<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[InfraOps Digest]]></title><description><![CDATA[Security / DevOps / Infrastructure and IT news you can use]]></description><link>https://www.infraops.org</link><image><url>https://substackcdn.com/image/fetch/$s_!HqDE!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb1de7ff-7c3f-412b-bf5e-35efb340eddb_512x512.png</url><title>InfraOps Digest</title><link>https://www.infraops.org</link></image><generator>Substack</generator><lastBuildDate>Wed, 06 May 2026 11:44:29 GMT</lastBuildDate><atom:link href="https://www.infraops.org/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Daniel Tobin]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[infraops@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[infraops@substack.com]]></itunes:email><itunes:name><![CDATA[Daniel Tobin]]></itunes:name></itunes:owner><itunes:author><![CDATA[Daniel Tobin]]></itunes:author><googleplay:owner><![CDATA[infraops@substack.com]]></googleplay:owner><googleplay:email><![CDATA[infraops@substack.com]]></googleplay:email><googleplay:author><![CDATA[Daniel Tobin]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Happy Max Headroom Hijacking Day]]></title><description><![CDATA[Happy 36th anniversary to the day when a still unknown pirate took over 2 signals of Chicago television.]]></description><link>https://www.infraops.org/p/happy-max-headroom-hijacking-day</link><guid isPermaLink="false">https://www.infraops.org/p/happy-max-headroom-hijacking-day</guid><dc:creator><![CDATA[Daniel Tobin]]></dc:creator><pubDate>Wed, 22 Nov 2023 20:57:50 GMT</pubDate><enclosure url="https://substackcdn.com/image/youtube/w_728,c_limit/dKnwhokvgxE" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div id="youtube2-dKnwhokvgxE" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;dKnwhokvgxE&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/dKnwhokvgxE?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>Happy 36th anniversary to the day when a still unknown pirate took over 2 signals of Chicago television. On the night of November 22, 1987, the first incursion took over during the sports segment of the 9 o&#8217;clock news of WGN. The hijack lasted only about 20 seconds until they could wrest back control. The incursion only showed video and a loud buzz while a character that appeared to look like Max Headroom danced about.</p><p>Max was everywhere in the early 1980&#8217;s and was the definition of the future at the time. Max was seen on TV in the US on Cinemax and can count George RR Martin as one of the writers. Yes, <em>Game of Thrones</em> <a href="https://georgerrmartin.com/notablog/2017/03/30/max-headroom-returns/">George RR Martin who celebrated Max week</a> for the 30th anniversary in 2017.</p><p>Approximately 2 hours later, the character then took over the PBS affiliate WTTW during an episode of Dr. Who. This time there was sound but it was slightly intelligible. Below watch the clip with helpful subtitles.</p><div id="youtube2-jjeUuakHsLw" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;jjeUuakHsLw&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/jjeUuakHsLw?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>Read more about the episode on <a href="https://en.wikipedia.org/wiki/Max_Headroom_signal_hijacking">Wikipedia</a>.</p>]]></content:encoded></item><item><title><![CDATA[What Does the New Executive Order on Use of Artificial Intelligence (AI) Mean?]]></title><description><![CDATA[Not one to be left behind and to go even farther than Isaac Asimov, The Biden Administration continued their work to &#8220;advance and govern the development and use of AI in accordance with eight guiding principles and priorities.&#8221; Previously, the administration had met with a number of companies and &#8220;]]></description><link>https://www.infraops.org/p/what-does-the-new-executive-order</link><guid isPermaLink="false">https://www.infraops.org/p/what-does-the-new-executive-order</guid><dc:creator><![CDATA[Daniel Tobin]]></dc:creator><pubDate>Mon, 06 Nov 2023 05:08:37 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!HqDE!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb1de7ff-7c3f-412b-bf5e-35efb340eddb_512x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Not one to be left behind and to go even farther than <a href="https://en.wikipedia.org/wiki/Three_Laws_of_Robotics">Isaac Asimov</a>, The Biden Administration continued their work to &#8220;advance and govern the development and use of AI in accordance with eight guiding principles and priorities.&#8221; Previously, the administration had met with a number of companies and &#8220;<a href="https://www.whitehouse.gov/briefing-room/statements-releases/2023/07/21/fact-sheet-biden-harris-administration-secures-voluntary-commitments-from-leading-artificial-intelligence-companies-to-manage-the-risks-posed-by-ai/">Secured Voluntary Commitments from Leading Artificial Intelligence Companies to Manage the Risks Posed by AI.</a>&#8221; As many may be dubious of the administration attempts at cybersecurity, the administration is taking major steps with a renewed vigor after the previous administrations dismissive attacks on cybersecurity. Just over 100 days after taking office, the administration was able to release a key <a href="https://www.infraops.org/p/what-does-the-new-cybersecurity-executive">executive order in May, 2021 on cybersecurity outlining their plan</a>. As was the case in that plan, much of this is directed at the sprawling areas of government that are not already advanced enough in these areas. Given the potential concerns for misuses, more attention is paid in this EO to government misuse of the technology in national security and justice, but tends to steer clear of any major questions that might arise.</p><p>The three key areas of the previous voluntary commitments included Safety, Security and Trust. In the realm of security, the commitment was plain in the fact stating that &#8220;Companies have a duty to build systems that put security first. That means safeguarding their models against cyber and insider threats and sharing best practices and standards to prevent misuse, reduce risks to society, and protect national security.&#8221; Cybersecurity is not undertaken by those in basements, but is front and center at the forefront of innovation. One might say, defense is finally having a voice after so many years of offense and a constant stream of data breaches.</p><h2>How is the Order Laid Out?</h2><p>This executive order is broken down into 13 sections with the bulk of the information coming in section 2 Policy and Principles and then further expounding on those 8 policies from section 4 through section 11. The 8 key policies are as follows:</p><ol><li><p>Ensuring the Safety and Security of AI Technology</p></li><li><p>Promoting Innovation and Competition</p></li><li><p>Supporting Workers</p></li><li><p>Advancing Equity and Civil Rights</p></li><li><p>Protecting Consumers, Patients, Passengers, and Students</p></li><li><p>Protecting Privacy</p></li><li><p>Advancing Federal Government Use of AI</p></li><li><p>Strengthening American Leadership Abroad</p></li></ol><p>After laying out the individual overarching policy, each of these major sections sets out in total 84 proclamations ranging from 30 to primarily 540 days from the date of the order.</p><h2>What does it say about cybersecurity?</h2><p>Policy wise, the order lumps safety and security together in the first policy. Whereas the first voluntary standards were more explicit, the policy addresses &#8220; biotechnology, cybersecurity, critical infrastructure, and other national security dangers&#8221; in a single sentence. Furthermore, it speaks to testing, evaluation and monitoring as opposed to the much stronger language earlier whereby they proclaimed that &#8220;Companies have a duty to build systems that put security first&#8221;. Given the nature of this document though, the details are yet to be established.</p><p>The heart of the order comes in Sec. 4.1: <em>Developing Guidelines, Standards, and Best Practices for AI Safety and Security.</em> In this section, the EO puts the National Institute of Standards and Technology (NIST) in charge within 270 days of establishing guidelines, best practices, for a number of areas including red-teaming! Additionally, the Department of Energy is singled out to develop defensive measures to guard against &#8220;nuclear, nonproliferation, biological, chemical, critical infrastructure, and energy-security threats or hazards&#8221;. One of the key takeaways over and over again, in this section and others is the reliance on testing as a key safeguard. As we&#8217;ve touched on before, <a href="https://www.infraops.org/p/security-as-part-of-quality">Security is Part of Quality</a>. Testing AI is the only way to address &#8220;AI systems&#8217; most pressing security risks&#8230;while navigating AI&#8217;s opacity and complexity&#8221;.</p><p>In Sec. 4.2, and in keeping with previous executive orders, IaaS providers will be required to report to the Secretary of Commerce &#8220;when a foreign person transacts with that United States IaaS Provider to train a large AI model with potential capabilities that could be used in malicious cyber-enabled activity (a &#8220;training run&#8221;)&#8221;.  It also requires the determination of &#8220;set of technical conditions for a large AI model to have potential capabilities that could be used in malicious cyber-enabled activity&#8221; and otherwise establishes them in the meantime.</p><p>Section 4.3 specifically focuses on &#8220;Managing AI in Critical Infrastructure and in Cybersecurity&#8221; and starts to really deep dive into protections. The first focus is for the DHS and CISA to develop assessments related to how &#8220;deploying AI may make critical infrastructure systems more vulnerable to critical failures, physical attacks, and cyber attacks, and shall consider ways to mitigate these vulnerabilities&#8221;. It also directs the Secretary of the Treasury to develop an assessment specifically for financial institutions. Furthermore it directs the Secretary of Homeland Security to develop an &#8220;Artificial Intelligence Safety and Security Board as an advisory committee&#8221; consisting of government, academia and private sector members. </p><p> 4.3(b) is the most exciting yet as it directs both the Department of Defense and the DHS to &#8220;each develop plans for, conduct, and complete an operational pilot project to identify, develop, test, evaluate, and deploy AI capabilities, such as large-language models, to aid in the discovery and remediation of vulnerabilities in critical United States Government software, systems, and networks.&#8221; To say I&#8217;m excited that they put defense forward specifically, when for decades cyber has almost exclusively meant offense, would be an understatement. </p><p>4.4 ventures into the risks posed by Chemical, Biological, Radiological and Nuclear (CBRN) threats. They call out specifically the threat related to biological weapons. Luckily Politico deep dives into this threat in their attention grabbing headline &#8220;<a href="https://www.politico.com/newsletters/future-pulse/2023/11/03/heading-off-ai-driven-biological-war-00125187">The Mad Scientists of AI</a>&#8221;.</p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[SOC 2 Is Never Over]]></title><description><![CDATA[via Ripjaw56]]></description><link>https://www.infraops.org/p/soc-2-is-never-over</link><guid isPermaLink="false">https://www.infraops.org/p/soc-2-is-never-over</guid><dc:creator><![CDATA[Daniel Tobin]]></dc:creator><pubDate>Mon, 23 Oct 2023 21:03:15 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!R8UZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffef87bb0-d4f0-4fd0-ae39-509d1ffc386a_2000x1293.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!R8UZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffef87bb0-d4f0-4fd0-ae39-509d1ffc386a_2000x1293.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!R8UZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffef87bb0-d4f0-4fd0-ae39-509d1ffc386a_2000x1293.png 424w, https://substackcdn.com/image/fetch/$s_!R8UZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffef87bb0-d4f0-4fd0-ae39-509d1ffc386a_2000x1293.png 848w, https://substackcdn.com/image/fetch/$s_!R8UZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffef87bb0-d4f0-4fd0-ae39-509d1ffc386a_2000x1293.png 1272w, https://substackcdn.com/image/fetch/$s_!R8UZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffef87bb0-d4f0-4fd0-ae39-509d1ffc386a_2000x1293.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!R8UZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffef87bb0-d4f0-4fd0-ae39-509d1ffc386a_2000x1293.png" width="1456" height="941" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fef87bb0-d4f0-4fd0-ae39-509d1ffc386a_2000x1293.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:941,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1155804,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!R8UZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffef87bb0-d4f0-4fd0-ae39-509d1ffc386a_2000x1293.png 424w, https://substackcdn.com/image/fetch/$s_!R8UZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffef87bb0-d4f0-4fd0-ae39-509d1ffc386a_2000x1293.png 848w, https://substackcdn.com/image/fetch/$s_!R8UZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffef87bb0-d4f0-4fd0-ae39-509d1ffc386a_2000x1293.png 1272w, https://substackcdn.com/image/fetch/$s_!R8UZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffef87bb0-d4f0-4fd0-ae39-509d1ffc386a_2000x1293.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>via <em><a href="https://www.newgrounds.com/art/view/ripjaw56/daft-punk-commemoration-piece-our-work-is-never-over">Ripjaw56</a></em></p><div class="pullquote"><p>Work it harder, make it better</p><p>Do it faster, makes us stronger</p><p>More than ever, hour after hour</p><p>Work is never Over</p><p>-Daft Punk</p></div><p>Congratulations, you&#8217;ve got in hand your first SOC 2 report, so SOC 2 is done right? Let&#8217;s not underestimate the wisdom of Daft Punk when they say, &#8220;More than ever, hour after hour, Work is never over&#8221; as this is not the finish line for your company and SOC 2. It&#8217;s just the first lap of many in the SOC 2 marathon, as we focus on continuous security and compliance.</p><p>My name is Daniel Tobin, and I&#8217;ve been working at the intersection of DevOps, Security, and IT for the past 20 years and have been the first or only Security hire for each of my companies. Of those 20 years, I&#8217;ve been leading SOC 2 efforts for over 10 years and I can tell you, that I have over 10 different experiences of audits, even within the same audit firm and company. I can also tell you that I&#8217;ve probably had to explain nearly every year that SOC 2 is never over, we&#8217;re already in the next audit period.</p><p>A more cynical version of myself would refer to the myth of Sisyphus, pushing the rock of compliance up a hill only to start over every year when I think of all the checklists and matrices on our journey to that next waypoint. Yet, as Daft Punk correctly points out, it is not about pointless labor but continuous improvement. Instead the focus should be on making the company better and stronger year after year. Compliance does not need to be a test of meaningless work. Instead, compliance should be viewed in the light of continuous improvement and habit-building. It is wise to set out each new day by tackling the most difficult thing first; with that challenge out of the way, the rest of the day will be a breeze, right? Right?</p><p>Now that it&#8217;s morning again after your audit and we can start anew, let&#8217;s return to the beginning of Daft Punk&#8217;s wise words: &#8220;Work it harder, make it better, Do it faster, makes us stronger.&#8221; To make the entire process of addressing compliance better and faster, make it a priority to partner with an automated compliance solution for <em><strong>continuous security and compliance</strong></em>. The new class of automated compliance solutions like SecureFrame, Vanta, Drata, etc., have not only made audits easier for everyone, they have greatly simplified and standardized best practices. These solutions offer continuous assurance instead of haphazardly relying on point-in-time screenshots. This automation takes the guesswork out of compliance and provides continuous security monitoring. With automation in place, we can move faster and instead focus on critical features for the platform we&#8217;ll be rolling out and in-depth security-focused projects.