Episode Transcript
Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Chris Romeo (00:10):
Hey folks, welcome
to another episode of the
security table.
This is an abridged episodebecause we're going to talk
really fast about something andhave kind of a shorter episode
here.
Joined by Izar and Matt andmyself, Chris Romeo, we're
always around the security tableand we're going to jump right
in.
So I am looking at this NSA andCISA red and blue team share top
(00:32):
10 cybersecuritymisconfigurations.
Let's pick up with number oneand get into it.
So default configurations ofsoftware and applications.
Do we, are we in favor of theseor are we against?
Matt Coles (00:47):
Well, so,
Izar Tarandach (00:47):
If you don't
configure it right, then it's a
misconfiguration, then, uh,yeah, I guess it's pretty much
on the top ten.
Matt Coles (00:53):
Well, but I mean,
this is, if we have, if we talk
about a default configuration,this is making an assumption
that the default is bad andtherefore, but, but you could
say the same thing abouteverything on this list.
If this is your default,
Izar Tarandach (01:06):
Oh, no, no, no,
no, wait, wait, they go to
default credentials, meaningbasically the misconfiguration
here is that you are notchanging the default passwords,
which we know that absolutelynobody ever does, everybody
immediately goes and puts asafe, good password instead of
the default.
Chris Romeo (01:24):
I mean, that's why
with default credentials, you
don't let people, you don't givethem the choice.
There is no default credential.
You don't have one.
You have them set a passwordwhen they're configuring the
device or whatever.
I wasn't going to name anynames.
It was supposed to be without
Izar Tarandach (01:39):
I didn't, I just
had a thing
Chris Romeo (01:41):
yeah, you have a
little sneeze
Matt Coles (01:43):
so on this list,
there is no default.
I mean, unless you're talkingabout, about credential hygiene
or not, there is no defaultcredentials explicitly on this
list.
Izar Tarandach (01:53):
yeah,
Matt Coles (01:54):
But number one is a
summary line.
It doesn't really need to be itsown number, because they have
put 11 on this list.
If your default configuration isinsecure, of course it's going
to be number one.
Chris Romeo (02:08):
Yeah.
Matt Coles (02:08):
but all of these
other things are also,
Chris Romeo (02:11):
missing.
They're, they're mixing defaultcredentials here with poor
credential hygiene at numbernine.
So it doesn't make sense.
Why are these not combined?
Why would you have two separatethings here?
Matt Coles (02:20):
well, so poor
credential hygiene could be two
things.
misconfiguration of yourpassword policies.
Or it could be lack of yourruntime behaviors around looking
at compromised credentials.
So in one case it's aconfiguration, in the other case
it's not a configuration.
So it's kind of a misleadingitem on this list.
Chris Romeo (02:39):
Okay.
Izar Tarandach (02:40):
one, one is what
one is having the, the, the fact
that you shouldn't be able tokeep the default past setup.
And the second one is you reallyshould choose a good password
and you should store it right.
Chris Romeo (02:56):
how about
Izar Tarandach (02:57):
the thing that,
just before we go there, the
thing that I have a problem withhere is that we start with
default configurations, which isa big thing, and then we funnel
into credentials andpermissions, which is a very,
very, a much smaller subset thandefault configurations.
Chris Romeo (03:13):
yeah.
Yeah, they talk about servicelevel permissions as well.
But look at two.
I think we're gonna love two.
It's basically the E in STRIDE.
Izar Tarandach (03:21):
I do, I do, but
uh, I don't think it's a
misconfiguration.
I think it's usually more of adesign thing
Chris Romeo (03:27):
Ooh, good point.
Let's unpack that a little bit.
So why, why is this a designproblem and not a
misconfiguration?
Izar Tarandach (03:35):
because it, it
Putting, putting it, I, I think
that lumping it together as amisconfiguration under this
title basically means you are,you are using accounts that have
way too much, too, way too muchprivileges than they should.
Right.
Which is not exactly a problemof a problem of separation.
(03:58):
It's a problem of the way thatyou design your system and you
are giving one, one account theability of being everything,
rather than saying we have thisset of accounts that's admin
accounts and we have this set ofaccounts that's user accounts.
Chris Romeo (04:12):
I think we have a
context problem.
We're looking at this throughthe lens of AppSec and software
and ProdSec people.
I just took a closer look.
This says top 10 cybersecuritymisconfigurations.
So they're not specificallytalking about design, like
designing a web app.
They're talking about excessiveaccount privileges and elevated
service account permissions thatwould be part of an operating
(04:34):
Windows network in anenterprise.
Matt Coles (04:36):
Yeah, so let's talk
about that
Izar Tarandach (04:38):
Aren't those
applications?
