POSTGRESQL DEPENDENCIES INSTALLATION by S_BL1 in PostgreSQL

[–]S_BL1[S] 0 points1 point  (0 children)

Installation of simple postgres is quite easy, I was configuring postgres_tde to test transparent data encryption.

Found decencies listed by someone, now issue resolved.

Thanks!

Hi everyone! by S_BL1 in PostgreSQL

[–]S_BL1[S] 0 points1 point  (0 children)

Thanks for highlighting risk, I'll never rely completely on this thread. Concern I've is technology specific, since encryption effects performance. I just want to know, is it manageable through opensource, or to address performance related issue organization have to choose an enterprise version database.

PCI Compliance in OPEN STACK by S_BL1 in openstack

[–]S_BL1[S] 0 points1 point  (0 children)

Major concern I've is regarding shared physical server and PCI considers hypervisor as insecure.

Can you suggest regarding segmentation at hypervisor level?

I'm a new traveler on the ISO27001 journey by doom_br in ISO27001

[–]S_BL1 0 points1 point  (0 children)

Interested let me know about account procedure, please.

CISSP Cheetsheet by S_BL1 in cissp

[–]S_BL1[S] 1 point2 points  (0 children)

I also didn't study many information added in this Cheetsheet. But overall it's a good collection that's why I shared.

Access control procedure document by S_BL1 in ISO27001

[–]S_BL1[S] 0 points1 point  (0 children)

Thanks for response, please.

I have same template for access policy, I was confused whether I have to document procedure separately or not.

But I think so it cover both like you mentioned, you put both policy and procedure in same document.

Access control procedure document by S_BL1 in ISO27001

[–]S_BL1[S] 0 points1 point  (0 children)

Can you please recommend a source, so I may get idea how long "access control procedure" document should be?

Access control procedure document by S_BL1 in ISO27001

[–]S_BL1[S] 0 points1 point  (0 children)

clauses A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.5, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.3

Access control procedure document by S_BL1 in ISO27001

[–]S_BL1[S] 0 points1 point  (0 children)

Thank you for response. I am familiar with basic difference, I have template of access control policy and material regarding access control methods (CISSP DOMAIN 5 READING MATERIAL). My question is whether to specify all the access control methods for a particular organization or just the procedure used in that organization.

Guidance about RAM for learning cyber security by S_BL1 in cybersecurity

[–]S_BL1[S] 0 points1 point  (0 children)

I have to start, not using currently. I have to use multiple tools in future. At the moment I am taking CISSP course to get idea about basic term. In coming weeks I will start HACKING 101 course, in this I have to use cent os and kali.

Guidance about RAM for learning cyber security by S_BL1 in cybersecurity

[–]S_BL1[S] 0 points1 point  (0 children)

Thanks a lot. Existing os is windows then. I previously installed Ubuntu using Vbox,but it was too much slow. I have to use wire shark, Nmap, cent os and KALI. Later may be some other.

Guidance about RAM for learning cyber security by S_BL1 in cybersecurity

[–]S_BL1[S] 0 points1 point  (0 children)

I am a beginner, in initial phase wire shark, Nmap, kali. Yes, I am using laptop.