Skip to content

Commit

Permalink
updated docs
Browse files Browse the repository at this point in the history
  • Loading branch information
deepaksood619 committed Feb 19, 2024
1 parent 035f47e commit ec12109
Show file tree
Hide file tree
Showing 22 changed files with 436 additions and 288 deletions.
1 change: 1 addition & 0 deletions docs/about-me/ideas/startup-ideas-physical.md
Original file line number Diff line number Diff line change
Expand Up @@ -180,3 +180,4 @@ Airline can be transporter of fuels if passenger occupancy is lower, i.e. based

- Beekeeping
- [The ₹150 Cr Indian diaper company 👶🏼](https://shorts.growthx.club/p/the-150-cr-indian-diaper-company)
- Healthy cake
21 changes: 19 additions & 2 deletions docs/cloud/aws/networking-content-delivery/amazon-vpc.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,8 @@ The following are the key concepts for VPCs:

https://docs.aws.amazon.com/vpc/latest/userguide/what-is-amazon-vpc.html

[Amazon VPC design - IPv6 on AWS](https://docs.aws.amazon.com/whitepapers/latest/ipv6-on-aws/amazon-vpc-design.html)

## Route Tables

- **Main route table** The route table that automatically comes with your VPC. It controls the routing for all subnets that are not explicitly associated with any other route table.
Expand Down Expand Up @@ -145,7 +147,7 @@ SG - Security Groups

https://docs.aws.amazon.com/vpc/latest/userguide/vpc-eips.html

### Changes
### Changes (Migrate from ipv4 to ipv6)

Effective February 1, 2024 there will be a charge of $0.005 per IP per hour for all public IPv4 addresses, whether attached to a service or not (there is already a charge for public IPv4 addresses you allocate in your account but don’t attach to an EC2 instance).

Expand All @@ -155,7 +157,22 @@ This will cost around $4 month per IP per month

[Identify and optimize public IPv4 address usage on AWS | Networking & Content Delivery](https://aws.amazon.com/blogs/networking-and-content-delivery/identify-and-optimize-public-ipv4-address-usage-on-aws/)

[ipv6](https://aws.amazon.com/vpc/ipv6/)
[Amazon IPv6](https://aws.amazon.com/vpc/ipv6/)

[Migrate your VPC from IPv4 to IPv6 - Amazon Virtual Private Cloud](https://docs.aws.amazon.com/vpc/latest/userguide/vpc-migrate-ipv6.html)

|Step|Notes|
|---|---|
|[Step 1: Associate an IPv6 CIDR block with your VPC and subnets](https://docs.aws.amazon.com/vpc/latest/userguide/vpc-migrate-ipv6.html#vpc-migrate-ipv6-cidr)|Associate an Amazon-provided or BYOIP IPv6 CIDR block with your VPC and with your subnets.|
|[Step 2: Update your route tables](https://docs.aws.amazon.com/vpc/latest/userguide/vpc-migrate-ipv6.html#vpc-migrate-ipv6-routes)|Update your route tables to route your IPv6 traffic. For a public subnet, create a route that routes all IPv6 traffic from the subnet to the internet gateway. For a private subnet, create a route that routes all internet-bound IPv6 traffic from the subnet to an egress-only internet gateway.|
|[Step 3: Update your security group rules](https://docs.aws.amazon.com/vpc/latest/userguide/vpc-migrate-ipv6.html#vpc-migrate-ipv6-sg-rules)|Update your security group rules to include rules for IPv6 addresses. This enables IPv6 traffic to flow to and from your instances. If you've created custom network ACL rules to control the flow of traffic to and from your subnet, you must include rules for IPv6 traffic.|
|[Step 4: Assign IPv6 addresses to your instances](https://docs.aws.amazon.com/vpc/latest/userguide/vpc-migrate-ipv6.html#vpc-migrate-assign-ipv6-address)|Assign IPv6 addresses to your instances from the IPv6 address range of your subnet.|

[Is the Public Cloud Ready for IPv6? | by Eyal Estrin ☁️ | AWS in Plain English](https://aws.plainenglish.io/is-the-public-cloud-ready-for-ipv6-ec450974fe38)

[Brace yourself, IPv6 is coming](https://supabase.com/blog/ipv6)

[Amazon EC2 instance IP addressing - Amazon Elastic Compute Cloud](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-instance-addressing.html)

## Others

Expand Down
57 changes: 57 additions & 0 deletions docs/cloud/others/mdm-mobile-device-management.md
Original file line number Diff line number Diff line change
Expand Up @@ -32,3 +32,60 @@ Mobile device management (MDM) is a proven methodology and toolset used to provi
[Trending Open Source Mobile Device Management (MDM) Tools](https://www.knowledgenile.com/blogs/open-source-mobile-device-management-tools)

