Thứ Hai, 29 tháng 1, 2018

Auto news on Youtube Jan 29 2018

For Oracle Cloud Access Security Broker Cloud Service to monitor your Amazon Web

Services account there are two services that must be enabled. CloudTrail and S3.

Enabling these services allows your Identity and Access Management account

to read the AWS service itself. It also enables the account to read the CloudTrail logs

in your s3 bucket. First log into your AWS console to enable CloudTrail

and check the policy settings on your S3 bucket

Start by selecting Services from the menu

Under management tools, choose CloudTrail

You'll see an AWS CloudTrail screen. Once selected, you're taken to the CloudTrail service

Here you give the service a name of your choice. Notice, by default it's enabled

for all regions and is capturing all events. Choose whether to put your CloudTrail logs

into an existing S3 bucket or a new one. For an existing S3 bucket

select No. Then, enter the name of the S3 bucket. If you want to use a log file

prefix to change the default location of the CloudTrail logs, enter the prefix

under advanced. Instead of storing logs in Amazon S3/bucket name/AWS logs/account number,

it will insert the prefix after the bucket name. To create a new S3 bucket

Select Yes. Give the bucket a name and choose Create to create the

cloud trail and the S3 bucket. This will take you to the CloudTrail service.

This is the screen you would see if you already had CloudTrail enabled and

selected Trails in the left hand menu.

You'll see the Cloud Trail you just created

and the name of the S3 bucket its piping its logs to. Choosing the CloudTrail name

will take you into the configurations page, where you can

validate the settings of the CloudTrail. Here, you can edit the configurations

disable CloudTrail or delete it.

The next step is to validate the policy on the S3 bucket. Select Services from

the menu and under storage select S3

Select the bucket name and you'll see four tabs across the top

By choosing Permissions you get to the Bucket policy. Under bucket policy, you'll

see the policy in JSON format that was automatically created by the CloudTrail

service on your S3 bucket. If you use an existing S3 bucket, ensure that the

policy has the GetBucketACL for CloudTrail policy and s3:PutObjects

for CloudTrail policy included. Reading the policy you'll see that it entitles

the CloudTrail service to get to the bucket access control list. But more

importantly puts objects into the bucket. These permissions allow CloudTrail to

store the log data it generates into your S3 service.

Congratulations! you've enabled CloudTrail.

CloudTrail is piping its logs to an S3 bucket on your Amazon Web Services account.

Thank you for watching.

For more infomation >> Oracle CASB Cloud Service: Enabling Cloudtrail and S3 - Duration: 3:22.

-------------------------------------------

Human Resources Plan for 2016–2019: Guaranteeing the delivery of public services - Duration: 0:57.

I think Psychology was a career

that attracted me because it was a way to help,

to be in contact with people, which is what I really like.

I especially remember a 16-year-old boy

who was in hospital in a very serious condition

and the mother was there when we arrived.

She was in that situation, with her son there being treated.

We went outside for some fresh air.

To breath a little bit and forget about the ICU.

At that moment, she told me: "Can you hug me?"

And the feeling of saying: "Yes." It's not that difficult what she asks.

We are people.

We are civil servants, but we are people working for people.

Sergeant of the Research and Accident Prevention Unit. Traffic and Road Safety Division Guàrdia Urbana.

Guaranteeing the provision of public services

For more infomation >> Human Resources Plan for 2016–2019: Guaranteeing the delivery of public services - Duration: 0:57.

-------------------------------------------

EZ Bridge Services Advert - Duration: 1:43.

For more infomation >> EZ Bridge Services Advert - Duration: 1:43.

-------------------------------------------

Human Resources Plan for 2016–2019: Strengthening the capacity of public services - Duration: 1:00.

I like Excel.

When I open it and I see the grid, I say: "That's a good start."

You like controlling your home economy because it's yours.

But it's not the same a 25 euro ticket

than a 25,000 euro invoice, a thousand times more,

like the ones we have during the city's festival.

We work with an important budget. It's a council, a powerful district.

Keeping control of a powerful thing

is something that amuses me and I like it.

You need empathy to put yourself in somebody else's shoes.

You need to understand the circumstances.

We work as a team.

Like they say: if you want to go further, you need a team.

Management Control People and Territory Services Management Sant Martí District

Reinforcing the capacity of public services

For more infomation >> Human Resources Plan for 2016–2019: Strengthening the capacity of public services - Duration: 1:00.

-------------------------------------------

Yanick Paradis: Harm reduction services as an entry point for prevention and treatment - Duration: 8:21.

My name is Yanick. I work as a clinical coordinator

at the Dopamine clinic. I've been an outreach worker

on the street for 11 years, primarily in crack houses.

That's my background as a frontline worker.

The first thing about harm reduction is pragmatism.

People have used, are using and will continue to use drugs, so

they might as well be with us while they are using. Why not be by their side?

I think it's a privilege to be part of their ritual, of their intimacy.

The second thing about harm reduction is, of course, humanism.

It's about the relationship we have with people.

You don't have to come here, and

it's possible that your injection techniques

are not great, but while you are with us, we will go along with you,

and take the time. Perhaps the first time

your injection techniques are all wrong,

but that's your ritual. Over time, we will do prevention

by saying, "why don't you try this?", "how about doing it this way?" or

"try your other arm." As we build a relationship,

we will emphasize

harm reduction.

Everything about front-line work has to do with

relationships.

People have known us for a long time.

Our approach works for independent community organizations.

People trust us because we spend a lot of time

and share a lot of things with them.

It's through this relationship that we can convey prevention messages,

once we have built enough trust to establish a relationship.

This allows us to better direct and advise people. The nice thing about a SIS is that we have

a nurse with us every night from 8 pm until 1 in the morning,

7 days per week, 365 days per year.

This provides an entry point into the healthcare system for

people who have experienced failures in places like hospitals.

This is a different approach, and I think

it can rebuild their confidence to go to

a facility, to enter the healthcare system and to

take steps like getting a health card or getting

acces to hepatitis C treatment, methadone or suboxone,

etc.

The Lotus project is about a navigator. My colleague Magali accompanies

people, for example to receive their hepatitis C treatment.

The first step is to make a deal with family doctors to

take them on as patients. They are no longer just seen as a hepatitis C virus.

It becomes 360°. People experience a lot of things

when it comes to nutrition, to money, to

their love life and their social life.

We make sure the person keeps a

family doctor after the treatment and enters the healthcare system if he or she wants to.

The Lotus project also helps them get around.

We often take transportation for granted but it's not always the case.

The project pays for a bus pass so that people get around.

I think it also offers a $100 grocery voucher so that

they can feed themselves.

Magali goes with them to the doctor,

to get fibroscans done. She accompanies them pretty much everywhere.

On the other hand, street workers are also there

to support people in their efforts,

when it comes to their health but also as a whole.

Because we must look at people as a whole.

You can't just look at the virus, treat it and then say, "see ya!"

They deserve better because they give us a lot,

and we have to do the same. This is the best school of all.

It's about working with people and being with them

in a holistic way.

We've had supervised injection sites since June,

and we are quite happy and proud of it.

We are part of a regional system.

Dopamine is one of four supervised injection sites.

Legal technicalities often complicate the situation.

We aim to provide a low threshold and sometimes,

protocols focus too much

on drugs and not enough on users - that's my two cents.

There is a lot of nonsense

that we must get rid of over time, actually

we should do it as fast as possible.

For example, in supervised injection sites,

we have people who have bought drugs together and want to use together.

This is called a split dose. Our protocol forbids it because

it's considered trafficking, so we must send people outside to split their drugs.

But we have another protocol that forbids trafficking outside. You see the nonsense?

This is one of many examples.

This one is pretty obvious, but we must take another look at protocols.

At Dopamine, we have a code of conduct, a way of doing things, and it's all about

respect; of others, of the stakeholder, of the patient,

of the furniture, of the space.

Sometimes protocols get caught up in small details and it can

really put restrictions on us, but I believe in this new project.

It's only been around since June,

we haven't even gone through four seasons, and we

really want to work on these

legal issues that can

work against a low threshold approach.

I think we should allow split doses and let people test their drugs.

People can't even sniff their drugs before injecting them.

This needs to go too because it makes sense. We can't go backwards

in our prevention messages. We can't say test your drugs then

sniff them, but do it outside and come back. It makes no sense.

It's like going backwards. Assisted injection too, we must include people

who show up together and inject together.

I think this should be allowed.

It goes back to what I was saying at the beginning.

It's about being pragmatic. They are doing it anyway.

They might as well do it at Dopamine, where there is a nurse,

a worker, where we are present.

People are the starting point for our services.

We must start from their requests, their needs, what they tell us,

not the other way around. We shouldn't invent services to reach people.

We must listen to their needs and adapt services to their needs,

to their lifestyle.

And we must take our time, take the time

to build relationships. To spend time together, as one human being to another.

There's no need to rush. Actually, all we have to do is be there.

For more infomation >> Yanick Paradis: Harm reduction services as an entry point for prevention and treatment - Duration: 8:21.

-------------------------------------------

Yanick Paradis : Les services de réduction des méfaits comme point d'entrée - Duration: 8:21.

For more infomation >> Yanick Paradis : Les services de réduction des méfaits comme point d'entrée - Duration: 8:21.

