Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
geonetix
Mar 6, 2011


everythingWasBees posted:

Not sure this is the right place to ask, but I've ended up being tasked with putting together a website that will be sending financial documents to a AWS database. I know nothing about cybersecurity or infosec and am somewhat terrified doing something like this, though thankfully I am not personally liable if anything goes wrong. Is there a good resource for like, putting together something simple and not loving over a bunch of customers due to a lack of research?

Depends a bit on what kind of information you store and what you're supposed to do with it. Large banks are using AWS, so it's no inherently a problem. You just have to do the right things to prevent abuse or leaks. PCI-DSS v3 has a simple list of things to do, AWS themselves have best practices too, if you *really* want to be sure you're not doing something dangerous look into what the cloud security alliance matrix (which is basically ssae16/iso27001/hipaa/pci/etcetcetc controls combined into one massive list, may be missing gdpr technical controls - haven't checked) expects of you. And then consider what meets your risk appetite and how much you or your employer cares about and/or are liable for people's personal lives.

Without any more information about what you're supposed to be doing, it's hard to give specific advice.

Adbot
ADBOT LOVES YOU

geonetix
Mar 6, 2011


That code matching thing was already implemented before tavis tweeted about it so ai don’t think that’s what’s up, but maybe they used it that way afterwards, who knows

geonetix
Mar 6, 2011


EVIL Gibson posted:

Nothing to hide means even though you are not doing anything illegal doesn't mean people can't judge you.

I dislike the guy, but Snowden once (famously?) said "Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say." I still think that's apt.

And that's before I start on a privacy is the basis of freedom tangent.

geonetix
Mar 6, 2011


PBS posted:

Yeah, I assume that's talking about using it for pages that it should be used for, not recommending it be blindly set for 100 random applications.

It goes for APIs over http used by websites too (hello overcomplicating “front end engineers”), not just pages; but generally this is a problem with authenticated pages and leaking through user state for other users if it’s cached somewhere. So as stated before: cache nothing is a good default for “logic” endpoints.

geonetix
Mar 6, 2011


McAfee has a siem? Oh my god I wouldn’t touch that with a 10 foot pole

geonetix
Mar 6, 2011


dogstile posted:

If this thread has taught me anything its that I should never get into infosec or i'll be abrasive and mad all the time.

I prefer cynical and alcoholic

geonetix
Mar 6, 2011


A CISO needs to be able to speak business and convince his peers and "higher ups" through common knowledge and relationships. Usually fed with domain knowledge. But my God, I pity you if you have a raw technical CISO. You're hosed. They are cursed with knowledge and more often than not struggle to get their very specific message across to people who regularly ask their son to reboot their laptops.

Oh and that they should report to CEO or COO is about right. If a CISO reports to CIO or CTO you're way on the track towards conflict of interest and you'll see the problem being turned back at you.

I reported to the audit committee of the supervisory board for actual content, and to CEO for salary/bonus purposes. Advice and personal results are decoupled from what IT and Dev are doing, and that's good also: they have very different targets. Your strategy will lie in having them understand the importance of the strategy and you make agreements based on that. However, as soon as they fail to live up to those agreements; shareholders will know in detail through the committee reports.

Moving on from infosec to privacy however gave me a lot more handholds to get poo poo done because somehow that suddenly hits home with colleagues.

That's my CISO story thanks for reading

geonetix
Mar 6, 2011


Apple keychain on iCloud or 1password are your only bets.

Keychain is fine, it integrates with basically all apps too

geonetix
Mar 6, 2011


long-rear end nips Diane posted:

They've got other problems to deal with for the next few months

But once those couple of months pass, privacy finally isn't a concern for them anymore, either.

geonetix
Mar 6, 2011


Patriot act also caused a lot of orgs to host and deploy their stuff in other regions to dodge that. Ironically nowadays a lot of it with gcp/aws/azure but the idea counts. Still MSFTs fight over digital jurisdiction about the emails of drug dealers stored in Ireland is an interesting read.

geonetix
Mar 6, 2011


porktree posted:

Every time I see this it is because of SOX compliance written as 'passwords must by x char in length', instead of 'at least x char'. Then to comply with audit...

Any auditor worth their salt looks past this though

geonetix
Mar 6, 2011


Ida recently updated their free version to something from the past 20 years also, and it’s really good

geonetix
Mar 6, 2011


Nothing about that should surprise you about Facebook’s conduct. What im surprised about is that Apple hasn’t pulled their enterprise deployment license (yet?)

geonetix
Mar 6, 2011


ChubbyThePhat posted:

That's some crazy poo poo. Good find.

The best part is Microsoft saying “please wait on our patch”. Ok, Microsoft.

geonetix
Mar 6, 2011


Maybe true about logging but I really like the idea of waf detection at the tls termination rather than having it fully routed through their “cloud”

geonetix
Mar 6, 2011


We’ll see about that in court!

geonetix
Mar 6, 2011


Turns out writing articles about security does not actually require understanding scope or preexisting levels of access and their complications, as long as you can poo poo on random tools even if your “finding” is hardly of consequence.

geonetix
Mar 6, 2011


Thanks Ants posted:

On browsers - have they stopped auto-completing forms where the field is hidden yet? I also feel there should be a way to prevent text entered into autocomplete fields from being sent to the server until the form is submitted.

Yes. This is now even a really annoying anti-pattern where, for example, the password field only shows up after entering your username. Thanks Delta.

geonetix
Mar 6, 2011


0xdude is a good follow also

geonetix
Mar 6, 2011


Lain Iwakura posted:



Look at all of that hot garbage.


