Published in Cloud Security·PinnedAutomating Cybersecurity Metrics (ACM)A series of blog posts on cybersecurity metrics and security automation — GitHub Repo (In Progress): SecurityMetricsAutomation/README.md at main · tradichel/SecurityMetricsAutomation Contribute to tradichel/SecurityMetricsAutomation development by creating an account on GitHub.github.com Walk through the thought process of creating secure Batch Jobs to capture and report on cybersecurity metrics in this blog series.Cybersecurity Metrics14 min readCybersecurity Metrics14 min read
Published in Cloud Security·PinnedCybersecurity Author, Teri RadichelPublications and Presentations by Teri Radichel — Teri Radichel is a professional cybersecurity speaker, trainer, and author. The following are links to some of her past presentations, articles, blog posts, books, and security classes. …Cloud Security4 min readCloud Security4 min read
Published in Cloud Security·Just nowMember-onlyCode Scanning in GitHubUsing GitHub Code Scanning to find vulnerabilities in your code — I got a call at IANS Research about GitHub security so I was reviewing some of the latest information on the topic and decided to set up GitHub Code Scanning. It’s a pretty cool feature that can help you find problems in your code. Whether or not this code scanning…Github Scanning4 min readGithub Scanning4 min read
Published in Cloud Security·20 hours agoAWS SCIM and AWS IAM Identity CenterAWS.151 Taking a look at AWS SCIM options — This is a continuation of my series on Automating Cybersecurity Metrics. In my last post I wrote about SCIM (System for Cross-domain Identity Management). SCIM (System for Cross-domain Identity Management) ACM.150 Automated management of identities across systemsmedium.com Today we’ll take a look at how AWS implements SCIM. AWS SCIM Documentation If you read my last blog post you understand how SCIM works and how to use…Scim9 min readScim9 min read
Published in Bugs That Bite·1 day agoMember-onlyHalf a blog post missing today in MediumYesterday I published a blog post on Medium. I accidentally pushed it out earlier than I intended, but I just left it up anyway. When I logged into Medium this a.m., over half the blog post was missing when I went to edit the post to fix a typo. I…Bug3 min readBug3 min read
Published in Cloud Security·1 day agoSCIM (System for Cross-domain Identity Management)ACM.150 Automated management of identities across systems — Part of my series on Automating Cybersecurity Metrics. The Code. In my last post I provided an overview of how Okta can interact with systems to help with authentication and SSO. Okta for Directory, IdP, and SSO ACM.149 Exploring Okta features that might enable its use as an IdP for user authenticationmedium.com One of the terms I mentioned was SCIM which stands for System for Cross-domain Identity Management. …Scim6 min readScim6 min read
Published in Cloud Security·1 day agoMember-onlyIPv6Stories by Teri Radichel on IPv6 — I have been attacked online for writing stories about how to turn off IPv6. Well, I have been forced into revisiting the AWS protocol as of late. I’m once again reviewing the protocol headers, the next header field, neighbor discovery protocol, and all that fun stuff. IPv6 packet - Wikipediaen.wikipedia.org Interestingly enough, a well-known…Ipv 63 min readIpv 63 min read
Published in Bugs That Bite·1 day agoMedium Errors Viewing Stories From Google LinksI keep getting random errors when searching and verifying that my stories come up in Google and have not been hijacked by RSS readers scraping and reposting the story. Just earlier this a.m. I had a problem viewing this story: Cloud Governance Stories on Cloud Governance by Teri Radichelmedium.com A 500 error generally means that the system serving up…Bug2 min readBug2 min read
Published in Cloud Security·1 day agoWhat do I think about the Chinese Spy Balloon Flying over the US?One cybersecurity professional’s point of view — First of all, it doesn’t really matter what I speculate about the Chinese spy balloon because I do not have all the intelligence available to me that the people who make decisions about it do. My opinions do not matter. I am more curious about it than anything. My first…Spy Balloon6 min readSpy Balloon6 min read
Published in Cloud Security·2 days agoAbout the 5-hour Microsoft OutageWhat self-sabotaging action could take your company down for 5 hours? — This is related to but not exactly part of my series on Automating Cybersecurity Metrics. The Code. …Microsoft Outage13 min readMicrosoft Outage13 min read