Data

Performance monitoring and Backup & Restoration

Performance monitoring 1 . Network/Disk/Memory/CPU 2 . Outsourced Monitoring     + References (HR)     + SLA Terms     + Trial runs 3 . Hardware Monitoring 4 . Redundant System 5 . Monitoring Functions Restoration 1 .Inclusion of configuration data…

Clustered Hosts

1 .Resource Sharing     + Reservation: minimum availability of resources.     + Limits: maximum availability of resources.     + Shares: provisioning through prioritization. 2 .Distributed Resource Scheduling / Compute Resource Scheduling     + Hi…

Process

Introduction Security Operations Centers (SOC) need to how the current key skills , tools and processes to be able to detect, investigate and sop threats before they become costly data breaches. Definition  A set of defined repeatable steps that take …

The PCI Data Security standard

It was introduced in 2004 by American Express,Discover,MasterCard, and Visa in response to security breaches and financial losses within the credit card industry. Since 2006 the standard has been financial losses maintained by the PCI standards counci…

Health Insurance Portability and Accountability Act (HIPAA)

HIPAA - HITECH The US Federal laws and regulations that defines the control of most personal healthcare information for companies responsible for managing data. The HIPAA Privacy rule establishes standards to protect individuals medical records and ot…

SOC1/SOC2 Test

General controls: Inventory Listing. HR Employee Listing. Access Group Listing. Access transaction Log. A.Organization and Management: Organizational Chart. Vendor assessments. B.Communications: Customer Contracts. System Descriptors. Policies and Tec…

SOC Reports

Why SOC Reports? Some industry require SOC2 or local compliance audit. Many organizations who know compliance, know SOC2 Type 2  consider it a stronger statement of operational effectiveness than ISO 27001 (Continuous Testing). Many organization's…

US Cybersecurity Federal Law

Computer Fraud and Abuse Act (CFAA) The computer Fraud and Abuse Act is a US cyber security bill that was enacted in 1984. Federal Information Security Management Act of 2002 ( FISMA ) Federal Information Security Modernization Act of 2014 ( FISMA 201…

Cyber Security

Security Event An event on a system or network detected by a security device or application. Security Attack A security event that has been identified by correlation and analytics tools as malicious activity that is attempting to collect,disrupt,deny,…

Load More
That is All