Page tree
Skip to end of metadata
Go to start of metadata

Tools

AWS Policy Generator

https://awspolicygen.s3.amazonaws.com/policygen.html

SecDevOps

or DevSecOps https://en.wikipedia.org/wiki/DevOps#DevSecOps,_Shifting_Security_Left

AWS Secure Environment Accelerator

https://cyber.gc.ca/en/guidance/staying-cyber-healthy-during-covid-19

https://www.apple.com/covid19/contacttracing

https://en.wikipedia.org/wiki/Security_information_and_event_management

https://www.kali.org/#:~:text=Offensive%20Security%20was%20born%20out,open%2Dsource%20penetration%20testing%20platform.

https://en.wikipedia.org/wiki/Kali_Linux

https://cyber.gc.ca/en/guidance/national-cyber-threat-assessment-2020

Mitre

Layer 2 MACsec security - https://aws.amazon.com/blogs/networking-and-content-delivery/adding-macsec-security-to-aws-direct-connect-connections/

Government level Cloud Security

https://www.slideshare.net/AmazonWebServices/deploy-a-dod-secure-cloud-computing-architecture-environment-in-aws

AWS Secure Environment Accelerator

SCED

IDS: Intrusion Detection System

IPS: Intrusion Prevention System

Incident History

Authentication

Authentication verifies user identity via identity tokens - see Open ID Connect protocol https://openid.net/connect/faq/

Authorization

Authorization determines user access via access tokens - see OAUTH 2.0 https://oauth.net/2/

https://developer.okta.com/blog/2019/08/22/okta-authjs-pkce/?utm_campaign=text_website_all_multiple_dev_dev_oauth-pkce_null&utm_source=oauthio&utm_medium=cpc

CVE - Critical Vulnerabilities

via nexus


Blockchain - Ledger

https://github.com/hyperledger/indy-node

People

S3

https://docs.aws.amazon.com/AmazonS3/latest/userguide/VirtualHosting.html#virtual-hosted-style-access


Security Standards

NIST

ISO 27001

OWASP

  • No labels