* Key Management Find out which algorithms are recommended, when to expire keys, etc.
* Kubernetes A high level guide of basic security needs for Kubernetes
* OpenSSH How to configure and use OpenSSH server and client securely
* Web Security What headers, setup, etc. should you follow for your web site?

Risk assessment
* Assessing Security Risk An open framework to assess security risk from an operational perspective
* Likelihood Indicators A model for determining how security controls affect risk
*Rapid Risk Assessment (RRA) A rapid methodology to perform risk analysis and create a lightweight threat model.
* Scoring and other levels Standardized scoring and other levels that aren't directly representing risk levels.
* Standard Levels Standardized levels for security risk, effort and other measurements.

* OpenID Connect How to use OpenID Connect securely and make user’s session experience better
* SAML How to use SAML securely and make user’s session experience better

* Rationales Explains and justifies the use of specific controls, principles
* Security Principles Most important security principles to follow - the baseline
sec  1802 
20 days ago
« earlier      
0704 0811 1107 1110 1203 1206 1208 1301 1305 1307 1401 1403 1405 1412 1501 1502 1503 1504 1505 1506 1507 1508 1510 1511 1512 1601 1602 1603 1608 1701 1702 1703 1704 1705 1706 1707 1708 1709 1710 1711 1712 1801 1802 1803 2buy 2read 2watch ai apple bash bitcoin bots brag clang cooking cpu crawl crypto dev edu elixir erlang excel fin font freebsd gaming git github golang graphics gtd hackernews hbr health history hosting idlewords ifttt intel javascript linux list lng lora lst macos mail modem network nlp pdf pinboard postgresql psy python qrcode radio react read recruitment reread satel sec sft sleep ssh travel trello trystero twitter video vim windows wrk

Copy this bookmark: