Blog

  • Identity Provider Versus Single-Sign-On

    Identity Provider Versus Single-Sign-On

    An identity provider (IdP) can facilitate single sign-on (SSO) by acting as a central authentication service that allows users to access multiple applications and services with a single set of login credentials. Here are the steps involved in the SSO process with an IdP (for OpenID Connect):

    1. The user logs in to the IdP: The user visits the IdP’s login page and enters their username and password. The IdP then verifies the user’s credentials and generates an authentication token.
    2. The user accesses the application or service: The user navigates to an application or service that supports SSO via the IdP.
    3. The application or service redirects the user to the IdP: When the user tries to access the application, the application detects that the user is not yet authenticated and redirects the user to the IdP with a request to authenticate.
    4. The IdP generates an access token: The IdP recognizes the user from the authentication token generated during step 1 and generates a new access token that indicates that the user is authenticated and authorised to access the application or service.
    5. The access token is sent back to the application or service: The IdP sends the access token back to the application or service.
    6. The user gains access to the application or service: The application or service recognizes the access token as valid and grants the user access to the application or service without requiring the user to enter additional login credentials.

    By acting as a central authentication service, an IdP can simplify the login process for users and reduce the risk of password reuse and related security issues. It also allows organisations to more easily manage access to multiple applications and services for their users.

    The next step… How to enable Single-Sign-On across multiple Identity Providers? For that, Agilicus can assist you with our unified authentication.

  • Who Are You? Prove It! Identity Versus Authentication

    Who Are You? Prove It! Identity Versus Authentication

    Identity and authentication are two related but distinct concepts in the context of information security.

    Identity refers to who or what an entity is. It is a unique identifier that distinguishes one entity from another. In the digital world, an identity can be represented by a username, an email address, a digital certificate, or other similar identifiers. Identity is the first step in any security process, as it allows you to determine whether the entity you are dealing with is who they claim to be.

    Authentication, on the other hand, is the process of verifying that an entity is who they claim to be. In other words, it is the process of confirming the identity of the entity. Authentication typically involves the use of credentials such as passwords, smart cards, or biometrics, which are used to prove that the entity is authorized to access a particular system or resource.

    An identity provider (IdP) is a service that manages and verifies the identities of users, and then provides authentication and authorization services to other applications and services.

    When a user tries to access a service or application that uses an IdP, the IdP collects information from the user to verify their identity. The specific information collected can vary depending on the type of IdP, the authentication method being used, and the level of security required by the application or service. However, here are some examples of the types of information an identity provider may use:

    1. User ID: A unique identifier for the user, such as an email address, username, or employee ID number.
    2. Password: A secret credential that the user provides to prove their identity.
    3. Personal Information: Additional details about the user, such as name, date of birth, address, or phone number.
    4. Device Information: Information about the device the user is accessing the application from, such as the IP address, browser type, or operating system.
    5. Multifactor Authentication Information: Additional methods of authentication beyond a password, such as a text message code, a security token, or biometric data (like a fingerprint or facial recognition).

    The IdP will typically use this information to verify the user’s identity and to generate a unique token or credential that the user can use to access the application or service. This token or credential allows the application or service to trust that the user is who they say they are, without requiring the user to provide their credentials every time they access the service.

    In summary, identity is the unique identifier that represents an entity, while authentication is the process of verifying that the entity is who they claim to be. Authentication is typically based on credentials such as passwords or biometrics, which are used to prove the identity of the entity.

  • GoDaddy Got Got: Multi-Year Breach

    GoDaddy Got Got: Multi-Year Breach

    The online world has 2 primary roots of trust: Domain Name System (DNS) and WWW. If you can control these, you can ‘prove’ you own a company. This allows you to do many things, including:

    • send email without getting blocked (DKIM, SPF, DMARC)
    • Azure domain takeover (access to Office 365, Azure Active Directory)
    • Ads placed as company (Apple, Microsoft, …)
    • Web admin consoles (Google Search Console, …)
    • Industrial espionage (web traffic, keywords, …)
    • Theft (credit card, injected Javascript keyloggers, …)

    Really, the world is your oyster if you can put records in DNS and WWW. And, the biggest managed provider of them all in this space is GoDaddy. Landing today, this filing, dropped a Silent-But-Deadly set of hard facts. Over the course of multi-years, a bad actor systematically has ongoing access to 1.2M customers.

    For examples, in March 2020, we discovered a threat actor compromised the hosting login credentials of approximately 28,000 hosting customers to their hosting accounts as well as the login credentials of a small number of our personnel. These hosting login credentials did not provide access to the hosting customers’ main GoDaddy account. We have spent resources investigating and responding to this activity, notified the impacted customers, reported the activity to applicable regulatory authorities, and are responding to requests for information regarding our data privacy and security practices, including from the Federal Trade Commission (FTC) pursuant to Civil Investigative Demands issued in July 2020 and October 2021. The timing of resolution and the outcome of this matter are uncertain. In November 2021, using a compromised password, an unauthorized third party accessed the provisioning system in our legacy code base for Managed WordPress (MWP), which impacted up to 1.2 million active and inactive MWP customers across multiple GoDaddy brands. We reported the MWP incident to applicable regulatory authorities and have responded to inquiries from customers, strategic partners, regulators, and the media. The timing of resolution and outcome of this matter are uncertain. In December 2022, an unauthorized third party gained access to and installed malware on our cPanel hosting servers. The malware intermittently redirected random customer websites to malicious sites. We continue to investigate the root cause of the incident. Based on our investigation, we believe these incidents are part of a multi-year campaign by a sophisticated threat actor group that, among other things, installed malware on our systems and obtained pieces of code related to some services within GoDaddy. To date, these incidents as well as other cyber threats and attacks have not resulted in any material adverse impact to our business or operations…

    GoDaddy SEC Filing

    The width and breadth of the breach are enormous. Is it a single breach, or a set? Somewhat academic. In 2021, GoDaddy revealed that a password was leaked, said password allowing access to 1.2M WordPress installations, perhaps allowing cloning of SSL private keys, perhaps allowing malware to be installed, etc.

    Funny, there’s that word again, password. How can one short string of characters, without even a multi-factor challenge, cause so much damage? It must be something that is shared, known by multiple people, written down somewhere. Imagine the turn-over that must exist in a company that size, this password was valid long enough for this breach to occur, in that time multiple people who knew it must have left the company.

    Is it still a single breach? What about the 2019 issue? This one is more squarely on the DNS side of the business, allowing bad spam to come from good companies.

    By this stage we are seeing a pattern. A company who is a big target (because of their scope and success) holds the keys to Boardwalk and Park Place attracts attackers, attackers who exploit weakness in strategy.

    Consider instead if the target had used a Defense In Depth strategy? Start by segmenting down to a 1:1 basis. Instead of 1 password having 1.2M sites control, how about 0 passwords instead? Strong identity, authentication, from a single-sign-on provider. A separate access token for each. Breach it, you get 1, not 1.2M. This Defense In Depth strategy is a core part of a Zero Trust Network Architecture. First solve the “Who” problem (who are you), then the “What” problem (what are you allowed to do), then the “How” problem (how do i get you there). Do it on a pairwise User<->Resource basis, rather than on a “you are in and fully trusted, now do whatever you want”.

    Now, let’s come back to the last line of that quote. “To date, these incidents as well as other cyber threats and attacks have not resulted in any material adverse impact to our business or operations…”. This is from the SEC filing. And this is, I think, the most impactful. There is no negative incentive, no feedback loop. If the downside cost of bad strategy is low, there’s no incentive to fix it. The pain was felt by their customers. Payment redirection fraud. Brand used to send spam. Spearphished. Malware on their web page. Etc. But not by the company itself. And that will have to change to change the behaviour.

  • Helping Organisations Qualify and Obtain Cyber Insurance – Ridge Canada Cyber Solutions and Agilicus Partner

    Helping Organisations Qualify and Obtain Cyber Insurance – Ridge Canada Cyber Solutions and Agilicus Partner

    Evolving cyber threats and mounting risks have made it more difficult for Canadian small to midsize businesses (SMB) to obtain cyber insurance coverage due to new, more robust security requirements. Ridge Canada Cyber Solutions (RCCS) and Agilicus have partnered to help SMBs meet their cyber insurance criteria.

    Read the full press release »

    Canadian businesses can implement Agilicus within hours at an RCCS preferred rate to meet their requirements within tight timelines. Insurance applications are mandating additional safeguards such multi-factor authentication, least privilege access, enhanced auditing. Agilicus AnyX can be used to quickly and easily implement these safeguards across employees, vendors, and supply chain partners who need access to company IT resources or industrial control systems.

    With Agilicus, these organisations will have added protection against cyber attacks and the financial and reputational loss associated with a breach. This partnership means SMBs have a path to quickly enhance their cyber posture and meet insurance criteria.

    Get in touch with out team to learn more!

  • Another Day, Another Exploit – Protecting Against the ProxyNotShell Exchange Server Zero-Day Vulnerability

    Another Day, Another Exploit – Protecting Against the ProxyNotShell Exchange Server Zero-Day Vulnerability

    Yet another zero-day vulnerability has been actively exploited out in the wild and it affects Microsoft Exchange Outlook Web Access servers (OWA), leaving them vulnerable to remote code execution (RCE). Cyber security research firm, GTSC, discovered two security flaws that enable the attack vector and released a detailed report surrounding their findings in order to help alert organisations that could be impacted. The research team suspects that a Chinese-based hacking group is responsible for the attack as the webshell codepage is 936 (a Microsoft character encoding for simplified Chinese).

    Upon discovery and validation of the exploits the team at GTSC worked with the Zero Day Initiative (ZDI) to report their findings. The Zero-Day exploit was verified by ZDI and disclosed to Microsoft so that work on a patch could begin immediately. Currently, ZDI is tracking the two exploits as ZDI-CAN-18333 and ZDI-CAN-18802 and have given them Common Vulnerability Scoring System (CVSS) scores of 8.8 and 6.3 respectively. 

    A security advisory was released on September 29, confirming the disclosure of the two vulnerabilities discovered by GTSC. While a patch is in the works and details about the vulnerability are still emerging, GTSC has revealed that the exploit chain is similar to attacks that targeted a previously addressed ProxyShell vulnerability.

    Having triaged the findings, it appears a patch for ProxyShell that was released in 2021 did not solve the problem. The two new vulnerabilities have been documented as CVE-2022–41040 and CVE-2022–41082. Security researcher, Kevin Beaumont has dubbed this recent zero-day vulnerability, ProxyNotShell. The researcher noted that exploiting the vulnerability simply requires an authenticated user account, which could be any email. That makes this an especially risky attack vector as most organisations are susceptible to compromised credentials.

    How the Microsoft Exchange Server Exploit Works

    Attacks using this zero-day vulnerability, ProxyNotShell, on the Microsoft Exchange OWA servers are carried out in two stages. The research team confirmed that the attack could be carried out on the servers with the latest software versions, ruling out the above mentioned ProxyShell vulnerability as a possible method of exploit.

