<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Riean Esteves</title>
    <description>The latest articles on DEV Community by Riean Esteves (@rieesteves).</description>
    <link>https://dev.to/rieesteves</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F704913%2F8faea62f-316e-4208-a746-bce17e9eb646.jpeg</url>
      <title>DEV Community: Riean Esteves</title>
      <link>https://dev.to/rieesteves</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/rieesteves"/>
    <language>en</language>
    <item>
      <title>GRC Sounds Complex— Until You Realize You’re Already Doing It!</title>
      <dc:creator>Riean Esteves</dc:creator>
      <pubDate>Tue, 03 Mar 2026 17:07:09 +0000</pubDate>
      <link>https://dev.to/rieesteves/grc-sounds-scary-until-you-realize-youre-already-doing-it-3af3</link>
      <guid>https://dev.to/rieesteves/grc-sounds-scary-until-you-realize-youre-already-doing-it-3af3</guid>
      <description>&lt;p&gt;Governance Risk and Compliance (GRC) always sounded like one of those serious boardroom acronyms the kind that comes with long meetings and heavy documentation. While working on system audits using GRC frameworks, I realized that Governance, Risk, and Compliance are not just high-level corporate terms but indirectly implied on how IT systems are reviewed, controlled, and improved. What once seemed like theoretical knowledge became very practical. Through audits, I began to understand how governance structures, risk identification, and control validation come together in real-world IT environments.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is actually the behind this GRC??
&lt;/h2&gt;

&lt;p&gt;At its core, GRC consists of three interconnected pillars that ensure an organization operates responsibly, securely, and in alignment with its objectives.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Governance&lt;/strong&gt; defines direction and accountability&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Risk&lt;/strong&gt; highlights what could impact stability or security and&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Compliance&lt;/strong&gt; ensures that established rules and standards are consistently adhered.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;An organization must meet both its internal policy requirements and external regulatory obligations.&lt;/p&gt;

&lt;p&gt;During audits, these concepts stop being merely conceptual and instead become visibly practical. Every control review, access validation, change assessment, or documentation check reflects one or more of these pillars in action.&lt;/p&gt;

&lt;h3&gt;
  
  
  💡 Why Beginners Should Learn GRC!!
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Every industry needs it (banking, fintech, healthcare, SaaS)&lt;/li&gt;
&lt;li&gt;It combines business + technology + regulation&lt;/li&gt;
&lt;li&gt;It has strong career demand&lt;/li&gt;
&lt;li&gt;It builds a solid foundation for audit, security, and risk careers&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Even if you don’t work directly in GRC, understanding it strengthens how you approach IT processes.&lt;/p&gt;

&lt;h4&gt;
  
  
  🟢 Where ITSM and GRC Overlap!?
&lt;/h4&gt;

&lt;p&gt;💫Here’s how I see the connection💡: &lt;em&gt;ITSM Executes What GRC Governs!!&lt;/em&gt;&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;&lt;strong&gt;ITSM Process&lt;/strong&gt;&lt;/th&gt;
&lt;th&gt;&lt;strong&gt;GRC Concept&lt;/strong&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Change Management&lt;/td&gt;
&lt;td&gt;Risk Mitigation&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Incident Management&lt;/td&gt;
&lt;td&gt;Operational Risk Handling&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Access Management&lt;/td&gt;
&lt;td&gt;Control Implementation&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Service Reporting&lt;/td&gt;
&lt;td&gt;Compliance Evidence&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;This is when it clicked for me:&lt;br&gt;
&lt;strong&gt;GRC is not separate from IT operations🤝🏻.&lt;br&gt;
It is embedded within structured service management.💼&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Every approved change reduces risk exposure. &lt;br&gt;
Every resolved incident demonstrates operational resilience. &lt;br&gt;
Every access review strengthens control integrity. &lt;br&gt;
Every report becomes compliance evidence.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;When governance sets expectations and risk identifies exposure, &lt;strong&gt;ITSM ensures those expectations are operationally enforced&lt;/strong&gt;&lt;/em&gt;.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h4&gt;
  
  
  😶‍🌫️The Visual That Made It Clear📊
&lt;/h4&gt;

&lt;p&gt;I came across a visual representation of GRC structured like a periodic table. What made it interesting was not just the design but the clarity it brought.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fs8vk9j89pgz6u4ppjdjy.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fs8vk9j89pgz6u4ppjdjy.png" alt="GRC periodic table" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;At first glance, it may look complex. But once you observe closely, it reflects something simple the GRC is not one concept. It is a system of interconnected parts working together. This visual became the primary reason for writing this blog.&lt;/p&gt;

&lt;p&gt;Because what seemed like separate activities in ITSM from change reviews, access validations, reporting, documentation are clearly part of a larger structured ecosystem.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;GRC is not a checklist. It is an organized structure where every component supports another. Remove one element, and the system weakens.&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h4&gt;
  
  
  💫Final Refelction
&lt;/h4&gt;

&lt;p&gt;What once felt like a corporate acronym now feels like an integrated mindset.&lt;/p&gt;

&lt;p&gt;This blog is not a deep dive into GRC frameworks it is simply a reflection on how structured service management quietly embeds governance and risk principles into everyday IT processes.&lt;/p&gt;

&lt;p&gt;In the next piece, I plan to break down the elements of the GRC “periodic table” and explore how each component contributes to building resilient IT systems.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;If you’ve experienced a similar overlap between ITSM and GRC, I’d love to hear your thoughts.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>auditor</category>
      <category>management</category>
      <category>writing</category>
      <category>auditlife</category>
    </item>
    <item>
      <title>From Engineering to Corporate :2024 Rewind</title>
      <dc:creator>Riean Esteves</dc:creator>
      <pubDate>Sun, 02 Feb 2025 18:08:23 +0000</pubDate>
      <link>https://dev.to/rieesteves/from-engineering-to-corporate-2024-rewind-55dh</link>
      <guid>https://dev.to/rieesteves/from-engineering-to-corporate-2024-rewind-55dh</guid>
      <description>&lt;p&gt;&lt;em&gt;This is a submission for the &lt;a href="https://dev.to/challenges/newyear"&gt;2025 New Year Writing challenge&lt;/a&gt;: Retro’ing and Debugging 2024.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Retro’ing and Debugging 2024&lt;/strong&gt;&lt;br&gt;
As 2024 comes to a close, I find myself reflecting on a year filled with &lt;strong&gt;learning, challenges&lt;/strong&gt;, and &lt;strong&gt;transformation&lt;/strong&gt;. From being a student immersed in engineering concepts to stepping into the professional world as an auditor, a system quality assurance officer, this year has been a whirlwind of growth. It was a journey of pushing boundaries, embracing failures, and evolving into a more adaptable and resilient individual.&lt;/p&gt;

&lt;h2&gt;
  
  
  ✨Lessons Learned in 2024 ✨
&lt;/h2&gt;

&lt;p&gt;This year, I realized that my growth was a continuous process, and each phase of life comes with unique lessons. To me, these were not just academic or professional insights but fundamental shifts to my persona.&lt;/p&gt;

