zlacker

[parent] [thread] 22 comments
1. bluedi+(OP)[view] [source] 2025-01-05 13:49:49
Containers are widely used at our company, by developers who don't understand underlying concepts, and they often expose services on all interfaces, or to all hosts.

You can explain this to them, they don't care, you can even demonstrate how you can access their data without permission, and they don't get it.

Their app "works" and that's the end of it.

Ironically enough even cybersecurity doesn't catch them for it, they are too busy harassing other teams about out of date versions of services that are either not vulnerable, or already patched but their scanning tools don't understand that.

replies(6): >>dijit+b2 >>malfis+C2 >>calvin+he >>queueb+km >>ropabl+ka1 >>nitwit+2z3
2. dijit+b2[view] [source] 2025-01-05 14:17:49
>>bluedi+(OP)
This is pretty common, developers are focused on making things that work.

Sysadmins were always the ones who focused on making things secure, and for a bunch of reasons they basically don’t exist anymore.

EDIT: what guidelines did I break?

replies(4): >>ocdtre+fb >>smarx0+rh >>bluedi+6n >>harral+WA1
3. malfis+C2[view] [source] 2025-01-05 14:21:28
>>bluedi+(OP)
Checklist security at it's finest.

My team where I work is responsible for sending frivolous newsletters via email and sms to over a million employees. We use an OTP for employees to verify they gave us the right email/phone number to send them to. Security sees "email/sms" and "OTP" and therefor, tickets us at the highest "must respond in 15 minutes" priority ticket every time an employee complains about having lost access to an email or phone number.

Doesn't matter that we're not sending anything sensitive. Doesn't matter that we're a team of 4 managing more than a million data points. Every time we push back security either completely ignores us and escalates to higher management, or they send us a policy document about security practices for communication channels that can be used to send OTP codes.

Security wields their checklist like a cudgel.

Meanwhile, our bug bounty program, someone found a dev had opened a globally accessible instance of the dev employee portal with sensitive information and reported it. Security wasn't auditing for those, since it's not on their checklist.

replies(4): >>dfsego+K3 >>plagia+Ph >>throwa+Dz1 >>Kerbon+lm6
◧◩
4. dfsego+K3[view] [source] [discussion] 2025-01-05 14:31:28
>>malfis+C2
I feel this. Recently implemented a very trivial “otp to sign an electronic document” function in our app.

Security heard “otp” and forced us through a 2 month security/architecture review process for this sign-off feature that we built with COTs libraries in a single sprint.

replies(2): >>malfis+ib >>smarx0+Ab
◧◩
5. ocdtre+fb[view] [source] [discussion] 2025-01-05 15:31:31
>>dijit+b2
I suspect you'll find a lot of intersection between the move to "devops" outfits who "don't need IT anymore" and "there's a lot more security breaches now", but hey, everyone's making money so who cares?
◧◩◪
6. malfis+ib[view] [source] [discussion] 2025-01-05 15:31:54
>>dfsego+K3
Oh I know that feeling. We got in hot water because the codes were 6 digits long and security decided we needed to make them eight digits.

We pushed back and initially they agreed with us and gave us an exception, but about a year later some compliance audit told them it was no longer acceptable and we had to change it ASAP. About a year after that they told us it needed to be ten characters alphanumeric and we did a find and replace in the code base for "verification code" and "otp" and called them verification strings, and security went away.

replies(1): >>dfsego+Uw4
◧◩◪
7. smarx0+Ab[view] [source] [discussion] 2025-01-05 15:34:41
>>dfsego+K3
To be fair, I would also be alarmed, albeit not by OTP. "sign an electronic document" and "built with COTs libraries in a single sprint" is essentially begging for a security review. Signatures and their verification are non-trivial, case in point: >>42590307
replies(1): >>talkin+9p
8. calvin+he[view] [source] 2025-01-05 16:00:03
>>bluedi+(OP)
Turns out devsecops was just a layoff scheme for sysadmins
◧◩
9. smarx0+rh[view] [source] [discussion] 2025-01-05 16:22:05
>>dijit+b2
I don't think you broke any (did not downvote). But you wrote something along the lines "Sysadmins were always the ones who focused on making things secure, and for a bunch of reasons they basically don’t exist anymore. I guess this is fine." before you edited the last bit out. I think those who downvoted you think that this is plain wrong.

