DEV Community

# compliance

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
10 Essential Steps for GDPR Compliance in Your SaaS Platform

10 Essential Steps for GDPR Compliance in Your SaaS Platform

1
Comments
3 min read
Compliance as Code: A Strategic Approach to Secure and Efficient Software Development

Compliance as Code: A Strategic Approach to Secure and Efficient Software Development

Comments
4 min read
The Essential NIST 800-171 Compliance Checklist

The Essential NIST 800-171 Compliance Checklist

Comments
8 min read
Streamline Your Organization Security Posture with NIST CSF 2.0

Streamline Your Organization Security Posture with NIST CSF 2.0

Comments
12 min read
Importance of Compliance (GDPR, HIPAA)

Importance of Compliance (GDPR, HIPAA)

12
Comments
3 min read
Automating GDPR Data Deletion Requests with Appsmith Workflows and Human-In-The-Loop Approvals

Automating GDPR Data Deletion Requests with Appsmith Workflows and Human-In-The-Loop Approvals

Comments
5 min read
AI Proctoring in Compliance Training: Enhancing Standards and Ensuring Integrity

AI Proctoring in Compliance Training: Enhancing Standards and Ensuring Integrity

Comments
4 min read
Conventional Use of AWS CDK

Conventional Use of AWS CDK

3
Comments
7 min read
Strengthening Security and Compliance in AWS Cloud Services & The Essential Role of AI Verification.

Strengthening Security and Compliance in AWS Cloud Services & The Essential Role of AI Verification.

Comments
4 min read
Guia super Resumido do PCI-DSS

Guia super Resumido do PCI-DSS

1
Comments
6 min read
How will NIS2 affect European Industries

How will NIS2 affect European Industries

Comments
8 min read
Boosting Incident Response Capabilities with Azure: A Practical Guide

Boosting Incident Response Capabilities with Azure: A Practical Guide

1
Comments
6 min read
Future Trends in Video KYC and Financial Security

Future Trends in Video KYC and Financial Security

1
Comments
4 min read
Software: Our SOC 2 journey

Software: Our SOC 2 journey

Comments
4 min read
From Policy to Compliance: Unpacking the Key Annexures of ISO 27001

From Policy to Compliance: Unpacking the Key Annexures of ISO 27001

1
Comments
3 min read
Working Towards Compliance through ITGC !

Working Towards Compliance through ITGC !

5
Comments 1
2 min read
10 Dimensions of Python Static Analysis

10 Dimensions of Python Static Analysis

1
Comments
19 min read
GxP Compliance: Leveraging Test Automation for Validation and Security

GxP Compliance: Leveraging Test Automation for Validation and Security

Comments
4 min read
Stay Compliant, Mitigate Risks: Understanding AML and KYC as a technologist

Stay Compliant, Mitigate Risks: Understanding AML and KYC as a technologist

13
Comments
7 min read
Getting started with Drata.com APIs

Getting started with Drata.com APIs

Comments
3 min read
AWS Security Hub

AWS Security Hub

Comments
4 min read
How to Plan for Compliance for your Product?

How to Plan for Compliance for your Product?

Comments
11 min read
Opt-In VS Opt-Out

Opt-In VS Opt-Out

4
Comments
2 min read
The European Accessibility Act != EN 301 549

The European Accessibility Act != EN 301 549

9
Comments 2
3 min read
8 Essential Components Every Dynamic Risk Assessment Must Have

8 Essential Components Every Dynamic Risk Assessment Must Have

Comments
7 min read
Responsibilities of a modern CISO

Responsibilities of a modern CISO

2
Comments
6 min read
Compliance Enforcement with Open Source Puppet

Compliance Enforcement with Open Source Puppet

1
Comments
5 min read
Don't Go Rogue: Leverage Frameworks for Effective Cloud Security Prioritization

Don't Go Rogue: Leverage Frameworks for Effective Cloud Security Prioritization

Comments
2 min read
The Complete Guide to Passing an ISO 27001 Audit

The Complete Guide to Passing an ISO 27001 Audit

1
Comments
9 min read
AWS Config para análisis de seguridad

AWS Config para análisis de seguridad

Comments
1 min read
How to assure compliance of your Ansible Playbooks

How to assure compliance of your Ansible Playbooks

Comments
4 min read
How to generate a list of compliance labels for all your gitlab repos

