SlideShare une entreprise Scribd logo
1  sur  49
Télécharger pour lire hors ligne
OPSEC 101- a Choose Your Own Adventure
for Devs, Ops and Other Humans
Jan Schaumann
@jschauma ConFoo Vancouver 2016	
  
@jschauma ConFoo Vancouver 2016	
  
https://v.gd/ConFooOpSec01
https://v.gd/ConFooOpSec02
@jschauma ConFoo Vancouver 2016	
  
https://v.gd/ConFooOpSec03
@jschauma ConFoo Vancouver 2016	
  
https://v.gd/ConFooOpSec04
@jschauma ConFoo Vancouver 2016	
  
OPSEC	
  (simplified):	
  
being	
  aware	
  of	
  what	
  informa:on	
  you	
  
make	
  available,	
  and	
  
how	
  it	
  may	
  be	
  used	
  against	
  you,	
  
eh?	
  
@jschauma ConFoo Vancouver 2016	
  
OPSEC	
  (simplified):	
  
being	
  aware	
  of	
  what	
  type	
  of	
  informa:on	
  
you	
  make	
  available,	
  and	
  
how	
  it	
  may	
  be	
  used	
  against	
  you,	
  eh?	
  
@jschauma ConFoo Vancouver 2016	
  @jschauma ConFoo Vancouver 2016	
  
@jschauma ConFoo Vancouver 2016	
  
Going	
  to	
  ConFoo!	
  
A.  Hey,	
  they	
  don’t	
  call	
  it	
  a	
  laptop	
  for	
  nothing!	
  
B.  Leave	
  the	
  open	
  laptop	
  outside	
  the	
  bathroom,	
  
you're	
  just	
  gone	
  for	
  a	
  minute.	
  
	
  
C.  Close	
  the	
  laptop,	
  pack	
  it	
  up	
  or	
  leave	
  it	
  at	
  your	
  
desk.	
  
@jschauma ConFoo Vancouver 2016	
  
@jschauma ConFoo Vancouver 2016	
  
https://v.gd/ConFooOpSec06https://v.gd/ConFooOpSec05
@jschauma ConFoo Vancouver 2016	
  
A.  Hit	
  ctrl+shiP+l	
  to	
  lock	
  your	
  laptop.	
  
B.  Close	
  your	
  laptop,	
  stash	
  it	
  in	
  your	
  lockable	
  
desk	
  drawer	
  and	
  swallow	
  the	
  key.	
  
C.  PQ,	
  who	
  cares?	
  Your	
  laptop	
  is	
  configured	
  to	
  
auto-­‐lock	
  aPer	
  some	
  :me.	
  
@jschauma ConFoo Vancouver 2016	
  
@jschauma ConFoo Vancouver 2016	
  
A.  Reimage	
  the	
  box	
  because	
  no	
  single	
  system	
  
should	
  be	
  irreplacable.	
  
B.  Make	
  up	
  an	
  excuse	
  to	
  wait	
  un:l	
  Bob	
  is	
  back	
  
from	
  his	
  vaca:on.	
  
C.  grep	
  the	
  password	
  out	
  of	
  Bob’s	
  
conveniently	
  readable	
  ~/.bash_history
@jschauma ConFoo Vancouver 2016	
  
@jschauma ConFoo Vancouver 2016	
  
https://v.gd/ConFooOpSec07
●  Do	
  clear	
  your	
  shell	
  history	
  once	
  in	
  a	
  while!	
  
○  aYackers	
  use	
  it	
  as	
  info	
  on	
  how	
  to	
  admin	
  the	
  system	
  
○  aYackers	
  use	
  it	
  to	
  mine	
  passwords	
  
	
  
●  Session	
  
○  history -c	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
   	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  #	
  good	
  
○  echo /dev/null > ~/.bash_history	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  #	
  beYer	
  
	
  
●  Persistent	
  
○  echo ‘set +o history’ >> ~/.bashrc	
   	
  	
  	
  	
  	
  	
  	
  	
  	
  #	
  good	
  
○  ln -sf /dev/null ~/.bash_history 	
  	
  	
  	
  	
  	
  	
   	
   	
  #	
  beYer	
  
○  echo ‘set +o history’ >> /etc/profile	
   	
  #	
  best	
  
@jschauma ConFoo Vancouver 2016	
  
https://v.gd/ConFooOpSec08
A.  Take	
  off	
  your	
  shoes,	
  raise	
  your	
  arms	
  for	
  the	
  
porno	
  cancer	
  scanner	
  and	
  say	
  'yessir,	
  may	
  I	
  
have	
  another’.	
  