&lt;p&gt;Throughout 2024, I developed a strong &lt;strong&gt;&lt;u&gt;problem-solving mindset&lt;/u&gt;, &lt;u&gt;analytical thinking&lt;/u&gt;,&lt;/strong&gt; and &lt;strong&gt;&lt;u&gt;drafting skills&lt;/u&gt;&lt;/strong&gt; that played a crucial role for  both my academic and professional journey.Engineering taught me that understanding concepts is just the beginning—the real challenge lies in applying them to real-world problems. My ability to structure information evolved significantly, transitioning from writing lecture notes📝 to framing MOM (Minutes of Meetings). Moreover, shifting from 👩🏻‍💻 writing code to ensuring compliance within coded codes gave me a broader perspective on quality assurance and regulatory standards, reinforcing my attention towards accuracy. &lt;/p&gt;

&lt;p&gt;As I stepped into the professional world, I realized that &lt;strong&gt;&lt;em&gt;mistakes&lt;/em&gt;&lt;/strong&gt; are not setbacks but valuable learning opportunities.An e&lt;u&gt;&lt;strong&gt;ffective communication&lt;/strong&gt;&lt;/u&gt; and knowing when to ask for help proved to be crucial,🤝🏻 as seeking guidance often solved half the challenges I faced, while also teaching to meet deadlines and manage time. Having a strong support system of mentors and colleagues who always had my back allowed me to navigate obstacles more efficiently, making my transition into the corporate world smoother and more rewarding.🤩&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnccs92rzck8sq87otdwe.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnccs92rzck8sq87otdwe.png" alt="Internal Audit- work of an System Quality Assurance officer" width="800" height="753"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  ✨Overcoming Obstacles📈
&lt;/h2&gt;

&lt;p&gt;Despite the challenges, 2024 was a year of growth, achievements, and transformation. Completing my bachelor’s degree while actively participating in cultural and technical events pushed me to balance academics with leadership, even earning me the 🏆 &lt;em&gt;Outgoing Student Cultural Excellence Award&lt;/em&gt;. Stepping into the corporate world was a major shift—from being an engineering student to navigating analytical data and compliance as a professional. Looking back, I see how failures, from coding errors to design flaws, weren’t setbacks but stepping stones that strengthened my persistence and problem-solving skills. I learned that success isn’t just about talent but about continuous effort, adaptability, and resilience. Managing multiple projects, handling deadlines, and embracing challenges shaped me into a more confident and solution-oriented individual. This year wasn’t just about achievements; it was about evolving, learning, and preparing for an even stronger future.With the support of the Dev community and other social media platforms, I broadened my horizons and deepened my knowledge.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;From challenges faced to lessons learned,&lt;/em&gt;&lt;br&gt;
&lt;em&gt;Through trials and triumphs, my passion burned.&lt;/em&gt;&lt;br&gt;
 &lt;em&gt;With every fall, I rose once more,&lt;/em&gt;&lt;br&gt;
&lt;em&gt;Stronger, wiser than ever before.&lt;/em&gt;&lt;br&gt;&lt;br&gt;
~Riean   &lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  ✨Looking foward &amp;gt;&amp;gt;2025.. ✨
&lt;/h2&gt;

&lt;p&gt;The lessons I’ve learned, the challenges I’ve faced, and the achievements I’ve celebrated have laid the foundation for an even stronger &lt;strong&gt;2025&lt;/strong&gt;. As I move forward, I carry with me the belief that growth is an ongoing journey, and every experience—good or bad—is a stepping stone toward excellence.&lt;/p&gt;

&lt;p&gt;Here’s to another year of learning, adapting, and thriving!✨&lt;/p&gt;

</description>
      <category>devchallenge</category>
      <category>newyearchallenge</category>
      <category>career</category>
      <category>beginners</category>
    </item>
    <item>
      <title>Afterlife.exe: The Afterlife of Your Digital Footprint</title>
      <dc:creator>Riean Esteves</dc:creator>
      <pubDate>Sun, 25 Aug 2024 18:28:01 +0000</pubDate>
      <link>https://dev.to/rieesteves/afterlifeexe-the-afterlife-of-your-digital-footprint-163n</link>
      <guid>https://dev.to/rieesteves/afterlifeexe-the-afterlife-of-your-digital-footprint-163n</guid>
      <description>&lt;h3&gt;
  
  
  404: User Not Found, But Their Data Lives On!!!
&lt;/h3&gt;

&lt;p&gt;&lt;em&gt;Ever wondered what your online life would look like after you've logged off for the final time? That, my friend, is your &lt;strong&gt;digital footprint&lt;/strong&gt;—those  traces of data that outlive even the best of us, haunting the internet like a ghost in the machine&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;A &lt;strong&gt;digital footprint&lt;/strong&gt;– &lt;em&gt;sometimes called a digital shadow or an electronic footprint – refers to the trail of data you leave when using the internet.&lt;/em&gt; Right from posting on social media, subscribing to a newsletter, leaving an online review, or shopping online these are all example evidences of digi data. A digital footprint can be used to track a person’s online activities and devices. Internet users create their digital footprint either actively or passively, sometimes knowingly and mostly unknowingly .&lt;/p&gt;

&lt;p&gt;Understanding the fate of your digital data after death is crucial because it affects privacy, security, and the emotional well-being of loved ones.  Without proper planning, your online presence could be vulnerable to misuse, creating risks for both your legacy and those you leave behind.&lt;/p&gt;

&lt;p&gt;Imagine, your digital life as a giant virtual junk drawer; one's social media accounts are like the endless selfie archives and birthday wish lists, your emails are a labyrinth of forgotten conversations, and your cloud storage is the virtual attic stuffed with photos and documents thess are types of &lt;strong&gt;Personal Data&lt;/strong&gt;.Then there’s your &lt;strong&gt;Financial Data&lt;/strong&gt;—think of it as the virtual piggy bank and subscription services that keep charging you even when you forget they exist. And don’t forget the legal stuff i.e. &lt;strong&gt;Legal Data&lt;/strong&gt; : your digital contracts and signatures are the invisible ink that holds your online dealings together.&lt;/p&gt;

&lt;p&gt;The debate over who gets to play keeper of your digital footprint after you’ve logged off for good is still raging—some say only your closest kin, others argue for no one at all—but luckily, there are rules and acts out there that might just help sort out the digital dust-up before it turns into a ghostly free-for-all.&lt;/p&gt;

&lt;p&gt;When it comes to managing your digital afterlife, the legal landscape is as complex as a long-forgotten password. From Europe’s &lt;strong&gt;GDPR&lt;/strong&gt; with its right to be forgotten, to the &lt;strong&gt;CCPA&lt;/strong&gt; in California giving you control over your data even after you've logged off for good, and the &lt;strong&gt;UFADAA&lt;/strong&gt; across U.S. states letting executors handle your digital assets like physical ones, there are plenty of rules in play. Australia’s &lt;strong&gt;Privacy Act&lt;/strong&gt; and India’s &lt;strong&gt;Information Technology Act&lt;/strong&gt; add more layers to the mix. But the latest player in this game is India’s &lt;strong&gt;&lt;a href="https://www.staysafeonline.in/concept/digital-footprints/legal-and-regulatory-aspects-or-data-privacy-laws#:~:text=In%20India%20the%20Digital%20Personal,as%20the%20rights%20of%20individuals." rel="noopener noreferrer"&gt;Digital Personal Data Protection Bill, 2023&lt;/a&gt;&lt;/strong&gt;, passed on August 7, 2023. This bill lays down clear obligations for entities handling your data and reinforces the rights of individuals to control what happens to their digital footprint. So, while the debate over who should access your data after death continues, these laws offer a roadmap—helping you keep your digital legacy from turning into a wild west.&lt;/p&gt;

