Operations | Monitoring | ITSM | DevOps | Cloud

Automation

A closer look at how Puppet's new Compliance Enforcement Modules work

Since we launched Puppet Comply last year, we’ve been working hard to build out the solution’s capabilities so that we can provide our customers with more options in implementing a continuous compliance program, and become more proactive and efficient in how they manage compliance. A key activity in any strong continuous compliance program is remediation.

Automating Cloud Security Posture Management Remediation

When we discuss cybersecurity and the threat of cyber attacks, many may conjure up the image of skillful hackers launching their attacks by way of undiscovered vulnerabilities or using cutting-edge technology. While this may be the case for some attacks, more often than not, vulnerabilities are revealed as a result of careless configuration and inattention to detail. Doors are left open and provide opportunities for attacks.

Your lookback at Puppetize Digital 2021

Yet another Puppetize Digital is in the (online only) books. Our second annual virtual conference drew attendees from around the globe, bringing together the people at the center of automation. If you weren’t able to attend this year’s event live, worry not! You can watch the entire conference on-demand here. Read on for Puppetize highlights!

How to mitigate the 0-day Apache path traversal vulnerability with Puppet or Bolt

Apache has disclosed a critical actively exploited path traversal flaw in the popular Apache web server, version 2.4.49. This path traversal means that an attacker can trivially read the contents of any file on the server that the Apache process has access to. This could expose highly sensitive information, even as critical as the server's own private SSL certificates. See the Sonatype blog for more technical information on the vulnerability.

Sponsored Post

5 Security Automation Myths Debunked

It has been argued that automation in the workplace tends to be misunderstood. Analysts are keen to point out that, despite myths to the contrary, automation isn't going to put most people out of work, for instance. Nor is AI going to become a real substitute for actual human intelligence. These are compelling arguments for rethinking the way we think about automation in general. But you can take the points further if you analyze the impact of automation on specific domains, such as cybersecurity. Indeed, automation is perhaps nowhere more misunderstood than in the realm of cybersecurity. To prove the point, here are five common myths about automation's impact on security, and why they're wrong.

Code-to-Cloud Visibility: An essential framework for DevOps success

In DevOps we are used to talking about application velocity. But velocity without a framework is short lived and potentially creates more risk than benefit. Code-to-Cloud visibility is the practice of making sure engineering teams have visibility across the entire SDLC in depth and breadth. With code-to-cloud visibility organizations understand the impact of application development from feature definition to it running in production.

A modern CMDB at the heart of automation

The classic view we have on the CMDB is no longer sufficient. Having a static database of Configuration Items that is heavily guarded by a Change Management process, no longer suffices in a modern, agile, or cloud-native environment. A modern CMDB should be the heart of your automation journey, both being managed by your automation as well as feed information back to your platform via automation. This session will tackle how focusing your efforts on a good, lean CMDB with the necessary (automated) processes around it, can greatly increase your platforms growth, maintenance and agility.