<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: sachindra@work</title>
    <description>The latest articles on DEV Community by sachindra@work (@sachindra149).</description>
    <link>https://dev.to/sachindra149</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F59535%2F3095447d-03a3-4663-9acd-bda1fdbf666a.jpg</url>
      <title>DEV Community: sachindra@work</title>
      <link>https://dev.to/sachindra149</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/sachindra149"/>
    <language>en</language>
    <item>
      <title>Microsoft Cloud Adoption Framework</title>
      <dc:creator>sachindra@work</dc:creator>
      <pubDate>Sun, 14 Dec 2025 14:05:52 +0000</pubDate>
      <link>https://dev.to/sachindra149/microsoft-cloud-adoption-framework-odg</link>
      <guid>https://dev.to/sachindra149/microsoft-cloud-adoption-framework-odg</guid>
      <description>&lt;p&gt;Microsoft Cloud Adoption Framework (CAF) for Azure is a comprehensive guide and set of tools from Microsoft to help organizations plan, implement, and govern cloud adoption at scale. It provides structured guidance across the full lifecycle of cloud transformation, from strategy through operations, with built-in best practices, templates, and governance controls.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key Components:&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Define Strategy:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Why do you want to move to cloud?&lt;/li&gt;
&lt;li&gt;Would you be able to reduce costs by moving to the cloud?&lt;/li&gt;
&lt;li&gt;Do you want to run cloud-native technologies?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Plan:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;What applications are you moving to the cloud?&lt;/li&gt;
&lt;li&gt;Can you move the applications to the cloud? - This takes care of feasibility of the application or data movement to the cloud.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Ready&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Keep the cloud environment ready.&lt;/li&gt;
&lt;li&gt;Design, what cloud services are required.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Adopt&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Migrate the application.&lt;/li&gt;
&lt;li&gt;Enhance by building cloud-native capabilities.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Secure&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Protect the resources.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Manage&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Manage the operations&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Govern&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Policy and Compliance&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>security</category>
      <category>microsoft</category>
      <category>cloud</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Google Cloud Options for Storing Data</title>
      <dc:creator>sachindra@work</dc:creator>
      <pubDate>Sat, 13 Dec 2025 04:48:22 +0000</pubDate>
      <link>https://dev.to/sachindra149/google-cloud-options-for-storing-data-1bh0</link>
      <guid>https://dev.to/sachindra149/google-cloud-options-for-storing-data-1bh0</guid>
      <description>&lt;p&gt;&lt;strong&gt;Options for storing structured data:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Folsrhuh636thk4ihyt3w.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Folsrhuh636thk4ihyt3w.jpg" alt=" " width="800" height="404"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Points to remember:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Cloud SQL is Google Cloud's Managed Relational Database service.&lt;/li&gt;
&lt;li&gt;Alloy DB is a fully managed, high performance PostgreSQL Database Service.&lt;/li&gt;
&lt;li&gt;Spanner is Google Cloud's fully Managed, Relational Database Service that offers strong consistency and horizontal scalability.&lt;/li&gt;
&lt;li&gt;FireStore is a fast, fully-managed, serverless NoSQL document database built for automatic scaling, high performance and ease of application development.&lt;/li&gt;
&lt;li&gt;BigQuery is a fully managed, serverless Enterprise Data Warehouse for analytics.&lt;/li&gt;
&lt;li&gt;BigTable is a high-performance NoSQL database service. It is built for fast key-value lookup and supports consistent sub-10 milliseconds latency.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Google Cloud Storage Classes:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvf5z31q3mje31f32wm53.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvf5z31q3mje31f32wm53.png" alt=" " width="800" height="302"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>googlecloud</category>
      <category>gcp</category>
      <category>googlestorage</category>
      <category>structureddata</category>
    </item>
    <item>
      <title>What is DNS and how does it work</title>
      <dc:creator>sachindra@work</dc:creator>
      <pubDate>Sun, 28 Sep 2025 10:59:05 +0000</pubDate>
      <link>https://dev.to/sachindra149/what-is-dns-and-how-does-it-work-4jbo</link>
      <guid>https://dev.to/sachindra149/what-is-dns-and-how-does-it-work-4jbo</guid>
      <description>&lt;p&gt;&lt;strong&gt;What is DNS?&lt;/strong&gt;&lt;br&gt;
The Domain Name System, or DNS, is like the phonebook of the internet. It enables users to connect to websites using human-readable domain names (like ibm.com) instead of having to remember complex numerical IP addresses. DNS translates these domain names into IP addresses. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How DNS Works&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;User Request:&lt;/strong&gt;&lt;br&gt;
When a user types a domain name into a browser, the query is sent to a DNS resolver (often provided by the user's Internet Service Provider).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;DNS Resolver Cache:&lt;/strong&gt;&lt;br&gt;
The resolver first checks its cache for a stored IP address corresponding to the domain name. If found, it quickly returns the address.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Query the DNS Hierarchy:&lt;/strong&gt;&lt;br&gt;
If not in cache, the resolver sends a query to a root DNS server. The root server responds with a referral to the Top-Level Domain (TLD) server for the domain (e.g., ".com").&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;TLD Server:&lt;/strong&gt;&lt;br&gt;
The resolver then queries the TLD server, which responds with the address of the authoritative name server for the domain (such as "ibm.com").&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Authoritative DNS Server:&lt;/strong&gt;&lt;br&gt;
The resolver queries the authoritative server, which looks up the DNS zone file and returns the IP address for the domain.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Return and Cache:&lt;/strong&gt;&lt;br&gt;
The resolver caches the IP address for a time-to-live (TTL) period and returns it to the user's device. The browser or app uses the IP to connect to the web server.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;DNS Components&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;DNS Zones and Zone Files:&lt;/strong&gt;&lt;br&gt;
DNS zones are collections of resource records managed by authoritative DNS servers. Zone files contain these records that map between domain names and IP addresses.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Resource Records:&lt;/strong&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;A Record&lt;/strong&gt;: Maps a hostname to an IPv4 address.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AAAA Record&lt;/strong&gt;: Maps a hostname to an IPv6 address.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CNAME Record&lt;/strong&gt;: These records forward one domain or subdomain to another domain. Maps an alias hostname to a canonical name (C-NAME).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;MX Record&lt;/strong&gt;: These records resolve to the address of the servers that handle the email for the domain.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;PTR Record&lt;/strong&gt;: Used for reverse DNS lookups.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;NS Record&lt;/strong&gt;: Indicates authoritative DNS servers for a domain. Indicates which DNS server is authoritative for that domain (i.e. which server contains the actual DNS records)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;TXT Record&lt;/strong&gt;: Holds text information for various uses including email verification. Lets an admin store text notes in the record. These records are often used for email security.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Types of DNS Servers&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Recursive Resolver (or Recursive DNS Server):&lt;/strong&gt;&lt;br&gt;
This is the first server to receive a DNS query from a client (like your web browser). &lt;/p&gt;

&lt;p&gt;Its job is to find the IP address for the requested domain name by querying other DNS servers on behalf of the client. &lt;br&gt;
Often, this server is provided by your Internet Service Provider (ISP) or a third-party service like Google Public DNS. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Root Name Servers:&lt;/strong&gt;&lt;br&gt;
These servers are the top of the DNS hierarchy. &lt;/p&gt;

&lt;p&gt;When a recursive resolver needs to find the IP address for a new domain, it first contacts a root server to get a list of servers responsible for that domain's top-level domain (like .com or .org). &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Top-Level Domain (TLD) Name Servers:&lt;/strong&gt;&lt;br&gt;
After getting the TLD information from the root server, the recursive resolver then contacts the TLD name server. &lt;/p&gt;