    Stage 1

    Similar to the format of the ProxyShell vulnerability, researchers first discovered the exploit request in a customer log as follows:

    autodiscover/autodiscover.json?@evil.com/<Exchange-backend-endpoint>&Email=autodiscover/autodiscover.json%3f@evil.com

    Stage 2

    The above path can then be used to access a component in the Exchange server backend, where the attacker can perform remote code execution to exfiltrate data and begin to move laterally within a network.

    Microsoft’s OWA is a browser-based email client that makes it easy for users to access email, calendars, tasks and contacts and is being used by numerous organisations today.

    Immediate Mitigation Steps for the OWA Exploit

    Until a security update can be released, GTSC has offered a method for mitigating the threat by adding a rule to the Microsoft servers via the URL Rewrite Rule module as follows,

    1. 1. In Autodiscover at FrontEnd, select tab URL Rewrite, and then Request Blocking.
    2. 2. Add string “.*autodiscover\.json.*\@.*Powershell.*“ to the URL Path.
    3. 3. Condition input: Choose {REQUEST_URI}

    You can also check if your Exchange server has been compromised using a PowerShell command to scan the log files for suspicious activity:  

    Get-ChildItem -Recurse -Path <Path_IIS_Logs> -Filter "*.log" | Select-String -Pattern 'powershell.*autodiscover\.json.*\@.*200

    The team at GTSC is recommending all organisations that are using Microsoft Exchange server to do their due diligence, add the rule, and reduce their risk as soon as possible. We couldn’t agree more. 

    Zero Trust to Protect Against ProxyNotShell Exchange Server Exploits

    The persistent risk of being the next organisation to be compromised is all too real especially with the frequency zero-day exploits are discovered. The cost of a cyber attack is not just financial, it affects your customers, your sensitive corporate data, and even your reputation. 

    Defending against threats and mitigating your cyber risk starts with a defense in depth strategy that can help your organisation reduce your attack surface, making it harder for malicious actors to breach your systems. One method for significantly improving your cyber posture is Zero Trust Network Access. Zero Trust is an “Always Verify” security framework that micro-segments all resources, isolating risk.

    Agilicus AnyX makes it easy to deploy a Zero Trust security framework that centralises resource management and micro-segments down to the device level. The platform can help protect against the recent exploit affecting Microsoft Exchange OWA servers ensuring your resources are accessible to the the right users without being visible on the public internet. This is by the Agilicus Connector which creates an outbound only connection from a resource helping you block lateral traversal and prevent unauthorised traffic.

    Mitigating the risk of ProxyNotShell being exploited in your environment with the above steps could help your organisation stay protected. But it would also be prudent to take the next step in improving your cyber posture by stopping your OWA server from presenting on the public internet.


    Get in Touch

    Properly implementing a Zero Trust Network Access framework could be the difference between a system-wide breach and a truly isolated incident. When it comes improving your cyber posture, Agilicus AnyX is designed to micro-segment users and resources, enforce least privilege access, and requires any user to verify their identity using native credentials and multi-factor authentication to gain access. 

    Get in touch with our team today, and learn how Zero Trust can help you improve your cyber resilience and defend against attacks.

  • Well Timed or Coincidental, Cue the Phishing Attacks as 2.5M Students Affected by Data Breach

    Well Timed or Coincidental, Cue the Phishing Attacks as 2.5M Students Affected by Data Breach

    Just days after the President of the United States announces a plan for student loan forgiveness, we are learning about 2.5 million student borrowers who’ve had their personal information exposed in a data breach. Not only is there a heightened risk of identity theft as a result of the personally identifiable information (Pii) that was exposed, there could also be an increased risk of falling victim to very timely and convincing phishing attacks.

    Third Party Data Breach Exposes 2.5 Million Students.

    Over 2.5 million individuals with student loans from Oklahoma Student Loan Authority (OSLA) and EdFinancial have had their information exposed as hackers breached the systems of a third party services provider, Nelnet Servicing.

    The third party service provider enables online access for students to manage their loan accounts, make payments, and keep track of their financial information.

    Extent of the Student Borrower Data Breach.

    It appears Nelnet suffered the breach in July 2022 and an investigation completed by forensic-experts in August 2022 revealed the extent of the breach, the users affected, and the data that was compromised. The organisation estimates that approximately 2,501,324 individuals have been impacted by  the breach.

    Exposed user information includes:

    • Full name
    • Physical address
    • Email address
    • Phone number
    • Social Security Number

    So far it looks like no financial account or payment information has been exposed as a result of the incident.

    Cue the Phishing Attempts.

    Phishing attempts where an attacker tries to induce everyday people to reveal personal information, passwords, or banking information are all too common. We’ve seen them before, the rogers outage, the recent twilio breach, and the all too classic tax season phishing attempts

    Pair the recent news of the Biden administration’s plan to forgive student loans with a data breach affecting 2.5M student borrowers and it is only fair to anticipate a significant uptick in phishing attempts on those affected by this breach. Operating under the guise of current events and being equipped with this level of personal information, a malicious actor can launch a more convincing phishing attempt. 

    The very real risk of identity theft aside, student borrowers who were exposed by the breach can expect to receive detailed phishing attempts containing their exposed personal information. These phishing attempts will be trying to extract more information such as passwords and financial information and might use the student information as follows:

    "Hi First Name,
    
    This is Nelnet, your student loan processor. The United States Government recently announced their student loan forgiveness plan. According to your SSN on file 123 456 789, you are eligible for loan forgiveness. As a consequence we are forgiving your loan, please click this not so dubious link to proceed."

    Even convincing just 2% of those affected by the breach could result in 50 thousand people falling victim to a phishing attempt. That means in addition to the recommended vigilance against identity theft, these individuals should pay special attention to the emails they receive, where they are from, and what they are requesting.

    Inheriting Vendor Cyber Risk.

    Vendors and third parties often provide vital services and can streamline operational efficiency. Unfortunately, third parties and vendors are a common target for cyber criminals because of the access to your organisation resources and data that they may share. Vendors and third parties can offer significant value, but your organisation might also be inheriting their cyber risk. In the case of this data breach, it appears a third party service provider, Nelnet, was the source.

    What can Your Organisation do to Improve Security?

    While it is still unclear exactly how the service provider for the OSLA and EdFinancial was breached, adopting a defense in depth strategy could be the difference between becoming the next news headline or not. 

    Defense in depth is a security strategy and concept that requires multiple layers of security controls to gain access to a resource. Multiple layers of security not only delays an attacker but it increases their costs when attempting to breach your systems. The more difficult and expensive it is to launch an attack, the more likely a cyber criminal will look elsewhere.  

    Zero Trust Network Access is a powerful security framework and approach to implementing a defense in depth strategy to enable secure access to shared resources while greatly improving cyber resilience. Under a Zero Trust framework, users and resources are segmented and your organisation is able to provide least privilege access for authorised users. Every user must verify their identity and requires the permissions and privileges for access. Meanwhile your organisation can keep track of employees and service providers and what they are doing while they access your systems through detailed auditing.

    Get in touch with our team to learn more about implementing Zero Trust to adopt a defense in depth strategy to secure your organisation resources, customers, and service providers. 

  • Protecting Against the OWASP Top 10 Web Application Vulnerabilities

    Protecting Against the OWASP Top 10 Web Application Vulnerabilities

    The OWASP® Foundation (The Open Web Application Security Project) is a nonprofit organisation helping to improve software security. The organisation offers community-led open source software projects and has tens of thousands of members in hundreds of chapters worldwide. OWASP also hosts local and global conferences. 

    Widely used and very popular is the OWASP Top 10, which is a standard awareness document for developers and web application security experts that outlines the most critical web application security risks and vulnerabilities. The number of web applications that have at least one OWASP vulnerability could be as high as 68%, with Broken Access Controls being number one.

    What are the OWASP Top 10, 2021

    1. Broken Access Control – Access controls enforce user privileges, preventing them from acting outside of their permissions. Failures can lead to unauthorised access, modification, release, and destruction of data or functions outside the user’s intended privileges.

    2. Cryptographic Failures – Many web applications and their APIs do not impose strong encryption practices to properly protect sensitive corporate and customer data. This gives attackers an opportunity to intercept or modify data for criminal purposes. Strong encryption must be imposed when data is at rest or in transit.

    3. Injection – Attackers will leverage flaws such as SQL, NoSQL, OS, and LDAP injection to try and trick the interpreter into allowing them to access data without proper authorization or execute unintended commands.

    4. Insecure Design – In the design and development lifecycle of software and applications, inadequately budget for time and security requirements can allow critical vulnerabilities, to pass through into live environments, leaving attackers to find attack vectors the team never anticipated or addressed.

    5. Security Misconfiguration – Ad hoc and insufficient configuration of software and infrastructure can lead to admin or root access accounts being left in place, exposed cloud storage, misconfigured HTTP headers, verbose error messages that leave sensitive information exposed and more. As a best practice all operating systems, frameworks, libraries, and applications must be properly configured, patched, and upgraded – though thats not always possible. We’ll also address this.

    6. Vulnerable and Outdated Components – Vulnerable components, such as libraries, frameworks, and other software modules often lead to severe instances of data loss or server takeover. The inability to address CVE’s (Common Vulnerabilities and Exposures) undermines application security by enabling various attack vectors.

    7. Identification and Authentication Failures – When incorrectly implemented, functions related to authentication and session management allow attackers to compromise session tokens, passwords, keys, and user credentials. Multi-Factor authentication is one of the easiest ways to prevent an attacker from assuming a users identity.

    8. Software and Data Integrity Failures – Software and data integrity failures happen when applications rely on libraries and plugins from untrusted sources and insecure deployment pipelines allow these to be introduced without integrity check and create the potential for unauthorized access or system compromise.

    9. Security Logging and Monitoring Failures – No or poor logging and monitoring pair with inadequate tools for incident response can let a breach become pervasive allowing attackers to persist, traverse to to more systems, and tamper with or extract data. The average time to detect a breach is over 200 days. Fine-grained auditing and logging capabilities can substantially improve that.

    10. Server-Side Request Forgery – Server-Side Request Forgery (SSRF) flaws allow attackers to trick applications into fetching a remote resource from an unexpected destination without validating it. Unfortunately this attack can be perpetrated even when protected by a conventional firewall, VPN, or another type of network access control list (ACL).

    Zero Trust for Web Application Security

    Agilicus AnyX is designed to eliminate an attacker’s visibility into the potential OWASP Top 10 web application vulnerabilities that could exist in a given application as resources are completely hidden from non-authenticated users. This is achieved with the patented Identity Aware Web Application Firewall which acts as a proxy server (reverse proxy) and protects web applications and resources by only allowing access on the basis of authenticated identity. 

    Organisations can also leverage this component of the Agilicus AnyX platform to enhance security on the client side by modifying server headers or enforcing SSL (Secure Socket Layer) on all traffic. As a result, the Identity Aware Web Application Firewall ensures all traffic is encrypted and that users are able to access designated resources from anywhere without making them visible on the public internet.

    The Agilicus AnyX platform features that specifically protect against the OWASP Top 10 web application vulnerabilities and deliver a Zero Trust Architecture platform include:

    Role-Based Access Controls – Centralise the management of users and their roles to enact, strict least privilege access through fine-grained authorisation. Prevent (1) Broken Access Controls, (2) Cryptographic Failures, and (7) Identification and Authentication Failures. 

