Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Sickening
Jul 16, 2007

Black summer was the best summer.

BlankSystemDaemon posted:

I'd be very surprised if more than a fraction of all the people in infosec know how to estimate threat models correctly, and how it applies to themselves and others.

Does anyone? Since the "correctly" is completely subjective.

Adbot
ADBOT LOVES YOU

Raymond T. Racing
Jun 11, 2019

cr0y posted:

Ya I'm not super concerned because I am a garbage person and have nothing of value, but I'm now more aware of needing a better way to backup my TOTP secrets.

Another curiosity that I don't know much about, are TOTP secrets stored in something like a TPM on modern phones? I feel like trying to lift those strings would be more of a target than spear phishing the TOTP codes themselves. Now I'm just curious how that trust chain works.

nope

cr0y
Mar 24, 2005




Well that's dumb

Raymond T. Racing
Jun 11, 2019

cr0y posted:

Well that's dumb

I mean any modern phone is encrypted and and siloing data per app, but a a device compromised by relatively high level malware (so not "you were watching porn" popups) could potentially look at the TOTP secrets

Darchangel
Feb 12, 2009

Tell him about the blower!


KillHour posted:

The new place my SO works for implements two factor on their VPN with an automated phone call. To a softphone. On the same computer you're connecting from. :downs:

We used to use RSA for 2-factor on the VPN.
Using a virtual RSA SecureID dongle app running on the same computer that was typically logging into the VPN.

some kinda jackal
Feb 25, 2003

 
 
The whole webauthn thing has completely passed me by, I'm ashamed to admit. Is there a non-gag recommendation to a good primer? I feel I probably understand individual components and building blocks based on my 30 seconds of googling but not how this fits together.

BlankSystemDaemon
Mar 13, 2009



Dongle? More like dong.

Mantle
May 15, 2004

Buff Hardback posted:

If you're paranoid, use a Yubikey and don't stress further about it.

I'm trying to de-smartphone and TOTP authentication is one of my blockers. From what I understand, wouldn't all of my service providers that are currently using TOTP need to support my Yubikey?

i.e. Yubikey is fine for access to systems I control, but I still need to rely on 3rd party decisions on MFA for access to 3rd party services.

Is this understanding correct?

Raymond T. Racing
Jun 11, 2019

Mantle posted:

I'm trying to de-smartphone and TOTP authentication is one of my blockers. From what I understand, wouldn't all of my service providers that are currently using TOTP need to support my Yubikey?

i.e. Yubikey is fine for access to systems I control, but I still need to rely on 3rd party decisions on MFA for access to 3rd party services.

Is this understanding correct?

Pretty much.

Internet Explorer
Jun 1, 2005





cr0y posted:

Well that's dumb

Now look at password managers on Windows where the user is running as admin.

cage-free egghead
Mar 8, 2004

Mantle posted:

I'm trying to de-smartphone and TOTP authentication is one of my blockers. From what I understand, wouldn't all of my service providers that are currently using TOTP need to support my Yubikey?

i.e. Yubikey is fine for access to systems I control, but I still need to rely on 3rd party decisions on MFA for access to 3rd party services.

Is this understanding correct?

You could try something like GrapheneOS if you want to get away from using apps from big companies. Only works with Pixels phones which is kind of ironic but has an incredibly talented dev behind it.

Been running it for about a year now and haven't really looked back. It is tough not using things like the Chromecast and whatnot but I'm okay with that tradeoff.

BlankSystemDaemon
Mar 13, 2009



cr0y posted:

Ya I'm not super concerned because I am a garbage person and have nothing of value, but I'm now more aware of needing a better way to backup my TOTP secrets.

Another curiosity that I don't know much about, are TOTP secrets stored in something like a TPM on modern phones? I feel like trying to lift those strings would be more of a target than spear phishing the TOTP codes themselves. Now I'm just curious how that trust chain works.
Here's a fun fact: For the longest time, and possibly to this day, Windows Bitlocker communicated over the I2C/SPI/1-wire bus TPM in plaintext.

DrDork
Dec 29, 2003
commanding officer of the Army of Dorkness

BlankSystemDaemon posted:

Here's a fun fact: For the longest time, and possibly to this day, Windows Bitlocker communicated over the I2C/SPI/1-wire bus TPM in plaintext.

Yup: https://arstechnica.com/gadgets/2021/08/how-to-go-from-stolen-pc-to-network-intrusion-in-30-minutes/.

Might be different in Win 11, but AFAIK this is still default behavior in Win10.

Mantle
May 15, 2004

cage-free egghead posted:

You could try something like GrapheneOS if you want to get away from using apps from big companies. Only works with Pixels phones which is kind of ironic but has an incredibly talented dev behind it.

Been running it for about a year now and haven't really looked back. It is tough not using things like the Chromecast and whatnot but I'm okay with that tradeoff.

Getting untracked is one aspect of my motivation, but the biggest driver is more trying to break the cycle of addiction to doomscrolling. My wife keeps telling me to stop "Trumping myself" which is what she calls me reading the Trump megathread for lols.

Absurd Alhazred
Mar 27, 2010

by Athanatos

BaseballPCHiker posted:



Theres always an XKCD.

Are we saying that when it comes to infosec, torture does work?

cage-free egghead
Mar 8, 2004

Mantle posted:

Getting untracked is one aspect of my motivation, but the biggest driver is more trying to break the cycle of addiction to doomscrolling. My wife keeps telling me to stop "Trumping myself" which is what she calls me reading the Trump megathread for lols.

Yep, that was a part of my motivation too. And all the incessant fighting over dumb bullshit. It's been nice going back to just using forums as my only social media exposure.

Ynglaur
Oct 9, 2013

The Malta Conference, anyone?
Is it possible to setup multiple hardware devices for Google's impending mandatory 2FA? I need to maintain access to my kids' accounts, but won't always have their phones on me.

Mantle
May 15, 2004

Ynglaur posted:

Is it possible to setup multiple hardware devices for Google's impending mandatory 2FA? I need to maintain access to my kids' accounts, but won't always have their phones on me.

If they're using TOTP then you could theoretically provide a shared seed to multiple devices/applications, if you can get the seed.

Guy Axlerod
Dec 29, 2008

Mantle posted:

If they're using TOTP then you could theoretically provide a shared seed to multiple devices/applications, if you can get the seed.

If just keep a screen shot of the QR code and scan it on multiple devices.

Ynglaur
Oct 9, 2013

The Malta Conference, anyone?
Thank you both!

SlowBloke
Aug 14, 2017

Martytoof posted:

The whole webauthn thing has completely passed me by, I'm ashamed to admit. Is there a non-gag recommendation to a good primer? I feel I probably understand individual components and building blocks based on my 30 seconds of googling but not how this fits together.

https://developers.yubico.com/WebAuthn/WebAuthn_Developer_Guide/Overview.html

And

https://fidoalliance.org/fido2/fido2-web-authentication-webauthn/

Should be a decent starting point.

some kinda jackal
Feb 25, 2003

 
 
Thank you! U2F/FIDO/etc has been on the periphery of my thought progress for years now but with 1001 fires to put out it’s always fallen victim to “I’ll look at it next week” syndrome. And now suddenly webauthn is something I really need to understand.

Thanks Ants
May 21, 2004

#essereFerrari


Microsoft are going big on passwordless so they have some great material out about it as well

Waroduce
Aug 5, 2008
I've lurked this thread for a long time just out of curiosity. Security and system exploitation has always been interesting to me and this thread turned me onto the Darknet podcasts and some other things I'm a regular reader/listener to now.

I'm a senior product guy whose been in the healthcare space for the last 7 years. Built out an enterprise care platform with some business platforms plugged into it. I'm considering moving to a company that secures protected health information in the cloud. They're like hire a security team and you can offload all that (not exactly sure what [that] is, its why I'm here) as a managed platform or you can use their platform, get trained on it and let your own security team run it. They do active management, active monitoring, migration and some other services.

I don't know anything about cloud security and I also don't know anything about cloud security in the healthcare space where you have a layered regulatory environment with federal HiPAA at the top (or GDPR in E.U.) regulation as well as state level and potentially client/customer level requirements. I understand that stuff more from a front end user oriented perspective than a back end technical position.