&lt;p&gt;The TLD server holds information for all domains with a particular extension (e.g., all .com domains) and points the resolver to the authoritative name server for that specific domain. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Authoritative Name Servers:&lt;/strong&gt;&lt;br&gt;
This is the final server in the chain and holds the actual IP address for the requested website or domain. &lt;/p&gt;

&lt;p&gt;Once the authoritative server provides the IP address to the recursive resolver, the resolver caches the information and sends the IP address to your device, allowing your browser to connect to the website.&lt;/p&gt;

&lt;p&gt;DNS Records are nothing but instructions that are stored in authoritative DNS servers and also it’s called as zone file. These records provide important and relevant details about domains and hostnames.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Importance and Security&lt;/strong&gt;&lt;br&gt;
DNS is essential for the internet's usability, translating human-friendly domains into machine-friendly IP addresses. It also supports email delivery and network troubleshooting. Security measures like DNSSEC (DNS Security Extensions) are implemented to ensure authenticity and protect users from attacks like DNS spoofing.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpyl5hr9pauyyxzre590p.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpyl5hr9pauyyxzre590p.png" alt=" " width="640" height="427"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://infosecwriteups.com/day-10-all-about-dns-100daysofhacking-a337b8e763a" rel="noopener noreferrer"&gt;https://infosecwriteups.com/day-10-all-about-dns-100daysofhacking-a337b8e763a&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=nyH0nYhMW9M" rel="noopener noreferrer"&gt;https://www.youtube.com/watch?v=nyH0nYhMW9M&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>dns</category>
      <category>security</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>AWS Services in scope for AWS Certified Machine Learning Engineer - Associate Exam (AWS-MLA- C01)</title>
      <dc:creator>sachindra@work</dc:creator>
      <pubDate>Sat, 08 Mar 2025 14:03:01 +0000</pubDate>
      <link>https://dev.to/sachindra149/aws-services-in-scope-for-aws-certified-machine-learning-engineer-associate-exam-aws-mla-c01-18fn</link>
      <guid>https://dev.to/sachindra149/aws-services-in-scope-for-aws-certified-machine-learning-engineer-associate-exam-aws-mla-c01-18fn</guid>
      <description>&lt;p&gt;The following list contains AWS services and features that are in scope for the exam.&lt;br&gt;
This list is non-exhaustive and is subject to change. AWS offerings appear in categories that align with the offerings’ primary functions:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Analytics:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Amazon Athena&lt;/li&gt;
&lt;li&gt;Amazon Data Firehose&lt;/li&gt;
&lt;li&gt;Amazon EMR&lt;/li&gt;
&lt;li&gt;AWS Glue&lt;/li&gt;
&lt;li&gt;AWS Glue DataBrew&lt;/li&gt;
&lt;li&gt;AWS Glue Data Quality&lt;/li&gt;
&lt;li&gt;Amazon Kinesis&lt;/li&gt;
&lt;li&gt;AWS Lake Formation&lt;/li&gt;
&lt;li&gt;Amazon Managed Service for Apache Flink&lt;/li&gt;
&lt;li&gt;Amazon OpenSearch Service&lt;/li&gt;
&lt;li&gt;Amazon QuickSight&lt;/li&gt;
&lt;li&gt;Amazon Redshift&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Application Integration:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Amazon EventBridge&lt;/li&gt;
&lt;li&gt;Amazon Managed Workflows for Apache Airflow (Amazon MWAA)&lt;/li&gt;
&lt;li&gt;Amazon Simple Notification Service (Amazon SNS)&lt;/li&gt;
&lt;li&gt;Amazon Simple Queue Service (Amazon SQS)&lt;/li&gt;
&lt;li&gt;AWS Step Functions&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Cloud Financial Management:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;AWS Billing and Cost Management&lt;/li&gt;
&lt;li&gt;AWS Budgets&lt;/li&gt;
&lt;li&gt;AWS Cost Explorer&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Compute:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;AWS Batch&lt;/li&gt;
&lt;li&gt;Amazon EC2&lt;/li&gt;
&lt;li&gt;AWS Lambda&lt;/li&gt;
&lt;li&gt;AWS Serverless Application Repository&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Containers:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Amazon Elastic Container Registry (Amazon ECR)&lt;/li&gt;
&lt;li&gt;Amazon Elastic Container Service (Amazon ECS)&lt;/li&gt;
&lt;li&gt;Amazon Elastic Kubernetes Service (Amazon EKS)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Database:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Amazon DocumentDB (with MongoDB compatibility)&lt;/li&gt;
&lt;li&gt;Amazon DynamoDB&lt;/li&gt;
&lt;li&gt;Amazon ElastiCache&lt;/li&gt;
&lt;li&gt;Amazon Neptune&lt;/li&gt;
&lt;li&gt;Amazon RDS&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Developer Tools:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;AWS Cloud Development Kit (AWS CDK)&lt;/li&gt;
&lt;li&gt;AWS CodeArtifact&lt;/li&gt;
&lt;li&gt;AWS CodeBuild&lt;/li&gt;
&lt;li&gt;AWS CodeDeploy&lt;/li&gt;
&lt;li&gt;AWS CodePipeline&lt;/li&gt;
&lt;li&gt;AWS X-Ray&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Machine Learning:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Amazon Augmented AI (Amazon A2I)&lt;/li&gt;
&lt;li&gt;Amazon Bedrock&lt;/li&gt;
&lt;li&gt;Amazon CodeGuru&lt;/li&gt;
&lt;li&gt;Amazon Comprehend&lt;/li&gt;
&lt;li&gt;Amazon Comprehend Medical&lt;/li&gt;
&lt;li&gt;Amazon DevOps Guru&lt;/li&gt;
&lt;li&gt;Amazon Fraud Detector&lt;/li&gt;
&lt;li&gt;AWS HealthLake&lt;/li&gt;
&lt;li&gt;Amazon Kendra&lt;/li&gt;
&lt;li&gt;Amazon Lex&lt;/li&gt;
&lt;li&gt;Amazon Lookout for Equipment&lt;/li&gt;
&lt;li&gt;Amazon Lookout for Metrics&lt;/li&gt;
&lt;li&gt;Amazon Lookout for Vision&lt;/li&gt;
&lt;li&gt;Amazon Mechanical Turk&lt;/li&gt;
&lt;li&gt;Amazon Personalize&lt;/li&gt;
&lt;li&gt;Amazon Polly&lt;/li&gt;
&lt;li&gt;Amazon Q&lt;/li&gt;
&lt;li&gt;Amazon Rekognition&lt;/li&gt;
&lt;li&gt;Amazon SageMaker&lt;/li&gt;
&lt;li&gt;Amazon Textract&lt;/li&gt;
&lt;li&gt;Amazon Transcribe&lt;/li&gt;
&lt;li&gt;Amazon Translate&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Management and Governance:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;AWS Auto Scaling&lt;/li&gt;
&lt;li&gt;AWS Chatbot&lt;/li&gt;
&lt;li&gt;AWS CloudFormation&lt;/li&gt;
&lt;li&gt;AWS CloudTrail&lt;/li&gt;
&lt;li&gt;Amazon CloudWatch&lt;/li&gt;
&lt;li&gt;Amazon CloudWatch Logs&lt;/li&gt;
&lt;li&gt;AWS Compute Optimizer&lt;/li&gt;
&lt;li&gt;AWS Config&lt;/li&gt;
&lt;li&gt;AWS Organizations&lt;/li&gt;
&lt;li&gt;AWS Service Catalog&lt;/li&gt;
&lt;li&gt;AWS Systems Manager&lt;/li&gt;
&lt;li&gt;AWS Trusted Advisor&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Media:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Amazon Kinesis Video Streams&lt;/li&gt;
&lt;li&gt;Migration and Transfer:&lt;/li&gt;
&lt;li&gt;AWS DataSync&lt;/li&gt;
&lt;li&gt;Networking and Content Delivery:&lt;/li&gt;
&lt;li&gt;Amazon API Gateway&lt;/li&gt;
&lt;li&gt;Amazon CloudFront&lt;/li&gt;
&lt;li&gt;AWS Direct Connect&lt;/li&gt;
&lt;li&gt;Amazon VPC&lt;/li&gt;
&lt;li&gt;Security, Identity, and Compliance:&lt;/li&gt;
&lt;li&gt;AWS Identity and Access Management (IAM)&lt;/li&gt;
&lt;li&gt;AWS Key Management Service (AWS KMS)&lt;/li&gt;
&lt;li&gt;Amazon Macie&lt;/li&gt;
&lt;li&gt;AWS Secrets Manager&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Storage:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Amazon Elastic Block Store (Amazon EBS)&lt;/li&gt;
&lt;li&gt;Amazon Elastic File System (Amazon EFS)&lt;/li&gt;
&lt;li&gt;Amazon FSx&lt;/li&gt;
&lt;li&gt;Amazon S3&lt;/li&gt;
&lt;li&gt;Amazon S3 Glacier&lt;/li&gt;
&lt;li&gt;AWS Storage Gateway&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Out-of-scope AWS services and features&lt;/strong&gt;&lt;br&gt;
The following list contains AWS services and features that are out of scope for the exam. This list is non-exhaustive and is subject to change. AWS offerings that are entirely unrelated to the target job roles for the exam are excluded from this list:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Analytics:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;AWS Clean Rooms&lt;/li&gt;
&lt;li&gt;Amazon DataZone&lt;/li&gt;
&lt;li&gt;Amazon FinSpace&lt;/li&gt;
&lt;li&gt;Application Integration:&lt;/li&gt;
&lt;li&gt;Amazon AppFlow&lt;/li&gt;
&lt;li&gt;Amazon MQ&lt;/li&gt;
&lt;li&gt;Amazon Simple Workflow Service (Amazon SWF)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Business Applications:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Amazon Chime&lt;/li&gt;
&lt;li&gt;Amazon Connect&lt;/li&gt;
&lt;li&gt;Amazon Honeycode&lt;/li&gt;
&lt;li&gt;Amazon Pinpoint&lt;/li&gt;
&lt;li&gt;Amazon Simple Email Service (Amazon SES)&lt;/li&gt;
&lt;li&gt;AWS Supply Chain&lt;/li&gt;
&lt;li&gt;AWS Wickr&lt;/li&gt;
&lt;li&gt;Amazon WorkDocs&lt;/li&gt;
&lt;li&gt;Amazon WorkMail&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Cloud Financial Management:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;AWS Application Cost Profiler&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Compute:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;AWS App Runner&lt;/li&gt;
&lt;li&gt;AWS Elastic Beanstalk&lt;/li&gt;
&lt;li&gt;Amazon Lightsail&lt;/li&gt;
