#security (2019-08)

Archive: https://archive.sweetops.com/security/

2019-08-02

Igor avatar
A Technical Analysis of the Capital One Hackattachment image

The recent disclosure of yet another cloud security misconfiguration leading to the loss of sensitive personal information made the…

2019-08-05

Jonathan Le avatar
Jonathan Le

Anyone here have any experience with network micro segmentation on AWS? Just starting down the path of researching this subject and looking for links/recommended tools esp./papers

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

can you elaborate on your usecase?

Jonathan Le avatar
Jonathan Le

Where I’m at right now, I spend a lot of time trying support network comms and the things allowed to egress/ingress on each subnet with a combination of Network ACLs, Security Group rules and outbound Palo Alto Networks firewalls.

This is the customer’s design and I can already see it starting to reach it’s limits. On AWS NACLs you get 40 ingress and 40 egress rules per subnet at max…

I saw some interesting articles about network “microsegmentation” a few years ago, but never had a chance to look at it. I think this is what the customer is trying to achieve - complete control and visibility of an Apps traffic flows across the network with a “whitelist” only approach down to ports + protocols.

I’ve had to table this topic for at least on more sprint, but will probably do a spike on it in soon.

2019-08-08

chrism avatar
bitnami-labs/sealed-secrets

A Kubernetes controller and tool for one-way encrypted Secrets - bitnami-labs/sealed-secrets

kskewes avatar
kskewes

We use it. Simple and reliable. Have added some Prometheus metrics And mixin in a fork. Waiting for maintainer feedback before submitting PR.

bitnami-labs/sealed-secrets

A Kubernetes controller and tool for one-way encrypted Secrets - bitnami-labs/sealed-secrets

1

2019-08-09

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)
Privacy law exploited to reveal fiancee’s dataattachment image

One in four firms holding a test subject’s data released it to her partner without her permission.

btai avatar

@Erik Osterman (Cloud Posse) going to use this one in my industry updates for my meetup. its a great article

Privacy law exploited to reveal fiancee’s dataattachment image

One in four firms holding a test subject’s data released it to her partner without her permission.

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

This is serious and confirms my suspicions with this well-intentioned but wholly unrealistic provision of GDPR.

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

This should be a walk in the park for identity thieves. Thieves are already able to social engineer their way through companies with that make it difficult for identify thieves (banks, telephone companies, etc). How are smaller, less sophisticated companies going to be capable of perform sufficient identity verification?

2019-08-14

2019-08-27

Igor avatar

Has anybody used any of the AWS WAF subscriptions? Any feedback?

Igor avatar

From reviews, looks like it’s really a black box

Jonathan Le avatar
Jonathan Le

I have used them

Jonathan Le avatar
Jonathan Le

what do you want to know?

Jonathan Le avatar
Jonathan Le

They’re totally a black box

Jonathan Le avatar
Jonathan Le

you can setup some logging now to see what gets blocked, but you have no influence on changing that blocking rule

Jonathan Le avatar
Jonathan Le

For compliance reasons, you can setup a “swiss cheese” WAF….and maybe for some protections on some wordpress or static sites.

Jonathan Le avatar
Jonathan Le

I can’t recommend them else where, but that was my experience with it about 1.25 years ago. If you can afford it, I hear great things about Signal Sciences.

Jonathan Le avatar
Jonathan Le
Igor avatar

@Jonathan Le “ no influence on changing that blocking rule” sounds like a non-starter.

Igor avatar

Or is there an ability to whitelist/bypass the rules?

Jonathan Le avatar
Jonathan Le

It was a large glob of rules when I was using it - not sure if they broke that out in the last year. If they did, I’d imagine that for each exposed rule name you can do “Override to count”, which basically makes that specific rule fire with a “[non]fail to open”.

Jonathan Le avatar
Jonathan Le

If you investigate it, let me know if they expose the rules now.

2019-08-28

Sharanya avatar
Sharanya

Did anyone Come across NPM memory Issues ?

2019-08-29

Maciek Strömich avatar
Maciek Strömich
Non-root containers, Kubernetes CVE-2019-11245 and why you should care | Twistlock

On May 31th, the Kubernetes Product Security Committee announced a security regression in Kubernetes for which they had assigned CVE-2019-11245. The problem caused containers that use images which are supposed to run with a non root user to run as root, on the second time they are used or upon restart of the container. Before …

2019-08-30

pecigonzalo avatar
pecigonzalo

Hey, anyone using Pomerium?

Maciek Strömich avatar
Maciek Strömich

I wouldn’t trust any 3rd party proxy/vpn provider to allow access to my internal infrastructure, regardless of the purpose of such infrastructure.

Jonathan Le avatar
Jonathan Le

What do you use?

Maciek Strömich avatar
Maciek Strömich

openvpn if I need a vpn

Maciek Strömich avatar
Maciek Strömich
A very deep dive into iOS Exploit chains found in the wildattachment image

Posted by Ian Beer, Project Zero Project Zero’s mission is to make 0-day hard. We often work with other companies to find and report se…

2019-08-31

    keyboard_arrow_up