<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">

Curious about how StrongDM works? 🤔 Learn more here!

Search
Close icon
Search bar icon
blog /
A Definitive Guide to SOC 2 Policies

A Definitive Guide to SOC 2 Policies

In this post, we will help you get started with a hierarchy to follow, as well as a summary of each individual SOC 2 policy.
3 Costly Cloud Infrastructure Misconfigurations

3 Costly Cloud Infrastructure Misconfigurations

It has never been easier for your company to build new infrastructure. In just a few clicks, you can spin up shiny new servers and databases in the cloud and start using them in seconds. However, in the rush to deploy new services so quickly, companies often let information security be an ...
BYOD Policy | Best Practices to Help Keep Your Network Secure

BYOD Policy | Best Practices to Help Keep Your Network Secure

Bring your own device, can be tricky to regulate. At a minimum, your BYOD policy should define certain requirements to help secure your network.
Token Security Podcast | Senior Engineering Director at Zymergen on Code Reviews

Token Security Podcast | Senior Engineering Director at Zymergen on Code Reviews

At Token Security our goal is to teach the core curriculum for modern DevSecOps. Each week we will deep dive with an expert so you walk away with practical advice to apply to your team today. No fluff, no buzzwords. This week Jeff Burkhart, Senior Engineering Director at Zymergen talks code reviews, code review fatigue, and what to do when agile becomes tedious.
How To Prepare For Your First SOC 2 Audit A 30-90-120 Day Plan

How To Prepare For Your First SOC 2 Audit A 30-90-120 Day Plan

Despite thousands of articles, there’s shockingly little actionable advice to help startups complete SOC 2. One area that usually requires some remediation is access controls. Most teams don’t have answers when auditors ask “who has access to a specific database or server and what queries did they execute?” That’s why we started strongDM- to manage and monitor access to every database, server, & environment.
How to SSH Through Bastion With Key | Part 2 - Tutorial

How to SSH Through Bastion With Key | Part 2 - Tutorial

How to create an SSH key for your bastion host and ways you can streamline the bastion host login process without compromising the security of the key.
How to Write Your Software Development Lifecycle Policy

How to Write Your Software Development Lifecycle Policy

A staggering amount of cybersecurity breaches are caused by software vulnerabilities. From the early worms of the 1980s through the early 2000s - like Blaster, Code Red, and Melissa - to the notable Petya and WannaCry of the past few years, these vulnerabilities are all rooted in software flaws that allowed systems to be exploited. A software development lifecycle (SDLC) policy helps your company not suffer a similar fate by ensuring software goes through a testing process, is built as securely
Token Security Podcast | NYC Cyber Command

Token Security Podcast | NYC Cyber Command

This episode Max Saltonstall sits down in Manhattan with Quiessence Phillips, Deputy CISO and Head of Threat Management, City of New York and Colin Ahern, Deputy CISO, City of New York.
4 Key Considerations for Your Change Management Policy

4 Key Considerations for Your Change Management Policy

Documenting and communicating policy and system changes in your organization can be an arduous task. But the effort becomes more manageable when you have a plan in place before an emergency.
Audit Log Review and Management Best Practices

Audit Log Review and Management Best Practices

The what, where, why and how of audit logging and review for IT security investigations and compliance requirements.
The Differences Between SOC 1 vs SOC 2

The Differences Between SOC 1 vs SOC 2

Confusing a SOC 1 vs SOC 2 audit is easy. While both compliance frameworks attest to the controls used within your organization, the frameworks differ in focus. SOC 1 looks at your organization’s financial reporting, while SOC 2 focuses on how you secure and protect customer data. This blog post will focus on exploring the differences between SOC 1 vs SOC 2.
Workstation Security Policy Best Practices

Workstation Security Policy Best Practices

In the workstation security policy, you will define rules intended to reduce the risk of data loss/exposure through workstations.
Encryption Policy Best Practices | TLS vs SSL

Encryption Policy Best Practices | TLS vs SSL

You wouldn’t leave the house without making sure your doors and windows were locked, and that any valuables were hidden or secured in a safe. That way, if you were robbed, the burglar would have a difficult time accessing your most precious assets. In the same way, you need to make sure your organization’s critical data is well protected.
Best Practices When Writing Your Access Onboarding & Termination Policy

Best Practices When Writing Your Access Onboarding & Termination Policy

It's easy to focus on cybersecurity threats like social engineering and phishing. However, internal threats, such as human error and disgruntled employees, can be just as dangerous - and are often overlooked. A mature onboarding and termination policy that leverages least privilege access is essential to preventing a data breach.
StrongDM app UI showing available infrastructure resources
Connect your first server or database, without any agents, in 5 minutes.