Tag compliance

Cloud Security Compliance

This post summarizes some aspects of cloud security that need to be taken into account regarding compliance. To monitor cloud security compliance, we need to check all compliance sources and how they affect cloud security. Compliance sources: Limits of Cloud…

Information Security Compliance

This post explains the concept of information security compliance and related topics. Compliance is one of the three sub-areas covered in Information Security area of GRC (Governance, Risk and Compliance). Sources of IT Security Compliance Compliance comes from the following…

NIS2

The Network and Infrastructure Security 2 (NIS 2, often spelled as NIS2), coded Directive (EU) 2022/2555 is an European Union (EU) directive. This post explains some aspects about this directive and their transpositions by EU member states. Introduction NIS2 NIS2…

Windows 10 Hardening Guides

This post summarizes hardening guides, security baselines, guidelines or standards for Windows 10. List of Windows 10 Hardening Guides This section summarizes some guides, guidelines, recommendations or baselines to harden Windows 10 endpoints: Microsoft Security Baselines Microsoft Baselines are included in…

UNECE/R155

UNECE (United Nations Economic Commission for Europe) is one of the five regional commissions under the jurisdiction of the United Nations Economic and Social Council. United Nations (UN) Regulation No. 155, shorten as UNECE/R155, is an international regulation about cybersecurity…