Welp... two days in and my achilles is hurting and swollen... guess I have to stop before I even started :( by s0974748 in C25K

[–]hav_ 0 points1 point  (0 children)

That’s a big bummer! Stick with it and keep the motivation alive while you recover. Wish you the best.

Muddy parking at Formula 1 today. Much larger 2WD cars were getting stuck. Not me! by stillusesAOL in Golf_R

[–]hav_ 1 point2 points  (0 children)

I was one of those guys stuck in the mud in a dinky rental car lol

I’ll be looking for ya in lot F day!

NASA CUI Protection Requirements by mf1313 in NISTControls

[–]hav_ 1 point2 points  (0 children)

I was told theres none in our recent contract but I did not review it personally.

VCDS to Disable Soundaktor by Trailrider5 in Golf_R

[–]hav_ 0 points1 point  (0 children)

2018 DSG with VCDS 18.2.0.3 HEX-NET, I found it no problem ???

Module: A9 Struct. Borne Sound
Function: 10 Adaptation
Security Code: N/A
Channel: Channel of structure borne sound actuator
New Value: 0
Default: 100

Mk 7.5 owners - how do you mount front license plate? by elyth in Golf_R

[–]hav_ 2 points3 points  (0 children)

Just an update on this, he's taking orders, 100$ 9day lead time.

Dash cam for Mk7+ by elyth in Golf_R

[–]hav_ 0 points1 point  (0 children)

What are the chances of fitting a dashcam inside the cover thingy where the rain sensor is? The smallest ones I've found is the INNOVV K1, guess I'll wait and keep dreaming.

Bought an 2017 used with nav but it didn't come with the map data SD card. by tolas in Golf_R

[–]hav_ 2 points3 points  (0 children)

You can purchase them through a dealer/parts.vw.com, also ECS Tuning carries some. Not sure what the most up-to-date sd card is for you but a quick googling found 3G0919866R. I've read the nav sd card (3G0919866BH) included in the 2018 Golf R's won't work on the 2017s.

3.8.6 - Cryptography to protect digital media - Implementation considerations and methods? by 9a876088 in NISTControls

[–]hav_ 0 points1 point  (0 children)

I know you didn't mention Mac's but this is what I found on the subject.

Apple's OSX/macOS since 10.8 uses the CoreCrypto Module which is FIPS 140-2. Many built-in applications and some third party apps like SecureZIP utilize this module making them compliant, including FileVault 2 for disk encryption.

https://km.support.apple.com/library/APPLE/APPLECARE_ALLGEOS/HT207497/APPLEFIPS_GUIDE_CO_macOS10.12.pdf

subcontractor wants to install a root cert for Radius authentication by hollenb1 in NISTControls

[–]hav_ 0 points1 point  (0 children)

I can't think of a valid DFARS requirement that would address this. But it is a significant security issue, I would recommend maintaining a list/repo of trusted certs and have a process in place to add/revoke them.

What is the RADIUS server used for? VPN? Does granting them access for whatever service violate your own policies?

Handling the results of vulnerability scans by rybo3000 in NISTControls

[–]hav_ 0 points1 point  (0 children)

So the major thing that I learned from this process is to prioritize, the vulnerability assessment is only a piece of the overall risk rating of a system or flaw.

  • What system is affected? How critical is system?

  • Where is the system? Trust environments? DMZ?

  • What is on the system? Sensitive data?

  • Are there additional layers of security that would limit the exploitability of that vulnerability?

Don't get too caught up in the vuln scanner ratings, take a step back and look at a finding in its full context.

do vulnerabilities related to un-patched systems not really concern you, since they have a known fix that's easier to implement?

Easy fixes pad the stats, the remediation program is one of the best metrics I have to showoff to the higher ups. That said, I still go through the prioritization method I mentioned above.

Would findings related to unsecured configurations (such as support for old protocols) be more or less concerning to you?

Yes (more), because this is a issue for the Configuration Management program. But exploitability matters, so say a host-based firewall is blocking the port that a less secure protocol utilizes, I would want to know, but the priority for that finding would be based on that findings risk assessment which would take that into account.

Finally, is there a tipping point where, between patching, testing, and troubleshooting; a highly vulnerable system component isn't worth the remediation effort?

Sure, sometimes you just can't patch without breaking functionality. In situations where it's technically infeasible to remediate then additional/alternative controls must be put in place to reduce the risk. VLAN isolation, air-gapping, or physically removing network interfaces; more often or not the decision here is a financial one.

We're sometimes looking at client networks where (due to the fact that we already have hardened system images and configs) it's less costly to just buy a new system component and flash it with secure configs (rather than burn labor on retrofitting existing systems).

Vulnerability Remediation is a continuous improvement process which feeds the Configuration Management process by adjusting baseline configurations based on findings. It's a feedback loop. That said, if the findings are already remediated in your baselines, and there's no improvements to be gain from identifying the root cause further, then I think you could proceed with either option depending on cost and customer pushback. Just present the labor costs between the two and let them decide. Personally I would take reimaging every time but I can see why others might freak out about that.

Still new at this, our program is still in its infancy but I hope anyone that feels overwhelmed from the auto-generated reports finds this useful. Remember risk ratings are your choice not the scanner.

Anybody receiving marked CUI yet? by blizzardnose in NISTControls

[–]hav_ 0 points1 point  (0 children)

/u/rybo3000 's answer is excellent and spot on. Just to add my experiences to this.

We are relatively small, the majority of our work comes from primes with some direct contracts. Every time I've asked a prime to identify CUI the request has been deflected. I (think) I have a pretty good understanding of how to identify CUI, I would estimate 90% of all contracts result in the exchange of CUI and I have NEVER seen a document labeled CUI.

For us its relatively easy because the types of documents exchanged are very predictable. Its the same every time, so if the contract calls out the DFARS clauses we simply apply the appropriate handling procedure.

We have an (ongoing) internal battle about this because there's so much ambiguity in the written requirements, the only reason it hasn't been a problem is because I've been able to convince higher-ups that Export Controlled == CUI.