Tagged articles
265 articles
Page 3 of 3
Open Source Linux
Open Source Linux
Nov 16, 2020 · Information Security

What Is a Bastion Host and Why Your Organization Needs One

This article explains what a bastion host (jump server) is, its design principles, core functions, authentication methods, deployment options, and the value it brings to IT operations, helping organizations improve security, auditability, and compliance while reducing operational risk.

access controlaudit
0 likes · 10 min read
What Is a Bastion Host and Why Your Organization Needs One
Architects Research Society
Architects Research Society
Oct 23, 2020 · Information Security

Understanding Data Security Diagrams and Their Role in Enterprise Architecture

The article explains how data security diagrams map which participants can access specific enterprise data, discusses best practices such as using focused participant‑centric or external‑access diagrams, presents example tables and UML/BPMN and Archimate visualizations, and highlights their role in compliance and trust management.

TOGAFaccess controlcompliance
0 likes · 5 min read
Understanding Data Security Diagrams and Their Role in Enterprise Architecture
New Oriental Technology
New Oriental Technology
Oct 23, 2020 · Backend Development

Nginx: A Comprehensive Guide

This article provides an in-depth overview of Nginx, covering its introduction, architecture, and various modules, including real IP and rewrite modules, with practical examples and configuration details.

AuthenticationBackend DevelopmentHTTP server
0 likes · 13 min read
Nginx: A Comprehensive Guide
Alibaba Cloud Native
Alibaba Cloud Native
Oct 14, 2020 · Cloud Native

How Fluid v0.3 Accelerates Kubernetes PVC Access and Enhances Data Security

Fluid v0.3, the open‑source cloud‑native data acceleration platform, introduces PVC and HostPath acceleration, fine‑grained dataset permission controls, and built‑in parameter optimizations, delivering over 20% faster AI training while simplifying configuration for diverse storage back‑ends.

Cloud NativeData AccelerationFluid
0 likes · 8 min read
How Fluid v0.3 Accelerates Kubernetes PVC Access and Enhances Data Security
NetEase Cloud Music Tech Team
NetEase Cloud Music Tech Team
Sep 24, 2020 · Information Security

Permission System Design and RBAC Implementation Practice in Backend Applications

The article explains permission system fundamentals, classifies page, function, and data permissions, compares DAC, MAC, RBAC, and ABAC models, details RBAC variants, and demonstrates a practical Egg framework plugin implementation that configures roles, resources, and data rules to achieve flexible, secure backend access control.

Backend SecurityData PermissionsEgg Framework
0 likes · 10 min read
Permission System Design and RBAC Implementation Practice in Backend Applications
Top Architect
Top Architect
Aug 20, 2020 · Information Security

Understanding Permission Control in Frontend‑Backend Separation Architecture

The article explains how permission control in a front‑back separation architecture defines resources and permissions, outlines the distinct responsibilities of frontend and backend in enforcing access, and provides practical implementation examples with component tags and Java interceptor code.

Backend SecurityComponent DesignJava interceptor
0 likes · 6 min read
Understanding Permission Control in Frontend‑Backend Separation Architecture
Laravel Tech Community
Laravel Tech Community
Aug 8, 2020 · Information Security

Understanding RBAC Permission Models and Authorization Processes

This article explains the core RBAC0 model and its extensions (RBAC1, RBAC2, RBAC3), discusses user groups, organizations and positions, and outlines manual and approval-based authorization workflows along with a sample database schema for implementing role‑based access control in complex systems.

AuthorizationPermission ModelRBAC
0 likes · 10 min read
Understanding RBAC Permission Models and Authorization Processes
Liangxu Linux
Liangxu Linux
Aug 2, 2020 · Information Security

Why the Word “User” Is a Hidden Security Risk in Software Design

The article explains how the vague term “user” leads to design flaws and security vulnerabilities across systems like ticket‑booking platforms, Unix, and SaaS, and argues that precise terminology and early conceptual planning can prevent costly rework.

access controlbest practicessoftware design
0 likes · 8 min read
Why the Word “User” Is a Hidden Security Risk in Software Design
21CTO
21CTO
Jul 22, 2020 · Information Security

Why RESTful API Security Matters and How to Protect Your APIs

This article explains the critical importance of securing RESTful APIs—covering data protection, DoS risks, and business impact—and outlines practical measures such as authentication, API keys, access control, rate limiting, and input validation with code examples.

API SecurityAuthenticationRESTful API
0 likes · 8 min read
Why RESTful API Security Matters and How to Protect Your APIs
Top Architect
Top Architect
Jul 2, 2020 · Information Security

Designing Dynamic Role‑Based Permission Management for Front‑End/Back‑End Separated Admin Systems

The article presents a comprehensive approach to dynamic role‑based permission management in a front‑end/back‑end separated admin system, covering user‑role‑page‑function relationships, database schema design, front‑end menu rendering, route guarding, fine‑grained function control, and backend API authorization.

access controlfrontendpermission
0 likes · 10 min read
Designing Dynamic Role‑Based Permission Management for Front‑End/Back‑End Separated Admin Systems
Architecture Digest
Architecture Digest
Apr 4, 2020 · Information Security

Token Classification and Hierarchical Design for Identity Authentication in Multi‑Client Systems

This article analyses various authentication scenarios in multi‑client information systems, classifies token types such as password, session, access, and QR‑code tokens, compares their natural and controllable attributes, and proposes a four‑layer hierarchical architecture to improve security and manageability.

access controlidentitymulti-client
0 likes · 10 min read
Token Classification and Hierarchical Design for Identity Authentication in Multi‑Client Systems
Architecture Digest
Architecture Digest
Mar 19, 2020 · Frontend Development

Design and Implementation of Permission Control in Frontend‑Backend Separation Architecture

This article explains how permission control is re‑designed for front‑end/back‑end separated applications, defining resources and permissions, outlining the distinct responsibilities of front‑end routing and component rendering versus back‑end API validation, and providing practical implementation examples in React and Java.

Backend DevelopmentComponent DesignJava
0 likes · 7 min read
Design and Implementation of Permission Control in Frontend‑Backend Separation Architecture
Tencent Tech
Tencent Tech
Feb 28, 2020 · Information Security

How to Safeguard Enterprise Data in the Cloud: Practical Strategies

This article explains why data security is vital for businesses, outlines common technical, process and human threats, and provides actionable cloud‑based measures—including backup strategies, snapshot usage, permission management, data classification, and encryption—to protect enterprise data throughout its lifecycle.

BackupCloud Servicesaccess control
0 likes · 13 min read
How to Safeguard Enterprise Data in the Cloud: Practical Strategies
Architecture Digest
Architecture Digest
Jan 22, 2020 · Information Security

Permission System Design and RBAC Models

This article explains the fundamentals of permission system design, covering the core RBAC0 model, its extensions RBAC1, RBAC2, RBAC3, as well as user groups, organizational structures, authorization processes, database schema considerations, and common implementation frameworks for secure backend access control.

RBACRole Hierarchyaccess control
0 likes · 12 min read
Permission System Design and RBAC Models
FunTester
FunTester
Jan 9, 2020 · Information Security

Essential Security Checklist for Web Apps: From Unit Tests to Encryption

This article presents a practical checklist for securing web applications, covering unit testing, access control, change tracking, admin privilege management, least‑privilege principles, remote redundancy, monitoring, encryption, automated security scanning, and SQL injection prevention, offering actionable guidance for developers.

Web Securityaccess controlencryption
0 likes · 7 min read
Essential Security Checklist for Web Apps: From Unit Tests to Encryption
Programmer DD
Programmer DD
Dec 17, 2019 · Information Security

Understanding RBAC: Role‑Based Access Control Models for Secure Spring Applications

This article explains why Role‑Based Access Control (RBAC) is essential for modern applications, outlines the four RBAC model variants (RBAC0‑RBAC3), clarifies core concepts such as users, roles, sessions and permissions, and shows how RBAC improves scalability and security in Spring Security projects.

RBACRole-Based Access ControlSecurity Architecture
0 likes · 9 min read
Understanding RBAC: Role‑Based Access Control Models for Secure Spring Applications
Programmer DD
Programmer DD
Nov 12, 2019 · Backend Development

Designing Scalable Role‑Based Access Control: A Complete Database Blueprint

This article explains the fundamentals of role‑based access control, introduces user groups and role groups for batch authorization, and provides a detailed data‑dictionary with database tables and diagrams to help developers design a flexible, extensible permission system for large applications.