&lt;li&gt;AWS Outposts&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Containers:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Red Hat OpenShift Service on AWS (ROSA)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Customer Enablement:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;AWS Activate for startups&lt;/li&gt;
&lt;li&gt;AWS IQ&lt;/li&gt;
&lt;li&gt;AWS re:Post Private&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Developer Tools:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;AWS Application Composer&lt;/li&gt;
&lt;li&gt;AWS CloudShell&lt;/li&gt;
&lt;li&gt;Amazon CodeCatalyst&lt;/li&gt;
&lt;li&gt;AWS Fault Injection Service&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;End User Computing:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Amazon AppStream 2.0&lt;/li&gt;
&lt;li&gt;Amazon WorkSpaces&lt;/li&gt;
&lt;li&gt;Amazon WorkSpaces Secure Browser&lt;/li&gt;
&lt;li&gt;Amazon WorkSpaces Thin Client&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Frontend Web and Mobile:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;AWS Amplify&lt;/li&gt;
&lt;li&gt;AWS AppSync&lt;/li&gt;
&lt;li&gt;AWS Device Farm&lt;/li&gt;
&lt;li&gt;Amazon Location Service&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Internet of Things (IoT):&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;FreeRTOS&lt;/li&gt;
&lt;li&gt;AWS IoT 1-Click&lt;/li&gt;
&lt;li&gt;AWS IoT Core&lt;/li&gt;
&lt;li&gt;AWS IoT Device Defender&lt;/li&gt;
&lt;li&gt;AWS IoT Device Management&lt;/li&gt;
&lt;li&gt;AWS IoT Events&lt;/li&gt;
&lt;li&gt;AWS IoT FleetWise&lt;/li&gt;
&lt;li&gt;AWS IoT Greengrass&lt;/li&gt;
&lt;li&gt;AWS IoT RoboRunner&lt;/li&gt;
&lt;li&gt;AWS IoT SiteWise&lt;/li&gt;
&lt;li&gt;AWS IoT TwinMaker&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Machine Learning:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;AWS DeepRacer&lt;/li&gt;
&lt;li&gt;AWS HealthImaging&lt;/li&gt;
&lt;li&gt;AWS HealthOmics&lt;/li&gt;
&lt;li&gt;Amazon Monitron&lt;/li&gt;
&lt;li&gt;AWS Panorama&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Management and Governance:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;AWS AppConfig&lt;/li&gt;
&lt;li&gt;AWS Control Tower&lt;/li&gt;
&lt;li&gt;AWS Launch Wizard&lt;/li&gt;
&lt;li&gt;AWS License Manager&lt;/li&gt;
&lt;li&gt;Amazon Managed Grafana&lt;/li&gt;
&lt;li&gt;AWS Proton&lt;/li&gt;
&lt;li&gt;AWS Resilience Hub&lt;/li&gt;
&lt;li&gt;AWS Resource Explorer&lt;/li&gt;
&lt;li&gt;AWS Telco Network Builder&lt;/li&gt;
&lt;li&gt;AWS User Notifications&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Media:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Amazon Elastic Transcoder&lt;/li&gt;
&lt;li&gt;AWS Elemental Appliances and Software&lt;/li&gt;
&lt;li&gt;AWS Elemental MediaConnect&lt;/li&gt;
&lt;li&gt;AWS Elemental MediaConvert&lt;/li&gt;
&lt;li&gt;AWS Elemental MediaLive&lt;/li&gt;
&lt;li&gt;AWS Elemental MediaPackage&lt;/li&gt;
&lt;li&gt;AWS Elemental MediaStore&lt;/li&gt;
&lt;li&gt;AWS Elemental MediaTailor&lt;/li&gt;
&lt;li&gt;Amazon Interactive Video Service (Amazon IVS)&lt;/li&gt;
&lt;li&gt;Amazon Nimble Studio&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Migration and Transfer:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;AWS Application Discovery Service&lt;/li&gt;
&lt;li&gt;AWS Application Migration Service&lt;/li&gt;
&lt;li&gt;AWS Mainframe Modernization&lt;/li&gt;
&lt;li&gt;AWS Migration Hub&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Network and Content Delivery:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;AWS App Mesh&lt;/li&gt;
&lt;li&gt;AWS Cloud Map&lt;/li&gt;
&lt;li&gt;AWS Global Accelerator&lt;/li&gt;
&lt;li&gt;AWS Private 5G&lt;/li&gt;
&lt;li&gt;Amazon Route 53&lt;/li&gt;
&lt;li&gt;Amazon Route 53 Application Recovery Controller&lt;/li&gt;
&lt;li&gt;Amazon VPC IP Address Manager&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Security, Identity, and Compliance:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;AWS Artifact&lt;/li&gt;
&lt;li&gt;AWS Audit Manager&lt;/li&gt;
&lt;li&gt;AWS Certificate Manager (ACM)&lt;/li&gt;
&lt;li&gt;AWS CloudHSM&lt;/li&gt;
&lt;li&gt;Amazon Cognito&lt;/li&gt;
&lt;li&gt;Amazon Detective&lt;/li&gt;
&lt;li&gt;AWS Directory Service&lt;/li&gt;
&lt;li&gt;AWS Firewall Manager&lt;/li&gt;
&lt;li&gt;Amazon GuardDuty&lt;/li&gt;
&lt;li&gt;Amazon Inspector&lt;/li&gt;
&lt;li&gt;AWS Payment Cryptography&lt;/li&gt;
&lt;li&gt;AWS Private Certificate Authority&lt;/li&gt;
&lt;li&gt;AWS Resource Access Manager (AWS RAM)&lt;/li&gt;
&lt;li&gt;AWS Security Hub&lt;/li&gt;
&lt;li&gt;AWS Shield&lt;/li&gt;
&lt;li&gt;AWS Signer&lt;/li&gt;
&lt;li&gt;Amazon Verified Permissions&lt;/li&gt;
&lt;li&gt;AWS WAF&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Storage:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;AWS Elastic Disaster Recovery&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Here is the detailed link for the &lt;a href="https://d1.awsstatic.com/training-and-certification/docs-machine-learning-engineer-associate/AWS-Certified-Machine-Learning-Engineer-Associate_Exam-Guide.pdf" rel="noopener noreferrer"&gt;exam guide&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Whitepapers&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://docs.aws.amazon.com/whitepapers/latest/aws-overview/machine-learning.html" rel="noopener noreferrer"&gt;Machine Learning (ML) and Artificial Intelligence (AI)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://d1.awsstatic.com/whitepapers/augmented-ai-the-power-of-human-and-machine.pdf?did=wp_card&amp;amp;trk=wp_card" rel="noopener noreferrer"&gt;Augmented AI: The Power of Human and Machine&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.aws.amazon.com/wellarchitected/latest/machine-learning-lens/well-architected-machine-learning-lifecycle.html" rel="noopener noreferrer"&gt;Well-Architected Machine Learning Lifecycle&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.aws.amazon.com/machine-learning/" rel="noopener noreferrer"&gt;Amazon Machine Learning Documentation&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;You also can review the collection of &lt;a href="https://aws.amazon.com/whitepapers/?whitepapers-main.sort-by=item.additionalFields.sortDate&amp;amp;whitepapers-main.sort-order=desc&amp;amp;awsf.whitepapers-content-type=*all&amp;amp;awsf.whitepapers-global-methodology=*all&amp;amp;awsf.whitepapers-tech-category=tech-category%23ai-ml&amp;amp;awsf.whitepapers-industries=*all&amp;amp;awsf.whitepapers-business-category=*all&amp;amp;awsm.page-whitepapers-main=1" rel="noopener noreferrer"&gt;AWS ML Whitepapers&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;FAQs&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/kendra/faqs/" rel="noopener noreferrer"&gt;Amazon Kendra FAQ&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/personalize/faqs/" rel="noopener noreferrer"&gt;Amazon Personalize FAQ&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/textract/faqs/" rel="noopener noreferrer"&gt;Amazon Textract FAQ&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/comprehend/faqs/" rel="noopener noreferrer"&gt;Amazon Comprehend FAQ&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>aws</category>
      <category>certification</category>
      <category>awsmlac01</category>
      <category>awscertificationexam</category>
    </item>
    <item>
      <title>Understanding Pass-Through Authentication (PTA) and Password Hash Synchronization (PHS)</title>
      <dc:creator>sachindra@work</dc:creator>
      <pubDate>Sat, 22 Feb 2025 16:35:47 +0000</pubDate>
      <link>https://dev.to/sachindra149/understanding-pass-through-authentication-pta-and-password-hash-synchronization-phs-412n</link>
      <guid>https://dev.to/sachindra149/understanding-pass-through-authentication-pta-and-password-hash-synchronization-phs-412n</guid>
      <description>&lt;p&gt;In hybrid environments where on-premises Active Directory (AD) integrates with Azure Active Directory (Azure AD), two primary methods are used to authenticate users: &lt;strong&gt;Pass-Through Authentication&lt;/strong&gt; (PTA) and &lt;strong&gt;Password Hash Synchronization&lt;/strong&gt; (PHS).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Pass-Through Authentication (PTA)&lt;/strong&gt;&lt;br&gt;
PTA allows users to authenticate directly against the on-premises AD. When a user attempts to sign in, their password is validated by the on-premises AD domain controller. Unlike other methods, PTA does not store or sync the password hash to Azure AD. Instead, it relies on an agent installed on the on-premises server to handle authentication requests. This ensures that the authentication process remains within the on-premises environment, providing a higher level of security for organizations that prefer to keep their authentication processes local.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Password Hash Synchronization (PHS)&lt;/strong&gt;&lt;br&gt;
PHS, on the other hand, synchronizes a hash of the user’s password from the on-premises AD to Azure AD. This hash is further hashed using a secure SHA256 algorithm before being stored in Azure AD. When a user attempts to sign in, Azure AD validates the password against the stored hash. This method allows for seamless Single Sign-On (SSO) experiences and reduces dependency on the on-premises infrastructure for authentication.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key Differences&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Authentication Location:

