Posts

Showing posts from September, 2023

Balancing Compliance and Innovation in International Cloud Computing: How International Legal Concerns Affect Security Plans, Cloud Monitoring, and Shared Responsibility

 International cloud computing sparks innovation and connectivity on a global scale without requiring new offices or infrastructures to expand into a new location. Political alliances have the ability to significantly limit an organization's ability to expand globally. International trade agreements and data localization laws govern how global organizations operate in the cloud. Earlier this year, National Security concerns were raised regarding the Chinese government's access to United States citizens' user data through the Chinese-owned social media platform TikTok (CRS, 2023). Localization agreements were created to ensure the United States governed all access to TikTok user data in the United States. As an industry leader, cloud providers offer data centers nationwide that assist organizations with meeting data compliance. Any software engineer with a creative heart knows that stringent requirements severely limit innovation; however, billion-dollar data breaches expose...

ARP Spoofing Defense: Leveraging NAC Deployments, SIEM Monitoring, and Incident Response

On-path attackers intercept and modify communication between the browser and the server. While two devices communicate, a man-in-the-middle attack redirects traffic to allow attackers to view content such as private messages or login credentials. Strong encryption mechanisms ensure intercepted data cannot be viewed without a decryption key, and digital hashes help to verify messages have not been modified in transit. Similarly, ARP attacks allow attackers to redirect traffic by associating their MAC address with a target host’s IP address. While segmenting a network reduces the impact of ARP attacks, Network Access Control (NAC) solutions prevent attackers from joining the network in the first place. Secure your network by leveraging Address Resolution Protocol (ARP) Security discusses implementing an NAC solution to protect corporate networks: “In order to prevent the bypassing of ARP poisoning by setting static ARP on the blocked target device, bidirectional poisoning function is pr...

Proactive Policy-Driven Monitoring: Exploring Operational and Technical WAF Considerations in Modern Banking

The Application Gateway provides web application security for multiple web applications with the protection of WAF integration. WAF policies assist with customizing security parameters for each individual application. When creating policies, system administrators should consider protection from malicious bots, crawlers, scanners, harmful SQL injection, Cross-site scripting, HTTP request smuggling, HTTP response splitting, remote file inclusion, and DDoS attacks (Microsoft Azure, n.d.). Through the creation of policies system administrators develop an incident response plan and create monitoring solutions that track malicious activity in logs that provide useful insight to fine tuning policies to provide increased security and proactive solutions to threats. Because WAF policies implement solutions for backend code that allow the IT team to participate in security solutions without modifying backend code directly, software engineers and IT teams should actively communicate to provide so...

Cloud Security Mechanisms for Application and Infrastructure Security

Background Information Organizations should take care to develop comprehensive security plans that address the people, processes, and technical concerns associated with infrastructure and application security. Addressing People-Based Concerns. Educating employees on security best practices and exploring the risks organizations absorb when inviting employees into the cloud reduces corporate risk by creating a security-first mindset that involves employees and raises awareness of how an organization desires an employee to respond to risky behaviors. Clearly defining roles and responsibilities allows an organization to establish comprehensive policies and procedures that limit an employee’s access to sensitive materials according to only the information they need to perform their job. Organizations must develop comprehensive safeguards when employing third-party vendors that align with the security expectations of their organization by establishing strong protocols, establishing contract...

Cloud Management Mechanisms: Exploring Multi-faceted Solutions for Complex Problem Spaces in the Cloud

My background in data analysis often pushes me to immediately select hybrid as the superior option; however, one must recognize the specific use case I am addressing per my background. For organizations working with sensitive healthcare or financial information, a hybrid option easily integrates legacy systems and meets scalability and compliance needs.  When working on creative projects, complexity management utilities, such as Terraform and Jenkins, address different problem spaces that allow software engineers to create multi-public cloud solutions. Software engineers who speak in terms of a common simple infrastructure language as opposed to cloud-specific language open the doors to an organization, avoiding vendor lock-in in the cloud without creating logic gaps across providers. When developing requirements, speaking in this general language creates a clear perspective that more easily combines solutions and ports into other environments.  Large corporations often work w...

Exploring Penetration Testing Alternatives to Kali: Selecting Ease of Use or Customizability for Different Use Cases

Parrot Security OS often provides a better starting place than even Kali for beginners because of its easy-to-use interface, community support, portability, and extra security features that beginners need while learning. It offers some customizability to add different tools to your distribution for specific use cases, such as network or API security testing.  As a general-purpose tool, Parrot provides the best option in terms of ease of use, support, and portability; however, one must consider that when working professionally, tools are more often than not chosen for their specific use case. General purpose tools, such as parrot or kali, are often used as a hybrid solution for broad testing when predominantly using other specialized tools.  When transferring over from Kali, Parrot Security OS may prove to be a little frustrating for more advanced tests because it will not have the more advanced tools you may want to use. If you are an advanced user, and familiar with Kali, I w...

Maximizing Software Development Efficiency: How CI/CD Affects DevOps Culture

While continuous integration and continuous delivery can be described as two separate pipelines, it’s important to remember that they are principles that can be implemented with many tools. For example, A CI/CD pipeline can be built on a single platform, such as GitLab, that facilitates version control collaboration and allows integration of Kubernetes and Docker in one location.  While other tools like GitHub and Jenkins solely provide continuous integration and continuous delivery, respectively. Cloud platforms often provide automation tools like CloudFormation and AWS TaskCat for facilitating continuous delivery of infrastructure as opposed to software applications in a CI/CD pipeline, as we are discussing here. While we are discussing a software life cycle when addressing a CI/CD pipeline, it’s important to recognize similar principles exist in other places. Continuous integration allows an organization to employ multiple software engineers to build and test software together ...