B.  Take	
  off	
  your	
  shoes,	
  shut	
  down	
  your	
  phone,	
  
and	
  opt	
  for	
  the	
  freedom	
  grope.	
  
C.  Breeze	
  through	
  the	
  pre-­‐approved	
  lane	
  because	
  
you	
  gave	
  all	
  your	
  info	
  to	
  the	
  gubment	
  already.	
  
@jschauma ConFoo Vancouver 2016	
  
A.  Enter	
  1	
  2	
  3	
  4,	
  the	
  same	
  combina:on	
  as	
  
on	
  your	
  (TSA-­‐approved)	
  luggage	
  lock.	
  
B.  Enter	
  a	
  32	
  character	
  complex	
  
passphrase,	
  because	
  fingerprint	
  
unlocking	
  is	
  unsafe.	
  
C.  Use	
  your	
  security	
  hedgehog.	
  
@jschauma ConFoo Vancouver 2016	
  
10^4	
  =	
  10K	
  possibili:es	
   Time	
  to	
  brute	
  force:	
  <30min	
  
@jschauma ConFoo Vancouver 2016	
  
10^6	
  =	
  1M	
  possibili:es	
   Time	
  to	
  brute	
  force:	
  >2d	
  
@jschauma ConFoo Vancouver 2016	
  
6	
  alpha-­‐numeric	
  chars	
  
	
  
62^6	
  =	
  
56,800,235,584	
  
possibili:es	
  
Time	
  to	
  brute	
  force:	
  
196	
  years	
  
@jschauma ConFoo Vancouver 2016	
  
@jschauma ConFoo Vancouver 2016	
  
@jschauma ConFoo Vancouver 2016	
  
https://v.gd/ConFooOpSec09
@jschauma ConFoo Vancouver 2016	
  
https://v.gd/ConFooOpSec10
@jschauma ConFoo Vancouver 2016	
  
@jschauma ConFoo Vancouver 2016	
  
A.  Put	
  on	
  your	
  privacy	
  sweater.	
  
B.  Pretend	
  not	
  to	
  no:ce	
  that	
  the	
  people	
  next	
  to	
  you	
  
are	
  laughing	
  at	
  your	
  slides	
  as	
  you	
  work	
  on	
  them.	
  
C.  Perform	
  AES256-­‐CBC-­‐SHA1	
  encryp:on	
  in	
  your	
  
head	
  and	
  only	
  enter	
  ciphertext.	
  
@jschauma ConFoo Vancouver 2016	
  
@jschauma ConFoo Vancouver 2016	
  
https://v.gd/ConFooOpSec11
@jschauma ConFoo Vancouver 2016	
  
https://v.gd/ConFooOpSec11
A.  Turn	
  off	
  the	
  phone.	
  (Yeah,	
  right.)	
  
B.  Plug	
  your	
  phone	
  into	
  the	
  convenient	
  in-­‐
seat	
  USB	
  port	
  to	
  charge.	
  
C.  Prac:ce	
  safe	
  OpSecs	
  by	
  using	
  your	
  USB	
  
condom.	
  
@jschauma ConFoo Vancouver 2016	
  
https://v.gd/ConFooOpSec12
@jschauma ConFoo Vancouver 2016	
  
A.  Sweet!	
  	
  You're	
  already	
  connected	
  to	
  the	
  
'linksys’	
  access	
  point!	
  	
  How	
  convenient!	
  
B.  Choose	
  the	
  hotel	
  wifi,	
  then	
  immediately	
  
connect	
  to	
  your	
  VPN.	
  
C.  Close	
  your	
  laptop	
  again.	
  There	
  are	
  beYer	
  things	
  
to	
  do	
  than	
  stare	
  at	
  a	
  computer	
  screen.	
  	
  Oh,	
  
look,	
  a	
  beer	
  appears	
  in	
  front	
  of	
  you!	
  	
  Life	
  is	
  
good.	
   https://v.gd/ConFooOpSec13
BeYer	
  clean	
  up!	
  
Right	
  on!	
  
@jschauma ConFoo Vancouver 2016	
  
A.  Leave	
  your	
  laptop	
  in	
  your	
  hotel	
  room;	
  it’s	
  turned	
  
off,	
  and	
  belongs	
  to	
  the	
  company,	
  so	
  you	
  don’t	
  care	
  
if	
  somebody	
  steals	
  it.	
  
B.  Lock	
  your	
  laptop	
  in	
  the	
  safe,	
  using	
  the	
  same	
  4	
  digit	
  
code	
  you	
  use	
  everywhere	
  else.	
  
C.  Carry	
  the	
  laptop	
  with	
  you,	
  because	
  seriously,	
  the	
  
hotel	
  probably	
  has	
  a	
  backdoor	
  into	
  the	
  safe	
  
anyway.	
  
@jschauma ConFoo Vancouver 2016	
  
@jschauma ConFoo Vancouver 2016	
  
@jschauma ConFoo Vancouver 2016	
  
https://v.gd/ConFooOpSec14
@jschauma ConFoo Vancouver 2016	
  
A.  Follow	
  her	
  and	
  her	
  senior	
  engineers	
  on	
  TwiYer,	
  
LinkedIn,	
  Facebook	
  and	
  share	
  that	
  cool	
  blog	
  post	
  
about	
  their	
  great	
  work	
  culture	
  everywhere.	
  
B.  Head	
  to	
  their	
  campus	
  the	
  next	
  day.	
  (They	
  have	
  this	
  
cool	
  sculpture	
  in	
  their	
  lobby	
  -­‐	
  pic,	
  tweet,	
  awesome!)	
  
C.  Pull	
  the	
  ssh	
  key	
  of	
  one	
  of	
  their	
  developers	
  out	
  of	
  
GitHub,	
  break	
  into	
  their	
  systems	
  and	
  leave	
  a	
  note	
  
how	
  to	
  best	
  contact	
  you.	
  
@jschauma ConFoo Vancouver 2016	
  
@jschauma ConFoo Vancouver 2016	
  
Avoid	
  leaking	
  secrets	
  
into	
  code	
  repositories.	
  
●  separate	
  code	
  and	
  config	
  
●  separate	
  config	
  and	
  secrets	
  
	
  
●  :ghten	
  your	
  .gi)gnore	
  file	
  
●  use	
  pre-­‐commit	
  hooks	
  
	
  
●  github.com	
  !=	
  git.yourcompany.com
@jschauma ConFoo Vancouver 2016	
  
A.  You	
  never	
  log	
  out.	
  It's	
  weird	
  that	
  their	
  ads	
  now	
  
seem	
  to	
  reflect	
  what	
  you	
  do	
  on	
  other	
  websites,	
  
but	
  that's	
  probably	
  just	
  a	
  coincidence.	
  
B.  Hit	
  a	
  keyboard	
  shortcut	
  to	
  let	
  your	
  password	
  
manager	
  fill	
  in	
  the	
  login.	
  
C.  Accidentally	
  alt-­‐tab	
  and	
  type	
  your	
  password	
  into	
  
Slack.	
  
@jschauma ConFoo Vancouver 2016	
  https://v.gd/ConFooOpSec15
Compartmentaliza:on	
  FTW	
  
@jschauma ConFoo Vancouver 2016	
  https://v.gd/ConFooOpSec16
Use	
  a	
  Password	
  Manager,	
  eh?	
  
@jschauma ConFoo Vancouver 2016	
  
https://v.gd/ConFooOpSec17
Chat	
  like	
  everybody’s	
  logging.	
  
(Somebody	
  always	
  is.)	
  
@jschauma ConFoo Vancouver 2016	
  
https://v.gd/ConFooOpSec18
A.  That	
  dude’s	
  cray-­‐cray.	
  None	
  of	
  this	
  applies	
  to	
  
me.	
  Lalalalala.	
  
B.  ERMAHGERD!	
  I	
  R	
  TARGET!	
  *burns	
  laptop,	
  buys	
  
new	
  eyeballs*	
  
C.  1st	
  	
  thing	
  back	
  at	
  work:	
  
	
  	
  	
  	
  	
  	
  Compile	
  New	
  Hire	
  OpSec	
  kit.	
  
New	
  Hire	
  OpSec	
  Kit	
  
•  Privacy	
  screen	
  
•  Laptop	
  webcam	
  cover	
  
•  FIDO	
  U2F	
  Security	
  Key	
  
•  USB	
  condom	
  
•  Password	
  Manager	
  License	
  
•  LiYle	
  Snitch	
  License	
  
•  RFID	
  Wallet	
  
@jschauma ConFoo Vancouver 2016	
  
https://v.gd/ConFooOpSec19
https://v.gd/ConFooOpSec20
Other	
  Easy	
  Wins	
  
•  enable	
  screen	
  locking	
  (laptop	
  &	
  mobile)	
  
•  whole	
  disk	
  encryp:on	
  
•  passcode/fingerprint	
  on	
  mobile	
  
•  ask	
  for	
  wifi	
  
•  use	
  2FA	
  
•  umask 077	
  &	
  shell	
  history	
  trunca:on	
  
@jschauma ConFoo Vancouver 2016	
  
@jschauma ConFoo Vancouver 2016	
  

Contenu connexe

Similaire à OpSec101

ConvComp2016: Human or Bot: that is the question
ConvComp2016: Human or Bot: that is the questionConvComp2016: Human or Bot: that is the question
ConvComp2016: Human or Bot: that is the questionConvComp2016
 
2018-05-09_CRAFTConf_FirstStepsMovingToTheCloud
2018-05-09_CRAFTConf_FirstStepsMovingToTheCloud2018-05-09_CRAFTConf_FirstStepsMovingToTheCloud
2018-05-09_CRAFTConf_FirstStepsMovingToTheCloudAbigail Bangser
 
How to test your mobile site without spending a fortune
How to test your mobile site without spending a fortuneHow to test your mobile site without spending a fortune
How to test your mobile site without spending a fortuneBarry Briggs
 
Embracing the anywhere, everywhere web
Embracing the anywhere, everywhere webEmbracing the anywhere, everywhere web
Embracing the anywhere, everywhere webTim Kadlec
 
Continuous Delivery: Playing with Immutable servers @commitporto 2016
Continuous Delivery: Playing with Immutable servers @commitporto 2016Continuous Delivery: Playing with Immutable servers @commitporto 2016
Continuous Delivery: Playing with Immutable servers @commitporto 2016João Cravo
 
PWA - The hidden stories about the future of the web
PWA - The hidden stories about the future of the webPWA - The hidden stories about the future of the web
PWA - The hidden stories about the future of the webRomulo Cintra
 
You gotta see this! QR codes & augmented reality
You gotta see this! QR codes & augmented realityYou gotta see this! QR codes & augmented reality
You gotta see this! QR codes & augmented realityMichael M Grant
 

Similaire à OpSec101 (7)

ConvComp2016: Human or Bot: that is the question
ConvComp2016: Human or Bot: that is the questionConvComp2016: Human or Bot: that is the question
ConvComp2016: Human or Bot: that is the question
 
2018-05-09_CRAFTConf_FirstStepsMovingToTheCloud
2018-05-09_CRAFTConf_FirstStepsMovingToTheCloud2018-05-09_CRAFTConf_FirstStepsMovingToTheCloud
2018-05-09_CRAFTConf_FirstStepsMovingToTheCloud
 
How to test your mobile site without spending a fortune
How to test your mobile site without spending a fortuneHow to test your mobile site without spending a fortune
How to test your mobile site without spending a fortune
 
Embracing the anywhere, everywhere web
Embracing the anywhere, everywhere webEmbracing the anywhere, everywhere web
Embracing the anywhere, everywhere web
 
