From AFT to ATO: The Prequel
![Michael Greenlaw HanaByte blog on AFT to ATO](https://www.hanabyte.com/wp-content/uploads/2024/06/IMG_1096-1024x512.png)
The purpose of this installment was originally to continue our journey; however, I was fortunate enough to speak on this topic in-depth at HashiTalks. Due to its technical nature, we thought it better to complete the blog series by taking a step back and providing a discussion about what the tool is, the problems it solves, and how it can empower us.
Hana Doesn’t Trust You: HanaByte and Zero Trust
![HanaByte blog on Zero Trust by Otis Thrasher](https://www.hanabyte.com/wp-content/uploads/2024/04/IMG_1026-1024x512.jpg)
This blog highlights Zero Trust (ZT) and why this framework can be very beneficial for companies looking to differentiate themselves in the modern market when it comes to securing environments.
How SASE Can Benefit You
![Patrick Davis for HanaByte blog on SASE](https://www.hanabyte.com/wp-content/uploads/2024/04/IMG_0972-1024x512.jpg)
Secure Access Service Edge (SASE) is a “cloud architecture model that combines network and security-as-a-service functions together and delivers them as a single cloud service.” (Fortinet Cyberglossary) This solution allows hybrid organizations and their hybrid or remote workers to benefit from corporate security mechanisms anywhere they might be located, securely extending the network edge.
To Build or To Buy…That is The Question
![HanaByte blog, Software, Build or Buy](https://www.hanabyte.com/wp-content/uploads/2024/01/IMG_0930-1024x512.jpg)
Building in house can take a lot of time, and unintentionally introduce more maintenance overhead in the long run. As an example, they may choose instead to purchase a ticketing support solution, thereby getting a quick resolution to their problem and keeping good communication with customers. On the flip side, picture a data analytics company spearheading a project that would require several integrations with various platforms and instead deciding it is simpler to build an in house solution rather than researching, vetting, and purchasing something that ultimately may not have all of the integrations needed and stalls business productivity.
A Look at the Modernizing FedRAMP Memo
![hanabyte blog, FedRAMP, HanaByte](https://www.hanabyte.com/wp-content/uploads/2023/11/IMG_0905-1024x512.jpg)
The White House Office of Management and Budget (OMB) released a draft memorandum with the goals of enhancing the Federal Risk and Authorization Management Program, widely known as FedRAMP. In this blog post, we will go through a brief background on FedRAMP, then dive into the details of the OMB memo, and what it means for the future of FedRAMP.
From AFT to ATO, AWS Native FedRAMP Compliance through Terraform (Part 1)
![hanabyte blog, aws account factory, decoupling security data, snowflake](https://www.hanabyte.com/wp-content/uploads/2023/08/Michael-blog-fedramp-1-1024x512.png)
The complexity of achieving a FedRAMP status in this sea of ever-growing cloud architectures, often led us and customers to the same conclusion: new accounts! Why go through the process of updating the entirety of their current architecture, when we only need resources in the authorization boundary to be compliant?
Beyond the Boundaries, Exploring How You Can Better Protect Your Home
![HanaByte, HashiTalks, Boundary, HashiCorp, HanaByte Blog](https://www.hanabyte.com/wp-content/uploads/2023/07/logan-michael-boundary-of-boundary-1024x512.jpg)
Co-founder and senior consultant, Michael Greenlaw, had the opportunity to present at HashiTalks: Secure in February of 2023. His presentation addressed “HashiPass – Vault and Boundary; Managing Secrets at Home” which was a dissection of the ways that you can be better aware of your security when it comes to access and password management.
Understanding Google Chrome’s Manifest V3
![Google Chrome, Manifest V3, Hanabyte blog, hanabyte](https://www.hanabyte.com/wp-content/uploads/2023/04/Jenny-blog-popup-conflict-1-1-e1687358217512-1024x522.png)
Written By Understanding Google Chrome’s Manifest V3 Google Chrome is a cross-platform web browser developed by Google in 2008 for accessing the World Wide Web and running Web-based applications and is currently dominating as the most popular web browser at 65.84% market share. Google Chrome extensions are one of the most beloved and implemented features […]
An Introduction to OSCAL
![Hanabyte blog, OSCAL, eric evans,](https://www.hanabyte.com/wp-content/uploads/2023/04/Eric_Blog_Image-e1687357739695-1024x595.png)
Written By An Introduction to OSCAL The Open Security Controls Assessment Language (OSCAL) is a set of data formats that is used to express machine-readable representations of control catalogs, baselines, and security documentation. It is important to recognize that OSCAL is not a tool, but instead a language. Using OSCAL allows us a data interchange […]
CISA: A Quick History
![hanabyte blog, CISA, cybersecurity infrastructure security agency, hanabyte](https://www.hanabyte.com/wp-content/uploads/2023/03/Simon_Blog_Image-1024x512.png)
Written By Get to Know CISA Perhaps one of the least understood aspects of information technology is cybersecurity. Despite constant reports of major hacks and data breaches affecting millions of Americans, there are still organizations that either practice poor security habits/protocols or neglect responsibility altogether. At one point, it could be argued this even extended […]