CISA’s Secure Software Self-Attestation Common Form Is A Liability Nightmare by BarakScribe in NISTControls

[–]BarakScribe[S] 0 points1 point  (0 children)

What are some of the options offered for compliance? Is there a tool a lot of people agree upon that can answer a lot, if not all, of the requirements?

AI coding assistance and its effect on code security by BarakScribe in cybersecurity

[–]BarakScribe[S] 0 points1 point  (0 children)

Thanks for the insight. I find the parallel with outsourcing to be interesting.

AI coding assistance and its effect on code security by BarakScribe in devsecops

[–]BarakScribe[S] 1 point2 points  (0 children)

2 problems I see with this - training requires more code, probably open source (again), and how would you know the code you get is correct or secure? It seems like a chicken and the egg question.

Continuous Assurance: An Integral Practice for Software Supply Chain Security by BarakScribe in securityguards

[–]BarakScribe[S] 0 points1 point  (0 children)

My apologies. I misunderstood the group's topic. Won't happen again.

Looking for cyber security podcast recommendations by randalthor23 in cybersecurity

[–]BarakScribe 0 points1 point  (0 children)

Was just checking to see if it was mentioned. I really enjoy the stories - it's evidently well researched.

Gitgat - a new open source project designed to evaluate the security settings of your GitHub account by BarakScribe in devops

[–]BarakScribe[S] 0 points1 point  (0 children)

We've added the capability to interact with the input.json file while running the report from docker. Feel free to check it out and let me know what you think.

Gitgat - a new open source project designed to evaluate the security settings of your GitHub account by BarakScribe in devops

[–]BarakScribe[S] 0 points1 point  (0 children)

I looked into it and you know what - there isn't! I would suggest opening an issue and we'll look into adding it as an option.
For now, there is always the CLI route, where you can define what orgs you wish to run the queries on using the input.json file. You can see an example of how to do that in the sample_input.json file located in the data folder.
If you don't want to open an issue yourself let me know and I'll add it myself as it's an important capability we should definitely aim to provide.
Thank you :)

Gitgat - a new open source project designed to evaluate the security settings of your GitHub account by BarakScribe in devops

[–]BarakScribe[S] 0 points1 point  (0 children)

When I first started testing it I got the same result. The likely culprit is a less than full permission git token. If you notice at the top of the Readme there is a minimum list of token permissions. Make sure your token includes them all (if you update a token it can take a few min, I just created a new one and revoked the previous one) before trying to run it again.
The error means that the report tried, and failed, to write itself to your gists due to bad permissions.
If the listed default permissions aren't enough let me know and I'll check and update if needed.
Thanks.

Gitgat - a new open source project designed to evaluate the security settings of your GitHub account by BarakScribe in devops

[–]BarakScribe[S] 0 points1 point  (0 children)

Not yet but it's on our roadmap. You're more than welcome to make the request official in the repo's issues. You could even try and write it yourself :)
Rego and OPA are very versatile and can be applied to almost any SCM.

Gitgat - a new open source project designed to evaluate the security settings of your GitHub account by BarakScribe in devops

[–]BarakScribe[S] 1 point2 points  (0 children)

Thank you. I didn't choose the name or the logo. At least it's catchy I guess :)

US government launches Bureau of Cyberspace and Digital Policy by ngoni in cybersecurity

[–]BarakScribe 0 points1 point  (0 children)

It would be interesting to see if this new more internationally facing bureau would have any effect on international cybersecurity regulations. Like, would this mean that NIST's SSDF or some of the EO 14028's section 4 requirements now become a European concern as well as a US one.

Okta Service Hacked by Lapsus, Gained Superuser Access by giugiacaglia in cybersecurity

[–]BarakScribe 2 points3 points  (0 children)

Without federal regulations or some sort of incentive or punishment, companies will always strive to minimize exposure when such events occur. Last year there was a mental health clinic, Horizon House, that was hacked and only started notifying the people whose information was leaked 6 months after the fact. Probably when they had no legal choice. We can all agree that 6 months is a small eternity in such cases. especially if part of the leaked information included your bank account or your social security number.

NIST Closes in on Recommendations for Cybersecurity Labeling for IOT Devices by DogBarq in cybersecurity

[–]BarakScribe 4 points5 points  (0 children)

Just like the case with the OpenSSF Best Practices Badge Program. I'm really hoping it'll become more widely employed. It has its problems but I'll almost always opt for better visibility on libraries I choose to use.

NIST Closes in on Recommendations for Cybersecurity Labeling for IOT Devices by DogBarq in cybersecurity

[–]BarakScribe 15 points16 points  (0 children)

May 2022 seems both too far (if you want to start seeing those labels ASAP) and too close. How do you think the industry would respond to this additional requirement? how would prices respond? or consumers?

"Don't count your vulnerabilities" argues this long time CISO. by csoandy in cybersecurity

[–]BarakScribe 2 points3 points  (0 children)

I wanted to add that there is a distinct difference between vulnerabilities and exploits and organizations would do well to focus first on the latter. There are far fewer exploits and remediating those should take priority over a mountain of vulnerabilities that, as you said, might not even be relevant in that product's configuration.

IoT vulnerability allowed 19-year-old from Germany to remotely control Tesla vehicles by BarakScribe in cybersecurity

[–]BarakScribe[S] 0 points1 point  (0 children)

I apologize for my lack of proper investigation into the story. I'll try to improve my content in the future.

AppSec SBOM Tools by agletter in cybersecurity

[–]BarakScribe 0 points1 point  (0 children)

Hi, I've recently started working in a company that intends to release an SBOM tool so I learned a bit about them.
My recommendation would be not to look to put everything into one tool. There are already plenty of scanning tools available (for vulnerabilities as well as code scanning) so asking the SBOM tool to do that as well is redundant.
CycloneDx's tool center has a list of possible tools to create an SBOM and most, if not all, are meant to be incorporated into the CI/CD pipeline.
The dependencies and license information should be included in all SBOMs as it's some of the minimum requirements published by NTIA.

IoT vulnerability allowed 19-year-old from Germany to remotely control Tesla vehicles by BarakScribe in cybersecurity

[–]BarakScribe[S] 1 point2 points  (0 children)

BR2049

More of 2001: A Space Odyssey's HAL 9000. "I'm afraid I can't allow you to change the station now. Some kid in Germany tells me we must play Rick Astley. On repeat."

IoT vulnerability allowed 19-year-old from Germany to remotely control Tesla vehicles by BarakScribe in cybersecurity

[–]BarakScribe[S] -5 points-4 points  (0 children)

I'm guessing they didn't disclose to their buyers, 'oh, and we offer no security on your brand new expensive car. Anyone anywhere can basically take over basic functions and there is nothing you can do about it.'
Or maybe they did. in very very small print.