Re: Security assessment of Cassandra

2016-04-26 Thread Jack Krupansky
: > Greetings, > > Performing security assessment of Cassandra with the goal of generating > STIG for Cassandra (iase.disa.mil/stigs/Pages/a-z.aspx) I ran across some > questions regarding the way certain security features are implemented (or > not) in Cassandra. > >

Re: Security assessment of Cassandra

2016-02-16 Thread oleg yusim
> > https://docs.google.com/document/d/13-yu-1a0MMkBiJFPNkYoTd1Hzed9tgKltWi6hFLZbsk/edit?usp=sharing > > Thanks, > > Oleg > > On Thu, Feb 11, 2016 at 2:29 PM, oleg yusim wrote: > >> Greetings, >> >> Performing security assessment of Cassandra with the goal of g

Re: Security assessment of Cassandra

2016-02-12 Thread oleg yusim
nt/d/13-yu-1a0MMkBiJFPNkYoTd1Hzed9tgKltWi6hFLZbsk/edit?usp=sharing Thanks, Oleg On Thu, Feb 11, 2016 at 2:29 PM, oleg yusim wrote: > Greetings, > > Performing security assessment of Cassandra with the goal of generating > STIG for Cassandra (iase.disa.mil/stigs/Pages/a-z.aspx) I ran across some >

Security assessment of Cassandra

2016-02-11 Thread oleg yusim
Greetings, Performing security assessment of Cassandra with the goal of generating STIG for Cassandra (iase.disa.mil/stigs/Pages/a-z.aspx) I ran across some questions regarding the way certain security features are implemented (or not) in Cassandra. I composed the list of questions on these