You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Add users voices, updated logos with color, rearangements
* Add quotes from suers of our project
* Used colorful logos to better match the rest of the page
* Rearranged some parts of the page
Signed-off-by: Sebastian Gumprich <github@gumpri.ch>
<blockquoteclass="center"> The team behind dev-sec.io “Hardening Framework” programmed most of the benchmark into InSpec rules that make it easy to “test” compliance, ensuring that the rules have been applied on a server. <cite><ahref="https://www.prodops.io/blog/devops-linux-audit-d">Evgeny Zislis - Co-Founder & CTO of ProdOps</a></cite>
118
+
</blockquote>
124
119
125
-
<sectionclass="press border-top">
120
+
<blockquoteclass="center"> An excellent resource for automated hardening is a set of open source templates originally developed at Deutsche Telekom [...]. <cite><ahref="https://software-security.sans.org/blog/2016/06/29/dev-sec-io-automated-hardening-framework">Jim Bird, co-founder and CTO of a major U.S.-based institutional trading service</a></cite>
121
+
</blockquote>
126
122
127
-
<blockquoteclass="center">
128
-
Industry is spending a fortune and useless spend on SIEM – less than 1% success in preventing breaches.<cite>Amit Yoran keynote at RSA conference 2015</cite>
129
-
</blockquote>
123
+
<blockquoteclass="center"> It covers most of the required hardening checks based on multiple standards, which includes Ubuntu Security Features, NSA Guide to Secure Configuration, ArchLinux System Hardening and other. <cite><ahref="https://www.oreilly.com/library/view/security-automation-with/9781788394512/1f82a609-9878-4737-990d-d4fd2a32bbad.xhtml">Security Automation with Ansible 2 by Akash Mahajan, Madhu Akula</a></cite>
0 commit comments