-
## Describe the Bug
When running `leverage project create` all the symlinks to `config/common-variables.tf` are followed and turned into files.
## Expected Behavior
On all layers,the `common-…
-
# DevEx/OpEx
What data is considered sensitive? E.g. is the report ID sensitive? No, but there are other things that could be clarified. Document this.
Combining with:
Documentation: how can we s…
-
### Submitter Name
Susanna Kiwala
### Submitter Affiliation
Washington University in St. Louis
### Submitter Github Handle
susannasiebert
### Additional Submitter Details
CIViC de…
-
Audit logs of access of SigNoz
-
### Description
RBAC allow restricting functions/actors using RBAC, ideally integrating with OIDC or other identity providers. With RBAC + a proper logging strategy auditability is ensured.
### Use …
-
I would be willing to work on this but don't know how to convert say a PCI or a HIPAA compliance profile in the script. Would be willing to work for food.
-
|Wazuh version|Component|Install type|Install method|Platform|
|---|---|---|---|---|
| 4.7.x and above | logcollector | Agent | N/A | Windows |
## Summary
*Originally https://github.com/wazuh/…
-
From Issue #36.
**Federal systems, and federally funded state systems, must demonstrate FISMA compliance using the NIST SP800-53 guidelines according to Federal Information Processing Standards (…
-
https://healthitsecurity.com/news/cerebral-notifies-3.1m-users-of-healthcare-data-breach-stemming-from-pixel-use
-
https://www.whec.com/rochester-new-york-news/woman-wants-rochester-regional-health-held-accountable-after-unlawful-access-of-medical-records/5642880/
Jessica Meier