Is the healthcare space sufficiently different from just like the standard security space in the cloud to warrant such a specific suite of services? They've been successful and in business for some time, so I imagine yes...but I literally know nothing about this area. They're interested in me for my healthcare experience not my security experience but I'd like to understand this a little better. I also really like them.

I don't even really have the ability to form good intelligent questions here but I'd appreciate any words or directions or blogs the thread can provide and if this is out of scope will remove.

e: I googled secure PHI cloud and some other things and I mostly just found some similar providers in the space selling their services via white papers before posting this

Waroduce fucked around with this message at 14:24 on Nov 4, 2021

BaseballPCHiker
Jan 16, 2006

I'm not in healthcare, currently finance, but work pretty exclusively in cloud security.

If you were just starting out I'd recommend taking a course and working towards a cert with whatever provider you'll be working with the most AWS Solutions Architect or the equivalent for Azure or Google Cloud. Learn the basic cloud concepts then once you have that foundational knowledge start looking into more security focused areas to learn about.

I imagine, but dont know, that most of the healthcare specific stuff just has to do with data classification, what is/isnt HIPAA and how data is handled as a result of that classification.

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug
Yeah, get some cloud experience under your belt for sure. Look at a Security cert of your choice. Depends also on what you'd like to do: Incident Response? Pen Testing? Security Engineering? Application Security?

Waroduce
Aug 5, 2008
I'm interested in certs for professional development (better system design) but I would be in the product space not engineering. An associates AWS/Azure would probably help me craft better, more specific value statements that would resonate with buyer/stakeholder personas and assist with nailing product positioning in the market and paint a clearer picture differentiating data governed by HiPAA regulation vs standard protected data best practices and why the product is necessary. It would also probably asssit me with making more informed decisions regarding roadmapping instead of leaning heavily on the engineers on the team to frame features and stories for me. I didn't consider just going to get a cert......

quote:

I imagine, but dont know, that most of the healthcare specific stuff just has to do with data classification, what is/isnt HIPAA and how data is handled as a result of that classification.

off to google data classification and such now this is a great starting point thanks.

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug
Womp womp

https://twitter.com/campuscodi/status/1456231697402449920?s=20

BlankSystemDaemon
Mar 13, 2009



CommieGIR posted:

Yeah, get some butt experience under your belt for sure.
s/cloud/butt/g still coming in handy

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug

BlankSystemDaemon posted:

s/cloud/butt/g still coming in handy

Butt is critical for the security.

BonHair
Apr 28, 2007

I'm betting a lot of execs would invest in butt security rather than cloud security.

Fart Amplifier
Apr 12, 2003

In our province, cyber insurance providers are finally getting their act together and requiring anything with sensitive information that's available remotely/via cloud be protected via MFA.

The amount of IT people who view this as a completely unreasonable request astounds me. It's the single best/easiest factor to securing private information available.

A while back MS hosted a free seminar on Infosec with a bunch of us and nobody seemed to clue in when one of them said "One of the biggest obstacles for information security is IT departments." I didn't know what he meant then but I certainly do now.

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug

Fart Amplifier posted:

In our province, cyber insurance providers are finally getting their act together and requiring anything with sensitive information that's available remotely/via cloud be protected via MFA.

The amount of IT people who view this as a completely unreasonable request astounds me. It's the single best/easiest factor to securing private information available.

A while back MS hosted a free seminar on Infosec with a bunch of us and nobody seemed to clue in when one of them said "One of the biggest obstacles for information security is IT departments." I didn't know what he meant then but I certainly do now.

Nice, I know a lot of cyber insurance providers are refusing payout if you don't have basic security requirements met, as they should.

wolrah
May 8, 2006
what?

Fart Amplifier posted:

The amount of IT people who view this as a completely unreasonable request astounds me. It's the single best/easiest factor to securing private information available.

A while back MS hosted a free seminar on Infosec with a bunch of us and nobody seemed to clue in when one of them said "One of the biggest obstacles for information security is IT departments." I didn't know what he meant then but I certainly do now.

At least from the perspective of a MSP, it's not IT itself, it's the poo poo software vendors IT is stuck with. I'm still to this day having to fight battles with vendors over loving UAC and how there is no chance in hell we're giving the receptionist local admin. Anyone who tells me normal users need admin to run some software with a straight face should be banned from ever working in a computer-related job again.

Either way, I am 100% onboard with cyber insurance providers requiring that things be done right. That unfortunately seems to be the most effective way to actually improve things, is make sure it costs someone a lot of money to get it wrong.

Thanks Ants
May 21, 2004

#essereFerrari


wolrah posted:

Either way, I am 100% onboard with cyber insurance providers requiring that things be done right. That unfortunately seems to be the most effective way to actually improve things, is make sure it costs someone a lot of money to get it wrong.

:emptyquote:

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug

wolrah posted:

At least from the perspective of a MSP, it's not IT itself, it's the poo poo software vendors IT is stuck with. I'm still to this day having to fight battles with vendors over loving UAC and how there is no chance in hell we're giving the receptionist local admin. Anyone who tells me normal users need admin to run some software with a straight face should be banned from ever working in a computer-related job again.

Either way, I am 100% onboard with cyber insurance providers requiring that things be done right. That unfortunately seems to be the most effective way to actually improve things, is make sure it costs someone a lot of money to get it wrong.

This was a major pain for me as well when I designed and rolled out our Least Privilage program. Everyone wanted to run things as admin or make changes to their machines. After we trained up the L2 support guys, that shrunk rapidly.

And yeah, people whining because of UAC was always hilarious.

chin up everything sucks
Jan 29, 2012

BonHair posted:

I'm betting a lot of execs would invest in butt security rather than cloud security.

You could call it Cover Your Butt Insurance, they would immediately fund it.

Fart Amplifier
Apr 12, 2003

wolrah posted:

At least from the perspective of a MSP, it's not IT itself, it's the poo poo software vendors IT is stuck with. I'm still to this day having to fight battles with vendors over loving UAC and how there is no chance in hell we're giving the receptionist local admin. Anyone who tells me normal users need admin to run some software with a straight face should be banned from ever working in a computer-related job again.

Either way, I am 100% onboard with cyber insurance providers requiring that things be done right. That unfortunately seems to be the most effective way to actually improve things, is make sure it costs someone a lot of money to get it wrong.

IT is definitely part of the problem in a bunch of areas. You can have a group of people who are brilliant at setting up a network and implementing network security. It's a (relatively) slow moving field,

But some of these same people who are (rightly) willing to break outdated clients to enforce strict TLS standards somehow think that MFA, EDR, etc are just the newest buzzwords we have to implement simply to check boxes and not for any real gain. At least where I work (k-12 education) this seems to be incredibly common.

I honestly think a lot of it has to do with when these people received their training. Someone that became a Cisco networking wizard 15 years ago doesn't necessarily need to build up a whole new set of skills to build a secure performant network now, whereas Infosec as it exists today is completely different.

Trying to explain that "Malware installed on an end user domain machine is like 5 steps away from giving access to delete our MFA-protected offsite cloud backups" is like yelling into a void.

Trying to explain that "Letting users install browser extensions, OAUTH apps, or run out of date Chromebooks is just giving random access to random people" was, until somewhat recently, completely ignored.

And the insurance company aren't "requiring that things be done right" for us. It's good that they're requiring MFA and EDR, but they're really dropping the ball on this whole thing too. They're about 10 years behind. Anything less than a complete, regular, end-to-end audit of their clients is going to end up costing them. It's seriously insane how lax it is in our province. Nobody wants to be the first one to think about any of this because there's no pressure and no money.

Internet Explorer
Jun 1, 2005





It's really damning with faint praise when people say that insurance companies or client audits are what push companies forward. It's by no means great or even good, but often times it's the only ammunition you have.

I have been at places that will blatantly lie on insurance or client audit forms. They'll somehow bother to do a yearly pen test, but completely ignore it when the red team gets domain admin year after year after year.

Totally appropriate that the dumpster fire is Infosec's national bird.

Adbot
ADBOT LOVES YOU

Fart Amplifier
Apr 12, 2003

Internet Explorer posted:

It's really damning with faint praise when people say that insurance companies or client audits are what push companies forward.

"It's completely outrageous that we have to put MFA on our VPN because insurance told us to"
"We have to put MFA on our VPN for a lot of reasons. We're only doing it because insurance told us to"

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply