by EGI CSIRT | Dec 23, 2024 | Knowledgebase, News, Recommendations
Securing access to your servers is critical because it is the first line of defence against unauthorised access and potential breaches. Most security incidents are caused by inadequate access controls, such as weak or default passwords, stolen credentials, and lack of...
by EGI CSIRT | Dec 19, 2024 | Knowledgebase, News, Recommendations
Based on EGI Security Traceability and Logging Policy all certified EGI sites need to have a remote logging service in place. By storing logs remotely, you protect them from being tampered with or deleted by attackers who gain access to your systems. This ensures the...
by EGI CSIRT | Aug 9, 2024 | News, Recommendations
Many sites use Docker for development or to provide automated deployment of software or containers via Gitlab runners or similar solutions. In the past weeks have seen some incidents related to Docker API misconfiguration and would like to address the security...
by EGI CSIRT | May 6, 2024 | Incident Reports, News, Recommendations
In 2023, EGI CSIRT has significantly increased the efforts to strengthen global collaboration. We recognise the value of shared knowledge and unified defence strategies. Our engagement has expanded beyond the Worldwide LHC Computing Grid (WLCG) organisations,...
by EGI CSIRT | Oct 13, 2023 | Knowledgebase, News, Recommendations
Based on recent incidents in the EGI environment, we would like to point out some of the guidelines and best practices to enhance the security resilience of the resource providers. Prevention Central logging: Ensure that logs are collected centrally by a remote...
by EGI CSIRT | Oct 19, 2022 | News, Recommendations
A namespace wraps a global system resource in an abstraction that makes it appear to the processes within the namespace that they have their own isolated instance of the global resource. Containers are an implementation of using namespaces.The namespaces in Linux are:...
Recent Comments