Categories
work
How to Update the RHEL 7 Atomic Scan / OpenSCAP Container Image with the Latest NIST National Checklist Content
Red Hat delivers configuration assessment content natively in Red Hat Enterprise Linux. Unfortunately, this content is generally updated every 4–6 months, causing the RHEL-provided co...
In work, scap, how-to, May 19, 2019Do RHEL Containers Inherit Security Compliance from the Host?
Recently an OpenShift deployment within the U.S. Department of Defense asked if container images would inherit security compliance settings from their container host. There is documen...
In work, security, scap, nist, containers, compliance, Feb 04, 2019Configuring Ansible Tower for DoD CAC and ECA PKI
For this writeup we’ll configure Ansible Tower to require DoD PKI or ECA PKI certificates for authentication. Many thanks to my colleagues Stuart Bain and Jamie Duncan for pointers on...
In work, ansible, how-to, Jun 21, 2018RNGD and Weak Cryptography for Virtual Machines
There was recently a great post on Red Hat’s gov-sec mailing list that asked about random number generation inside virtual machines, what constitutes “weak cryptography,” how to incre...
In work, virtualization, security, May 23, 2018Creation of the OpenStack Security Guide
Factoring all moving components of OpenStack, the rapid release cycles, and the sheer complexity of large deployments, OpenStack security information was decentralized and obsoleted e...
In work, security, openstack, May 23, 2018security
Do RHEL Containers Inherit Security Compliance from the Host?
Recently an OpenShift deployment within the U.S. Department of Defense asked if container images would inherit security compliance settings from their container host. There is documen...
In work, security, scap, nist, containers, compliance, Feb 04, 2019RNGD and Weak Cryptography for Virtual Machines
There was recently a great post on Red Hat’s gov-sec mailing list that asked about random number generation inside virtual machines, what constitutes “weak cryptography,” how to incre...
In work, virtualization, security, May 23, 2018Creation of the OpenStack Security Guide
Factoring all moving components of OpenStack, the rapid release cycles, and the sheer complexity of large deployments, OpenStack security information was decentralized and obsoleted e...
In work, security, openstack, May 23, 2018openstack
Creation of the OpenStack Security Guide
Factoring all moving components of OpenStack, the rapid release cycles, and the sheer complexity of large deployments, OpenStack security information was decentralized and obsoleted e...
In work, security, openstack, May 23, 2018virtualization
RNGD and Weak Cryptography for Virtual Machines
There was recently a great post on Red Hat’s gov-sec mailing list that asked about random number generation inside virtual machines, what constitutes “weak cryptography,” how to incre...
In work, virtualization, security, May 23, 2018ansible
Configuring Ansible Tower for DoD CAC and ECA PKI
For this writeup we’ll configure Ansible Tower to require DoD PKI or ECA PKI certificates for authentication. Many thanks to my colleagues Stuart Bain and Jamie Duncan for pointers on...
In work, ansible, how-to, Jun 21, 2018how-to
How to Update the RHEL 7 Atomic Scan / OpenSCAP Container Image with the Latest NIST National Checklist Content
Red Hat delivers configuration assessment content natively in Red Hat Enterprise Linux. Unfortunately, this content is generally updated every 4–6 months, causing the RHEL-provided co...
In work, scap, how-to, May 19, 2019Configuring Ansible Tower for DoD CAC and ECA PKI
For this writeup we’ll configure Ansible Tower to require DoD PKI or ECA PKI certificates for authentication. Many thanks to my colleagues Stuart Bain and Jamie Duncan for pointers on...
In work, ansible, how-to, Jun 21, 2018scap
How to Update the RHEL 7 Atomic Scan / OpenSCAP Container Image with the Latest NIST National Checklist Content
Red Hat delivers configuration assessment content natively in Red Hat Enterprise Linux. Unfortunately, this content is generally updated every 4–6 months, causing the RHEL-provided co...
In work, scap, how-to, May 19, 2019Do RHEL Containers Inherit Security Compliance from the Host?
Recently an OpenShift deployment within the U.S. Department of Defense asked if container images would inherit security compliance settings from their container host. There is documen...
In work, security, scap, nist, containers, compliance, Feb 04, 2019nist
Do RHEL Containers Inherit Security Compliance from the Host?
Recently an OpenShift deployment within the U.S. Department of Defense asked if container images would inherit security compliance settings from their container host. There is documen...
In work, security, scap, nist, containers, compliance, Feb 04, 2019containers
Do RHEL Containers Inherit Security Compliance from the Host?
Recently an OpenShift deployment within the U.S. Department of Defense asked if container images would inherit security compliance settings from their container host. There is documen...
In work, security, scap, nist, containers, compliance, Feb 04, 2019compliance
Do RHEL Containers Inherit Security Compliance from the Host?
Recently an OpenShift deployment within the U.S. Department of Defense asked if container images would inherit security compliance settings from their container host. There is documen...
In work, security, scap, nist, containers, compliance, Feb 04, 2019