SHIFT

--- Sjoerd Hooft's InFormation Technology ---

User Tools

Site Tools


infratoolbox
Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
infratoolbox [2018/05/17 05:42]
sjoerd
infratoolbox [2019/01/04 14:58] (current)
sjoerd
Line 16: Line 16:
  
 ^ Topic ^ Sub Topics ^ Hints ^ T / I / A ^ ^ Topic ^ Sub Topics ^ Hints ^ T / I / A ^
-| Monitoring | | * Note that monitoring alone is not enough. You should have the resources to follow up on alerts. \\ * Chain Monitoring is a big plus on keeping an eye on everything. | * Make sure you have a screen with the current status visible |+<del>| Monitoring | | * Note that monitoring alone is not enough. You should have the resources to follow up on alerts. \\ * Chain Monitoring is a big plus on keeping an eye on everything. | * Make sure you have a screen with the current status visible |
 | Backup & Restore | | * Could also be stored under continuity. \\*  If data is valuable you should be able to restore it. \\ * If data is not valuable you should be able to reproduce it. \\ * Example: It's easier to reinstall certain types of services than to restore it from a backup. | * Keep backup status in monitoring. \\ * Keep reports for more than a year | | Backup & Restore | | * Could also be stored under continuity. \\*  If data is valuable you should be able to restore it. \\ * If data is not valuable you should be able to reproduce it. \\ * Example: It's easier to reinstall certain types of services than to restore it from a backup. | * Keep backup status in monitoring. \\ * Keep reports for more than a year |
 | Documentation | Infra Designs | * Templates \\ * App Info: App Owner, Confidentiality,​ Integrity (RPO), Availability (RTO), Privacy, Technival App Mgmt, Functional App Mgmt \\ * Hardware and software \\ * Interfaces \\ * Permissions \\ * Operational Threat Design to virtualize the big picture: (Virtual) Servers, databases, network components (incl. loadbalancer),​ security components | | | Documentation | Infra Designs | * Templates \\ * App Info: App Owner, Confidentiality,​ Integrity (RPO), Availability (RTO), Privacy, Technival App Mgmt, Functional App Mgmt \\ * Hardware and software \\ * Interfaces \\ * Permissions \\ * Operational Threat Design to virtualize the big picture: (Virtual) Servers, databases, network components (incl. loadbalancer),​ security components | |
Line 26: Line 26:
  
 Automatisering van werkzaamheden. Houd bij wat geautomatiseerd is, en wat nog geautomtiseerd moet worden en dan de meest toegevoegde waarde heeft. ​ Automatisering van werkzaamheden. Houd bij wat geautomatiseerd is, en wat nog geautomtiseerd moet worden en dan de meest toegevoegde waarde heeft. ​
 +</​del>​
 = Security and Continuity = = Security and Continuity =
  
 ^ Topic ^ Sub Topics ^ Hints ^ T / I / A ^ ^ Topic ^ Sub Topics ^ Hints ^ T / I / A ^
-| Patching | |Patching is the most important topic regarding security. \\ Think about OS, tooling, firmware, products, platforms, databases. \\ Make sure you can create a patch report. | +<del>| Patching | |Patching is the most important topic regarding security. \\ Think about OS, tooling, firmware, products, platforms, databases. \\ Make sure you can create a patch report. | 
-| | Framework | Create a framework within you can deploy various types of patching. Think of it as a monthly schedule, either on hard dates or relatives dates, for example, all dates dependent on Microsoft'​s Patch Tuesday |+| | Framework | Create a framework within you can deploy various types of patching. Think of it as a monthly schedule, either on hard dates or relatives dates, for example, all dates dependent on Microsoft'​s Patch Tuesday |</​del>​
 | Proxy | |Should be a benefit, not a burden. ​ | | Proxy | |Should be a benefit, not a burden. ​ |
 | Firewalling | | | | Firewalling | | |
infratoolbox.txt · Last modified: 2019/01/04 14:58 by sjoerd