You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<blockquoteclass="center"> The team behind dev-sec.io “Hardening Framework” programmed most of the benchmark into InSpec rules that make it easy to “test” compliance, ensuring that the rules have been applied on a server. <cite><ahref="https://www.prodops.io/blog/devops-linux-audit-d">Evgeny Zislis - Co-Founder & CTO of ProdOps</a></cite>
118
+
</blockquote>
124
119
125
-
<sectionclass="press border-top">
120
+
<blockquoteclass="center"> An excellent resource for automated hardening is a set of open source templates originally developed at Deutsche Telekom [...]. <cite><ahref="https://software-security.sans.org/blog/2016/06/29/dev-sec-io-automated-hardening-framework">Jim Bird, co-founder and CTO of a major U.S.-based institutional trading service</a></cite>
121
+
</blockquote>
126
122
127
-
<blockquoteclass="center">
128
-
Industry is spending a fortune and useless spend on SIEM – less than 1% success in preventing breaches.<cite>Amit Yoran keynote at RSA conference 2015</cite>
129
-
</blockquote>
123
+
<blockquoteclass="center"> It covers most of the required hardening checks based on multiple standards, which includes Ubuntu Security Features, NSA Guide to Secure Configuration, ArchLinux System Hardening and other. <cite><ahref="https://www.oreilly.com/library/view/security-automation-with/9781788394512/1f82a609-9878-4737-990d-d4fd2a32bbad.xhtml">Security Automation with Ansible 2 by Akash Mahajan, Madhu Akula</a></cite>
0 commit comments