One day when I am not writing a tonne of documentation on said hot garbage.

Is the Y axis short for "Ability to Remote Code Execute"?

geonetix
Mar 6, 2011


Lain Iwakura posted:

Outside sales is how I indicate how my time will be with them. I've had to have sales persons banned from my company due to their poor behaviour elsewhere.

My favorite sales person keeps spilling beans about his other customers. It’s great. He was really upset when we told him he wasn’t welcome to our meetings anymore.

geonetix
Mar 6, 2011


Doesn't surprise me that someone would describe that as an active attack when we're in an age where having your 18 year old leaked password being abused to steal your icloud photos is called "hacking".

geonetix
Mar 6, 2011


fyallm posted:

LoL. Now imagine trying to get people into vulnerability management consulting.

I have a vacancy open for vendor babysitting. It’s a tough sell.

geonetix
Mar 6, 2011



Didn’t know trump took organization advice from the “failing” New York Times

geonetix
Mar 6, 2011


stevewm posted:

I am all for security, but when it prevents your users from doing their job, you might need to re-think things...

HR recently had to get some camera footage to a state agency that they requested. We literally had no way to send it to them as they have EVERYTHING blocked. Given the nature of the agency, I am surprised at this, because it is something they surely need to do a lot.

It was too big to send via email as their server helpfully informed us they could only accept up to 5MB max via bounce back. Tried Google Drive link, blocked.. Dropbox, blocked. OneDrive link, blocked. Uploaded to a unlisted Youtube video, blocked. Some other random file send services, also blocked.

So they asked us to overnight it on a flash drive... I made sure to put the video on the drive in 4 different formats, just in case. MP4, AVI, the native 3GP, and even a self executing EXE standalone player. They received the USB flash drive; their computers are blocked from outside flash drives apparently.

They are currently waiting on their IT to come back with some sort of solution.

I still giggle every time I’m reminded the HMRC only accepts unencrypted digital revenue statement files through Dropbox or snail mail.

Its all a good case of the cybers.

geonetix
Mar 6, 2011


I like to believe the MS Teams team works with Teams themselves and that's why they can't get any poo poo done.

geonetix
Mar 6, 2011


Ynglaur posted:

I can confirm that they do.

I also like to believe they’re so hyped up about teams because the only comparison they have is Skype for business and have actually never collaborated with any other human being

geonetix
Mar 6, 2011


The UNC bug I found a bit odd (but kudos for fixing it), but the privilege trampoline on osx as part of their installation package is a lot worse. Still needs someone to have unprivileged local access of course in order to use it, but come on.

geonetix
Mar 6, 2011


Cup Runneth Over posted:

How viscerally offensive would it be to SHA1-hash a password 100,000 times to send it to a database server to be bcrypted for storage if your threat model is "bored 13-year-olds," on a scale of "disappointed in you" to "crimes against data"?

This is not very far from any passwords stretching method, so yeah not terrible, but also not great. But why don't you just use pbkdf2 or {b,s}crypt and let something do this for you

geonetix
Mar 6, 2011


I'm sure Alex "yahoo and facebook" Stamos is going to save them from this

geonetix
Mar 6, 2011


Did someone at github try to move it to azure and failed?

geonetix
Mar 6, 2011


Hubspot does the same, if you have an account that uses SSO, you can just call password reset and use either way. There's lot of saas tooling that just implements SSO hilariously lovely.

geonetix
Mar 6, 2011


Shuu posted:

I literally cannot tell what Darktrace is supposed to do from their website.

Not surprising though. I just left a job (thank god) doing research and detection development for another enterprise security software company, and there was a huge push for UEBA and ML and AI all the other sexy buzzwords. No one in product leadership could describe what features they actually wanted, and any proof of concept work or references to ML projects other companies were working on were met with "yeah but not like that". Never did figure it out.

I think Darktrace's mission is to bother you as much as possible in the most aggressive way possible, while selling you absolutely nothing. It's the true shitstain of the industry.

geonetix
Mar 6, 2011


Potato Salad posted:

like, what threat model does darktrace help address

the threat model of your employer not spending enough money on bullshit

geonetix
Mar 6, 2011


The magical combination of EDR + zscaler + device trust on authentication is fantastic for solving most problems tbh

geonetix
Mar 6, 2011


CyberPingu posted:

Oh...my...christ


Someone sent us a PoC to our responsible disclosure program, that he had uploaded to YouTube

lol this happens all the time, I just ask them to remove it and send them a box of goodies / gift cards after (if it was a valid finding). You'll make a friend who's on your side forever and ever.

geonetix
Mar 6, 2011



You know all those things that say "Do not expose to the internet", like vSphere, or Jenkins, or Redis, or k8s. People don't read that and just deploy.

geonetix
Mar 6, 2011


https://twitter.com/InvestorsLive/status/1407780136188002304?s=20

He hasn't been _really_ infosec in a while, of course, but still.

geonetix
Mar 6, 2011


I don't think he's been in a mentally healthy state for at least a decade. This news comes in an hour or so after there was an extradition agreement as well. I'm not speculating but 1+1 seems to make sense.

Adbot
ADBOT LOVES YOU

geonetix
Mar 6, 2011


klosterdev posted:

Is there a super-rich insurance where the moment you've lost all chance at living in luxury for the rest of your life an assassin is contracted by the company to kill you in jail

I feel like there should be

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply