PCI Series: Requirement 10 – Track and Monitor All Access to Network Resources and Cardholder Data

This is my last post dedicated to the use of Identity Management (IdM) and related technologies to address the Payment Card Industry Data Security Standard (PCI DSS). This specific post is related to requirement ten (i.e. the requirement to track and monitor all access to network resources and cardholder data). The outline and mapping of individual articles to the requirements can be found in the overarching post that started the series.

Requirement ten focuses on audit and monitoring. Many components of an IdM-based solution, including client components like

Continue reading “PCI Series: Requirement 10 – Track and Monitor All Access to Network Resources and Cardholder Data”

SELinux Mitigates container Vulnerability

A new CVE, (CVE-2016-9962), for the docker container runtime and runc were recently released. Fixed packages are being prepared and shipped for RHEL as well as Fedora and CentOS. This CVE reports that if you execd into a running container, the processes inside of the container could attack the process that just entered the container.

If this process had open file descriptors, the processes inside of the container could ptrace the new process and gain access to those file descriptors and read/write them, even potentially get access to the host network, or execute commands on the host.

Continue reading “SELinux Mitigates container Vulnerability”

Five Reasons to Switch from vSphere to Red Hat Virtualization

It’s time to upgrade or to renew your VMware vSphere licenses. This decision is not easy for a few reasons such as:

You might be hesitantly considering paying for an upgrade and ELA renewal because you believe there is no (other) choice.

I have good news for you. There is a reliable and enterprise choice and switching has never been easier with the recent release of

Continue reading “Five Reasons to Switch from vSphere to Red Hat Virtualization”