-------------------------------------------

Oracle CASB Cloud Service: Turn on Cross Account Logging in AWS - Duration: 8:10.

Cross-account logging is a configuration in Amazon Web Services that allows users

to pipe CloudTrail log data from one account to another account's S3 bucket

There are many reasons why you'd want to set up centralized logging in your environment

From an information security perspective, you may want to limit access

to the logs from the users who created them. In this walk-through you'll set up

cross-account logging between two AWS accounts and create a cross-account role

In this example, the name of the account thats sending the logs will be called source

and the account that's receiving the CloudTrail logs into its S3 bucket will be called target.

At this point in the configuration it's assumed that the

CloudTrail and the S3 bucket on the target account are already enabled

Let's first configure the AWS target account. For this, start two different browsers.

This is required because AWS sessions cannot overlap.

So you cannot navigate between two AWS accounts in the same browser even on multiple tabs

Here we are using Chrome for the target account and Firefox for the source account

In browser one, open the AWS management console for the target account, the one that receives Cloud trail logs

In browser two, open the AWS management console for the source account

This is the account that sends its cloud trail logs to the target account

Let's start with the target account

This account is configured first because the policy on the S3 bucket must be modified to allow

the source account to write to it. When you create the CloudTrail in a source

account, you'll have to name the S3 bucket. Unless the policy has been

modified the Cloud trail creation process in the source account will not

recognize this S3 bucket in the target account and will therefore fail

The target account's S3 bucket will need to have a policy statement to allow the

source account CloudTrail service to put its log data into it

From Services in the target account navigate to Storage and select S3

When you select the bucket navigate to Permissions

and then Bucket Policy.

Here you'll see the policy. Make a copy of this existing

policy in case you need to revert to a working copy of the policy later

Look for the policy statement in the action of s3:PutObject. Below that you'll see a

resource statement with the target accounts account number.

You'll need to add an additional resource statement to include the source account number

Save it and if there are any syntax errors AWS will state that the policy contains invalid JSON

If this happens, try and find the error

or cancel your changes and restart or revert to the original policy you copied earlier

For every other AWS account, you'll repeat this process of copying

and pasting additional ARN statements and updating the account number

Save after each one to ensure that no syntax errors exist

Now that the target accounts S3 bucket has the correct policy statement to allow the source

account to send the CloudTrail logs, a cross-account role needs to be created

for the target account. Oracle CASB Cloud Service relies on each AWS account

to be able to read its own CloudTrail logs. To do this each source account must

assume the cross-account role to receive the correct entitlements to read the S3 bucket

Navigate back to Services and under Security Identity and Compliance select IAM.

From Roles create a new role and select Another AWS Account

This allows IAM users or roles you own to assume this cross-account role

Assuming the cross-account role grants the appropriate entitlements to the IAM user or role

in order to read the S3 bucket. Enter the source accounts account number

Then navigate to the next screen from where you can assign the permissions

Select the s3 read-only access policy

Give the role a name and then create it

Select the role you just created in Roles. Open the Trust Relationship screen.

This is the control that AWS uses to ensure only recognized source account

users and roles can assume this role on the target account.

Now edit the trust relationship

You can see that the principal is set for the source account

and the access is root. To adhear to the information security policy of

least privileged access, you'll want to change this to the ARN of the IAM role in the

source account that will be used to monitor the source AWS account

Edit it in the same way as you did for the policy on the S3 bucket for the source account

Instead of adding a resource statement which is what you're accessing

you'll need to add a principal statement which is who is accessing the resource

For each source account you will need to add a line. Remember to use square brackets and commas appropriately.

Then update the trust policy

Now the target account configuration is complete it's time to configure the source account

Login to your source AWS console to enable CloudTrail

Navigate to Services and under Management Tools select CloudTrail

Give the CloudTrail a name. Notice by default it's enabled for all regions and

is capturing all events.

Select No for create a new S3 bucket.

In the S3 bucket field enter the name of the target accounts S3 bucket and select the name of the bucket

S3 bucket names are globally unique and it is important to be exact

If AWS throws the error 'bucket doesn't exist', choose a different bucket

This means the policy on the targets S3 bucket is incorrect

So you would need to go back to the target S3 buckets policy to ensure it is configured correctly

If you used a log file prefix to change the

default location of the CloudTrail logs, make sure the policy ARN has the right

path in the target accounts S3 bucket policy. Create the CloudTrail.

This will take you to the CloudTrail service. You will see the CloudTrail you just created

and the name of the S3 bucket its piping is logs to.

Choosing the CloudTrail name will take you into the configurations page where you can

validate the settings of the CloudTrail. Here you can edit the configurations,

disable the cloud trail or delete it altogether.