Continuous Delivery: Playing with Immutable servers @commitporto 2016
Continuous Delivery: Playing with Immutable servers @commitporto 2016Continuous Delivery: Playing with Immutable servers @commitporto 2016
Continuous Delivery: Playing with Immutable servers @commitporto 2016
 
PWA - The hidden stories about the future of the web
PWA - The hidden stories about the future of the webPWA - The hidden stories about the future of the web
PWA - The hidden stories about the future of the web
 
You gotta see this! QR codes & augmented reality
You gotta see this! QR codes & augmented realityYou gotta see this! QR codes & augmented reality
You gotta see this! QR codes & augmented reality
 

Plus de Jan Schaumann

The Razors Edge - Cutting your TLS Baggage
The Razors Edge - Cutting your TLS BaggageThe Razors Edge - Cutting your TLS Baggage
The Razors Edge - Cutting your TLS BaggageJan Schaumann
 
Protecting Data in Untrusted Locations
Protecting Data in Untrusted LocationsProtecting Data in Untrusted Locations
Protecting Data in Untrusted LocationsJan Schaumann
 
Headless Host Scanning
Headless Host ScanningHeadless Host Scanning
Headless Host ScanningJan Schaumann
 
Safely Drinking from the Data Waterhose
Safely Drinking from the Data WaterhoseSafely Drinking from the Data Waterhose
Safely Drinking from the Data WaterhoseJan Schaumann
 
L3DSR - Overcoming Layer 2 Limitations of Direct Server Return Load Balancing
L3DSR - Overcoming Layer 2 Limitations of Direct Server Return Load BalancingL3DSR - Overcoming Layer 2 Limitations of Direct Server Return Load Balancing
L3DSR - Overcoming Layer 2 Limitations of Direct Server Return Load BalancingJan Schaumann
 
Building better tools
Building better toolsBuilding better tools
Building better toolsJan Schaumann
 

Plus de Jan Schaumann (11)

The Razors Edge - Cutting your TLS Baggage
The Razors Edge - Cutting your TLS BaggageThe Razors Edge - Cutting your TLS Baggage
The Razors Edge - Cutting your TLS Baggage
 
Protecting Data in Untrusted Locations
Protecting Data in Untrusted LocationsProtecting Data in Untrusted Locations
Protecting Data in Untrusted Locations
 
Headless Host Scanning
Headless Host ScanningHeadless Host Scanning
Headless Host Scanning
 
Safely Drinking from the Data Waterhose
Safely Drinking from the Data WaterhoseSafely Drinking from the Data Waterhose
Safely Drinking from the Data Waterhose
 
PGP for Smarties
PGP for SmartiesPGP for Smarties
PGP for Smarties
 
Fancy pants
Fancy pantsFancy pants
Fancy pants
 
Ipv6 basics
Ipv6 basicsIpv6 basics
Ipv6 basics
 
L3DSR - Overcoming Layer 2 Limitations of Direct Server Return Load Balancing
L3DSR - Overcoming Layer 2 Limitations of Direct Server Return Load BalancingL3DSR - Overcoming Layer 2 Limitations of Direct Server Return Load Balancing
L3DSR - Overcoming Layer 2 Limitations of Direct Server Return Load Balancing
 
Building better tools
Building better toolsBuilding better tools
Building better tools
 
Useless use of *
Useless use of *Useless use of *
Useless use of *
 
DST @ Yahoo!
DST @ Yahoo!DST @ Yahoo!
DST @ Yahoo!
 

Dernier

Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 

Dernier (20)

Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 

OpSec101

  • 1. OPSEC 101- a Choose Your Own Adventure for Devs, Ops and Other Humans Jan Schaumann @jschauma ConFoo Vancouver 2016  
  • 2. @jschauma ConFoo Vancouver 2016   https://v.gd/ConFooOpSec01
  • 6. OPSEC  (simplified):   being  aware  of  what  informa:on  you   make  available,  and   how  it  may  be  used  against  you,   eh?   @jschauma ConFoo Vancouver 2016  
  • 7. OPSEC  (simplified):   being  aware  of  what  type  of  informa:on   you  make  available,  and   how  it  may  be  used  against  you,  eh?   @jschauma ConFoo Vancouver 2016  @jschauma ConFoo Vancouver 2016  
  • 8. @jschauma ConFoo Vancouver 2016   Going  to  ConFoo!  
  • 9. A.  Hey,  they  don’t  call  it  a  laptop  for  nothing!   B.  Leave  the  open  laptop  outside  the  bathroom,   you're  just  gone  for  a  minute.     C.  Close  the  laptop,  pack  it  up  or  leave  it  at  your   desk.   @jschauma ConFoo Vancouver 2016  
  • 12. A.  Hit  ctrl+shiP+l  to  lock  your  laptop.   B.  Close  your  laptop,  stash  it  in  your  lockable   desk  drawer  and  swallow  the  key.   C.  PQ,  who  cares?  Your  laptop  is  configured  to   auto-­‐lock  aPer  some  :me.   @jschauma ConFoo Vancouver 2016  
  • 14. A.  Reimage  the  box  because  no  single  system   should  be  irreplacable.   B.  Make  up  an  excuse  to  wait  un:l  Bob  is  back   from  his  vaca:on.   C.  grep  the  password  out  of  Bob’s   conveniently  readable  ~/.bash_history @jschauma ConFoo Vancouver 2016  
  • 15. @jschauma ConFoo Vancouver 2016   https://v.gd/ConFooOpSec07
  • 16. ●  Do  clear  your  shell  history  once  in  a  while!   ○  aYackers  use  it  as  info  on  how  to  admin  the  system   ○  aYackers  use  it  to  mine  passwords     ●  Session   ○  history -c                                                                                                                                            #  good   ○  echo /dev/null > ~/.bash_history                                    #  beYer     ●  Persistent   ○  echo ‘set +o history’ >> ~/.bashrc                    #  good   ○  ln -sf /dev/null ~/.bash_history                  #  beYer   ○  echo ‘set +o history’ >> /etc/profile    #  best   @jschauma ConFoo Vancouver 2016   https://v.gd/ConFooOpSec08
  • 17. A.  Take  off  your  shoes,  raise  your  arms  for  the   porno  cancer  scanner  and  say  'yessir,  may  I   have  another’.   B.  Take  off  your  shoes,  shut  down  your  phone,   and  opt  for  the  freedom  grope.   C.  Breeze  through  the  pre-­‐approved  lane  because   you  gave  all  your  info  to  the  gubment  already.   @jschauma ConFoo Vancouver 2016  
  • 18. A.  Enter  1  2  3  4,  the  same  combina:on  as   on  your  (TSA-­‐approved)  luggage  lock.   B.  Enter  a  32  character  complex   passphrase,  because  fingerprint   unlocking  is  unsafe.   C.  Use  your  security  hedgehog.   @jschauma ConFoo Vancouver 2016  
  • 19. 10^4  =  10K  possibili:es   Time  to  brute  force:  <30min   @jschauma ConFoo Vancouver 2016  
  • 20. 10^6  =  1M  possibili:es   Time  to  brute  force:  >2d   @jschauma ConFoo Vancouver 2016  
  • 21. 6  alpha-­‐numeric  chars     62^6  =   56,800,235,584   possibili:es   Time  to  brute  force:   196  years   @jschauma ConFoo Vancouver 2016  
  • 22.
  • 24. @jschauma ConFoo Vancouver 2016   https://v.gd/ConFooOpSec09
  • 25. @jschauma ConFoo Vancouver 2016   https://v.gd/ConFooOpSec10
  • 28. A.  Put  on  your  privacy  sweater.   B.  Pretend  not  to  no:ce  that  the  people  next  to  you   are  laughing  at  your  slides  as  you  work  on  them.   C.  Perform  AES256-­‐CBC-­‐SHA1  encryp:on  in  your   head  and  only  enter  ciphertext.   @jschauma ConFoo Vancouver 2016  