Matt Coles (04:39):
Well, so think about
number one, think about number
one in that context then.
Leaving the defaultconfiguration is the problem,
right?
by not changing theconfiguration to a secure state.
If it requires elevatingsecurity, and I will just, and
this is a lightning round here,but, you know, just think about
the, the CISA Secure by Design,Secure by Default guidelines
(05:02):
that came out recently inupdated form.
Secure by Default means comesecure.
And you have to weaken security.
We talk about loosening guides,but most of the time come
products and applicationapplications and software are
shipped in a defaultconfiguration is insecure and
leaving it in that insecureconfiguration state puts it the
(05:23):
number one on this list.
Number two is likewise.
Those things often ship with anadministrative account.
That administrative account maybe the only account that's
that's installed by default.
And people will use it foroperations when they shouldn't.
They should create, they shouldcreate an additional account,
non privileged, to be used for,for general purpose or something
(05:45):
that's view only for, formetrics and reporting purposes
or, or whatever.
And you should be separation ofthe, the application should
enforce separation of duties andusers of those applications
should reinforce that.
Chris Romeo (05:59):
All right.
So let's look at three.
I don't get this one.
Insufficient
Izar Tarandach (06:03):
four, actually,
Matt Coles (06:05):
What, you don't get
this at all?
How do you, how do you, youcan't measure what you don't
know, right?
You can't defend what you don'thave
Chris Romeo (06:11):
yeah, but isn't
everything encrypted in the
world we live in now?
How is, how can you monitoranything on a network that's not
Izar Tarandach (06:17):
Oh, no, no, no,
no, no, no,
Chris Romeo (06:17):
just a bunch of TLS
going back
Matt Coles (06:18):
packet inspection,
Izar Tarandach (06:19):
no, no, no, you
can,
Matt Coles (06:19):
TLS offloading.
Izar Tarandach (06:21):
you can monitor
for, for, uh, streams are not
predicted in your threat model.
So I know that these two thingsare expected to talk, but if I
see A talking to Z, all of asudden, oh wait, that's not
supposed to happen.
Matt Coles (06:36):
Right.
But also with TLS offloading anddeep packet inspection, I mean,
once you're, yes, we're supposedto be in a world of zero trust,
right, where systems are goingto be on island unto themselves.
But traditionally, you know,there's a network boundary where
you may terminate TLS at thenetwork boundary and then
everything within it can be deeppacket inspected and monitored
(06:57):
for the traffic.
And if you don't do that, thenyou're potentially leaving
yourself at risk.
Chris Romeo (07:02):
I mean, can you do
that at the speed of an
enterprise network though?
Can you, I mean, we're talking
Izar Tarandach (07:09):
if you use
mirror traffic,
Chris Romeo (07:11):
in a 10 gig
connection, you can decrypt all
of that TLS traffic
Matt Coles (07:16):
With hardware, with
hardware decryption.
Yeah, yeah.
With hardware decryption.
Absolutely.
Izar Tarandach (07:20):
you can.
Chris Romeo (07:22):
Okay.
Wow.
Izar Tarandach (07:23):
But the thing
Chris Romeo (07:24):
The world of
computing has gotten further.
Izar Tarandach (07:26):
that, the thing
that's sort of bothering me here
is that we jumped fromconfiguration of actual stuff
and how you use stuff to all ofa sudden on three and four we
are looking at networks.
Chris Romeo (07:41):
And This is
designed too.
It
Izar Tarandach (07:43):
And many times
it's not the same people who do
both things.
So who's the public for thisthing here?
Matt Coles (07:48):
I guess it's
misleading.
It's misleading because it's nota configuration.
It's, it's,
Chris Romeo (07:53):
It is.
It is a configuration.
Be when, because you could, Imean, whenever, whenever you de,
whenever you de you designed,when you go to implement it, it
is, you are configuring yournetwork monitoring tools in an
insufficient way.
Izar Tarandach (08:07):
Well, you
configure it because it has to
be configured to be, to be ofuse, but it's not a
configuration problem of theenvironment or the system or the
whatever.
Fair.
Matt Coles (08:17):
We're nit-picking on
words at this point.
Chris Romeo (08:19):
Yeah, let's, let's
keep, but to your earlier point
about design, there is a designelement to, if you properly
design your network monitoring,you don't have insufficient
network monitoring.
And so
Matt Coles (08:31):
And by the way, and
by the way, for four, with
software defined networking,this is absolutely a
configuration issue,
Chris Romeo (08:37):
and four, just for
the record, is lack of network
segmentation.
Matt Coles (08:41):
right?
