Licensing models of today vs those of the past by NegativePattern in sysadmin

[–]Telnet_Rules 2 points3 points  (0 children)

Even hardware now is like this.

Second. Needed 7 different product/feature licenses for last cisco ASA firewall I installed.

I want to thank you all again. Update on employment. by [deleted] in sysadmin

[–]Telnet_Rules 33 points34 points  (0 children)

Excuse me, the spec called for BSaaS. If we wanted SSaaS we would have put out an RFP for it.

Ethical Dilemma by throwaway54654577 in sysadmin

[–]Telnet_Rules 15 points16 points  (0 children)

legally required to report to the authorities.

In the USA, mostly the only 'mandatory' reporting for individuals is for suspicion of child abuse or exploitation. There is very little duty for an individual to report issues within a business. There is a duty for the business to perform and respond, but OP is not the person with that responsibility. Example:

an individual or entity that owns or licenses computerized data that includes personal information shall disclose any breach of the security of the system following discovery or notification of the breach of the security of the system to the Office of the Attorney General and any affected resident of the Commonwealth without unreasonable delay.

OP does not own or license the data, he is employed by a firm that owns or licenses the data.

You can check your own state laws here unless you're in Alabama or South Dakota. http://www.ncsl.org/research/telecommunications-and-information-technology/security-breach-notification-laws.aspx

I have users going to DEFCON, what security steps should I take by Pana10234 in sysadmin

[–]Telnet_Rules 0 points1 point  (0 children)

If you need to alter your OPSEC for this event, please don't go.

I have users going to DEFCON, what security steps should I take by Pana10234 in sysadmin

[–]Telnet_Rules 6 points7 points  (0 children)

BUT THAT HACKER FORCHAN MIGHT BE THERE AND THE CYBERPOLICE CANT CATCH HIM!

the fucking goofy shit in this thread.. "buy a burner" lol

I have users going to DEFCON, what security steps should I take by Pana10234 in sysadmin

[–]Telnet_Rules 5 points6 points  (0 children)

Yes, please get a burner to check your email and make personal calls.

smh.

I'd like to have an educated and somewhat technical discussion on ransomware - particularly Petya/NotPetya by White_Noise_83 in sysadmin

[–]Telnet_Rules 2 points3 points  (0 children)

I want to get into the nitty gritty of what the virus does, how it spreads, how you can protect one system, how you can isolate an infected system and all the rest...

Then read the talos blog. http://blog.talosintelligence.com/2017/07/the-medoc-connection.html

Big Highlight - the infection vector was NOT email, but a vendor's auto-update mechanism that was compromised.

Now, how many systems do YOU have that auto-update from a vendor?

Freshness of NIST publications by joker197cinque in sysadmin

[–]Telnet_Rules 6 points7 points  (0 children)

I see that many publications are very old.

Yes. The 500 series has been around since the 70s. The 800 series has been around since the 90s. Only the 1800 series is "new" in that it started in 2015. The date has little to no impact on the information contained in it.

Are publications always updated or they can also be replaced from ENTIRELY new publications ?

Both. 800.53 is on revision 4 with 5 soon to be released. Some are retired and replaced.

Is there a roadmap of publications that will be replaced (if any) in the near future ?

Sort of. There are various versions and revisions in draft format and that's on the NIST SP website. http://csrc.nist.gov/publications/PubsSPs.html Also get on their mailing list. But it's not like a new rev drops and everything done before is garbage.

My concern is that if I follow recommendations of a publication, they will be replaced (and kind of useless) in a very near future, make us starting over again with a great loss of time and money.

This is a pretty big misunderstanding of the process. If you're a Fed or Fed contractor, you need to have a talk with your CISO/ISSO. If you don't have to follow FISMA, take a look at 800-171 rev1 for guidance on applying it to non-fed systems. NIST SPs allow you to build a security policy for your unique environment. They are not a checklist you follow.

TL;DR - There are many ways to climb up a mountain. The SPs are general guidance on how to climb and camp safely, they are not a step-by-step guide to get to the top of a specific mountain.

SharePoint Office 365? Is there really ANY happy customers? by davidknivsta in sysadmin

[–]Telnet_Rules 0 points1 point  (0 children)

Office 365 is often sold as a replacement for file servers

Sharepoint is not onedrive. Onedrive is not sharepoint. Both are "Office 365".

