article thumbnail

Azure Storage Account Networking: When to Use Firewalls and Service Endpoints

Linux Academy

Recently, when building content for one of my upcoming courses, Microsoft Azure Architect Technologies – Exam AZ-300 , I found the Microsoft documentation wasn’t immediately clear on the exclusivity of Storage Account Firewalls, and Service Endpoints. Do I need to use Service Endpoints and the Storage Firewall together?

article thumbnail

Top 5 Tips to Improve Your Linux Desktop Security 2017

Galido

Having Linux as your operating system is one of the better decisions you can make concerning your computer’s security. However, many Linux users make the same mistakes of believing that it’s enough just to have it on your computer and only that fact will make all threats simply disappear, when unfortunately the reality is quite different.

Linux 66
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Configure a Failover Cluster with Pacemaker

Linux Academy

As more and more business provide their services through the Internet, the need for these services to always be accessible has grown. Run firewall-cmd commands on both nodes, and allow traffic for Pacemaker (TCP ports 2224, 3121, 21064, and UDP port 5405): sudo firewall-cmd --permanent --add-service=high-availability.

article thumbnail

Using Secure Configurations | Standardize Your Security

Linux Academy

Our friends at the Center for Internet Security (CIS) listed “Secure Configurations” as the No. Ansible can help automate the backup, and you can learn more in this month’s how-to video that covers using Ansible to back up a Cisco ASA firewall. 5 most important security control on this year’s Top 20 hit list.

article thumbnail

Cloud Playground for Beginners: Navigating your first Server

Linux Academy

Welcome to Linux Academy’s Cloud Playground! Used basic Linux commands on that server. The great thing about this in-browser terminal is that it bypasses restrictions that corporate firewalls typically have, so you can learn on the job without restriction. We’re going to download a file from the internet.

Cloud 74
article thumbnail

May Intro | Roadmap to Securing Your Infrastructure

Linux Academy

As many of you know, most firewalls today come with a default rule set permitting all outbound traffic to flow freely. You put the firewall in place, and traffic flows outbound unimpeded. Center for Internet Security (CIS) puts out an annual top 20 security controls you should use to protect your infrastructure.

article thumbnail

Top Ten Ways Not To Sink the Kubernetes Ship

Linux Academy

Fortunately Aquasec has provided us a utility for the automated scanning of our clusters against the Kubernetes benchmark published by CIS (Center for Internet Security). These policies, like any firewall, provide an invaluable means of limiting attack vectors both inside and outside the VPC.