Unit Tests for Security Features Activities * Identify all security-related features. These commonly contribute to the following security
ssh Understanding and Simulating SSH Backdoors SSH (Secure Shell) is one of the most widely used protocols for
compliance Introducing my personal CWRF Security and Compliance Maturity Model: From Crawling to Flying Organizations must evolve their strategies to stay ahead of emerging threats and
Security Questionnaire Response Framework (SQRF) 1. General Rules and Guidelines 1. Be Honest and Accurate: Always provide
Complexity Avoid Risk: Separate Security and Feature Releases In software development, separating security and feature releases is essential. Combining them increases complexity, risks bugs, and delays critical security patches. Separate releases ensure focused testing, simplify rollbacks, and provide clear communication.
FedRAMP Demystification of the FedRAMP Authorization Boundary Diagrams (with Template) Under FedRAMP, CSPs using external services must document them, include them in their authorization boundary for federal data, and get official approval.
Tech Exploring the Hidden Costs of Apple Products Is the high price of Apple devices justified? I explore the limited customization, closed ecosystem, ethical concerns, and more that consumers should consider before purchasing.
GRC How I built a Security Question & Answer Knowledge Base A tool that I discovered and implemented in FormAssembly back in November
GRC How I Built a Security & Compliance Reporting Process [UPDATED 2023-MAY-31: Just did our closing meeting ISO 27001 Audit and the
10 Things To Know Before A SOC 2 Audit Gain Customer Trust and Confidence with a SOC 2 Audit for Your Business