Cmd blog posts

The Cmd Blog

A blog about security and protections
in Linux, DevOps, and the Cloud


Tackling Production Linux Security in Three Phases: Part Two

By: Jennifer Ellard

Ensuring security in Production Linux environments is a major challenge, so take it in phases. In the second of this 2-part series, we discuss the walk and run stages for a more secure and well-regulated Production Linux environment.

Continue Reading 

Tackling Production Linux Security in Three Phases: Part One

By: Jennifer Ellard

TL;DR: Production Linux environments are often difficult to secure. In this two-part blog series, we discuss practical steps to crawl, walk, and then run toward more secure and well-regulated production environments. Ensuring security for Production Linux environments can be a daunting task. Because Linux began as an open source, collaborative project, it has evolved in…

Continue Reading 

Six Steps to Harden Linux Production Environments

By: Jake King

TL;DR: It can be a challenge to understand where a cloud vendor’s security ends and where an internal team’s responsibilities begin. Cmd will be doing a deep dive into hardening Linux production environments in the coming months. In this initial post, we walk through six steps any organization can take to get started. Whether organizations…

Continue Reading 

Latest Tweets

You May Also Like


Activate Today

Gain best-in-class Linux observability in minutes... for free_

Cmd provides the fastest, easiest way to know what’s happening in your Linux environment, who’s logging in, what they are doing, processes they initiate and sensitive assets they access.

Activate Your Free Account arrow_forward

Copy link
Powered by Social Snap