Seems like now about every 6 months or so every asks this same question about some new vulnerability. The answer should be the same, do the same thing you should have been doing before this vulnerability came out. In an Assumed Breach model of security, these vulnerability would have already existed, and your other network controls, in most cases, would have rendered them no worse than a phishing email (which… Read More »#Spectre and #Meltdown – What do we do?
A note to vendors: Infrastructure as a Service (IaaS) != secure/compliant applications, it can, but doesn’t by default. Why are people putting their servers and applications in IaaS providers like AWS and Azure? They can get a cheap, fast and secured data center to host their servers/applications. But that doesn’t mean they get the same thing they would in a locally managed data center within their company. Amazon lists… Read More »IaaS and the Shared Responsibility Model
In the first post I covered best practices for securing service accounts. In this post, I am going to discuss some key elements in securing privileged access. Keep in mind, Microsoft has published a comprehensive guide to securing an Active Directory. Keep in mind that many of these things will require additional work on the front end, but that is usually due to poor existing practices. Once processes are in place,… Read More »Best Practice: Securing Windows Service Accounts and Privileged Access – Part 2
I recently had a client ask me about our recommendations for securing service accounts within Active Directory. We talked for a bit, and then I decided to write them down. This post will have two parts, the first part is for Service Accounts and then the second post will be about privileged accounts Best Practice for Securing Privileged Windows Accounts. What is the minimum privilege needed? If the account… Read More »Best Practice: Securing Windows Service Accounts and Privileged Access – Part 1