BackendDatabase designRBAC
0 likes · 7 min read
Designing Scalable Role‑Based Access Control: A Complete Database Blueprint
转转QA
转转QA
Oct 9, 2019 · Information Security

Understanding Security Testing: SQL Injection, XSS, CSRF, and Permission Vulnerabilities

This article explains the differences between functional and security testing, introduces common web vulnerabilities such as SQL injection, cross‑site scripting (XSS), and cross‑site request forgery (CSRF), provides concrete code examples, and offers practical tips for detecting and preventing these issues.

CSRFSQL injectionWeb Vulnerabilities
0 likes · 12 min read
Understanding Security Testing: SQL Injection, XSS, CSRF, and Permission Vulnerabilities
Qunar Tech Salon
Qunar Tech Salon
Aug 6, 2019 · Information Security

Data Security Construction at Qunar: Practices and Experience

This article describes Qunar's comprehensive data security framework, covering data classification, warehouse access control, permission compliance, encryption, leakage detection, and the supporting institutional policies that together enable a small security team to protect large‑scale business data.

Qunaraccess controldata classification
0 likes · 13 min read
Data Security Construction at Qunar: Practices and Experience
Java Captain
Java Captain
Jun 21, 2019 · Information Security

Understanding Permissions: Definitions, Design Principles, Role Relationships, and Security Frameworks

This article explores the concept of permissions, distinguishes their noun and verb attributes, outlines minimal‑privilege and data‑abstraction principles, examines server‑side versus client‑side access control, discusses role‑based access control and table design, and compares common Java security frameworks.

Permission DesignRBACaccess control
0 likes · 11 min read
Understanding Permissions: Definitions, Design Principles, Role Relationships, and Security Frameworks
Efficient Ops
Efficient Ops
Jun 10, 2019 · Operations

Boost Nginx Security: Essential Configurations You Must Apply

This article outlines practical Nginx security settings—including hiding version info, enabling HTTPS, configuring allow/deny lists, basic authentication, request method restrictions, user‑agent blocking, hotlink protection, connection limits, buffer size tweaks, timeout adjustments, and secure response headers—to help harden your web server against common attacks.

ConfigurationHTTPSNGINX
0 likes · 11 min read
Boost Nginx Security: Essential Configurations You Must Apply
Java Captain
Java Captain
Jun 3, 2019 · Information Security

Designing Role-Based Access Control and Permission Data Model

This article explains the fundamentals of role‑based access control, how roles and permissions are structured, the use of user groups to simplify large‑scale authorizations, and presents a comprehensive database schema—including tables for users, roles, permissions, resources, and logs—to support flexible and extensible permission management.

Database designPermission modelingRBAC
0 likes · 6 min read
Designing Role-Based Access Control and Permission Data Model
21CTO
21CTO
May 31, 2019 · Information Security

Why Using the Word “User” Can Sabotage Your Software Design

The article explains how the vague term “User” leads to poor requirements, hidden security flaws like the Confused Deputy problem, and costly redesigns, urging developers to adopt precise terminology such as “team” and “member” early in a project.

Terminologyaccess controlsoftware design
0 likes · 8 min read
Why Using the Word “User” Can Sabotage Your Software Design
Java Captain
Java Captain
Apr 22, 2019 · Information Security

Token‑Based Authentication: Classification, Scenarios, and Hierarchical Design

This article analyses various client‑side authentication scenarios, classifies tokens into password, session, and API categories, compares their natural and controllable attributes, and proposes a four‑layer hierarchical token architecture to improve security, usability, and decoupling across multiple platforms.

AuthenticationSecurityToken
0 likes · 13 min read
Token‑Based Authentication: Classification, Scenarios, and Hierarchical Design
ITPUB
ITPUB
Feb 15, 2019 · Information Security

How Meituan Built a Scalable Data Security Platform with a Plug‑in Permission Model

This article details Meituan's data security platform architecture, explaining why traditional ACL and RBAC models fall short for data‑level control, how a new hierarchical permission model and plug‑in services were designed, and the microservice, caching, and high‑availability techniques used to support flexible, high‑QPS data governance across multiple business lines.

MicroservicesPermission Modelaccess control
0 likes · 18 min read
How Meituan Built a Scalable Data Security Platform with a Plug‑in Permission Model
Meituan Technology Team
Meituan Technology Team
Feb 14, 2019 · Information Security

Design and Architecture of Meituan's Data Security Permission Platform

Meituan’s data security permission platform introduces a hierarchical, fine‑grained model that unifies approval, permission, and audit functions across business lines, using a plug‑in service layer, micro‑service architecture, and high‑availability mechanisms such as caching, load balancing, and distributed locks to protect data assets.

