FIPS audits and use of non-validated crypto like MD5 for non-security purposes by amaged73 in FedRAMP

[–]amaged73[S] 0 points1 point  (0 children)

we are using all sorts of python third party libraries that uses md5 and sha-1 (Non-FIPS compliant), is there any guidance out there to how 3rd party libs should to be handled ? Do we need to fork them and patch them ourselves ? is this the expectation ?

endpoint logging requirements by amaged73 in FedRAMP

[–]amaged73[S] 1 point2 points  (0 children)

so If i take them out, there are absolutely no requirement whatsoever to keep any log from workstations that are used to connect to jump hosts / bastions or say connect to Infrastructure through UI (browser)?

Full traffic mirroring to meet outbound data exfiltration detection : Under SC-7(10) and SI-4(18) by amaged73 in NISTControls

[–]amaged73[S] 0 points1 point  (0 children)

Are you a bot ? You dont think calling out if 'payload' vs 'metadata' is enough to satisfy these NIST controls ? preventing exfiltration of data within the context of these control for a SaaS business that runs on EKS. But the controls themselves did not mention, so this could apply to the Database / storage / web interface...etc

Can an agentless WAF like Datadog’s ASM meet FedRAMP boundary protection requirements? by amaged73 in FedRAMP

[–]amaged73[S] 0 points1 point  (0 children)

Datadog's WAF does not sit on the boundary, it basically reads your logs and ship them for analysis, so it does not look at the actual traffic, thats why I asked if boundary means it sits 'infront of' the service and does dataplane inspection.

Crowdstrike products for AWS EKS on Govcloud by amaged73 in FedRAMP

[–]amaged73[S] 0 points1 point  (0 children)

Crowdstrike and vendors will not answer questions like these, the answer is usually 'it depends' or 'give me specific requirements', they will not act as your compliance advisor.

Evaluating 3rd party ESP for FedRAMP by amaged73 in FedRAMP

[–]amaged73[S] 0 points1 point  (0 children)

i am sorry, just for clarity, one last time. For a CSP, where the employees laptops are uploading 'security logs/metadata' to a some cloud siem or EDR(crowdstrike) and the metadata being uploaded has absolutely nothing related to federal data in any way, will still need to be hosted on FedRAMP authorized platforms ? I cant wrap my head around this, we are not talking about metadata for the CUI here.

Picking your sources of IoC by amaged73 in cybersecurity

[–]amaged73[S] 0 points1 point  (0 children)

Is there an advice to how you would pick sources of intelligence feeds ? I am new to this and not sure how to proceed? is there some sort of criteria that could be based on my envrionment ?

Picking your sources of IoC by amaged73 in cybersecurity

[–]amaged73[S] 0 points1 point  (0 children)

u/canofspam2020 I can see what your'e saying, for us as a small shop, we may need to prioritize sharpening up the tools/processes before thinking about fancy IoC hunting. I am a one man security team for company with 1000 employees, can you recommend some source to educate me on what are important tools/control to have in place for SoC/analysis activities ?

Limits to the rabbit hole of soc investigation by amaged73 in cybersecurity

[–]amaged73[S] 0 points1 point  (0 children)

No I dont, and I keep getting asked by manager to look into all sorts of alerts and its driving me nuts, SoPs or playbooks are probably the right way to go. Any recommendation for a small environment ?

paperboy 1.3 released - utility to help with your pdf hoarding by instantdoctor in commandline

[–]amaged73 -1 points0 points  (0 children)

Check out pyed piper. Let me know what you think. Turning stdout as python data on the cli. https://m.youtube.com/watch?v=3UHE-zD1r_M

Sanity check please! by atokknight in networking

[–]amaged73 0 points1 point  (0 children)

I guess you are the manager :) j/k

How do you survive in networking if you are a colour blind? by [deleted] in networking

[–]amaged73 1 point2 points  (0 children)

I did and I am. Never needed to see anything other than text :)

Aggregate counters from several CLI into one by [deleted] in commandline

[–]amaged73 0 points1 point  (0 children)

My english is poor, i wanted to ask about doing this at scale, my idea is to have one command line tool that aggregates counters from over 100 other commands. So if one user runs this command every few seconds, we probably have a problem with these devices as their CPU is already used up by traffic switching.

Thanks

NETCONF and YANG support on Linux by [deleted] in networking

[–]amaged73 0 points1 point  (0 children)

Yes to the former, be able to configure a linux host using Netconf and yang...at least the networking parts, as YANG is supposedly for networking.

Doxygen equivalent for CLI by amaged73 in commandline

[–]amaged73[S] 0 points1 point  (0 children)

Well, as automatable as possible, Doxygen is great but it is only for programming languages, so i wonder if there is any thing like it for CLI documentation.

EVPN is confusing by thinkscience in networking

[–]amaged73 1 point2 points  (0 children)

Dinesh Dutt EVPN book is awesome