www.scmagazine.com Open in urlscan Pro
2606:4700:20::ac43:45e3  Public Scan

URL: https://www.scmagazine.com/podcast-segment/security-product-metrics-ml-101-peach-for-cloud-log4shell-lookback-appsec-tools-...
Submission: On June 16 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Log inRegister
Topics
Events
Podcasts
Research
Recognition
Leadership
About CRA



ADVERTISEMENT




Application Security WeeklySubscribe
Cloud security, Application security


SECURITY PRODUCT METRICS, ML 101, PEACH FOR CLOUD, LOG4SHELL LOOKBACK, APPSEC
TOOLS – ASW #224

January 2, 2023


Metrics for building a security product, hands-on image classification attacks,
a proposed PEACH framework for cloud isolation, looking back at Log4Shell,
building an appsec toolbox



Full episode and show notes

HOSTS

Mike Shema
Tech Lead at Block

 1. 1. Tracking Meaningful Security Product Metrics
    
    Building security capabilities within an org is an engineering task. It may
    require specific domain knowledge in areas like authentication and
    authorization, but it also requires product management skills and metrics to
    determine whether features are worthwhile or effective.

 2. 2. Machine Learning 101: The Integrity of Image (Mis)Classification?
    
    This doesn't break new ground on attacking image classifiers, but it does
    provide an interactive example for learning fundamental concepts behind the
    attacks. It's a cool use of an interactive blog post -- a gist file that
    sets up a Jupyter notebook to experiment with machine learning.
    
    Additional resources:
    
     * Gist
     * https://www.tensorflow.org/tutorials/generative/adversarial_fgsm

 3. 3. Mitigate the risk of isolation escape with the PEACH framework
    
    A proposed standard for describing and managing tenant isolation from cloud
    service providers. The high level concepts, such as hardening privileges or
    encryption or authentication, could serve as a reminder for areas to address
    within any software project.
    
    Of course, it's also an anagram for CHEAP -- but it's going to be expensive
    to shift the industry towards naming conventions like this, as much as it's
    already expensive to go through the engineering necessary to attain strong
    hardening.

 4. 4. Avoiding the Next Log4Shell: Learning from the Log4j Event, One Year
    Later
    
    We avoided referencing this flaw for the last few months, but we can't
    escape 2022 without mentioning it one last time.
    
    There's a quote from the article, "..an independent third party code review
    likely would have caught the vulnerabilities that led to Log4Shell, and such
    a review likely would not have cost more than $100k."
    
    Even a secure default, where JNDI would be disabled, would have saved
    significant time and headache for all the orgs that needed to address this
    vuln in software that never used the feature. If there's one shift in appsec
    for 2023, I hope it's a recognition of "hardening guides" as anti-patterns
    and the introduction of secure defaults plus "de-hardening guides" -- I'm
    just trying to figure out a better name than de-hardening, unhardening,
    softening, and weakening. Naming things remains a hard problem in software.

 5. 5. The Open Source Software Security Mobilization Plan
    
    This isn't a new article. It's one to think about going into 2023. The
    OpenSSF created a mobilization plan with a goal for investing in and
    securing open source projects by improving many practices.
    
    One step was determining what critical projects are out there. Here's a
    rough list of a few possible candidates.
    
    Another step was choosing to re-implement fundamental tools in memory safe
    languages. The Prossimo project has been investing in this area.

 6. 6. [TOOL] Homebrew/brew: The missing package manager for macOS (or Linux)
    
    This year we'll highlight more resources for your appsec toolbox. They may
    be familiar tools with more than a decade of code behind them or something
    new. But they will be something that solves a problem and is good to have
    ready from the command line.
    
    The Homebrew project is a package manager for adding open source tools to
    macOS (or Linux).
    
    Use the brew command to list, review, add, and remove tools that either
    don’t come by default on your system or to get new versions of those that
    do.
    
    Everything it does is well contained within its own directory structure. It
    won’t clobber any of your system commands.
    
    As we cover more tools throughout the year, brew will be the best way for
    macOS (and Linux) listeners to follow along.

Akira Brand
Developer Relations at Bright Security
www.akirabrand.com
 1. 1. With SASE Definition Still Cloudy, Forum Proposes Standard
    
    SASE (pronounced 'sassy') has become an industry buzzword, with companies
    claiming to be SASE compliant or have products that supported SASE. This
    article dives into a recent initiative by the nonprofit MEF to standardize
    SASE, which will lead to these cloud services being able to work together in
    a more streamlined fashion. Also of note is the Gartner analysis that SASE
    will be a trend to have significant impacts on infrastructure and operations
    in the next 6-12 months and that organizations may not necessarily "wait up"
    for standardization of SASE terms and procedures.
    
     * Piggybacking off the announcement article of MEF introducing new
       standards for SASE
       (https://www.darkreading.com/cloud/sase-definition-still-cloudy-forum-proposes-standard),
       here is the actual framework proposed by MEF.
    