Succeeding in DevOps: Exploring Fundamental DevOps Skills in a Competitive Industry

  In order to succeed in DevOps, a general knowledge of how software developers interact in a team setting greatly improves a DevOps engineer’s experience. A DevOps engineer should have knowledge of the software development life cycle, methodologies, and git.  A DevOps engineer must erect and maintain infrastructure and must possess strong operating system and networking skills. DevOps engineers benefit from a knowledge of multiple cloud platforms, CI/CD pipelines, software deployment, Docker, Kubernetes, Ansible, Jenkins, and Terraform. A DevOps engineer requires a strong background in network security, cloud security, adherence to protocols, laws, regulations, Quality Assurance, and test. A competitive industry requires tenacity. There could be months when it is very difficult to find work, and finding the right company culture makes all the difference.

M International: Recommendations for a Hybrid Data Center

Moving from an on-premise data center to a cloud-based data center can be a nerve-wracking experience, but I’m here to walk you through the process. A cloud-based infrastructure will save you thousands of dollars by allowing you to assign resources and scale resources back with the ebb and flow of production. A virtualized environment allows for data replication that ensures business continuity and safety for your customers. Virtualized infrastructure eliminates the need to purchase and maintain on-premise hardware, and organizations gain the ability to move their primary focus to production, increasing sales and revenue. Organizations quickly predict, monitor, and measure capacity to ensure the most performant environment for the cost. While integrating legacy systems and incompatible security systems introduces valid concerns when deciding to move to a cloud environment, a hybrid approach allows organizations to easily access the benefits of the cloud while keeping their sensitive da...

Assessing Risk in Cloud Migration and Automation

  My CSA Cloud Security Risk Ratings  Security Concerns:  major challenge (One mistake has far-reaching effects.) Data loss and leakage risks: major challenge (One mistake has far-reaching effects.) Regulatory Compliance:  major challenge (It is possible to have considerable AWS knowledge without having adequate knowledge of laws and regulations.) Integration with the rest of the IT environment:  moderate challenge (Encrypted VPN tunnels to facilitate communication over the internet are necessary for secure cloud communication with the rest of the internal infrastructure. While VPN isn't too bad to set up, it needs to be setup by a knowledgeable professional. It requires maintenance by a knowledgeable professional.) Legal Concerns:  major challenge (It is possible to have considerable AWS knowledge without having adequate knowledge of laws and regulations.) Cost:  major challenge for large companies, minimum challenge for small companies (One experienc...

Cloud Computing Adoption: Uncovering Corporate Drivers, Challenges, and Risks in the Cloud

          Cloud computing provides cost-efficient, scalable solutions to manage enterprise infrastructure. Organizations often fear surrendering control of their infrastructure to cloud providers; however, cloud proficiency and scalability entice organizations to restructure.          Cloud Adoption Drivers.  Cloud Computing: Concepts, Technology & Architecture discusses three business drivers that motivate organizations to adopt cloud computing platforms: “capacity planning, cost reduction, and organizational agility” (Erl et al., 2013, Chapter 3). Organizations utilizing on-premises infrastructure struggle to accurately predict capacity needs. When organizations fail to predict capacity needs adequately, organizations lose significant resources by over-provisioning or under-provisioning resource needs. A cloud-based infrastructure allows an organization to provision resources on demand and encourages an organization to adapt t...

Acquiring the Skill Set of an Ethical Hacker: A Comprehensive Exploration of Essential Competencies in Computer Science and Cybersecurity

    Background Summary Organizations rely on an ethical hacker’s ability to remain current to combat new attack vectors and comply with ongoing laws and regulations. Ethical hackers must continuously think outside the box and possess a strong desire to learn independently. Knowledge of operating systems . In order to attack or secure a machine, an ethical hacker must learn to navigate the environment by studying its software, hardware, and operating system functionality. Ethical Hackers require a detailed understanding of Kali Linux, Windows, and Ubuntu. By learning to approach vulnerabilities in different environments utilizing different skill sets, an ethical hacker’s toolbox expands, allowing them to evolve with an ever-changing attack landscape. Knowledge of Network Security . Malicious hackers exploit network protocols, infect modems and routers, breach firewalls, and bypass security measures. In order to test vulnerabilities, an Ethical Hacker must understand how systems...

Exploring Reconnaissance: Active and Passive Approaches to Intelligence Gathering

  The  MITRE ATT&CK framework Links to an external site.  serves to inform organizations about different techniques hackers use when gathering information about a target. It allows you to easily explore the different phases of an attack and visually see lists of methodologies used during each phase. The  OSINT framework Links to an external site.  provides detailed documentation breaking down each of the areas discussed in the MITRE ATT&CK reconnaissance section and lists different tools and websites that can be used to gather intelligence about a victim. In active intelligence gathering, malicious hackers send IP packets to their victim to probe the victim and observe their response. In passive intelligence gathering, malicious hackers collect information about their victim without ever interacting with the victim directly. Open Source Records provide public information about victims and organizations that hackers easily exploit. Hackers often explore n...