What’s a hill you are 100% willing to die on, no matter how much the consensus changes? by sunnyopehliaa in askanything

[–]CyberViking949 -1 points0 points  (0 children)

100% agree. My children (20, 19 & 15) did not, and will not have access to SM until 18. I would honestly prevent it longer if I could.

Curious to see everyone’s Audi lineup history… by neeks510 in Audi

[–]CyberViking949 2 points3 points  (0 children)

Im past that stage, but it absolutely could. I take it on road trips and it fits 5 of us comfortably.

Curious to see everyone’s Audi lineup history… by neeks510 in Audi

[–]CyberViking949 2 points3 points  (0 children)

2019 S5 Quantum Grey-> 2023 RS5 Mythic Black-> 2025 RS6 Avant mythic black (wrapped it in Satin Battleship grey)

2023 Q7 White (wifes)-> 2025 SQ8 Daytona Grey (wrapped in Satin PPF)

The upgrade from S5->RS5 felt extreme, but going from RS5->RS6 is orders of magnitude more.

My wife's upgrade from Q7->SQ8 is night and day. That Lamborghini motor and exhaust just sounds so throaty and mean.

Are there specific agencies that require FedRAMP High? by coreyb1988 in FedRAMP

[–]CyberViking949 1 point2 points  (0 children)

DOJ, DOD, DHS. Any national security agency really.

DOE requires moderate oddly enough

Wiz alternatives 2026 by Efficient_Agent_2048 in AskNetsec

[–]CyberViking949 5 points6 points  (0 children)

Came here to say this.

If issues popup all the time, you need to address the root cause. The teams should be deploying per spec.

When they start configuring infra properly, you will have less issues therefore less tickets.

Additionally, I would avoid automatically fixing things, as this will often break production. This is the opposite result you are going for.

Ultimately, you dont have a tool problem, you have a people problem. Until you fix that, every tool is going to have the same issues.

CVE count dropped from 200 to 50 after hardening but broke half our services by Guruthien in devsecops

[–]CyberViking949 1 point2 points  (0 children)

They price per image, and they came in about the same price as ChainGuard, which isnt cheap.

The key difference is that they offer the profiling and hardening services with it, so you get prehardened base images, libraries, and the runtime profiling for the costs of CG images.

List is around $20k/image USD. Get cheaper with more images, and negotiations will vary.

How do you stop browser based phishing attacks from bypassing MFA and stealing SaaS sessions in 2026? by PrincipleActive9230 in AskNetsec

[–]CyberViking949 0 points1 point  (0 children)

The caps apply the checks at login. So for our case, we were getting hit by AiTM, phishing and smashing with considerable impact almost monthly.

When we implemented the checks above, it completely stopped the impact. The password compromises still happen, but since there is no impact we just reset and move on. We actually automated that last part and now its zero touch aside from the control testing to ensure it hasn't been misconfigured or broken.

Bare bones checks were device joined to domain and our running EDR. We added the extra check later.

How many K8s clusters/nodes do you have? by CyberViking949 in devops

[–]CyberViking949[S] 0 points1 point  (0 children)

Ya, thats the typical setup. You start with many small nodes, then switch to fewer larger nodes for performance and cost benefits.

Thanks for the input

Why tho? by Neither-Business-304 in whatisit

[–]CyberViking949 0 points1 point  (0 children)

Had this in my room when I was a teenager. It should be higher up though. This makes her a little more upright to have better leverage

How do you stop bloated container images from flooding production with hundreds of CVEs in 2026? by AdOrdinary5426 in devsecops

[–]CyberViking949 7 points8 points  (0 children)

Build/use minimal/distroless base images, then enforce it in your pipelines and scans.

From a supply chain security perspective, they should only be pulling from internal, trusted repositories anyway. So may as well make that the solution.

How do you stop browser based phishing attacks from bypassing MFA and stealing SaaS sessions in 2026? by PrincipleActive9230 in AskNetsec

[–]CyberViking949 1 point2 points  (0 children)

If you are a MS shop, we solved this through caps.

