Joy, Happiness & Health to You and Your Loved Ones

To Our Open Source Family,

As the holiday season is upon us, we find ourselves reflecting on the past year and those who have supported us and the entire Tendenci community. With your help, we continue to work toward our shared goal – Connect the world’s people and do some good.

For many of us, it’s been a tough year with all the changes happening across the globe  – natural disasters, wildfires, shootings, political issues, personal issues, and hardest of all, the loss of our loved ones. All lead us to the greatest lesson—love. It is the action of love that makes our world a better place.

It is why we are sending you our most loving holiday wishes as you embark on your journey into 2019. So Happy Holidays our dear Tendenci friends and we wish you all a Happy New Year!

As leaders in Open Source, we are here for you. Always.

Warmest regards,

The Tendenci Team

Security in the Tendenci SaaS Cloud at AWS

Kibana OSSEC Tendenci

Cyber Security is based on Prevention, Monitoring, and Incident Response

Associations are part of the fabric of society. We take it seriously. And we also understand there are no “perfect” or “completely secure” systems. Not even air-gapped.

To guard our SaaS AMS clients’s sites we use redundant systems. These include SSL encryption, application isolation, containers, layers of AWS (Amazon Web Services) VPC, Security Groups, ACLs, Route53 DNS, custom AMIs, virus scanners, malware scanners, pentesting, auditing and more. All of these activities generate redundant logs which need to be monitored. To do that we run what is called the “ELK Stack” or now the “Elastic Stack“.

Network Monitoring with OSSEC Logstash ElasticSearch and Kibana

Cyber Security starts with Project Management

A Cyber PM, upon initial completion, never ends. It requires constant vigilance. The process of Cyber Security can be further explained as:

  1. Architecture – Start with Security In Mind
  2. Passive Cyber Defense – Systems that are in place
  3. Active Cyber Defense
  4. Cyber Intelligence Gathering
  5. Response

** Note: There is a longer explanation on our site at https://www.tendenci.com/security/

There are many resources available for cyber security training. We encourage you to look them up and take an active role in keeping your web site, company, family and country secure from cyber attacks!

For the expanded full version of the basics of cyber security in the Tendenci SaaS cloud, view at https://www.tendenci.com/security