&lt;p&gt;When managing a deceased person's digital footprint, start by contacting &lt;strong&gt;digital service providers&lt;/strong&gt; like Google, Facebook, or Apple, as they have procedures for account management or deletion. For financial and legal issues, consult the &lt;strong&gt;executor of the estate&lt;/strong&gt; or a &lt;strong&gt;legal professional&lt;/strong&gt; in digital assets. If privacy concerns arise, reach out to a &lt;strong&gt;data protection authority&lt;/strong&gt; or a relevant government body, such as India’s &lt;strong&gt;Data Protection Authority&lt;/strong&gt; under the Digital Personal Data Protection Bill, 2023, to ensure the digital legacy is handled legally and respectfully.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;In the digital realm where our data takes flight,&lt;br&gt;
Our online traces linger, both day and night.&lt;br&gt;
In cyberspace, your digital trace lingers on,&lt;br&gt;
A footprint in the ether, though you’re gone.&lt;br&gt;
Secure your legacy, let your wishes be known,&lt;br&gt;
So your online story is handled with care, not alone.&lt;br&gt;
Plan ahead for the future, don’t let it be a plight,&lt;br&gt;
Ensure your digital world’s managed just right!!&lt;/em&gt;&lt;br&gt;
~Rieesteves&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h3&gt;
  
  
  Conclusion
&lt;/h3&gt;

&lt;p&gt;Planning for your digital data after death is as crucial as any other aspect of estate planning. It ensures that your online presence is managed according to your wishes, protecting your privacy and legacy. Take proactive steps now—designate legacy contacts, create a digital will, and familiarize yourself with relevant laws—to secure your digital footprint and give your loved ones peace of mind.&lt;/p&gt;

&lt;p&gt;Ref: &lt;a href="https://www.funeralocity.com/blog/how-to-manage-a-digital-legacy-after-someone-dies/#:~:text=Appoint%20a%20Digital%20Executor,in%20a%20digital%20legacy%20document" rel="noopener noreferrer"&gt;Digital After life&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Drop a comment below with your digital legacy thoughts or questions—because even in the afterlife, we could use a little help with tech support!&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>digitalfootprint</category>
      <category>database</category>
      <category>data</category>
      <category>security</category>
    </item>
    <item>
      <title>From Policy to Compliance: Unpacking the Key Annexures of ISO 27001</title>
      <dc:creator>Riean Esteves</dc:creator>
      <pubDate>Sun, 04 Aug 2024 18:54:32 +0000</pubDate>
      <link>https://dev.to/rieesteves/from-policy-to-compliance-unpacking-the-key-annexures-of-iso-27001-gpn</link>
      <guid>https://dev.to/rieesteves/from-policy-to-compliance-unpacking-the-key-annexures-of-iso-27001-gpn</guid>
      <description>&lt;p&gt;In the world of ISO 27001, the international standard for information security management, whether you're a business owner, IT professional, or just someone interested in understanding how organizations protect their data, this guide will help you navigate the essential clauses and  annexures of &lt;strong&gt;ISO 27001&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;ISO 27001 provides a clear guide for setting up, running, and improving a system to manage information security. It has 11 main sections, but the heart of the standard is Clauses 4-10. These sections lay out a step-by-step process to handle security risks and protect your information's confidentiality, integrity, and availability.&lt;/p&gt;

&lt;h3&gt;
  
  
  Key Clauses and Their Significance
&lt;/h3&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;&lt;strong&gt;Clause : Type&lt;/strong&gt;&lt;/th&gt;
&lt;th&gt;&lt;strong&gt;Description&lt;/strong&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Clause 4: &lt;em&gt;Context of the Organization&lt;/em&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;Understand Internal/External Issues&lt;/strong&gt;: Understands internal/external issues, stakeholder needs, and defines ISMS scope.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Clause 5: &lt;em&gt;Leadership&lt;/em&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;Top Management Commitment&lt;/strong&gt;: Top management's role in leading and committing to the ISMS.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Clause 6: &lt;em&gt;Planning&lt;/em&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;Risk Management&lt;/strong&gt;:  Identifies and addresses information security risks and opportunities.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Clause 7: &lt;em&gt;Support&lt;/em&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;Resource and Competency Management&lt;/strong&gt;:Ensures resources, competencies, and documentation are in place to support the ISMS&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Clause 8: &lt;em&gt;Operation&lt;/em&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;Top Management Commitment&lt;/strong&gt;:  Executes risk treatment plans and manages information security operations.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Clause 9: &lt;em&gt;Performance Evaluation&lt;/em&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;Monitoring and Measurement&lt;/strong&gt;:  Monitors, measures, analyzes, and evaluates the ISMS for effectiveness.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Clause 10: &lt;em&gt;Improvement&lt;/em&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;Continuous Enhancement&lt;/strong&gt;: Continuously enhances the ISMS through corrective actions and process improvements.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;The &lt;strong&gt;Annex A&lt;/strong&gt; is like a toolkit that helps organizations identify and mitigate potential risks to their information systems. It covers everything from creating security policies and managing employee access to implementing physical security measures and ensuring compliance with legal requirements. Let's dive in and explore how these essential annexures work together to create a robust framework for protecting your organization's valuable information.&lt;/p&gt;

&lt;p&gt;The &lt;strong&gt;ISO 27001 ANNEX A&lt;/strong&gt; provides the essential controls for ensuring information security...&lt;br&gt;
It starts with &lt;strong&gt;A.5&lt;/strong&gt;, where there is a need for clear and solid security policies such as guidelines on how to handle data. &lt;strong&gt;A.6&lt;/strong&gt; defines who should bear the responsibility of performing security duties. Furthermore, &lt;strong&gt;A.7&lt;/strong&gt; mandates that certain precautions be taken when hiring, working at an organization and leaving it with a particular focus on training employees in sufficient measures.&lt;strong&gt;A.8&lt;/strong&gt; involves keeping track of information assets and protecting them properly. &lt;strong&gt;A.9&lt;/strong&gt; controls who can access information to ensure only authorized individuals have access while &lt;strong&gt;A.10&lt;/strong&gt; gives guidance on using storage media for holding data securely particularly hard disks for backups, optical discs for original copies of important files and flash drives. &lt;strong&gt;A.11&lt;/strong&gt; secures physical spaces and equipment. &lt;strong&gt;A.12&lt;/strong&gt; ensures IT systems run securely, including managing changes and protecting against malware. &lt;strong&gt;A.13&lt;/strong&gt; secures communication channels and networks. &lt;strong&gt;A.14&lt;/strong&gt; integrates security requirements into software development and deployment. &lt;strong&gt;A.15&lt;/strong&gt; manages security when working with third-party suppliers, ensuring they follow security requirements. &lt;strong&gt;A.16&lt;/strong&gt; sets up procedures to quickly detect and respond to security incidents. &lt;strong&gt;A.17&lt;/strong&gt; integrates security into business continuity plans to ensure resilience during disruptions. Lastly, &lt;strong&gt;A.18&lt;/strong&gt; ensures compliance with legal and regulatory requirements through regular audits and reviews.&lt;/p&gt;