So having
Izar Tarandach (08:42):
could be
architecture.
Matt Coles (08:44):
it is, it is an
architecture and it may
Izar Tarandach (08:47):
architecture now
is configuration.
Matt Coles (08:51):
oh, we could have an
episode alone on that one.
Izar Tarandach (08:53):
I dare you.
I dare you to go to an architectand say What you do is
configuration.
I dare you,
Chris Romeo (08:59):
Yeah, you're,
you're change management now,
friend.
That's what you do.
It's
Matt Coles (09:03):
Wait, isn't that,
isn't that Dev, isn't that
DevOps?
Isn't that what DevOps andDevSecOps is all about?
Chris Romeo (09:08):
What?
Izar Tarandach (09:09):
And he just said
the quiet part loud.
Chris Romeo (09:13):
Well, there's
another dollar in the swear jar
from.
from Matt Coles,
Matt Coles (09:17):
at least I didn't
say pane of glass.
Chris Romeo (09:20):
or ShiftLeft, or
any of my other,
Matt Coles (09:22):
Single pane
Chris Romeo (09:23):
of the other words
that cause pain.
Matt Coles (09:26):
right.
So poor patch management.
Number five, not a configurationper se, unless it's automatic
updates we're talking about.
Chris Romeo (09:34):
Oh, I see what
you're saying.
Izar Tarandach (09:35):
oh, oh, speaking
of the word jar, so, is this one
talking about SBOMs?
Is it SBOM time?
Chris Romeo (09:44):
Please no.
Please stop.
Matt Coles (09:48):
Please
Izar Tarandach (09:52):
already?
Wait, do we have insufficientDAST anywhere?
Chris Romeo (09:56):
Oh man, this is...
Okay, so poor patch management,lack of regular patching, use of
unsupported operating systems.
To your point, this isn't aconfiguration unless it's an
automated thing.
This is just a point, this isn'tthe top 10 misconfigurations,
it's the top 10 problems
Izar Tarandach (10:13):
Yeah, true,
Chris Romeo (10:15):
It's a la so the,
the, the misconfiguration would
be a lack of automated patchmanagement.
Cause that's something you couldchange.
You could turn it on or turn itoff.
Alright, good.
Six, bypass of system accesscontrols.
Wait a minute.
Matt Coles (10:28):
I'm not entirely
sure this is a configuration
issue.
This is a, this is an activeattack kind of thing,
Izar Tarandach (10:32):
yeah, I would
say that having system access
controls is the configuration ormisconfiguration,
Chris Romeo (10:39):
look at the first
sentence there.
That's a threat.
The first sentence is a threat.
A malicious actor can bypasssystem access controls by
compromising alternateauthentication methods in an
environment.
I
Matt Coles (10:48):
okay, so there's the
config, there's the
configuration problem, right?
If you, if, and it goes back tonumber one, if you have a
default, if the system's defaultconfiguration exposes insecure
protocols and you leave themopen, you're at risk to this
threat.
Right?
Number two, the second sentencehere, if a malicious actor can
collect hashes.
Well, how do they collecthashes?
You've left Lanman in your, inyour system, right?
(11:10):
Or NTLM or whatever.
Chris Romeo (11:11):
And that you're
saying that's the lack, that's
the configuration problem or the
Matt Coles (11:14):
a configuration
problem, right?
So you've missed configuration.
You've left insecure protocolsin place.
Izar Tarandach (11:20):
the whole item
is just listing ways of
bypassing authentication.
Matt Coles (11:25):
Yeah, but they, they
should, they should have taken
the, the statements and turned'em around in, in terms of, as a
systems, as a system designerand a system deployer don't
leave insecure configurationsbecause they'll allow malicious
actors to do X, Y, Z.
That's how it probably shouldhave been stated.
That's, I think, what theyintended to say.
But, but what they did was they,they took the attack first and
(11:46):
not the, not the cause.
Chris Romeo (11:47):
Yeah.
So then seven, weakermisconfigured MFA methods.
Matt Coles (11:54):
Oh.
Chris Romeo (11:55):
But listen where
they start here.
Misconfigured smart cards ortokens.
Generally government or DoDnetworks.
So not really that applicable tothe average enterprise.
Like we don't use smart cardsanywhere.
At least I don't know anyone whouses smart cards.
Matt Coles (12:10):
Uh, some companies,
well yeah, okay, maybe primarily
in government or DoD, but I, youknow, have high security
environments that do use this,use smart cards.
It's not unheard of, and peopleuse YubiKeys and other FIDO
tokens all the time.
Chris Romeo (12:24):
I mean, that's not
a smart card though, right?
