Logo

    2017-017-Zero_Trust_Networking_With_Doug_Barth,_and_Evan_Gilman

    enMay 09, 2017
    What was the main topic of the podcast episode?
    Summarise the key points discussed in the episode?
    Were there any notable quotes or insights from the speakers?
    Which popular books were mentioned in this episode?
    Were there any points particularly controversial or thought-provoking discussed in the episode?
    Were any current events or trending topics addressed in the episode?

    About this Episode

     Zero trust networking may be a foreign concept to you, but Google and others have been utilizing this method of infrastructure and networking for quite a while now. It stands more traditional networking on it's head by not having a boundry in the traditional sense. There's no VPN, no ACLs to audit, no firewall to maintain... Sounds crazy right?

    Well, it's all about trust, or the lack of it. No one trusts anyone without a proper chain of permission. Utilizing 2FA, concepts of port knocking, and CA certificates are used to properly vet both the host and the server and are used to keep the whole system safe and as secure as possible.

    Sounds great right? Well, and you can imagine, with our interview this week, we find out that it's not prefect, people have to implement their own Zero Trust Networking solution, and unless you are a mature organization, with things like complete asset management, data flow, and configuration management, you aren't ready to implement it.

    Join us as we discuss Zero Trust Networking with Doug Barth (@dougbarth), and Evan Gilman (@evan2645)

     

    Direct Link: http://traffic.libsyn.com/brakeingsecurity/2017-017-Zero_Trust_Networks.mp3

    Youtube Channel:  https://www.youtube.com/channel/UCZFjAqFb4A60M1TMa0t1KXw

    iTunes Store Link:  https://itunes.apple.com/us/podcast/brakeing-down-security-podcast/id799131292?mt=2 

    #Google Play Store: https://play.google.com/music/m/Ifp5boyverbo4yywxnbydtzljcy?t=Brakeing_Down_Security_podcast

     

    ---------

    Jay Beale’s Class “aikido on the command line: hardening and containment”

    JULY 22-23 & JULY 24-25    AT BlackHat 2017

    https://www.blackhat.com/us-17/training/aikido-on-the-command-line-linux-hardening-and-containment.html

     

    ---------

    Join our #Slack Channel! Sign up at https://brakesec.signup.team

    #RSS: http://www.brakeingsecurity.com/rss

    #iHeartRadio App:  https://www.iheart.com/show/263-Brakeing-Down-Securi/

    #SoundCloud: https://www.soundcloud.com/bryan-brake

    Comments, Questions, Feedback: bds.podcast@gmail.com

    Support Brakeing Down Security Podcast on #Patreon: https://www.patreon.com/bds_podcast

    #Twitter: @brakesec @boettcherpwned @bryanbrake

    #Player.FM : https://player.fm/series/brakeing-down-security-podcast

    #Stitcher Network: http://www.stitcher.com/s?fid=80546&refid=stpr

    #TuneIn Radio App: http://tunein.com/radio/Brakeing-Down-Security-Podcast-p801582/

     

     

    show notes:

     

    The lines are blurring:

     

    DevOps

    NetOps

    SDN

    SDP

    docker/containerization

    2FA authentication

     

    https://devcentral.f5.com/articles/load-balancing-versus-application-routing-26129

    http://www.darkreading.com/attacks-breaches/zero-trust-the-way-forward-in-cybersecurity/a/d-id/1327827

    All good points, except no one wants to do the needful bits (ID’ing information, data flow, proper network design)

    https://www.beyondcorp.com/

     

    https://en.wikipedia.org/wiki/Software_Defined_Perimeter

     

    Where is this Google article???

    http://www.tomsitpro.com/articles/google-zerotrust-network-own-cloud,1-2608.html

    https://cloud.google.com/beyondcorp/

    https://www.theregister.co.uk/2016/04/06/googles_beyondcorp_security_policy/

     

    Who benefits from this? Network engineers, apparently… :)

    Devs?

    IT?

    Sounds like a security nightmare… who would get the blame for it failing

     

    How do we keep users from screwing up the security model? Putting certs on their personal boxes?

     

    Prior BrakeSec shows:  Software Defined Perimeter with Jason Garbis

    http://traffic.libsyn.com/brakeingsecurity/2017-011-Software_Defined_Perimeter.mp3

     

    http://shop.oreilly.com/product/0636920052265.do

     

    Doug Barth Twitter: @dougbarth

     

    Evan Gilman Twitter:  @evan2645

     

    Runs counter, right? We are used to not trusting the client…

     

    A Mature company can only implement

    Device inventory

    Config management

    Data flow

    Asset management

     

    Micro-services?  