&lt;h3&gt;
  
  
  From Policy to Practice: Implementation Tips
&lt;/h3&gt;

&lt;p&gt;To implement &lt;strong&gt;Annex A&lt;/strong&gt; controls, start with a risk assessment to identify your security needs. Develop clear security policies and communicate them to all employees. Assign security roles and ensure accountability. Conduct regular training and awareness programs. Implement access controls to restrict information access and use encryption to protect data. Regularly review and update security measures to address new threats. Establish incident response procedures and integrate security into business continuity planning.&lt;/p&gt;




&lt;p&gt;In Conclusion , &lt;em&gt;Pursuing &lt;strong&gt;ISO 27001&lt;/strong&gt; compliance boosts your organization’s security and trust with stakeholders. Implementing &lt;strong&gt;Annex A&lt;/strong&gt; controls protects your information and shows your commitment to security. Regular improvements and audits ensure your measures stay effective. &lt;strong&gt;ISO 27001&lt;/strong&gt; compliance gives you a competitive edge, improves efficiency, and reduces security risks, creating a safer business environment.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>iso27001</category>
      <category>auditing</category>
      <category>annex</category>
      <category>compliance</category>
    </item>
    <item>
      <title>The IT Auditor’s Secret Sauce for SSPA Compliance</title>
      <dc:creator>Riean Esteves</dc:creator>
      <pubDate>Sat, 20 Jul 2024 18:07:43 +0000</pubDate>
      <link>https://dev.to/rieesteves/the-it-auditors-secret-sauce-for-sspa-compliance-ei8</link>
      <guid>https://dev.to/rieesteves/the-it-auditors-secret-sauce-for-sspa-compliance-ei8</guid>
      <description>&lt;p&gt;In today’s digital landscape, data security and privacy are paramount for maintaining trust and compliance. Microsoft’s Supplier Security and Privacy Assurance (&lt;strong&gt;SSPA&lt;/strong&gt;) program sets a high standard for suppliers, ensuring they adhere to rigorous security and privacy requirements when handling Microsoft’s data. For IT auditors, understanding and effectively implementing the &lt;strong&gt;SSPA&lt;/strong&gt; program is crucial. This guide provides a comprehensive overview of the key elements of the SSPA.&lt;/p&gt;

&lt;h3&gt;
  
  
  Introduction to SSPA Program
&lt;/h3&gt;

&lt;p&gt;The Supplier Security and Privacy Assurance (SSPA) program by Microsoft ensures that suppliers handling Microsoft’s data adhere to stringent security and privacy standards. This program mandates suppliers to regularly attest compliance with Microsoft's Data Protection Requirements (DPR), conduct independent assessments, and manage a Data Processing Profile (DPP). IT auditors play a pivotal role in this ecosystem, acting as the unsung heroes of data privacy by meticulously evaluating and enforcing these controls. They ensure that every byte of data is protected, every risk mitigated, and every compliance box ticked, thereby safeguarding sensitive information from potential breaches and fostering a culture of trust and security.&lt;/p&gt;

&lt;h4&gt;
  
  
  Key Components
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Data Processing Profile (DPP)&lt;/strong&gt;: &lt;em&gt;Keeping it real&lt;/em&gt;.&lt;br&gt;
The DPP outlines how a supplier handles data, providing a clear picture of their data processing activities and ensuring transparency.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Data Protection Requirements (DPR)&lt;/strong&gt;: &lt;em&gt;The rules of the game&lt;/em&gt;.&lt;br&gt;
The DPR sets the mandatory security and privacy standards suppliers must follow to protect Microsoft’s data.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Independent Assessments&lt;/strong&gt;: &lt;em&gt;Calling in the reinforcements&lt;/em&gt;.&lt;br&gt;
These are third-party audits that verify a supplier’s compliance with the SSPA program’s stringent requirements.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Compliance Status&lt;/strong&gt;: &lt;em&gt;Staying in the green zone&lt;/em&gt;.&lt;br&gt;
This indicates whether a supplier is meeting the required standards, helping them maintain a compliant and secure status&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  Basic ITGC Controls
&lt;/h4&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;&lt;strong&gt;Control Areas&lt;/strong&gt;&lt;/th&gt;
&lt;th&gt;&lt;strong&gt;Key Security Controls / Description&lt;/strong&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Access Controls&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;User Access Management&lt;/strong&gt;: Authorized access only.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;Multi-Factor Authentication&lt;/strong&gt;: Multiple verification steps for extra security.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Change Management&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;Change Control Processes&lt;/strong&gt;: Formalized change requests and reviews.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;Testing and Approval&lt;/strong&gt;: Ensures changes are tested and approved.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Data Backup and Recovery&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;Backup Procedures&lt;/strong&gt;: Regularly back up critical data.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;Recovery Testing&lt;/strong&gt;: Test backup and recovery processes.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Incident Management&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;Incident Response Plans&lt;/strong&gt;: Predefined strategies for breaches.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;Incident Detection and Reporting&lt;/strong&gt;: Quick identification and reporting.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Logical Security&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;System and Network Security&lt;/strong&gt;: Protects IT infrastructure.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;Patch Management&lt;/strong&gt;: Regular system updates and fixes.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Physical Security&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;Physical Access Controls&lt;/strong&gt;: Restricts access to IT infrastructure.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;Environmental Controls&lt;/strong&gt;: Protects against environmental hazards.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Data Encryption&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;Encryption Standards&lt;/strong&gt;: Encrypts data at rest and in transit.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Audit and Logging&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;Logging and Monitoring Practices&lt;/strong&gt;: Tracks system access and changes.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;Log Retention and Review&lt;/strong&gt;: Regular review of retained logs.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Third-Party Management&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;Vendor Risk Management&lt;/strong&gt;: Assesses and manages vendor risks.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;Contractual Controls&lt;/strong&gt;: Includes security requirements in vendor contracts.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Compliance and Training&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;Compliance Programs and Regular Audits&lt;/strong&gt;: Ensures ongoing adherence.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;Security Awareness Training&lt;/strong&gt;: Educates employees on security practices.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h3&gt;
  
  
  Tools used conducting SSPA Audit
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Risk Assessment Tools&lt;/strong&gt;:

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Archer&lt;/strong&gt;: Streamlines risk assessment processes. &lt;a href="https://www.archerirm.com/" rel="noopener noreferrer"&gt;Archer&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;MetricStream&lt;/strong&gt;: Provides comprehensive risk management solutions. &lt;a href="https://www.metricstream.com/" rel="noopener noreferrer"&gt;MetricStream&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;strong&gt;Compliance Management Tools&lt;/strong&gt;:

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;OneTrust&lt;/strong&gt;: Simplifies compliance with various privacy laws. &lt;a href="https://www.onetrust.com/" rel="noopener noreferrer"&gt;OneTrust&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;TrustArc&lt;/strong&gt;: Manages compliance risks and data privacy. &lt;a href="https://www.trustarc.com/" rel="noopener noreferrer"&gt;TrustArc&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;strong&gt;SIEM Tools&lt;/strong&gt;:

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Splunk&lt;/strong&gt;: Monitors and analyzes security data. &lt;a href="https://www.splunk.com/" rel="noopener noreferrer"&gt;Splunk&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;IBM QRadar&lt;/strong&gt;: Detects and responds to security threats. IBMQRadar&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;strong&gt;Vulnerability Assessment Tools&lt;/strong&gt;:

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Qualys&lt;/strong&gt;: Identifies vulnerabilities in IT systems. &lt;a href="https://www.qualys.com/" rel="noopener noreferrer"&gt;Qualys&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Nessus&lt;/strong&gt;: Performs comprehensive vulnerability assessments. &lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;strong&gt;Incident Response Tools&lt;/strong&gt;:

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Cortex XSOAR&lt;/strong&gt;: Automates incident response processes. &lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;TheHive&lt;/strong&gt;: Facilitates collaborative incident response. &lt;a href="https://thehive-project.org/" rel="noopener noreferrer"&gt;TheHive&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;strong&gt;Data Encryption Tools&lt;/strong&gt;:

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Vormetric&lt;/strong&gt;: Protects data through encryption and access controls. &lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Azure Information Protection&lt;/strong&gt;: Classifies and protects data. &lt;a href="https://azure.microsoft.com/en-us/services/information-protection/" rel="noopener noreferrer"&gt;Azure Information Protection&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;strong&gt;Documentation and Workflow Tools&lt;/strong&gt;:

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Confluence&lt;/strong&gt;: Supports collaboration and documentation. &lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;JIRA&lt;/strong&gt;: Manages project workflows and tasks. &lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;strong&gt;Monitoring and Logging Tools&lt;/strong&gt;:

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;ELK Stack&lt;/strong&gt;: Provides real-time logging and monitoring. &lt;a href="https://www.elastic.co/what-is/elk-stack" rel="noopener noreferrer"&gt;ELK Stack&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Graylog&lt;/strong&gt;: Simplifies log management and analysis. &lt;a href="https://www.graylog.org/" rel="noopener noreferrer"&gt;Graylog&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;p&gt;Thus in Conclusion .., &lt;br&gt;
Ensuring compliance with Microsoft’s Supplier Security and Privacy Assurance (SSPA) program is no small feat, but it’s a crucial part of maintaining data security and trust in today’s digital landscape. By understanding and implementing the key IT General Controls (ITGC) and following a structured audit process, IT auditors can safeguard sensitive information and uphold high standards of privacy.&lt;/p&gt;

&lt;p&gt;Through rigorous auditing, IT auditors not only verify compliance but also identify areas for improvement, ensuring continuous enhancement of security measures. This proactive approach helps in mitigating risks and preventing data breaches.&lt;/p&gt;

&lt;p&gt;As the field of data security evolves, staying updated with the latest SSPA requirements and best practices is essential. Continuous learning and adaptation are key to maintaining effective audits and robust data protection frameworks. Remember, every audit is a step towards a more secure digital environment, making IT auditors the unsung heroes of data privacy.&lt;/p&gt;

&lt;p&gt;By following these guidelines and embracing the importance of thorough audits, we can ensure that data remains secure and trusted, paving the way for a safer digital future&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Exploring ITGC Controls in Application, OS, and Database.</title>
      <dc:creator>Riean Esteves</dc:creator>
      <pubDate>Fri, 12 Jul 2024 10:58:53 +0000</pubDate>
      <link>https://dev.to/rieesteves/exploring-itgc-controls-in-application-os-and-database-2gpp</link>
      <guid>https://dev.to/rieesteves/exploring-itgc-controls-in-application-os-and-database-2gpp</guid>
      <description>&lt;p&gt;In today’s interconnected world, securing the application, operating system (OS), and database (DB) layers isn’t just prudent—it’s essential.&lt;br&gt;
In the previous blog we got to know about the basis and basic controls in ITGC.. thus now let us understand the Critical Connections while Exploring ITGC Controls in OS, Application, and Database&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzfm3kousmxp05q5j2fjd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzfm3kousmxp05q5j2fjd.png" alt="Understanding ITGC Controls" width="800" height="418"&gt;&lt;/a&gt;&lt;br&gt;
Let us get a better insight of these controls over : &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Application Layer &lt;/li&gt;
&lt;li&gt;OS Layer (Operating System) &lt;/li&gt;
&lt;li&gt;DB Layer (Database) &lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  Overview of the Controls in the Layers
&lt;/h4&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Layer&lt;/th&gt;
&lt;th&gt;Key Security Controls&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Application&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Logical Access Management, Change Management, Patch Management, Email Security, Logging and Monitoring (SIEM), Incident and Problem Management (ITIL)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Operation System&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Physical Access Management, Physical and Environmental Controls, Backup Management, Network Security, Endpoint Security (Antivirus, DLP), Asset Management&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Database&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Logical Access Management, Change Management, Backup Management, Vendor and Third-Party Risk Management, Business Continuity Plan and Disaster Recovery, Capacity Utilization and Planning&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h3&gt;
  
  
  Application Layer
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Logical Access Management&lt;/strong&gt; : Implementing &lt;strong&gt;&lt;a href="https://www.techtarget.com/searchsecurity/definition/role-based-access-control-RBAC" rel="noopener noreferrer"&gt;RBAC&lt;/a&gt;&lt;/strong&gt; (Role Based Access Controls) this ensure  restricted access of application functions and data according to the user roles and responsibilities. Segregating the  duties within applications to prevent conflicts of interest and reduce the risk of fraud&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Learn about RBAC implementation and benefits from resources like &lt;strong&gt;TechTarget's RBAC&lt;/strong&gt; guide !&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Change Management&lt;/strong&gt; : Establishes a formal change management process for applications to track and authorize changes. It ensures, that changes are properly tested and approved to maintain application integrity and functionality&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Patch Management&lt;/strong&gt; : Applying the patches and updates to application software to address security vulnerabilities and bugs thereafter Test the patches in a controlled environment to minimize disruption to application operations.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Email Security&lt;/strong&gt; : Implement email security controls within applications to protect against phishing attacks, malware attachments, and unauthorized access to email accounts, these are some of the protocols used :- &lt;a href="https://www.mimecast.com/content/sender-policy-framework/#:~:text=Sender%20Policy%20Framework%20(SPF)%20is,to%20a%20company%20or%20brand." rel="noopener noreferrer"&gt;SPF&lt;/a&gt;/&lt;a href="https://www.mimecast.com/content/dkim/#:~:text=DKIM%2C%20or%20DomainKeys%20Identified%20Mail,the%20owner%20of%20a%20domain." rel="noopener noreferrer"&gt;DKIM&lt;/a&gt;/&lt;a href="https://www.fortinet.com/resources/cyberglossary/dmarc#:~:text=Domain%2Dbased%20Message%20Authentication%20Reporting,Policy%20Framework%20(SPF)%20protocols." rel="noopener noreferrer"&gt;DMARC&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Logging and Monitoring (SIEM)&lt;/strong&gt;: : Implement logging mechanisms within applications to capture and monitor events related to user activities, system operations, and security incidents. Integrate with SIEM (Security information and event management) for centralized monitoring and analysis.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Incident and Problem Management (ITIL)&lt;/strong&gt;: To handle accidents and issues pertaining to applications, adhere to ITIL procedures. To reduce recurrence, keep incident records, examine the underlying reasons, and take corrective action.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Explore ITIL's incident management processes through resources like &lt;a href="https://www.axelos.com/resource-hub/practice/information-security-management-itil-4-practice-guide" rel="noopener noreferrer"&gt;AXELOS ITIL&lt;/a&gt; guides.&lt;/p&gt;


