Posts by Category:
How To Use a Reverse Proxy for Access Management Control
Learn how to use a reverse proxy for access management control. See how database administrators and DevOps teams can use a reverse proxy to improve compliance, control, and security for database access.
Active Directory Integration
Here's a quick introduction to Active Directory and why its integration with the rest of your database infrastructure is important to expand into the cloud.
How To Manage Your MySQL Databases and Users
Find an easier way to manage access privileges and user credentials in MySQL databases. Reduce manual, repetitive efforts for provisioning and managing MySQL access and security with strongDM.
Managing Access to Ephemeral Infrastructure At Scale
Managing a static fleet of strongDM servers is dead simple. You create the server in the strongDM console, place the public key file on the box, and it’s done! This scales really well for small deployments, but as your fleet grows, the burden of manual tasks grows with it.
How to Change the MySQL root Password
On an unmodified MySQL install, the root user account does not have a password. This is extremely insecure! As a systems administrator, we know that the easiest way to compromise a system is using the default unchanged password with admin privileges.
How to create a Linux bastion host and log SSH commands Part 3 | A step-by-step tutorial
Want to secure remote access to a private network? Part 3 with step-by-step instructions to create a Linux bastion host and create an audit trail by logging SSH commands.
Creating a User in MongoDB
How to create and add a new user in MongoDB, plus, how system admins can improve MongoDB security.
SSH Audits Made Simple
If you work with systems that run any variety of Linux or BSD then the probability is high that you have dealt with SSH. Invented in 1995 and established as an internet standard by the IETF in 2006, Secure Shell has become the default mechanism for remote access to servers by individuals and teams everywhere.
What Would My SOC 2 Dashboard Look Like?
As your organization pursues your SOC 2 certification, organization is critical. You will be busy actively managing dozens of ongoing daily tasks, which can bury you in minutiae. But at the same time, you need to keep your high-level compliance goals in focus in order to successfully move your certification over the finish line.
Everything You Need to Know About SOC 2 Audits
Whether you’re looking to achieve SOC 2 compliance, or just want to learn more about it, your Googling is bound to lead you to a wealth of articles chock full of buzzwords and acronym soup. In this post, we will provide a guide with definitions, links and resources to gain a solid understanding of everything you need to know about SOC 2 audits.
The Definitive Guide to SOC 2 Policy Frameworks
If this is your first time pursuing SOC 2 certification, you will quickly find that documentation is the cornerstone of a successful audit. Writing clear, concise policies is especially critical, and if you don’t currently have a policy structure in place, it can be difficult to figure out which policies you need.
1 / 7
Connect your first server or database in 5 minutes. No kidding.
"When strongDM said deployment would take an hour, I assumed they were full of it and blocked out a full day. We finished in 45 minutes." - Peter Tormey, Manager DataOps, SoFi