</p><p>So with all this talk about good habits, racing, Greek myth, and Daft Punk, what is SOC 2? Why does anyone care about it? For that, we look to the AICPA, the standards organization responsible for developing SOC 2:&nbsp;</p><blockquote><p>SOC 2 reports are intended to meet the needs of a broad range of users that need detailed information and assurance about the controls at a service organization relevant to security, availability, and processing integrity of the systems the service organization uses to process users&#8217; data and the confidentiality and privacy of the information processed by these systems. (<a href="https://www.aicpa-cima.com/topic/audit-assurance/audit-and-assurance-greater-than-soc-2">1</a>)</p></blockquote><p>In essence, the AICPA created a framework to be applied across various parts of an organization and developed controls for companies to follow to attest that they have assurances for the security and overall integrity of their systems. SOC 2 has become the gold standard for companies in the US to ensure that the companies they are working with have a baseline of assurances when entrusting each other with valuable and sensitive data. In Europe, ISO 27001 is the gold standard for companies instead of SOC 2. At your company, you should weigh where your customers and their data is and the business needs of also obtaining ISO 27001. ISO 27001 is generally considered the more technical of the two, but it does have minimums of audit time based on company size.</p><p>Now that your company has gone through the SOC 2 process, does that mean anyone who signs up for your service, no matter the service, will also automatically receive SOC 2? I&#8217;m sorry, but that&#8217;s not how it works. Working with vendors who have SOC 2 can speed up your due diligence and remove the need for filling out custom security questionnaires, but you would still need to go through the process yourself to obtain your own SOC 2. Numerous SOC 2 controls are unrelated to technical components and are more about your company policies. For example, a key element is vendor management and organizational controls like hiring and employee and CEO performance.</p><p>As <em><a href="https://www.youtube.com/watch?v=PsO6ZnUZI0g">Graduation</a></em><a href="https://www.youtube.com/watch?v=PsO6ZnUZI0g"> Kanye</a> says &#8220;<em>Now that, that don't kill me, Can only make me stronger</em>&#8221;, SOC 2, when used as part of a larger security strategy and especially with todays automated security tools can make your company more secure. Even as your company is telling you &#8220;<em>I need you to hurry up now, 'Cause I can't wait much longer</em>&#8221;, remind yourself and them of the overall process. This audit might be done, but SOC 2 is never over.</p><p></p>]]></content:encoded></item><item><title><![CDATA[Security as Code Tools: Our Picks for a Secure 2021]]></title><description><![CDATA[2020 was a year that lasted, if not close to a decade, then long enough that we&#8217;ve lost track of how long it&#8217;s been.]]></description><link>https://www.infraops.org/p/security-as-code-tools-our-picks</link><guid isPermaLink="false">https://www.infraops.org/p/security-as-code-tools-our-picks</guid><dc:creator><![CDATA[Daniel Tobin]]></dc:creator><pubDate>Tue, 21 Dec 2021 09:15:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!5IrV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d26f72b-2ea9-4cad-a17f-2f698ad0c24d_660x315.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5IrV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d26f72b-2ea9-4cad-a17f-2f698ad0c24d_660x315.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5IrV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d26f72b-2ea9-4cad-a17f-2f698ad0c24d_660x315.png 424w, https://substackcdn.com/image/fetch/$s_!5IrV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d26f72b-2ea9-4cad-a17f-2f698ad0c24d_660x315.png 848w, https://substackcdn.com/image/fetch/$s_!5IrV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d26f72b-2ea9-4cad-a17f-2f698ad0c24d_660x315.png 1272w, https://substackcdn.com/image/fetch/$s_!5IrV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d26f72b-2ea9-4cad-a17f-2f698ad0c24d_660x315.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5IrV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d26f72b-2ea9-4cad-a17f-2f698ad0c24d_660x315.png" width="660" height="315" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0d26f72b-2ea9-4cad-a17f-2f698ad0c24d_660x315.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:315,&quot;width&quot;:660,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!5IrV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d26f72b-2ea9-4cad-a17f-2f698ad0c24d_660x315.png 424w, https://substackcdn.com/image/fetch/$s_!5IrV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d26f72b-2ea9-4cad-a17f-2f698ad0c24d_660x315.png 848w, https://substackcdn.com/image/fetch/$s_!5IrV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d26f72b-2ea9-4cad-a17f-2f698ad0c24d_660x315.png 1272w, https://substackcdn.com/image/fetch/$s_!5IrV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d26f72b-2ea9-4cad-a17f-2f698ad0c24d_660x315.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>2020 was a year that lasted, if not close to a decade, then long enough that we&#8217;ve lost track of how long it&#8217;s been. We don&#8217;t think anyone could have predicted what 2020 would look like in January but we&#8217;re almost done with it. Despite all of the negative things that have transpired, there has been innovation in the <a href="https://cyral.com/white-papers/what-is-security-as-code/">security as code</a> space. IT leadership and security vendors are increasingly taking their message directly to developers, empowering them directly to test, find and fix issues even before these issues can make it to dedicated security teams. We, for one, are overjoyed at this, as we also believe that integrating directly into CI / CD and developer workflows is how we start to make security truly effective.</p><p>What follows is our lucky 7 list of favorite Security as Code tools&#8212;tools that have seen strong adoption in the companies we work with&#8212;plus one bonus tool we&#8217;re really optimistic about. They&nbsp; range from major <a href="https://www.cncf.io/">CNCF</a> / open source projects to commercial offerings, and they cover everything from Policy as Code to innovative infrastructure testing to automated dynamic application testing and even a major foray into Zero Trust.&nbsp;</p><p>So, in no particular order, here is a proposed list of Security of Code tools that your team should consider using in 2021:</p><ul><li><p><a href="https://www.openpolicyagent.org/">Open Policy Agent</a> (OPA) by Styra</p><ul><li><p>This policy as code framework debuted in late 2016, joined the CNCF in early 2018, and showed Styra to be a leading innovator in this space. Today, this CNCF project is waiting on a final count to confirm that it will be moving to a CNCF Graduated project at any point now; the votes are still trickling in.&nbsp;</p></li><li><p><a href="https://www.cncf.io/blog/2020/07/23/conftest-joins-the-open-policy-agent-project/">The OPA project</a> also grew by adding the awesome project <a href="https://www.conftest.dev/">Conftest</a> to their portfolio of CNCF policy as code offerings. Conftest can integrate directly into your CI/CD pipeline, bringing robust testing to your configuration as code.</p></li><li><p><strong>Why we like it</strong>: It&#8217;s plug-and-play, with a standard policy engine that integrates with your existing tools or ones you are building yourself.&nbsp;</p></li></ul></li><li><p><a href="https://www.checkov.io/">Checkov</a> by Bridgecrew</p><ul><li><p>Checkov is a Python-based infrastructure as code scanning open source project <a href="https://bridgecrew.io/blog/announcing-checkov-prevent-cloud-misconfigurations-during-build-time/">announced by Bridgecrew</a> in the before times of January 2020. From the beginning, Checkov was designed to run pre-commit and as part of your CI / CD pipeline.&nbsp;</p></li><li><p>Checkov now supports 150+ out of the box scan configurations and can scan everything from <a href="https://cyral.com/blog/tsd-the-security-digest-38/">Helm</a> to Terraform to Cloudformation to even serverless and more.&nbsp;</p></li><li><p><strong>Why we like it</strong>: Out-of-the box templates for infrastructure scanning</p></li></ul></li><li><p><a href="https://www.hashicorp.com/sentinel">Hashicorp Sentinel</a></p><ul><li><p>Hashicorp&#8217;s Sentinel is the grand-daddy of tools listed here, having been first announced in 2017, about 6 months before OPA&#8217;s acceptance as a CNCF sandbox project. Sentinel provides policy as code so that anytime an organization deploys to the cloud, the deployment adheres to their security rules.</p></li><li><p>Hashicorp Sentinel still exists as only an add-on for Hashicorp&#8217;s enterprise offering, but it&#8217;s a must if you&#8217;re already on the enterprise edition.</p></li><li><p><strong>Why we like it</strong>: They&#8217;ve had this for over 3 years and yet are still one of the few true frameworks in the security-as-code space.</p></li></ul></li><li><p><a href="https://www.stackhawk.com/">Stackhawk</a></p><ul><li><p>Led by Joni Klippert, Stackhawk offers a test-driven method of security for DevOps teams&#8212;tackling the problem of using antiqued methods of security testing that often leave modern day applications vulnerable and exposed to risk too late in the production cycle.&nbsp;</p></li><li><p>Not to mention, this female-founded, Denver-based company closed a $10M Series A funding round in October.&nbsp;</p></li><li><p><strong>Why we like it</strong>: They&#8217;re now offering a free developer plan to get started.</p></li></ul></li><li><p><a href="https://semgrep.dev/">Semgrep</a> by r2c</p><ul><li><p>For many, running static analysis has become expensive, CPU intensive and cumbersome to say the least. r2c recognized this and decided to offer an alternative: a lightweight, offline tool that allows you to squash classes of bugs with powerful, precise rules putting developers in control.&nbsp;</p></li><li><p>r2c raised a Series A in late October and brought on <a href="mailto:clint@returntocorp.com">Clint Gibler</a>&nbsp; of <a href="https://tldrsec.com/">tl;dr sec</a> fame to raise awareness of their project. TL;DR, check out Semgrep today if you haven&#8217;t already.</p></li><li><p><strong>Why we like it</strong>: A lightweight static analysis tool that allows us to utilize the power of grep&nbsp;</p></li></ul></li><li><p><a href="https://snyk.io/">Snyk</a></p><ul><li><p>Following a ton of major product innovations and two massive fundraising rounds in 2020 into Series D, we don&#8217;t think Snyk is sneaking up on anyone anymore.&nbsp;</p></li><li><p>With its ability to scan code, containers, and deployment frameworks for vulnerabilities, Snyk has established itself across the entire pipeline from open source to license management to infrastructure code scanning to containers and more. Their tools now empower 1.5 million developers to build and deploy code and infrastructure securely.</p></li><li><p><strong>Why we like it</strong>: With its infrastructure-as-code scanning feature this year, Snyk can now can be utilized across the pipeline</p></li></ul></li><li><p><a href="https://github.com/dependabot">GitHub&#8217;s Dependabot</a></p><ul><li><p>Dependabot began as a standalone project and joined GitHub at the beginning of 2019 and immediately helped thousands automatically keep their dependencies up to date.&nbsp;</p></li><li><p>In June, GitHub announced the latest <a href="https://github.blog/2020-06-01-keep-all-your-packages-up-to-date-with-dependabot/">Dependabot</a> features, enabling not just security updates, but complete package updates for both security and regular updates. Dependabot comes free with your usage of GitHub, so if you&#8217;re already there, turn it on and automate your dependency management in 2021, if you haven&#8217;t already.</p></li><li><p><strong>Why we like it</strong>: It&#8217;s GitHub &#8211; c&#8217;mon!</p></li></ul></li><li><p><a href="https://www.hashicorp.com/blog/hashicorp-boundary">Hashicorp Boundary</a></p><ul><li><p>Our bonus tool for 2021, Boundary was only announced in October this year. If ever there was a year to announce a VPN-free remote access solution, this year was the year to do it.&nbsp;</p></li><li><p>2020 brought us the double whammy of everyone working remote and multiple high profile VPN products being pwned. Remote, mobile workforces require exciting, innovative solutions and we expect nothing less than that from Hashicorp.</p></li><li><p><strong>Why we&#8217;re optimistic</strong>: This is a great step forward for zero trust architecture!</p></li></ul></li></ul><p>We hope that you have a great 2021, full of many terrific releases, fewer bugs, and no security incidents!</p>]]></content:encoded></item><item><title><![CDATA[The Security Digest: #85]]></title><description><![CDATA[Update Chrome ASAP, compilers are vulnerable to unicode attacks, NRA has Grief, 2FA bots and location data harvesting despite opt outs.]]></description><link>https://www.infraops.org/p/the-security-digest-85</link><guid isPermaLink="false">https://www.infraops.org/p/the-security-digest-85</guid><dc:creator><![CDATA[Daniel Tobin]]></dc:creator><pubDate>Wed, 03 Nov 2021 21:08:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!w5cj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15d7dd57-8933-4c13-bf94-906e70fd5b5c_400x500.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Update Chrome ASAP, compilers are vulnerable to unicode attacks, NRA has Grief, 2FA bots and location data harvesting despite opt outs. In owl news, researchers have found place cells in barn owls and finally a new tool to threat model in HCL.</p><ul><li><p>Are you using Chrome with an angry red update button in the corner? Do so ASAP as this contains patches from the zero days demonstrated at Tianfu Cup mentioned in <a href="https://cyral.com/blog/tsd-the-security-digest-83/">TSD-83</a>. Read more at <a href="https://www.securityweek.com/chrome-95-update-patches-exploited-zero-days-flaws-disclosed-tianfu-cup">Security Week</a>.</p></li><li><p>A novel theoretical attack on compliers using unicode, <strong><a href="https://www.trojansource.codes/">Trojan Source</a></strong>, has been published by researchers at the University of Cambridge. The researchers searched public open source projects and have found no compromises yet, but with their publication and lack of universal patches, we may see exploits soon. Read more at <a href="https://krebsonsecurity.com/2021/11/trojan-source-bug-threatens-the-security-of-all-code/">KrebsOnSecurity</a></p></li><li><p>The NRA is the latest victim of Grief ransomware. Grief, thought to be mostly just a rebrand of Evil Corp, posted about the NRA on their leak site and eventually The NRA responded. Read more at <a href="https://www.zdnet.com/article/nra-responds-to-reports-of-grief-ransomware-attack/">ZDNet</a></p></li><li><p><a href="https://www.vice.com/en/article/y3vz5k/booming-underground-market-bots-2fa-otp-paypal-amazon-bank-apple-venmo">Motherboard</a> delves into the booming business of 2FA bots, now that 2FA is becoming integrated into many apps and websites. Always keep an eye out for these scams.</p></li><li><p>And finally <a href="https://www.vice.com/en/article/5dgmqz/huq-location-data-opt-out-no-consent">Motherboard</a> has published research about a company that sells location data that still received data even after users opted out of the collection.</p></li></ul><h2><strong>Owl fun and facts:</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!w5cj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15d7dd57-8933-4c13-bf94-906e70fd5b5c_400x500.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!w5cj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15d7dd57-8933-4c13-bf94-906e70fd5b5c_400x500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!w5cj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15d7dd57-8933-4c13-bf94-906e70fd5b5c_400x500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!w5cj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15d7dd57-8933-4c13-bf94-906e70fd5b5c_400x500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!w5cj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15d7dd57-8933-4c13-bf94-906e70fd5b5c_400x500.