&lt;ul&gt;
&lt;li&gt;PTA: Authentication occurs on-premises.&lt;/li&gt;
&lt;li&gt;PHS: Authentication occurs in Azure AD.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;Password Storage:

&lt;ul&gt;
&lt;li&gt;PTA: No password hashes are stored in Azure AD.&lt;/li&gt;
&lt;li&gt;PHS: A hash of the password hash is stored in Azure AD.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;Dependency:

&lt;ul&gt;
&lt;li&gt;PTA: Requires an on-premises agent to handle authentication requests.&lt;/li&gt;
&lt;li&gt;PHS: Does not require an on-premises agent for authentication.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;Security:

&lt;ul&gt;
&lt;li&gt;PTA: Keeps authentication within the on-premises environment, which may be preferred for security reasons.&lt;/li&gt;
&lt;li&gt;PHS: Provides a secure way to store password hashes in Azure AD using SHA256.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Use Cases&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;PTA is suitable for organizations that want to maintain control over their authentication processes and prefer not to store password hashes in the cloud.&lt;/li&gt;
&lt;li&gt;PHS is ideal for organizations looking for a simpler setup with reduced dependency on on-premises infrastructure and a seamless SSO experience.&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>microsoft</category>
      <category>azure</category>
    </item>
    <item>
      <title>Threat Modeling in Cybersecurity</title>
      <dc:creator>sachindra@work</dc:creator>
      <pubDate>Sun, 26 Jan 2025 08:24:19 +0000</pubDate>
      <link>https://dev.to/sachindra149/threat-modeling-in-cybersecurity-1566</link>
      <guid>https://dev.to/sachindra149/threat-modeling-in-cybersecurity-1566</guid>
      <description>&lt;p&gt;&lt;strong&gt;Threat Modeling&lt;/strong&gt; is a structured approach to identify, assess and mitigate potential security threats to a system, application or network. It is a method of optimizing network security by locating vulnerabilities, identifying objectives and developing counter-measures to either prevent or mitigate the effects of cyber-attacks against the system.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Threat Modelling&lt;/strong&gt; process involves creating a security profile for the application taking into account the resources or components involved in the application, their role in the entire application lifecycle, identifying potential threats and documenting the detrimental effects along with the mitigating actions required to resolve those.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Threat Modelling&lt;/strong&gt; plays a crucial role in the entire security landscape of any organization. It allows organizations to proactively identify potential threats and vulnerabilities within their systems, applications or networks, thereby enabling them to take preventive measures and mitigating risks before any security incident and/or breach occurs, thereby improving their overall security posture and reducing the likelihood of a successful attack. Security Threat Modelling enables an IT Team to understand the nature of threats, as well as how they may impact the network.  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How does Threat Modelling support Software Development Lifecycle&lt;/strong&gt;&lt;br&gt;
In software development, Threat Modelling help identify potential vulnerabilities in the early stages of application design, allowing developers to incorporate security measures into the application from the initial design phases. It directs the focus towards areas that require immediate attention and resources promoting a cost-effective and efficient application security strategy. It plays an integral role right from the initial stages of the software development process, where the developers and solution architects start with the design of the application. This phase entails scrutinizing all the potential interaction points within the system to identify potential vulnerabilities. By applying Threat Modelling early in the SDLC process, developers can minimize risks, save valuable time and resources that would otherwise be spent on damage control at a later stage.&lt;/p&gt;

