compliance: A CTO’s Guide to Surviving Schrems II with IaC

Manual security audits are a liability in 2021. Learn how to automate server hardening using Ansible and OpenSCAP to satisfy Datatilsynet requirements while keeping your infrastructure firmly on Norwegian soil.

Container Security in 2021: Hardening Docker and Kubernetes for Production

Containers are not virtual machines. Learn battle-tested strategies to lock down your containerized infrastructure, from kernel capabilities to the Norwegian data border.

Zero-Trust Architecture: Paranoia as a Service in the Post-Schrems II Era

The 'castle and moat' security model is dead. Learn how to implement true Zero-Trust using WireGuard, mTLS, and SSH Certificates on Linux systems, ensuring compliance with Norwegian data laws.

Automating Compliance: Surviving Schrems II with OpenSCAP and Ansible on Norwegian Soil

Manual security audits are a liability in 2021. Learn how to automate CIS benchmarks and GDPR technical compliance using OpenSCAP and Ansible, ensuring your infrastructure stays compliant long after deployment.

Kill the VPN: Implementing True Zero-Trust Architecture on Linux Infrastructure (2021 Guide)

The perimeter is dead. Discover how to replace the outdated 'castle-and-moat' security model with WireGuard meshes, Nginx mTLS, and SSH Certificate Authorities on high-performance Nordic infrastructure.

Kill the VPN: Implementing True Zero-Trust Architecture on Norwegian Infrastructure

The perimeter is dead. Following the SolarWinds breach and Schrems II, relying on a firewall is negligence. Here is how to build a Zero-Trust network using WireGuard, mTLS, and KVM isolation.

The Norwegian Fortress: Engineering GDPR-Compliant Disaster Recovery Plans

Disaster recovery in 2021 isn't just about backups; it's about data sovereignty. We explore GTID replication, Restic strategies, and why Schrems II makes your choice of Norwegian infrastructure critical.

The Perimeter is Dead: Implementing Zero-Trust Infrastructure in a Post-Schrems II World

The 'Castle and Moat' security model failed spectacularly in 2020. With the recent SolarWinds fallout and strict GDPR enforcement in Norway, relying on a simple VPN is negligence. Here is how to architect true Zero-Trust using WireGuard, mTLS, and compliant Norwegian infrastructure.

Automating CIS & GDPR Compliance in a Post-Schrems II World: A DevOps Survival Guide

The July 2020 Schrems II ruling changed everything for Norwegian infrastructure. Here is how to automate CIS hardening and ensure data sovereignty without drowning in paperwork.

Zero-Trust Architecture in 2020: Killing the VPN Before It Kills You

The perimeter is dead. With the Schrems II ruling and the massive shift to remote work, relying on a castle-and-moat strategy is negligent. Here is how to implement a Zero-Trust model using Nginx mTLS, WireGuard, and strict KVM isolation in a Norwegian context.

Container Security is a Lie (Unless You Do This): Hardening Docker for GDPR in 2021

Default container configurations are a security nightmare waiting to happen. From rootless execution to handling Schrems II compliance in Norway, here is the battle-tested guide to locking down your infrastructure before 2021 hits.

Surviving Schrems II: Automating Security Compliance on Sovereign Norwegian Infrastructure

The EU-US Privacy Shield is dead. For Norwegian CTOs, the path forward involves strict data sovereignty and automated compliance auditing using OpenSCAP and Ansible. Here is how to build a fortress in 2020.

Schrems II & Data Sovereignty: The Technical Case for Norwegian Hosting in 2020

The Privacy Shield is dead. Learn how to architect GDPR-compliant infrastructure using Norwegian data residency, LUKS encryption, and strict access controls following the Schrems II ruling.

Container Security in a Post-Schrems II World: Stop Running as Root

It is October 2020, and the privacy shield is dead. Here is how to lock down your Docker containers and infrastructure to satisfy Datatilsynet and sleep better at night.

Zero-Trust Architecture in a Post-Schrems II World: Implementing Identity-Aware Infrastructure on Linux

The 'Castle and Moat' security model is dead. Following the July 2020 Schrems II ruling, reliance on US-based cloud perimeters is a liability. This guide details how to build a Zero-Trust environment using WireGuard, mTLS, and SSH CAs on Norwegian infrastructure.

Post-Schrems II Multi-Cloud: Anchoring Data Sovereignty in Norway (2020 Strategy)

The Privacy Shield is dead. We analyze how to architect a compliant multi-cloud strategy using Terraform and HAProxy, keeping sensitive PII on Norwegian soil while leveraging public cloud elasticity.

Automating Security Compliance: Surviving Schrems II with Infrastructure as Code

In the wake of the Schrems II ruling, relying on US-based cloud providers has become a liability for Norwegian businesses. This guide details how to automate compliance using Ansible and OpenSCAP on local KVM infrastructure, ensuring you satisfy Datatilsynet without sacrificing DevOps velocity.

Zero Trust Architecture in a Post-Schrems II World: A Pragmatic Guide for Norwegian CTOs

The castle-and-moat security model is dead. With the recent invalidation of Privacy Shield, relying on the perimeter is a liability. Here is how to implement Zero Trust using Nginx, WireGuard, and sovereign infrastructure.

Surviving the Container Wild West: Hardening Strategies for Post-Schrems II Infrastructure

Running default container configurations in 2020 is professional negligence. We dissect capability dropping, rootless execution, and why the recent Schrems II ruling makes your underlying VPS choice critical for Norwegian data sovereignty.

Zero-Trust Infrastructure: Surviving the Breach You Haven't Detected Yet

Perimeter security is dead. In the wake of Schrems II and the remote work explosion of 2020, we explore how to implement a true Zero-Trust architecture using WireGuard, mTLS, and strict KVM isolation on Norwegian soil.

Automating Compliance: Surviving Schrems II with OpenSCAP and Ansible on Norwegian Soil

The July 2020 Schrems II ruling has made data sovereignty a headache for CTOs. Learn how to automate security compliance using OpenSCAP and Ansible while leveraging local Norwegian infrastructure.

Beyond Backups: Architecting Disaster Recovery in a Post-Schrems II World

The Privacy Shield is dead. Is your data strategy legal? We explore compliant Disaster Recovery architectures for Norwegian businesses, focusing on RTO, RPO, and strict data sovereignty.