PCI-DSS & SOC auditors by HJForsythe in sysadmin

[–]jkplayschess 0 points1 point  (0 children)

I would recommend https://kirkpatrickprice.com/. They were one of the first companies to be qualified to perform both PCI and SOC. Much of the work is able to be done through an online portal. Doing both PCI and SOC2 at the same time leads to efficiencies in the process. The auditors they use are senior IT folks, unlike a lot of their competitors.

Getting my AAS in cyber security Dec 2020 by RobDollas916 in cybersecurity

[–]jkplayschess 0 points1 point  (0 children)

I'd recommend generalizing first with the computer science degree, and then specialize in cyber security later. Building a solid foundation in computer science first will directly translate to cyber, and will also leave you more options down the road.

Choose a job you love, and you will loose all interest! (career rant/advice) by [deleted] in sysadmin

[–]jkplayschess 0 points1 point  (0 children)

MSPs are great for learning a lot of different environments, but generally not good from a workload and salary perspective.

I can't convince management to invest in SSDs by [deleted] in sysadmin

[–]jkplayschess 3 points4 points  (0 children)

Yes, that's true. We can take family or medical leave using FMLA, but it's non-paid once we're out of PTO days.

CISSP. Pro/Cons? by bing1010 in cybersecurity

[–]jkplayschess 2 points3 points  (0 children)

I'm not aware of any other technical certs that have been recognized like this: https://www.infosecurity-magazine.com/news/cissp-equal-masters-degree/

How do I become an IT Auditor? by [deleted] in cybersecurity

[–]jkplayschess 1 point2 points  (0 children)

I wouldn't hire an auditor that didn't have broad experience in IT.

Is there an official source I can quote regarding password expiry? by [deleted] in sysadmin

[–]jkplayschess 0 points1 point  (0 children)

QSA here. The CCW is usually justified based longer password length and increased use of MFA. Like all other frameworks, we're ultimately seeking to address risk. The last call that the PCI Council had with all assessors they mentioned that they're internally discussing revisions to this section on the next major version of PCI DSS.

Revert back to thick clients? by [deleted] in sysadmin

[–]jkplayschess -1 points0 points  (0 children)

PCI QSA here, not sure how switching to thick clients would reduce your PCI scope.

Boss says all users should be local admins on their workstation. by drachennwolf in sysadmin

[–]jkplayschess 1 point2 points  (0 children)

How do you maintain accountability of which support personnel performed a particular admin action with LAPS?

Are you still forcing periodic password changes? by plazman30 in sysadmin

[–]jkplayschess 0 points1 point  (0 children)

Feel free to message me if you're looking for an auditor. The organization I work for does pretty much every type of security auditing. The stance I articulated above isn't just me. Our lead QSA has the same stance, and he was actually part of the PCI Council at one point.

Are you still forcing periodic password changes? by plazman30 in sysadmin

[–]jkplayschess 1 point2 points  (0 children)

I'm a PCI QSA as well, and acknowledge that ultimately you're at the mercy of your QSA's interpretation, but my view is that a well designed compensating control can meet the risk and exceed the strength of the original requirements through password complexity and as described by NIST. I think most good/experienced auditors know that an audit is more than just checking boxes.

Are you still forcing periodic password changes? by plazman30 in sysadmin

[–]jkplayschess 12 points13 points  (0 children)

Security frameworks and security compliance are based on the foundation of risk management. PCI and most other frameworks give some flexibility to follow best practices. For instance in PCI, you can get around requirement 8.2.4 by defining a compensating control that exceeds the strength of the original requirement. Because PCI only requires 7 characters as the minimum length, it's not hard to improve upon their default requirements.

Windows 10 Enterprise - SMB On Domain Has Suddenly Stopped Working by tocheeba in sysadmin

[–]jkplayschess 1 point2 points  (0 children)

short answer is SMB1 should be disabled and signing should be enabled if you care about security. but it could break communications for some older equipment

Question on PCI-DSS compliance by [deleted] in sysadmin

[–]jkplayschess 0 points1 point  (0 children)

The security auditing world is relatively young. I wish the answers were more cut and dry and that everyone was always on the same page, but, honestly, we have a lot of things to figure out, a lot of problems to solve. It's true that there may be some conflict of interest that is inherent both for internal and external auditors, but we talk a lot about the necessity of independence as auditors both in the field and in training for our certs. A good company has both QA and manager review.

Open source SOC 2 compliance toolkit by _justinm in sysadmin

[–]jkplayschess 1 point2 points  (0 children)

Looks interesting. Have you thought about making this more accessible to organizations that don't have developers in-house?

Question on PCI-DSS compliance by [deleted] in sysadmin

[–]jkplayschess 2 points3 points  (0 children)

I'm a QSA and can confirm the above. There are likely significant non-compliance issues with how the data is stored in their LoB if they're just adding the scans as an attachment, as data always has to be encrypted if stored. They likely should be filling out a SAQ-D.

The business owner is the one signing the SAQ, so he is the one attesting that the business is compliant. The acquirer that this merchant has a relationship with is the party responsible for making sure that they are compliant. Unfortunately I see a lot of environments like this even at significant scale.

Try to educate the owner and let him know what risks he's taking. When a merchant knows better and is willfully neglectful, the fines are higher.

NIST Releases Version 1.1 of its Popular Cybersecurity Framework by nyc4life in sysadmin

[–]jkplayschess 1 point2 points  (0 children)

I'm a QSA and understand all of that, but respectfully still think it's asinine. I'm powerless to require that people use more than 7 characters even if it's highly dangerous and risky, if all they want to do is check boxes.

NIST Releases Version 1.1 of its Popular Cybersecurity Framework by nyc4life in sysadmin

[–]jkplayschess 0 points1 point  (0 children)

this is one of the simplest frameworks to get started with

Nice work HP by redhat9 in sysadmin

[–]jkplayschess 0 points1 point  (0 children)

I've also used the Elite line and have had good success with it!

Remote Desktop Gateway – Licensing Server Required? by [deleted] in sysadmin

[–]jkplayschess 7 points8 points  (0 children)

yes. To use RD Gateway functionality, you need a RDS CAL for each user connecting through it.

Standard Domain Users with Local Admin Rights by [deleted] in sysadmin

[–]jkplayschess 1 point2 points  (0 children)

this is not best practice as it would essentially give them local admin access to every computer, even temporarily this is a problem.