Operations | Monitoring | ITSM | DevOps | Cloud

Compliance

Treating Security Like a Product at the U.S. Army Software Factory

Security is a constant concern for businesses large and small, public and private. Data breaches and software supply chain attacks are occurring more and more frequently. A growing gap in the cybersecurity workforce is hampering security efforts in every type of organization. And with the average cost of a data breach currently at $4.24 million, leaders have significant motivation to look for new and innovative ways to mitigate cybersecurity risk in their organizations.

Announcing Puppet Compliance Enforcement Modules

Hi, it’s me... Back again with something exciting: Puppet’s new Compliance Enforcement Modules, or CEMs. We’ve been working on some pretty cool stuff since we launched Puppet Comply last year. Lots of great feedback has come in, and we’re thankful for every opportunity we get to show our customers how we can help. This feedback comes in many forms, but one of the things we’ve heard time and time again is that achieving compliance is still hard.

How to Effectively Prepare for a HIPAA Compliance Audit

The Department of Health and Human Services’ Office for Civil Rights (OCR) conducts periodic audits to verify that covered entities (CEs) and their business associates (BAs) are complying with HIPAA regulations. This article will discuss the steps organizations can take to ensure they pass a HIPAA compliance audit by having the proper data privacy and security measures in place for protected health information (PHI) and electronically protected health information (ePHI).

The Compliance Bone Connected to the Security Bone: Sharing Accountability in IT, Risk, and Compliance

Throughout my career within the compliance and security space, I’ve seen the practice of proactively managing digital risk move from a nice-to-have to a must-have for enterprise organizations. And over the last 5 years, things have shifted drastically. Personally, it reminds me of the classic “Dry Bones” nursery rhyme song that my son loves so much which points out how all the different bones are connected to make one body.

Compliance in your Database DevOps pipeline - continuous classification with SQL Data Catalog

Keeping classifications up to date across a constantly evolving structured data landscape is a difficult task, however it can become part of your DevOps process instead of simply offering further red tape to your development teams. Join Chris Unwin, a solution engineer at Redgate Software, to see how you can include SQL Data Catalog within your upstream DevOps process so that nothing in your Production environments is ever without classification.

How to Ensure Patch Compliance

Patch compliance indicates the number of compliant devices in your network. This means the number of computers that have been patched or remediated against security threats effectively. The distribution and deployment of patches accomplish nothing if your devices are not compliant. So to establish a good patch management strategy, it is important to pay attention to the effectiveness and reach of your patch deployment activities.

FIPS certification and CIS compliance with Ubuntu

There are few Linux distributions that undergo the FIPS certification process, and even fewer with certified images available for production use in multi-cloud environments. Canonical has built integrated services to easily enable FIPS certified or compliant modules for Ubuntu 18.04 and 16.04 LTS releases, as well as tooling to assist in hardening and auditing Ubuntu instances to meet CIS compliance benchmarks. These certified components enable operating environments under compliance regimes like FedRAMP, HIPAA, PCI and ISO.