&lt;/blockquote&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Operating System
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Physical Access Management&lt;/strong&gt; : Implement physical security controls such as access cards, biometric authentication, and surveillance cameras to prevent unauthorized access to servers and workstations.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Physical and Environmental Controls&lt;/strong&gt; :Ensure servers and data centres have physical security controls like secure facilities, temperature monitoring, fire suppression systems, and backup power supplies.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Backup Management&lt;/strong&gt;: Regularly back up OS configurations, system files, and critical data to prevent data loss and periodically test restoration procedures to ensure reliability and quick restoration in case of failure.&lt;/p&gt;

&lt;blockquote&gt;
&lt;h5&gt;
  
  
  Backup Management Best Practices:
&lt;/h5&gt;

&lt;p&gt;Guidelines for implementing effective backup strategies can be found on &lt;a href="https://www.backblaze.com/computer-backup/docs/best-practices#:~:text=In%20addition%20to%20your%20Backblaze,key%20in%20a%20secure%20place." rel="noopener noreferrer"&gt;Backblaze's blog&lt;/a&gt;.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Network Security&lt;/strong&gt; :Configure firewalls, IDS/IPS, and VPNs to protect OS layer from unauthorized network access and attacks, and continuously monitor network traffic for potential security breaches.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;*&lt;em&gt;Endpoint Security (Antivirus, DLP) *&lt;/em&gt;: Install antivirus software and DLP solutions on endpoints to protect against malware, unauthorized data transfers, and other security threats&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Asset Management&lt;/strong&gt;: : Maintain an inventory of OS licenses, software versions, and hardware configurations. While tracking the assets to ensure compliance with licensing agreements and optimize resource allocation.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  Database Layer
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Logical Access Management&lt;/strong&gt; : Implementation of access controls within databases to restrict users' access to sensitive data based on their roles and responsibilities. Separating the duties for database administrators (DBAs) and application developers to prevent unauthorized data access.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Change Management&lt;/strong&gt; : Develop and test database schema, stored procedures, and SQL queries controls in a development environment before deploying them to production.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Backup Management&lt;/strong&gt; :Perform regular backups of databases to protect system work against data loss. Storing backups securely and ensure they are tested for reliability and integrity.&lt;/p&gt;

&lt;blockquote&gt;
&lt;h5&gt;
  
  
  Disaster Recovery Planning
&lt;/h5&gt;

&lt;p&gt;Guidance on disaster recovery planning is available from IBM's disaster recovery resources.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Vendor and Third-Party Risk Management&lt;/strong&gt;: Assess security risks associated with third-party database vendors and service providers. Review contracts and service level agreements (&lt;strong&gt;SLAs&lt;/strong&gt;) to ensure compliance with security requirements.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Business Continuity Plan and Disaster Recovery&lt;/strong&gt; : Create and test procedures for data restoration and database recovery in the event of a disaster, guaranteeing business continuity to reduce downtime and data loss.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Capacity Utilization and Planning&lt;/strong&gt;: Database performance metrics, including CPU utilization, memory usage, and storage capacity, should be monitored. Planning for scalability and resource allocation is crucial to accommodate increasing data needs.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;h5&gt;
  
  
  Database Security Best Practices
&lt;/h5&gt;

&lt;p&gt;Learn about securing databases from &lt;a href="https://docs.oracle.com/cd/B19306_01/network.102/b14266/toc.htm" rel="noopener noreferrer"&gt;Oracle's database security guide&lt;/a&gt;.&lt;/p&gt;
&lt;/blockquote&gt;




&lt;p&gt;Each layer of IT infrastructure (Application, OS, DB) requires tailored controls and management practices to mitigate risks effectively, ensure regulatory compliance, and maintain operational resilience.&lt;br&gt;
 &lt;em&gt;Audits play a crucial role in verifying the implementation of these controls and assessing the overall security posture of the organization. By adhering to best practices and leveraging comprehensive security frameworks like &lt;strong&gt;&lt;a href="https://www.nist.gov/cyberframework" rel="noopener noreferrer"&gt;NIST&lt;/a&gt;&lt;/strong&gt;, &lt;strong&gt;&lt;a href="https://www.iso.org/home.html" rel="noopener noreferrer"&gt;ISO&lt;/a&gt;&lt;/strong&gt;, or &lt;strong&gt;&lt;a href="https://www.cisecurity.org/controls" rel="noopener noreferrer"&gt;CIS&lt;/a&gt;&lt;/strong&gt;, organizations can enhance their ability to protect sensitive data, respond to incidents, and sustain business continuity.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>itgc</category>
      <category>database</category>
      <category>api</category>
      <category>controls</category>
    </item>
    <item>
      <title>Working Towards Compliance through ITGC !</title>
      <dc:creator>Riean Esteves</dc:creator>
      <pubDate>Thu, 11 Jul 2024 09:40:35 +0000</pubDate>
      <link>https://dev.to/rieesteves/working-towards-compliance-through-itgc--185e</link>
      <guid>https://dev.to/rieesteves/working-towards-compliance-through-itgc--185e</guid>
      <description>&lt;p&gt;In the auditing world , the focus is on verifying compliance with procedures by addressing the key questions about &lt;strong&gt;&lt;em&gt;People, Processes, and Technology&lt;/em&gt;&lt;/strong&gt; ie. &lt;strong&gt;PPT&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;ITGC&lt;/strong&gt; stands for &lt;em&gt;&lt;strong&gt;Information Technology General Controls&lt;/strong&gt;&lt;/em&gt;. These are the foundational controls that ensure the overall effectiveness and efficiency of an organization's IT environment.&lt;/p&gt;