MicroservicesPermission Modelaccess control
0 likes · 17 min read
Design and Architecture of Meituan's Data Security Permission Platform
Youzan Coder
Youzan Coder
Jan 18, 2019 · Information Security

Security Architecture and Data Masking in a Big Data Platform

The article outlines Youzan’s evolving security architecture for its big‑data platform—starting with Apache Ranger‑based permission control, moving to a centralized permission‑management service for easier requests and audits, and finally implementing column‑level masking via SQL rewriting to protect sensitive data while balancing usability.

Column MaskingSQL Rewritingaccess control
0 likes · 10 min read
Security Architecture and Data Masking in a Big Data Platform
Tencent Cloud Developer
Tencent Cloud Developer
Dec 18, 2018 · Information Security

Designing a Relatively Secure Account System: Authentication, Authorization, and Auditing

Designing a relatively secure account system requires integrating strong multi-factor authentication, fine-grained authorization models like RBAC or ABAC, and continuous real-time and offline auditing to mitigate breaches, while recognizing that absolute security is impossible and ongoing vigilance is essential.

AuthenticationAuthorizationaccess control
0 likes · 17 min read
Designing a Relatively Secure Account System: Authentication, Authorization, and Auditing
dbaplus Community
dbaplus Community
Sep 12, 2018 · Operations

Mastering Enterprise Ops Security: Habits, Architecture, and Incident Response

This article presents a comprehensive guide to operational security, covering essential habits, a layered technical architecture, access‑control strategies, CI/CD safeguards, DDoS mitigation, data protection, incident‑response procedures, and collaboration with IT, security, and network teams.

CI/CD securityDDoS DefenseData Protection
0 likes · 20 min read
Mastering Enterprise Ops Security: Habits, Architecture, and Incident Response
网易UEDC
网易UEDC
Aug 6, 2018 · Fundamentals

Mastering Permission Design: From RBAC Basics to Advanced Strategies

This article walks designers and developers through the challenges of permission design, explains the RBAC model and its extensions, and offers practical tips for splitting, configuring, and managing permissions to build robust, user‑friendly access control systems.

Permission DesignRBACRole-Based Access Control
0 likes · 13 min read
Mastering Permission Design: From RBAC Basics to Advanced Strategies
Meitu Technology
Meitu Technology
Jul 24, 2018 · Big Data

Exploring Big Data Cluster Security: Evaluation of Kerberos, Apache Sentry, and Apache Ranger

The article evaluates Kerberos, Apache Sentry, and Apache Ranger for securing Meitu’s large‑scale Hadoop ecosystem, highlighting Ranger’s comprehensive, fine‑grained, policy‑based authorization across HDFS, HBase, Hive, YARN, Storm, and Kafka, and describing its configuration, LDAP integration, and custom SDK implementation.

Apache RangerApache SentryHadoop
0 likes · 12 min read
Exploring Big Data Cluster Security: Evaluation of Kerberos, Apache Sentry, and Apache Ranger
Meituan Technology Team
Meituan Technology Team
May 24, 2018 · Information Security

Data Security: Full Lifecycle Construction and Best Practices

The article outlines a comprehensive, layered data‑security lifecycle—from secure traffic and authentication through encrypted storage, role‑based access, audit logging, and safe production‑to‑test data handling—emphasizing privacy‑compliant practices, anti‑scraping measures, secure deletion, and incremental ROI‑driven adoption for enterprises.

access controlcloud infrastructureinformation security
0 likes · 24 min read
Data Security: Full Lifecycle Construction and Best Practices
Youzan Coder
Youzan Coder
Mar 16, 2018 · Information Security

Design and Implementation of the SAM Permission System for Retail Platforms

Youzan’s SAM permission system implements a scalable RBAC framework for its Retail platform—using binary‑encoded permission bits, micro‑service architecture, and unified menu/API checks—to flexibly assign and verify roles across PC, App, Pad, and future custom‑role scenarios, enhancing operational efficiency and security.

Permission SystemRBACaccess control
0 likes · 23 min read
Design and Implementation of the SAM Permission System for Retail Platforms
21CTO
21CTO
Jan 11, 2018 · Information Security

What Is Permission? Uncovering the Core of Access Control

This article explains the fundamental nature of permissions as limited authorized access to protected resources, defines what constitutes a resource in software, outlines permission classifications by method and layer, describes the control model using receptor‑ligand analogy, and summarizes the three core components of a permission system.