A YubiKeys,
Matt Coles (12:27):
It's a token.
Chris Romeo (12:28):
they're talking
Izar Tarandach (12:28):
a token, it's
a...
Chris Romeo (12:29):
They're talking
about CAC cards here from,
Matt Coles (12:31):
They are.
CAC and PIV, right,
Izar Tarandach (12:33):
are talking
about tokens as well, so you
could think about FIDO and allthat
Matt Coles (12:37):
So if you have a, if
you have a, a Google Titan, or
if you have a, uh, uh, aYubiKeys, right?
Those are, those are accesstokens.
Those are tokens that are inscope here.
What's interesting though, isthey don't start with not having
MFA in the first place.
They start with the assumptionthat you have MFA and it's
insecurely configured, not, youdon't have MFA.
Chris Romeo (12:58):
Well, that
Matt Coles (12:59):
one.
Chris Romeo (12:59):
Not having MFA, to
our earlier discussion would not
be a misconfiguration.
Izar Tarandach (13:02):
Exactly, yeah,
Chris Romeo (13:03):
be a design
problem.
So they, they kind of followedthe
Matt Coles (13:05):
unless it was a
configuration option that you
could enable MFA that youdidn't.
Chris Romeo (13:09):
I see.
Izar Tarandach (13:10):
are assuming
that you have it, but it's
misconfigured.
Matt Coles (13:12):
That's
Chris Romeo (13:13):
All right.
Now eight, we go back tonetwork.
Izar Tarandach (13:15):
No, no, wait,
wait, wait, but before we go
there, then they jump to lack ofphishing resistant MFA.
Matt Coles (13:20):
Which is a
configuration problem again.
Izar Tarandach (13:23):
is the
configuration or is design of
the MFA, perhaps the MFAsolution is not good enough.
Matt Coles (13:28):
That's true if you
have one to choose from, but if
you have multiples to choosefrom, and you don't enable,
again, the strongest oneavailable,
Izar Tarandach (13:37):
Oh, oh, no,
sorry.
On, on upon reading.
They seem to be addressing, uh,MFA over SMS because they say
that exploitation of SignalingSystem 7 protocol
vulnerabilities and SIM swaptechniques is the problem.
Matt Coles (13:51):
right,
Chris Romeo (13:52):
So we agree with
that.
I mean, we agree
Matt Coles (13:54):
if you have the
option, if you have an option of
using one that
Izar Tarandach (13:56):
not a
misconfiguration,
Matt Coles (13:58):
unless it's an
option,
Chris Romeo (14:00):
Which a lot of
times it is an option.
A lot of times it is an optionthese days between push
Izar Tarandach (14:05):
But again, wait.
Chris Romeo (14:06):
and text based,
Izar Tarandach (14:09):
If you have a
choice between A or B, is that a
misconfiguration if you choosethe weaker of them?
Or is it a bad design choice?
Chris Romeo (14:21):
SMS based, or
secure by default.
So
Matt Coles (14:23):
it's a bad default.
It's a bad default, which meansit's a design.
It's a configuration choice andit's a bad design in that you're
giving a poor choice.
Chris Romeo (14:34):
Yeah,
Matt Coles (14:35):
It's.
Izar Tarandach (14:35):
OK, you
convinced me.
Chris Romeo (14:37):
all right, 8.
Insufficient ACLs on networkshares and services.
So now we're back to the networkagain.
Matt Coles (14:42):
Yeah, this is a
configuration problem that most
definitely you've set the wrongACLs.
Chris Romeo (14:46):
we're just we're
just we're saying this is a
misconfig and we're moving on.
Matt Coles (14:50):
Yep.
Chris Romeo (14:51):
All right, 9 says
poor credential hygiene.
Izar Tarandach (14:56):
that's basically
bad configuration of human
persons because,
Matt Coles (15:02):
Well, this is, this
is password.
If you're using passwords andyou're not using MFA or if
you're using MFA with passwordsand you have crackable
passwords, that means you've seta weak password policy.
Right?
You haven't used 20 characterswith symbols, alphanumeric and
spaces.
Izar Tarandach (15:17):
Wait, wait,
wait, we know that those
policies are not all that theyare hyped up to be, right?
Chris Romeo (15:23):
Yeah, I'm, I
Matt Coles (15:23):
But if you enforce a
strong password policy...
Chris Romeo (15:25):
Mean, what is the
new, it's NIST 800-63, right?
800-63 redefines passwordpolicies as, as what they should
be in a proper
Matt Coles (15:35):
Long, easy to
remember, but hard to guess
passphrases that don't changefrequently.
Chris Romeo (15:39):
Not changeable,
unless there's been a breach,
you don't have to change them.