&lt;p&gt;Identifying potential threats and vulnerabilities early in the process allows developers to protect higher risk areas, implement stronger authentication mechanisms and improve validation methods. Essentially Threat Modelling helps developers design and build resilient software.&lt;/p&gt;

&lt;p&gt;It is noteworthy that, Threat Modelling is not a one-time task and is relevant throughout the SDLC lifecycle. As the software or the product evolves with new features and modifications, the threat landscape may change. So, it is critical to continually re-evaluate the system. However, this is considered a pro-active measure when implemented during design or development stage, or a reactive measure when implemented during deployment stage. The biggest value that Threat modelling as a process brings in, is not the final report at the end, it's going through the entire process.&lt;/p&gt;

&lt;p&gt;Key Reasons to use &lt;strong&gt;Threat Modelling:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Early Risk Identification&lt;/li&gt;
&lt;li&gt;Prioritization of Security Controls&lt;/li&gt;
&lt;li&gt;Improved Communication between Security &amp;amp; Development Teams&lt;/li&gt;
&lt;li&gt;Risk Mitigation&lt;/li&gt;
&lt;li&gt;Compliance &amp;amp; Regulations&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Types of Threat Modelling Frameworks:&lt;/strong&gt;&lt;br&gt;
Threat Modelling Frameworks are structured methodologies that guide the process of identifying, assessing and mitigating security threats within a system. Organizations can enhance their security posture and  protect their systems efficiently by choosing the right framework.&lt;/p&gt;

&lt;p&gt;Some commonly used frameworks are:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;STRIDE:&lt;/strong&gt;&lt;br&gt;
Developed by Praerit Garg and Loren Kohnfelder at Microsoft in 1999, this is a mnemonic-based threat modelling framework used to identify potential security threats in software systems. This is straight-forward and easier to apply, making it suitable for identifying specific threat types in software systems, however, it may not cover all possible threats comprehensively. It is more suitable for smaller projects or initial threat assessments.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Spoofing&lt;/li&gt;
&lt;li&gt;Tampering&lt;/li&gt;
&lt;li&gt;Repudiation&lt;/li&gt;
&lt;li&gt;Information Disclosure&lt;/li&gt;
&lt;li&gt;Denial of Service (DoS)&lt;/li&gt;
&lt;li&gt;Escalation of Privilege&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft61i7r8otwhobv5mvbpc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft61i7r8otwhobv5mvbpc.png" alt="Stride - Threat Modelling Framework" width="800" height="436"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;DREAD:&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Damage Potential:&lt;/strong&gt; How severe would the attack be?&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Reproducibility:&lt;/strong&gt; How easy is it to reproduce the attack?&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploitability:&lt;/strong&gt; How easy is it to launch the attack?&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Affected Users:&lt;/strong&gt; How many users would be affected?&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Discoverability:&lt;/strong&gt; How easy is it to discover the vulnerability?&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;PASTA (Process for Attack Simulation and threat Analysis):&lt;/strong&gt;&lt;br&gt;
Pasta is a detailed, risk-centric threat modelling framework, developed by VerSprite CEO Tony UcedaVélez and security leader Marco M. Morana in 2015, that focuses on simulating potential attacks and analyzing their impact on business objectives, providing a thorough analysis. However, it can be complex and resource-intensive. Pasta is usually ideal for comprehensive, in-depth threat modelling in large, critical systems. This provides an ability to prioritize based on what is likely to happen in my application model and to substantiate and create a level of credibility with information and posture.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Stages:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Definition of Objectives:&lt;/strong&gt; Identify business objectives and security requirements.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Definition of technical scope:&lt;/strong&gt; Outline the technical environment.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Application Decomposition:&lt;/strong&gt; Break down application into components.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Threat Analysis:&lt;/strong&gt; Identify potential threats.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Vulnerability Analysis:&lt;/strong&gt; Discover vulnerabilities.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack Modelling:&lt;/strong&gt; Simulate potential attacks.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Risk and Impact Analysis:&lt;/strong&gt; Assess the impact an likelihood of risks.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0fr4r9lsffpbpad7xep3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0fr4r9lsffpbpad7xep3.png" alt="Pasta - Threat Modelling" width="562" height="550"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Trike:&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Risk Modelling:&lt;/strong&gt; assess risks based on security requirements and stakeholder needs.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Threat Modelling:&lt;/strong&gt; Identify threats and vulnerabilities.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Mitigation and Planning:&lt;/strong&gt; Plan and implement mitigations.&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;VAST (Visual, Agile and Simple Threat):&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Application Threat Modelling:&lt;/strong&gt; Focuses on individual applications.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Operational Threat Modelling:&lt;/strong&gt; Focuses on infrastructure.&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Attack Trees:&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Tree Structure:&lt;/strong&gt; Diagram representing potential attacks on a system.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Nodes:&lt;/strong&gt; Different steps or actions an attacker can take.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Root Node:&lt;/strong&gt; The ultimate goal of the attack.&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;OCTAVE (Operationally Critical Threat, Asset and Vulnerability Evaluation)&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Phases:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Build asset-based threat profiles:&lt;/strong&gt; Identify critical assets and threats&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Identify infrastructure Vulnerabilities:&lt;/strong&gt; Assess vulnerabilities.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Develop Security Strategy and Plans:&lt;/strong&gt; Formulate mitigation strategies.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;How &lt;strong&gt;Threat Modelling&lt;/strong&gt; works:&lt;br&gt;
The Threat modelling process can be decomposed into four high level steps with each step being duly documented as it is carried out.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Scope the work:&lt;/strong&gt; This is the first step which involves drawing data flow diagrams (DFD) which show what we are working on. This step might include several levels of DFDs based on the complexities being added to the application flow. This shows different paths through the system, highlighting the privilege or trust boundaries. This step also involves identifying entry points to visualize where any attacker can interact with the application. This helps identify the assets involved and trust levels that represent the access rights granted to external entities. Next step is to identify the trust boundaries in the threat modelling diagrams. These are places in the diagrams where trust levels change, meaning where unauthenticated users to authenticated users; or regular users to privileged users.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Determine Threats:&lt;/strong&gt; This step involves leveraging a framework to identify threats.  The goal is to help identify threats from the actors. It analyses how an attacker might exploit the system. This involves considering each of the trust boundaries and note down the strengths and weaknesses in each category. Strengths are normally the mitigation steps undertaken.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Address the Threats:&lt;/strong&gt; This step involves defining counter-measures and mitigation techniques. This also includes prioritization of those counter-measures. This takes into account several factors like likelihood of attack, damage induced from the attack and complexity or cost of the fix applied. the mitigation strategies involve analyzing the threats from a business impact perspective. Options for addressing the risks identified include below options:&lt;/li&gt;
&lt;/ul&gt;