[5 Efficient MDM Solutions for You- Dr.Fone](https://drfone.wondershare.com/topsoftware/open-source-mdm.html)

## Data Loss Prevention (DLP)

Data loss prevention is a security solution that identifies and helps prevent unsafe or inappropriate sharing, transfer, or use of sensitive data. It can help your organization monitor and protect sensitive information across on-premises systems, cloud-based locations, and endpoint devices. It also helps you achieve compliance with regulations such as the Health Insurance Portability and Accountability Act (HIPAA) and General Data Protection Regulation (GDPR).

When it comes to security data, following [information protection and governance](https://www.microsoft.com/en-in/security/business/solutions/information-protection) best practices is critical Information protection places controls (for example, encryption) around sensitive data, while information governance determines its lifecycle (how long an organization retains the data). Together, they help your organization understand, safeguard, and govern its data.

**Know your data.** Understand your data landscape; identify and classify important data across your hybrid environment.

**Protect your data.** Apply protective actions like encryption, access restrictions, and visual markings.

**Prevent data loss.** Help people in your organization to avoid accidental oversharing of sensitive information.

**Govern your data.** Retain, delete, and store data and records in a compliant manner.

### How does DLP work?

Data loss prevention is a combination of people, processes, and technology that works to detect and prevent the leakage of sensitive data. A DLP solution uses things like antivirus software, AI, and machine learning to detect suspicious activities by comparing content to your organization’s DLP policy, which defines how your organization labels, shares, and protects data without exposing it to unauthorized users.

### Types of data threats

- Cyberattack
- Malware
- Insider risks
- Unintentional exposure
- Phishing
- Ransomware

### Benefits of a DLP solution

- Classify and monitor sensitive data
- Detect and block suspicious activity
- Automate data classification
- Maintain regulatory compliance
- Monitor data access and usage
- Improve visibility and control

### DLP best practices

- **Identify and classify sensitive data**. To protect your data, you need to know what you’ve got. Use your DLP policy to identify sensitive data and label it accordingly.
- **Use data encryption.** Encrypt data that is at rest or in transit so unauthorized users won’t be able to view file content even if they gain access to its location.
- **Secure your systems.** A network is only as secure as its weakest entry point. Limit access to employees who need it to do their jobs.
- **Implement DLP in phases.** Know your business priorities and establish a pilot test. Allow your organization to grow into the solution and all it has to offer.
- **Implement a patch management strategy.** Test all patches for your infrastructure to ensure there are no [vulnerabilities](https://www.microsoft.com/en-in/security/business/security-101/what-is-vulnerability-management) being introduced into your organization.
- **Allocate roles.** Establish roles and responsibilities to clarify who is accountable for data security.
- **Automate.** Manual DLP processes are limited in scope and can’t scale to meet the future needs of your organization.
- **Use anomaly detection.** Machine learning and behavioral analytics can be used to identify abnormal behavior that could result in a data leak.
- **Educate stakeholders.** A DLP policy isn’t enough to prevent intentional or accidental incidents; stakeholders and users must know their role in protecting your organization’s data.
- **Establish metrics.** Tracking metrics—like the number of incidents and time-to-response—will help determine the effectiveness of your DLP strategy.

[What is data loss prevention (DLP)? | Microsoft Security](https://www.microsoft.com/en-in/security/business/security-101/what-is-data-loss-prevention-dlp)

[What is DLP (Data Loss Prevention)? | Fortinet](https://www.fortinet.com/resources/cyberglossary/dlp)

[What is Data Loss Prevention (DLP) | Data Leakage Mitigation | Imperva](https://www.imperva.com/learn/data-security/data-loss-prevention-dlp/)

[What Is Data Loss Prevention (DLP)? \[Guide\] - CrowdStrike](https://www.crowdstrike.com/cybersecurity-101/data-loss-prevention-dlp/)
2 changes: 2 additions & 0 deletions docs/cloud/others/oracle.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,3 +3,5 @@
Become an Autonomous Database Specialist

## Oracle Cloud Infrastructure (OCI)

[Demystifying OCI’s Virtual Cloud Network: A Deep Dive into VCN Architecture (Part 1) – DEVOPS DONE RIGHT](https://blog.opstree.com/2024/01/16/demystifying-ocis-virtual-cloud-network-a-deep-dive-into-vcn-architecture/)
Loading

0 comments on commit ec12109

Please sign in to comment.