DEV Community

# compliance

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
New AWS Config Rules - LambdaLess and rusty

New AWS Config Rules - LambdaLess and rusty

16
Comments 2
8 min read
About Optimizing for Speed: How to do complete AWS Security&Compliance Scans in 5 minutes

About Optimizing for Speed: How to do complete AWS Security&Compliance Scans in 5 minutes

14
Comments
9 min read
Releasing code in large corporations is slow - and there is a good reason for it

Releasing code in large corporations is slow - and there is a good reason for it

13
Comments 3
4 min read
Amazon Inspector can now scan AWS Lambda Functions

Amazon Inspector can now scan AWS Lambda Functions

13
Comments 4
3 min read
CSPM, CIEM, CWPP, and CNAPP: Guess who in cloud security landscape

CSPM, CIEM, CWPP, and CNAPP: Guess who in cloud security landscape

13
Comments
5 min read
Using ARMO Kubescape to scale kubernetes security adoption across an enterprise

Using ARMO Kubescape to scale kubernetes security adoption across an enterprise

10
Comments
14 min read
Understanding the Shared Responsibility Model in AWS

Understanding the Shared Responsibility Model in AWS

8
Comments
4 min read
Automating Management of Google Compute Engine VM fleets at scale

Automating Management of Google Compute Engine VM fleets at scale

8
Comments 1
15 min read
Send AWS Config Notification to Slack

Send AWS Config Notification to Slack

7
Comments
2 min read
What a CPA is doing in this Community? - Part I

What a CPA is doing in this Community? - Part I

7
Comments 1
6 min read
Hiring employees in foreign country benchmark

Hiring employees in foreign country benchmark

6
Comments
1 min read
Managing compliance the Serverless way with AWS Config custom rules

Managing compliance the Serverless way with AWS Config custom rules

6
Comments
5 min read
Level up compliance confidence with AWS Config

Level up compliance confidence with AWS Config

5
Comments
3 min read
How Courier Became SOC 2 Type 2 Compliant

How Courier Became SOC 2 Type 2 Compliant

5
Comments
5 min read
De-scoping Your AWS Services from Data Residency Requirements

De-scoping Your AWS Services from Data Residency Requirements

5
Comments
7 min read
SBOM with VulnerableCode.io

SBOM with VulnerableCode.io

5
Comments
4 min read
SBOM with FOSSology

SBOM with FOSSology

4
Comments
3 min read
Practical steps using AWS Organization

Practical steps using AWS Organization

4
Comments 1
3 min read
How Courier Became HIPAA Compliant

How Courier Became HIPAA Compliant

4
Comments
4 min read
Are You Spending Too Much on DevOps?

Are You Spending Too Much on DevOps?

4
Comments
5 min read
Ensuring Compliance with Custom AWS Config Rules

Ensuring Compliance with Custom AWS Config Rules

4
Comments
5 min read
Scan Terraform with OPA

Scan Terraform with OPA

4
Comments
3 min read
How to get SOC 2 Certified

How to get SOC 2 Certified

4
Comments
2 min read
The Essential PCI Compliance Checklist

The Essential PCI Compliance Checklist

3
Comments 1
7 min read
What is a Data Subject Access Request (DSAR) And Why You Should Care?

What is a Data Subject Access Request (DSAR) And Why You Should Care?

3
Comments
5 min read
Governance with AWS Config

Governance with AWS Config

3
Comments
2 min read
How to get ready for the German Supply Chain Due Diligence Act (GSDDA) requirements?

How to get ready for the German Supply Chain Due Diligence Act (GSDDA) requirements?

