All articles tagged with "datatilsynet"
2014 has been brutal for sysadmins. From Heartbleed to Shellshock, manual patching is no longer an option. Learn how to automate compliance with Datatilsynet regulations and harden your Norwegian VPS infrastructure using Ansible.
The Shellshock vulnerability exposed how fragile manual server management is. Learn how to use Puppet and Chef to automate security compliance, satisfy Datatilsynet requirements, and lock down your infrastructure in minutes, not days.
The traditional "hard shell, soft center" security model is dead. Following the Heartbleed wake-up call, we explore how to implement rigorous internal segmentation and de-perimeterization on your VPS environments using standard Linux tools available in 2014.
The castle-and-moat security model is dead. Following the OpenSSL Heartbleed disclosure, we explore how to architect a 'Zero Trust' environment in 2014 using strict iptables, 2FA, and segregated KVM instances in Norway.
Manual security audits are a liability. Learn how to automate server hardening using Puppet and OSSEC on CentOS 6 to satisfy Datatilsynet requirements while maintaining peak performance on your Norwegian VPS.
Manual security audits are a liability. Learn how to automate compliance with the Norwegian Personal Data Act using Puppet and standard Linux hardening techniques on high-performance KVM architecture.
With the recent leaks regarding NSA surveillance, keeping data within Norwegian borders is no longer just compliance—it's survival. Here is how to automate server hardening using Puppet and iptables on KVM infrastructure.
Don't become a statistic. From configuring iptables to securing SSH keys, this guide covers the mandatory steps to harden your CentOS and Debian servers against modern threats. Featuring specific configurations for Norwegian compliance.
Stop relying on 'security through obscurity'. From configuring rigid iptables to navigating Norwegian privacy laws, this guide covers the mandatory steps to secure your VPS against modern botnets and brute-force attacks.
Botnets don't sleep. Secure your CentOS and Ubuntu servers with these battle-tested hardening techniques. From iptables to SSH keys, here is how to keep your data safe in compliance with Datatilsynet standards.