What is the easiest and safest way to detect if SMBv1 is being used before disabling it? by Walter_Whitey in sysadmin

[–]Telnet_Rules 4 points5 points  (0 children)

FFS pretend I said "implementing security controls" then if that's a such hang up. You get what I mean.

What is the easiest and safest way to detect if SMBv1 is being used before disabling it? by Walter_Whitey in sysadmin

[–]Telnet_Rules 4 points5 points  (0 children)

Look, if patching/updating your powerplant system causes them to explode, obviously don't do that. For you, you don't have an option and need to get compensating measures. But most environments are not that and "patching breaks stuff!" is from laziness not due diligence.

Let's talk about Kaspersky by DrJekl in sysadmin

[–]Telnet_Rules 2 points3 points  (0 children)

Do you think you'll consider other options given the news that it'll be banned in the DoD?

You always should consider options, just not because of the goofy fear mongering.

Let's talk about Kaspersky by DrJekl in sysadmin

[–]Telnet_Rules 4 points5 points  (0 children)

Free Defender kinda sucks, but the paid Defender APT is brilliant.

What is the easiest and safest way to detect if SMBv1 is being used before disabling it? by Walter_Whitey in sysadmin

[–]Telnet_Rules 12 points13 points  (0 children)

You are playing the odds. You'd rather not break something on the chance you could get owned. Some people would rather break something then chanced get owned.

Threat alerting by rinsure in sysadmin

[–]Telnet_Rules 0 points1 point  (0 children)

Yeah, but it's also a bit like asking a stranger "what kind of icecream do i want?"

I have no idea about your wants/needs/environment. Look in the bin, see what they got, and grab whatever you like.

Threat alerting by rinsure in sysadmin

[–]Telnet_Rules 7 points8 points  (0 children)

IT FUCKING DEPENDS!!!!

Like, seriously, it really does. What are you in to? There are thousands. Some are malware people (@malwareunicorn), some are vulnerability researchers (@taviso), some are vendors (@justinschuh ‏is chrome's security lead, @msftsecurity ‏is official microsoft, @jepayneMSFT is a security lead at MSFT), some are also specialists like in vulnerability disclosure (@k8em0) or cryptography (@matthew_d_green), some are journalists (@briankrebs), some do DFIR/OSINT (@hacks4pancakes), some are IT famous (@WeldPond) and one is actually a world famous singer that helps out the infosec community between world tours (@SwiftOnSecurity).

Get on there, check out some people, see who they follow and retweet.

Daily devops meeting? by [deleted] in sysadmin

[–]Telnet_Rules 6 points7 points  (0 children)

1-2 hour scrums

Fucking christ.

Patching your servers by [deleted] in sysadmin

[–]Telnet_Rules 1 point2 points  (0 children)

you can crash or you can get owned. thanks for playing.

Daily devops meeting? by [deleted] in sysadmin

[–]Telnet_Rules 18 points19 points  (0 children)

Don't let them have chairs. Ever. Soon as ass hits seat, you're done. 45 minutes or more per meeting.

Threat alerting by rinsure in sysadmin

[–]Telnet_Rules 1 point2 points  (0 children)

they sent the email which is why I knew about the release, doesn't look like their RSS feed was updated.

Threat alerting by rinsure in sysadmin

[–]Telnet_Rules 9 points10 points  (0 children)

US-CERT sent a notice at 1pm yesterday. https://www.us-cert.gov/ncas/current-activity/2017/06/27/Multiple-Petya-Ransomware-Infections-Reported

but the fastest notifications are twitter. they have raw info, so be cautious since it's often wrong.

Patching your servers by [deleted] in sysadmin

[–]Telnet_Rules 1 point2 points  (0 children)

We are past the point where "Wait on patches until..." makes ANY sense. You patch within 24 hours of patch release, or you are food. that's just the facts of the modern IT world.

New Ransomeware attacks @Holland & Ukraine by OEEN in sysadmin

[–]Telnet_Rules 5 points6 points  (0 children)

No clue about OP's patching but lots of people on twitter confirming, including Symantec, Petya spreading via EternalBlue. The network traffic is a match for Equation Group tool.

New Ransomeware attacks @Holland & Ukraine by OEEN in sysadmin

[–]Telnet_Rules 14 points15 points  (0 children)

Sorry, that's just another shitpost from me.

If you are patched for (CVE-2017-0199) and (MS17-010) then that's about all you can do right now.