    Brownfield networks

    Sidecar model -

    Certain OSes not possible

    Recent Episodes from Brakeing Down Security Podcast

    p2-accidentalCISO, building trust in new places

    p2-accidentalCISO, building trust in new places

     

    Full Youtube VOD: https://www.youtube.com/watch?v=uX7odQTBkyQ 

     

     

    Questions and topics:

    1. Let’s talk about Mindful Business Podcast

      1. What’s the topics you cover?

    2. Topic #1: discuss your experiences when you were a new leader.

      1.  What worked? What didn't? What would you have done differently?

      2. Do you emulate your manager's style? What have been your go-to management resources? 

      3. What is a good piece of advice that you’ve been given or that you impart to others that relates to leadership?

    3. Topic #2: building/Operating SaaS products (we can discuss securing them, what functions should be table stakes (data structures, logging, etc)

    4. Topic #3: What are bare minimums for building ‘secure’ Saas products in your particular field? And how do you balance security with a positive user experience (i. e. getting customers to buy into MFA/OAUTH, OTA updates

    5. Topic #4: Do many SaaS products get over-integrated? Is the need for integration override best practices in security? 

    Additional information / pertinent LInks (Would you like to know more?):

    1. Twitter/Mastodon:
      https://twitter.com/AccidentalCISO
      https://infosec.exchange/@accidentalciso

    2. The Mindful Business Security Show:
      https://www.mindfulsmbshow.com/
      https://twitter.com/mindfulsmbshow



    Show points of Contact:

    Amanda Berlin: @infosystir @hackershealth 

    Brian Boettcher: @boettcherpwned

    Bryan Brake: https://linkedin.com/in/brakeb 

    Brakesec Website: https://www.brakeingsecurity.com

    Youtube channel: https://youtube.com/@brakeseced

    Twitch Channel: https://twitch.tv/brakesec

    AccidentalCISO on BrakeSecEd, talking Leadership, SaaS development, and Appsec

    AccidentalCISO on BrakeSecEd, talking Leadership, SaaS development, and Appsec

    Disclaimer: The views, information, or opinions expressed on this program are solely the views of the individuals involved and by no means represent absolute facts. Opinions expressed by the host and guests can change at any time based on new information, and do not represent views of past, present, or future employers.

     

    Recorded: 28 Jan 2024

    Youtube VOD: https://youtube.com/live/uX7odQTBkyQ



    Questions and topics:

    1. Let’s talk about Mindful Business Podcast

      1. What’s the topics you cover?

    2. Topic #1: discuss your experiences when you were a new leader.

      1.  What worked? What didn't? What would you have done differently?

      2. Do you emulate your manager's style? What have been your go-to management resources? 

      3. What is a good piece of advice that you’ve been given or that you impart to others that relates to leadership?

    3. Topic #2: building/Operating SaaS products (we can discuss securing them, what functions should be table stakes (data structures, logging, etc)

    4. Topic #3: What are bare minimums for building ‘secure’ Saas products in your particular field? And how do you balance security with a positive user experience (i. e. getting customers to buy into MFA/OAUTH, OTA updates

    5. Topic #4: Do many SaaS products get over-integrated? Is the need for integration override best practices in security? 

    Additional information / pertinent LInks (Would you like to know more?):

    1. Twitter/Mastodon:
      https://twitter.com/AccidentalCISO
      https://infosec.exchange/@accidentalciso

    2. The Mindful Business Security Show:
      https://www.mindfulsmbshow.com/
      https://twitter.com/mindfulsmbshow

    Show points of Contact:

    Amanda Berlin: @infosystir @hackershealth 

    Brian Boettcher: @boettcherpwned

    Bryan Brake: https://linkedin.com/in/brakeb 

    Brakesec Website: https://www.brakeingsecurity.com

    Youtube channel: https://youtube.com/@brakeseced

    Twitch Channel: https://twitch.tv/brakesec

    How to get more headcount, BLUFFs Vulnerability, and Ranty Clause debuts!

    How to get more headcount, BLUFFs Vulnerability, and Ranty Clause debuts!

    Show Topic Summary:

    Ms. Berlin proposes a question of how to gather more headcount with metrics, we discuss the BLUFFS bluetooth vulnerability, and “Ranty Claus” talks about CISA’s remarks of putting the onus on device product makers to remove choice for customers and implement secure defaults.

