§ Trackr.Live
Latest writing

Notes from Trackr.Live

The landing site for Trackr Services

AT

AT-2: Literacy Training and Awareness

RMF Control AT-2: Literacy Training and Awareness requires organizations to provide training and awareness to personnel on information security and the protection of Controlled Unclassified Information (CUI), including: Supplemental Guidance The Risk Management Framework (RMF) is a cybersecurity framework that provides a process for managing cybersecurity risk to systems and organizations. RMF Control AT-2: Literacy …

·
AT

AT-1: Policy and Procedures

RMF Control AT-1: Policy and Procedures requires organizations to develop, document, and disseminate to organization-defined personnel or roles: Supplemental Guidance The Risk Management Framework (RMF) is a cybersecurity framework that provides a process for managing cybersecurity risk to systems and organizations. RMF Control AT-1: Policy and Procedures is one of the controls in the AT …

·
Cryptography

Data Obfuscation

Data obfuscation is the process of modifying data to make it unreadable or incomprehensible to unauthorized users, while still retaining its value for authorized users. It is a technique that can be used to protect sensitive data from being accessed or stolen by unauthorized individuals. There are a number of different data obfuscation techniques that …

·
Policies

Software Assurance

Software assurance (SwA) is a process of ensuring that software meets its security and quality requirements throughout its lifecycle. It is a critical part of any software development process, and it can help to protect organizations from a variety of risks, including: Software Assurance Requirements The requirements for software assurance vary depending on the organization …

·
Virtualization

Docker Containers

Docker containers are a lightweight, standalone, executable package of software that includes everything needed to run an application: code, runtime, system tools, system libraries and settings. Containers are isolated from each other and share the underlying operating system kernel, which makes them very efficient in terms of resource usage. Benefits of using Docker containers Docker …

·
Policies

Ansible Configuration Management

Ansible is a powerful open-source automation platform that can be used to manage and configure enterprise systems at scale. It is a popular choice for enterprise configuration management because it is easy to use, scalable, and extensible. Ansible uses a simple YAML-based language to define configurations and playbooks. Playbooks are scripts that define the steps …

·
Cryptography

Public Key Infrastructure (PKI) Cryptography

Public key infrastructure (PKI) cryptography is a system that uses public key cryptography to secure data transmission and authentication. PKI is based on the use of digital certificates, which are electronic documents that bind a public key to an identity. How PKI Cryptography Works PKI cryptography works by using a pair of public and private …

·
Cryptography

Elliptic Curve Cryptography (ECC)

Elliptic curve cryptography (ECC) is a public-key cryptography system that uses elliptic curves to secure data transmission and authentication. ECC is based on the mathematical theory of elliptic curves, which are algebraic curves that have been shown to be very difficult to solve. How ECC Works ECC works by using a pair of public and …

·
Cyber Tools

Cyber Risk Assessments

A cyber risk assessment is a process of identifying, analyzing, and evaluating the security risks that an organization faces. It helps organizations to understand their security posture, identify their most critical assets, and prioritize their security investments. Why are Cyber Risk Assessments Important? Cyber risk assessments are important because they help organizations to: Benefits of …

·
Cyber Tools

Zero Trust Security

Zero trust security is a cybersecurity model that assumes that no user or device can be inherently trusted. It requires all users and devices to be authenticated and authorized before they are granted access to resources. This approach is designed to protect organizations from a variety of cyber threats, including insider threats, supply chain attacks, …

·