SlideShare a Scribd company logo
1 of 48
Download to read offline
Jonathan CLARKE
Continuous auditing
for effective compliance
jcl@normation.com
@jooooooon42
Co-founder &
Chief Product Officer @
Normation – CC-BY-SA
normation.com 2
It’s a continuous world
Continuous *
Normation – CC-BY-SA
normation.com 3
It’s a continuous world
Integration Delivery
Improvement
(agile, devops)
Continuous *
Normation – CC-BY-SA
normation.com 4
It’s a continuous world
adjective
1. without interruption
2. progressive
Synonyms: sustained, round-the-clock, relentless
Continuous
Normation – CC-BY-SA
normation.com 5
Continuous everything
Continuous *
Normation – CC-BY-SA
normation.com
Continuous everything
Continuous
Growth
Continuous *
Normation – CC-BY-SA
normation.com
Continuous everything
Continuous
Growth
Continuously
Connected
Continuous *
Normation – CC-BY-SA
normation.com
Continuous everything
Continuous
Growth
Continuous
Threats
Continuously
Connected
Continuous *
Normation – CC-BY-SA
normation.com
Continuous everything
We need a continuous response
Continuous
Growth
Continuous
Threats
Continuously
Connected
Continuous *
Normation – CC-BY-SA
normation.com
Continuous auditing
for effective compliance
Normation – CC-BY-SA
normation.com
Security policies: what and how?
Industry
regulations
Best
practices
Corporate
regulations
Laws
Rules come from different levels
Normation – CC-BY-SA
normation.com
Security policies: what and how?
Industry
regulations
Best
practices
Corporate
regulations
Laws
Organisational
process
Technical
directives
Rules come from different levels
Normation – CC-BY-SA
normation.com
Security policies: what and how?
Industry
regulations
Best
practices
Corporate
regulations
Laws
Rules come from different levels
Organisational
process
Technical
directives
We can’t automate
humans!
Normation – CC-BY-SA
normation.com
Security policies: what and how?
Industry
regulations
Best
practices
Corporate
regulations
Laws
Organisational
process
Technical
directives
Rules come from different levels
Normation – CC-BY-SA
normation.com
Security policies: what and how?
Examples of security technical directives
1. Auto logout after a
period of inactivity
Normation – CC-BY-SA
normation.com
Security policies: what and how?
Examples of security technical directives
1. Auto logout after a
period of inactivity
2. Password policy
(strength, duration, ...)
Normation – CC-BY-SA
normation.com
Security policies: what and how?
Examples of security technical directives
1. Auto logout after a
period of inactivity
2. Password policy
(strength, duration, ...)
3. No compilers on
production servers
Normation – CC-BY-SA
normation.com
Security policies: what and how?
Examples of security technical directives
1. Auto logout after a
period of inactivity
2. Password policy
(strength, duration, ...)
3. No compilers on
production servers
4. Warning message on
server remote access
Normation – CC-BY-SA
normation.com
Security policies: what and how?
Examples of security technical directives
1. Auto logout after a
period of inactivity
2. Password policy
(strength, duration, ...)
3. No compilers on
production servers
4. Warning message on
server remote access
5. Patch vulnerable
software package
Normation – CC-BY-SA
normation.com
Security policies: what and how?
Examples of security technical directives
1. Auto logout after a
period of inactivity
2. Password policy
(strength, duration, ...)
3. No compilers on
production servers
4. Warning message on
server remote access
5. Patch vulnerable
software package
GOAL
Harden access
Harden access
Avoid potential
exploits
Obey the law
Avoid known
exploits
Normation – CC-BY-SA
normation.com
Security policies: traditional lifecycle
Typical lifecycle of security policy
Policy Apply on
new servers
OK
Regular audits
(3-12 months)
REMEDIATION
Normation – CC-BY-SA
normation.com
Security policies: traditional lifecycle
Typical lifecycle of security policy
Policy Apply on
new servers
OK
Regular audits
(3-12 months)
?
REMEDIATION
DRIFT
Normation – CC-BY-SA
normation.com
Introducing Rudder
Rudder: noun
Piece used for steering a ship.
Used to correct heading when trajectory drifts off course.
Normation – CC-BY-SA
normation.com
Introducing Rudder
Define desired state
Target
Imperative Declarative Install package x
vs
Package x should be installed
Restart service z
vs
Service z should be running
Copy file template y.tpl
vs
File y should contain line abc=def
Normation – CC-BY-SA
normation.com
Introducing Rudder
Rudder’s lifecycle
Define
desired
state
Distribute to
agents
OK
NOK
Check state
locally
OS-Specific
Implementations
Report
Normation – CC-BY-SA
normation.com
Introducing Rudder
