{"id":48325,"date":"2024-03-06T14:19:57","date_gmt":"2024-03-06T12:19:57","guid":{"rendered":"https:\/\/itcluster.lviv.ua\/?post_type=itid&#038;p=48325"},"modified":"2024-03-06T14:54:48","modified_gmt":"2024-03-06T12:54:48","slug":"fortifying-your-digital-stronghold","status":"publish","type":"itid","link":"https:\/\/itcluster.lviv.ua\/en\/itid\/fortifying-your-digital-stronghold\/","title":{"rendered":"Fortifying your Digital Stronghold"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<!-- itid-post_details_section.php -->\n\n<section class=\"itid-post_details_section\" id=\"itid-post_details_section_block_fcf52792027ecb1f0ae057a5cc13076f\" style=\"background-color: #005C71;\">\n        <div class=\"image\" style=\"background-image: url(https:\/\/itcluster.lviv.ua\/wp-content\/uploads\/2024\/02\/image-1.png);\"><\/div>\n        <div class=\"container-fluid\">\n        <div class=\"row\">\n                        <div class=\"col-lg-5\">\n                <div class=\"details\">\n                    <div class=\"date\"><p>March 6, 2024<\/p><\/div>\n                    <div class=\"time\"><p>12 min read<\/p><\/div>                <\/div>\n                                <div class=\"title\">\n                    <h1>Fortifying your Digital Stronghold<\/h1>\n                <\/div>\n                                <div class=\"author\">\n                    <div class=\"avatar\" style=\"background-image: url(https:\/\/itcluster.lviv.ua\/wp-content\/uploads\/2024\/03\/oleksii-popov.-net.jpg);\"><\/div>\n                    <div class=\"text\">\n                                                <div class=\"name\">\n                            <h6>Oleksii Popov<\/h6>\n                        <\/div>\n                                                <div class=\"position\">\n                            <h6>Global Director of Engineering Solutions at Customertimes<\/h6>\n                        <\/div>\n                                            <\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n<\/section>\n\n\n<!-- itid-quotes_section.php -->\n\n<section class=\"itid-quotes_section\" id=\"itid-quotes_section_block_6bcca60fc74a1e66064a7f879b8f2656\">\n    <div class=\"container-fluid\">\n        <div class=\"row\">\n            <div class=\"col\">\n                <div class=\"quotes-block\" style=\"background-color: #005C71;\"><p>Numerous articles explore the vast landscape of cybersecurity. So when Oleksii Popov, Head of Digital Engineering at Customertimes, set out to craft his piece, he opted for a unique perspective. Weaving a tale that involves noble cyber knights and insidious hacker villains, Oleksii contends that even the most intricate and crucial topics, like technology industry security, become more engaging when infused with a touch of adventure.<\/p>\n<\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n<\/section>\n\n\n\n<!-- itid-image_text_section.php -->\n\n<section class=\"itid-image_text_section\" id=\"itid-image_text_section_block_f474b173db5a709eae78d47834442039\">\n        <div class=\"image\" style=\"background-image: url(https:\/\/itcluster.lviv.ua\/wp-content\/uploads\/2024\/02\/image-2.jpg);\"><\/div>\n        <div class=\"container-fluid\">\n        <div class=\"row\">\n                        <div class=\"col-md-3 col-lg-4\"><\/div>\n                        <div class=\"col-md-9 col-lg-8\">\n                <div class=\"text\"><p>Let\u2019s start with a fable. Once upon a time, there was a platform called \u201cMy stronghold\u201d.<\/p>\n<p>The Lord of this stronghold wanted merchants (Sales Managers) to be successful, artisans (Cloud Application Developers) to work peacefully, treasury to be filled by transactions and aristocrats (End users) to be happy. The stronghold needed to work hard and produce new goods for aristocrats.<\/p>\n<p>But one day, a group of bandits, known as \u201cThe Hackers\u201d, were trying to steal the treasury and the secrets of the castle.<\/p>\n<p>The Lord of the castle has to call upon his knights (Security team, Architects and DevOps) to defend the stronghold from this new threat. These cyber knights are well-trained in the art of war, but they have never faced an enemy like this before. The hackers were using new tactics and weapons that the knights had never seen.<\/p>\n<p>The Lord needed to educate knights on tactics to defend the digital assets of the stronghold in the modern world of clouds and AI.<\/p>\n<p>&nbsp;<\/p>\n<h4><strong>Understanding the landscape<\/strong><\/h4>\n<p>The knights\ufe0f must use their wits and their knowledge of the castle to defend it from the hackers. But first, they need to understand what to defend.<\/p>\n<p>To build a comprehensive inventory of the components and their metadata and connections they should compose a Software Bill of Materials (SBOM). SBOM should include Data Fields, Automation description, Practices and Processes used.<\/p>\n<p>Knights used an SBOM automated tool to create one to make it faster. It helped not only to improve security but also contributed to compliance, transparency and collaboration, risk management, and cost optimization. It showed redundant elements of the system and \u201ccode bloat\u201d. By optimizing it, cyber knights decreased the \u201cattack surface\u201d. SBOMs can help artisans identify redundant coding, making it easier to eliminate duplicate or unnecessary additional tools.