Skip to content
#

audit

Here are 479 public repositories matching this topic...

MegaDrive68k
MegaDrive68k commented Feb 12, 2020

Describe the bug

At the moment of creating or editing some job, go to the "Workflow" tab, create or edit an option, click on "Remote URL" (radio button) and click on "Rundeck User Guide - Option model provider" link, the new browser tab shows a broken link.

My Rundeck detail

  • Rundeck version: 3.2.2
  • install type: WAR
  • OS Name/version: Windows 10 (also confirmed with Ubuntu 19

ssh rdp vnc telnet sftp bastion/jump web putty xshell terminal jumpserver audit realtime monitor rz/sz 堡垒机 云桌面 linux devops sftp websocket file management rz/sz otp 自动化运维 审计 录像 文件管理 sftp上传 实时监控 录像回放 网页版rz/sz上传下载/动态口令 django

  • Updated Jun 6, 2020
  • Python
TheDauntless
TheDauntless commented Mar 27, 2020

The controls are worded in a few different ways right now.

Most of them are affirmative:

No sensitive data is written to application logs.

But some are conditional:

The app’s local storage should be wiped after an excessive number of failed authentication attempts.

I propose to rewrite the second type to the first type:

The app’s local storage is wiped after an excessive nu

rjhornsby
rjhornsby commented Jan 9, 2017

As per this inline comment[1], there's a mismatch between the title/description and the actual test for systcl-17[2], martian logging.

The title says we're testing to ensure martian logging is disabled, but the actual test verifies that the logging is enabled. If I'm understanding correctly it's possible, even likely, that this is just a simple oversight in commit bb7c532f where the test

nishils
nishils commented Jun 4, 2019

Provide a checklist of what every scanner should support in terms of integrating with Salus.

This can include things like

  • please write tests
  • please add documentation in the salus docs folder
  • please document config in the salus docs folder.

This will make sure that scanners are consistent and make it easier for folks to contribute.

Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber

  • Updated Mar 13, 2020
ghost
ghost commented Nov 19, 2018

I am looking for how to install and use PULSAR for FIM monitoring ,

The repo has been changed three times from the looks to what it is now. And from the look it looks like this has gone to the standalone app called hubble , but I don't see anyway to run, execute , or configure pulsar in hubble.

Here is the documentation , let me know which should I be following for this.

https://hubbl

Improve this page

Add a description, image, and links to the audit topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the audit topic, visit your repo's landing page and select "manage topics."

Learn more

You can’t perform that action at this time.