Rudder’s continuous lifecycle
Define
desired
state
Distribute to
agents
OK
NOK
Check state
locally
OS-Specific
Implementations
Report
REPEAT
Normation – CC-BY-SA
normation.com
Introducing Rudder
High-level overview
Normation – CC-BY-SA
normation.com
Introducing Rudder
Drill-down to each individual state
Compliant
Normation – CC-BY-SA
normation.com
Building blocks can be used to check anything
Examples of security technical directives
1. Auto logout after a
period of inactivity
2. Password policy
(strength, duration, ...)
3. No compilers on
production servers
4. Warning message on
server remote access
5. Patch vulnerable
software package
GOAL
Harden access
Harden access
Obey the law
Avoid potential
exploits
Avoid known
exploits
Normation – CC-BY-SA
normation.com
Building blocks can be used to check anything
Examples of security technical directives
1. Auto logout after a
period of inactivity
2. Password policy
(strength, duration, ...)
3. No compilers on
production servers
4. Warning message on
server remote access
5. Patch vulnerable
software packages
GOAL
Harden access
Harden access
Obey the law
IMPLEMENTATION
File/Registry
edit
File/Registry
edit
Package
remove
File/Registry
edit
Package
install/update
Avoid potential
exploits
Avoid known
exploits
Normation – CC-BY-SA
normation.com
Building blocks can be used to check anything
Photo CC BY-NC-SA 2.0 from https://www.flickr.com/photos/dillpixel/
Normation – CC-BY-SA
normation.com
Building blocks can be used to check anything
Normation – CC-BY-SA
normation.com
Building blocks can be used to check anything
Examples of security technical directives
1. Auto logout after a
period of inactivity
GOAL
Harden access
IMPLEMENTATION
File/Registry
edit
Normation – CC-BY-SA
normation.com
Avoid local
exploits
Package
remove
Building blocks can be used to check anything
Examples of security technical directives
3. No compilers on
production servers
GOAL IMPLEMENTATION
Normation – CC-BY-SA
normation.com
Building blocks in Rudder (aka generic methods)
Normation – CC-BY-SA
normation.com
Building blocks can be used to check anything
Package
absent
Package
absent
Security directive #2
File
enforce
Service
running
Security directive #3
Package
present
File
edit
Security directive #1
Normation – CC-BY-SA
normation.com
Building blocks can be used to check anything
Package
absent
Package
absent
Security directive #2
File
enforce
Service
running
Security directive #3
Package
present
File
edit
Security directive #1
RULERULE
Corporate security policy Security best practices
Normation – CC-BY-SA
normation.com
Building blocks can be used to check anything
Package
absent
Package
absent
Security directive #2
File
enforce
Service
running
Security directive #3
Package
present
File
edit
Security directive #1
Corporate security policy Security best practices
RULERULE
Normation – CC-BY-SA
normation.com
From continuous auditing to continuous remediation
Continuous auditing
Continuous remediation
Normation – CC-BY-SA
normation.com
From continuous auditing to continuous remediation
Rudder’s continuous lifecycle
Define
desired
state
Distribute to
agents
OK
NOK
Check state
locally
OS-Specific
Implementations
Report
REPEAT
Normation – CC-BY-SA
normation.com
From continuous auditing to continuous remediation
Node by node Policy by policy
Normation – CC-BY-SA
normation.com
From continuous auditing to continuous remediation
Rudder’s lifecycle with remediation
Define
desired
state
Distribute to
agents
OK
NOK
Check state
locally
OS-Specific
Implementations
Report
Remediate
REPEAT
Normation – CC-BY-SA
normation.com
Rudder
Open source
Automation & Compliance
www.rudder-project.org
@RudderProject
Normation – CC-BY-SA
normation.com
A bit more about Rudder
CloudServers
Desktop Embedded/IoT
Mobile
Any scale
Typical deployments
100s-1000s of servers.
Biggest known today is 7000.
2
→
> 10 000
Multi-platform
Metal, virtual, cloud, …
Multi-OS
C agent on UNIX/Linux,
DSC on Windows
Platform support
Normation – CC-BY-SA
normation.com
A bit more about Rudder
API
Automate new nodes, policy,
extract compliance
CLI / Code
Create new configuration templates,
everyday management tasks
Web
Use existing configuration
patterns, observe compliance
Separation of roles
Normation – CC-BY-SA
normation.com
Summary
Continuous IT
Continuous auditing
Continuous remediation
Normation – CC-BY-SA
normation.com
Summary
Fire & Forget
Worry about next thing
Continuous improvement
Thanks for listening!
Any questions?
This presentation is shared under a FLOSS licence, CC-BY-SA,
and available on http://www.slideshare.net/normation/.
Jonathan CLARKE
jcl@normation.com
@jooooooon42
Co-founder &
Chief Product Officer @