Congratulations! You've configured cross account logging.

Thank you for watching.

For more infomation >> Oracle CASB Cloud Service: Turn on Cross Account Logging in AWS - Duration: 8:10.

-------------------------------------------

Oracle CASB Cloud Service: Configuring and Registering AWS - Video Key - Duration: 3:02.

There are multiple ways to configure Amazon Web Services to be monitored by

Oracle CASB Cloud Service.

This video outlines the instructions required for your particular architecture and configuration.

If you are using access and secret keys to secure your AWS account or accounts,

please follow the videos for an IAM user.

If you would prefer to use an IAM role to secure your AWS account or accounts,

follow the videos for an IAM role.

There are four different scenarios in this series.

Follow the scenario that is applicable to your architecture.

For an IAM user as a dedicated service account for a single instance, you will need the following videos:

Turn on CloudTrail and S3 in an AWS account

Create a dedicated service account for a standalone AWS account

and register standalone AWS account using dedicated service account to Oracle CASB Cloud Service.

For an IAM user in cross-account logging configuration, you will need the following videos:

Turn on CloudTrail and S3 in an AWS account

Create a dedicated service account for target AWS account in cross-account logging

Register target AWS account using dedicated service account to Oracle CASB Cloud Service

Create a dedicated service account for source AWS account in cross-account logging

Turn on cross account logging in AWS

and register source AWS account using dedicated service account to Oracle CASB Cloud Service

If you are using an IAM role, you will need the following videos:

Turn on CloudTrail and S3 in an AWS account

and create an IAM role and register a standalone AWS account using an IAM role

For an IAM role in a cross-account logging configuration, you will need the following videos:

Turn on CloudTrail and S3 in an AWS account

Create an IAM role and register a target AWS account to Oracle CASB Cloud Service using an IAM role

Create an IAM role

Turn on cross-account logging

and register a source AWS account to Oracle CASB Cloud Service using an IAM role

Thank you for watching

For more infomation >> Oracle CASB Cloud Service: Configuring and Registering AWS - Video Key - Duration: 3:02.

-------------------------------------------

Smalls Mortuary & Cremation Services - Duration: 2:56.

Hi, my name is C'Aracher (CJ) Small Jr.

President and owner of Small's Mortuary.

On behalf of the board of directors and staff, we would like to thank you for 15 years of

support and patronizes Small's Mortuary.

Small's Mortuary providing the gulf cost with diligent, dignified, dedicated and distinctive

services from three locations; Mobile, Theodore and Daphne.

Providing cremation services, state-of-art facilities and vehicles.

Remembering, our motto is 'Large enough to serve you, yet small enough to appreciate

your business.'

Again, thank-you for 15 years of support.

"The staff is very very professional, having known the business manager for quite some

while, Mr. Brown, he's spectacular, that's the most that I can say.

Very professional, very, he knows what you need, know what you need, and know's how to

comfort a family."

"They're very professional people, and they want to help everyone and they had a wonderful

commemoration memorial for loved ones that had passed away.

It was a candle light service and it is very moving and people need that in their lives

these days."

"When I looked at how everything was so beautiful and, you know, and I looked at how each person

is in a room by themselves, so I told them that I wanted to make my, arrange everything,

when something happened to me my children would have nothing to do."

"He has suggestions, but you have the last word on what you want to do.

All of the individuals here, very nice, they understand what grieving is and that's what

you need, understanding family and I am going to call this family because it's like the

family, the other family you need."

"To know that people care and it's not just for the time that you're having a funeral,

it's in the future too because these things go on through your life and you always have

your memories, and it's nice that someone else can care about someone else's feelings

like that."

For more infomation >> Smalls Mortuary & Cremation Services - Duration: 2:56.

-------------------------------------------

Maximize uptime with enterprise-grade cloud services - Duration: 1:06.

The customers that I deal with regularly are looking for reliable, secure databases.

They're looking for large computational workloads that they can do,

that they can't necessarily do on-premise.

All of it has to be secure, scalable, and highly performant.

So when we talk about reliability, it's that 99.9 percentile of up time.

So, you'll be guaranteed that your services will never go down.

Traditionally when customers try to do that on-premise

it's costly because you have to buy 2 of everything.

So in Azure, that's a built in feature; it's covered by SLA's.

It's sort of baked into the service fabric of everything we do.

I mean the reality is no customer switches on-premise off in one day

and then moves over the the cloud the next day. It's a process.

And testing, and ensuring that you get the same performance and same service levels

out of Azure is critical in that move, and that's something that we take

very seriously, and we support our customers in that journey.

Không có nhận xét nào:

Đăng nhận xét