Planned topics of issue 10/2020 – Sept 24
Space close September 07, 2020
Topic focus: Active Directory: Eldorado for Criminals
Over the years, Microsoft has added further services to its Active Directory (AD) directory service, which controls user settings, access rights and security policies and can interact with non-Windows systems via various protocols. For attackers, AD, which maps the entire network structure of an organization, is a goldmine: by compromising it, intruders can gain rights equivalent to those of a corporate administrator and thus gain control over the entire network. Several articles shed light on possible attack vectors and types and provide guidance on how to secure the central service.
Focus on compliance, costs and security in multi-cloud environments
By now, many companies should have gained experience with public clouds. Often the hoped-for cost savings did not materialize or not as hoped for. The software industry now offers a range of tools for various aspects of automation, reserved instances and self-service capabilities. Some representatives focus on the topics of cost management, governance and security. These include VMware CloudHealth. iX has taken a closer look at the tool and uses it to show where potential cost traps are lurking.
Overcoming IT crises
Crisis management in IT is not exactly a popular topic in companies and public authorities. It costs a lot of money, has no direct benefit and is therefore often not even addressed. However, in an emergency, this can take evil revenge. Experiences from disaster control can help to cope with disruptions and serious crises in IT. However, where budget and resources are limited, good preparation and planning is required.
Identity Management (IdM), also known as Identity and Access Management (IAM or IdAM), provides the framework of policies and technologies to ensure that the right people in an organization have appropriate access to technology resources. There are many IdM systems on the market, especially commercial products. Unfortunately, commercial products in particular often have the problem that they can usually only be used centrally for authentication in the company and thus cannot necessarily be integrated into the development as test systems. Keycloak from Red Hat tries to consider both aspects: There is commercial support and during development the system can be used locally without any problems.
Azure HCI Stack II
With the new version of Azure Stack HCI V2,- the official name is now Azure Stack HCI, version 20H2, the HCI stands for Hyper Converged Infrastructure – Microsoft now completes the integration of the former WSSD (Windows Server Softwaredefined Datacenter) into the Azure Stack family. Unfortunately, Microsoft had already named the successor of WSSD in the 2019 version as Azure Stack HCI. So confusion is pre-programmed. Also because the new product addresses different customer needs than the previous version, the second part of the tutorial will shed some light on this.
Topics are subject to change