    Detailed Audit Trails – All users, connections and actions audited. No more (9) Security Logging and Monitoring Failures that leave you unsure of who did what for how long .

    Identity Aware Web Application Firewall – Blocks malicious and unauthenticated traffic, while protecting against (3) Injection (5) Security Misconfiguration (6) Vulnerable and Outdated Components (8) Software and Data Integrity Failures, (4) Insecure Design, (10) Server-side Request Forgery. 

    Multi-Factor Authentication – Second factor authentication requirements are built right into the login flow helping to address (7) Identification and Authentication Failures.

    Organisations face what seems like an endless number of cyber threats and that makes finding the right protection difficult. The Agilicus AnyX platform makes it easy and affordable for organisations to adopt a Zero Trust Architecture framework and take control of their ecosystem of applications to improve security and protect against the OWASP Top 10.


    Have questions? Need help? Fill out the form below to get in touch with our team.

  • Agilicus and Operational Technology

    Agilicus and Operational Technology

    industrial-internet-of-things

    The Agilicus Zero Trust principle is that all user<->resource communications are individually authenticated (identity), authorized (firewall) and audited. 

    It is the ultimate micro-segmentation.

    In a typical environment, individual users (a person or a machine) can have multiple sources of identity attestation. This occurs when we have partners, contractors, and joint ventures.

    Business risk management dictates that a given ‘blast radius’ be knowable and contained: an outage due to a cyber-security event should be constrained to the smallest area possible – it should not be global, it should not be an entire building.

    The historical focus on Cyber Security in IIoT Digitisation has been around North-South threats (internet in) and has focused around ‘perimeter’ security (Firewall + VPN). This, coupled with the long-life-cycle nature of Industrial devices, where patch management is not as evolved as in the IT domain, gives rise to increased risk of one device being used to obtain access to another (lateral traversal).

    Existing management systems and practices may rely on ‘flat addressability’, perhaps even globally across multiple facilities. Outsourced service complicates this problem:

    • I partner with Vendor A, but which of their staff made Change B? Is there a shared password involved and someone has left?

    Strategies around segmentation struggle to become fine-grained enough to matter: is it by equipment type? By assembly-line? By facility? By risk? In the end, we end up with a set of VPN + Firewall ACL’s which are not expressible. And, a VPN does not give us a fine-grained Audit record (we can merely see who had IP connectivity, not to what device they performed which action). Additionally, the segmentation does not usually handle egress firewalling. A proper egress firewall is a great defense in depth against Ransomware: if it can’t call home, it can’t activate. But cloud-hosted statistics, with large and varying IP ranges can make this egress firewall complex to configure.

    Business desires might be expressed as:

    • Resources (devices) cannot reach each other (no east-west allowed).
    • A vendor may have individuals working for them with access granted to specific groups of resources for specific times
    • e.g. Monday from 9 pm to 12 am EST Vendor A can upgrade the firmware in Resources in Factory 1, Bay 2, of type Z.
    • Resources can reach out to push statistics.
    • A vendor may monitor their own devices at any time (without write access).
    • A management system can read/write specific subtrees of information.
    • Company IT Management can access any device from anywhere.
    • 100% of actions have an audit trail (who did what when from where to what).
    • Devices cannot create outbound connections except to their own management systems.
    • Multi-factor must be used for all users, regardless of Identity Source.

    Agilicus Proposal Overview

    1. Use existing Identity Provider for 100% of users (Azure, Google, Okta, …) → no new usernames or passwords, no shared accounts. Single Sign On with a second factor.
    2. Make all connections be outbound. Agilicus Agent is the sole outbound connection. No public IP is required – Cellular or Satellite networks, NAT may be used.
    3. Create arbitrary Resource Groups matching various Authorization groups.
      • Resources can be in multiple orthogonal groups (e.g. “PLC-Type-A”, “Robot Arms”, “Factory-1-Line-1”).
    4. Create User Groups matching Roles (e.g. Vendor A, Admin, Monitoring-Co) and asign users appropriately. Groups may also be nested.
    5. For web-based (e.g. Web Application or REST applications), use OpenID Connect authentication. No client software is needed.
    6. For HMI-type systems, use Remote Desktop via Agilicus Gateway, enabling single-sign-on + authentication + authorization + audit.
    7. For SSH-type systems, use Agilicus Gateway, enabling single-sign-on + authentication + authorization + audit.
    8. For REST-style API, use Agilicus Identity-Aware Web Application Firewall to enable fine-grained authorisation.
      • (e.g. GET /* -> reader, PUT/POST/DELETE /config/* -> configuration-users, PUT/POST/DELETE /action/* -> restricted)
    9. Enable Private VLAN (or AP Isolation) on L2 segments to prevent east-west connectivity systematically.
    10. Run Agilicus Agent on machine on ‘trusted uplink’ of Private VLAN (optionally with local Edge Compute).

    Agilicus Zero-Trust Philosophy

    authentication-authorisation-access

    Agilicus adopts existing identity. Users sign-in with their natural identity provider (Corporate Azure or Google Workplace, personal Apple/Google account). This provides the ‘Who’.

    The company owns the Authorisation. This provides the ‘What’.

    Agilicus provides Access (the How).

    Every single TCP flow individually runs through these 3 stages of the pipeline: 

    1. Who are you? 
    2. Are you allowed to do what you propose? 
    3. Ok, allow it and create an Audit record.
    role-based-access-controls

    Individual protocols have different depths of capabilities. The deepest are for HTTP (Web Applications, Mobile Applications, REST APIs) followed by Remote Desktop and SSH, followed by generic TCP connectivity and existing Fat clients.

    The Authorisation rules in the firewall are exceptionally deep, allowing the ability to express things by regular expression, path, body, etc. 

    • E.g. “Accounting admins can see any payroll record, End Users can see only payroll records where their user-id matches the one in the JSON record.”

    Appendix: Use Cases

    Vendor Monitoring

    We have 3 machine types that are monitored by the manufacturer for impending failure or maintenance. In order to achieve this, the Vendor is able to, at all times, receive streamed measurements. In addition, the Vendor can interrogate the Monitoring tree on each of the controllers, on each of these machines.

    The Vendor has a ‘service account’ which is used for the streamed measurements. For the Monitoring tree, these are individual staff members. The vendor manages their own team: we authorize the vendor, they authorize the people.

    We wish to have a full audit log of which individual user performed which action on which machine.

    To achieve the objective:

    • Create a Resource for each machine instance
    • Create a Resource Group, place all instances in the Group
    • Create TCP Forwarder, destination == streamed measurement receiver (e.g. MQTT)
    • Configure devices to use Agilicus Agent as ‘destination’
    • Create Users for each person (or use Auto-Create for Identity Upstream)
    • Create Group, place all users in Group
    • Create Firewall Rules for ‘Monitoring’ (if possible, protocol dependent, for discussion)
    • Give Group role ‘Monitoring’
    • Observe audit trail for actions (either streamed, via REST api, via CLI, or via Admin web interface)

    Vendor Upgrade

    We have 10 of the same machine type in each plant. We have agreed on a 12-hour maintenance window on machine-1 in plant-1. We wish to ensure the Vendor is only talking to this device, and not any others.

    • Create firewall rules for ‘configuration’ allowing all
    • Apply permission ‘configuration’ to the Vendor, but only on the given Resource
    • Remove permission when done (TBD: discussion on Access Token timeout time and per resource for auto-timeout)
    • Observe Audit

    Admin Staff

    • Create ‘Administrators’ Group
    • Put users in Group
    • Create ‘All’ Resources group
    • Create a Firewall rule on each Resource as ‘Admin’
    • Assign ‘Administrators’ Group ‘Admin’ Role on ‘All Resources’

    For components which are HTTP, use browser as-is, OpenID Connect (via Proxy in Agilicus).

    For components which are REST API, create API key or service account (or integrate API).

    For components which are SSH, use SSH ProxyCommand for direct access (use can ‘ssh me@device’ and it will globally find it and connect: No VPN, no inbound firewall rules. Uses Agilicus Agent locally (not as a service).

    For components which are Remote Desktop (e.g. HMI) use Agilicus Profile to create RDP file for direct access.

    For components which are direct TCP, use Forwarders.

    For fat-client management software, use a Launcher.

  • Industrial Air Gap – A Tale Of 2 Users

    Industrial Air Gap – A Tale Of 2 Users

    Devices on industrial control system networks are ill-equipped for the hardships associated with the Internet and remote access. Low-speed processors, infrequent firmware upgrades, spotty security research, Common Vulnerabilities and Exposures (CVE) publishing, etc.

    Traditional wisdom says that industrial control networks should be entirely air-gapped: be attached via a short wire to use/modify the device. However, this gives a long mean-time-to-repair cycle, leading to customer complaints. Additionally, the travel time associated with staff visiting particular sites does not yield the best return on investment: other billable hours of higher value exist.

    Teams requiring access to industrial devices are often external vendors under contract rather than staff of the operator. This leads to a natural conflict: the operator is responsible for the security, and they are not willing to sacrifice security for accessibility since their business and reputation is at stake. The vendor wants the opposite – to have the least constraints and the most simplicity across their customer base.

    Imperfect and insecure compromises are often implemented without considering, or without full knowledge of, the risk involved. These might include remote PC access technologies like TeamViewer, LogMeIn, or other various VPN technologies.

    Remote PC access technologies are risky. They usually involve a shared password, rarely changed, and direct access to a PC that may not be entirely up to date or secure – itself acting as a launch-pad for malware.

    The VPN technologies are both complex as well as risky. Complex since they require shared routing tables in both directions: the industrial devices require a route back, the incoming PC requires a forward route. Complex since each operator a vendor supports uses a different VPN or version. Risky since VPN’s imply full layer-3 reachability of the entire industrial network. Risky since there is no per-user attribution and audit of actions, no fine-grained access control nor audit.

    Is there a better way? One that meets the security requirements of the operator’s IT department as well as the access requirements of the vendors?

    Yes: a Zero-Trust Network Architecture.

    Virtual Air Gap: Zero-Trust Industrial Network Architecture

    The central tenets of Zero-Trust:

    1. Identity.
      • Each actor is individually known, authenticated.
    2. Authorisation.
      • Each transaction is individually authorised based on who (identity) is trying what action on what Resource
    3. Access.
      • The transaction is routed to the destination, and only the destination resource.

    In the diagram below, we contrast the VPN world (red) with the Zero Trust world (blue).

    VPN Case

    On the VPN side, the user (e.g. vendor accessing) must: 

    1. Install multiple VPN software vendors and versions (one for each customer/site). 
    6e44653f air gapped industrial control.drawio 1

    Must have some shared-passwords written down (passwords.xlsx!) for each customer. Once the VPN is connected, they must manually add routes to the ultimate destination, or accept an ‘all route’ that moves all traffic through. In the former case, collisions can occur, this is error prone and tedious. In the latter case, we break video conferencing and other productivity tools. The VPN user has complete access to all devices, running the risk of a maintenance operation affecting the wrong system. It can be difficult to know which underlying user did which action: auditing is very fuzzy. Worse, the reliability issues. When you need it most, this VPN can fail you. Overall, VPNs are difficult for everyone. VPN protocols are commonly blocked in hotel or airport networks typically not NAT-friendly, meaning a single concurrent user might be possible, but not 2, within a given network.