&lt;ol&gt;
&lt;li&gt;Accept&lt;/li&gt;
&lt;li&gt;Eliminate&lt;/li&gt;
&lt;li&gt;Mitigate&lt;/li&gt;
&lt;li&gt;Transfer&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Validate the Model:&lt;/strong&gt; After the above steps are completed, we get a diagram, the threats' list and a controls list.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Threat Modeling Tools:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;OWASP Threat Dragon&lt;/li&gt;
&lt;li&gt;Microsoft Threat Modeling Tool&lt;/li&gt;
&lt;li&gt;PyTM&lt;/li&gt;
&lt;li&gt;SeaSponge&lt;/li&gt;
&lt;li&gt;IriusRisk &lt;/li&gt;
&lt;li&gt;Threat Composer&lt;/li&gt;
&lt;li&gt;SD Elements&lt;/li&gt;
&lt;li&gt;ThreatModeler&lt;/li&gt;
&lt;li&gt;Arxan Threat Analytics&lt;/li&gt;
&lt;li&gt;Axure RP&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Resources:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://owasp.org/www-community/Threat_Modeling_Process" rel="noopener noreferrer"&gt;https://owasp.org/www-community/Threat_Modeling_Process&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://insights.sei.cmu.edu/blog/threat-modeling-12-available-methods/" rel="noopener noreferrer"&gt;https://insights.sei.cmu.edu/blog/threat-modeling-12-available-methods/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.ashbysoft.com/posts/owasp-threat-modelling/" rel="noopener noreferrer"&gt;https://www.ashbysoft.com/posts/owasp-threat-modelling/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=rEnJYNkUde0" rel="noopener noreferrer"&gt;https://www.youtube.com/watch?v=rEnJYNkUde0&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=oIeF3HkdYcU&amp;amp;t=766s" rel="noopener noreferrer"&gt;https://www.youtube.com/watch?v=oIeF3HkdYcU&amp;amp;t=766s&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.hackerone.com/knowledge-center/threat-modeling-process-frameworks-and-tools" rel="noopener noreferrer"&gt;https://www.hackerone.com/knowledge-center/threat-modeling-process-frameworks-and-tools&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=hUOAoc6QGJo&amp;amp;list=PLUKo5k_oSrfOTl27gUmk2o-NBKvkTGw0T&amp;amp;index=11" rel="noopener noreferrer"&gt;https://www.youtube.com/watch?v=hUOAoc6QGJo&amp;amp;list=PLUKo5k_oSrfOTl27gUmk2o-NBKvkTGw0T&amp;amp;index=11&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://nordvpn.com/blog/threat-modeling/" rel="noopener noreferrer"&gt;https://nordvpn.com/blog/threat-modeling/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://aivillage.org/large%20language%20models/threat-modeling-llm/" rel="noopener noreferrer"&gt;https://aivillage.org/large%20language%20models/threat-modeling-llm/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.threatdragon.com/#/" rel="noopener noreferrer"&gt;https://www.threatdragon.com/#/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.securitycompass.com/blog/12-essential-threat-modeling-tools-for-enhancing-your-cybersecurity-posture/" rel="noopener noreferrer"&gt;https://www.securitycompass.com/blog/12-essential-threat-modeling-tools-for-enhancing-your-cybersecurity-posture/&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>threatmodeling</category>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>microsoft</category>
    </item>
    <item>
      <title>EDR vs. XDR vs. SIEM vs. MDR vs. SOAR</title>
      <dc:creator>sachindra@work</dc:creator>
      <pubDate>Wed, 26 Jun 2024 15:43:43 +0000</pubDate>
      <link>https://dev.to/sachindra149/edr-vs-xdr-vs-siem-vs-mdr-vs-soar-2blp</link>
      <guid>https://dev.to/sachindra149/edr-vs-xdr-vs-siem-vs-mdr-vs-soar-2blp</guid>
      <description>&lt;p&gt;The world of Cybersecurity is buzzing with tech jargon and abbreviations. Many enterprises prefer to use newer approaches to combat the ever-evolving security risks and attack vectors. To counter threats, there are several tools and solutions including &lt;strong&gt;SIEM&lt;/strong&gt; (Security Information and Event Management), &lt;strong&gt;MDR&lt;/strong&gt; (Managed Detection &amp;amp; Response), &lt;strong&gt;SOAR&lt;/strong&gt; (Security Orchestration, Automation &amp;amp; Response), &lt;strong&gt;EDR&lt;/strong&gt; (Endpoint Detection &amp;amp; Response) and &lt;strong&gt;XDR&lt;/strong&gt; (Extended Detection &amp;amp; Response).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;SIEM&lt;/strong&gt;: It is a tool that assists enterprises in identifying, assessing and responding to threats that affect businesses. It is intended to increase the visibility of the IT environment, allowing teams to respond to perceive events and security incidents efficiently through communication and collaboration. This involves identifying threats and taking action. It also offers forensic investigation and compliance reporting capabilities.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;MDR&lt;/strong&gt;: It typically comprises of technology, processes and people that collaborate to detect and respond to cyber threats. It is designed to provide continuous cybersecurity threat protection, detection and response. This makes use of machine learning to investigate, alert and contain cyber threats at scale. As a solution, MDR provides a proactive approach to threat detection and response and also assists enterprises to identify and mitigate threats faster, provide real-time monitoring, and respond to cyber threats.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;SOAR&lt;/strong&gt;: This is a solution stack that allows an organization to gather information about security threats and respond to events without any human involvement. This enables task coordination, execution and automation between various individuals and tools within a single platform. It provides a centralized platform for incident management, thereby reducing the need for manual processes and various technologies. This allows enterprises to easily plan, track and report on incident management activities, which improves the incident response times and the overall security posture. This can orchestrate and automate tasks across multiple security tools and systems allowing businesses to streamline their incident response process. It can automatically invoke investigation path workflows and shorten the time it takes to resolve alerts. According to Gartner, SOAR is a technology that comprises of security orchestration and automation (SOA), incident response, and threat intelligence platforms (TIPs). This allows security teams to investigate threats by leveraging automated threat hunting playbooks and reduce the overall mean-time-to-detect (MTTD) and mean-time-to-respond (MTTD).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;EDR&lt;/strong&gt;: This helps detect, investigate and respond to advanced endpoint threats. It is used as a compensation for the shortcomings of traditional endpoint protection solutions for preventing attacks. This allows customers to have full visibility into all security related endpoint activities. This is an advanced version of EPP (Endpoint Protection Platform) and helps completely thwart threats.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;XDR&lt;/strong&gt;: This is a security solution that aims to identify, investigate and respond to advanced threats emanating from various sources, like cloud, networks and email. It is a SaaS-based security platform that combines the organization's existing security solutions into a single security system. It collates raw telemetry data from a wide range of sources, including cloud apps, email, identity and access control, and integrates it with the data from multiple security systems to improve threat visibility and reduce the time to detect and respond to an attack. This is an evolution of EDR. XDR's capabilities extend beyond endpoint detection, it offers detection, analytics and response capabilities across endpoints, networks, severs, cloud workloads, SIEMs and many other platforms.&lt;/p&gt;

</description>
      <category>soar</category>
      <category>cybersecurity</category>
      <category>technology</category>
      <category>detectionandresponse</category>
    </item>
    <item>
      <title>ServiceNow and MID Server</title>
      <dc:creator>sachindra@work</dc:creator>
      <pubDate>Mon, 15 Apr 2024 09:25:28 +0000</pubDate>
      <link>https://dev.to/sachindra149/servicenow-and-mid-server-58no</link>
      <guid>https://dev.to/sachindra149/servicenow-and-mid-server-58no</guid>
      <description>&lt;p&gt;&lt;strong&gt;ServiceNow&lt;/strong&gt; is a cloud-based platform that helps organizations with a unified solution to streamline workflows, enhance customer experience, and drive innovation using AI and innovation. It enables purposeful orchestration and automation of tasks and processes across the enterprise and its ecosystems. It drives efficiency, optimization, and agility, regardless of an organization’s size or industry.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;ServiceNow Discovery&lt;/strong&gt; is an application/module within ServiceNow that allows an enterprise to determine the devices in its internal network or resources in its public cloud and also the applications that run on the cloud. It is also known as Infrastructure and Application Discovery. It finds computers and other devices  connected to an enterprise's network. When Discovery finds a computer or  device, it explores the device's configuration, provisioning, and  current status and updates the CMDB accordingly. It discovers organizational IT infrastructure, creating an accurate and up-to-date record in the ServiceNow CMDB (Configuration Management Database). It discovers both physical and logical components, including virtual machines, servers, storage, databases, applications, and more. Discovery also creates all the relationships between computer systems (such as an  application on one server that uses a database on another server).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;MID Server&lt;/strong&gt; (Management, Instrumentation and Discovery) is a Java application that runs as a Windows service or UNIX Daemon on a server on the enterprise network. The ServiceNow MID Server enables communication and data movement between the ServiceNow apps and enterprise servers and/or applications. It works behind the organizational firewall and is completely controlled by the organization. It initiates all communication within the ServiceNow instance. This communication is recorded as records in the MID Server ECC queue (External Communication Channel), which acts as a communication log between the MID Server and the ServiceNow instance. Jobs that the MID Server needs to perform are saved in this queue until the MID Server is ready to handle them.&lt;/p&gt;