More Related Content

Similar to O'Reilly Security - Continuous Auditing For Effective Compliance with Rudder

Improving Quality through Continuous Integration - A case study of CollabNet
Improving Quality through Continuous Integration - A case study of CollabNetImproving Quality through Continuous Integration - A case study of CollabNet
Improving Quality through Continuous Integration - A case study of CollabNet
Venkat Janardhanam, MS, MBA
 
Validation strategies for cloud-based EDCs: more innovation, less effort
Validation strategies for cloud-based EDCs: more innovation, less effortValidation strategies for cloud-based EDCs: more innovation, less effort
Validation strategies for cloud-based EDCs: more innovation, less effort
Veeva Systems
 

Similar to O'Reilly Security - Continuous Auditing For Effective Compliance with Rudder (20)

GrrCon 2014: Security On the Cheap
GrrCon 2014: Security On the CheapGrrCon 2014: Security On the Cheap
GrrCon 2014: Security On the Cheap
 
Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time
 
360° Kubernetes Security: From Source Code to K8s Configuration Security
360° Kubernetes Security: From Source Code to K8s Configuration Security360° Kubernetes Security: From Source Code to K8s Configuration Security
360° Kubernetes Security: From Source Code to K8s Configuration Security
 
Quality Assurance and its Importance in Software Industry by Aman Shukla
Quality Assurance and its Importance in Software Industry by Aman ShuklaQuality Assurance and its Importance in Software Industry by Aman Shukla
Quality Assurance and its Importance in Software Industry by Aman Shukla
 
Introducing a Security Feedback Loop to your CI Pipelines
Introducing a Security Feedback Loop to your CI PipelinesIntroducing a Security Feedback Loop to your CI Pipelines
Introducing a Security Feedback Loop to your CI Pipelines
 
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
 
Agile transformation and scaling
Agile transformation and scalingAgile transformation and scaling
Agile transformation and scaling
 
ClearCase UCM at Loto-Québec
ClearCase UCM at Loto-QuébecClearCase UCM at Loto-Québec
ClearCase UCM at Loto-Québec
 
Improving Quality through Continuous Integration - A case study of CollabNet
Improving Quality through Continuous Integration - A case study of CollabNetImproving Quality through Continuous Integration - A case study of CollabNet
Improving Quality through Continuous Integration - A case study of CollabNet
 
compliance made easy. pass your audits stress-free webinar
compliance made easy. pass your audits stress-free webinarcompliance made easy. pass your audits stress-free webinar
compliance made easy. pass your audits stress-free webinar
 
054 jit and quality management system
054 jit and quality management system054 jit and quality management system
054 jit and quality management system
 