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!w5cj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15d7dd57-8933-4c13-bf94-906e70fd5b5c_400x500.jpeg" width="400" height="500" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/15d7dd57-8933-4c13-bf94-906e70fd5b5c_400x500.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:500,&quot;width&quot;:400,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!w5cj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15d7dd57-8933-4c13-bf94-906e70fd5b5c_400x500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!w5cj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15d7dd57-8933-4c13-bf94-906e70fd5b5c_400x500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!w5cj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15d7dd57-8933-4c13-bf94-906e70fd5b5c_400x500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!w5cj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15d7dd57-8933-4c13-bf94-906e70fd5b5c_400x500.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><a href="https://commons.wikimedia.org/wiki/File:Tyto_alba_-British_Wildlife_Centre,_Surrey,_England-8a_(1).jpg">Peter Trimming from Croydon, England</a>, <a href="https://creativecommons.org/licenses/by/2.0">CC BY 2.0</a>, via Wikimedia Commons</figcaption></figure></div><p>New research from a team in Israel has concluded that barn owls have &#8220;place cells&#8221; like humans allowing them to make mental maps and possibly aid in flying.</p><blockquote><p><strong>Place cells are known to exist not only in humans, but also other mammals like rodents and bats. They have also been detected in&nbsp;tufted titmice as they walk.</strong></p><p><strong>However, this is the first time that evidence for place cells &#8212; which fire at a high rate when an animal visits a particular location &#8212; has ever been seen in birds in flight.</strong></p></blockquote><p>Read more at <a href="https://www.dailymail.co.uk/sciencetech/article-10153551/Nature-Barn-owls-make-mental-maps-surroundings-flying-researchers-say.html">The Daily Mail</a> or <a href="https://www.newscientist.com/article/2295555-barn-owls-make-mental-maps-of-their-surroundings-while-they-are-flying/">The New Scientist</a></p><h2><strong>A Shout Out:</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FPbE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d961166-5bc3-43f7-9977-2b34f9099cae_292x118.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FPbE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d961166-5bc3-43f7-9977-2b34f9099cae_292x118.jpeg 424w, https://substackcdn.com/image/fetch/$s_!FPbE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d961166-5bc3-43f7-9977-2b34f9099cae_292x118.jpeg 848w, https://substackcdn.com/image/fetch/$s_!FPbE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d961166-5bc3-43f7-9977-2b34f9099cae_292x118.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!FPbE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d961166-5bc3-43f7-9977-2b34f9099cae_292x118.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FPbE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d961166-5bc3-43f7-9977-2b34f9099cae_292x118.jpeg" width="292" height="118" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0d961166-5bc3-43f7-9977-2b34f9099cae_292x118.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:118,&quot;width&quot;:292,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!FPbE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d961166-5bc3-43f7-9977-2b34f9099cae_292x118.jpeg 424w, https://substackcdn.com/image/fetch/$s_!FPbE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d961166-5bc3-43f7-9977-2b34f9099cae_292x118.jpeg 848w, https://substackcdn.com/image/fetch/$s_!FPbE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d961166-5bc3-43f7-9977-2b34f9099cae_292x118.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!FPbE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d961166-5bc3-43f7-9977-2b34f9099cae_292x118.jpeg 1456w" sizes="100vw"></picture><div></div></div></a></figure></div><p><a href="https://twitter.com/xntrik/status/1451808382961160195">Christian Frichot</a> has released hcltm, an open source project that uses HashiCorp&#8217;s HCL. Love to see this as an extension of security and policy as code using a common language that your DevOps and AppSec teams are probably already using. Add in HCL parsing from Semgrep as suggested by <a href="https://twitter.com/daniel_bilar/status/1453077268658540548">Daniel Bilar</a> and we have a complete ecosystem for creating and parsing threat models. As for the future, &#8220;TF asset consumption is on the roadmap.&#8221; h/t to <a href="https://tldrsec.com/blog/tldr-sec-107/">TLDRsec</a></p>]]></content:encoded></item><item><title><![CDATA[The Security Digest: #84]]></title><description><![CDATA[ISPs are harvesting data, REvil taken down, ransomware hits Halloween candy maker, ransomware operator hired legit security researchers, devices with a GPS library bug could revert to 2002, Russian SolarWinds attackers are still at it, hacking tools limited and Truth Social had a free pentest before it was even announced.]]></description><link>https://www.infraops.org/p/tsd-the-security-digest-84</link><guid isPermaLink="false">https://www.infraops.org/p/tsd-the-security-digest-84</guid><dc:creator><![CDATA[Daniel Tobin]]></dc:creator><pubDate>Tue, 26 Oct 2021 21:30:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!8D3i!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3931fd26-cf49-4817-9944-b701fbecee3a_700x484.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>ISPs are harvesting data, REvil taken down, ransomware hits Halloween candy maker, ransomware operator hired legit security researchers, devices with a GPS library bug could revert to 2002, Russian SolarWinds attackers are still at it, hacking tools limited and Truth Social had a free pentest before it was even announced. In owl news, an owl not confirmed seen for 150 years was recently photographed and finally OSQuery 5.0 is out with a ton of new features from Trail of Bits and more.</p><ul><li><p>An FTC report on advertising by ISPs shows that many are harvesting vast amounts of data. The report is simply that and no rules are proposed at this time to limit this data harvesting. Read more at <a href="https://www.vice.com/en/article/93b9nv/internet-service-providers-collect-sell-horrifying-amount-of-sensitive-data-government-study-concludes">Motherboard</a></p></li><li><p>A multi country effort took down the infrastructure for the REvil ransomware gang according to officials and the admin. Read more at <a href="https://www.reuters.com/technology/exclusive-governments-turn-tables-ransomware-gang-revil-by-pushing-it-offline-2021-10-21/">Reuters</a></p></li><li><p>First they came for our gas and then they came for our meat processing plants and now ransomware operators have come for a manufacturer of candy corn? Regardless of what you think of candy corn, I hope we can all agree this has gone too far. Thankfully they&#8217;re back at near capacity. Read more at <a href="https://gizmodo.com/the-candy-corn-has-been-hacked-1847901307">Gizmodo</a></p></li><li><p>Ransomware group FIN7 setup a fake security company to hire security researchers to ultimately use them in ransomware attacks according to research from Gemini Advisory and Microsoft. Read more at <a href="https://therecord.media/cybercrime-gang-sets-up-fake-company-to-hire-security-experts-to-aid-in-ransomware-attacks/">The Record</a></p></li><li><p>CISA is warning about a bug in a GPS library could switch some dates back to 2002 if not updated. Read more at <a href="https://therecord.media/cisa-warns-of-gps-bug-that-may-rollback-dates-by-1024-weeks-to-march-2002/">The Record</a></p></li><li><p>Microsoft is warning that the Russian based attackers that targeted SolarWinds have infiltrated at least 14 IT supply chain firms since May. Read more at <a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-russian-svr-hacked-at-least-14-it-supply-chain-firms-since-may/">BleepingComputer</a></p></li><li><p>The Department of Commerce announced new controls that would target the export of hacking tools without license to certain countries. There is some concern about legitimate prevention of research but overall, many have found there is quite a bit of nuance to it to strike the right balance. Read more at <a href="https://www.washingtonpost.com/national-security/commerce-department-announces-new-rule-aimed-at-stemming-sale-of-hacking-tools-to-repressive-governments/2021/10/20/ecb56428-311b-11ec-93e2-dba2c2c11851_story.html">The Washington Post</a></p></li><li><p>The truth about Truth Social is that it&#8217;s just using a fork of Mastodon and has little in the way of preventing random people creating donaldtrump and mikepence user names before it is even officially launched. The maintainer of Mastodon is examining whether hiding their use of Mastodon violates the license. Read more at <a href="https://www.vice.com/en/article/5dgm5k/truth-social-is-mastodon-trump">Motherboard</a>.</p></li></ul><h2><strong>Owl fun and facts:</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8D3i!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3931fd26-cf49-4817-9944-b701fbecee3a_700x484.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8D3i!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3931fd26-cf49-4817-9944-b701fbecee3a_700x484.jpeg 424w, https://substackcdn.com/image/fetch/$s_!8D3i!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3931fd26-cf49-4817-9944-b701fbecee3a_700x484.jpeg 848w, https://substackcdn.com/image/fetch/$s_!8D3i!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3931fd26-cf49-4817-9944-b701fbecee3a_700x484.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!8D3i!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3931fd26-cf49-4817-9944-b701fbecee3a_700x484.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8D3i!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3931fd26-cf49-4817-9944-b701fbecee3a_700x484.jpeg" width="700" height="484" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3931fd26-cf49-4817-9944-b701fbecee3a_700x484.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:484,&quot;width&quot;:700,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!8D3i!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3931fd26-cf49-4817-9944-b701fbecee3a_700x484.jpeg 424w, https://substackcdn.com/image/fetch/$s_!8D3i!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3931fd26-cf49-4817-9944-b701fbecee3a_700x484.jpeg 848w, https://substackcdn.com/image/fetch/$s_!8D3i!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3931fd26-cf49-4817-9944-b701fbecee3a_700x484.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!8D3i!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3931fd26-cf49-4817-9944-b701fbecee3a_700x484.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Shelley&#8217;s Eagle Owl has been seen and photographed for the first time in 150 years! &#8220;There have been occasional reports over recent decades from people believing they have heard or briefly seen Shelley&#8217;s Eagle Owl from a few different localities across West and Central Africa from Liberia to Angola&#8230;The pair only saw the bird perched for 10-15 seconds but in that time managed to take photographs that confirm the identification due to its distinctive black eyes, yellow bill, and huge size, which in combination rule out all other African forest owls.&#8221; Read more at <a href="https://www.imperial.ac.uk/news/231335/owl-unseen-150-years-photographed-wild/">The Imperial College of London</a>.</p><h2><strong>A Shout Out:</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Uj7r!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F950a2d6c-3763-44a7-8a0e-336413ed5edf_337x337.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Uj7r!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F950a2d6c-3763-44a7-8a0e-336413ed5edf_337x337.png 424w, https://substackcdn.com/image/fetch/$s_!Uj7r!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F950a2d6c-3763-44a7-8a0e-336413ed5edf_337x337.png 848w, https://substackcdn.com/image/fetch/$s_!Uj7r!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F950a2d6c-3763-44a7-8a0e-336413ed5edf_337x337.png 1272w, https://substackcdn.com/image/fetch/$s_!Uj7r!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F950a2d6c-3763-44a7-8a0e-336413ed5edf_337x337.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Uj7r!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F950a2d6c-3763-44a7-8a0e-336413ed5edf_337x337.png" width="337" height="337" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/950a2d6c-3763-44a7-8a0e-336413ed5edf_337x337.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:337,&quot;width&quot;:337,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Uj7r!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F950a2d6c-3763-44a7-8a0e-336413ed5edf_337x337.png 424w, https://substackcdn.com/image/fetch/$s_!Uj7r!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F950a2d6c-3763-44a7-8a0e-336413ed5edf_337x337.png 848w, https://substackcdn.com/image/fetch/$s_!Uj7r!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F950a2d6c-3763-44a7-8a0e-336413ed5edf_337x337.png 1272w, https://substackcdn.com/image/fetch/$s_!Uj7r!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F950a2d6c-3763-44a7-8a0e-336413ed5edf_337x337.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Endpoint visibility tool <a href="https://osquery.io/">osquery</a> has recently released 5.0 with major improvements including &#8220;an EndpointSecurity-based process events table for macOS&#8221;. Security firm Trail of Bits has been instrumental in contributing to osquery and has a full rundown of everything in the new version which you can read on the <a href="https://www.trailofbits.com/post/announcing-osquery-5-now-with-endpointsecurity-on-macos">Trail of Bits blog</a>.</p>]]></content:encoded></item><item><title><![CDATA[The Security Digest: #83]]></title><description><![CDATA[Details on the Coinbase thieves emerge, The Governor of Missouri wants to prosecute HTML hackers, zero days fall at Tianfu Cup, ransomware payments dwarf other years and took down a group of TV stations, luminary security researchers publish on Apple&#8217;s scanning, Acer was hit twice, Buffalo schools are paying $10 million to cleanup ransomware and finally keep an eye out for fake benefits sites.]]></description><link>https://www.infraops.org/p/the-security-digest-83</link><guid isPermaLink="false">https://www.infraops.org/p/the-security-digest-83</guid><dc:creator><![CDATA[Daniel Tobin]]></dc:creator><pubDate>Tue, 19 Oct 2021 19:50:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!wYj_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09e075f5-6d3d-483c-bbb4-d2a4bba3550d_400x534.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Details on the Coinbase thieves emerge, The Governor of Missouri wants to prosecute HTML hackers, zero days fall at Tianfu Cup, ransomware payments dwarf other years and took down a group of TV stations, luminary security researchers publish on Apple&#8217;s scanning, Acer was hit twice, Buffalo schools are paying $10 million to cleanup ransomware and finally keep an eye out for fake benefits sites. In Owl news we look to Napa Valley and researchers use of owls for rodent control and finally an RBAC tool to contain the complexity of K8s.</p><ul><li><p><a href="https://krebsonsecurity.com/2021/10/how-coinbase-phishers-steal-one-time-passwords/">KrebsOnSecurity</a> looks into the methods thieves used to steal one time passwords and gain access to Coinbase accounts</p></li><li><p>Reporters in Missouri discovered a website with Social Security Numbers in the HTML source code and now the Governor is threatening to prosecute the &#8220;hackers&#8221;. I really hope this settles down, but he seems to just be <a href="https://twitter.com/hacks4pancakes/status/1448791133979615233">ratcheting things up</a>. Read more at <a href="https://krebsonsecurity.com/2021/10/missouri-governor-vows-to-prosecute-st-louis-post-dispatch-for-reporting-security-vulnerability/">KrebsOnSecurity</a></p></li><li><p>At Tianfu Cup, China&#8217;s Pwn2Own equivalent, researchers demonstrated zero days for Windows 10, Ubuntu, iOS 15, Chrome and more. Read more at <a href="https://therecord.media/windows-10-ios-15-ubuntu-chrome-fall-at-chinas-tianfu-hacking-contest/">The Record</a></p></li><li><p>Ransomware payments from the first half of the year exceeded all of 2020&#8217;s payments according to the Treasury Department financial crimes unit. <a href="https://www.coindesk.com/policy/2021/10/15/ransomware-payments-in-2021-already-dwarfs-last-years-total-fincen-reports/">Coindesk</a> has the full story</p></li><li><p>Ransomware knocked off Sinclair Broadcasting Sunday morning interrupting the broadcast of NFL games, morning news shows and more. Read more at <a href="https://therecord.media/sinclair-tv-stations-disrupted-across-the-us-in-apparent-ransomware-attack/">The Record</a></p></li><li><p>A group of security research luminaries gathered together to write a 46 page document skewering Apple&#8217;s CSAM scanning technology. <a href="https://www.lightbluetouchpaper.org/2021/10/15/bugs-in-our-pockets/">Ross Anderson</a> provides a good overview and you can download the full paper, <a href="https://arxiv.org/abs/2110.07450">Bugs in our Pockets: The Risks of Client-Side Scanning</a> from Arxiv. The full list of authors is Hal Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague and Carmela Troncoso.