    #youtube VOD: https://www.youtube.com/watch?v=emcAzTx9z0c 

    Questions and topics:

    1. https://cyberscoop.com/cisa-goldstein-secure-by-design/

    2. https://hackaday.com/2023/12/02/update-on-the-bluffs-bluetooth-vulnerability/

    Additional information / pertinent LInks (Would you like to know more?):

    1. https://cyberscoop.com/jen-easterly-secure-by-design/

    2. https://www.cisa.gov/resources-tools/resources/stop-passing-buck-cybersecurity 

    3. Examples of companies forcing changes https://www.bleepingcomputer.com/news/microsoft/microsoft-will-roll-out-mfa-enforcing-policies-for-admin-portal-access/  

    4. https://github.com/aya-rs/aya - eBPF implementation in Rust

    5. https://ossfortress.io/  

    6. https://www.darkreading.com/endpoint-security/critical-logofail-bugs-secure-boot-bypass-millions-pcs 



    Show points of Contact:

    Amanda Berlin: @infosystir @hackershealth 

    Brian Boettcher: @boettcherpwned

    Bryan Brake: @bryanbrake on Mastodon.social, https://linkedin.com/in/brakeb 

    Brakesec Website: https://www.brakeingsecurity.com

    Twitter: @brakesec 

    Youtube channel: https://youtube.com/c/BDSPodcast

    Twitch Channel: https://twitch.tv/brakesec

    25Oct - okta breached (again), Energy company hit by supply chain attack, and you can help hire the best people

    Nicole Sundin - CPO at Axio - SEC compliance, usable security, setting up risk mgmt programs

    Nicole Sundin - CPO at Axio - SEC compliance, usable security, setting up risk mgmt programs

    Disclaimer: The views, information, or opinions expressed on this program are solely the views of the individuals involved and by no means represent absolute facts. Opinions expressed by the host and guests can change at any time, and do not represent views of past, present, or future employers.

     

    Guest Bio: Nicole is the Chief Product Officer at Axio. Nicole has spent her career building awareness around the benefits of usable security and human-centered security as a way to increase company revenue and create a seamless user experience.

     Youtube VOD Link: https://youtube.com/live/tFaAB9an47g

     Questions and topics: Usable security: is it an oxymoron?

    What determines if the security is ‘usable’ or no? We sacrifice security for a better UX, what can be done to alleviate that? Or is it some sort of sliding scale in “poor UX, amazing security or awesome UX, poor security” Examples of poor UX for ‘people’: MFA, and password managers.

    SEC updates and ‘material events’ and how that would affect security, IR, and other company reporting functions. 

     

    Also, additional documentation (Regulation S-K Item 106) https://www.linkedin.com/posts/nicole-sundin-5225a1149_sec-adopts-rules-on-cybersecurity-risk-management-activity-7090065804083290112-ISD8

    Are companies ready to talk about their cybersecurity? Can the SEC say “you’re not doing enough?”

     What is ‘enough’?

    Are we heading toward yet another audit needed for public companies, similar to SOX?

    When does an 8-K get publicly disclosed?

    Materiality is based on a “reasonable investor”?

    So, you don’t need to announce that until you’re certain, and it’s based on what you can collect? Cyber Risk Management and some good examples of how to set up a proper cyber risk organization

    Additional Links:

    https://csrc.nist.gov/CSRC/media/Projects/usable-cybersecurity/images-media/Is%20Usable%20Security%20an%20Oxymoron.pdf

    http://web.mit.edu/Saltzer/www/publications/protection/Basic.html

    https://www.sec.gov/news/press-release/2023-139

    https://www.sec.gov/news/statement/munter-statement-assessing-materiality-030922

    https://www.pwc.com/us/en/services/consulting/cybersecurity-risk-regulatory/sec-final-cybersecurity-disclosure-rules.html

    https://www.nasa.gov/centers/ames/research/technology-onepagers/hc-computing.html

     https://securityscorecard.com/blog/what-is-cyber-security-performance-management/

     

    Brakeing Down Security Podcast
    enSeptember 23, 2023

    John Aron, letters of marque, what does a "junior" job look like with AI?

    John Aron, letters of marque, what does a "junior" job look like with AI?

    Disclaimer: The views, information, or opinions expressed on this program are solely the views of the individuals involved and by no means represent absolute facts. Opinions expressed by the host and guests can change at any time, and do not represent views of past, present, or future employers.

     

    Guest Bio: John is the CEO of Aronetics. An avid climber and runner, John has spoken at many conferences about topics like ZeroTrust, BIOS/UEFI security, communication security, and malware. Aronetics is a technology-enabled service provider. 

     

    Youtube VOD: https://youtube.com/live/5dIVTwVZLAU

    Linkedin VOD: https://www.linkedin.com/video/live/urn:li:ugcPost:7101738254823030784



    Show Topic Summary:

     

    John joins us to discuss “letters of Marque” in an effort for hackers to ‘hack back’... the overreliance on automation, and communication siloes. We also talk about what a ‘junior position’ in infosec looks like with AI doing all the “Level 1 SOC Analyst” type roles normally given to someone fresh to the security industry.