AuthorizationSoftware Securityaccess control
0 likes · 7 min read
What Is Permission? Uncovering the Core of Access Control
Architecture Digest
Architecture Digest
Jan 2, 2018 · Information Security

Understanding the Essence of Permissions: Resources, Access, and Authorization Models

This article explains the fundamental nature of permissions as limited licensed access to protected resources, defines what constitutes a resource in software, outlines resource identification and limitation, and describes permission classifications, control models, and authorization mechanisms such as role‑based access.

AuthorizationPermissionsResource Management
0 likes · 7 min read
Understanding the Essence of Permissions: Resources, Access, and Authorization Models
Efficient Ops
Efficient Ops
Oct 25, 2017 · Information Security

Securing Cloud‑Era Network Boundaries: Practices and Automated Operations

This article presents a comprehensive overview of cloud‑era network boundary management, detailing security challenges, unified access control concepts, endpoint protection, traffic analysis, and how automated operations and visualization platforms can reduce risk while maintaining efficient network operations.

AutomationOperationsaccess control
0 likes · 24 min read
Securing Cloud‑Era Network Boundaries: Practices and Automated Operations
dbaplus Community
dbaplus Community
Oct 9, 2017 · Information Security

How MongoDB Enables GDPR Compliance: Practical Data‑Protection Strategies

This article explains how MongoDB’s security features—including access control, authentication, encryption, data discovery, retention policies, zone sharding, backup, monitoring, and audit logging—help organizations meet GDPR requirements while minimizing operational overhead and ensuring data sovereignty.

BackupGDPRMongoDB
0 likes · 18 min read
How MongoDB Enables GDPR Compliance: Practical Data‑Protection Strategies
dbaplus Community
dbaplus Community
Sep 25, 2017 · Information Security

How GDPR Shapes Data Management Practices and Database Security

This article explains GDPR's key principles, the Discover‑Defend‑Detect framework, and concrete database controls such as data identification, retention, pseudonymisation, encryption, access control, disaster recovery, and audit logging needed to achieve compliance.

Audit loggingData ProtectionGDPR
0 likes · 12 min read
How GDPR Shapes Data Management Practices and Database Security
StarRing Big Data Open Lab
StarRing Big Data Open Lab
Sep 8, 2017 · Information Security

How Guardian 5.0 Revolutionizes Big Data Security with Multi‑Granular Permissions

Guardian 5.0 transforms big‑data security by introducing a standalone service, an enhanced ARBAC model, fine‑grained permission and quota management, visual configuration, unified LDAP/Kerberos authentication, and simplified operations, delivering higher flexibility, availability, and efficiency for enterprise data protection.

Guardian 5.0RBACResource Management
0 likes · 7 min read
How Guardian 5.0 Revolutionizes Big Data Security with Multi‑Granular Permissions
Ctrip Technology
Ctrip Technology
Jul 20, 2017 · Information Security

Step‑by‑Step Guide to Deploying Search Guard Security Plugin for Elasticsearch 5.x

This article explains the background, installation, certificate generation, Elasticsearch and Kibana configuration, role mapping, performance testing, and final recommendations for securing an Elasticsearch 5.1.1 cluster with the open‑source Search Guard plugin, focusing on index‑level access control and RPC traffic encryption.

ElasticsearchPerformance TestingSearch Guard
0 likes · 10 min read
Step‑by‑Step Guide to Deploying Search Guard Security Plugin for Elasticsearch 5.x
Efficient Ops
Efficient Ops
Jul 2, 2017 · Operations

How to Build a Multi‑Layered Security Defense: Practical Ops Strategies

This article outlines a comprehensive, multi‑layered security framework for operations teams, covering policy design, dual‑account permission separation, grid‑based vulnerability management, topology and network safeguards, OS and database hardening, common misconceptions, and actionable principles for maintaining robust protection.

OperationsSecuritySystem Hardening
0 likes · 31 min read
How to Build a Multi‑Layered Security Defense: Practical Ops Strategies
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
Jan 10, 2017 · Information Security

8 Proven Strategies to Secure MongoDB and Prevent Ransomware

This article outlines eight practical measures—including changing the default port, blocking public access, running MongoDB under non‑root users, enabling authentication, tightening permissions, implementing robust backup and recovery plans, and encrypting sensitive data—to dramatically improve MongoDB security and keep ransomware at bay.

