Links
Hacking and Breaches
SANS Reading Room – Numerous Case Studies on Various Breaches
Information is Beautiful – World’s Biggest Data Breaches & Hacks
PDF of SANS Case Study on 2013 Target Breach
Lockheed’s White Paper on Intelligence-driven Computer Network Defense
Some of the most common hacking techniques
Fundamentals of Hacking – SANS White Paper
Lockheed Martin’s Cyber Kill Chain
General AIX Security:
Information Center – PowerSC Standard Edition Welcome Page
Information Center – PowerSC Multi-factor Authentication
AIX Toolbox for Linux Download Page
Request a quote for PowerSC if not entitled
AIX V6 Advanced Security Features – Introduction and Configuration
Service and Support Best Practices for AIX
Fix Level Recommendation Tool (Learn how to patch your AIX or VIOS)
Very Useful FixCentral Interface for searching ifixes, apars
AIX Web Download Pack Site(Download specific filesets related to AIX Security)
sudo install images for AIX from sudo community
Power Security Certifications
AIX Operating System Certifications
AIX LDAP:
IBM Security Directory Server Knowledge Center
ITDS Download Page
Integrating AIX into Heterogenous LDAP Environments
IBM Tivoli Directory Server 6.3 – Administration Guide
ISDS – the audit.log – IBM Presentation
White Paper on the AIX LDAP Client
LDAP Reference Book – Understanding and Deploying LDAP Directory Services
Andrew Findlay-paper best practices for ldap
SSL vs. TLS – What’s the Difference
How to Verify SSL Certificates from a Shell Prompt
OpenSSL Cookbook – Good Reference on OpenSSL and Certificates
Difference between root vs intermediate Certificates
Are You using LDAP over SSL/TLS for LDAP
AIX Kerberos
AD integration with AIX and Kerberos
IBM Knowledge Center: Using OpenSSH with Kerberos on AIX
Configuring an AIX Client with Multiple Kerberos Realms
Configuring Single Sign-On with AIX Kerberos
Debugging Single Sign-On with SSH
Debugging Problems with Key Version Number
AIX Auditing:
IBM Systems Magazine Article on AIX Auditing
DeveloperWorks Article on Generating Audit Reports
Virtualization Security
PCI Virtualization Guidelines v2.0 (Downloads a pdf file)
NIST’s Secure Virtual Network Configuration for Virtul Machine (downloads a pdf file)
Cloud security
PCI Cloud Computing Guidelines (Downloads a pdf file)
Cloud Security Guidelines for IBM Power Systems
General Computer Information Security
CySAFE Cyber Assessment for Everyone (PDF File)
SANS – A Glossary of Security Terms
NIST Computer Security Publications
Improving Security via Proper Network Segmentation
Operations Security (Opsec) – process for protecting data
Power Linux Security
Linux on Power Security – (IBM Knowledge Center)
Working with Certificates
Simply Put: How does certificate-based authentication work?
Miscelaneous
AIX Commands You Should not Leave Home Without
NIST Glossary of Security Terms
NIM Ports – (Maybe needed for TNC Configuration)
The Six Dumbest Ideas in Computer Security
Getting Started with SSH Security
Using dsh to issue commands on many AIX systems
Exporting a display from AIX to Mac
Guidance for Multi-Factor Authentication(PDF Document)
Harvard Business Review: Why Execs Underinvest in Cyber Security
Deep-Thought-A-Cybersecurity-Story
IBM’s PCIe_Cryptographic_Coprocessor_Data_Sheet (a PDF)
Content Agnostic Malware Protection – PDF Explaining why Anti-Viruses misses 40% of Malware
The Importance of Patching for a Company (Equifax)
An Overview of the SSL or TLS Handshake
Difference Between Red and Blue Teams
Information about CIS SecureSuite
Overview on the 4767-002 Cryptographic Coprocessor
Getting Started with the AIX Toolbox
Articles Authored by Stephen Dominguez
Four Ways to Stem the Tide of Rising Cybersecurity Risks
Anti-virus on AIX (previously published on IBM Systems Magazine)
Key IBM AIX Security Featurees you can’t afford to miss – IBM IT Infrastructure blog
Key Security considerations for Linux on Power Systems – IBM IT Infrastructure blog