Securing Your Azure ERP Deployment with Virtual Network Service Endpoints

Securing Your Azure ERP Deployment with Virtual Network Service Endpoints

You’ve successfully migrated your ERP system’s application and database servers to Azure VMs. Now, you’re looking to optimize costs and administration by leveraging Azure Platform as a Service (PaaS) offerings, particularly for storing large engineering diagrams. Security is paramount, as these diagrams contain proprietary information that must be protected from unauthorized access and restricted to specific systems. This post explores how virtual network service endpoints can help you achieve this. Understanding Virtual Network Service Endpoints Virtual network service endpoints extend…

Read More Read More

Unmasking CDEK Delivery Scam: A Step-by-Step Investigation

Unmasking CDEK Delivery Scam: A Step-by-Step Investigation

Friends, my today’s article will be in Russian because fishing scheme described here particularly affects Belarussian citizen which can speak and understand in Russian. I though this way it could help more people. I will translate this article to English in nearest days. Добрый день! Хочу поделится коротким разбором одного мошеннического сценария с которым недавно столкнулся после того как разместил объявление на продажу детского стола на онлайн платформе Kufar. Казалось бы очевидный лохотрон, но к сожалению некоторые не внимательные граждане…

Read More Read More

Testing strategies for your application

Testing strategies for your application

Testing is one of the fundamental components of DevOps and agile development in general. If automation gives DevOps the required speed and agility to deploy software quickly, only through extensive testing will those deployments achieve the required reliability that customers demand. A main tenet of a DevOps practice to achieve system reliability is the shift left principle. If your process for developing and deploying an application is depicted as a series of steps that are listed from left to right,…

Read More Read More

Granting minimal level of access for Azure Security Scans with AZSK

Granting minimal level of access for Azure Security Scans with AZSK

In order to carry out Azure Security Assessment with AZSK (Secure DevOps Kit for Azure) tool following Azure AD and IAM roles should be created. Global Reader and Security Reader in Azure AD Reader IAM RBAC Role in subscription scope Below is the detailed instruction for creating above mentioned two accounts Instruction to Create Account for AZSK Scans 1. Creating Account for Azure AD Navigate to Azure Active Directory >>> Users Create new or give permission to and existing account…

Read More Read More

Configuring Ubuntu SSH server to use Hashicorp Vault OTP

Configuring Ubuntu SSH server to use Hashicorp Vault OTP

This post will demonstrate how to configure vault and ssh server in order to use OTP for the login to SSH server. Following diagram depicts the process. After we have initialized and unsealed our vault server we need to enable ssh secrets engine with the following command: vault secrets enable ssh Write role to Vault ssh secrets engine. For the test purposes we will allow all IPs Vault write ssh/roles/admin key_type=otp default_user=vaultuser cidr_list=0.0.0.0/0,0.0.0.0/0 Now we need to configure login to…

Read More Read More

Enable Azure Diagnostic Logs Settings

Enable Azure Diagnostic Logs Settings

Logging to storage account $resource = Get-AzResource -Name [resource name] -ResourceGroupName [resource group name] $storage = Get-AzResource -Name [resource name] -ResourceGroupName [resource group name] Set-AzDiagnosticSetting –ResourceId $resource.ResourceId –StorageAccountId $storage.ResourceId -Enabled $true Streaming of diagnostic logs to Event Hub $rule = Get-AzServiceBusRule -ResourceGroup [resource group name] -Namespace [namespace] -Topic [topic] -Subscription [subscription] -Name [rule name] Set-AzureRmDiagnosticSetting -ResourceId $resource.ResourceId -ServiceBusRuleId $rule.Id -Enabled $true Streaming of diagnostic logs to a Log Analytics workspace $workspace = Get-AzOperationalInsightsWorkspace -Name [workspace name]-ResourceGroupName [resource group name] Set-AzureRmDiagnosticSetting…

Read More Read More

Recruiting Tools

Recruiting Tools

https://MailScoop.io – Free Email Finder https://Yesware.com – Email Tracker https://ResyMatch.io – Free Resume Scanner https://ResyBullet.io – Free Resume Bullet Analyzer https://ResyBuild.io – Free Resume Builder https://Canva.com – Free Graphic Design Tool https://PhotoFeeler.com – Free LinkedIn Profile Pic Grader https://tagcrowd.com/ – Visual Text

Azure VNET Peering

Azure VNET Peering

az network vnet create \     –resource-group learn-176d3f64-8002-4e62-b762-ac3929d20952 \     –name SalesVNet \     –address-prefix 10.1.0.0/16 \     –subnet-name Apps \     –subnet-prefix 10.1.1.0/24 \     –location northeurope     az network vnet create \     –resource-group learn-176d3f64-8002-4e62-b762-ac3929d20952 \     –name MarketingVNet \     –address-prefix 10.2.0.0/16 \     –subnet-name Apps \     –subnet-prefix 10.2.1.0/24 \     –location northeurope     az network vnet create \     –resource-group learn-176d3f64-8002-4e62-b762-ac3929d20952 \     –name ResearchVNet \     –address-prefix 10.3.0.0/16 \     –subnet-name Data \     –subnet-prefix 10.3.1.0/24 \     –location westeurope     az network vnet list –output table =============================================== az network vnet peering create \     –name…

Read More Read More

Azure Site to Site VPN Configuation

Azure Site to Site VPN Configuation

We will create Site to Site VPN connection with two VNETs. By this way we are simulating Cloud and On-Prem sites as in the following diagram az network vnet create \     –resource-group learn-ee8df1a4-1b8d-4bd1-86fc-7c05ca89bf17 \     –name Azure-VNet-1 \     –address-prefix 10.0.0.0/16 \     –subnet-name Services \     –subnet-prefix 10.0.0.0/24     az network vnet subnet create \     –resource-group learn-ee8df1a4-1b8d-4bd1-86fc-7c05ca89bf17 \     –vnet-name Azure-VNet-1 \     –address-prefix 10.0.255.0/27 \     –name GatewaySubnet     az network local-gateway create \     –resource-group learn-ee8df1a4-1b8d-4bd1-86fc-7c05ca89bf17 \     –gateway-ip-address 94.0.252.160 \     –name LNG-HQ-Network \     –local-address-prefixes 172.16.0.0/16     az network…

Read More Read More

10. Same-Origin Policy and Cross-Origin Resource Sharing

10. Same-Origin Policy and Cross-Origin Resource Sharing

1. SAME-ORIGIN POLICY INTRODUCED Same-Origin Policy (SOP) is a major security concept that is built-in in all contemporary browsers. Its main goal is to prevent access attempts of dynamic web page elements (like scripts) to data on resources of a different origin.In the security context, SOP prevents malicious web sites from retrieving confidential data from restricted locations on behalf of users and without their acknowledgment.User agents that are compliant with SOP, restrict requests issued from one origin to another origin….

Read More Read More