I guess it's fine if you get rid of sysadmins and have dev splitting their focus across dev, QA, sec, and ops. It's also fine if you have devs focus on dev, QA, code part of the sec and sysadmins focus on ops and network part of the sec. Bottom line is - someone needs to focus on sec :) (and on QAing and DBAing)

◧◩
10. plagia+Ph[view] [source] [discussion] 2025-01-05 16:25:27
>>malfis+C2
I have had to sit through "education" that boiled down to "don't ship your private keys in the production app." Someone needed to tick some security training checkbox, and I drew the short straw.
11. queueb+km[view] [source] 2025-01-05 17:01:14
>>bluedi+(OP)
> Ironically enough even cybersecurity doesn't catch them for it, they are too busy harassing other teams about out of date versions of services that are either not vulnerable, or already patched but their scanning tools don't understand that.

Wow, this really hits home. I spend an inordinate amount of time dealing with false positives from cybersecurity.

◧◩
12. bluedi+6n[view] [source] [discussion] 2025-01-05 17:06:46
>>dijit+b2
> This is pretty common, developers are focused on making things that work.

True, but over the last twenty years, simple mistakes by developers have caused so many giant security issues.

Part of being a developer now is knowing at least the basics on standard security practices. But you still see people ignoring things as simple as SQL injection, mainly because it's easy and they might not even have been taught otherwise. Many of these people can't even read a Python error message so I'm not surprised.

And your cybersecurity department likely isn't auditing source code. They are just making sure your software versions are up to date.

replies(1): >>bt1a+kI
◧◩◪◨
13. talkin+9p[view] [source] [discussion] 2025-01-05 17:23:39
>>smarx0+Ab
Nobody said you shouldn’t do any due diligence. But 1 sprint vs 2 months of review really smells like ‘processes over people’. ;)
replies(1): >>normie+6C
◧◩◪◨⬒
14. normie+6C[view] [source] [discussion] 2025-01-05 19:03:15
>>talkin+9p
A more positive view would be that the security team may have had different priorities to the product team.
replies(1): >>robert+na1
◧◩◪
15. bt1a+kI[view] [source] [discussion] 2025-01-05 19:52:32
>>bluedi+6n
and many of these people havent debugged messages more complex than a Python error message. tastelessly jabbing at needing to earn your marks by slamming into segfaults and pushing gdb
16. ropabl+ka1[view] [source] 2025-01-06 00:10:42
>>bluedi+(OP)
"Everybody gangsta 'bout infosec until their machine is cryptolockered." (some CISO, probably).
◧◩◪◨⬒⬓
17. robert+na1[view] [source] [discussion] 2025-01-06 00:11:25
>>normie+6C
Two months of review after the work would be a lot more useful than before.
◧◩
18. throwa+Dz1[view] [source] [discussion] 2025-01-06 04:49:43
>>malfis+C2

    > My team where I work is responsible for sending frivolous newsletters via email and sms to over a million employees.
"frivolous newsletters" -- Thank you for your honesty!

Real question: One million employees!? Even Foxconn doesn't have one million employees. That leaves only Amazon and Walmart according to this link: https://www.statista.com/statistics/264671/top-50-companies-...

replies(1): >>joseda+472
◧◩
19. harral+WA1[view] [source] [discussion] 2025-01-06 05:07:31
>>dijit+b2
Sometimes when you work less rigidly as a team, covering for others when it’s convenient for you, everyone gets more things done with less stress and less trouble.

And you go home at 5pm and had a good work day.

◧◩◪
20. joseda+472[view] [source] [discussion] 2025-01-06 12:01:56
>>throwa+Dz1
To a million employees doesn't necessarily mean they're from the same company

They might be a third party service for companies to send mail to _their_ employees

21. nitwit+2z3[view] [source] 2025-01-06 20:36:58
>>bluedi+(OP)
There are certainly people that don't care about security out there, but the biggest issue is just how much people are expected to know.

Docker, AWS, Kubernetes, some wrapper they've put around Kubernetes, a bunch of monitoring tools, etc.

And none of it will be their main job, so they'll just try to get something working by copying a working example, or reading a tutorial.

◧◩◪◨
22. dfsego+Uw4[view] [source] [discussion] 2025-01-07 04:14:35
>>malfis+ib
Heh. We also got treated to the digit thing. That topic alone was about 30 mins of mtg. time with a vp of eng and 2 seniors in the mtg.
◧◩
23. Kerbon+lm6[view] [source] [discussion] 2025-01-07 19:18:01
>>malfis+C2
Stop calling it a OTP and call it a temporary PIN :)
[go to top]