</p></li><li><p>Acer has had a bad week getting hit twice by the same threat actor. Read more at <a href="https://www.bleepingcomputer.com/news/security/acer-hacked-twice-in-a-week-by-the-same-threat-actor/">BleepingComputer</a>.</p></li><li><p><a href="https://buffalonews.com/news/local/education/buffalo-public-schools-didnt-pay-ransom-in-cyberattack-but-response-cost-nearly-10m/article_f0265112-2de2-11ec-bfa9-cf4404e9f9b5.html">The Buffalo News</a> is reporting that the total cost to respond to and beef up security after a ransomware attack at Buffalo Public Schools will total $10 million.</p></li><li><p>Finally, the FBI has warned about fake sites posing as sites offering unemployment benefits. Keep an eye out and be ever vigilant. Read more at <a href="https://www.bleepingcomputer.com/news/security/fbi-warns-of-fake-govt-sites-used-to-steal-financial-personal-data/">Bleeping Computer</a></p></li></ul><h2><strong>Owl fun and facts:</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wYj_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09e075f5-6d3d-483c-bbb4-d2a4bba3550d_400x534.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wYj_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09e075f5-6d3d-483c-bbb4-d2a4bba3550d_400x534.jpeg 424w, https://substackcdn.com/image/fetch/$s_!wYj_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09e075f5-6d3d-483c-bbb4-d2a4bba3550d_400x534.jpeg 848w, https://substackcdn.com/image/fetch/$s_!wYj_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09e075f5-6d3d-483c-bbb4-d2a4bba3550d_400x534.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!wYj_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09e075f5-6d3d-483c-bbb4-d2a4bba3550d_400x534.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wYj_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09e075f5-6d3d-483c-bbb4-d2a4bba3550d_400x534.jpeg" width="400" height="534" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/09e075f5-6d3d-483c-bbb4-d2a4bba3550d_400x534.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:534,&quot;width&quot;:400,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!wYj_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09e075f5-6d3d-483c-bbb4-d2a4bba3550d_400x534.jpeg 424w, https://substackcdn.com/image/fetch/$s_!wYj_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09e075f5-6d3d-483c-bbb4-d2a4bba3550d_400x534.jpeg 848w, https://substackcdn.com/image/fetch/$s_!wYj_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09e075f5-6d3d-483c-bbb4-d2a4bba3550d_400x534.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!wYj_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09e075f5-6d3d-483c-bbb4-d2a4bba3550d_400x534.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>Humboldt State graduate student Jaime Carlino bands a barn owl nestling. (Photo by Laura Ech&#225;vez)</em></figcaption></figure></div><p><a href="https://baynature.org/article/raptors-rather-than-rodenticide/">Bay Nature Magazine</a> has just published a story about Humboldt State researchers on the use of owls as natural predators for Napa Valley vintners. As of January, a key rodentcide had been banned in California for the affects it had on upper predatory animals like owls. The research will both monitor their effectiveness at taming the rodent population and keep an eye on the owls as well.</p><h2><strong>A Shout Out:</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zGVf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11dcb637-8fa8-4907-9d59-2cf2e82c7e80_602x114.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zGVf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11dcb637-8fa8-4907-9d59-2cf2e82c7e80_602x114.jpeg 424w, https://substackcdn.com/image/fetch/$s_!zGVf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11dcb637-8fa8-4907-9d59-2cf2e82c7e80_602x114.jpeg 848w, https://substackcdn.com/image/fetch/$s_!zGVf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11dcb637-8fa8-4907-9d59-2cf2e82c7e80_602x114.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!zGVf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11dcb637-8fa8-4907-9d59-2cf2e82c7e80_602x114.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zGVf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11dcb637-8fa8-4907-9d59-2cf2e82c7e80_602x114.jpeg" width="602" height="114" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/11dcb637-8fa8-4907-9d59-2cf2e82c7e80_602x114.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:114,&quot;width&quot;:602,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!zGVf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11dcb637-8fa8-4907-9d59-2cf2e82c7e80_602x114.jpeg 424w, https://substackcdn.com/image/fetch/$s_!zGVf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11dcb637-8fa8-4907-9d59-2cf2e82c7e80_602x114.jpeg 848w, https://substackcdn.com/image/fetch/$s_!zGVf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11dcb637-8fa8-4907-9d59-2cf2e82c7e80_602x114.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!zGVf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11dcb637-8fa8-4907-9d59-2cf2e82c7e80_602x114.jpeg 1456w" sizes="100vw"></picture><div></div></div></a></figure></div><p><a href="https://github.com/alcideio/rbac-tool">RBAC Tool</a> from Rapid 7 &#8220;simplifies querying and creation of RBAC policies.&#8221; This is an open source suite of tools ranging from visualization to analysis and highlighting risky permissions to generating roles and more.</p>]]></content:encoded></item><item><title><![CDATA[The Security Digest: #82]]></title><description><![CDATA[All of Twitch was leaked due to a misconfiguration, Solar Winds hackers accessed sanctions against Russians and more, Google is turning on 2FA for 150 million users, patch ASAP for Patch Tuesday, Microsoft released a Windows 11 security configuration tool and BrewDog inadvertently exposed data via their API.]]></description><link>https://www.infraops.org/p/the-security-digest-82</link><guid isPermaLink="false">https://www.infraops.org/p/the-security-digest-82</guid><dc:creator><![CDATA[Daniel Tobin]]></dc:creator><pubDate>Tue, 12 Oct 2021 19:55:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ucmg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56b0414e-2160-4dc3-a046-7aaa054e0e1d_750x807.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>All of Twitch was leaked due to a misconfiguration, Solar Winds hackers accessed sanctions against Russians and more, Google is turning on 2FA for 150 million users, patch ASAP for Patch Tuesday, Microsoft released a Windows 11 security configuration tool and BrewDog inadvertently exposed data via their API. In owl news, Flammulated Owls are tiny but plentiful in Colorado and finally Last Week In AWS has released a charity shirt honoring the green checks of the AWS Status Page for 826 National.</p><ul><li><p>The entirety of Twitch was leaked including source code and payouts from 2019 to their streamers. If you have a Twitch account, make sure you enable two-factor authentication ASAP. The leak was first reported by <a href="https://www.videogameschronicle.com/news/the-entirety-of-twitch-has-reportedly-been-leaked/">Video Games Chronicle</a>. Twitch later said a misconfigured server was responsible for the massive breach according to <a href="https://www.zdnet.com/article/twitch-attributes-breach-to-server-configuration-error-resets-all-stream-keys/">ZDNet</a></p></li><li><p>More details are out on what information the Solar Winds hackers had access to including &#8220;information about counter-intelligence investigations, policy on sanctioning Russian individuals and the country&#8217;s response to COVID-19&#8221; via <a href="https://www.reuters.com/world/us/hackers-solarwinds-breach-stole-data-us-sanctions-policy-intelligence-probes-2021-10-07/">Reuters</a></p></li><li><p>In a new secure by default step, Google is going to turn on two-factor on 150 million accounts by the end of the year via <a href="https://www.theverge.com/2021/10/5/22710421/google-security-2fa-inactive-account-management">The Verge</a></p></li><li><p>It&#8217;s Patch Tuesday with Microsoft patching over 70 flaws in this update. Update ASAP. Read on for the full list at <a href="https://krebsonsecurity.com/">KrebsOnSecurity</a></p></li><li><p>Microsoft has also released a tool for properly securing Windows 11 machines. Read more at <a href="https://www.bleepingcomputer.com/news/security/microsoft-adds-tamper-protection-to-windows-11-security-baseline/">BleepingComputer</a></p></li><li><p>BrewDog, the Scottish brewery known for their crowd funding model and high ABV beers, inadvertently exposed data via API for their Equity Punks for 18 months via <a href="https://www.bleepingcomputer.com/news/security/brewdog-exposed-data-for-over-200-000-shareholders-and-customers/">BleepingComputer</a></p></li></ul><h2><strong>Owl fun and facts:</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ucmg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56b0414e-2160-4dc3-a046-7aaa054e0e1d_750x807.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ucmg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56b0414e-2160-4dc3-a046-7aaa054e0e1d_750x807.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ucmg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56b0414e-2160-4dc3-a046-7aaa054e0e1d_750x807.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ucmg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56b0414e-2160-4dc3-a046-7aaa054e0e1d_750x807.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ucmg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56b0414e-2160-4dc3-a046-7aaa054e0e1d_750x807.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ucmg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56b0414e-2160-4dc3-a046-7aaa054e0e1d_750x807.jpeg" width="750" height="807" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/56b0414e-2160-4dc3-a046-7aaa054e0e1d_750x807.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:807,&quot;width&quot;:750,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!ucmg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56b0414e-2160-4dc3-a046-7aaa054e0e1d_750x807.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ucmg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56b0414e-2160-4dc3-a046-7aaa054e0e1d_750x807.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ucmg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56b0414e-2160-4dc3-a046-7aaa054e0e1d_750x807.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ucmg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56b0414e-2160-4dc3-a046-7aaa054e0e1d_750x807.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">USDA Forest Service</figcaption></figure></div><p>Flammulated owls are tiny and often heard more than seen, but if you&#8217;re in the Colorado Springs area, check out Manitou Experimental Forest to potentially get a view of this tiny owl. Read more about this wonderful little owl at <a href="https://gazette.com/pikespeakcourier/although-rarely-observed-teller-county-a-hotspot-for-flammulated-owl-words-on-birds/article_be025f06-254e-11ec-ab16-8775e8c6b9df.html">Pikes Peak Courier</a></p><h2><strong>A Shout Out:</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Bh08!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53f24a6-b6d6-427e-8a85-ac85758b3499_436x433.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Bh08!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53f24a6-b6d6-427e-8a85-ac85758b3499_436x433.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Bh08!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53f24a6-b6d6-427e-8a85-ac85758b3499_436x433.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Bh08!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53f24a6-b6d6-427e-8a85-ac85758b3499_436x433.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Bh08!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53f24a6-b6d6-427e-8a85-ac85758b3499_436x433.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Bh08!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53f24a6-b6d6-427e-8a85-ac85758b3499_436x433.jpeg" width="436" height="433" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e53f24a6-b6d6-427e-8a85-ac85758b3499_436x433.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:433,&quot;width&quot;:436,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Bh08!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53f24a6-b6d6-427e-8a85-ac85758b3499_436x433.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Bh08!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53f24a6-b6d6-427e-8a85-ac85758b3499_436x433.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Bh08!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53f24a6-b6d6-427e-8a85-ac85758b3499_436x433.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Bh08!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53f24a6-b6d6-427e-8a85-ac85758b3499_436x433.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><a href="https://store.lastweekinaws.com/collections/2021-charity-shirt">Last Week in AWS has released their 2021 Charity T-Shirt</a> benefitting <a href="https://826national.org/">826 National</a>.</p>]]></content:encoded></item><item><title><![CDATA[The Security Digest: #81]]></title><description><![CDATA[A backend system for text messages was breached for 5 years, It&#8217;s Cybersecurity Awareness Month: Do your part.]]></description><link>https://www.infraops.org/p/the-security-digest-81</link><guid isPermaLink="false">https://www.infraops.org/p/the-security-digest-81</guid><dc:creator><![CDATA[Daniel Tobin]]></dc:creator><pubDate>Tue, 05 Oct 2021 20:05:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!nXcY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F142a7fb2-3cce-4024-8477-dc3b39ae45e6_600x458.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>A backend system for text messages was breached for 5 years, It&#8217;s Cybersecurity Awareness Month: Do your part. #BeCyberSmart, the Pandora Papers is a massive data leak of tax haven files, Coinbase MFA was bypassed, Intercept looks at hacked data around COVID-19, patch Apache and Android ASAP, President Biden announced a multi country ransomware coalition and Facebook was not hacked. Owls are a spooky symbol of halloween based on folklore and finally Phrack is back!</p><ul><li><p>A company that handles billions of text messages reported to the SEC that it was hacked and the attackers had access for years. The hack began in May 2016 but they did not notice until May 2021. Read more of the report at <a href="https://www.vice.com/en/article/z3xpm8/company-that-routes-billions-of-text-messages-quietly-says-it-was-hacked">Motherboard</a>.