Security vulnerability database inclusive of CVEs and GitHub originated security advisories from the world of open source software.
Обновлено 2024-11-21 04:31:52 +03:00
🔒 Specification for end-to-end encryption used by Nextcloud sync & mobile apps
Обновлено 2024-11-07 10:01:57 +03:00
IPE is a Linux Security Module (LSM), which allows for a configurable policy to enforce integrity requirements on the whole system. IPE builds on concepts and implementations like loadpin, as well as leveraging existing modules like dm-verity to simplify enforcing integrity requirements on systems that require security constraints and\or compliance reasons. IPE is intended to complement IMA and they can work in conjunction with each other. IPE provides a policy that allows owners of the system to easily specify integrity requirements and uses dm-verity signatures to simplify the authentication of allowed objects like authorized code and data.
Обновлено 2024-04-24 02:40:14 +03:00
Secure VNET Injection of APIM Surviving Force-Tunneling
Обновлено 2023-06-12 21:56:29 +03:00
Build connected security experiences. Starting point to share code, libraries, notebooks, workbooks, and queries for connected experiences
Обновлено 2023-05-01 03:30:39 +03:00
SONiC - Security process and issue track
Обновлено 2023-03-28 19:47:26 +03:00
Terraform module for managing Azure Application Security Groups
Обновлено 2023-03-28 19:45:11 +03:00
Version 1 of Technical Best Practices of Azure Databricks based on real world Customer and Technical SME inputs
azure
python
security
spark
performance
deployment
provisioning
azuredatabricks
grafana
performance-monitoring
scalability
Обновлено 2023-03-28 19:44:37 +03:00
Security configuration is complex. With thousands of group policies available in Windows, choosing the “best” setting is difficult. It’s not always obvious which permutations of policies are required to implement a complete scenario, and there are often unintended consequences of some security lockdowns. The SECCON Baselines divide configuration into Productivity Devices and Privileged Access Workstations. This document will focus on Productivity Devices (SECCON 5, 4, and 3). Microsoft’s current guidance on Privileged Access Workstations can be found at http://aka.ms/cyberpaw and as part of the Securing Privileged Access roadmap found at http://aka.ms/privsec.
Обновлено 2022-11-28 22:10:26 +03:00
Azure インフラストラクチャ:ガバナンス強化とセキュリティ対策ガイド
Обновлено 2022-08-22 07:52:44 +03:00
Repository of the original Japanese document "App Service: A Guide to Addressing Security Threats".
Обновлено 2022-05-26 04:29:54 +03:00
データ基盤で求められるセキュリティと、Microsoft Defender for SQL を使った効果的なセキュリティ対策について紹介
Обновлено 2022-05-26 04:23:41 +03:00
FTA Live Azure Security Center Delivery
Обновлено 2022-01-13 18:41:30 +03:00
Обновлено 2021-12-09 20:52:46 +03:00
Microsoft US Security Research
Обновлено 2021-09-13 17:24:57 +03:00
Обновлено 2021-08-03 15:32:39 +03:00
Обновлено 2020-05-16 15:20:57 +03:00
MCW Azure security and management
Обновлено 2019-07-01 20:36:14 +03:00
INACTIVE - http://mzl.la/ghe-archive - Below you will be given an opportunity to submit your idea for a tool that makes people more aware of their privacy and security online.
Обновлено 2016-06-08 22:37:50 +03:00