<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Mike </title>
    <description>The latest articles on Forem by Mike  (@thegablemethod).</description>
    <link>https://forem.com/thegablemethod</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F762217%2Fbca0e8bc-78ac-4b11-b3e6-bb36aa9568c4.jpg</url>
      <title>Forem: Mike </title>
      <link>https://forem.com/thegablemethod</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/thegablemethod"/>
    <language>en</language>
    <item>
      <title>Practical Security Checklist for the WFH Network</title>
      <dc:creator>Mike </dc:creator>
      <pubDate>Wed, 29 Dec 2021 00:14:37 +0000</pubDate>
      <link>https://forem.com/aws-builders/practical-security-checklist-for-the-wfh-network-4i3h</link>
      <guid>https://forem.com/aws-builders/practical-security-checklist-for-the-wfh-network-4i3h</guid>
      <description>&lt;p&gt;&lt;strong&gt;Home Router | Wi-Fi Security | Recommended Free* Tools &amp;amp; Solutions&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Update Default Password:&lt;/strong&gt; the management interface on your router can be found on the bottom sticker or set up guide to update with a strong, complex password.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Router Management Interface:&lt;/strong&gt; inside your LAN limit the IP addresses that can manage your router. If available, use DHCP to assign IP addresses then configure only known approved IP’s to perform tasks on the router.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;*My bias is to limit access from only the device hosting your controller software if leveraging Ubiquiti or comparable solutions.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Security Focused DNS service provider:&lt;/strong&gt; Cloudflare released a privacy and performance focused DNS (1.1.1.1) to protect your internet traffic. Alternatives include Quad9 (9.9.9.9) launched by the Global Cyber Alliance to block known malicious domains.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Wi-Fi Protected Access/ Services Exposure:&lt;/strong&gt; ensure you are using WPA2 or WPA3 and no additional services are exposed to the internet, Shields Up can scan your router’s public IP for open ports and UPnP for assurance. &lt;a href="https://www.grc.com/shieldsup"&gt;https://www.grc.com/shieldsup&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Device Hygiene:&lt;/strong&gt; Apply software/ firmware updates to all devices to include laptops, mobile devices, and routers is the single most effective action you can take to prevent vulnerabilities from being exploited in the wild.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Network Segmentation:&lt;/strong&gt; several routers offer the option to set up vLANs (virtual local area networks) to logically isolate other endpoints, IoT devices, mobile phones, etc. from your work and other security/ privacy sensitive machines.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;MAC Address Filtering:&lt;/strong&gt; modern routers offer the capability to restrict what devices can access a network based on their MAC address (unique identifier of their physical network card). This can create an administrative burden at scale, but worth considering for a WFH network or isolated vLAN of your work devices.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Home Network Build:&lt;/strong&gt; With the requirement of remote work; a secure and robust network is essential. For under two hundred dollars this build will replace the need of renting inferior equipment from your ISP.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--m_tqQoxw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/cm0y7utq2mvmelqk2xpz.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--m_tqQoxw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/cm0y7utq2mvmelqk2xpz.jpg" alt="Image description" width="465" height="334"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Note: this will take about an hour to set up the Ubiquiti EdgeRouterX and wireless access points that meet the requirements of your home office. To ensure you are maximizing the gigabit modem and router, when logged into the EdgeRouterX, via the CLI:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;configure
set system offload hwnat enable
set system offload ipsec enable

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Device | User | Mobile&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Password Manager:&lt;/strong&gt; create and manage unique/ complex passwords; the vault and all accounts should be further secured with a One Time Password (TOTP) application or Security Key (FIDO2) to enforce Multi-factor Authentication. Recommended Password Managers include 1Password and Bitwarden.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Web Browser:&lt;/strong&gt; Protect yourself online from tracking, fingerprinting, and advertisements. I recommend Brave, do not expect privacy from popular browsers.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Test your browser’s privacy: &lt;a href="https://panopticlick.eff.org/"&gt;https://panopticlick.eff.org/&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Search Engine&lt;/strong&gt;: DuckDuckGo maintains strict location and permissions to protect your search history online.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Encrypted Messaging Applications:&lt;/strong&gt; to communicate outside of SMS, use a secure end-to end encrypted messaging service like Signal to maintain confidentiality of all communications.