&lt;p&gt;The MID Server subscribes to messages published by the Asynchronous Message Bus (AMB), which notifies the MID Server about pending tasks in the ECC Queue. MID Server updates of the progress of the task(s) to the ECC Queue. It polls the ECC Queue on regular intervals (default being 40 seconds) regardless of AMB message activity. While MID Server facilitate communication, orchestration, and discovery, it does not store data themselves. Instead, they act as conduits, ensuring secure interactions between ServiceNow and your organization’s systems. It supports service mapping by identifying dependencies and relationships among services.&lt;/p&gt;

&lt;p&gt;Below are few resources that provide details around the ServiceNow MID Server component.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.servicenow.com/what-is-servicenow.html"&gt;https://www.servicenow.com/what-is-servicenow.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.servicenow.com/content/dam/servicenow-assets/public/en-us/doc-type/resource-center/data-sheet/ds-discovery.pdf"&gt;https://www.servicenow.com/content/dam/servicenow-assets/public/en-us/doc-type/resource-center/data-sheet/ds-discovery.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.servicenow.com/content/dam/servicenow-assets/public/en-us/doc-type/success/quick-answer/mid-server-basics.pdf"&gt;https://www.servicenow.com/content/dam/servicenow-assets/public/en-us/doc-type/success/quick-answer/mid-server-basics.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=-Y7zULTiyAc"&gt;https://www.youtube.com/watch?v=-Y7zULTiyAc
&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>servicenow</category>
      <category>midserver</category>
      <category>discovery</category>
      <category>cmdb</category>
    </item>
    <item>
      <title>IPSec vs MACSec</title>
      <dc:creator>sachindra@work</dc:creator>
      <pubDate>Mon, 16 Oct 2023 08:25:56 +0000</pubDate>
      <link>https://dev.to/sachindra149/ipsec-vs-macsec-4n5d</link>
      <guid>https://dev.to/sachindra149/ipsec-vs-macsec-4n5d</guid>
      <description>&lt;p&gt;There is no definitive answer to which protocol is more secure, as they have different advantages and disadvantages depending on the use case and the level of security required. IPSec and MACSec are both used for network security, but they operate at different layers of the network. IPSec works on IP packets at Layer 3, while MACSec works on Ethernet frames at Layer 2. &lt;/p&gt;

&lt;p&gt;Some of the factors that affect the security of each protocol are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;IPSec provides end-to-end security, while MACSec provides hop-by-hop security. This means that IPSec encrypts and decrypts data only at the endpoints of a tunnel, while MACSec encrypts and decrypts data at every hop along the way. This can have implications for the confidentiality, integrity, and availability of the data.&lt;/li&gt;
&lt;li&gt;MACSec can secure all DHCP and ARP traffic, which IPSec cannot. DHCP and ARP are protocols that operate at Layer 2 and are used for dynamic IP address assignment and MAC address resolution. These protocols can be vulnerable to spoofing and hijacking attacks, which MACSec can prevent by authenticating and encrypting the traffic.&lt;/li&gt;
&lt;li&gt;IPSec can work across routers, while MACSec is limited to a LAN. This means that IPSec can secure traffic over a wide area network (WAN), such as the Internet, while MACSec can only secure traffic within a local area network (LAN), such as a campus or data center. This can affect the scalability and flexibility of the network design.&lt;/li&gt;
&lt;li&gt;MACSec is faster and simpler than IPSec, as it operates at the physical layer and does not enlarge the Ethernet header significantly. IPSec is more complex and requires a dedicated encryption engine and a larger header. This can affect the performance and cost of the network equipment.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The two protocols can be compatible and complementary, depending on the use case and the level of security required. For example, MACSec can enhance IPSec by securing the last mile link between a wireless device and a central office. Alternatively, IPSec can enhance MACSec by providing end-to-end security over a WAN.&lt;/p&gt;

</description>
      <category>ipsec</category>
      <category>macsec</category>
      <category>networksecurity</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Grey Box vs Double Grey Box Testing</title>
      <dc:creator>sachindra@work</dc:creator>
      <pubDate>Sun, 24 Sep 2023 06:17:57 +0000</pubDate>
      <link>https://dev.to/sachindra149/grey-box-vs-double-grey-box-testing-4552</link>
      <guid>https://dev.to/sachindra149/grey-box-vs-double-grey-box-testing-4552</guid>
      <description>&lt;p&gt;&lt;strong&gt;Grey box testing&lt;/strong&gt; and &lt;strong&gt;double grey box testing&lt;/strong&gt; are two types of software testing methods that differ in the amount of information that is shared between the testers and the target system. &lt;/p&gt;

&lt;p&gt;In &lt;strong&gt;grey box testing&lt;/strong&gt;, the testers have partial knowledge of the internal structure of the system, such as the architecture, the data structures, or the algorithms. They use this information to design test cases that can cover both the functionality and the code of the system. &lt;strong&gt;Grey box testing&lt;/strong&gt; is a combination of black box testing and white box testing, where black box testing does not require any knowledge of the internal structure, and white box testing requires full access to the source code. &lt;strong&gt;Grey box testing&lt;/strong&gt; can provide better test coverage and efficiency than black box testing, as well as identify context-specific errors that are related to web systems.&lt;/p&gt;

&lt;p&gt;In &lt;strong&gt;double grey box testing&lt;/strong&gt;, not only the testers have partial knowledge of the internal structure of the system, but also the system has partial knowledge of the test cases that are being executed. This means that the system can adapt its behavior or responses based on the test cases and try to evade or deceive the testers. &lt;strong&gt;Double grey box testing&lt;/strong&gt; is often used in penetration testing or security testing, where the testers try to find vulnerabilities or weaknesses in the system, and the system tries to defend itself or hide its flaws. &lt;strong&gt;Double grey box testing&lt;/strong&gt; can provide a realistic assessment of the security posture and resilience of the system, as well as challenge the skills and creativity of the testers.&lt;/p&gt;

</description>
      <category>softwaretesting</category>
      <category>greyboxtesting</category>
      <category>testing</category>
      <category>doublegreyboxtesting</category>
    </item>
    <item>
      <title>Blind Testing vs Double Blind Testing vs Triple Blind Testing</title>
      <dc:creator>sachindra@work</dc:creator>
      <pubDate>Sun, 24 Sep 2023 06:05:03 +0000</pubDate>
      <link>https://dev.to/sachindra149/blind-testing-vs-double-blind-testing-vs-triple-blind-testing-49o9</link>
      <guid>https://dev.to/sachindra149/blind-testing-vs-double-blind-testing-vs-triple-blind-testing-49o9</guid>
      <description>&lt;p&gt;&lt;strong&gt;Blind Testing&lt;/strong&gt; and &lt;strong&gt;Double-Blind Testing&lt;/strong&gt; are two types of penetration testing methods that differ in the amount of information shared between the testers and the target organization.&lt;/p&gt;

