Tag

operations security

0 views collected around this technical thread.

Efficient Ops
Efficient Ops
Apr 1, 2025 · Operations

Unlock Internal Networks: Top Open‑Source Tunneling Tools & Security Best Practices

This article explains internal network tunneling, compares popular open‑source tools like frp, ngrok, and nps, and outlines essential security measures, risk‑control checklists, and compliance tips to help operations teams safely expose internal services without compromising security.

Ngrokfrpinternal network
0 likes · 6 min read
Unlock Internal Networks: Top Open‑Source Tunneling Tools & Security Best Practices
Efficient Ops
Efficient Ops
Jul 7, 2020 · Information Security

Securing Operations with JD Cloud’s Bastion Host: Design, Challenges & Deployment

This article reviews JD Cloud’s bastion host solution presented at the 2020 Global New‑Generation Software Engineering Summit, detailing the security challenges of modern operations, compliance requirements, design principles, cloud‑native architecture, and real‑world deployments in enterprises and finance.

High AvailabilityIdentity Managementaudit
0 likes · 15 min read
Securing Operations with JD Cloud’s Bastion Host: Design, Challenges & Deployment
NetEase Game Operations Platform
NetEase Game Operations Platform
Dec 10, 2018 · Information Security

Understanding and Improving Operations Security: Practices, Risks, and Enterprise‑Level Solutions

This article explains the concept of operations security, why it has become critical, enumerates common mis‑configurations and vulnerabilities such as open ports, weak permissions, insecure scripts and supply‑chain risks, and provides a comprehensive set of best‑practice guidelines and an enterprise‑level framework to build a resilient operations security posture.

DevOpsNetwork Securityautomation
0 likes · 28 min read
Understanding and Improving Operations Security: Practices, Risks, and Enterprise‑Level Solutions
Efficient Ops
Efficient Ops
Feb 15, 2016 · Information Security

How to Secure Cloud Operations: Practical Strategies for Public Cloud Environments

This article reviews a decade of cloud security experience and outlines the key challenges of operations security in public cloud environments, offering concrete solutions such as VPC isolation, encrypted VPNs, RAM policies, Linux key‑based login, Windows RDP port changes, privileged‑account management, and ActionTrail auditing.

Alibaba CloudCloud Securitybest practices
0 likes · 14 min read
How to Secure Cloud Operations: Practical Strategies for Public Cloud Environments
Efficient Ops
Efficient Ops
Dec 14, 2015 · Operations

Top Ops Security Pitfalls and How to Safeguard Your Infrastructure

This article examines the most common operational security vulnerabilities—such as unpatched Struts, server‑status leaks, backup file exposure, SVN leaks, and weak default credentials—explains why they are critical, and offers practical recommendations for enterprises to improve their ops‑security posture.

DevOpsinfrastructureoperations security
0 likes · 15 min read
Top Ops Security Pitfalls and How to Safeguard Your Infrastructure
Efficient Ops
Efficient Ops
Oct 9, 2015 · Information Security

Why Every Modern IT Team Needs a Bastion Host: Inside CrazyEye’s Open‑Source Solution

This article introduces CrazyEye, an open‑source bastion host that centralizes permission and audit management for large server fleets, explains its key features such as fine‑grained access control, command logging, and batch operations, and provides setup screenshots and the Git repository link.

Open-sourceaccess controlaudit logging
0 likes · 8 min read
Why Every Modern IT Team Needs a Bastion Host: Inside CrazyEye’s Open‑Source Solution