Author: Roy Samson This article defines a reference architecture for an integrated (privileged) access management system through describing the following elements in this realm: From a function point-of-view the system most provide the following services: These functionalities translate to the following selection of technical capabilities: Open source software available for building such a solution, respectively:… Continue reading An Open Source (Privileged) Access Management Architecture
Category: Uncategorized
Zettabyte File System (ZFS) Security
Author: Roy Samson This blog post is about setting up the Zettabyte File System (ZFS) with two security topics in the configuration in mind: To understand the commands used in this blog first some context about the hierarchy of storage levels within ZFS, which should help to better understand what the commands are actually doing:… Continue reading Zettabyte File System (ZFS) Security
Open Source Security Software
Author: Roy Samson In this article an overview is provided of open source security software categorized based on the technology domains of the Integrated Security Architecture and Management (ISAM) framework and approach. The software is taxonomized as follow: For a detailed explanation of our ISAM framework and approach is referred to another article which is… Continue reading Open Source Security Software