Sign up for our newsletter! →

Category: Compliance

Landing zones by Jenny Tang
Compliance

What is a Landing Zone?

For most companies shifting to the cloud, the cloud environment and resources needed to set up numerous accounts is complex. The challenge grows when balancing efficiency with security–organizations want complete cloud environments as soon as possible without overlooking key elements such as establishing firewalls or access controls. Addressing this issue begins with a landing zone, a secured and well-architected multi-account cloud environment that acts as a starting point or template allowing organizations to quickly deploy users, accounts, and environments for business needs…

Read More →
HanaByte blog compliant Operating System with HanaByte consultant Simon Abisoye
Compliance

Compliant Operating System (OS)

A compliant operating system is any operating system that meets specific standards established by an entity. For example, if an organization wanted to create a CIS-compliant operating system, it would need to meet the standards set forth by the Center for Information Security, whose sole purpose is to “create confidence” in the connected world. A virtual machine image (VMI or image for short) is a bootable copy of the operating system of a virtual machine in the cloud…

Read More →
Hanabyte blog, HanaByte, FedRAMP, Containers
Compliance

An Overview of Container Security for FedRAMP

In this article, we will explore container vulnerability scanning, frame the vulnerability management requirements in a FedRAMP context, and provide commentary on the new FedRAMP PMO updates to container scanning requirements for cloud service providers (CSPs)…

Read More →
HanaByte blog, password managers, HanaByte, Cybersecurity consultancy
Compliance

Managing with Password Managers

A new age has begun in the digital world: the beginning of the end for passwords. Staff Consultant, Jenny Tang, explores the past and the future of password managers…

Read More →
Hanabyte blog, OSCAL, eric evans,
Automation

An Introduction to OSCAL

Written By An Introduction to OSCAL The Open Security Controls Assessment Language (OSCAL) is a set of data formats that is used to express machine-readable

Read More →
hanabyte blog, CISA, cybersecurity infrastructure security agency, hanabyte
Automation

CISA: A Quick History

Written By Get to Know CISA Perhaps one of the least understood aspects of information technology is cybersecurity. Despite constant reports of major hacks and

Read More →