     

    Questions and topics:

    1. Is infosec over reliant on automation? Automation comes with its own challenges.

      1. Documentation woes

      1. Automation is usually found in userland

     

    Aronetics’ Thor provides defense and counter-offense tamper-proof technology digitally tied to 

     

    Letter of Marque - good idea, or geopolitical disaster waiting to happen?


    Siloes and communication -best ways to overcome those in an org and outside?

    How do we overcome siloing?

     

    Overcoming security challenges?Identity management - 2FA is everywhere, there’s already ways around 2FA, so what now? 3FA? Biometrics? Make everyone carry around physical tokens that we can lose?

     

    Blog post: https://www.aronetics.com/post-quantum-cryptography/
    What do we need to protect against? Nation states with quantum computers? Rubber hose cryptography?

     

    Crime thrives in areas of low visibility. https://www.aronetics.com/unknown/ 

     

    https://www.aronetics.com/inside-the-breach/ (threat detection - the crime thrives in low vis areas)

     

    Show points of Contact:

    Brakesec Website: https://www.brakeingsecurity.com

    Youtube channel: https://youtube.com/c/BDSPodcast

    Twitch Channel: https://twitch.tv/brakesec

    Amanda Berlin: @infosystir@infosec.exchange (Mastodon) @hackershealth 

    Brian Boettcher: @boettcherpwned

    Bryan Brake: @bryanbrake on Mastodon.social

    Brakeing Down Security Podcast
    enSeptember 03, 2023

    Megan Roddie - co-author of "Practical Threat Detecion Engineering"

    Megan Roddie - co-author of "Practical Threat Detecion Engineering"

    Disclaimer: The views, information, or opinions expressed on this program are solely the views of the individuals involved and by no means represent absolute facts. Opinions expressed by the host and guests can change at any time, and do not represent views of past, present, or future employers.

    Buy here: https://subscription.packtpub.com/book/security/9781801076715

    Amazon Link: https://packt.link/megan

    Youtube VOD: https://www.youtube.com/watch?v=p1_jQa9OQ2w

     

    Show Topic Summary:

    Megan Roddie is currently working as a Senior Security Engineer at IBM. Along with her work at IBM, she works with the SANS Institute as a co-author of FOR509, presents regularly at security conferences, and serves as CFO of Mental Health Hackers. Megan has two Master's degrees, one in Digital Forensics and the other in Information Security Engineering, along with many industry certifications in a wide range of specialties. When Megan is not fighting cybercrime, she is an active competitor in Muay Thai/Kickboxing. She is a co-author of “Practical Threat Detection Engineering” from Packt publishing, on sale now in print and e-book. Buy here: https://subscription.packtpub.com/book/security/9781801076715

     

    https://packt.link/megan ← Amazon redirect link that publisher uses if you want something easier on the notes

     

    Questions and topics:

    1. Of the 3 models, which do you find you use more and why? (PoP, ATT&CK, kill chain)

    2. What kind of orgs have ‘detection engineering’ teams? What roles are involved here, and can other teams (like IR) be involved or share a reverse role there?

    3. Lab setup requires an agent… any agent for ingestion or something specific? 

    4. How does Fleet or data ingestion work for Iot/Embedded device testing? Anything you suggest?

    5. How important is it to normalize your log output for ingestion? (app, web, server all tell the story)

    Additional information / pertinent LInks (Would you like to know more?):

    1. Unified Kill Chain: https://www.unifiedkillchain.com/

    2. ATT&CK: https://attack.mitre.org/ 

    3. D3FEND matrix BrakeSec show from 2021: https://brakeingsecurity.com/2021-023-d3fend-framework-dll-injection-types-more-solarwinds-infections 

    4. Pyramid of Pain: https://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html

    5. https://www.securitymagazine.com/articles/98486-435-million-the-average-cost-of-a-data-breach 

    6. https://medium.com/@gary.j.katz (per Megan, ‘it’s basically Chapter 11 of the book’)




    Show points of Contact:

    Amanda Berlin: @infosystir @hackershealth 

    Brian Boettcher: @boettcherpwned

    Bryan Brake: @bryanbrake on Mastodon.social, Twitter, bluesky

    Brakesec Website: https://www.brakeingsecurity.com

    Twitter: @brakesec 

    Youtube channel: https://youtube.com/c/BDSPodcast

    Twitch Channel: https://twitch.tv/brakesec

    meeting new people, walking on your keyboard causes issues, even google gets phone numbers wrong.

    Logo

    © 2024 Podcastworld. All rights reserved

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io