How to generate a list of compliance labels for all your gitlab repos

Comments
1 min read
The Essential Guide to SaaS Compliance

The Essential Guide to SaaS Compliance

Comments
6 min read
Solving The Austin Problem with a Data Privacy Vault

Solving The Austin Problem with a Data Privacy Vault

2
Comments
9 min read
Deciphering the EU's AI Act - A Technical Perspective

Deciphering the EU's AI Act - A Technical Perspective

1
Comments
2 min read
Understanding the New SEC Rules for Disclosing Cybersecurity Incidents

Understanding the New SEC Rules for Disclosing Cybersecurity Incidents

1
Comments
6 min read
GDPR Compliance: Consent Management with SlashID

GDPR Compliance: Consent Management with SlashID

1
Comments
3 min read
The InfoSec Guide to HIPAA Compliance

The InfoSec Guide to HIPAA Compliance

Comments
10 min read
Garantindo a proteção de dados financeiros com PCI-DSS

Garantindo a proteção de dados financeiros com PCI-DSS

Comments
2 min read
De-scoping Your AWS Services from Data Residency Requirements

De-scoping Your AWS Services from Data Residency Requirements

3
Comments
7 min read
Ensuring Compliance with Custom AWS Config Rules

Ensuring Compliance with Custom AWS Config Rules

5
Comments
5 min read
Kubernetes add-on compliance with Projectsveltos and Lua

Kubernetes add-on compliance with Projectsveltos and Lua

1
Comments
4 min read
4 Steps to Auto Remediate Account level S3 Access Settings

4 Steps to Auto Remediate Account level S3 Access Settings

2
Comments
3 min read
Enhancing S3 Bucket Security: Unleashing the Power of Dual-Layer Server-Side Encryption

Enhancing S3 Bucket Security: Unleashing the Power of Dual-Layer Server-Side Encryption

1
Comments
3 min read
How to generate an SBOM for JavaScript and Node.js applications

How to generate an SBOM for JavaScript and Node.js applications

4
Comments
11 min read
Build license management into your pipelines

Build license management into your pipelines

3
Comments
6 min read
GRC in Cyber Security: 5 Reasons to Consolidate Cyber Security, Governance, Risk, Compliance, and Insurance

GRC in Cyber Security: 5 Reasons to Consolidate Cyber Security, Governance, Risk, Compliance, and Insurance

1
Comments
4 min read
Write AWS Config rules using cfn-guard

Write AWS Config rules using cfn-guard

3
Comments
3 min read
Releasing code in large corporations is slow - and there is a good reason for it

Releasing code in large corporations is slow - and there is a good reason for it

13
Comments 3
4 min read
Amazon Inspector can now scan AWS Lambda Functions

Amazon Inspector can now scan AWS Lambda Functions

13
Comments 5
3 min read
SBOM with FOSSology

SBOM with FOSSology

6
Comments
3 min read
SBOM with VulnerableCode.io

SBOM with VulnerableCode.io

5
Comments
4 min read
Our SOC 2 compliance journey

Our SOC 2 compliance journey

3
Comments
7 min read
How a Data Privacy API Abstracts and Simplifies Privacy and Compliance

How a Data Privacy API Abstracts and Simplifies Privacy and Compliance

3
Comments
7 min read
Practical steps using AWS Organization

Practical steps using AWS Organization

4
Comments 1
3 min read
Scan Terraform with OPA

Scan Terraform with OPA

5
Comments
3 min read
AWS Security Stories #03: CIS Controls

AWS Security Stories #03: CIS Controls

2
Comments
5 min read
New AWS Config Rules - LambdaLess and rusty

New AWS Config Rules - LambdaLess and rusty

16
Comments 2
8 min read
Understanding the Shared Responsibility Model in AWS

Understanding the Shared Responsibility Model in AWS

8
Comments
4 min read
CSPM, CIEM, CWPP, and CNAPP: Guess who in cloud security landscape

CSPM, CIEM, CWPP, and CNAPP: Guess who in cloud security landscape

13
Comments
5 min read
loading...