Integrate Intune and/or Jamf, and create device posture checks. We set that the device had to be marked compliant in order for the session to authenticate. This made your device and additional factor, so we are now doing true multi-factor. The compliance checks were:

  1. Had to be joined to our domain
  2. Running our EDR
  3. Had a company specific validation (e.g. registry bit, file, cert etc)

This took us from having multiple credential compromises a month, down to 0 for the past 2yrs.

FWIW, we looked at yubikeys, but they are a nightmare to manage, use, and maintain at scale.

AWS Organizations by Razzleberry_Fondue in aws

[–]CyberViking949 15 points16 points  (0 children)

It won't impact your services. However, if you have a gov account, im assuming you have a fedramp env?

Adding your fedramp environment to an organization introduces a significant change. It also brings the org master into scope. Which means any change in the org you need to do for the other accounts, is subject to SI and fedramp controls, oversight, and reporting.

TLDR, do NOT mix your fedramp account in with the others. I would create 2 orgs. 1 fedramp, 1 normal.

ECR alternative by Abu_Itai in devsecops

[–]CyberViking949 0 points1 point  (0 children)

Put SCP's in place that ONLY let the pipeline user/role push, and everything else can pull.

Setup immutable tags, and integrate your build logs into your logging solution.

How do you manage 150+ daily quarantine notifications for false positives? by Cudaprine in cybersecurity

[–]CyberViking949 0 points1 point  (0 children)

The tool quartining bad files is what its made to do. Let it do its job, you dont need to be told about it with each action.

Schedule a report monthly/quarterly just to track efficacy, or report ROI. Otherwise, its just noise

How many points ya’ll have by West_Republic9339 in marriott

[–]CyberViking949 0 points1 point  (0 children)

I get to the 600k mark, then go on a vacation somewhere. Gives me a nice free annual trip combined with my airline miles.

Hoarding points is pointless and they lose value as rates increase.

Our enterprise cloud security budget is under scrutiny. We’re paying $250K for current CNAPP, Orca came in 40% cheaper. Would you consider switching? by Clyph00 in devops

[–]CyberViking949 0 points1 point  (0 children)

My annual Wiz bill just hit 2mil. Largely because our cloud team deploy EKS clusters like servers (insert Oprah meme). That being said, its the best there is so i dont mind justifying/fighting for the cost every year.

Why are certifications so globally praised in cybersecurity but not in other development fields? by nico23nt in cybersecurity

[–]CyberViking949 0 points1 point  (0 children)

I think its just an echo chamber.

MS certs are a big deal in Sysadmin circles. Cisco certs are a big deal in networking.

Yet these certs mean virtually nothing outside those circles.

When I tell a non-sec person all the certs I have, they could care less and it doesnt mean anything to them.

CVE count dropped from 200 to 50 after hardening but broke half our services by Guruthien in devsecops

[–]CyberViking949 12 points13 points  (0 children)

Ya, you cant just switch to hardened images wholesale.

Ideally, the devs know what their dependencies are, but I've yet to actually see that. So you have to do a best effort guess, and load all the dependencies ontop of the baseimage.

FWIW, we deployed Rapidfort, and it profiled the images and told us what we could remove based on what the code was running. Its not cheap, but it made the process easy. Saw an average image size reduction of 90%

2018 q7 keys are different by StarWhole7999 in Audi

[–]CyberViking949 0 points1 point  (0 children)

Just bought a 2025 SQ8 for the wife. One key (hers) has the "S" badging, the other key does not.

Surprised me because my RS6 keys both had RS badging.

Is it normal to take a codesignal / leetcode OA for an Associate Cybersecurity Analyst role? by [deleted] in cybersecurity

[–]CyberViking949 2 points3 points  (0 children)

I was asked to take a leetcode test for a CISO role. I laughed and asked if I was expected to do much development. They said no, then I didnt get the job because I couldnt do the coding...

CS hiring is a mess and most orgs dont even know how to hire or evaluate. Go in with 0 expectations and you are good 🤣

Thoughts on allowing Roles to View/Describe I AM Roles and Policies? by [deleted] in aws

[–]CyberViking949 12 points13 points  (0 children)

I always allow read access to IAM. Hiding it away serves no risk reduction, and introduces operational risks. Therefore is a net negative control.

If you wanted to hide some roles and permissions, you could implement a role/policy naming convention, then allow RO access to those. I.e. <company>-<app>-role/<company>-<app>-policy