IT Security: System Hardening with CIS & NSA (Part I)

Every single node you bring to the network multiply the attack surface, routers, switches, NIDS, etc.… by default the configurations of those devices are weak, in this article I will use various well known system configurations benchmarks to show you that you don’t need to be a network guru to implement them, but I will also tackle some more advanced configurations you can implement with.

[Read More]

Powershell: DSC Configuration (Part I)

Desired State Configuration (DSC) automates administrations and make it less an hassle, it decreases the complexity of scripting in windows and Linux systems and increase the speed of iteration, it is basically configuration as code (Infrastructure As Code). This feature is available beginning the release of powershell version 4.

[Read More]