Database SecurityMongoDBRansomware Prevention
0 likes · 9 min read
8 Proven Strategies to Secure MongoDB and Prevent Ransomware
ITPUB
ITPUB
Aug 14, 2016 · Databases

14 Essential MySQL Security Practices to Protect Your Data

This guide outlines essential MySQL security measures—including removing default accounts, disabling unsafe LOCAL INFILE commands, enforcing strict user role permissions, encrypting sensitive data, ensuring data integrity through replication and backups, and standardizing operational practices—to protect database assets from irreversible breaches.

Database Securityaccess controldata integrity
0 likes · 6 min read
14 Essential MySQL Security Practices to Protect Your Data
Big Data and Microservices
Big Data and Microservices
Apr 21, 2016 · Information Security

How Can Banks Secure Big Data? Key Strategies for Protecting Customer Information

In the era of big data, banks face unprecedented information security challenges due to massive, valuable, and highly damaging data breaches, and must adopt encryption, flexible access control, rigorous auditing, DLP solutions, strict data management, and robust outsourcing controls to safeguard customer information.

BankingBig DataDLP
0 likes · 10 min read
How Can Banks Secure Big Data? Key Strategies for Protecting Customer Information
dbaplus Community
dbaplus Community
Dec 7, 2015 · Information Security

How to Build Robust Database Security: Logical and Physical Protection Strategies

This article explains why protecting database‑stored sensitive data is critical, analyzes common attack vectors and breach statistics, and provides detailed logical and physical security measures—including user and permission management, auditing, encryption, disaster‑recovery planning, and Oracle replication technologies—to help organizations achieve comprehensive database protection.

Database SecurityOracleaccess control
0 likes · 20 min read
How to Build Robust Database Security: Logical and Physical Protection Strategies
ITPUB
ITPUB
Nov 23, 2015 · Databases

Essential MySQL Security Checklist: 14 Steps to Harden Your Database

To protect MySQL databases from unauthorized access and performance issues, this guide outlines fourteen essential security measures—including restricting remote access, regular backups, disabling default accounts, tightening user privileges, securing configuration files, and enabling logging—providing concrete commands and configuration snippets for robust protection.

BackupConfigurationDatabase Security
0 likes · 11 min read
Essential MySQL Security Checklist: 14 Steps to Harden Your Database
ITPUB
ITPUB
Nov 17, 2015 · Information Security

How to Secure Exposed Databases: Add a Middle Layer and Tighten Access

The article outlines a real‑world scenario where a small company's database was directly reachable from the Internet, then presents a redesign that inserts an intermediate database, restricts firewall access, and enforces strict credential management to protect sensitive data.

DBA Best PracticesDatabase Securityaccess control
0 likes · 4 min read
How to Secure Exposed Databases: Add a Middle Layer and Tighten Access
ITPUB
ITPUB
Nov 11, 2015 · Information Security

Essential Steps to Secure MySQL: From Access Controls to Patch Management

This guide outlines practical MySQL hardening techniques—including restricting remote access, regular backups, disabling unsafe features, managing root credentials, removing test databases, and applying security patches—to protect data integrity and prevent unauthorized intrusion.

BackupDatabase SecurityPrivilege Management
0 likes · 11 min read
Essential Steps to Secure MySQL: From Access Controls to Patch Management
Efficient Ops
Efficient Ops
Sep 24, 2015 · Operations

How to Scientifically Evaluate Whether a Cloud Service Is Truly Reliable

This article explains how to objectively assess cloud service reliability by examining three key aspects—availability, access control, and disaster recovery—and provides practical strategies such as redundancy design, gradual deployment, automation, and robust backup to improve overall cloud service trustworthiness.

Availabilityaccess controlcloud reliability
0 likes · 14 min read
How to Scientifically Evaluate Whether a Cloud Service Is Truly Reliable
Efficient Ops
Efficient Ops
Jul 30, 2015 · Information Security

Designing a Multi‑Layer Ops Security Tower: Network, System & Permission Strategies

This article summarizes a comprehensive ops security talk that breaks down network segmentation, system hardening, and permission management into layered defenses, offering practical guidance on VLANs, ACLs, least‑privilege principles, and account auditing for robust enterprise protection.

System Hardeningaccess controlinformation security
0 likes · 11 min read
Designing a Multi‑Layer Ops Security Tower: Network, System & Permission Strategies