    Agilicus AnyX: Zero Trust Case

    2c5cbcff ultra din installed

    Contrast the Zero Trust approach. A dual-homed device straddles, but does not route, across the two networks. This device can be an industrial PC, a private-VLAN-enabled switch, etc. There are economical 5-port ARM-based SBC that exist and are DIN-mountable which can fulfil this role and as a result, would run both the Agilicus Agent Connector as well as provide connectivity in one compact unit. 

    995a72ce industrial

    In the zero-trust model, outbound-only connections are made, using only HTTPS and traversing all firewalls. Being outbound-only, no firewall configuration changes are needed, and if one were to do a penetration test on the network – no open ports would show. 

    User authentication is done via existing Single-Sign-On: each person uses their own employer’s identity system (Azure Active Directory, Google G Suite, Okta, etc) and you can enforce a second factor. Each action through the Agilicus AnyX platform is always attributed to a single individual. No lateral traversal is possible – connections are to individual resources, not the entire network.

    Conclusion

    In this new model we have achieved several objectives:

    1. End-user (vendor) efficiency
      • No software to install or maintain
      • No searching for passwords and credentials
      • Connect to multiple sites as once
      • Firewall changes do not impact access
      • Works on any mobile device (tablet, PC, phone, etc.)
      • Works on any network: hotel, wifi, cellular
      • Works the same for all customers
    1. Operator security
      • Multi-factor authentication can be enforced, even on 3rd parties
      • Multi-factor prevents credential sharing
      • Per-user, per-resource, per-action audit available
      • No lateral traversal across industrial network
      • Creates an air-gap to your most secure networks
      • No outbound access possible from industrial network
      • No inbound holes in firewall
      • Simplified user management owing to single identity

    We have solved the dichotomy between the operator and the vendor: security with simplicity.

  • 570 News Agilicus Interview

    570 News Agilicus Interview

    Last week I was interviewed on 570 News Tech Spotlight. You can listen to the interview here where I talk through some of the simple risks that the average company faces, and how we can help. Its a feel good story!

    Now, I had no input on the intro music, so ride it out for a minute. And stick it out to ~3:45 where you can hear a hilarious joke about a Bear and 2 hikers. Some of you may have heard it before!

    And you will learn some more about the IT protections a radio station has. Its more than you might think.

    Enjoy.

  • Agilicus Awarded Government of Canada Contract

    Agilicus Awarded Government of Canada Contract

    We are pleased to announce that Agilicus has been awarded a Government of Canada Contract with Shared Services Canada (SSC). The feedback and interaction we receive from such a marquis customer on our Any X Zero Trust platform is very valuable to us, and great validation of our ideas and technology. More detail is available in the Press Release.

    Agilicus empowers users with secure access to the resources they need, such as web applications, remote systems, and shares without exposing the entire corporate network or sacrificing security. Easily adopt Zero Trust Network Access with Agilicus and give your users a secure, consistent, and frictionless experience without the need for a client, VPN, or network configuration. 

    Securely connect people with their work while protecting against cyber threats and ransomware.

    Click here to learn more about Agilicus.

  • Chewy Centre Protected By A Sponge

    Chewy Centre Protected By A Sponge

    Cisco recently announced a slew of vunerabilities, including three 10 out of 10 vulnerabilities in their popular small business line of VPN routers. Some of the devices vulnerable are out of support, no updates will be available. 10 out of 10 means it is simple to exploit, without privilege, remotely. And, this is not a good thing for the device that protects your network from the world, the single bastion.

    In 2010 Forrester Research published an article called ‘No More Chewy Centers: Introducing The Zero Trust Model Of Information Security’. The thesis was that network design was currently based on the concept of an M&M: a hard outer shell, a soft interior. And, that this was no longer sufficient since threats could get in, could walk sideways once in.

    Like many research articles it spawned debate, discussion, but, immediately, not a lot of action. People continued to slap a single security device at the perimiter, use it to VPN to the interior. They would then ‘harden’ the access, forcing things like multi-factor for remote access, assuming that all threats came in from the outside. The walled garden surrounded by the desolate desert.

    Recently Cisco has announced a list of vulnerabilities affecting common business routers. Notable in this list is 3 vulnerabilities rated 10 out of 10 (see the CVSS calculator to understand what this means). And, this got me to thinking. What are the vulnerabilities? How would they be exploited in a way that demonstrates the fallacy of the castle-and-moat security?

    961d9b7c image

    Well first, one of the vulnerabilities is in the SSL layer. To exploit it you do not need to have credentials, merely layer 3 access. Since these Cisco devices are typically the access router + VPN, they will indeed be network accessible. Let’s do a quick Shodan.io search. OK, confirmed. These devices inhabit the Internet. This means that your VPN is indeed now the magic carpet into that ‘Chewy Centre’, no questions asked, courtesy of the Remote Code Execution flaw.

    Second, one of the vulnerabilities is in the management web UI. Let’s assume we have one of these devices solely inside our network. No inbound access from the Internet. This must be safe, right? Well, let’s hypothesise for a second. Do you micro-segment your internal network? If you were a valid user sitting at a desk would you have access to this router? The answer is nearly certainly yes, why not? Now, I wonder if I could entice one of your users to go to a web site I controlled? Maybe via spear-phishing, a doppelganger domain, some social engineering attack, an advertisement, whatever? Now, on that site I can place some JavaScript. And it can guess the name of your router. Is it ‘rtr’? ‘router’? etc. And, that JavaScript runs as you, in your browser, inside your network. Inside the Chewy bit. It has direct access sideways to this ‘protected’ router.

    That’s right, you became the ‘bounce’ point, the pawn, in this game of lateral traversal. So, the inbound firewall did nothing to protect the ‘damaged’ router. Now the attacker has run some code on it, has a vantage point in your network to move sideways.

    Now, you might be thinking, my network team will have patched this already, right? But, some of these devices do not have (and will not have) patches available. This is a general industry problem: embedded devices tend to run for longer than their support. And, you have a lot of embedded devices around (thermostats, smart TV, PLC’s and SCADA in manufacturing, etc.) Any one of these could have one or more vulnerabilities this critical right now. Worse, there is not a systematic publishing of vulnerabilities for the embedded space. We are talking about the Cisco ones since the info is public, what about the one we don’t know about? Someone does.

    OK, now that I’ve explained a couple of the risks of the fallacy of the ‘hard outside, soft inside’ perimiter approach, what would I suggest? Well, a generic strategy of Defense In Depth. Assume you have no single strong defense, but a collection of defenses. Instead of the Maginot Line, you have a set of fallback and delay approachs. Think about limiting the ‘blast radius’. Think in terms of “when the bad thing occurs, what is my next defense” rather than “i must prevent the bad thing at all costs.”.

    Here are ten suggestions to chew on:

    • Multi-Factor Authentication should be for all users (not just admins)
    • Multi-Factor Authentication should be for all devices (not just personal)
    • Multi-Factor Authentication should be for all networks (not just external or remote)
    • Use privileged access management (no layer 3 access should be possible for unauthenticated users to your infrastructure)
    • Use zero-trust concepts like identity<->resource pairwise authorisation
    • Have sensors, logs, tripwires so you can answer the “where did it go next?”
    • Move devices and longer lived things to their own networks
    • Use Private VLAN / Client Isolation to prevent devices talking to each other
    • Use a Web Application Firewall as a terminating SSL gateway to prevent SSL overruns
    • Call me and discuss

  • Agilicus Recognised as a Top 100 Tech Company to Watch in 2022

    Agilicus Recognised as a Top 100 Tech Company to Watch in 2022

    We are incredibly excited to announce that Agilicus has been included in the FoundersBeta Top 100 Tech Companies to Follow in 2022. Every year FoundersBeta compiles their list of the top tech companies that are disrupting markets and making waves in the industry. This year, Agilicus caught their attention with it’s, cloud-native cybersecurity platform that is changing the way organizations securely connect users to their work. 

    An online, global community of innovators and change-makers, FoundersBeta is connecting its members to help drive the next generation of companies and disruptive technologies. The annual list of top tech companies recognizes incredible founders, companies, and teams for their groundbreaking approach to technology innovation and disruption. Agilicus made the list with its unique, self-managed Zero Trust Network Access platform and dedication to ensuring cybersecurity is simple and affordable for companies big and small.

    Agilicus employs a Zero Trust Network Access framework where least privilege access can be given to workers without unnecessarily exposing corporate networks. Organizations are able to connect people with their work and drive productivity while significantly reducing the risk of cyber attacks and ransomware. Our customers can deliver scalable, secure access to applications, files, and remote systems for any employee, partner, contractor or third party. Our goal is to ensure, any user, any time, from anywhere on any device can securely access only the applications they are entitled to, while restricting what they can do within those applications. This is accomplished by incorporating centralized Federated Identity Management with Multi-Factor Authentication and centralized Fine-grain Authorization Management. Our complete system drives user accessibility from any device without the need for a VPN, network configuration, or an end-user client.

    We are grateful, once again to be recognized for our work and innovation in the cyber security space. In a world of ransomware attacks and regular news worthy threats, like the most recent Log4shell vulnerability, we strive to make access safer for everyone.

  • Top 5 Cybersecurity Resolutions to Cross off Your List in 2022

    Top 5 Cybersecurity Resolutions to Cross off Your List in 2022

    secure-access

    2022 is here and there’s no looking back as we kick off the new year. But looking forward often means taking lessons from the past. When it comes to cybersecurity the lessons of the past are proving to be invaluable and can inform our cybersecurity resolutions for 2022.

    • The cost of a data breach reached an all time high in 2021.
    • Reported zero day exploits reached new heights with Log4Shell as the icing on the cake.
    • Compromised credentials were the source of 20% of all breaches.
    • Ransomware dominated news headlines as business and institutions were crippled and extorted.
    • The Cybercrime industry is booming and is estimated to have cost the global economy almost $6 Trillion in 2021

    It is no secret that 2021 saw the most cyber attacks, data breaches, and highest cost to businesses ever recorded. So, while it might be a new year, we still seem to be facing down the same rapidly evolving cyber threat landscape. It’s not all doom and gloom however, innovation in the cybersecurity technology space is starting to keep pace with the threat environment. 

    With some strong cybersecurity resolutions for 2022, your organization can put past lessons to work, eliminate attack vectors, protect against cyber threats, and even reduce costs along the way. 

    Here’s our list of the top 5 Cybersecurity Resolutions for 2022!

    1. Prevent Weak or Shared Credentials from Compromising Your Organization

    According to data compiled by IBM, 20% of all cyber breaches in 2021 were the result of compromised credentials and cost organizations over $4 million dollars on average. Introducing better password and credential policies is a way to help mitigate this risk. However, overly complex password policies can be the double edged sword that introduces more problems and poor security practices among employees. So what’s the answer?

    Adopting a simplified approach to access by introducing identity can both protect your organization and empower a workforce, ultimately improving collaboration and productivity. As an advanced security platform, Agilicus helps organizations to effortlessly introduce Federated Identity and enable Single Sign On or Social Login for all users. Identity based access and privileges ensures your workforce can securely access their work while eliminating the issues of weak and shared credentials. Learn more about introducing Identity and Access Management and Federated Identity to secure your organization against compromised credentials.