</p></li><li><p>It&#8217;s Cybersecurity Awareness Month, now in its 18th year! The evergreen theme is &#8220;Do your part. #BeCyberSmart&#8221; and is the theme for this week. CISA has released a number of tip sheets including <a href="https://www.cisa.gov/sites/default/files/publications/Cybersecurity%20Awareness%20Month%202021%20-%20Cyber%20Secure%20at%20Work%20Tip%20Sheet.pdf">Cyber Secure at Work</a>, <a href="https://www.cisa.gov/sites/default/files/publications/Cybersecurity%20Awareness%20Month%202021%20-%20Travel%20Tip%20Sheet.pdf">Safe Travel</a>, <a href="https://www.cisa.gov/sites/default/files/publications/Cybersecurity%20Awareness%20Month%202021%20-%20MFA%20Tip%20Sheet.pdf">Multi-Factor Authentication (MFA)</a>, <a href="https://www.cisa.gov/sites/default/files/publications/Cybersecurity%20Awareness%20Month%202021%20-%20Online%20Privacy%20Tip%20Sheet.pdf">Online Privacy</a>, <a href="https://www.cisa.gov/sites/default/files/publications/Cybersecurity%20Awareness%20Month%202021%20-%20Protecting%20Your%20Digital%20Home%20Tip%20Sheet_0.pdf">Protecting Your Digital Home</a>, <a href="https://www.cisa.gov/sites/default/files/publications/Cybersecurity%20Awareness%20Month%202021%20-%20Creating%20Passwords%20Tip%20Sheet.pdf">Creating Passwords</a> and <a href="https://www.cisa.gov/sites/default/files/publications/Cybersecurity%20Awareness%20Month%202021%20-%20Social%20Media%20Tip%20Sheet.pdf">Social Media Cybersecurity</a>. You can also check out the proclamation from the President on <a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2021/09/30/a-proclamation-on-cybersecurity-awareness-month-2021/">Whitehouse.gov</a></p></li><li><p>In what is billed as &#8220;the largest investigation in journalism history&#8221;, The <a href="https://www.icij.org/investigations/pandora-papers/">Pandora Papers</a> is the most expansive leak of tax haven files.</p></li><li><p>Hackers were able to bypass MFA in Coinbase and steal funds from 6000 users. Read more at <a href="https://therecord.media/hackers-bypass-coinbase-2fa-to-steal-customer-funds/">The Record</a></p></li><li><p>A hacker leaked data to <a href="https://theintercept.com/2021/09/28/covid-telehealth-hydroxychloroquine-ivermectin-hacked/">The Intercept</a> revealing various partisan issues related to COVID-19.</p></li><li><p>If you&#8217;re running Apache, check your version as there is a zero day vulnerability that could expose sensitive information. Read more at <a href="https://www.bleepingcomputer.com/news/security/apache-fixes-actively-exploited-zero-day-vulnerability-patch-now/">BleepingComputer</a></p></li><li><p>Android rolled out their October update with 41 fixes including 3 critical. Update ASAP! Read more at <a href="https://www.bleepingcomputer.com/news/security/android-october-patch-fixes-three-critical-bugs-41-flaws-in-total/">BleepingComputer</a></p></li><li><p>President Biden announced a 30 country coalition to fight against ransomware late last week. Read more at <a href="https://www.bleepingcomputer.com/news/security/us-unites-30-countries-to-disrupt-global-ransomware-attacks/">BleepingComputer</a></p></li><li><p>And finally, Facebook, Instagram and WhatsApp all went down to an internal faulty configuration change and were not hacked as some initial rumors said. <a href="https://krebsonsecurity.com/2021/10/what-happened-to-facebook-instagram-whatsapp/">KrebsOnSecurity</a> has a good overview of the information known about the change to BGP. In the meantime, a Twitter user caught the scene outside of <a href="https://twitter.com/jckarter/status/1445089949024325634">Facebook HQ</a>.</p></li></ul><h2><strong>Owl fun and facts:</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!nXcY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F142a7fb2-3cce-4024-8477-dc3b39ae45e6_600x458.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!nXcY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F142a7fb2-3cce-4024-8477-dc3b39ae45e6_600x458.jpeg 424w, https://substackcdn.com/image/fetch/$s_!nXcY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F142a7fb2-3cce-4024-8477-dc3b39ae45e6_600x458.jpeg 848w, https://substackcdn.com/image/fetch/$s_!nXcY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F142a7fb2-3cce-4024-8477-dc3b39ae45e6_600x458.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!nXcY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F142a7fb2-3cce-4024-8477-dc3b39ae45e6_600x458.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!nXcY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F142a7fb2-3cce-4024-8477-dc3b39ae45e6_600x458.jpeg" width="600" height="458" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/142a7fb2-3cce-4024-8477-dc3b39ae45e6_600x458.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:458,&quot;width&quot;:600,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!nXcY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F142a7fb2-3cce-4024-8477-dc3b39ae45e6_600x458.jpeg 424w, https://substackcdn.com/image/fetch/$s_!nXcY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F142a7fb2-3cce-4024-8477-dc3b39ae45e6_600x458.jpeg 848w, https://substackcdn.com/image/fetch/$s_!nXcY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F142a7fb2-3cce-4024-8477-dc3b39ae45e6_600x458.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!nXcY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F142a7fb2-3cce-4024-8477-dc3b39ae45e6_600x458.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><a href="https://www.yahoo.com/lifestyle/why-owls-spooky-symbol-halloween-141000966.html">Yahoo</a> has a fun article about why owls are a symbol of Halloween according to folklorists.</p><h2><strong>A Shout Out:</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PZNZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7a28760-024d-4603-8d8f-15879c6dca36_640x480.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PZNZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7a28760-024d-4603-8d8f-15879c6dca36_640x480.jpeg 424w, https://substackcdn.com/image/fetch/$s_!PZNZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7a28760-024d-4603-8d8f-15879c6dca36_640x480.jpeg 848w, https://substackcdn.com/image/fetch/$s_!PZNZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7a28760-024d-4603-8d8f-15879c6dca36_640x480.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!PZNZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7a28760-024d-4603-8d8f-15879c6dca36_640x480.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PZNZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7a28760-024d-4603-8d8f-15879c6dca36_640x480.jpeg" width="640" height="480" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a7a28760-024d-4603-8d8f-15879c6dca36_640x480.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:480,&quot;width&quot;:640,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!PZNZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7a28760-024d-4603-8d8f-15879c6dca36_640x480.jpeg 424w, https://substackcdn.com/image/fetch/$s_!PZNZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7a28760-024d-4603-8d8f-15879c6dca36_640x480.jpeg 848w, https://substackcdn.com/image/fetch/$s_!PZNZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7a28760-024d-4603-8d8f-15879c6dca36_640x480.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!PZNZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7a28760-024d-4603-8d8f-15879c6dca36_640x480.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><a href="http://phrack.org/">Phrack</a> is back! The legendary zine has published their first issue in 5 years. Phrack was first published in 1985. Check out <a href="http://phrack.org/issues/70/1.html">Phrack Issue 70</a>.</p>]]></content:encoded></item><item><title><![CDATA[What Does the New Cybersecurity Executive Order Mean for Cloud Security?]]></title><description><![CDATA[The Biden administration issued a big, eye-catching cybersecurity executive order late last Wednesday outlining a plan to &#8220;to make bold changes and significant investments in order to defend the vital institutions that underpin the American way of life.&#8221; The order covers a wide range of topics, all intended to move the US government into the 21st century with modern security and operational practices aimed at accelerating migration to cloud infrastructure, adoption of]]></description><link>https://www.infraops.org/p/what-does-the-new-cybersecurity-executive</link><guid isPermaLink="false">https://www.infraops.org/p/what-does-the-new-cybersecurity-executive</guid><dc:creator><![CDATA[Daniel Tobin]]></dc:creator><pubDate>Mon, 17 May 2021 21:42:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!HqDE!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb1de7ff-7c3f-412b-bf5e-35efb340eddb_512x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Biden administration issued a big, eye-catching <a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/">cybersecurity executive order</a> late last Wednesday outlining a plan to &#8220;to make bold changes and significant investments in order to defend the vital institutions that underpin the American way of life.&#8221; The order covers a wide range of topics, all intended to move the US government into the 21st century with modern security and operational practices aimed at accelerating migration to cloud infrastructure, adoption of <a href="https://cyral.com/blog/getting-started-with-zero-trust-for-the-data-cloud/">zero trust</a> and implementation of multi-factor authentication (MFA) technology.</p><p>We are excited to see this as a major first step at setting forth standards for not only government agencies but those that will be under close scrutiny such as the utility industry. Specifically we&#8217;ll talk more about the items in the order that relate to accelerating migration to Cloud Security as well as highlight some of the other notable items called out in the order.&nbsp;</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.infraops.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading InfraOps Digest! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>As we have seen recently with the <a href="https://www.businessinsider.com/solarwinds-hack-explained-government-agencies-cyber-security-2020-12">Solar Winds hack</a> and the <a href="https://www.wired.com/story/colonial-pipeline-ransomware-payment/">Colonial Pipeline ransomware</a> event, these broad standards are needed across the board for much of the federal government and for vital, vulnerable sectors of industry and infrastructure.&nbsp;</p><h2><strong>How is the Order Laid Out?</strong></h2><p>The executive order is broken down into 9 sections, each covering a key area of improvements in cybersecurity operations. The first section sets the tone: the policy of the administration is &#8220;that the prevention, detection, assessment, and remediation of cyber incidents is a top priority and essential to national and economic security.&#8221;</p><p>The 9 sections cover the following:</p><ol><li><p>Overall policy of the government</p></li><li><p>Sharing threat information&nbsp;</p></li><li><p>Zero Trust Architecture and cloud usage</p></li><li><p>Declares <a href="https://twitter.com/allanfriedman/status/1392630592517382146">2021 Year of the #SBOM</a></p></li><li><p>Establishes a Cyber Safety Review Board</p></li><li><p>Seeks to standardize incident response (IR) practices across all agencies</p></li><li><p>Specifies a centralized SOC, Endpoint Detection &amp; Response, and threat hunting</p></li><li><p>Improving logging for investigations and remediation</p></li><li><p>Ensures that systems operating in the sphere of national security meet or exceed the standards outlined</p></li></ol><p>The order will apply to over <a href="https://cyber.dhs.gov/agencies/">100 agencies</a> that are under the purview of the Cybersecurity and Infrastructure Security Agency (CISA) and includes a number of deadlines ranging from 14 days to 360 days from the issuance of the order. All in all, the executive order speaks generally in broad strokes but ones that have been needed for quite some time.</p><p>The sections cover major initiatives and for some the broadness of them may upset those pushing for faster turnaround times in response to the string of high profile breaches like some of those mentioned earlier. For many of these directives though, the measures called for would be difficult to implement, even for much smaller organizations, given the timelines put forth.</p><p>Let&#8217;s dive into some of the highlights:</p><h2><strong>Migration to the Cloud:<br>What Does it Say About Zero Trust Architecture and Cloud Data Security?</strong></h2><p>As it relates to Cloud Security, Section 3 is by far the most important and exciting to us:</p><p>The Federal Government must adopt security best practices; advance toward Zero Trust Architecture; accelerate movement to secure cloud services, including Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS); centralize and streamline access to cybersecurity data to drive analytics for identifying and managing cybersecurity risks; and invest in both technology and personnel to match these modernization goals.</p><p>The heavy lifting for this section has already been performed by NIST and their publication of Special Publication (SP) 800-207, <em><a href="https://csrc.nist.gov/publications/detail/sp/800-207/final">Zero Trust Architecture</a></em>. But as the paper points out, progress has been modest: despite the roots of Zero Trust being pushed as a concept since before 2004, and despite leaders spending over a decade urging agencies to move to the architecture, few agencies have implemented it.&nbsp;</p><p>At Cyral, we support these building blocks and built our company to help solve one of the biggest problems here which is specifically on cloud data security and governance. Our focus from the beginning has been on enabling Zero Trust Architecture to secure and protect the data cloud. We wholeheartedly believe that Zero Trust Architecture for SaaS, IaaS, and PaaS, coupled with <a href="https://cyral.com/white-papers/what-is-security-as-code">Security as Code</a> (SaC), is the way forward.</p><p>The key directives of this section then go on to mandate that each of the agencies must provide reports on how they are meeting key objectives including:&nbsp;</p><ul><li><p>Migration to cloud services</p></li><li><p>Uniform cloud standards and architecture</p></li><li><p>How those plans relate to the implementation of Zero Trust Architecture</p></li><li><p>Data classification&nbsp;&nbsp;</p></li><li><p>Requiring agencies to adopt MFA and encryption for data at rest and in transit within 180 days</p></li></ul><p>We are incredibly excited to see all of these laid out as objectives and key results and look forward to seeing progress on these important goals. And personally, as someone that has lead, managed and implemented such projects before, each of these by themselves can be a massive undertaking depending on resources available and their starting point. A number of these directives can be complementary and the language at times does focus more on assessment of the situation than implementation yet, I still expect that this will be a hectic time for those on the ground.&nbsp;&nbsp;</p><h2><strong>Other Important Sections from the Executive Order</strong></h2><p>Beyond the key focus on cloud security and zero trust, there are several other sections that are of great interest that we&#8217;d like to highlight including:&nbsp;</p><h3><strong>2021: Year of the SBOM</strong></h3><p>Software Bill of Materials (SBOM) has been bubbling around for awhile, and this is the year that it finally seems to be going mainstream thanks to the work of people like Allan Friedman at the National Telecommunications and Information Administration (NTIA). Allan spoke at <a href="https://www.youtube.com/watch?v=9j1KYLfklMQ">BSidesSF in 2020</a> about SBOM as part of the push for all companies to at least start thinking about this problem.&nbsp;</p><p>SBOM in this order&nbsp; specifically relates to the focus on software supply chain security. Supply chain attacks seemed only theoretical and something that was going to happen in the future and we are now all living in the future with <a href="https://cyral.com/blog/tsd-the-security-digest-40/">SolarWinds</a>, <a href="https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610">Dependency Confusion</a> and <a href="https://cyral.com/blog/tsd-the-security-digest-58/">Codecov</a> all coming out in the past 6 months! Further portions attempt to develop a certification for secure software, and even lays out multiple explicit safeguards that companies should follow. These steps range from <a href="https://owasp.org/www-community/controls/Static_Code_Analysis">SAST</a> / <a href="https://portswigger.net/burp/application-security-testing/dast">DAST</a> to code signing to administratively separate build environments to vulnerability disclosure, encryption and more.&nbsp;</p><h3><strong>Consumer labeling for IoT Devices</strong></h3><p>Another exciting portion of this section is a consumer labeling program &#8220;to educate the public on the security capabilities of Internet-of-Things (IoT) devices and software development practices.&#8221; Think of the labeling similar to &#8220;energy star&#8221; labeling where it indicates whether software has followed specific security guidelines. With work from home here to stay and the proliferation of IoT devices with questionable security, this will hopefully encourage manufacturers to take security of their devices more seriously.