Console Login

#Linux Hardening

All articles tagged with Linux Hardening

#Linux Hardening

Kill the Castle-and-Moat: Implementing Zero-Trust Security on Linux Infrastructure (2017 Edition)

The perimeter is dead. With GDPR enforcement looming and sophisticated threats bypassing traditional firewalls, relying on a VPN is no longer enough. Here is how to architect a Zero-Trust environment using standard Linux tools on high-performance KVM architecture.

The Death of the Perimeter: Implementing Zero-Trust Architecture in 2017

The 'castle and moat' security strategy is obsolete. With GDPR enforcement looming and sophisticated lateral attacks on the rise, Norwegian CTOs must pivot to a Zero-Trust model. Here is how to implement Google-style BeyondCorp security on your Linux infrastructure today.

Container Security in 2016: Why Isolation is an Illusion (And How to Fix It)

Docker is revolutionizing deployment, but default configurations are a security nightmare waiting to happen. From kernel exploits to the new EU-US Privacy Shield, here is how to lock down your stack in a post-Safe Harbor world.

Automating the Auditor: Infrastructure Compliance in a Post-Safe Harbor World

With the recent adoption of the GDPR and the death of Safe Harbor, manual security auditing is a liability. Learn how to implement 'Compliance as Code' using OpenSCAP and Ansible on strictly isolated KVM instances.

Surviving the Post-Safe Harbor World: Automating Security Compliance in Norway

With the invalidation of Safe Harbor, data sovereignty is no longer optional. Learn how to automate server hardening with Ansible and keep the Norwegian Data Protection Authority happy.

Container Security in the Wild West: Hardening Docker 1.9 for Production

Docker 1.9 is changing the game, but running containers as root is a recipe for disaster. Here is the battle-tested guide to hardening your stack, surviving the 'Safe Harbor' collapse, and why KVM is your only safety net.

Docker in Production: Security Survival Guide for the Paranoid Sysadmin (2015 Edition)

With the recent fall of Safe Harbor, data sovereignty is critical. We dissect practical Docker security hardening, from dropping kernel capabilities to ensuring true isolation with KVM.

Automating Security Compliance: Why Manual Hardening is Killing Your Audit Trail

In 2015, managing server security via spreadsheets is negligence. We explore how to replace manual checklists with Ansible and OpenSCAP on Norwegian infrastructure to satisfy Datatilsynet and PCI-DSS requirements.

Linux Server Hardening: The 2009 Survival Guide for Norwegian Systems

It is not a matter of if, but when a botnet scans your IP. From configuring iptables to securing SSH, here is how we lock down CentOS and Debian servers to comply with Datatilsynet standards.