    2. Implement Secure Policies Like Multi-Factor Authentication and Auditing

    Secure policies like Multi-Factor Authentication and per-user, per-application Auditing can give your organization the competitive edge when it comes to improving cyber posture and preventing cyber attacks. Multi-Factor Authentication combines a physical factor of authentication in order for access to be permitted. Fine-grained Auditing gives you the visibility to see who accessed, what, when, and for how long.

    A strong Multi-Factor Authentication policy works by introducing a layer of complexity to access, requiring a physical object such as a phone or other device to verify identity. With Agilicus, Multi-Factor Authentication can be added for any user, device, and application (including SCADA, Operational Technology, and Old Applications). So, even if a hacker was able to determine credentials, (through a stuffing attack, brute force, or a previous breach), this additional layer of authentication can prevent them from gaining access because they would need the user’s physical device. 

    By the same token (pun not intended), per-user, per-application Auditing through Agilicus can help your team perform deep security and risk analysis with complete visibility of users and resources. Auditing capability can help your team diagnose issues, plan for the future, and in some cases achieve compliance goals. 

    There is no time like the present to introduce secure policies like Multi-Factor Authentication and fine-grained Auditing, which might even be a necessity if your organization needs to obtain cyber insurance. Check out this webinar re-run to learn more about Multi-Factor Authentication and its role in obtaining and maintaining cyber insurance.

    3. Leverage Technology to Align Cybersecurity with Business Goals

    Zero Trust was never just a buzzword. The security principles behind Zero Trust Network Access have been recognized by governments across North America and around the world as the future of cybersecurity. With the record breaking surge in cybers attacks throughout 2021 showing no signs of slowing down, it is imperative that organizations leverage new technology and security frameworks to protect their businesses.

    Zero Trust Security Frameworks offer workforces a greater degree of secure access and protection while reducing the burden on employees and IT teams. Zero Trust works by shifting access from the perimeter, effectively eliminating the traditional network edge. Instead, access is bound to a user’s identity which allows organizations to improve cyber posture and enable simple, secure, access for any user, from any device, anywhere in the world. 

    2022 might be the time to adopt a platform like Agilicus to better align cybersecurity with business goals. Agilicus’ Zero Trust Network Access Platform can be easily deployed and doesn’t require end-user clients or network changes. Learn more about the Zero Trust features Agilicus introduces to help protect against hacks and ransomware

    4. Replace Legacy Solutions with Modern Security Platforms

    IT teams are in a constant battle of conflicting demands to reduce costs, add new services, maintain convenient access, and secure the organization against evolving threats. Their job is that much harder when the organization is still using conventional, legacy platforms and solutions like the VPN to power their businesses. 

    While VPN’s have seen significant innovation over the years, the base technology and concepts are over 25 years old. Replacing the VPN with a cloud-native cybersecurity platform like Agilicus can help reduce fixed costs while segmenting access through identity. Replacing legacy technology stacks in your organization can securely enable digital workforces while offering protection from attack vectors like lateral network traversal.

    5. Educate Teams and Employees on Security Best Practices

    Finally, employee and workforce education could be one of the most powerful tools you can leverage to improve cyber resilience across your organization.

    By now most everyone knows what the internet is and how to use it. But not everyone knows how to stay safe online. Educating your workforce on the basics of personal cybersecurity can not only protect your business, but it also helps keep those same individuals personally safe from malicious actors. When people are aware of attack methods like phishing and weak passwords, they stand a better chance of not falling victim to compromise.

    Take Your Cyber Posture to the Next Level and Protect Against Cyber Threats in 2022

    Keeping up with the rapid pace of change in business includes keeping up with the rapid pace of change in technology and cybersecurity best practices. Get in touch with our team today and learn more about securing your organization with Agilicus.


    We believe that strong security should be simple and available at a lower cost. Address your Cybersecurity Resolutions of 2022 with an advanced, cloud-native cybersecurity platform. Quickly and easily secure your business without the need for end-user clients, configuration, or a VPN. 

  • NIST sp 800-63A: Introduce Yourself

    NIST sp 800-63A: Introduce Yourself

    Who are you? Identity involves knowing who you are, and then later proving it. NIST sp 800-63A enrollment is the first step, let’s talk about that!

    NIST sp 800-63A covers “How do I become aware of who you are for the first time’, also known as enrollment. In NIST sp 800-63B: How Well Do I Know You I covered how we would authenticate you the 2nd and subsequent times, but here we talk about that first time, the unambiguous ‘who are you” setup, and the levels.

    The NIST sp 800-63A covers 3 levels of “how well do I know your identity”. Quoting from the standard:

    IAL1: There is no requirement to link the applicant to a specific real-life identity. Any attributes provided in conjunction with the subject’s activities are self-asserted or should be treated as self-asserted (including attributes a CSP asserts to an RP). Self-asserted attributes are neither validated nor verified.

    IAL2: Evidence supports the real-world existence of the claimed identity and verifies that the applicant is appropriately associated with this real-world identity. IAL2 introduces the need for either remote or physically-present identity proofing. Attributes could be asserted by CSPs to RPs in support of pseudonymous identity with verified attributes. A CSP that supports IAL2 can support IAL1 transactions if the user consents.

    IAL3: Physical presence is required for identity proofing. Identifying attributes must be verified by an authorized and trained CSP representative. As with IAL2, attributes could be asserted by CSPs to RPs in support of pseudonymous identity with verified attributes. A CSP that supports IAL3 can support IAL1 and IAL2 identity attributes if the user consents.

    NIST sp 800-63A

    Paraphrasing, in level-1, you can create sock-puppet accounts, as many as you like. In level-2 you exist (this is getting kind of existentialist sartre descartes, right)? In level-3 you exist and were there in person to prove it.

    Now, there’s a brief segue into privacy. You can exist, prove you exist, and still not give all of your details each time. The attestor in level 3 might need your passport, birthdate, and a photocopy of that mole on your butt. But, the subsequent system that identifies you downstream might replace all this with its own trust “user42 is who they say they are” without more details. The more details the attestation of level 3, the more you might care (since, unlike a password, you cannot change your identity… your biometrics, your DNA, etc).

    NIST sp 800-63A Identity Levels

    The NIST sp 800-63A relies on traditional real-world identity (name, date of birth, home address). The general idea is these are hard to fake, and presence of one or two is usually unambiguous.

    The NIST sp 800-63A standard goes through three general stages: collect, validate, verify.

    Since identity is intertwined with Personal Identifiable Information (PII), there is a lot of the NIST sp 800-63A standard dedicated to what to collect when.

    • Identity proof is not related to entitlement to a service
    • Limit to minimum necessary to validate claimed identity
    • Indicate purpose at time of collection
    • Provide redress mechanism for complaints
    • Have a written policy
    • Maintain audit log record of all steps taken, including PII examined
    • Protect PII
    • Perform transactions over secure (encrypted, authenticated) channel
    • Use fraud detection (e.g. anomaly detection, geolocation, etc). This might involve checking against e.g. the US Social Security “Death Master File” (am I alive?)
    • Delete data when you stop being an identity provider
    • Do not collect (US Social Security Number)

    In NIST sp 800-63A level 1, the user self-attests: there is no validation. Think your reddit account. I am since I say I am.

    In NIST sp 800-63A level 2, you can be remote or in-person. PII is required, but minimised. At least one piece of ‘STRONG’ (‘SUPERIOR’) evidence is needed if the source had two. Note: this is sort of like the stratum-1/2/3 clocks in NTP. The place I check identity against needs to be stronger than I need. Also, interestingly, Knowledge-based is not used (e.g. I cannot use the fact I know you already). Physical address checks are done (e.g. sending a postcard). Interestingly, a PSTN number can be used here (I trust the phone company?). No word on the homeless or indigent.

    In NIST sp 800-63A level 3 we get serious. Biometrics are a must. We check for duplicate enrollment. We have a method to re-adopt previous identity (no right to be forgotten here). And, we do it old school, face-to-face in person. With 2 pieces of strong evidence.

    The NIST sp 800-63A standard provides a summary table:

    RequirementIAL1IAL2IAL3
    PresenceNo requirementsIn-person and unsupervised remote.In-person and supervised remote.
    ResolutionNo requirementsThe minimum attributes necessary to accomplish identity resolution.

    KBV may be used for added confidence.
    Same as IAL2.
    EvidenceNo identity evidence is collectedOne piece of SUPERIOR or STRONG evidence depending on strength of original proof and validation occurs with issuing source, or

    Two pieces of STRONG evidence, or

    One piece of STRONG evidence plus two (2) pieces of FAIR evidence.
    Two pieces of SUPERIOR evidence, or

    One piece of SUPERIOR evidence and one piece of STRONG evidence depending on strength of original proof and validation occurs with issuing source, or

    Two pieces of STRONG evidence plus one piece of FAIR evidence.
    ValidationNo validationEach piece of evidence must be validated with a process that is able to achieve the same strength as the evidence presented.Same as IAL2.
    VerificationNo verificationVerified by a process that is able to achieve a strength of STRONG.Verified by a process that is able to achieve a strength of SUPERIOR.
    Address ConfirmationNo requirements for address confirmationRequired. Enrollment code sent to any address of record. Notification sent by means different from enrollment code.Required. Notification of proofing to postal address.
    Biometric CollectionNoOptionalMandatory
    Security ControlsN/ASP 800-53 Moderate Baseline (or equivalent federal or industry standard).SP 800-53 High Baseline (or equivalent federal or industry standard).
    https://pages.nist.gov/800-63-3/sp800-63a.html

    Now, here’s where it gets interesting. Its one thing to say “I am X”, its another thing to say “let me figure out who you are”. Think the difference between a passport to let you in to the country vs dental records to prove who these beautiful ashes belong to. In the first case, the test is easier. “Identity XXX, lookup and match”. In the other, its “here is a set of factors we know, search all and find the one and only best match”.

    The last section of NIST sp 800-63A is also quite interesting, the derived credentials. This is a way to go from e.g. stratum 1 (the source) to stratum 2 (a system) to stratum 3 (e.g. a smart card on your belt). In it you can restrict access to some of the facts and rely on the chain of trust.

    So. We have now talked about “How do I know who you are” the first time, the levels (1/2/3), and some of the items to consider. Identity, and authentication against it, are a key aspect of any security system. Want to discuss more? Please feel free to reach out!

  • NIST sp 800-63B: How Well Do I Know You?

    NIST sp 800-63B: How Well Do I Know You?

    Zero-Trust Network Architecture has 3 steps: Authenticate (Who), Authorise(What), Access(How). 3 Levels of strength of the who are defined in NIST sp 800-63B. Does the goldilocks principle apply to you? Read on!

    in NIST sp 800-63A: Introduce Yourself I talked about how a system becomes aware of a user the first time (enrollment). In this, we talk about the subsequent authentication (are you still that person) and how strong that is. Quoting from the NIST sp 800-63B specification:

    Authenticator Assurance Level 1: AAL1 provides some assurance that the claimant controls an authenticator bound to the subscriber’s account. AAL1 requires either single-factor or multi-factor authentication using a wide range of available authentication technologies. Successful authentication requires that the claimant prove possession and control of the authenticator through a secure authentication protocol.