  • 29. @jschauma ConFoo Vancouver 2016   https://v.gd/ConFooOpSec11
  • 30. @jschauma ConFoo Vancouver 2016   https://v.gd/ConFooOpSec11
  • 31. A.  Turn  off  the  phone.  (Yeah,  right.)   B.  Plug  your  phone  into  the  convenient  in-­‐ seat  USB  port  to  charge.   C.  Prac:ce  safe  OpSecs  by  using  your  USB   condom.   @jschauma ConFoo Vancouver 2016  
  • 33. A.  Sweet!    You're  already  connected  to  the   'linksys’  access  point!    How  convenient!   B.  Choose  the  hotel  wifi,  then  immediately   connect  to  your  VPN.   C.  Close  your  laptop  again.  There  are  beYer  things   to  do  than  stare  at  a  computer  screen.    Oh,   look,  a  beer  appears  in  front  of  you!    Life  is   good.   https://v.gd/ConFooOpSec13
  • 34. BeYer  clean  up!   Right  on!   @jschauma ConFoo Vancouver 2016  
  • 35. A.  Leave  your  laptop  in  your  hotel  room;  it’s  turned   off,  and  belongs  to  the  company,  so  you  don’t  care   if  somebody  steals  it.   B.  Lock  your  laptop  in  the  safe,  using  the  same  4  digit   code  you  use  everywhere  else.   C.  Carry  the  laptop  with  you,  because  seriously,  the   hotel  probably  has  a  backdoor  into  the  safe   anyway.   @jschauma ConFoo Vancouver 2016  
  • 39. A.  Follow  her  and  her  senior  engineers  on  TwiYer,   LinkedIn,  Facebook  and  share  that  cool  blog  post   about  their  great  work  culture  everywhere.   B.  Head  to  their  campus  the  next  day.  (They  have  this   cool  sculpture  in  their  lobby  -­‐  pic,  tweet,  awesome!)   C.  Pull  the  ssh  key  of  one  of  their  developers  out  of   GitHub,  break  into  their  systems  and  leave  a  note   how  to  best  contact  you.   @jschauma ConFoo Vancouver 2016  
  • 41. Avoid  leaking  secrets   into  code  repositories.   ●  separate  code  and  config   ●  separate  config  and  secrets     ●  :ghten  your  .gi)gnore  file   ●  use  pre-­‐commit  hooks     ●  github.com  !=  git.yourcompany.com @jschauma ConFoo Vancouver 2016  
  • 42. A.  You  never  log  out.  It's  weird  that  their  ads  now   seem  to  reflect  what  you  do  on  other  websites,   but  that's  probably  just  a  coincidence.   B.  Hit  a  keyboard  shortcut  to  let  your  password   manager  fill  in  the  login.   C.  Accidentally  alt-­‐tab  and  type  your  password  into   Slack.   @jschauma ConFoo Vancouver 2016  https://v.gd/ConFooOpSec15
  • 43. Compartmentaliza:on  FTW   @jschauma ConFoo Vancouver 2016  https://v.gd/ConFooOpSec16
  • 44. Use  a  Password  Manager,  eh?   @jschauma ConFoo Vancouver 2016   https://v.gd/ConFooOpSec17
  • 45. Chat  like  everybody’s  logging.   (Somebody  always  is.)   @jschauma ConFoo Vancouver 2016   https://v.gd/ConFooOpSec18
  • 46. A.  That  dude’s  cray-­‐cray.  None  of  this  applies  to   me.  Lalalalala.   B.  ERMAHGERD!  I  R  TARGET!  *burns  laptop,  buys   new  eyeballs*   C.  1st    thing  back  at  work:              Compile  New  Hire  OpSec  kit.  
  • 47. New  Hire  OpSec  Kit   •  Privacy  screen   •  Laptop  webcam  cover   •  FIDO  U2F  Security  Key   •  USB  condom   •  Password  Manager  License   •  LiYle  Snitch  License   •  RFID  Wallet   @jschauma ConFoo Vancouver 2016   https://v.gd/ConFooOpSec19 https://v.gd/ConFooOpSec20
  • 48. Other  Easy  Wins   •  enable  screen  locking  (laptop  &  mobile)   •  whole  disk  encryp:on   •  passcode/fingerprint  on  mobile   •  ask  for  wifi   •  use  2FA   •  umask 077  &  shell  history  trunca:on   @jschauma ConFoo Vancouver 2016