</p><h3><strong>Establish a Cybersecurity Safety Review Board</strong></h3><p>For any event deemed necessary to create one, a review board with private companies as well representatives from the DoD, DoJ, CISA, NSA and FBI will be convened. The first such board will be related to the SolarWinds event and will be responsible for recommendations within 90 days of creation. The board will be required to develop an initial review within 30 days and their expectations going forward. The board is extended automatically every 2 years unless the President deems otherwise as it is an extension of the <a href="https://www.dhs.gov/xlibrary/assets/hr_5005_enr.pdf">Homeland Security Act of 2002</a> which established the idea of advisory committees. As with much of this order, this codifies a great deal of disparate existing policy and procedures and explicitly provides authority and urgency to act on it. Do you think they&#8217;ll run a blameless post mortem? Perhaps if it&#8217;s an international incident they can run a Five Eyes Five Whys.</p><h3><strong>Standardize an Incident Response (IR) Playbook</strong></h3><p>This is another section creating uniformity among the many various standards, policies and procedures already in place, this one specifically relying on NIST standards. NIST published the <a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-184.pdf">Guide for Cybersecurity Event Recovery</a> in late 2016 with likely varied uptake across federal agencies. CISA will have final say on all IR procedures ensuring that for every event that the procedures were followed correctly.</p><h3><strong>Endpoint Detection &amp; Response (EDR) and Centralized SOC</strong></h3><p>EDR and threat hunting makes their way into the spotlight with a requirement of all agencies and even National Security agencies to implement a unified EDR solution. This will also require the heads of agencies and National Security to cooperate as well. For the civilian agencies, the data should be available to CISA, while the national security agencies will be required to produce a report on whether or not it should be centralized.</p><p>This directive will allow for a centralized visibility eliminating potential siloes across agencies. By having a centralized view, CISA will be able to spot trends and threats and detect operations like the Solar Winds breach sooner. This centralized monitoring will allow for a single pane of glass for CISA to gain unified visibility into all activity and bubble up issues sooner than later.</p><p>One of the major players in the EDR space, <a href="https://www.tanium.com/">Tanium</a> already advertises that they have five branches of the US military on their platform which should help with at least a portion of this order. This section continues the unification theme that has been continuous throughout the order as the government tries to execute security at scale against advanced persistent threats (APTs).</p><h3><strong>Log Everything with Assurance</strong></h3><p>The last major portion focuses on best practices around logging and assurance of those logs. With advanced threats already having gone deep into government networks, having assurance that the logs be immutable is paramount to ensure that the hunting will actually find threats. Logs without a guarantee of immutability, cannot be trusted when the threat actor has the capabilities to modify them. Additionally, having proper logging speeds-up forensics and reduces mean time to resolution. Standards around retention and quality of logs will need to be established and applied across all agencies for both on premise and cloud workloads as well as IT providers. Logs are core to Cyral&#8217;s implementation of <a href="https://cyral.com/data-activity-monitoring/">data activity monitoring</a> so we can only applaud that there will be standards implemented for any of those that are not there yet.</p><h2><strong>Conclusion</strong></h2><p>President Biden&#8217;s <em><a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/">Executive Order on Improving the Nation&#8217;s Cybersecurity</a></em> is a big, bold move aimed at standardizing and socializing the best practices that have been developed individually at multiple different agencies and levels. Zero Trust Architecture, cloud migrations, SBOM and EDR have all been advocated among those pushing the needle on security. This executive order though, puts the full weight of the federal government behind these initiatives that will hopefully move all of us forward. We have seen the devastating consequences and near daily leak of personal, private, R&amp;D and interruption of our daily lives on systems that have remained insecure for too long. This executive order, when fully implemented, will hopefully stem the tide of attacks and crimeware that has overwhelmed our IT and OT infrastructure.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.infraops.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading InfraOps Digest! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[7 Ways Policy as Code Can Improve Automation and Security]]></title><description><![CDATA[What is Policy as Code?]]></description><link>https://www.infraops.org/p/7-ways-policy-as-code-can-improve-security</link><guid isPermaLink="false">https://www.infraops.org/p/7-ways-policy-as-code-can-improve-security</guid><dc:creator><![CDATA[Daniel Tobin]]></dc:creator><pubDate>Tue, 20 Apr 2021 17:10:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zDu1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f5769c1-343c-4cbb-b5b5-85fc5847e2e2_512x308.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2><strong>What is Policy as Code?</strong></h2><p>From startups to large organizations, handbook-based policy management rarely scales well and is often applied in a non-uniform way. Policy as Code addresses this by codifying policies, providing visibility, and enforcing them automatically. By adopting Policy as Code, an organization forces itself to translate its policy decisions into code that enforces decisions in the same way, every time.</p><p>Under Policy as Code, policies are standardized into records readable by both the people who manage them and the systems that enforce them. Policies written in formats like YAML and JSON allow this, because they&#8217;re consistent enough for an authorization system to enforce and simple enough for security personnel to read.</p><p>With machine-readable policies, authorization can be offloaded to security software, reducing the toil necessary to constantly monitor and maintain one-off requests, freeing development teams to focus on core features.&nbsp;</p><p>With policies stored consistently and globally, realtime auditing of access grants is possible for the first time. Security teams can monitor and review authorization decisions and policy changes, allowing the entire company to move faster without breaking core security and compliance requirements.</p><h2><strong>Benefits of Policy as Code</strong></h2><p>Policy as Code reduces toil for IT and security teams by helping to automate workflows that are typically done manually.</p><ol><li><p><strong>Simplify Onboarding/Offboarding</strong><br>You simplify onboarding of new employees, removal of access for departed employees, and rollout of new tools and technology.</p></li><li><p><strong>Gain Full Tracking/History</strong><br>You no longer need to traverse different systems to track down the full policy documentation that may have been stored in your standard tracking system and in other communication systems. Full tracking and history is now visible instantly in the organization&#8217;s version control system, where the responsible teams can view every policy and permission change.</p></li><li><p><strong>Improve Approval Process</strong><br>You reduce the toil of approving and denying requests. By codifying your decisions, those who grant access no longer need to perform the legwork to determine if someone should get access or not. Permissions can be auto-provisioned at exactly the level each user or group needs, and no more.</p></li><li><p><strong>Eliminate Guesswork for Role-Based Access</strong><br>Policy as Code takes the guesswork out of granting permissions and applies your policies uniformly across every request, from any application, tool, or user. Once Policy as Code is integrated with your organization&#8217;s directory service and groups, it becomes possible for the security and IT team to implement true role-based access.</p></li><li><p><strong>Reduce Uncertainty</strong><br>Policy as Code gives managers and employees a clear view of access privileges throughout the organization, and reduces uncertainty. Permissions can be reviewed by the right people, anywhere in the organization. When a change is needed, the request can be submitted and reviewed in a standard, well-tracked way.&nbsp;</p></li><li><p><strong>Allow for Self-Service Options</strong><br>Optionally, employees can self-serve some permissions requests thanks to automatic policies that evaluate the user&#8217;s role, their group affiliations, and the sensitivity of the resource being requested. Whether changes are streamlined or self-serve, employees appreciate autonomy and transparency because it cuts the confusion about how or when their request will be reviewed.&nbsp;</p></li><li><p><strong>Gain Real-time Audit Logs for Compliance</strong><br>Finally, by clearly tracking all permissions changes, an organization has a real time audit log that reduces the work needed to prepare for compliance and certification reviews. With a clearly defined system of record for security policies, approvals are tracked automatically, and there&#8217;s no longer a need to search multiple systems to get a full picture of access rights.</p></li></ol><p>As you can see, the benefits of Policy as Code can have a big impact on reducing manual work, and improving processes in a variety of ways. Let&#8217;s dig in more into how this is put into practice and we&#8217;ll take a look at a few examples of how to create policies and provision or deprovision access.&nbsp;</p><h2><strong>Examples of Policy as Code</strong></h2><h3><strong>Access Provisioning</strong></h3><p>Usually, when a new developer, say Frank Hardy (username <em>fhardy</em>), joins the organization, a JIRA ticket like the one below will show up in the inbox of an IT/DevOps admin:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zDu1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f5769c1-343c-4cbb-b5b5-85fc5847e2e2_512x308.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zDu1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f5769c1-343c-4cbb-b5b5-85fc5847e2e2_512x308.png 424w, https://substackcdn.com/image/fetch/$s_!zDu1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f5769c1-343c-4cbb-b5b5-85fc5847e2e2_512x308.png 848w, https://substackcdn.com/image/fetch/$s_!zDu1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f5769c1-343c-4cbb-b5b5-85fc5847e2e2_512x308.png 1272w, https://substackcdn.com/image/fetch/$s_!zDu1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f5769c1-343c-4cbb-b5b5-85fc5847e2e2_512x308.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zDu1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f5769c1-343c-4cbb-b5b5-85fc5847e2e2_512x308.png" width="512" height="308" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9f5769c1-343c-4cbb-b5b5-85fc5847e2e2_512x308.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:308,&quot;width&quot;:512,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!zDu1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f5769c1-343c-4cbb-b5b5-85fc5847e2e2_512x308.png 424w, https://substackcdn.com/image/fetch/$s_!zDu1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f5769c1-343c-4cbb-b5b5-85fc5847e2e2_512x308.png 848w, https://substackcdn.com/image/fetch/$s_!zDu1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f5769c1-343c-4cbb-b5b5-85fc5847e2e2_512x308.png 1272w, https://substackcdn.com/image/fetch/$s_!zDu1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f5769c1-343c-4cbb-b5b5-85fc5847e2e2_512x308.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Even at this beginning stage, many things can go wrong, starting with the ticket itself being filed against the wrong person or team, or as is often the case, not having enough information, leading to a tedious back-and-forth between requester and administrator.</p><p>On the other hand, using an Access Management as Code framework, the developer&#8217;s manager just submits a pull request in a version control system such as GitHub with details as shown in this example:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cNEw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41d22d78-b951-4e9c-bdfc-aa7dcdfb3585_1600x519.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cNEw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41d22d78-b951-4e9c-bdfc-aa7dcdfb3585_1600x519.png 424w, https://substackcdn.com/image/fetch/$s_!cNEw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41d22d78-b951-4e9c-bdfc-aa7dcdfb3585_1600x519.png 848w, https://substackcdn.com/image/fetch/$s_!cNEw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41d22d78-b951-4e9c-bdfc-aa7dcdfb3585_1600x519.png 1272w, https://substackcdn.com/image/fetch/$s_!cNEw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41d22d78-b951-4e9c-bdfc-aa7dcdfb3585_1600x519.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cNEw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41d22d78-b951-4e9c-bdfc-aa7dcdfb3585_1600x519.png" width="1456" height="472" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/41d22d78-b951-4e9c-bdfc-aa7dcdfb3585_1600x519.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:472,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!cNEw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41d22d78-b951-4e9c-bdfc-aa7dcdfb3585_1600x519.png 424w, https://substackcdn.com/image/fetch/$s_!cNEw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41d22d78-b951-4e9c-bdfc-aa7dcdfb3585_1600x519.png 848w, https://substackcdn.com/image/fetch/$s_!cNEw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41d22d78-b951-4e9c-bdfc-aa7dcdfb3585_1600x519.png 1272w, https://substackcdn.com/image/fetch/$s_!cNEw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41d22d78-b951-4e9c-bdfc-aa7dcdfb3585_1600x519.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Requests now can follow the standard checks defined in your version control system, including limits on who can change what (&#8220;protected branches&#8221;) and required approvals. This ensures that each request&#8212;like our onboarding request&#8212;always goes to the admin in charge.</p><p>Along with GitHub access, let&#8217;s say <em>fhardy&#8217;s</em> job function requires access to the staging MySQL database as well. The following Terraform code accomplishes this by creating a user called <em>fhardy</em> and assigning it to a <em>developer</em> role.</p><pre><code><code>resource "mysql_user" "fhardy" {
 user               = "fhardy"
 host               = "staging-mysql.platform.acme.com"
 auth_plugin        = "AWSAuthenticationPlugin"
}
resource "mysql_role" "developer" {
 name = "developer"
}
resource "mysql_grant" "developer" {
 user     = "${mysql_user.fhardy.user}"
 host     = "${mysql_user.fhardy.host}"
 database = "app"
 roles    = ["${mysql_role.developer.name}"]
}</code></code></pre><h3><strong>Creating Policies</strong></h3><p>Continuing with our example, the next step in the Access Management as Code journey is to make sure privileges for the user <em>fhardy</em> are set up correctly. This can be automated in a number of ways, depending on your environment. In the example below, we&#8217;ll show how it would be done using Styra&#8217;s <a href="https://www.openpolicyagent.org/">Open Policy Agent</a> (OPA), a policy framework that integrates well with popular cloud stacks. OPA helps to decouple policy from the service itself. OPA policies are written in <a href="https://www.openpolicyagent.org/docs/latest/#rego">Rego</a>, a language that allows for declarative, fine-grained control.</p><p>For example, you could use OPA with a built in-house internal CMS tool to govern developer access to an organization&#8217;s customer data repository. The following OPA code shows how to only allow the members of the <em>CMSAdmin</em> group to see customer contracts.</p><pre><code><code>package httpapi.authz

import input

# Allow CMS admin members access to customer contracts.
default allow = false
allow {
  input.method == "GET"
  some contractId
  input.path = ["contracts", contractId]
  input.user == cmsAdmins[_]
}

# Only the following belong to the CMS admins group
cmsAdmins = ["ndrew", "mwang", "fhardy"]</code></code></pre><p>Once the above validation is implemented using OPA, only members of the <em>CMSAdmin</em> group can see customer contracts in the CMS tool.</p><h3><strong>Example: Access Deprovisioning</strong></h3><p>Using Terraform, deprovisioning is as simple as deleting the relevant lines of code from the terraform script and generating a pull request. Once the pull request is peer reviewed and merged, running <em>terraform apply</em> would automatically revoke access.</p><p>Below is an example of revoking <em>fhard</em>y&#8217;s access to the organization&#8217;s GitHub account.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!APwF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb2496be-8ae0-4aaa-873a-19180140d3fa_1600x564.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!APwF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb2496be-8ae0-4aaa-873a-19180140d3fa_1600x564.png 424w, https://substackcdn.com/image/fetch/$s_!APwF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb2496be-8ae0-4aaa-873a-19180140d3fa_1600x564.png 848w, https://substackcdn.com/image/fetch/$s_!APwF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb2496be-8ae0-4aaa-873a-19180140d3fa_1600x564.png 1272w, https://substackcdn.com/image/fetch/$s_!APwF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb2496be-8ae0-4aaa-873a-19180140d3fa_1600x564.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!APwF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb2496be-8ae0-4aaa-873a-19180140d3fa_1600x564.png" width="1456" height="513" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb2496be-8ae0-4aaa-873a-19180140d3fa_1600x564.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:513,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!APwF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb2496be-8ae0-4aaa-873a-19180140d3fa_1600x564.png 424w, https://substackcdn.com/image/fetch/$s_!APwF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb2496be-8ae0-4aaa-873a-19180140d3fa_1600x564.png 848w, https://substackcdn.com/image/fetch/$s_!APwF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb2496be-8ae0-4aaa-873a-19180140d3fa_1600x564.png 1272w, https://substackcdn.com/image/fetch/$s_!APwF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb2496be-8ae0-4aaa-873a-19180140d3fa_1600x564.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>Summary</strong></h2><p>Using manual processes and reviews for policy enforcement can take a toil and leave your organization at risk. Policy as code can unify and automate your policies while providing you with greater visibility for auditing and compliance. This approach extends on infrastructure as code, which brought similar benefits.</p>]]></content:encoded></item><item><title><![CDATA[What Is Security As Code?]]></title><description><![CDATA[Below is a white paper I wrote while Security Lead for Cyral.]]></description><link>https://www.infraops.org/p/what-is-security-as-code</link><guid isPermaLink="false">https://www.infraops.org/p/what-is-security-as-code</guid><dc:creator><![CDATA[Daniel Tobin]]></dc:creator><pubDate>Sat, 17 Apr 2021 22:19:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!8nkV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff226196c-8d02-4af6-b67c-d89174dedfb3_716x456.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8nkV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff226196c-8d02-4af6-b67c-d89174dedfb3_716x456.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8nkV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff226196c-8d02-4af6-b67c-d89174dedfb3_716x456.png 424w, https://substackcdn.com/image/fetch/$s_!8nkV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff226196c-8d02-4af6-b67c-d89174dedfb3_716x456.png 848w, https://substackcdn.com/image/fetch/$s_!8nkV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff226196c-8d02-4af6-b67c-d89174dedfb3_716x456.png 1272w, https://substackcdn.com/image/fetch/$s_!8nkV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff226196c-8d02-4af6-b67c-d89174dedfb3_716x456.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8nkV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff226196c-8d02-4af6-b67c-d89174dedfb3_716x456.png" width="716" height="456" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f226196c-8d02-4af6-b67c-d89174dedfb3_716x456.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:456,&quot;width&quot;:716,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:32692,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8nkV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff226196c-8d02-4af6-b67c-d89174dedfb3_716x456.png 424w, https://substackcdn.com/image/fetch/$s_!8nkV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff226196c-8d02-4af6-b67c-d89174dedfb3_716x456.png 848w, https://substackcdn.com/image/fetch/$s_!8nkV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff226196c-8d02-4af6-b67c-d89174dedfb3_716x456.png 1272w, https://substackcdn.com/image/fetch/$s_!8nkV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff226196c-8d02-4af6-b67c-d89174dedfb3_716x456.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Below is a white paper I wrote while Security Lead for <a href="https://cyral.com/">Cyral</a>.</p><h2><strong>Overview</strong></h2><p>Security as Code is the methodology of codifying security and policy decisions and socializing them with other&nbsp;teams. Security testing and scans are implemented into your CI/CD pipeline to automatically and continuously detect vulnerabilities and security bugs. Access policy decisions are codified into source code allowing everyone across the organization to see exactly who has access to what resources. Adopting Security as Code tightly couples application development with security management, while simultaneously allowing your developers to focus on core features and functionality, and simplifying configuration and authorization management for security teams. This improves collaboration between Development and Security teams and helps nurture a culture of security across the organization.</p><h2><strong>Implementing Security as Code</strong></h2><p>Security as Code generally comes in three different forms: security testing, vulnerability scanning and access policies. Each of these enable your Engineering teams to understand and fix security issues early on in development as opposed to waiting until the project is ready to ship and is blocked due to security concerns. When you take on a Security as Code mentality, you are codifying collaboration directly where your development teams are working. Security as code lifts up Development and Security teams together to allow each to focus on their core strengths.</p><p><strong>Security testing </strong>expands on best in class coding practices to add to the standard suite of tests to not only include functional and integration testing but also security focused testing. Static analysis for security vulnerabilities can be implemented on each commit or pull request. Permission boundaries can be checked to verify they cannot be crossed. APIs can be tested to ensure they&#8217;re meeting <a href="https://cyral.com/glossary/authentication-authn-versus-authorization-authz/">authentication and authorization requirements</a>. Security testing meets your developers where they already are, providing them immediate feedback on each and every commit.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!belY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f83ec85-34c4-4ac2-bc3f-cf63f90f3f59_486x107.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!belY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f83ec85-34c4-4ac2-bc3f-cf63f90f3f59_486x107.svg 424w, https://substackcdn.com/image/fetch/$s_!belY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f83ec85-34c4-4ac2-bc3f-cf63f90f3f59_486x107.svg 848w, https://substackcdn.com/image/fetch/$s_!belY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f83ec85-34c4-4ac2-bc3f-cf63f90f3f59_486x107.svg 1272w, https://substackcdn.com/image/fetch/$s_!belY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f83ec85-34c4-4ac2-bc3f-cf63f90f3f59_486x107.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!belY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f83ec85-34c4-4ac2-bc3f-cf63f90f3f59_486x107.svg" width="1456" height="321" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4f83ec85-34c4-4ac2-bc3f-cf63f90f3f59_486x107.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:321,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;What is Security as Code: Security Testing Diagram to show the phases of security testing&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="What is Security as Code: Security Testing Diagram to show the phases of security testing" title="What is Security as Code: Security Testing Diagram to show the phases of security testing" srcset="https://substackcdn.com/image/fetch/$s_!belY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f83ec85-34c4-4ac2-bc3f-cf63f90f3f59_486x107.svg 424w, https://substackcdn.com/image/fetch/$s_!belY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f83ec85-34c4-4ac2-bc3f-cf63f90f3f59_486x107.svg 848w, https://substackcdn.com/image/fetch/$s_!belY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f83ec85-34c4-4ac2-bc3f-cf63f90f3f59_486x107.svg 1272w, https://substackcdn.com/image/fetch/$s_!belY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f83ec85-34c4-4ac2-bc3f-cf63f90f3f59_486x107.svg 1456w" sizes="100vw"></picture><div></div></div></a></figure></div><p><strong>Vulnerability scanning </strong>at every level of your architecture across your pipeline can verify that each section of your application and deployment is secured against known vulnerabilities. Source code can be scanned for vulnerable libraries. For example, applications can be scanned for susceptibility to XSS and SQL injection. Containers can be scanned for vulnerabilities in individual packages and for adherence to best in class practices. Full scanning of test, staging and production environments can be done continuously and automatically. Scan early and scan continuously to verify your expected security controls are in place and so that you can find issues sooner rather than later.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0NTm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F990a3e42-c7f8-4957-9398-974285e512d6_487x181.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0NTm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F990a3e42-c7f8-4957-9398-974285e512d6_487x181.svg 424w, https://substackcdn.com/image/fetch/$s_!0NTm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F990a3e42-c7f8-4957-9398-974285e512d6_487x181.svg 848w, https://substackcdn.com/image/fetch/$s_!0NTm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F990a3e42-c7f8-4957-9398-974285e512d6_487x181.svg 1272w, https://substackcdn.com/image/fetch/$s_!0NTm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F990a3e42-c7f8-4957-9398-974285e512d6_487x181.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0NTm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F990a3e42-c7f8-4957-9398-974285e512d6_487x181.svg" width="1456" height="541" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/990a3e42-c7f8-4957-9398-974285e512d6_487x181.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:541,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Chart that describes vulnerability scanning for source code, application, infrastructure, and network.&nbsp;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Chart that describes vulnerability scanning for source code, application, infrastructure, and network.&nbsp;" title="Chart that describes vulnerability scanning for source code, application, infrastructure, and network.&nbsp;" srcset="https://substackcdn.com/image/fetch/$s_!0NTm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F990a3e42-c7f8-4957-9398-974285e512d6_487x181.svg 424w, https://substackcdn.com/image/fetch/$s_!0NTm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F990a3e42-c7f8-4957-9398-974285e512d6_487x181.svg 848w, https://substackcdn.com/image/fetch/$s_!0NTm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F990a3e42-c7f8-4957-9398-974285e512d6_487x181.svg 1272w, https://substackcdn.com/image/fetch/$s_!0NTm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F990a3e42-c7f8-4957-9398-974285e512d6_487x181.svg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>User and data access policies </strong>codify governance decisions that can then be reviewed by anyone in your organization. These policies can be standardized, reducing the toil necessary to constantly monitor and maintain one off requests. Authorization can be offloaded to external libraries allowing your Dev teams to focus on core features. Security teams now have a central repository to work directly with developers to monitor and review authorization, allowing the entire company to move faster without breaking core security and compliance requirements.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!V3Sj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7063335b-7b67-40f6-b7fb-d2efcf9c7e76_392x269.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!V3Sj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7063335b-7b67-40f6-b7fb-d2efcf9c7e76_392x269.svg 424w, https://substackcdn.com/image/fetch/$s_!V3Sj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7063335b-7b67-40f6-b7fb-d2efcf9c7e76_392x269.svg 848w, https://substackcdn.com/image/fetch/$s_!V3Sj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7063335b-7b67-40f6-b7fb-d2efcf9c7e76_392x269.svg 1272w, https://substackcdn.com/image/fetch/$s_!V3Sj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7063335b-7b67-40f6-b7fb-d2efcf9c7e76_392x269.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!V3Sj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7063335b-7b67-40f6-b7fb-d2efcf9c7e76_392x269.svg" width="1456" height="999" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7063335b-7b67-40f6-b7fb-d2efcf9c7e76_392x269.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:999,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;What is Security as Code: using Security as Code to create user and data access policies&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="What is Security as Code: using Security as Code to create user and data access policies" title="What is Security as Code: using Security as Code to create user and data access policies" srcset="https://substackcdn.com/image/fetch/$s_!V3Sj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7063335b-7b67-40f6-b7fb-d2efcf9c7e76_392x269.svg 424w, https://substackcdn.com/image/fetch/$s_!V3Sj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7063335b-7b67-40f6-b7fb-d2efcf9c7e76_392x269.svg 848w, https://substackcdn.com/image/fetch/$s_!V3Sj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7063335b-7b67-40f6-b7fb-d2efcf9c7e76_392x269.svg 1272w, https://substackcdn.com/image/fetch/$s_!V3Sj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7063335b-7b67-40f6-b7fb-d2efcf9c7e76_392x269.svg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>Genesis</strong></h2><p>Historically, organizations consisted of separate and siloed Development, Operations and Security teams. Dev teams followed waterfall development and more often than not, so did the deployment from one team to the next. Dev teams finished a project and marked it as code complete. At this point, Ops teams would then be responsible for actually getting it into production. Security teams were unfairly given a reputation for saying &#8216;no&#8217; to everything and were maybe informed of this process at some point, but were often the last to know.</p><p>This operating model often pitted teams against each other with tension from one step to the next and between each of the teams. This lack of collaboration also led to long release cycles, cost overruns and ultimately delays to delivering new features and functionality that would scale and be secure. Each team had differing goals and collaboration suffered.</p><h4><strong>ORGANIZATIONAL EVOLUTION</strong></h4><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Dweb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4dc66c92-cdbf-47d3-98b7-9c4e0ad895f4_487x213.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Dweb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4dc66c92-cdbf-47d3-98b7-9c4e0ad895f4_487x213.svg 424w, https://substackcdn.com/image/fetch/$s_!Dweb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4dc66c92-cdbf-47d3-98b7-9c4e0ad895f4_487x213.svg 848w, https://substackcdn.com/image/fetch/$s_!Dweb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4dc66c92-cdbf-47d3-98b7-9c4e0ad895f4_487x213.svg 1272w, https://substackcdn.com/image/fetch/$s_!Dweb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4dc66c92-cdbf-47d3-98b7-9c4e0ad895f4_487x213.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Dweb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4dc66c92-cdbf-47d3-98b7-9c4e0ad895f4_487x213.svg" width="1456" height="637" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4dc66c92-cdbf-47d3-98b7-9c4e0ad895f4_487x213.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:637,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A chart showing the evolution from Dev, Ops, and Security as different functions to DevOps plus Security, followed finally by DevSecOps&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A chart showing the evolution from Dev, Ops, and Security as different functions to DevOps plus Security, followed finally by DevSecOps" title="A chart showing the evolution from Dev, Ops, and Security as different functions to DevOps plus Security, followed finally by DevSecOps" srcset="https://substackcdn.com/image/fetch/$s_!Dweb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4dc66c92-cdbf-47d3-98b7-9c4e0ad895f4_487x213.svg 424w, https://substackcdn.com/image/fetch/$s_!Dweb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4dc66c92-cdbf-47d3-98b7-9c4e0ad895f4_487x213.svg 848w, https://substackcdn.com/image/fetch/$s_!Dweb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4dc66c92-cdbf-47d3-98b7-9c4e0ad895f4_487x213.svg 1272w, https://substackcdn.com/image/fetch/$s_!Dweb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4dc66c92-cdbf-47d3-98b7-9c4e0ad895f4_487x213.svg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>As businesses moved to the cloud, adopted a microservices-centric architecture, and began pushing the envelope on release frequency, this operating model started to change completely. Development and Operations teams began to work together in a DevOps model. Infrastructure as a service allowed for the popularization and widespread use of <a href="https://infrastructure-as-code.com/">Infrastructure as Code (IaC)</a>. Resources no longer needed to be specified out months in advance, ordered and physically racked in data centers. Instead, programmatic APIs could be utilized to create brand new resources on demand. Those resources could be automatically scaled up or down.