    Authenticator Assurance Level 2: AAL2 provides high confidence that the claimant controls an authenticator(s) bound to the subscriber’s account. Proof of possession and control of two different authentication factors is required through secure authentication protocol(s). Approved cryptographic techniques are required at AAL2 and above.

    Authenticator Assurance Level 3: AAL3 provides very high confidence that the claimant controls authenticator(s) bound to the subscriber’s account. Authentication at AAL3 is based on proof of possession of a key through a cryptographic protocol. AAL3 authentication requires a hardware-based authenticator and an authenticator that provides verifier impersonation resistance; the same device may fulfill both these requirements. In order to authenticate at AAL3, claimants are required to prove possession and control of two distinct authentication factors through secure authentication protocol(s). Approved cryptographic techniques are required.

    NIST Special Publication 800-63B

    OK, so what does that mean? In a nutshell: Level 1, status quo. A password, a door key dongle, your visa card for ‘tap’ with NFC, etc. You have a thing which proves who you are.

    Level 2, new status quo, aspirational but in progress for most. Two independent factors of the “I AM. I HAVE. I KNOW.” troika. Covered in NIST sp 800-63B.

    Level 3, not only do I know who you are, but I know the blood is flowing in your eye-vessels to avoid some sort of science-fiction-eye-on-the-scanner attack and that its not some sort of 3d-printed fingerprint your are feeding me.

    In addition to these levels, the standard talks about resilience to e.g. local malware (keyloggers), man-in-the-middle-attacks (e.g. snarfing your second-factor on the fly).

    In level 1 of NIST sp 800-63B, you must re-authenticate at least every 30 days, making it convenient for devices that are single-user and always with you.

    In level 2,multiple (unlike) factors are required. You can use two independent single-factors (e.g. password + possession of FIDO key), or, a single device which implements concurrent multi-factors (e.g. a device with biometric required to activate). Re-authentication is required at least every 12 hours (so once per shift in theory), and, if there is 30 or more minutes of inactivity. However, you can keep a session alive if its not yet reached its limit using only a single factor if you choose.

    Level 3 requires 12-hour re-authentication and 15-minute timeout. Both factors are always required. Both factors are strong and impersonation resistant. Interestingly, if you use your phone as one of the factors, unlocking the phone cannot serve as one of the authentication methods (so your 1234 PIN is no good!).

    The spec also has a good table overview:

    RequirementAAL1AAL2AAL3
    Permitted authenticator typesMemorized Secret;
    Look-up Secret;
    Out-of-Band;
    SF OTP Device;
    MF OTP Device;
    SF Crypto Software;
    SF Crypto Device;
    MF Crypto Software;
    MF Crypto Device
    MF OTP Device;
    MF Crypto Software;
    MF Crypto Device;
    or Memorized Secret plus:
     • Look-up Secret
     • Out-of-Band
     • SF OTP Device
     • SF Crypto Software
     • SF Crypto Device
    MF Crypto Device;
    SF Crypto Device plus   Memorized Secret;
    SF OTP Device plus MF Crypto Device or Software;
    SF OTP Device plus SF Crypto Software plus Memorized Secret
    FIPS 140 validationLevel 1 (Government agency verifiers)Level 1 (Government agency authenticators and verifiers)Level 2 overall (MF authenticators)
    Level 1 overall (verifiers and SF Crypto Devices)
    Level 3 physical security (all authenticators)
    Reauthentication30 days12 hours or 30 minutes inactivity; MAY use one authentication factor12 hours or 15 minutes inactivity; SHALL use both authentication factors
    Security controlsSP 800-53 Low Baseline (or equivalent)SP 800-53 Moderate Baseline (or equivalent)SP 800-53 High Baseline (or equivalent)
    MitM resistanceRequiredRequiredRequired
    Verifier-impersonation resistanceNot requiredNot requiredRequired
    Verifier-compromise resistanceNot requiredNot requiredRequired
    Replay resistanceNot requiredRequiredRequired
    Authentication intentNot requiredRecommendedRequired
    Records Retention PolicyRequiredRequiredRequired
    Privacy ControlsRequiredRequiredRequired
    NIST sp 800-63b

    Now, there are some other requirements in NIST sp 800-63B, ones that many systems don’t implement for no good reason. An example, ‘memorised secret verifiers’ (AKA passwords). “All printing ASCII (RFC 20) characters as well as the space character…”. I know I have used systems that disallow certain characters from this set. It also suggests “Unicode [ISO/ISC 10646] characters…” are allowed.

    NIST sp 800-63B also disallows ‘hints’. No personal verification questions, no “what was the name of your first pet” type things. It also allows ‘paste’ and ‘showing characters’ rather than asterisk, since they’ve found this makes for stronger passwords.

    A personal (un)favourite method of mine is also disallowed by NIST sp 800-63B. You cannot use email as an out-of-band proof (nor VoIP / SMS). So it cannot text you or email you a second-factor for login. I’m personally not a fan of these systems where you sign-in, and then get an email to retrieve with a code. They are complex, slow, and not that great IMHO.

    The NIST sp 800-63B standard calls for “Binding at Enrollment” (AKA Trust On First Use). The driver of this (a US Presidential Executive order) is summed up as “to release personal data, the user must have multiple-factors”. The only feasible method to get this is at time of initial enrollment. In addition is suggests setting up 2 multi-factor physical devices (for recovery purposes), replacing the “what was your first pet’s name” recover methods).

    NIST sp 800-63B sessions

    NIST sp 800-63B has consideration for Federation and single-sign-on across multiple sessions (where a session is defined in OWASP terminology).

    Interestingly, and new to me, session id’s should not be fingerprintable nor recognisable. This means don’t use PHPSESSID or ASP.NET_SessionId etc. The humble JWT needs a disguise according to NIST sp 800-63B.

    NIST sp 800-63B usability

    Another complex topic discussed briefly in NIST sp 800-63B… Access Tokens must not suggest presence of user. So I sign in, I get a 4 hour access token via OpenID Connect. 15-minutes later i’ve left the keyboard. The token is still valid, but I am not. This is going to take some more thought for me to internalise since the re-authentication times given are quite short for ‘refresh flow’ usage.

    Finally, NIST sp 800-63B gives some guidance around usability (after all, what is the sense in a perfect identity system if you cannot identify yourself)?

    OK, now we’ve walked through NIST sp 800-63B together. We’ve discussed the various requirements of identity, and strength of identity. For most readers, level-1 is today, level-2 is soon, and level-3 is the horizon. Many will be looking for the silver bullet (e.g. “let’s just do multi-factor with vendor A”). Many will then struggle to gasket this strong identity to existing applications, and then realise that “Authentication” 🠖”Authorisation” 🠖 “Access”, and that the system as a whole needs addressing, rather than a single layer.

    And for that, I can help. Feel free to reach out.

  • Log4Shell – Not Even the Smart Thermostat is Safe

    Log4Shell – Not Even the Smart Thermostat is Safe

    Yet another internet-breaking zero-day vulnerability, Log4Shell, has hit the wire and likely sent your IT teams into a patching frenzy, or at least it should have. Log4Shell is creating attack vectors just about everywhere and likely triggered a patch-a-thon for your technology teams as they secured important business systems. But what about operational technology like the HVAC or smart thermostat? 

    Ignoring systems that may be deemed ‘unimportant’ in comparison to your revenue-generating technology stack will leave your organization open to compromise from the Log4Shell vulnerability. There are a number of operational devices embedded into an organization that can be compromised through Log4Shell and could become the source of lateral network traversal by a malicious actor. 

    What is Log4Shell? 

    Log4j is a very widely used logging ‘library’ for Java-based software. Through this library, an attacker can send crafted log messages that are able to execute any arbitrary code (spyware, malware, ransomware, etc.). This zero-day vulnerability has been named Log4Shell, identified as CVE-2021-44228.

    The Log4j library is currently under the purview of the Apache Foundation. The library can be added to any Java-based software for the purpose of logging application and user inputs. The library is found in many different types of applications, servers, and services, most specifically enterprise software, IoT devices, and other external/internet-facing applications. That means everything from financial companies, to hospitality, or manufacturing and industrial operations could be vulnerable or even compromised already.

    While Apache has released a patch, the vulnerability is still affecting very commonly used server software such as Apache Solr, Apache Druid, Elasticsearch, Apache Dubbo, and VMware vCenter. Nearly the entire big-data stack of self-hosted and managed operators runs this software (Spark, Druid, Hadoop, Elasticsearch), which means that ingested data could also be a risk, bypassing the firewall since it’s inserted by staff.

    How it Works

    What makes the Log4Shell vulnerability so concerning is that wherever an expression is invoked, a lookup mechanism can find and replace the value contained, which can then be used to run any executable file. Unfortunately, there are a variety of lookups supported by Log4j (JNDI, SYS, ENV, JAVA, lower, and upper). 

    For example, an attacker can use the JNDI expressions in the logs to execute an attack where they make an HTTP request to a malicious web server. The request to the malicious web server can then download and execute a malicious payload. This example is one of the most common ways this vulnerability has so far been exploited. 

    Essentially, Log4Shell can be used to execute some arbitrary code without checking who wrote it, where it came from, and what it is going to do, leaving servers, networks, and devices open to compromise. 

    The popularity of Log4j means malicious actors have a huge attack surface including:

    • Network headers which get logged
    • URLs, filename, paths which get logged
    • Instant message routing, in-game purchases, user-names, comments in blogs, and more

    Nearly any field which can be set by any user can be exploitable.

    Why You Should Be Concerned

    There are very few companies around the world that aren’t affected by the Log4Shell vulnerability. The prevalence of the Log4j library is contributing to the panic we are seeing, especially as organizations like Amazon Web Services, Broadcom, Cisco, ConnectWise, Fortinet, IBM, Okta, VMware have been impacted.

    As these major organizations ensure the patches are in place and your IT team has told you “don’t worry”, or that you “are good”, ask yourself, “did anybody check the HVAC?” What about the IoT thermostat? How about the smart projector, printer, or router?

    Protecting against the Log4Shell vulnerability goes beyond updating HTTP server headers. Technology teams need to take a holistic approach to review every application or device in the organization that could be using the Log4j Java library and what it is connected to.

    There is a huge universe of products, devices, and services we use daily that are also exposed to the Log4Shell vulnerability. Aside from cranking the thermostat up or down, the risk to an organization comes in when these devices are connected to or able to connect to an internal corporate network. Oftentimes these devices are a cybersecurity afterthought and can leave an organization vulnerable to lateral network traversal attacks. 

    In the case of the Log4Shell vulnerability, an unpatched afterthought like a printer or other operational device can be used to mount a man-in-the-middle attack and gain network access. After an attacker gains network access they will be able to traverse your network, snoop, steal, damage, and execute malicious software like ransomware. The net effect is that your network is crippled, your resources are compromised, and the business might find itself facing down a ransomware threat.

    Another example of where Log4Shell can be used to gain network access is through any desktop software within your firewall or on your VPN is exploited. If a user can be influenced to open a URL or path with this magic string jndi://ldap, you may suddenly find yourself under attack from the inside.