054 JIT and Quality Management System
054 JIT and Quality Management System054 JIT and Quality Management System
054 JIT and Quality Management System
 
Software Security in the Real World w/Kelsey Hightower
Software Security in the Real World w/Kelsey HightowerSoftware Security in the Real World w/Kelsey Hightower
Software Security in the Real World w/Kelsey Hightower
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point Firewalls
 
OpenChain Monthly Meeting 2023-02-21 (North America and Asia)
OpenChain Monthly Meeting 2023-02-21 (North America and Asia)OpenChain Monthly Meeting 2023-02-21 (North America and Asia)
OpenChain Monthly Meeting 2023-02-21 (North America and Asia)
 
OpenChain Monthly Meeting North America - Europe - 2023-02-07
OpenChain Monthly Meeting North America - Europe - 2023-02-07OpenChain Monthly Meeting North America - Europe - 2023-02-07
OpenChain Monthly Meeting North America - Europe - 2023-02-07
 
reliabilitycenteredmaintenancemadesimple.pdf
reliabilitycenteredmaintenancemadesimple.pdfreliabilitycenteredmaintenancemadesimple.pdf
reliabilitycenteredmaintenancemadesimple.pdf
 
Validation strategies for cloud-based EDCs: more innovation, less effort
Validation strategies for cloud-based EDCs: more innovation, less effortValidation strategies for cloud-based EDCs: more innovation, less effort
Validation strategies for cloud-based EDCs: more innovation, less effort
 
2 validation tutorial jntu pharmacy
2 validation tutorial jntu pharmacy2 validation tutorial jntu pharmacy
2 validation tutorial jntu pharmacy
 
20160221 va interconnect_pub
20160221 va interconnect_pub20160221 va interconnect_pub
20160221 va interconnect_pub
 

More from RUDDER

Poss 2017 : gestion des configurations et mise en conformité chez un service ...
Poss 2017 : gestion des configurations et mise en conformité chez un service ...Poss 2017 : gestion des configurations et mise en conformité chez un service ...
Poss 2017 : gestion des configurations et mise en conformité chez un service ...
RUDDER
 
Poss 2017 - la continuité, arme secrète de la gestion du si - cas concret de ...
Poss 2017 - la continuité, arme secrète de la gestion du si - cas concret de ...Poss 2017 - la continuité, arme secrète de la gestion du si - cas concret de ...
Poss 2017 - la continuité, arme secrète de la gestion du si - cas concret de ...
RUDDER
 
POSS 2017 : Comment automatiser son infrastructure quand... on a pas le temps...
POSS 2017 : Comment automatiser son infrastructure quand... on a pas le temps...POSS 2017 : Comment automatiser son infrastructure quand... on a pas le temps...
POSS 2017 : Comment automatiser son infrastructure quand... on a pas le temps...
RUDDER
 
RUDDER - Continuous Configuration (configuration management + continuous audi...
RUDDER - Continuous Configuration (configuration management + continuous audi...RUDDER - Continuous Configuration (configuration management + continuous audi...
RUDDER - Continuous Configuration (configuration management + continuous audi...
RUDDER
 

More from RUDDER (20)

What if configuration management didn't need to be lvl60 in dev?
What if configuration management didn't need to be lvl60 in dev?What if configuration management didn't need to be lvl60 in dev?
What if configuration management didn't need to be lvl60 in dev?
 
Servers compliance: audit, remediation, proof
Servers compliance: audit, remediation, proofServers compliance: audit, remediation, proof
Servers compliance: audit, remediation, proof
 
OSIS 2019 - Qu’apporte l’observabilité à la gestion de configuration ?
OSIS 2019 - Qu’apporte l’observabilité à la gestion de configuration ?OSIS 2019 - Qu’apporte l’observabilité à la gestion de configuration ?
OSIS 2019 - Qu’apporte l’observabilité à la gestion de configuration ?
 
OW2Con - Configurations, do you prove yours?
OW2Con - Configurations, do you prove yours?OW2Con - Configurations, do you prove yours?
OW2Con - Configurations, do you prove yours?
 
