DEV Community

# compliance

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How will NIS2 affect European Industries

How will NIS2 affect European Industries

Comments
8 min read
Guia super Resumido do PCI-DSS

Guia super Resumido do PCI-DSS

Comments
6 min read
Strengthening Security and Compliance in AWS Cloud Services & The Essential Role of AI Verification.

Strengthening Security and Compliance in AWS Cloud Services & The Essential Role of AI Verification.

Comments
4 min read
Boosting Incident Response Capabilities with Azure: A Practical Guide

Boosting Incident Response Capabilities with Azure: A Practical Guide

1
Comments
6 min read
Future Trends in Video KYC and Financial Security

Future Trends in Video KYC and Financial Security

1
Comments
4 min read
Software: Our SOC 2 journey

Software: Our SOC 2 journey

Comments
4 min read
From Policy to Compliance: Unpacking the Key Annexures of ISO 27001

From Policy to Compliance: Unpacking the Key Annexures of ISO 27001

1
Comments
3 min read
Working Towards Compliance through ITGC !

Working Towards Compliance through ITGC !

5
Comments 1
2 min read
10 Dimensions of Python Static Analysis

10 Dimensions of Python Static Analysis

1
Comments
19 min read
GxP Compliance: Leveraging Test Automation for Validation and Security

GxP Compliance: Leveraging Test Automation for Validation and Security

Comments
4 min read
Stay Compliant, Mitigate Risks: Understanding AML and KYC as a technologist

Stay Compliant, Mitigate Risks: Understanding AML and KYC as a technologist

12
Comments
7 min read
Getting started with Drata.com APIs

Getting started with Drata.com APIs

Comments
3 min read
AWS Security Hub

AWS Security Hub

Comments
4 min read
How to Plan for Compliance for your Product?

How to Plan for Compliance for your Product?

Comments
11 min read
Opt-In VS Opt-Out

Opt-In VS Opt-Out

4
Comments
2 min read
The European Accessibility Act != EN 301 549

The European Accessibility Act != EN 301 549

8
Comments 2
3 min read
8 Essential Components Every Dynamic Risk Assessment Must Have

8 Essential Components Every Dynamic Risk Assessment Must Have

Comments
7 min read
Responsibilities of a modern CISO

Responsibilities of a modern CISO

2
Comments
6 min read
Compliance Enforcement with Open Source Puppet

Compliance Enforcement with Open Source Puppet

1
Comments
5 min read
Don't Go Rogue: Leverage Frameworks for Effective Cloud Security Prioritization

Don't Go Rogue: Leverage Frameworks for Effective Cloud Security Prioritization

Comments
2 min read
The Complete Guide to Passing an ISO 27001 Audit

The Complete Guide to Passing an ISO 27001 Audit

1
Comments
9 min read
AWS Config para anĂĄlisis de seguridad

AWS Config para anĂĄlisis de seguridad

Comments
1 min read
How to assure compliance of your Ansible Playbooks

How to assure compliance of your Ansible Playbooks

Comments
4 min read
How to generate a list of compliance labels for all your gitlab repos

How to generate a list of compliance labels for all your gitlab repos

Comments
1 min read
The Essential Guide to SaaS Compliance

The Essential Guide to SaaS Compliance

Comments
6 min read
Solving The Austin Problem with a Data Privacy Vault

Solving The Austin Problem with a Data Privacy Vault

2
Comments
9 min read
Deciphering the EU's AI Act - A Technical Perspective

Deciphering the EU's AI Act - A Technical Perspective

1
Comments
2 min read
Understanding the New SEC Rules for Disclosing Cybersecurity Incidents

Understanding the New SEC Rules for Disclosing Cybersecurity Incidents

1
Comments
6 min read
GDPR Compliance: Consent Management with SlashID

GDPR Compliance: Consent Management with SlashID

1
Comments
3 min read
The InfoSec Guide to HIPAA Compliance

The InfoSec Guide to HIPAA Compliance

Comments
10 min read
Garantindo a proteção de dados financeiros com PCI-DSS

Garantindo a proteção de dados financeiros com PCI-DSS

Comments
2 min read
De-scoping Your AWS Services from Data Residency Requirements

De-scoping Your AWS Services from Data Residency Requirements

4
Comments
7 min read
Ensuring Compliance with Custom AWS Config Rules

Ensuring Compliance with Custom AWS Config Rules

5
Comments
5 min read
Kubernetes add-on compliance with Projectsveltos and Lua

Kubernetes add-on compliance with Projectsveltos and Lua

1
Comments
4 min read
4 Steps to Auto Remediate Account level S3 Access Settings

4 Steps to Auto Remediate Account level S3 Access Settings

2
Comments
3 min read
Enhancing S3 Bucket Security: Unleashing the Power of Dual-Layer Server-Side Encryption

Enhancing S3 Bucket Security: Unleashing the Power of Dual-Layer Server-Side Encryption

1
Comments
3 min read
How to generate an SBOM for JavaScript and Node.js applications

How to generate an SBOM for JavaScript and Node.js applications

4
Comments
11 min read
Build license management into your pipelines

Build license management into your pipelines

3
Comments
6 min read
GRC in Cyber Security: 5 Reasons to Consolidate Cyber Security, Governance, Risk, Compliance, and Insurance

GRC in Cyber Security: 5 Reasons to Consolidate Cyber Security, Governance, Risk, Compliance, and Insurance

1
Comments
4 min read
Write AWS Config rules using cfn-guard

Write AWS Config rules using cfn-guard

3
Comments
3 min read
Releasing code in large corporations is slow - and there is a good reason for it

Releasing code in large corporations is slow - and there is a good reason for it

13
Comments 3
4 min read
Amazon Inspector can now scan AWS Lambda Functions

Amazon Inspector can now scan AWS Lambda Functions

13
Comments 4
3 min read
SBOM with FOSSology

SBOM with FOSSology

6
Comments
3 min read
SBOM with VulnerableCode.io

SBOM with VulnerableCode.io

5
Comments
4 min read
Our SOC 2 compliance journey

Our SOC 2 compliance journey

3
Comments
7 min read
How a Data Privacy API Abstracts and Simplifies Privacy and Compliance

How a Data Privacy API Abstracts and Simplifies Privacy and Compliance

3
Comments
7 min read
Practical steps using AWS Organization

Practical steps using AWS Organization

4
Comments 1
3 min read
Scan Terraform with OPA

Scan Terraform with OPA

5
Comments
3 min read
AWS Security Stories #03: CIS Controls

AWS Security Stories #03: CIS Controls

2
Comments
5 min read
New AWS Config Rules - LambdaLess and rusty

New AWS Config Rules - LambdaLess and rusty

16
Comments 2
8 min read
Understanding the Shared Responsibility Model in AWS

Understanding the Shared Responsibility Model in AWS

8
Comments
4 min read
CSPM, CIEM, CWPP, and CNAPP: Guess who in cloud security landscape

CSPM, CIEM, CWPP, and CNAPP: Guess who in cloud security landscape

13
Comments
5 min read
Managing compliance the Serverless way with AWS Config custom rules

Managing compliance the Serverless way with AWS Config custom rules

6
Comments
5 min read
About Optimizing for Speed: How to do complete AWS Security&Compliance Scans in 5 minutes

About Optimizing for Speed: How to do complete AWS Security&Compliance Scans in 5 minutes

14
Comments
9 min read
Managing Compliance with Continuous Delivery

Managing Compliance with Continuous Delivery

2
Comments
6 min read
How Courier Became SOC 2 Type 2 Compliant

How Courier Became SOC 2 Type 2 Compliant

5
Comments
5 min read
Using ARMO Kubescape to scale kubernetes security adoption across an enterprise

Using ARMO Kubescape to scale kubernetes security adoption across an enterprise

10
Comments
14 min read
The Essential PCI Compliance Checklist

The Essential PCI Compliance Checklist

3
Comments 1
7 min read
RudderStack Secures SOC 2 Type II Certification

RudderStack Secures SOC 2 Type II Certification

3
Comments
1 min read
Reducing Risk by Automating Security with Continuous Delivery

Reducing Risk by Automating Security with Continuous Delivery

2
Comments
6 min read
loading...