Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
security [2019/05/05 14:24]
mgunderloy
security [2019/07/28 08:59] (current)
mgunderloy
Line 1: Line 1:
 ====== Security ====== ====== Security ======
 +
 +===== Threat Modeling =====
  
   * [[https://​insights.sei.cmu.edu/​sei_blog/​2018/​12/​threat-modeling-12-available-methods.html|Threat Modeling: 12 Available Methods ]]   * [[https://​insights.sei.cmu.edu/​sei_blog/​2018/​12/​threat-modeling-12-available-methods.html|Threat Modeling: 12 Available Methods ]]
 +
 +===== Monitoring =====
 +
   * [[https://​aws.amazon.com/​blogs/​aws/​aws-heroes-putting-aws-security-services-to-work-for-you/​|Putting AWS Security Services to Work for You]]   * [[https://​aws.amazon.com/​blogs/​aws/​aws-heroes-putting-aws-security-services-to-work-for-you/​|Putting AWS Security Services to Work for You]]
 +
 +===== On-Call/​Incident Management =====
 +
   * [[https://​www.ryanfrantz.com/​posts/​when-does-an-investigation-end.html|When Does an Investigation End?]] - Thinking about incident follow-up.   * [[https://​www.ryanfrantz.com/​posts/​when-does-an-investigation-end.html|When Does an Investigation End?]] - Thinking about incident follow-up.
 +  * [[https://​dev.to/​molly_struve/​making-on-call-not-suck-490|Making On-Call Not Suck]]
 +  * [[https://​lethain.com/​dont-follow-the-sun/​|Don'​t follow the sun.]]
  • security.txt
  • Last modified: 2019/07/28 08:59
  • by mgunderloy