The new plugin ecosystem in RUDDER 5.0
The new plugin ecosystem in RUDDER 5.0The new plugin ecosystem in RUDDER 5.0
The new plugin ecosystem in RUDDER 5.0
 
What uses for observing operations of Configuration Management?
What uses for observing operations of Configuration Management?What uses for observing operations of Configuration Management?
What uses for observing operations of Configuration Management?
 
UX challenges of a UI-centric config management tool
UX challenges of a UI-centric config management toolUX challenges of a UI-centric config management tool
UX challenges of a UI-centric config management tool
 
What happened in RUDDER in 2018 and what’s next?
What happened in RUDDER in 2018 and what’s next?What happened in RUDDER in 2018 and what’s next?
What happened in RUDDER in 2018 and what’s next?
 
What is RUDDER and when should I use it?
What is RUDDER and when should I use it?What is RUDDER and when should I use it?
What is RUDDER and when should I use it?
 
Fosdem - Configurations do you prove yours?
Fosdem - Configurations  do you prove yours?Fosdem - Configurations  do you prove yours?
Fosdem - Configurations do you prove yours?
 
L'audit en continu : clé de la conformité démontrable (#POSS 2018)
L'audit en continu : clé de la conformité démontrable (#POSS 2018)L'audit en continu : clé de la conformité démontrable (#POSS 2018)
L'audit en continu : clé de la conformité démontrable (#POSS 2018)
 
Fiabilité et conformité continues en production avec Rudder (#BBOOST 2018)
Fiabilité et conformité continues en production avec Rudder (#BBOOST 2018)Fiabilité et conformité continues en production avec Rudder (#BBOOST 2018)
Fiabilité et conformité continues en production avec Rudder (#BBOOST 2018)
 
Stay up - voyage d'un éditeur de logiciels libres
Stay up - voyage d'un éditeur de logiciels libresStay up - voyage d'un éditeur de logiciels libres
Stay up - voyage d'un éditeur de logiciels libres
 
How we scaled Rudder to 10k, and the road to 50k
How we scaled Rudder to 10k, and the road to 50kHow we scaled Rudder to 10k, and the road to 50k
How we scaled Rudder to 10k, and the road to 50k
 
What's new and what's next in Rudder
What's new and what's next in RudderWhat's new and what's next in Rudder
What's new and what's next in Rudder
 
Poss 2017 : gestion des configurations et mise en conformité chez un service ...
Poss 2017 : gestion des configurations et mise en conformité chez un service ...Poss 2017 : gestion des configurations et mise en conformité chez un service ...
Poss 2017 : gestion des configurations et mise en conformité chez un service ...
 
Poss 2017 - la continuité, arme secrète de la gestion du si - cas concret de ...
Poss 2017 - la continuité, arme secrète de la gestion du si - cas concret de ...Poss 2017 - la continuité, arme secrète de la gestion du si - cas concret de ...
Poss 2017 - la continuité, arme secrète de la gestion du si - cas concret de ...
 
POSS 2017 : Comment automatiser son infrastructure quand... on a pas le temps...
POSS 2017 : Comment automatiser son infrastructure quand... on a pas le temps...POSS 2017 : Comment automatiser son infrastructure quand... on a pas le temps...
POSS 2017 : Comment automatiser son infrastructure quand... on a pas le temps...
 
DevOps D-Day 2017 - Gestion des configurations et mise en conformité chez un ...
DevOps D-Day 2017 - Gestion des configurations et mise en conformité chez un ...DevOps D-Day 2017 - Gestion des configurations et mise en conformité chez un ...
DevOps D-Day 2017 - Gestion des configurations et mise en conformité chez un ...
 
RUDDER - Continuous Configuration (configuration management + continuous audi...
RUDDER - Continuous Configuration (configuration management + continuous audi...RUDDER - Continuous Configuration (configuration management + continuous audi...
RUDDER - Continuous Configuration (configuration management + continuous audi...
 

Recently uploaded

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 

Recently uploaded (20)

HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 

O'Reilly Security - Continuous Auditing For Effective Compliance with Rudder