Category IT

Information Security Governance

Information security governance is a part of governance, risk and compliance (GRC). Information Security should take into account the organization objectives and identified risks to define information security objectives. To achieve these goals, the IS strategy must be defined. Information…

Secrets Management

Secrets management is a practice that allows developers to securely store sensitive data such as passwords, keys, and tokens, in a secure environment with strict access controls. A common person connected to the internet must use a few dozen of…

Microservices

This post summarizes ideas about microservices, that is a type of distributed system. This post is part of a series of articles about distributed systems. Description of Microservices IT microservices is a service-oriented architecture (SOA) where the application is splitted…

Software-defined Network

A software-defined network (SDN) is an approach to network management that enables dynamic and programmatically network configuration. This is a contrast with traditional networks, where the network is defined by using hardware components. An SDN looks like a single logical…

Database Security

This post explains some aspects of IT security on databases. It is part of the main post about introduction to IT security. Database Controls Database controls featured on this post: Server-side input validation Please remind that client-side input validation is…

How to get the CCSP Certification

Certified Cloud Security Practitioner (CCSP) is a certification focused on cloud security and issued by American non-profit organization ISC(2) CCSP certification is more detailed than CCSK certificate, that is issued by Cloud Security Alliance (CSA). Some recommend to obtain CCSK…