</p><p>Infrastructure could now be completely created and managed using code. IaC removed the friction and toil associated with teams manually provisioning and managing fleets of servers, databases, operating systems, containers and at this point, all infrastructure associated with software applications. Dev and Ops team are no longer separate teams, but rather working together to build and scale applications together.</p><p><strong>Security as Code </strong>builds off the gains that these organizations have seen from IaC. Security as code similarly sees a migration to security and policy as code to remove the toil and friction associated with securing software in an IaC mindset. Security and policy as code began with standard software testing of areas like permission boundaries. These unit and functional tests were Security as Code before being labeled as such. Security as Code also arose out of the desire for automation from internal and external red teams and pentesters to automate all of the things. Known as DevSecOps or DevOpsSec, this methodology has become the way organizations can enable collaboration, agility and security, early and often across their entire infrastructure.</p><h2><strong>Security as Code Benefits</strong></h2><p>When moving to a Security as Code model, there are a number of key benefits that are realized across the organization. One of the key benefits and early drivers was fostering collaboration and enabling agility between and among Dev and Security teams. Another key benefit has been visibility for many teams across the organization. Finally, codifying both security and policy simplifies management and reduces toil across the organization.</p><p><strong>Greater Collaboration: </strong>As Dev teams moved to agile workflows, Security teams were often left behind still operating in a waterfall methodology, being brought in at the very end. Dev teams were quickly iterating and ignoring or subverting security processes that hadn&#8217;t been yet updated. Security teams that quickly recognized the benefits of agile methods started working directly with Dev teams to meet them where they were. This naturally led to collaboration when they both began to work on shared problems. No longer were they working on orthogonal problems with different motivations, they were working together, directly on the same code base, making sure tests passed before code moved to the next step.</p><p><strong>Improved Morale: </strong>Another problem that arose in organizations was that many teams outside of Security and Compliance had very little visibility into their decisions. Dev teams hoped for an approval and were distraught with what seemed like constant no&#8217;s. As security and compliance requirements become codified, there is no longer a question as to why a decision is made, it&#8217;s clear from the code. For example, if you have integrated Kubernetes with Open Policy Agent (OPA), you can codify the users and groups that have direct access to each Kubernetes cluster. This allows you to set consistent policy that corresponds to service ownership instead of ad-hoc permission requests. If security is fully baked into your pipeline, there are fewer surprises and last minute blocks when it&#8217;s code complete.</p><p><strong>Increased Visibility: </strong>Security as Code helps simplify and centralize user and data access reducing toil and further providing visibility. Access and policy changes can now be tracked, and requests for changes can be self service. For example, you may be using Terraform to manage IAM resources for your cloud provider. By tracking IAM changes in source code, anyone can now see all permissions and can make a pull request directly to the Terraform repo to request changes. When you centralize your decisions to a declarative policy engine, you no longer need to make the same decision over and over again in separate systems. Long gone are the scattered policies of authorization to scattered applications.</p><p><strong>Shorter Release Cycle: </strong>When you integrate security requirements early on in design and development, issues can easily be addressed resulting in increased velocity. Dev and Security teams are no longer trying to address minor to complex to systemic issues after a new feature or functionality is &#8220;code complete&#8221;. With the advent of Security as Code libraries, application development can be decoupled from the fraught process of implementing your own custom authorization. For example, by integrating with OPA, developers can enable Role Based Access Controls (RBAC) in only the time it takes to enable the integration. Traditionally, this would have required multiple sprints from the Security, Product and Development teams to understand the requirements, what RBAC is, development time and finally full code review. Developers can focus on their core strengths and speed up application development. Additionally, as Security teams continue to adopt this approach, they will begin to adopt or develop their own libraries and tooling to further speed up releases by providing resources to ensure that applications are secure by default.</p><p><strong>Better Security: </strong>When looked at holistically, each test, scan or policy that you can integrate, early, often and continuously, will find problems sooner so they can be addressed before others find them. Undertake this approach for all sorts of add-on benefits, but ultimately we&#8217;re all in this together to better secure the data we all care about.</p><h2><strong>Security as Code with Cyral</strong></h2><p>The principles of Security as Code and API-first have been at the core of design and development at Cyral. We have embraced cloud-first, everything as code and API-first design to meet our customers where they are.</p><p>Our commitment to Security as Code starts first with building a security product that is developer friendly. We have designed our product to naturally fit into existing development workflows. Our application can be easily deployed as part of your testing, staging and production environments to enhance tracing and security at each step of the way. No matter your setup, we have developed options to fit your deployment requirements. We have focused on IaC options from Terraform to Helm and more to support your existing workflow.</p><p>To truly be able to expand to all existing workflows, we have built our product based on API-first principles. We recognize that Cyral is only one part of your existing toolset and so we have built out dozens integrations across the stack from notifications to logging to issue tracking and more. Cyral&#8217;s focus will continue to be on data layer security and advanced data tracing across any number of data repositories available.</p><p>One of the key components of security as code is to integrate security directly into your CI/CD pipeline, bringing security testing directly and automatically as your application moves from code commit to production. For each step of the pipeline, Cyral will enable advanced tracing and consistent authentication and authorization. Cyral completely supports this model and recommends integrating Cyral in every environment to fully take advantage of our advanced security and tracing capabilities. Cyral&#8217;s application comes with out of the box templates to support your IaC workflows and install our sidecar in your infrastructure, the way you deploy the rest of your infrastructure.</p><p>Cyral can be integrated into your CI/CD pipeline and can be deployed in dev, staging and production along with your application code, ensuring that all data layer activity from every application is automatically observed, controlled and protected. By starting with Cyral in your dev environment, users can now also measure and validate that data layer performance and control do not regress with each new release. Cyral&#8217;s advanced tracing provides full visibility into what your users and your applications are doing, allowing you to triage and find issues quicker.</p><p>Cyral also utilizes Security as Code for data and access policy decisions. We have integrated with Open Policy Agent (OPA), the standard for &#8220;policy-based control for cloud native environments&#8221;, as the basis for our policy engine. OPA allows our users to write declarative policy for granular access to data repositories and the data that is contained within them. Cyral users write their declarations for user and data access in YAML. In the backend we then use this as a data input to our prewritten Rego queries to verify adherence to policy. By implementing it this way, Cyral remains performative and allows our customers to write configs in a markup language they&#8217;re likely already using. YAML also encourages all levels of internal stakeholders to be able to review, edit and comment on policy based code. Writing policy as code with YAML means that you don&#8217;t need to be an engineer to contribute.</p><h4><strong>CYRAL INTEGRATIONS</strong></h4><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PpD_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5240a599-91a5-401b-9b16-be72cfef9724_514x450.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PpD_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5240a599-91a5-401b-9b16-be72cfef9724_514x450.svg 424w, https://substackcdn.com/image/fetch/$s_!PpD_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5240a599-91a5-401b-9b16-be72cfef9724_514x450.svg 848w, https://substackcdn.com/image/fetch/$s_!PpD_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5240a599-91a5-401b-9b16-be72cfef9724_514x450.svg 1272w, https://substackcdn.com/image/fetch/$s_!PpD_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5240a599-91a5-401b-9b16-be72cfef9724_514x450.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PpD_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5240a599-91a5-401b-9b16-be72cfef9724_514x450.svg" width="1456" height="1275" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5240a599-91a5-401b-9b16-be72cfef9724_514x450.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1275,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Cyral's security as code integrations&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Cyral's security as code integrations" title="Cyral's security as code integrations" srcset="https://substackcdn.com/image/fetch/$s_!PpD_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5240a599-91a5-401b-9b16-be72cfef9724_514x450.svg 424w, https://substackcdn.com/image/fetch/$s_!PpD_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5240a599-91a5-401b-9b16-be72cfef9724_514x450.svg 848w, https://substackcdn.com/image/fetch/$s_!PpD_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5240a599-91a5-401b-9b16-be72cfef9724_514x450.svg 1272w, https://substackcdn.com/image/fetch/$s_!PpD_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5240a599-91a5-401b-9b16-be72cfef9724_514x450.svg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Cyral is fully committed to <a href="https://cyral.com/glossary/security-as-code/">supporting</a> Security as Code with our customers, and helping them improve their agility and reduce risk. Our client can have a policy repo in Github, so when they push a new version of policy to their repo, a Github Action is called to automatically update policy in their Cyral deployment. Any runtime changes in the application, as it gets promoted in the continuous delivery pipeline (for example, Spinnaker) from testing to canary to production, get tracked through metrics and traces generated by Cyral and routed to the team&#8217;s monitoring and logging platforms, such as Datadog and Jaeger or an ELK stack. If any alerts are generated they can then be sent to the messaging and issue tracking systems, such as Slack, Jira and Pagerduty. By integrating Cyral into your full pipeline, any risks and vulnerabilities are caught as soon as possible and, and all applications promoted to production by the Development team come with built in access control policies, which can be reviewed by the Security teams if necessary. Together, we have implemented a full CI/CD security and policy as code pipeline in production.</p>]]></content:encoded></item><item><title><![CDATA[Security as Part of Quality]]></title><description><![CDATA[I recently came across the Synopsys Building Security In Maturity Model (BSIMM) report and found myself enthusiastically agreeing with a number of points that it makes.]]></description><link>https://www.infraops.org/p/security-as-part-of-quality</link><guid isPermaLink="false">https://www.infraops.org/p/security-as-part-of-quality</guid><dc:creator><![CDATA[Daniel Tobin]]></dc:creator><pubDate>Tue, 08 Dec 2020 21:22:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!atMQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0e8629a-028d-4fb1-9111-10f70586851c_1600x800.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!atMQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0e8629a-028d-4fb1-9111-10f70586851c_1600x800.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!atMQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0e8629a-028d-4fb1-9111-10f70586851c_1600x800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!atMQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0e8629a-028d-4fb1-9111-10f70586851c_1600x800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!atMQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0e8629a-028d-4fb1-9111-10f70586851c_1600x800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!atMQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0e8629a-028d-4fb1-9111-10f70586851c_1600x800.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!atMQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0e8629a-028d-4fb1-9111-10f70586851c_1600x800.jpeg" width="1456" height="728" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d0e8629a-028d-4fb1-9111-10f70586851c_1600x800.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:728,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:54019,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!atMQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0e8629a-028d-4fb1-9111-10f70586851c_1600x800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!atMQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0e8629a-028d-4fb1-9111-10f70586851c_1600x800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!atMQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0e8629a-028d-4fb1-9111-10f70586851c_1600x800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!atMQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0e8629a-028d-4fb1-9111-10f70586851c_1600x800.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I recently came across the Synopsys&nbsp; <a href="https://www.bsimm.com/">Building Security In Maturity Model (BSIMM) report</a> and found myself enthusiastically agreeing with a number of points that it makes. If you are not familiar, the report collects quantitative data from a number of companies each year around their security practices. In it, one of the things that they highlighted was &#8220;Security is becoming part of a quality practice, which is being recognized as part of reliability, all in pursuit of resilience&#8221;.</p><p>The 11th BSIMM report collected data from 130 different large companies in a wide range of industries. The participants in this year&#8217;s report ranged from Adobe to Zendesk and included companies as wide ranging as Eli Lilly, HSBC, and Medtronic. &#8220;The purpose of the BSIMM is to quantify the activities carried out by various kinds of SSIs across many organizations.&#8221; They generate the report from the data of common security practices by surveying a wide range of companies. From there they group these into the 4 major categories of Governance, Intelligence, SSDL Touchpoints and Deployment. Each of these major categories is then broken down into sub categories such as Code Review. For each sub category, there are then 3 levels with 2 to 5 real world practices like &#8220;Use automated tools along with manual review&#8221; in Level 1 and &#8220;Automate malicious code detection&#8221; in Level 3. Based on interviews, they then assess each company to determine if they perform the task or not.&nbsp;</p><p>In the early part of the 2020 epoch, 3X Engineer <a href="https://www.linkedin.com/in/paulkarayan/">Paul ("pk") Pereyda Karayan</a> and I presented at <a href="https://bsidessf2020.sched.com/event/Ybin/from-cockroaches-to-marble-floors-what-happens-when-you-turn-on-the-lights">BSidesSF</a> about the intersection of security and quality assurance. We had a simple question, &#8220;Aren&#8217;t we all just hunting bugs?&#8221; One of the key takeaways was that from a user&#8217;s perspective it doesn&#8217;t matter whether the bug is classified as a security bug or not. Oftentimes, as practitioners we lose sight of the user experience. We are so caught up in the nuances of filing bugs in Jira, we miss the forest for the trees. Over the years, this has started to pervade through Silicon Valley, most notably being Facebook&#8217;s change in motto from &#8220;Move fast and break things&#8221; to &#8220;Move fast with stable infrastructure.&#8221; As with Facebook, so has the industry started to focus on not just speed, but also on stability and resilience.</p><p>The false dichotomy inherent in focusing on security bugs necessarily sets up gates. Security needs to become part of an overall quality program. Resilience can no longer just be seamlessly recovering from infrastructure outages. One of the key ways that we talked about at BSidesSF was to formally have Security and QA teams work closely together. This necessitated a <a href="https://cyral.com/blog/three-approaches-that-put-security-at-the-core-of-your-operation/">shift left</a> mentality. Today so many talk about Shift Left solely in the context of security issues, but it was actually &#8220;first introduced in 2001 by Larry Smith to encourage more comprehensive testing done by both developers and QA earlier in the process.&#8221; Security is part of an overall quality program and should be looked at holistically as such.</p>]]></content:encoded></item></channel></rss>