    As per the document summary:
    
    "This document defines a Secure Access Service Edge (SASE) Service Framework
    and specifies Service Attributes that need to be agreed between a Service
    Provider and a Subscriber for SASE Services, including Security Functions,
    Policies and Connectivity Services."

 2. 2. Missing Bricks: Finding Security Holes in LEGO APIs
    
    API Security is a hot topic while often being an organizational
    afterthought. Since API security is a relatively new discipline, gaps in
    logic abound, and developers and AppSec professionals are often left without
    clear guidelines and have to figure things out as they go along.
    Highlighting this issue is the insecurity of LEGO APIs, which Salt Labs have
    researched and discovered issues inside of, such as XSS.
    
    As far as this relates to 2023 and beyond, according to research by Future
    Market Insights, The API security market is expected to grow 26.3% between
    2022 and 2032. Gartner also estimates that attacks on APIs will soon become
    the most-frequent attack vector for Web applications, although it is unclear
    on how 'soon' soon is.

 3. 3. GitHub brings free secret scanning to all public repos
    
    Exposed secrets are a big problem in public GH repos, with up to 1.7 million
    secrets available to the public. However, the scan tool available from GH to
    catch these secrets is a paid feature...until now! You will be notified of
    leaked secrets automatically as long as you enable this feature in GH's
    security settings.

 4. 4. TOOL – We Hack Purple
    
    Community is a powerful tool. Come join CISOs, red & blue teamers, AppSec
    pros, cyber enthusiasts, and novices in this online, moderated community. We
    have plenty of free courses, as well as regular community events. Full
    disclosure: I'm a moderator!

John Kinsella
Co-founder & CTO at Cysense

 1. 1. How two developers approach the same problem
    
    I thought this was a fun article to read on how two developers approach the
    same problem, but also as a thought experiment for how I could do similar
    with a coworker or friend. Always great to see somebody else's point of view
    on things!

 2. 2. Samba issues security updates
    
    Two of the vulns patched were disclosed by msft in November's Patch Tuesday.
    Serious question: Is it a good thing when your open source package so mimics
    a commercial version that it gets the vulns, too?

 3. 3. Push ESP32 updates OTA from github
    
    Technically, this is an interesting article to me - using the CI/CD
    constructs like GitHub Actions to deliver firmware updates to distributed
    microcontrollers.
    
    But also - the idea of thinking ahead to realize that you'll have to perform
    updates on the microcontroller that you installed at grandma's really warms
    my heart.

 4. 4. [TOOL] Parrot Security Distribution
    
    While historically I've been a Kali Linux user, after a recent drive crash
    and re-installing my VMs, I found Parrot Security and decided to give it a
    try. To me, it feels a little cleaner and easy to use, compared to Kali.
    Haven't made up my mind to fully adopt it, but it's what I'm experimenting
    with over the holidays!


RELATED

Cloud security

WADING INTO THE WIDE WORLD OF WAF – DANIEL CORBETT – ESW #321

June 15, 2023

The WAF has a relatively long history with InfoSec. A few years back, we saw the
traditional architecture separated by new technologies and philosophies on the
best way to detect and stop web-borne attacks. In this episode with Daniel
Corbett, we'll take a deep dive into the latest on WAF capabilities, what it
means to be 'next-gen' in the WAF worl...
Cloud security

SECURITY @ SCALE: BUILDING TRUST, STARTING WITH CYBERSECURITY – ROB DUHART JR –
CSP #126

June 13, 2023

10,500 storefronts. 2.3 million associates worldwide. $572.8 billion in revenue.
Today’s cybersecurity landscape is complex, as attacks can deliver disruption in
the blink of an eye. The focus of Walmart’s Information Security team is to
secure our operating environment in the service of building and maintaining
trust with our customers, associates...
Cloud security

VERIZON DBIR, CVSS 4.0, SECURITY AT SCALE, BIG IAM CHALLENGE – ASW #244

June 12, 2023

This year's Verizon DBIR is out, CVSS is updating its methodology, poor password
reset design, SQL injection in MOVEit, a CTF for AWS IAM

ADVERTISEMENT



ADVERTISEMENT



X



--------------------------------------------------------------------------------

ABOUT US

SC MediaCyberRisk AllianceContact UsCareersPrivacy

GET INVOLVED

SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us

EXPLORE

Product reviewsResearchWhite papersWebcastsPodcasts

Copyright © 2023 CyberRisk Alliance, LLC All Rights Reserved. This material may
not be published, broadcast, rewritten or redistributed in any form without
prior authorization.

Your use of this website constitutes acceptance of CyberRisk Alliance Privacy
Policy and Terms & Conditions.

COOKIES

This website uses cookies to improve your experience, provide social media
features and deliver advertising offers that are relevant to you.

If you continue without changing your settings, you consent to our use of
cookies in accordance with our privacy policy. You may disable cookies.

Accept cookies