System hardening, the process to audit a system and take steps to secure it, is a mandatory step to secure endpoints ranging from personal devices to enterprise servers hosting critical services. This blog post details key hardening steps for RHEL 7 systems.
This article is the technical part of this 2 parts post. It presents the environment requirements, how to authenticate to IPAM’s API, collect the list of subnets, identify change and send an email when it occurs.
Add visibility in your infrastructure, be notified when new subnets are added in Ipam. This article presents the lack of visibility issue faced by IT and security team, and introduce a common example of such problem.