&lt;p&gt;In Blind Testing, testers have no prior knowledge of the target network or system, and they have to perform the tests as if they were real attackers. This simulates a realistic scenario where the attackers do not have any insider information about the target. The &lt;strong&gt;advantage&lt;/strong&gt; of &lt;strong&gt;blind testing&lt;/strong&gt; is that it can reveal the vulnerabilities that might be overlooked by the target organization. The &lt;strong&gt;disadvantage&lt;/strong&gt; is that it can be time-consuming and costly, as the testers have to spend more time and resources to gather information and plan the attack.&lt;/p&gt;

&lt;p&gt;In &lt;strong&gt;Double Blind Testing&lt;/strong&gt;, not only the testers are unaware of the target network or system, but also the target organization is not informed of the test being conducted. This means that the target organization's security has team has to respond to the test as if it were a real attack, without any prior preparation or notification. This can evaluate the effectiveness and readiness of the security team, as well as the incident response procedures and policies. The advantage of &lt;strong&gt;double-blind testing&lt;/strong&gt; is that it can provide a realistic assessment of the security posture and resilience of the target organization. The &lt;strong&gt;disadvantage&lt;/strong&gt; is that it can be risky and disruptive, as it can cause damage or downtime to the target network or system or trigger legal or ethical issues.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Triple blind testing&lt;/strong&gt; is a type of experimental design that involves three levels of blinding: the participants, the researchers, and the data analysts. This means that none of these parties know which group (treatment or control) each participant belongs to, or what the expected outcome of the experiment is. This reduces the risk of bias and confounding factors that might affect the results of the experiment.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Triple blind testing&lt;/strong&gt; is often used in medical research, especially in clinical trials, where the effectiveness and safety of a new drug or treatment are being tested. By blinding the participants, the researchers, and the data analysts, the experiment can ensure that the results are based on the actual effects of the drug or treatment, and not influenced by any expectations, preferences, or behaviors of any of the parties involved.&lt;/p&gt;

&lt;p&gt;For example, suppose you are testing a new drug for depression. In a triple blind trial, you would randomly assign some participants to receive the new drug, and some to receive a placebo (a fake drug that has no effect). Neither the participants nor the researchers who administer the drug would know who is receiving which drug. This way, you can avoid the placebo effect (where participants feel better because they think they are receiving a real drug) or the nocebo effect (where participants feel worse because they think they are receiving a fake drug). You would also blind the data analysts who evaluate the results of the experiment. They would not know which group is which, or what the hypothesis of the experiment is. This way, you can avoid confirmation bias (where data analysts interpret the results in a way that supports their preconceived beliefs) or experimenter bias (where data analysts manipulate or select the data in a way that favors one group over another).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Triple blind testing&lt;/strong&gt; is considered to be a very rigorous and reliable method of conducting experiments, as it eliminates many sources of error and bias. However, it is also very challenging and costly to implement, as it requires careful planning and coordination among all parties involved. It may also not be feasible or ethical in some situations, such as when there are serious risks or side effects associated with the treatment being tested.&lt;/p&gt;

</description>
      <category>penetrationtesting</category>
      <category>iso27001</category>
      <category>securitytesting</category>
      <category>testing</category>
    </item>
    <item>
      <title>DLP vs DRM - Understanding the differences</title>
      <dc:creator>sachindra@work</dc:creator>
      <pubDate>Tue, 12 Sep 2023 12:34:08 +0000</pubDate>
      <link>https://dev.to/sachindra149/dlp-vs-drm-understanding-the-differences-2b2l</link>
      <guid>https://dev.to/sachindra149/dlp-vs-drm-understanding-the-differences-2b2l</guid>
      <description>&lt;p&gt;DRM stands for &lt;strong&gt;Digital Rights Management&lt;/strong&gt;, which is a software that helps protect the intellectual property rights of digital content owners. DRM can encrypt files and control access privileges dynamically, even after the files are shared or downloaded.&lt;/p&gt;

&lt;p&gt;Some examples of DRM are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Apple iTunes&lt;/strong&gt;: Uses DRM to limit how many devices customers can use to listen to songs. Audio files that users download from iTunes include data about their purchase and usage of songs. This prevents the files from being accessed on unauthorized devices.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Spotify&lt;/strong&gt;: Leverages blockchain technology to enable the payment of artists through cryptocurrency. The blockchain records the transactions and ensures that the artists receive their fair share of royalties.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Microsoft software&lt;/strong&gt;: Anyone that downloads Microsoft software, such as Windows or Office programs, has to accept the company’s user license and enter a key before they can install it. The key verifies that the software is legitimate and not pirated.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;ADEPT, FairPlay, Advanced Access Content System&lt;/strong&gt;: These are modern DRM systems that rely on encryption to be fully effective. They are used by various publishers and distributors of digital content, such as ebooks, music, and movies, to protect their rights and prevent unauthorized copying or sharing.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;DLP stands for &lt;strong&gt;Data Loss Prevention&lt;/strong&gt;, which is a software that helps protect sensitive data from unauthorized access, leakage, or theft. DLP can analyze document content and user behavior patterns and restrict the movement of information based on preset criteria. DLP is a part of a company’s overall security strategy that focuses on detecting and preventing the loss, leakage or misuse of data through breaches, ex-filtration transmissions and unauthorized use. Organizations use DLP to protect and secure their data and comply with regulations. DLP can also block the extraction of sensitive data and prevent the illicit transfer of data outside the organization.&lt;/p&gt;

&lt;p&gt;DLP works by &lt;strong&gt;classifying, detecting, and protecting&lt;/strong&gt; information in three states: data in use, data at rest, and data in motion. DLP can also &lt;strong&gt;track, alert, change permissions, or block&lt;/strong&gt; data when it is in danger of leaving the corporate network. DLP can help prevent data exfiltration, which is the unauthorized transfer of data outside the organization.&lt;/p&gt;

&lt;p&gt;There are many DLP solutions available in the market, each with its own features and capabilities. Some of the common DLP solutions are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Digital Guardian Endpoint DLP&lt;/strong&gt;: A cloud-based platform that protects data across endpoints, networks, and cloud applications.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Fidelis&lt;/strong&gt;: A network-based solution that detects and prevents data exfiltration, insider threats, and advanced attacks.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check Point DLP&lt;/strong&gt;: A gateway-based solution that monitors and controls data transfers over web, email, and FTP protocols.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Microsoft 365 Compliance&lt;/strong&gt;: A cloud-based solution that integrates with Microsoft products and services to classify, protect, and govern data.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;SolarWinds Data Loss Prevention with ARM&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Endpoint Protector by CoSoSys&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Symantec Data Loss Prevention&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;McAfee Total Protection for DLP&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Code42&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Google Cloud Data Loss Prevention&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Nightfall.ai&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Spirion Data Privacy Manager&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Some of the common DLP solutions for email are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Proofpoint&lt;/strong&gt;: A gateway-based solution that monitors and controls data transfers over email and satisfies compliance with 80+ built-in policies.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Tessian&lt;/strong&gt;: A machine learning-based solution that detects and prevents data exfiltration, insider threats, and misdirected emails by learning from user behavior.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Google Workspace&lt;/strong&gt;: A cloud-based solution that scans email traffic using DLP rules and detectors and applies automatic responses such as quarantining, rejecting, or modifying messages.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The main difference between DRM and DLP is that DRM focuses on protecting the rights of the content owners, while DLP focuses on protecting the confidentiality of the data. DRM can enforce policies even when the data is outside the network perimeter, while DLP can only monitor and control data within the network boundary.&lt;/p&gt;

</description>
      <category>dlp</category>
      <category>datalossprevention</category>
      <category>cybersecurity</category>
      <category>security</category>
    </item>
  </channel>
</rss>
