Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
goddamnedtwisto
Dec 31, 2004

If you ask me about the mole people in the London Underground, I WILL be forced to kill you
Fun Shoe

hobbesmaster posted:

she had at the very least 11 years experience in something or other - she's blocked details of previous jobs. she could be extremely qualified we don't know

edit: more disk space and computing power could just be trying to get them to finally pay for new hardware but that entire answer does not instill confidence

yeah, she doesn't actually seem to answer the question, like, at all. i mean she's sort of somewhere in the right area at the start, when her answer is so generic it could answer any question in the form "how does <x> help security?" but then she starts talking about interviewing people - which might well be part of an investigation but doesn't really need ~big data~ - and then sort of maybe talks about needing more hard disk space for it, then talks about loving change windows

if someone gave me that answer in a job interview for a soc job they'd get politely shuffled off into the "seriously, recruitment people?" pile

the rest of the interview really isn't helping either:

quote:

Prat: Is the cloud easier to secure than the data center for the enterprise?

Susan: “There are a lot of things to consider with that. One school of thought says that when you put corporate assets into the cloud, they are more secure because you know exactly what you have there. You have an exact inventory, you know exactly who has access to that data, and how it is controlled.

Adbot
ADBOT LOVES YOU

Farmer Crack-Ass
Jan 2, 2001

this is me posting irl
did this already get posted yet?


https://twitter.com/webster/status/906346071210778625?s=04


quote:

OMG, Equifax security freeze PINs are worse than I thought. If you froze your credit today 2:15pm ET for example, you'd get PIN 0908171415.

the PIN is just a timestamp.

Volmarias
Dec 31, 2002

EMAIL... THE INTERNET... SEARCH ENGINES...

goddamnedtwisto posted:

yeah, she doesn't actually seem to answer the question, like, at all. i mean she's sort of somewhere in the right area at the start, when her answer is so generic it could answer any question in the form "how does <x> help security?" but then she starts talking about interviewing people - which might well be part of an investigation but doesn't really need ~big data~ - and then sort of maybe talks about needing more hard disk space for it, then talks about loving change windows

if someone gave me that answer in a job interview for a soc job they'd get politely shuffled off into the "seriously, recruitment people?" pile

Ok well it's a puff piece in a business magazine, whether or not someone knows what they're doing, the coversion ends up filtered into something th

quote:

the rest of the interview really isn't helping either:

:gonk:

rjmccall
Sep 7, 2007

no worries friend
Fun Shoe
i kindof get that response, actually. most organizations considering putting their assets in the cloud aren't just tired of maintaining physical hardware for their existing, well-designed, centralized information systems. it's more likely that every department, maybe even individual groups, have their own independent it staff maintaining their own independent servers running whatever software their staff has decided to install. ideally those servers support sso using company-wide credentials but it's just as likely that they use a department-specific or even server-specific login, and even if they use sso there's probably nothing being centrally logged except that user X authenticated to server Y at 2:19 AM. even if you assume that all those it staff are competent at keeping their servers warm healthy and clean, it's still a setup that makes most security tasks a lot harder, both proactively and forensically. forcing those departments to move those systems to the company's cloud provider is a pretty good lever for actually fixing those problems, one easily enforced by the big budget hammer, even if, yes, the company could theoretically just replicate the same lovely systems in the cloud, as well as that conversely they could have fixed those systems without moving to a cloud at all

surebet
Jan 10, 2013

avatar
specialist


goddamnedtwisto posted:

the rest of the interview really isn't helping either:

well i mean if we're comparing a proper aws/azure/whatever setup versus the janky ad hoc poo poo you see in a lot of bare-minimum-investments-in-infrastructure smbs then yeah, i guess

surebet
Jan 10, 2013

avatar
specialist


rjmccall posted:

most organizations considering putting their assets in the cloud aren't just tired of maintaining physical hardware for their existing, well-designed, centralized information systems. it's more likely that every department, maybe even individual groups, have their own independent it staff maintaining their own independent servers running whatever software their staff has decided to install.

extremely this.

goddamnedtwisto
Dec 31, 2004

If you ask me about the mole people in the London Underground, I WILL be forced to kill you
Fun Shoe

surebet posted:

extremely this.

yeah but do you really think a management dumb enough to let that sort of thing happen are then going to be smart enough not to leave everything on a public-accessible aws bucket?

MononcQc
May 29, 2007

No kidding in the cloud you can just go and enforce policies about authentication and management and get your cost fully itemized at the end of the month, and know that for example, if your folks use an AWS ELB or ALB, the loving thing is going to be patched and have an up to date policy and won't heartbleed 3 years into the future (and they even get advanced notifications before major CVEs make it to the public).

The cloud is definitely more secure for a fuckton of people because it tends to ensure that a limited number of knowledgeable people can impose far reaching policies (you need this kind of auth to touch any thing, and here are your limited permissions, use this service to do it and not use an inhouse shitshow of an app, audit trails are automatically generated through it all) and can leverage the size of another organization dedicated to maintaining that stack for you.

The one thing you don't get is that total isolation of running poo poo in your own controlled data centers and the flexibility that comes with it, but I'm ready to bet that for most orgs out there, that's a level of security that is not yet relevant because the applicative side of things is so bad it's guaranteed to make the rest irrelevant.

The kind of org that leaves a bucket available to the public on S3 is the kind of team to have the password validated in JS with an admin backdoor hidden in an HTML comment anyway.

duTrieux.
Oct 9, 2003

PyPy posted:

Those qualifications....her LinkedIn is gone now, ofc.



my degree is in literature but my job is primarily in tech. somebody's degree doesn't necessarily indicate whether they're good at a given job, just that they were academically trained in that subject.

Shame Boy
Mar 2, 2010

i don't even own a degree :smug:

Carbon dioxide
Oct 9, 2012

ate all the Oreos posted:

i don't even own a degree :smug:

You don't need to own one to screw your underlings 360 degrees.

The MUMPSorceress
Jan 6, 2012


^SHTPSTS

Gary’s Answer

duTrieux. posted:

my degree is in literature but my job is primarily in tech. somebody's degree doesn't necessarily indicate whether they're good at a given job, just that they were academically trained in that subject.

same. my degree certifies me to write deece poems but instead i make deece figs

MononcQc
May 29, 2007

I got into a multimedia professional to graphic designer, discovered programming by accident while there. I later got a part-time minor in CS while working in the industry, but in Quebec those (when not part of a bachelor's degree) are called a 'certificat' which I literally translate to a 'certificate in CS'.

I think a bunch of non-quebec businesses hired me assuming this was some form of Bsc from a tiny university but I technically never lied about my creds.

duTrieux.
Oct 9, 2003

so basically, a degree is a good measure of somebody's interests but not necessarily their career. this isn't to say that the person at equifax didn't totally gently caress up.


cis autodrag posted:

same. my degree certifies me to write deece poems but instead i make deece figs

nice.

anthonypants
May 6, 2007

by Nyc_Tattoo
Dinosaur Gum

duTrieux. posted:

my degree is in literature but my job is primarily in tech. somebody's degree doesn't necessarily indicate whether they're good at a given job, just that they were academically trained in that subject.
if they have only ever held director-level and c-level infosec positions at various companies over the past decade then a degree would definitely help assuage the belief that they were given a title and a paycheck they don't deserve, and that they are completely unprepared for this breach.

SeaborneClink
Aug 27, 2010

MAWP... MAWP!

anthonypants posted:

if they have only ever held director-level and c-level infosec positions at various companies over the past decade then a degree would definitely help assuage the belief that they were given a title and a paycheck they don't deserve, and that they are completely unprepared for this breach.

Counter point. Professional at IBM. :colbert:

surebet
Jan 10, 2013

avatar
specialist


MononcQc posted:

he kind of org that leaves a bucket available to the public on S3 is the kind of team to have the password validated in JS with an admin backdoor hidden in an HTML comment anyway.

also extremely this

~the cloud~ sure as poo poo isn't the end all be all of secure enterprise computing but for a lot of smbs it's better and even usually cheaper than trying to figure it out themselves, especially if their it dept is essentially james from accounting that likes video games. a couple weeks time per year in contract outside help to plan and deploy is an easier sell than trying to push a smallish medium company to bite down and hire their first full time it guy, and in-housing all the hardware & keeping it current makes management crap themselves once they realize they can't just run everything on a router they bought at staples.

now of course, if no one's at the helm, this all becomes james from accounting with an azure account, but there's no saving some people

Workaday Wizard
Oct 23, 2009

by Pragmatica
securing cloud's gazillion hidden apis is not that simple, or so ive heard

cinci zoo sniper
Mar 15, 2013




Independent researcher Scott Gayou has identified eight vulnerabilities in Smiths Medical’s Medfusion 4000 Wireless Syringe Infusion Pump. Smiths Medical is planning to release a new product version to address these vulnerabilities in January, 2018. In the interim, NCCIC/ICS-CERT is recommending that users apply the identified compensating controls until the new version can be applied.
These vulnerabilities could be exploited remotely.

A third-party component used in the pump does not verify input buffer size prior to copying, leading to a buffer overflow, allowing remote code execution on the target device. The pump receives the potentially malicious input infrequently and under certain conditions, increasing the difficulty of exploitation.
CVE-2017-12718b has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).c

A third-party component used in the pump reads memory out of bounds, causing the communications module to crash. Smiths Medical assesses that the crash of the communications module would not impact the operation of the therapeutic module.
CVE-2017-12722e has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).f

The pump with default network configuration uses hard-coded credentials to automatically establish a wireless network connection. The pump will establish a wireless network connection even if the pump is Ethernet connected and active; however, if the wireless association is established and the Ethernet cable is attached, the pump does not attach the network stack to the wireless network. In this scenario, all network traffic is instead directed over the wired Ethernet connection.
CVE-2017-12725h has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).i

The FTP server on the pump does not require authentication if the pump is configured to allow FTP connections.
CVE-2017-12720k has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).l

The FTP server on the pump contains hardcoded credentials, which are not fully initialized. The FTP server is only accessible if the pump is configured to allow FTP connections.
CVE-2017-12724n has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).o

Telnet on the pump uses hardcoded credentials, which can be used if the pump is configured to allow external communications. Smiths Medical assesses that it is not possible to upload files via Telnet and the impact of this vulnerability is limited to the communications module.
CVE-2017-12726q has been assigned to this vulnerability. A CVSS v3 base score of 5.6 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).r

The pump does not validate host certificate, leaving the pump vulnerable to a man-in-the-middle (MITM) attack.
CVE-2017-12721t has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).u

The pump stores some passwords in the configuration file, which are accessible if the pump is configured to allow external communications.
CVE-2017-12723w has been assigned to this vulnerability. A CVSS v3 base score of 3.7 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).x

PyPy
Sep 13, 2004

by vyelkin
Is a company like Equifax even required to notify the public of a breach? If so, within what timeframe. If not, why bother?



The timing of sandwiching it between two major hurricanes to keep it off the front page is devilishly devious.

flakeloaf
Feb 26, 2003

Still better than android clock

cinci zoo sniper posted:

Independent researcher Scott Gayou has identified eight vulnerabilities in Smiths Medical’s Medfusion 4000 Wireless Syringe Infusion Pump. Smiths Medical is planning to release a new product version to address these vulnerabilities in January, 2018. In the interim, NCCIC/ICS-CERT is recommending that users apply the identified compensating controls until the new version can be applied.
These vulnerabilities could be exploited remotely.

i'm disappointed that none of them is a sql injection

gonadic io
Feb 16, 2011

>>=

flakeloaf posted:

i'm disappointed that none of them is a xss injection

SeaborneClink
Aug 27, 2010

MAWP... MAWP!

gonadic io posted:

i'm disappointed that none of them is a xss injection

The real heartbleed

surebet
Jan 10, 2013

avatar
specialist


Shinku ABOOKEN posted:

securing cloud's gazillion hidden apis is not that simple, or so ive heard

while fully admitting that i'm basically james from accounting in this scenario, both on aws & azure i'm able to filter out any incoming connection except whitelisted ips/ports and i try not to ship my keys to github, so at least there's that + the usual credentials being required

i'm curious/afraid to ask in what new and exciting ways my poo poo could get owned though

gonadic io
Feb 16, 2011

>>=

surebet posted:

i'm curious/afraid to ask in what new and exciting ways my poo poo could get owned though

let me tell you about row-hammering, where other users running in other vms on the same physical hardware can alter and read your data

Cocoa Crispies
Jul 20, 2001

Vehicular Manslaughter!

Pillbug

surebet posted:

while fully admitting that i'm basically james from accounting in this scenario, both on aws & azure i'm able to filter out any incoming connection except whitelisted ips/ports and i try not to ship my keys to github, so at least there's that + the usual credentials being required

i'm curious/afraid to ask in what new and exciting ways my poo poo could get owned though

one more thing you can do is limit the poo poo out of your keys

like you can make a key that can only upload to a specific bucket and also expires quickly

Dans Macabre
Apr 24, 2004


schranz kafka posted:

rufo is the best

agreed

Shifty Pony
Dec 28, 2004

Up ta somethin'


gonadic io posted:

let me tell you about row-hammering, where other users running in other vms on the same physical hardware can alter and read your data

still loving amazing that someone managed to whip up a working reasonably high bitrate covert communications channel between vms using that sort of behavior in the CPU cache

https://cmaurice.fr/pdf/ndss17_maurice.pdf

surebet
Jan 10, 2013

avatar
specialist


i mean yeah i know im going to get super owned by stuff like that, iirc there's not a lot users can do to armor against vm level attacks anyhow, which is why anything confidential (so like everything) gets rar'ed and encrypted before it hits external storage

Iiiiii do enjoy watching talks about parallel vm attacks though, anything good come out about that at defcon or blackhat this year?

cinci zoo sniper
Mar 15, 2013




surebet posted:

i mean yeah i know im going to get super owned by stuff like that, iirc there's not a lot users can do to armor against vm level attacks anyhow, which is why anything confidential (so like everything) gets rar'ed and encrypted before it hits external storage

Iiiiii do enjoy watching talks about parallel vm attacks though, anything good come out about that at defcon or blackhat this year?

guys we found the only place on the planet with licenced (hopefully) winrar

Carthag Tuek
Oct 15, 2005

Tider skal komme,
tider skal henrulle,
slægt skal følge slægters gang



im the implication of coworkers who were previously unable to categorize and catalog poo poo locally suddenly being able to do so because its in the cloud now

crazypenguin
Mar 9, 2005
nothing witty here, move along

gonadic io posted:

let me tell you about row-hammering, where other users running in other vms on the same physical hardware can alter and read your data

aren't clouds are the place where this is the least concern though

they've got ECC, decided on higher refresh rates to further mitigate, and already have detection tools to spot attempts

gonadic io
Feb 16, 2011

>>=

crazypenguin posted:

aren't clouds are the place where this is the least concern though

they've got ECC, decided on higher refresh rates to further mitigate, and already have detection tools to spot attempts

what other places do you have random other people running their code on the same physical machines that you have? if you have your own company servers this isn't at all an issue.

unless you're already owned or mine eth lol (but I repeat myself)

spankmeister
Jun 15, 2008






cinci zoo sniper posted:

Independent researcher Scott Gayou has identified eight vulnerabilities in Smiths Medical’s Medfusion

More like Smiths Medical Malpractice

Carthag Tuek
Oct 15, 2005

Tider skal komme,
tider skal henrulle,
slægt skal følge slægters gang



gonadic io posted:

what other places do you have random other people running their code on the same physical machines that you have? if you have your own company servers this isn't at all an issue.

unless you're already owned or mine eth lol (but I repeat myself)

colocs?

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender

PyPy posted:

Those qualifications....her LinkedIn is gone now, ofc.




duTrieux. posted:

my degree is in literature but my job is primarily in tech. somebody's degree doesn't necessarily indicate whether they're good at a given job, just that they were academically trained in that subject.

yeah. i am in the same boat. i dropped out three and a half years into my BA in history (was aiming to be a teacher) and ended up working on securing corporate and industrial control networks. while funny, i don't judge her credentials. i do however judge her job performance

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Alec Muffett's degree (partial degree) is in astronomy.

Phone
Jul 30, 2005

親子丼をほしい。

Lain Iwakura posted:

yeah. i am in the same boat. i dropped out three and a half years into my BA in history (was aiming to be a teacher) and ended up working on securing corporate and industrial control networks. while funny, i don't judge her credentials. i do however judge her job performance

dunking on her degree is some stemlord bullshit when her interview response asking about security was "I hope I budgeted for enough hard drives" is infinitely more damning and telling

necrotic
Aug 2, 2005
I owe my brother big time for this!

Colo isn't shared hardware.

Adbot
ADBOT LOVES YOU

Carthag Tuek
Oct 15, 2005

Tider skal komme,
tider skal henrulle,
slægt skal følge slægters gang



necrotic posted:

Colo isn't shared hardware.

hah yea brainfart but i mean theres a ton of places where you can get your stuff hosted that arent cloudy

unless my definition of cloud is outdated

  • Locked thread