    So when you hear, “we’re good”, it might be appropriate to think twice about those cybersecurity afterthoughts and ask your team, “Has anyone checked the Smart Thermostat?”

    What You Should Do

    Evaluating your organization’s tech stack beyond the technology powering business activities, and keeping other devices in mind is a good step. The technology powering your facilities could very well be the doorway into your corporate network and if it is vulnerable to Log4Shell, malicious code could be easily executed on your network.

    What should you do? Patching this zero-day vulnerability is of critical importance. If it can’t be patched, any exposed devices should be isolated from your network. You might also think twice about stopping at simply implementing a patch and instead start thinking about how you can harden your cyber posture with tools like Web Application Firewalls, or fine-grained Access Controls.

    Another step in improving your resilience to these types of cyber risk events is ensuring your IT organization is using modern security frameworks like resource segmentation, Zero-Trust, Multi-Factor Authentication, containerized servers, and egress firewalls. Finally, having a great audit system could help you identify whether you’ve had an issue already and take the necessary steps to mitigate the event.

    The depth of risk that Log4shell creates is showing the world that modern security problems require modern cybersecurity solutions. Advanced cybersecurity services can help you mitigate the risk of these types of zero-day attacks, which are only increasing in frequency with new ones discovered from one week to the next.


    Agilicus helps organizations of all sizes implement advanced cybersecurity measures that are cost-accessible, easy to deploy, and introduce identity-based access control without the need for a VPN.

  • A Little Consequences Go A Long Way: Return Of The Bear Joke

    A Little Consequences Go A Long Way: Return Of The Bear Joke

    Two hikers see a bear. One bends over to tie shoes. Other says, you can’t out-run a bear. First says, just need to out-run you. Pause laughter.

    OK, this is the subject of a long running gag, but the lesson is sound. You don’t need to be perfect to be successful. Perfect is the enemy of good enough.

    To bring this back to Cyber Security. Let’s talk about consequences. Ransomware. Its very successful, it extracts $10’s of thousands of dollars from a lot of companies. And, this amount is too small to be worth it for law enforcement to deal with the hassle of international communication and warrants etc. So, there are no (not much) consequences for the bad actors.

    Now here’s a little anecdote for you. A large percentage of the worlds malware will not activate if the computer has the Russian language installed. Why? presumably since the miscreants are based there and don’t want to face the wrath of local authorities.

    So, if we wanted to protect our country (in my case Canada), we can go down the path of hardening everything, training, etc. And its a good path. But what about another complementary idea? What if we made it a zero-tolerance zone for cyber crime? Even if the cost of policing was very high? We would make the country as a whole less appetising. If the RCMP would investigate and prosecute every cyber crime, from $1 upwards, no quarter given. It would take a lot of funding, but it would mean there was systematically consequences in Canada for cyber crime, regardless of jurisdiction, regardless of how long it took for the long arm of the law to arrive.

    This approach would tilt the playing field. Canada would become the slightly faster runner. Sure the bear would still feast on the slower runners, sure the bear could still theoretically catch us, but, well, we would be quite a bit less appetising.

    I’ll leave you with this link.

  • Fake It Till You Make It: Canadian Bank Multi-Factor Authentication Edition

    Fake It Till You Make It: Canadian Bank Multi-Factor Authentication Edition

    Multi-Factor-Authentication. 2 or more distinct of I AM. I HAVE. I KNOW. Much strength. Little cost. You would think *money* would be the first thing that had multi-factor, no?

    A few years ago I wrote of the trials and tribulations of trying to get a Canadian Bank to give me multi-factor. TL;DR: for some transactions you can get a SecureID fob, but not for all, not for login. And, you can recover the password of a file w/ the last balance, so the login is enough to totally destroy all defenses.

    So it was with some excitement that i saw that the Royal Bank of Canada had implemented a push-based multi-factor using their mobile App. Except… it neither works, nor is secure. It is what I would refer to as “Security Theatre”.

    99f411e0 image

    First, the doesn’t work. It will not send me a notification. No chirps, not a beep. Android 12, Pixel 4. So, when you try and login to the web site using the desktop you get this first message:

    Seems promsing. But, I did not get the notification. Am i blocked? Wait, no? What are my options then? Surely it cannot be to just flat out bypass the multi-factor authentication, can it?

    Of course it can. Any attacker that can get the first factor can simply bypass the second factor by saying “no thanks”. They then get this option (below).

    801da887 image

    OK, um, resend. I guess that is ok. As long as there is some limit to avoid e.g. a DoS attack.

    Send a text message? I am not a fan of SMS, its not secure, but i guess its better than nothing, it would prove *someone* owned a sim card or knew how to hack SMS/SS7. So a bit better than nothing, a last resort.

    But what’s this? A drivers license or passport? My passport was scanned in quite a lot of world hotels and airports. Its not “Something I Have” and its not “Something I AM”. Its “Something I and thousands of other people know”. Remember a few years ago when Starwood hotels was breached? And Marriott? Yeah, well, that data is permanently out there.

    To add insult to injury, the “Personal Verification Question”. This is not a second factor. I’ve written about this before. You honestly think the name of my first high school is an inherently unknowable property of the universe?

    So what is the intent of this “fake” multi-factor authentication system? It seems its to make things seem more secure, without actually doing anything. An item in a brochure saying “RBC has multi-factor”. But in practice, its just an irritant to the real users, and nothing much to the attackers.

    Why is it in 2021 my Github, my Gmail, is more secure than my Bank? Google plans to roll this out by default to billions of people, is the average ability of those people less than the average bank customer?

    Fix this. You collect $B in fees. Your profit keeps going up. When the breach occurs, you will blame me somehow, with your army of lawyers and agreements. But it was you that put this house of cards in place.

  • The Economic Cost Of Not Having Multi-Factor: MSP Lawsuit Edition

    The Economic Cost Of Not Having Multi-Factor: MSP Lawsuit Edition

    You are a small service company. You do work for your customers, you bill them for it. Suddenly, some miscreant sneaks in through your lightly secured infrastructure, sends them a change in billing information. Who is at fault? You for not securing? The customer for not checking? Well clearly the criminal owns some of the blame 🙂 These are the questions a judge in Mahoning County is being asked to solve in this lawsuit.

    In BOARDMAN MOLDED PRODUCTS INC v INVOLTA LLC, the case is based on Boardman’s claim that Involta (their MSP) insufficiently secured its own (Involta’s) network, allowing a bad actor access to customer lists, and to send email with invalid invoices.

    This plastic’s fabrication company then paid the invoices, totalling ~ $1.8M USD.

    Involta was notified through a trouble ticket (and closed it as Fake News!).

    So, where does the blame lie? Is Boardman responsible for overseeing all of their risk, including suppliers? Is Involta responsible for overseeing their own risk to their customers? Both?

    Boardman hired Involta to handle complex technical matters, running a network, patching, etc, and thus relied on the advice and best practices of their supplier.

    The details suggest there was no multi-factor authentication used, which is indeed a table-stakes best practice.

    Interestingly, Boardman is sueing for the costs of dealing with the attack, but not the costs they paid out, so $25K rather than $1.8M.

  • Agilicus In The News: Kitchener cybersecurity firm makes remote work access simple, secure

    Agilicus In The News: Kitchener cybersecurity firm makes remote work access simple, secure

    The Record published an article today on Agilicus. It covers the back-story on what we have set out to accomplish

  • Tech Spotlight: An Impromptu Interview

    Tech Spotlight: An Impromptu Interview

    Today I had an impromptu interview w/ CityNews 570. I am reasonably certain this is my first AM radio appearance, but some of the earlier records are a bit hazy on that topic.

    You can check it out on the CityNews 570 link, https://kitchener.citynews.ca/all-audio/tech-spotlight/tuesday-november-2nd-2021-4713374.

  • Cyber-Security For Thee But Not For Me

    Cyber-Security For Thee But Not For Me

    The CompTIA 2021 National Survey of Local Government Cybersecurity and Cloud Initiatives is out. Its a (US) national survey of local government cyber-security programs, and gives you an idea of the strengths, weakness, strategies, and areas of increased spend ahead.

    A few things stood out to me. The first was around Cyber Awareness Training.

    Ninety-two percent of respondents state their jurisdiction provides employees with cyber awareness training – what to do and what not to do when it comes to Cybersecurity. Fiftynine percent state that training is provided on an on-going basis throughout the year; 34% state that training is provided once a year.

    When asked if elected officials, their staff and senior leadership are exempted from awareness training, 24% responded yes.

    CompTIA 2021 Survey

    92% is a good number to be providing the training. But, 24% allow the most senior people, and their elected officials, to skip. This is super worrying, they have the easiest to guess email addresses, the most external mail, and, often the greatest internal ‘power’ or ‘security’. This means they are the most interesting target. Why would we exempt anyone from taking (and passing, and, re-taking if not passing)? It’s probably hard to tell the Mayor to take a course, but its certainly less embarrassing than explaining the bad outcome later.

    9c413a9a image

    Another thing that stood out to me was Cloud Computing adoption.

    I’m a huge proponent. Properly done, your security goes up, your operational cost goes down, and you get a better experience for all. The cloud environments offer better security tools overall, from audit to DDoS to backup and disaster recovery.

    But, that is a big chunk who have no plans, And a big chunk who are just starting.

    87db7a2b image

    Another thing stood out to me: lack of awareness of what to do following a breach. The vast majority are unsure. What is their plan, look it up on the locked down machines that the ransomware gang is busily ex filtrating your data from?

    So, the good news, increasing progress, hardening, awareness in the public sector. There was no question around the use of multi-factor authentication, which is one I would love to know. What organisations require this for all users (and do not exempt anyone). What organisations require this on all networks (not just external)? And all applications (not just “important“)?

  • Minimum Viable Secure Product

    Minimum Viable Secure Product

    There exists a concept called Minimum Viable Product’. The intent is to find the least amount you can do that will be sell-able, and get that done as quickly as you can. The idea is to do what is needed, but not more, so that you can start gaining traction before others do. You later go back and fill in the areas that are not part of that absolute minimum. But what of security? Is there a Minimum Viable Secure Product?

    Many would argue that constraints like ‘security’ get cut or ignored here (since the MVP tends to be feature-focused, value-focused). So, a few folks got together and defined what the “Minimum Viable Secure Product” would be.

    They define a few categories: Business Controls, Application Design Controls, Application Implementation Controls, Operational Controls. I would spoil the content (check it out here), but a few specific areas warmed my heart:

    • Content Security Policy: Set a minimally permissive Content Security Policy
    • Single Sign On: Implement single sign-on using modern and industry standard protocols

    One thing they missed… They suggest single-sign-on (and you should read this as OpenID Connect), but they allow for password authentication. And, here they miss multi-factor authentication as a requirement. So i’m conflicted. I think the Minimum Viable Secure Product should *not* allow local authentication at all (neither a first or a second factor), relying solely on a shared identity provider. But, if they do allow it, it for sure should require a second factor. Hmm.

    Want to know more about Content Security Policy? See my video.

  • Telnet In Canada: Why?

