Skip to content

Blog

From A to ZTA: Understanding Zero Trust

Attackers have a strategy, they have a plan. We know what they are going to be doing, we have modeled these behaviors with MITRE ATTACK and the Killchain concept. But we know how we traditionally have started to design from the outside, trying to keep them out. This model, Zero Trust, is all about trying to address the adversary that is already on the network, because we know that's what is happening.

Azure Well-Architected Framework

The Azure Well-Architected Framework helps you to design, build, and continuously improve a secure, reliable, and efficient application.

Start with the Pillars, and align your design choices with the principles. Then, build a strong foundation for your workload based on technical design areas. Finally, use review tools to assess your readiness in deploying to production.

When you're building an Azure architecture, there are many considerations to keep in mind. You want your architecture to be secure, scalable, available, and recoverable. To make that possible, you have to make decisions based on cost, organizational priorities, and risk.

Building an ELK Stack with Docker Compose

These files can be used to create a generic ELK stack using Docker Compose. This can be helpful for testing, local development, and POC work. Looking for a fast setup and teardown makes Docker perfect for this use case.

Prerequisites

This assumes that you have git and docker desktop or docker engine with docker-compose installed. For this scenario, we will be using Docker Desktop.

Deploy a Desktop on AWS Using Terraform

This terraform script deploys an Ubuntu Workstation with minimal additional software installed. It enables SSH and RDP and uses security groups to restrict the administrative access to your current external IP address only to prevent it being wide open to the world.

An example use case is a temporary sandbox system for surfing potentially dangerous websites.

NOTE: Don't break the law, as AWS Terms of Service still apply and this is not exactly covert.

Deploy a Desktop on GCP Using Terraform

This terraform script deploys an Ubuntu Workstation with minimal additional software installed. It enables SSH and RDP and uses security groups to restrict the administrative access to your current external IP address only to prevent it being wide open to the world.

An example use case is a temporary sandbox system for surfing potentially dangerous websites.

NOTE: Don't break the law, as GCP Terms of Service still apply and this is not exactly covert.

Deploy a Desktop on Azure Using Terraform

This terraform script deploys an Ubuntu Workstation with minimal additional software installed. It enables SSH and RDP and uses security groups to restrict the administrative access to your current external IP address only to prevent it being wide open to the world.

An example use case is a temporary sandbox system for surfing potentially dangerous websites.

NOTE: Don't break the law, as Azure Terms of Service still apply and this is not exactly covert.