&lt;p&gt;The basic general controls of ITGC include : &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Access Controls&lt;/strong&gt;: Making certain that only people who truly have the right to access such kind of software and data.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Change Management&lt;/strong&gt;: Organizing IT systems in such a way that changes meet the requirements, are approved, tested, and done.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Backup and Recovery&lt;/strong&gt;: Protecting data and maintaining it through the system with the help of the appropriate procedure of backup and restoration.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;IT Operations Controls&lt;/strong&gt;: Ensuring the proper functioning of IT systems, including job scheduling, performance monitoring, and error handling.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Physical and Environmental Controls&lt;/strong&gt;: Protecting IT infrastructure from physical threats like theft, fire, and natural disasters.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Security Management Controls&lt;/strong&gt;: Writing regulations and ways unclear in IT assets that prevent unauthorized access. 
_________________________________________________________________________&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Categories of IT General Controls&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;1. Access Controls&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;User Access Management&lt;/strong&gt;: Controls around creating, modifying, and deleting user accounts.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Segregation of Duties&lt;/strong&gt;: Ensuring that no single individual has the ability to execute and control all stages of a critical process.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Authentication and Authorization&lt;/strong&gt;: Verifying the identity of users and granting appropriate access rights based on their roles and responsibilities.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;2. Change Management&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Change Control Procedures&lt;/strong&gt;: Formal processes for requesting, reviewing, approving, testing, and implementing changes to IT systems.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Version Control&lt;/strong&gt;: Managing and documenting changes to software versions and configurations.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Emergency Change Procedures&lt;/strong&gt;: Protocols for handling urgent changes that cannot wait for the regular change management process.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;3. Backup &amp;amp; Recovery&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Data Backup Procedures&lt;/strong&gt;: Regular and secure backup of critical data to ensure availability in case of data loss or corruption.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Backup Storage and Testing&lt;/strong&gt;: Storing backups securely and periodically testing the ability to restore data from backups.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;4. IT Operations Controls&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Job Scheduling&lt;/strong&gt;: Automating and scheduling IT processes to ensure timely execution without human intervention.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Incident Management&lt;/strong&gt;: Processes for detecting, reporting, and resolving IT incidents.&lt;/li&gt;
&lt;li&gt; &lt;strong&gt;Monitoring and Logging&lt;/strong&gt;: Monitoring the performance and security of IT systems and maintaining logs for auditing purposes.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;5. Physical and Environmental Controls&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Data Centre Security&lt;/strong&gt;: Physical security measures to protect IT infrastructure from unauthorized access and environmental threats.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Environmental Monitoring&lt;/strong&gt;: Monitoring and controlling environmental factors such as temperature, humidity, and power supply to ensure optimal conditions for IT equipment.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;6. Security and Management Controls&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Network Security&lt;/strong&gt;: Protecting networks from unauthorized access, including firewall configurations and intrusion detection systems.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Vulnerability Management&lt;/strong&gt;: Identifying, assessing, and mitigating vulnerabilities in IT systems and applications.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Security Awareness Training:&lt;/strong&gt; Educating employees about IT security best practices and policies to reduce human-related risks.&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;strong&gt;Importance of ITGC&lt;/strong&gt;&lt;br&gt;
ITGCs manage risks, ensure compliance, support financial reporting accuracy, and improve operational efficiency by ensuring data integrity, ensuring financial reporting reliability, and streamlining IT operations.&lt;/p&gt;

&lt;p&gt;In summary, &lt;em&gt;ITGCs are fundamental controls that organizations implement to safeguard their IT environments, ensure operational efficiency, and mitigate risks associated with IT operations and data management.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>auditing</category>
      <category>compliance</category>
      <category>informationsecurity</category>
      <category>itgc</category>
    </item>
    <item>
      <title>Decoding Databases: The Backbone of Data Science</title>
      <dc:creator>Riean Esteves</dc:creator>
      <pubDate>Sat, 22 Jun 2024 12:22:40 +0000</pubDate>
      <link>https://dev.to/rieesteves/decoding-databases-the-backbone-of-data-science-4if8</link>
      <guid>https://dev.to/rieesteves/decoding-databases-the-backbone-of-data-science-4if8</guid>
      <description>&lt;p&gt;Data is the most important part of the architecture in Data Science which organizes all the data by making it to be the most efficient by storing, managing, and realizing large data  sets(data records) at high speeds also being cost-effective.Thus inorder to understand this futher let dive into the conceptual understanding first.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Computer Science , solving tomorrow’s problem with yesterday's bugs!&lt;/em&gt; Computer Science deals with the study of algorithms that define logic, data structures, computation, and databases. It creates a website and makes analytical algorithms to find trends of providing both theoretical and practical tools for user-friendly systems.&lt;/p&gt;

&lt;p&gt;It is obviously understood that data and databases are among the core thoughts within the realm of computer science, accommodate, organize, and analyze data in its diversified forms and structures. RDBMS/SQL, NoSQL, cloud, and time series databases scale and flex to bridge that gap.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdv4ombv7db20uitje6z2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdv4ombv7db20uitje6z2.png" alt="Types of Database" width="800" height="1131"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Information analysis and visualization are interpreted into meaningful actions that result from the application of visualization software, machine learning algorithms, and data mining techniques. It is powered and made more powerful by next-generation big data technologies like Hadoop and Spark.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Connecting the Dots: How Databases Fuel Data Science Innovations!!&lt;/strong&gt;&lt;br&gt;
Lets us understand with an example : fictional online-retail - &lt;strong&gt;‘ShopMart’&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In this example of online retail 'ShopMart':&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The Role of computer science ensures creating secure, scalable, and user-friendly systems.
&lt;/li&gt;
&lt;li&gt;Database structure, design, and normalization ensure a secure system while maintaining data storage and organizing on types of data. Transaction management guarantees reliable operations and integrity of data even in case of system failure.&lt;/li&gt;
&lt;li&gt;Sales data analysis depicts trends and facilitates better purchase experiences.It aids in the optimization of purchase experiences by identifying the trends and recommending relevant merchandise.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Descriptive statistics algorithms, collaborative filtering tools like Tensorflow, Seaborn, together with data mining and big data technologies: Hadoop and Spark used.&lt;/p&gt;

&lt;p&gt;Thus Computer Science Driving insights and innovation through data.&lt;/p&gt;

</description>
      <category>database</category>
      <category>datascience</category>
      <category>data</category>
      <category>computerscience</category>
    </item>
    <item>
      <title>The Dynamic Duo of Modern Computing !!</title>
      <dc:creator>Riean Esteves</dc:creator>
      <pubDate>Sat, 22 Jun 2024 12:00:14 +0000</pubDate>
      <link>https://dev.to/rieesteves/the-dynamic-duo-of-modern-computing--4l2j</link>
      <guid>https://dev.to/rieesteves/the-dynamic-duo-of-modern-computing--4l2j</guid>
      <description>&lt;p&gt;&lt;em&gt;This is a submission for &lt;a href="https://dev.to/challenges/cs"&gt;DEV Computer Science Challenge v24.06.12: One Byte Explainer&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  From Storage to Insight : &lt;em&gt;How Databases Drive Data Science&lt;/em&gt;
&lt;/h2&gt;

&lt;p&gt;Database the architects of order and efficiency, that in turn turn chaos into clarity the world of data for computer science. A well-designed database is like a well-organized library. Data science that transforms numbers, patterns into insight and wisdom.&lt;/p&gt;

&lt;h2&gt;
  