    Telnet In Canada: Why?

    d266478e image

    In the early innocent days of the Internet a few protocols reigned supreme. Telnet. SMTP. Both were architected with negligible security, it was a simpler time, people were more worried about the impending death of disco and where to buy leg warmers.

    Fast forward 40 years. SMTP has been hardened via a variety of bolt-on solutions. SPF, DMARC, DKIM, TLS, etc. It now suffices. Telnet? Not so much. Open port 23 and start typing. So it should come as no surprise that I (and everyone else) suggests: get rid of it. You cannot secure it no matter how much fancy firewall and multi-factor authentication you put in front. And, this is not new advice, you’ve had years to delete this protocol from your fleet.

    So it surprised me substantially today when, as I was explaining what Telnet was to someone who was not yet around in when Tron premiered and Telnet launched, I opened Shodan to show how dead it was… and… Sacre Bleu! There it is. Starting me in the face. Not only is Telnet alive, but, Canada is half of the worlds Telnet.

    28de5749 image

    What can possibly be the reason the Great White North is a safe-haven for the devil’s port? TekSavvy and Primus are the majority. Perhaps they don’t filter port 23 and all the other worlds’ ISPs do? Perhaps Tim Horton’s uses it in Point-Of-Sale? What can be the reason?

    When we look at risky protocols (like Telnet), we often think about ‘mitigation’. E.g. smart firewalls, forced multi-factor, nonce-based-one-time-passwords.

    But when the underlying transport is insecure, the option negotiation is fraught with peril, the password is in the clear, and, well, SSH exists, there is just no reason.

    Friends don’t let friends run Telnet. If you know why its still alive here, drop me a line.

  • Multi-Factor Authentication And The Supply Chain

    Multi-Factor Authentication And The Supply Chain

    A popular nodejs library (ua-parser-js) was recently subverted to introduce some malicious code. The (legitimate) package author posted a note to Github, but, the tl;dr: is that a developer had permission to publish, had no multi-factor authentication, and got spearphished.

    And, on reading that, you are probably thinking one of a few things:

    1. This doesn’t apply to me, I’m not a programmer, I don’t even know what a nodejs is
    2. Seems like they should have used multi-factor authentication
    3. Seems like a browser issue
    4. $!@#$ open-source, insecure i tells ya!
    5. Oh no, not again

    Well, on #1, you are wrong. I guarantee you are using something in nodejs, as an end user if not as a developer. In fact, you have used it in the last couple of minutes. It is everywhere. JavaScript is what makes the web go round, and this is a popular package.

    And, on #2, yes, for sure. The amount of protection you get by enabling multi-factor is amazing. It moves these attacks from ‘easy’ to ‘not worth it’ for most attackers.

    On #3, well, nodejs is on the server as well as your browser. Its in the CI of your suppliers. Trojans were dropped, who knows where, affecting who knows what else in the build process. During the day or so this was out there there will have been hundreds of thousands of ‘pull’s into totally unknown environments, some of which will have long running ripple effects.

    Now, on #4. You would be wrong. You are only seeing this because its open. And, others saw it, got it correct. I bet for every one of these found and fixed in open source, the time is very short compared to those in proprietary code that go hidden by the lack of eyeballs.

    Now, on the Oh No, Not Again. I’ve written of this before. This exact attack has happened over and over. So, what is our call to action?

    1. Developer support platforms (github, nodejs, pypi, …) should have multi-factor on by default. This is not onerous, the target audience are developers, they can figure it out without trouble.
    2. Open source should have some reputation we can check, and, it should include some score card of best practices. How many developers have push access? Do all have multi-factor? How is the supply chain protected? If one was compromised, would that be enough?
    3. Update early, update often.
  • The Personal Verification Question: Password’s Dumb Cousin

    The Personal Verification Question: Password’s Dumb Cousin

    Multiple passwords are bad. They lead to low security and high user dissatisfaction. What’s worse? Pretend security in the form form of the Personal Verification Question. Security theatre at its finest. From banks to insurance.

    As you can see in the screenshot, I am required to select 3 ‘personal verification questions’ from this list of questions. And, if I were to answer honestly, any social media would have my answers. Seriously, how secure do you think the info is on where I went to high school? (hint: Mars)

    So, instead of increasing my security, these personal verification question make a hassle factor. I have to make up some unique string for each, and then store it in my PGP keyring, since someday they may ask me one of them. Its actually worse in my opinion than the password. And, some day, a confused agent will be on the phone w/ me wondering how it is my first car was a eiH{ahFae7oh.

    51ee0edd image

    Why can this site not use my existing Identity? Sign in with Google? Its tied to my corporate persona. Instead, yet another password, times 4, which I would guess are stored in plaintext (the personal verification question must be since presumably some agent will ask me this some day). So how long until they are hit with ransomware which exfiltrates the data?

    A simple single-sign-on with external identity provider + multi-factor authentication would be much stronger, and much simpler. The Personal Verification Question is not multi-factor (for that you need 2 of something you are, something you know, something you have, see here for more info). So its not actually increasing the security. But, worse, it makes it seem like it is. So false security arises.

    So, who will join me in the security uprising? We can demand better, simpler, more secure, all at once. Less identities, less questions, more secure.

  • Syniverse Hack, Multi-Factor Authentication, Who Cares? You Should!

    Syniverse Hack, Multi-Factor Authentication, Who Cares? You Should!

    Multi-factor authentication is your first line of defense in protecting your applications, websites, and data by requiring a second or more ‘factors’ to prove your identity, in order to grant access. Many use SMS as a second factor by sending a text with a login verification code. Understanding multi-factor authentication and how to best implement it is critical. Not all ‘factors’ are created equal.

    A recent hack suggests that the method of presenting a second factor for authentication can be nearly as important as requiring multi-factor in the first place. Syniverse, a company you most likely never heard of, but likely unknowingly used, was compromised. Syniverse, quietly mentioned the breach in a couple of paragraphs of their 333-page SEC filing. Here is an excerpt from the filing:

    “May 2021, Syniverse became aware of unauthorized access to its operational and information technology systems by an unknown individual or organization (the “May 2021 Incident”)…the unauthorized access began in May 2016…individual or organization gained unauthorized access to databases within its network on several occasions, and that login information allowing access to or from its Electronic Data Transfer (“EDT”) environment was compromised for approximately 235 of its customers.”

    In short, Syniverse was compromised for five years and affected 235 customers. And according to the company, the compromises had no impact on day-to-day operations. No harm, no foul. Again, who cares? 235 customers is not many; however, it includes all major US carriers, servicing more than 340 million Americans. Syniverse’s global customers are the largest mobile carriers (think AT&T, China Mobile, Vodafone) and through Syniverse’s inter-connection services, they reach seven billion mobile devices and process four billion transactions daily. SMS, MMS and information like call records (‘to’, ‘from’, location) and billing particulars may have been exposed.

    If you use SMS for multi-factor authentication, it may have been compromised through this 3rd party. So sure, Syniverse’s day-to-day operations were not impacted and their customers were notified, but what about their customers’ customers?

    The Syniverse May 2021 Incident is troubling: a third party may have exposed your private information and they only felt the need to mention it because of a corporate transaction. This example highlights the vulnerability of text messaging as a factor of authentication.

    SMS is a popular choice as a second factor; it’s accessible by everyone, but consequently it is the least secure choice. There are many reasons why you should not choose SMS as a second factor. For starters, it is not encrypted. But it is better than nothing at all. We may never know the extent and nature of the Syniverse breach but it’s likely not as benign as implied in the filing. However, turning on multi-factor authentication is a must.

    Learn how to add multi-factor authentication to older legacy applications.

  • I AM. I HAVE. I KNOW. Multi-Factor Authentication

    I AM. I HAVE. I KNOW. Multi-Factor Authentication

    Multi-factor authentication is combining 2 or more of something you know (password, pin), something you have (usb key, phone, …) and something you are (fingerprint, etc.). It dramatically lowers your risk if you require at least 2 different types from this list. But why?

    Let’s first talk about the risks for losing control of one of these factors. And, demonstrate how they are uncorrelated, independent risks.

    First, the thing you are. Your fingerprint, your face. What are the risks you lost control of that feature? If you do, you normally have higher risks. Some of these can be mitigated (e.g. retina scanners that ensure blood is flowing, temperature sensors for fingerprints). But normally we consider these outside the scope.

    Second, the thing you have. Your phone, a USB key. How do you lose this? Someone has to be physically near you. They break in to your house, etc. This pool of people is relatively small.

    Third, the thing you know. If you use a different password on every site, then it comes down to keyloggers or single-site-breaches. If you share the password across sites, the risk goes up. The risk here is global, anyone, anywhere.

    Now, lets examine the risks across these. The criminal gang somewhere that has purchased a dump of passwords from some old forum you used, they have no overlap with the burglar that stole your phone. And this is the key. Its not that each factor is e.g. 50% likely to be lost, so 2 factor is 1/4 likely to be lost. Its exponential, they are not correlated.

    Multi-factor, as long as you use 2 of the above, is very strong, and very simple.

    What to watch out for? Don’t get tricked into using 2 factors from the same category. A common error is using SMS, thinking its something you have (phone). But, actually, that SIM card in the phone is something you know… and, via sim-jacking, your phone number can be hijacked. Systems that use a password + pin… that is still just 2 things you know (same goes for personal verification questions).

    What else to watch out for? lateral traversal. Multi-factor authentication is for all users, all environments. Its no something you use “outside the VPN”, or for “managers” or for “financial applications”. Don’t leave a door open for that criminal to wiggle in and walk sideways. Starve them.

    I AM. I HAVE. I KNOW. The trifecta of simple and secure. Low cost, high return, all users, all applications.

  • Agilicus Named CIX Top 20 ‘Canada’s Most Innovative Companies’

    Agilicus Named CIX Top 20 ‘Canada’s Most Innovative Companies’

    I am proud of our Agilicus team to be inducted into the 2021 edition of CIX Canadian Innovation Exchange Top 20 most innovative technology companies. Recognised for our transformative Zero Trust Network Access platform, we were selected out of 492 candidates reviewed by the CIX Selection Committee. The committee is comprised of over 100+ leading global venture companies.

    Winners are selected from various technology sectors, for having disruptive technologies in a major market opportunity. Agilicus stood out across several key selection factors covering the solution offering, business model, opportunity and the ability of the team to execute. Our innovative approach for offering complex high security capabilities but making it accessible to any organization through easy deployment, at an affordable price, resonated with the Selection Committee to be included in the CIX Top 20.

    We are changing the way organizations provide secure access to their resources. Up till now VPNs are the most popular legacy access technology. Nobody has ever liked their VPN. It breaks video conferencing, amongst other performance issues, as well as, many recent newsworthy security breaches. You can read about the Colonial Pipeline ransomware attack here. Our cyber-security SaaS platform, lets our customers enable inexpensive and more secure access to their applications, files or desktops for any employee, partner, contractor or 3rd party from any device, anywhere, without the need of a VPN or client software installed. To learn more here is Don (Founder/CEO) providing a brief video overview.

    It is exciting for the team to be recognised for our efforts. We are working towards building a meaningful Canadian cyber-security company recognized around the world. This is a step towards that goal. We will be presenting our story at the CIX Top 20 2021 Summit October 27-28.