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Mobile Carrier PIN&lt;/strong&gt;: mitigate the risk of SIM Hijacking (social engineering mobile carriers) to transfer your phone number to an attacker owned device to bypass MFA via SMS.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Tails OS:&lt;/strong&gt; for the highest level of security; a user can boot Tails OS from a USB focused on preserving privacy and anonymity. Full details of Tails and potential limitations specific to Tails, Tor, and the current threat model can be found from the &lt;a href="https://tails.boum.org/doc/about/warnings/index.en.html"&gt;documentation&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Recommended Tools&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.rumble.run/"&gt;Rumble Network Discovery&lt;/a&gt;: created by InfoSec legend HD Moore, Rumble provides a simple interface for network discovery to protect the assets on your network (Asset Inventory is an essential foundation for security). *Trial version reverts to the free version for home use. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://github.com/objective-see/LuLu"&gt;macOS Firewall&lt;/a&gt;: Lulu is an open source firewall for macOS designed to block all unknown outbound connections (until allowed by the user). As almost all applications and malware connect back to a remote server, Lulu provides a level of control and first level user vigilance. &lt;/p&gt;

</description>
      <category>security</category>
      <category>networking</category>
      <category>privacy</category>
    </item>
    <item>
      <title>Quick, Easy, &amp; Free* Tools to up your Security Game</title>
      <dc:creator>Mike </dc:creator>
      <pubDate>Tue, 28 Dec 2021 18:45:40 +0000</pubDate>
      <link>https://forem.com/aws-builders/quick-easy-free-tools-to-up-your-security-game-1j5j</link>
      <guid>https://forem.com/aws-builders/quick-easy-free-tools-to-up-your-security-game-1j5j</guid>
      <description>&lt;p&gt;Minimal effort security enhancements to &lt;em&gt;Prevent-Detect-Respond&lt;/em&gt; to the wide range of cyber threats posing a risk to your business and personal privacy.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.yubico.com/"&gt;&lt;strong&gt;YubiKey&lt;/strong&gt;&lt;/a&gt;&lt;br&gt;
Social Engineering and phishing attacks remain the most common vector of attack to capture credentials, in addition to the constant threat of identity based attacks (ie. credential stuffing, etc.). YubiKeys are the best available solution to provide strong &lt;em&gt;(something you have)&lt;/em&gt; authentication leveraging the industry standard FIDO2  (WebAuthn and U2F) protocols. YubiKey supports Second Factor, Multi-Factor, and Passwordless use cases; example below is the second factor prompt from a Yubikey 5 Nano. *Yubikeys are roughly $20-$50 each depending on the model. &lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--AGMU1oGn--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/z7d0a3k7bmuakixrdpuz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--AGMU1oGn--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/z7d0a3k7bmuakixrdpuz.png" alt="Image description" width="800" height="392"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://phish.ly/"&gt;&lt;strong&gt;phish.ly&lt;/strong&gt;&lt;/a&gt;&lt;br&gt;
phish.ly offers a free service to scan suspicious emails with &lt;a href="https://urlscan.io/"&gt;urlscan.io&lt;/a&gt; via the robust &lt;a href="https://tines.io/"&gt;Tines.io&lt;/a&gt; automation platform. This is not a &lt;em&gt;panacea&lt;/em&gt; solution, as it is currently limited to suspicious URLs, but offers a valid alternative for users looking for an additional level of assurance for their personal Google Workspaces or ProtonMail accounts that do not have email security gateways due to budget or license constraints.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.canarytokens.org/generate"&gt;&lt;strong&gt;Canary Tokens&lt;/strong&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;High Fidelity&lt;/em&gt; Intrusion Detection is one of the hardest tasks to seamlessly accomplish in the continuous battle to &lt;em&gt;Identify&lt;/em&gt; and &lt;em&gt;Contain&lt;/em&gt; active security incidents. Canary Tokens create the ability to generate a number of detection sources in the event a bad actor has compromised a system. This can include “canary” Word and Excel Documents from a client filesystem, AWS Access/ Secret Keys, SQL server, kubeconfig tokens, and DNS tokens*.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://blog.thinkst.com/p/canarytokensorg-quick-free-detection.html"&gt;Thinkst Blog&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Thinkst provides free Log4Shell tokens to provide a level of assurance in testing for applications vulnerable to the recent Log4j vulnerability (CVE-2021–44228). **This guidance is specific to the scope of only initial testing for applications that are potentially vulnerable to the &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228"&gt;Log4j vulnerability&lt;/a&gt;. Additional mitigation and remediation guidance can be referenced from &lt;a href="https://www.cisa.gov/uscert/apache-log4j-vulnerability-guidance"&gt;CISA&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--6m_-HuO---/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/zghbqh2a6yrf5k05j1s0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--6m_-HuO---/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/zghbqh2a6yrf5k05j1s0.png" alt="Image description" width="800" height="437"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>log4j</category>
      <category>thinkstcanary</category>
      <category>yubikey</category>
    </item>
  </channel>
</rss>