  
  Additional Context
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.geeksforgeeks.org/types-of-databases/" rel="noopener noreferrer"&gt;Types of Database&lt;/a&gt;&lt;br&gt;
&lt;a href="https://dev.to/rieesteves/decoding-databases-the-backbone-of-data-science-4if8"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F75itg150sg8ttv2ttimx.png" alt="All about the Data" width="800" height="640"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>devchallenge</category>
      <category>cschallenge</category>
      <category>computerscience</category>
      <category>beginners</category>
    </item>
    <item>
      <title>Overcoming the Fear of LOCO(Lines of Coding)</title>
      <dc:creator>Riean Esteves</dc:creator>
      <pubDate>Tue, 14 Sep 2021 04:26:17 +0000</pubDate>
      <link>https://dev.to/rieesteves/overcoming-the-fear-of-loco-lines-of-coding-2hjh</link>
      <guid>https://dev.to/rieesteves/overcoming-the-fear-of-loco-lines-of-coding-2hjh</guid>
      <description>&lt;p&gt;A little more than 250 lines under font-size of 18pxl,the worse fear rather nightmare for beginners. And if there is a comma or a semi-colon missing, the slightest error of spelling and the whole program goes for a toss. Fear of LOCO (Lines of coding)/ Coding is not exactly a fear but a mindset which sets you feared.&lt;br&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff5begpmyto35j8ynisc7.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff5begpmyto35j8ynisc7.jpg" alt="FEAR of a huge program" width="800" height="600"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;&lt;strong&gt;Attributes, arguments ,class ,method, objects ,function, parameter's and more....&lt;/strong&gt;&lt;/em&gt; and end-list list of these technical jargons. How frightening are these to hear and understand initially; but gradually with time one can &lt;em&gt;ACE&lt;/em&gt; it and code with &lt;strong&gt;EASE!&lt;/strong&gt; These are building blocks of a code and structure the program efficiently.&lt;/p&gt;

&lt;h3&gt;
  
  
  FEAR of LOCO(Lines of Coding)!!!
&lt;/h3&gt;

&lt;p&gt;As a beginner a new IDE( &lt;em&gt;text editors for coding&lt;/em&gt;) with some fancy language and amazing colors fascinating at first as complexity of code increases it increase the fear!&lt;br&gt;
 &lt;em&gt;Now this fear, is it &lt;strong&gt;Fear of length of code? Confused with concepts? thinking its out of ones capability! afraid to mess up the hard work? tendency to error up as having knowledge of too many languages(java, c, python, html, etc)&lt;/strong&gt; whatever the option the bottom line thereafter lies happiness when the code successfully runs at the wink of your eye!&lt;/em&gt; This lost happiness can be easily found if this minor fear is over-come. Coding is not an easy task like having a &lt;em&gt;piece of cake&lt;/em&gt; and one should be in the attitude of &lt;em&gt;"Oh ! This is not my cup of tea !"&lt;/em&gt; , this is where the fear begins in us.&lt;/p&gt;




&lt;p&gt;The Question now arises : &lt;/p&gt;

&lt;h3&gt;
  
  
  How do we overcome ????
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;1.Keep a positive attitude and  well planned structural idea in mind&lt;/strong&gt;&lt;br&gt;
Before one starts to code keep a rough structure jotted down. This will help to keep a track of your work pending/done , also  it will help in building up your self confidence and esteem.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2.Learn coding from Good Resources&lt;/strong&gt;&lt;br&gt;
With Online being  better preferred option rather than the tradition books learning ,there are various open source learning platform's that help you get better in this field&lt;br&gt;
As a beginner / even later these are some sights I find very helpful to learn new ways/styles to clear a concept and to tackle a statement.( &lt;em&gt;*The resources are attached at the end&lt;/em&gt;)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3.Master one Language at a time.&lt;/strong&gt;&lt;br&gt;
Don't be the jack of all and master on none, learn one language either &lt;a href="https://www.w3schools.com/cpp/default.asp" rel="noopener noreferrer"&gt;C++&lt;/a&gt; , &lt;a href="https://www.w3schools.com/java/default.asp" rel="noopener noreferrer"&gt;Java&lt;/a&gt; , &lt;a href="https://www.w3schools.com/python/default.asp" rel="noopener noreferrer"&gt;Python&lt;/a&gt; ;or whichever you feel easy the best. &lt;br&gt;
No one is 100% perfect to learn everything in a short span of time and remember it at the wink of an eye . However there is no harm in re-watching videos or reading articles again to understand a concept. The outcome should be whatever the problem may be one has an ideal technical logic in-order to come up with a solution.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4.Don't Worry about the near future&lt;/strong&gt;&lt;br&gt;
Coders usually tend to worry and question themselves with &lt;em&gt;What If?!&lt;/em&gt; This attitude is not very heathy always .Thinking about the future whether a code runs or no will affect one currently typing and having a clear idea set also one can tend to end up with multiple silly typo-errors. It might lead to a break in the flow of the process which eventually can create a mess in your code so &lt;em&gt;Just stay calm and keep typing!!&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;5.Begin with Small Steps&lt;/strong&gt;&lt;br&gt;
However experienced one may be , in whichever aspect a small start has always lead to a wonderful turnover. Similarly with coding; Don't just get super-fascinated after learning some concepts and jump to a conclusion you know it all! and try doing something out of hand out of thought and get caught up with fear of LOCO. &lt;br&gt;
Start small by this I mean break the complex problem in simple easy solvable steps &lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxx78zs5fue5jm8eys0uo.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxx78zs5fue5jm8eys0uo.png" alt="Steps " width="431" height="249"&gt;&lt;/a&gt;&lt;br&gt;
click&lt;a href="https://nickjanetakis.com/blog/breaking-down-problems-is-the-number-1-software-developer-skill" rel="noopener noreferrer"&gt;here to read more&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;6.Google the best companion&lt;/strong&gt;&lt;br&gt;
You know the best answers to the solution is Ok Google!!&lt;br&gt;
Searching and learning via google is no harm but yes one should know the subject and research more and not just 'Ctrl + C' &amp;amp; 'Ctrl + V'. but understand and add you own twist in it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;7.Reach Out&lt;/strong&gt;&lt;br&gt;
Reach out to the professional/ your peers.&lt;br&gt;
*Teachers/ Professors (School /college/University)&lt;br&gt;
*Peers&lt;br&gt;
*community learning &lt;br&gt;
You lend a hand for help and then reach out to those who seek. A best two way learning process and most helpful way to overcome fear of coding.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;8. Coding everyday helps the LOCO fear go Away!&lt;/strong&gt;&lt;br&gt;
Yes indeed, a small amount of coding daily helps you get a better in logical thinking as well as increases your typing speed. Some may find it funny with a bustling busy schedule &lt;em&gt;how can I code everyday?&lt;/em&gt; But if one gets to this practice, there is no fear that can overpower your will power. &lt;/p&gt;




&lt;p&gt;Lastly, LOCO fear isn't a harm ; well unless you overstress, and overthink about the outcome in future . Lines of coding gradually increases with experience and professional status  or work load  so.. break you work , and code with Ease. Remember to overcome LOCO you need to defeat he fear in your mind your hand will automatically work smoothly. As beginners just be a master of one and not a jack of all; it eventually helps you with clear idea of usage of tags parameters etc in your code. &lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;  Links to the online resources
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;&lt;a href="https://www.w3schools.com/" rel="noopener noreferrer"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Feptqoii4sgva4b9n99op.jpeg" alt="link1" width="270" height="270"&gt;&lt;/a&gt;  &lt;a href="https://www.codecademy.com/" rel="noopener noreferrer"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi4pj3f8m8jrw8f8xppdb.png" alt="link2" width="800" height="168"&gt;&lt;/a&gt;   &lt;a href="https://github.com/" rel="noopener noreferrer"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvqgungcyadgruuxaedix.jpg" alt="link3" width="281" height="253"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>programming</category>
      <category>codereview</category>
      <category>coding</category>
      <category>challenge</category>
    </item>
  </channel>
</rss>
