Hey, anyone using Pomerium?
Posted by Ian Beer, Project Zero Project Zero’s mission is to make 0-day hard. We often work with other companies to find and report se…
On May 31th, the Kubernetes Product Security Committee announced a security regression in Kubernetes for which they had assigned CVE-2019-11245. The problem caused containers that use images which are supposed to run with a non root user to run as root, on the second time they are used or upon restart of the container. Before …
Did anyone Come across NPM memory Issues ?
Has anybody used any of the AWS WAF subscriptions? Any feedback?
From reviews, looks like it’s really a black box
I have used them
what do you want to know?
They’re totally a black box
you can setup some logging now to see what gets blocked, but you have no influence on changing that blocking rule
For compliance reasons, you can setup a “swiss cheese” WAF….and maybe for some protections on some wordpress or static sites.
I can’t recommend them else where, but that was my experience with it about 1.25 years ago. If you can afford it, I hear great things about Signal Sciences.
I left a review here a while back: https://aws.amazon.com/marketplace/pp/Fortinet-Inc-Fortinet-Managed-Rules-for-AWS-WAF-Co/B0779D3JYV
@Jonathan Le “ no influence on changing that blocking rule” sounds like a non-starter.
Or is there an ability to whitelist/bypass the rules?
It was a large glob of rules when I was using it - not sure if they broke that out in the last year. If they did, I’d imagine that for each exposed rule name you can do “Override to count”, which basically makes that specific rule fire with a “[non]fail to open”.
If you investigate it, let me know if they expose the rules now.
This is serious and confirms my suspicions with this well-intentioned but wholly unrealistic provision of GDPR.
This should be a walk in the park for identity thieves. Thieves are already able to social engineer their way through companies with that make it difficult for identify thieves (banks, telephone companies, etc). How are smaller, less sophisticated companies going to be capable of perform sufficient identity verification?
Anyone tried https://github.com/bitnami-labs/sealed-secrets
A Kubernetes controller and tool for one-way encrypted Secrets - bitnami-labs/sealed-secrets
Changes to configuration files don’t change signature, can add malicious features.
Anyone here have any experience with network micro segmentation on AWS? Just starting down the path of researching this subject and looking for links/recommended tools esp./papers
can you elaborate on your usecase?
Where I’m at right now, I spend a lot of time trying support network comms and the things allowed to egress/ingress on each subnet with a combination of Network ACLs, Security Group rules and outbound Palo Alto Networks firewalls.
This is the customer’s design and I can already see it starting to reach it’s limits. On AWS NACLs you get 40 ingress and 40 egress rules per subnet at max…
I saw some interesting articles about network “microsegmentation” a few years ago, but never had a chance to look at it. I think this is what the customer is trying to achieve - complete control and visibility of an Apps traffic flows across the network with a “whitelist” only approach down to ports + protocols.
I’ve had to table this topic for at least on more sprint, but will probably do a spike on it in soon.
The recent disclosure of yet another cloud security misconfiguration leading to the loss of sensitive personal information made the…