3
Comments
2 min read
Our SOC 2 compliance journey

Our SOC 2 compliance journey

3
Comments
7 min read
How a Data Privacy API Abstracts and Simplifies Privacy and Compliance

How a Data Privacy API Abstracts and Simplifies Privacy and Compliance

3
Comments
7 min read
Detecting suspicious login activity

Detecting suspicious login activity

3
Comments
7 min read
The Best Ways of Staying GDPR Compliant

The Best Ways of Staying GDPR Compliant

2
Comments
4 min read
Build license management into your pipelines

Build license management into your pipelines

2
Comments
6 min read
Write AWS Config rules using cfn-guard

Write AWS Config rules using cfn-guard

2
Comments
3 min read
AWS Security Stories #03: CIS Controls

AWS Security Stories #03: CIS Controls

2
Comments
5 min read
Reducing Risk by Automating Security with Continuous Delivery

Reducing Risk by Automating Security with Continuous Delivery

2
Comments
6 min read
Managing Compliance with Continuous Delivery

Managing Compliance with Continuous Delivery

2
Comments
6 min read
Achieving Cloud Native Security and Compliance with Teleport

Achieving Cloud Native Security and Compliance with Teleport

2
Comments
12 min read
4 Steps to Auto Remediate Account level S3 Access Settings

4 Steps to Auto Remediate Account level S3 Access Settings

2
Comments
3 min read
RudderStack Secures SOC 2 Type II Certification

RudderStack Secures SOC 2 Type II Certification

2
Comments
1 min read
Solving The Austin Problem with a Data Privacy Vault

Solving The Austin Problem with a Data Privacy Vault

2
Comments
9 min read
Responsibilities of a modern CISO

Responsibilities of a modern CISO

1
Comments
6 min read
6 controles básicos de segurança do CIS para adotar na sua vida

6 controles básicos de segurança do CIS para adotar na sua vida

1
Comments
4 min read
Hottest Security Startup with Open-Source Spirit

Hottest Security Startup with Open-Source Spirit

1
Comments 2
1 min read
GraphQL and Government Technology

GraphQL and Government Technology

1
Comments
4 min read
The Software Bill of Materials and Software Development

The Software Bill of Materials and Software Development

1
Comments
5 min read
U.S Sales Tax: The Nightmare of Scaling a SaaS Business

U.S Sales Tax: The Nightmare of Scaling a SaaS Business

1
Comments
5 min read
PCI Compliance in Public Cloud: Practical Considerations and Challenges

PCI Compliance in Public Cloud: Practical Considerations and Challenges

1
Comments
6 min read
DuploCloud Case Study: Customer Achieves Frictionless Migration to AWS

DuploCloud Case Study: Customer Achieves Frictionless Migration to AWS

1
Comments
6 min read
SBOM with Checkov

SBOM with Checkov

1
Comments
3 min read
Deeper dive into SBOM

Deeper dive into SBOM

1
Comments
3 min read
GRC in Cyber Security: 5 Reasons to Consolidate Cyber Security, Governance, Risk, Compliance, and Insurance

GRC in Cyber Security: 5 Reasons to Consolidate Cyber Security, Governance, Risk, Compliance, and Insurance

1
Comments
4 min read
Syncfusion’s Bold Reports is Now SOC 2 Type 2 Compliance Certified!

Syncfusion’s Bold Reports is Now SOC 2 Type 2 Compliance Certified!

1
Comments
2 min read
How to generate an SBOM for JavaScript and Node.js applications

How to generate an SBOM for JavaScript and Node.js applications

1
Comments
11 min read
Enhancing S3 Bucket Security: Unleashing the Power of Dual-Layer Server-Side Encryption

Enhancing S3 Bucket Security: Unleashing the Power of Dual-Layer Server-Side Encryption

1
Comments
3 min read
Kubernetes add-on compliance with Projectsveltos and Lua

Kubernetes add-on compliance with Projectsveltos and Lua

1
Comments
4 min read
GDPR Compliance: Consent Management with SlashID

GDPR Compliance: Consent Management with SlashID

1
Comments
3 min read
Understanding the New SEC Rules for Disclosing Cybersecurity Incidents

Understanding the New SEC Rules for Disclosing Cybersecurity Incidents

1
Comments
6 min read
Deciphering the EU's AI Act - A Technical Perspective

Deciphering the EU's AI Act - A Technical Perspective

1
Comments
2 min read
The Complete Guide to Passing an ISO 27001 Audit

The Complete Guide to Passing an ISO 27001 Audit

1
Comments
9 min read
Compliance Enforcement with Open Source Puppet

Compliance Enforcement with Open Source Puppet

1
Comments
5 min read
loading...