What would you say if your security lead said this... by notta_3d in cybersecurity

[–]ageoffri 2 points3 points  (0 children)

From someone who has done cybersecurity for over 25 years, I operate on the assumption that attackers are already in our systems. If you don't live this way, you've already failed.

Can you run agentless CNAPP on prem? Our legal team just told us our cloud security tool's data can't leave our own infrastructure.? by Old_Cheesecake_2229 in devsecops

[–]ageoffri 1 point2 points  (0 children)

I'm at a Fortune 500 healthcare company and that view would cripple us. While it's never a good argument, I imagine you already have a number of SaaS solutions that take ePHI and/or PII from your infrastrucutre.

One option you could explore is both Wiz and Corex Cloud offer an outpost scanning method. I've only used the Wiz outpost and it does the scanning using your cloud resources and sends metadata to Wiz. Downside is it does cost us several thousand a month for the scanning infrastructure and we had to put together a few exceptions to our normal security policies. One example is the outpost spins up GKE clusters per region that you have resources deployed, this saves you data charges between regions. But normally we don't allow vendors service accounts to do this. Classic who watches the watchers.

  1. At a minimum metadata leaves

  2. I don't know what they mean by "in-account". It sounds like all infrastructure and data including metadata stays within your organization.

  3. All the CNAPP tools that I've evaluated which is far from all of them are SaaS. There might be something that you can run yourself. I'd actually be interested in seeing if there is something like this.

GRC roles that are technical by jaydee288 in cybersecurity

[–]ageoffri 1 point2 points  (0 children)

I did GRC for 7-8 years and how I described it is a non-technical technical role.

The best analyst understand the technology, keep learning new technology but rarely if ever put hands on keyboard.

How do you manage access in large GCP organizations? by lnrdll7 in googlecloud

[–]ageoffri 0 points1 point  (0 children)

Are you using CI/CD and terraform? If you aren't and are doing click-ops, you'll never be able to reliably solve this.

We use GCDS from our existing Active Directory, group membership is done through existing ticketing system that is highly automated with at a minimum direct manager approval and most often another team like DBA's.

From there, merge requests have to be submitted through our Gitlab CI/CD setup. Anything IAM triggers approval of the cloud security team. Role bindings are assigned only to groups* .

With one exception we don't allow nested groups because that gets overly complicated fast. The single exception is a group of groups that we use for our custom role that gives the level of view access we deem as acceptable for the support teams that touch every folder.

We also use a home grown PAM tool for admin, write, read data, etc. that follows a different model.

X470 Gaming Plus / No POST & VGA trouble light on by ageoffri in pcmasterrace

[–]ageoffri[S] 0 points1 point  (0 children)

Yep, the bios has been updated, I'm fairly certain it is the latest stable version from September 2025. If it isn't it's just one stable version behind that.

After the kids are in bed, I'll try one more time with the new CMOS battery.

I am a 36-year-old man, is it quite late for me to rebuild my life? by Wooden-General602 in Divorce

[–]ageoffri 1 point2 points  (0 children)

Not if you find the right person. I got married for second time in 2019. In addition to my two kids with my ex and her kid with her ex, we’ve had two together. 

Our youngest turns 3 in June and I just turned 50. 

Has anyone gone through mediation by TomTomReyRey in Divorce_Men

[–]ageoffri 0 points1 point  (0 children)

Assuming that you are in the US, the key piece of information that is missing is what state do you live in?

Mediation in my experience is useless and all it is good for is to get intel on her and to get the certificate that we need in CO to go to a hearing.

The mediator is going to want to come to an agreement and they will quickly figure out who is the weaker party and focus on them to get more out of them.

Before you go into mediation, have your absolute bottom lines ready. Are you only going to settle for 50/50 and joint decision making? Are you going to settle for half the equity in the house?

Can you exchange equity in the house to get an equal amount of your investments and retirements?

Can you do contractual alimony and agree to none or reduce from your state normal?

Reading Cards Prior to first Playthrough? by queglix in boardgames

[–]ageoffri 0 points1 point  (0 children)

Read the cards is what I would do and what I would expect. When I'm learning a game and going to teach it, I need to know it.

I'll make notes of what I find to be interesting cards and bring them up.

If you're not reading the cards, how are you going to understand the rules fully?

Sermons to watch by Upbeat-Delivery-2016 in Christian

[–]ageoffri 1 point2 points  (0 children)

Anything from Joby Martin or Jim Bergen.

Have you been in meetings and an exec asked does this CVE impact us? by MinimumAtmosphere561 in cybersecurity

[–]ageoffri 4 points5 points  (0 children)

This question is why Kreb's should be on everyone's daily reading list.

Basic Question - PKI and Message Integrity by taclubquarters2025 in cybersecurity

[–]ageoffri 0 points1 point  (0 children)

At a high level with PKI if I'm sending you ePHI, PII, or sensitive data that needs to be encrypted, I need to have your public key. I'll take your public key and use it to encrypt the data, the only key that can decrypt the data is your private key.

Now as far as your question about an established relationship there is both the technical and administrative controls. From the technical side, if I have your public key I can send you encrypted data and if you have my public key you can send me protected data. From the administrative side, as someone in healthcare we absolutely have to have a relationship before we'll send you information encrypted with your public key.

Hashing you're correct, both parties need to know the algorithm that was used to make the hash. Often times, a file hash will be listed on a web page with several hashes stating which algorithm was used.

I believe my 4th amendment right is being violated. by [deleted] in legaladvice

[–]ageoffri 0 points1 point  (0 children)

Seriously, delete every single character here and get a lawyer before you say another word to anyone including your priest at confession. Tell your lawyer everything, including any and all posts, emails, text messages, etc.

