Questions tagged [operations]

14 questions
27
votes
1 answer

What questions should be asked when joining a new security team?

I've accepted a position at a different company working on their security team and have been mentally putting together a list of questions to ask so I can rapidly get up to speed in the environment and start gathering ideas about things to…
bobmagoo
  • 434
  • 4
  • 11
13
votes
1 answer

WAF Process Creation for Integration of IT and Business

A client has asked me to help them out with their WAF processes. Currently they have a few critical web applications being protected by a couple of WAFs. I have managed to get the WAFs tuned and ready for production. The company is fairly large and…
Lex
  • 4,247
  • 4
  • 19
  • 27
11
votes
3 answers

Disable USB keyboard pluggability on MacBook

I'm concerned about USB devices being physically attached to my MacBook laptop when I am about to unlock my computer or while my computer is unlocked. My threat model involves an attacker who is willing to spend about $200 to gain access to my…
dionyziz
  • 213
  • 1
  • 7
11
votes
3 answers

Is it insecure to have an SSH server on a workstation?

I know one systems administrator who runs SSH Server on his workstation to push files to it and check things from a phone but I think it is a bad idea for several reasons: An operations workstation is a sweet spot for the adversary. Once she is in,…
7
votes
1 answer

Security Operation Center (SOC)

I am looking for resources and details on establishing a security operation center (SoC) or network operation center (NoC) based on ITIL or any other applicable regulations. Where can I find good details or experiences of others except for hiring…
Yasser Sobhdel
  • 309
  • 1
  • 8
7
votes
4 answers

Firewall Reviews - What is in your Toolbox?

In the vein of the questions about forensics, I'd be interested to hear what tools/techniques people use on Firewall reviews, both in terms of periodic reviews as an auditor or consultant, or maintaining firewall rulesets on the operational IT side…
Rory McCune
  • 60,923
  • 14
  • 136
  • 217
6
votes
3 answers

Security Architecture - Settings to drive UI and Privileges (Rights) - Role-Based, per User-Account

How do large companies implement their security requirements which are centralized and used to drive things people can do (allowed to call a certain web-service, submit an order, etc.) as well as to drive UI (disable buttons, menu options,…
Leon
  • 163
  • 4
5
votes
1 answer

Security in automated systems using Puppet and Chef

In an extremely interesting presentation at Puppet Camp London, Tomas Doran suggested a pretty radical approach for keeping everything automated by managing tons of Docker containers with Puppet. As a security-conscious person, I like the idea of…
Naftuli Kay
  • 6,715
  • 9
  • 47
  • 75
3
votes
1 answer

How many people are required to build your own 24x7 security operations center (SOC)? Rough costs?

I have received this question from a few clients, but I have 0 experience building a 24x7 SOC.
Tate Hansen
  • 13,714
  • 3
  • 40
  • 83
3
votes
1 answer

Is there a difference between "Maximum Tolerable Downtime" and "Maximum Allowed Downtime"?

I'm studying for the CCSP exam and one of the BC/DR terms that is referenced in my study material is "Maximum Allowable Downtime". The definition for it is: MAD (Maxium Allowable Downtime) How long it would take for an interruption in service to…
Mike B
  • 3,336
  • 4
  • 29
  • 39
1
vote
3 answers

Is penetration testing included in the job of a NOC?

I was researching about what job position is related with ethical hacking. I found something like SOC and NOC, but I got a little bit confused. I know SOC tier 1 does programming tasks and information gathering, tier 2 is the same as tier 1, but a…
user160223
0
votes
1 answer

security management and security engineering difference

Is there a difference between "security management" and "security engineering"? I read about security engineering in some places and security management in others, but I really can't find what the difference is between those.
mehran
  • 1
0
votes
0 answers

Devs running IDE's remotely...risks and how to remediate

I have a few developers who - well, let's just say I don't have much faith in their operational security. Time was, in the pre-COVID world, it was well understood that they didn't run IDEs directly off their laptops. That seems to have changed. …
D0gfather
  • 71
  • 4
0
votes
2 answers

Do any open-source firewalls support remote management?

Remote management is essential if you have to run more than three network devices, and is supported by all commercial firewall products. For example: Palo Alto Networks: In addition to control and security capability, our next-generation …
Dave
  • 105
  • 4