Izar Tarandach (15:41):
And here they
say that it's, if it's shorter
than 15 characters, then it'sbad.
Matt Coles (15:47):
And clear text
password disclosure.
We talked about this earlierwith use of insecure protocols
that expose credentials on thewire.
Right?
But what, what's, I guessthat's, that's the, that's the
choosing of a bad credentialthat can be easily guessed or
reusing credentials and exposingit through insecure
(16:09):
configurations.
That's ultimately what it'sgetting to.
Izar Tarandach (16:13):
But again, is
this a configuration thing?
I mean, the only configurationthat I can think of in here is
the size of the password, or thechoice of hashing
Chris Romeo (16:22):
yeah,
Izar Tarandach (16:23):
method
Chris Romeo (16:24):
there's, there's so
much more they could have done.
Like even just referencing800-63 is.
The current standard of what Ithink of as the best practice.
Um, I don't, I don't think, Imean, if somebody is in this day
and age, if they're allowingshort passwords and non complex
passwords, then, shame onthem...
Matt Coles (16:46):
And then, and then
they're, and then they talk
about password stealth held inclear text.
So this is not a configurationissue, right?
This is not
Izar Tarandach (16:52):
configuration.
Chris Romeo (16:53):
That's a design
problem.
They,
Izar Tarandach (16:54):
I don't know any
system that says would you like
to store your passwords in cleartext.
Oh, okay, I'm going to configureit this way.
Yay! Let's hope for the goodthings.
Chris Romeo (17:03):
All right, we got
to pick up 10 here.
Unrestricted code execution.
So there's a, there's acondition at the top though.
If unverified programs areallowed to execute on hosts, a
threat actor, Oh, it sounds likea threat, can run arbitrary
malicious payloads within anetwork.
Matt Coles (17:17):
Yeah.
In my opinion, I don't know howyou can say that this is a
configuration issue unlessyou're running EDR,
Chris Romeo (17:23):
Well, can you, can
you somehow force, like on
Windows, can you, is there aconfiguration setting to only
run things that are trustedbinaries?
Izar Tarandach (17:33):
you, you need
stuff on top of it.
Matt Coles (17:36):
No, but you can't,
you can have Windows fail to run
without prompting for UAC.
You could, right, or whateverit's called now.
Chris Romeo (17:43):
Yeah, they had a
what, because it was their safe
list.
Didn't they build a safe listfeature years ago for
Matt Coles (17:48):
If it's not
digitally signed, if it's not
digitally signed, you can,
Izar Tarandach (17:51):
and the
certificate is good,
Matt Coles (17:53):
can do, you can do
group policies to prevent this.
Izar Tarandach (17:56):
but unless it is
a very, and I could be wrong
here because I'm not a Windowsperson, but unless it's a very
limited account.
You can just click on run itanyway.
Matt Coles (18:06):
Oh yeah, if you're,
if you're running as admin, so
you're running with elevatedprivileges, that goes back to
the running with elevatedprivileges discussion,
Chris Romeo (18:12):
Enterprise
application environment, not
everybody has admin, right?
And so, and I think that's wherethey're going.
Now, I don't know why you wouldturn off those protections in a
Windows environment.
Why would you turn off all ofthese things about safe listing
applications based on signaturesof binaries and things like
Izar Tarandach (18:32):
Because Joe from
accounting absolutely needs to
be able to run that flash thingthat he has from 95.
So they have to lower thebarriers and give him more
Chris Romeo (18:46):
I guess.
Not in my world.
Not in my network.
I won't allow it.
So, all right.
Well, that was a fun littlequick pass through the NSA,
CISA, Red and Blue teams sharetop 10 cybersecurity
misconfigurations.
I think we kind of had some fungoing through there and pointing
(19:06):
out some things.
Izar's got the
Izar Tarandach (19:09):
it has to be
said, it has to be said that we
value the effort.
We like that it came out and,uh, we just think that it could
be a bit more, I don't know,focused, defined,
Chris Romeo (19:24):
Could be tuned up a
little bit to truly make it so
that it's clear how everythingis a misconfiguration.
Izar Tarandach (19:31):
right.
And the mitigations have goodstuff.
There's a lot to learn in thereas well and they have good
references.
So I think that all in all, 3out of 5 for the effort.
Chris Romeo (19:43):
yeah, yeah.
And it's, you know, they're,they're moving, they're moving
the industry forward.
It may not be perfect.
Nobody's ever going to beperfect and that's okay.
Cause there is no perfectsecurity.
Um, there is only reasonablesecurity and some of this is
reasonable and we'll leave itwith that.
Thanks folks.