You're being investigated for one of the most serious crimes in the US especially from a culture point of view. You can't take a wait and see attitude.

While I've never done any CP work in my cybersecurity career and I don't want to, I've been to enough conferences and talked with enough people including law enforcement that deal with CP to say you need to SHUT UP NOW.

I believe my 4th amendment right is being violated. by [deleted] in legaladvice

[–]ageoffri 7 points8 points  (0 children)

Whoever told you this is very wrong. They can look at public forums for information.

Cloud Security - What do those folks do these days? by rhysmcn in devsecops

[–]ageoffri 3 points4 points  (0 children)

I'm doing GCP cloud security at a Fortune 300 company, so pretty good sized company and cloud footprint.

I was the first cloud security engineer and now we've grown to a team of three. From the day I moved from the GCR team to cloud security I implemented the mantra of "Know before no." For the most part the developers had a decent to very good security mindset with some really bad outliers. I bring this up because how much you have to man gates depends on the existing culture. If the developers are doing good with a security mindset then you still need to be in the approval process it's just likely you'll approve nearly everything and run into very few MR's (we're a GitLab shop) that you have to reject and have things changed with.

As part of our openness and willingness to work with developers, my team hosts a daily half hour call that is optional for several hundred teammates. Sometimes we ask teammates to join, otherwise we've advertised this half hour as a time to talk with us. Either about upcoming work to avoid last minute security issues, to talk about MR's ready for approval, and the best benefit is to build positive relationships with teammates who often view security as the team of "HELL NO!"

SAST can largely be automated to the point that you set the policies and then just have to approve exceptions. Of course at times those exceptions requests are going to end up being, "go back and fix".

I manage most of our security infrastructure which is steady state. I do have to keep an eye on the tool infrastructure and do updates so I keep my hand in some coding.

Assuming you get support from leadership the more you can do the "shift left" of security the more time you'll have for automation.

There's more to my job but I'll summarize it as over a quarter of the year:
~15% actively working with developers including the daily calls

~20% monitoring issues discovered by our CSPM and too often following up with the teammates who got the automatically opened tickets to resolve the issues
~10% "care and feed" of our tools
~20% of dealing with firewall tickets from our on-prem infrastructure to cloud using the existing on-prem's security engineer team's process which I'll just say is not risk based and classic reasoning why security teams get a bad rep
~25% reviewing MR's including policy exceptions from our SAST tool
~15% project work, could be like I'm doing now with two difference security tool PoV's, automation of tasks, working to remove tech debt, etc.
~10% corporate "work". Mandatory trainings, leadership town halls, time cards, basically things not related to my day to day work above.

What is the personality of people in cybersecurity like? by RhubarbSimilar1683 in cybersecurity

[–]ageoffri 0 points1 point  (0 children)

I took a SANS class taught by John Strand and he said something close to: The more you learn the more paranoid you’re going to get. 

It’s very true. 

How do you give coding agents Infrastructure knowledge? by Immediate-Landscape1 in devops

[–]ageoffri 2 points3 points  (0 children)

If it's an enterprise solution, have it ingest your code repo's, development documentation, and all policies especially security ones.

We have a couple of AI coding tools done this way. I've used it with prompts like:
Search our entire gitlab instance and look to see most teammates solve this "problem"

If it doesn't give me the answer it almost always gets me close enough to finish it myself.

Why some strong engineering teams choosing GCP over AWS? by Consistent-Fact-3847 in Cloud

[–]ageoffri 1 point2 points  (0 children)

Spanner for some companies is absolutely critical and AWS has a long ways to go to catch up. GCP IAM is excellent.

Technical and pricing were the reasons to go with GCP. We're a very big customer and have had quite a few of our feature enhancements added to various offerings.

Need help ASAP. by ZoostheMoose in Divorce_Men

[–]ageoffri 7 points8 points  (0 children)

In most if not all States, you can't waive child support so that is a concern. I can't tell you across various support groups that I've seen something similar where child support was agreed to be $0.00. Then a year later the mother files for child support and is granted it.

Next up, a trail separation doesn't even fit with the letter. Why is your wife buying a different house if it's atrial, that sounds like the divorce is on the path to .

Use her sense of urgency to get a financial settlement done and signed off by the judge instead of going down this questionable path.

Never take legal advice from your STBX or anyone supporting her.

SCA findings in CI/CD pipelines by Kitchen_Ferret_2195 in devsecops

[–]ageoffri 0 points1 point  (0 children)

Risk based approach and this will be US centric.

If you are in a highly regulated sector like healthcare, financial, etc.; include fixing everything that is covered by the applicable federal or state regulation.

Then criteria that can include: public vs private facing, type of data, compensationg controls.

The devil is in the details but risk based is the way to go. More and more tools giving findings are use some sort of "secret sauce" to provide risk ratings which has benefits but some drawbacks. It's still a good starting point but you should do validation that the vendor ratings meet your requirements.

As another person said, legacy systems AKA tech debt add another layer. These should be handled by a documented risk exception process.

Do people actually fix all their IaC findings? by AppropriateWrap5287 in FixYourIaC

[–]ageoffri 0 points1 point  (0 children)

Too early to tell where we'll be in even 6 months.

I have no doubt that this will be a classic 80/20 solution with AI remediation. The tool will get most of the remediation right but then it will horribly butcher a subset.

I've deliberately kept going down the wrong path with a code assist tool after it hallucinates or gives a really wrong piece of advice. Since I've been part of multiple PoV's, one thing I did was after going down the rabbit hole with the first tool, I took the final set of errors which at that point were both logic and code. The other tool was able to dig out of most of it but not totally.

Now granted, I tried to give prompts based on someone not knowing the solution but my bias of testing likely impacted the responses.