<\/p>\n<p>Cybersecurity threats have become more sophisticated, from traditional malware to advanced persistent threats and zero-day vulnerabilities. Our knights suggest using penetration testers\u2019 tools to verify the defense. Cyber knights use AI to prepare attack plans. It\u2019s better to mirror such activities to build our defense. So we need to prepare attack plan regularly, think it over and adapt against it.<\/p>\n<\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n<\/section>\n\n\n\n<!-- itid-two_columns_read_also_section.php -->\n\n<section class=\"itid-two_columns_read_also_section\" id=\"itid-two_columns_read_also_section_block_d1e04ab52045a191dfe3a796cf0258f1\">\n    <div class=\"container-fluid\">\n        <div class=\"row\">\n            <div class=\"col\">\n                <div class=\"texts-block\">\n                    <div class=\"text-block\">\n                        <div class=\"text\"><h4>Identifying privileged users<\/h4>\n<p>Knowing who holds privileged rights in a domain is crucial. Start with a review and IAM roles audit. Search groups and users, using specific search strings such as \u201cadmin\u201d as a first step. Downgrade privileges, mitigating potential escalation by attackers.<\/p>\n<\/div>                        <a href=\"https:\/\/itcluster.lviv.ua\/en\/itid\/building-startup-ecosystem-in-lviv\/\" class=\"read-also-block\">\n                            <div class=\"notice\">\n                                <h4>Read also:<\/h4>\n                            <\/div>\n                            <div class=\"content\">\n                                <div class=\"text\">\n                                    <div class=\"date\">\n                                        <p>December 13, 2021<\/p>\n                                    <\/div>\n                                    <div class=\"title\">\n                                        <h6>Building\u200c \u200cStartup\u200c \u200cEcosystem\u200c \u200cin\u200c \u200cLviv\u200c \u200c<\/h6>\n                                    <\/div>\n                                <\/div>\n                                <div class=\"thumbnail\" style=\"background-image: url(https:\/\/itcluster.lviv.ua\/wp-content\/uploads\/2022\/08\/building-startup-ecosystem-in-lviv_62fb20a71e275.png);\"><\/div>\n                            <\/div>\n                        <\/a>\n                                            <\/div>\n                    <div class=\"text-block\">\n                        <div class=\"text\"><h4>Configure session monitoring<\/h4>\n<p>Configure monitoring and security shields to highlight active sessions of specific users on hosts. This helps defenders stay ahead, minimizing an attacker&#8217;s path to privileged escalation.<\/p>\n<p>Implement AWS CloudTrail to log API calls, providing visibility into actions taken on resources.<\/p>\n<p>Set up AWS CloudWatch (or alternatives) to monitor and generate alerts based on predefined security metrics and anomalies. During the defense preparation of the stronghold, we want to be aware of all the movements. And react in case something goes out expected path.<\/p>\n<\/div>                    <\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n<\/section>\n\n\n\n<!-- itid-text_image_section.php -->\n\n<section class=\"itid-text_image_section\" id=\"itid-text_image_section_block_c7a244dd020c60af4cb574f8e4f1eef9\">\n    <div class=\"container-fluid\">\n        <div class=\"row\">\n                        <div class=\"col-lg-6\">\n                <div class=\"text\"><h4><strong>Password policy oversight<\/strong><\/h4>\n<p>Regularly checking password freshness is a key practice. Knights ask us to take it seriously. As well as 2-factor authentication wherever possible.<\/p>\n<p>The artisans are skeptical at first, but they soon realize that the new weapons and defenses are necessary to protect the stronghold from the hackers.<\/p>\n<p>&nbsp;<\/p>\n<h4><strong>Navigating complex networks<\/strong><\/h4>\n<p>For intricate networks with multiple domains, it is hard to make a proper configuration. Make a diagram with a clear map, aiding defenders in understanding the network&#8217;s domain structure and relationships. Once you have a clear picture of your networks, you can gather your party of defenders and think of ways to prevent threats.<\/p>\n<p>Re-vamp VPC configuration and port usage.<\/p>\n<p>Use AWS WAF (Web Application Firewall) which helps protect web applications from common web exploits, by allowing you to configure rules to filter and monitor HTTP traffic.<\/p>\n<\/div>\n            <\/div> \n        <\/div>\n    <\/div>\n        <div class=\"image\" style=\"background-image: url(https:\/\/itcluster.lviv.ua\/wp-content\/uploads\/2024\/02\/image-3.png);\"><\/div>\n    <\/section>\n\n\n\n<!-- itid-quotes_text_section.php -->\n\n<section class=\"itid-quotes_text_section\" id=\"itid-quotes_text_section_block_09c83e58572bc2beb6251f5e269d2947\">\n    <div class=\"container-fluid\">\n        <div class=\"row\">\n            <div class=\"col-lg-12\">\n                <div class=\"blocks\">\n                                        <div class=\"quote\" style=\"background-color: #005C71;\">\n                        <h2>The knights\ufe0f must use their wits and their knowledge of the castle to defend it from the hackers. But first, they need to understand what to defend.<\/h2>\n                    <\/div>\n                                        <div class=\"text\"><h4><strong>Defending against exfiltration attempts<\/strong><\/h4>\n<p>Identifying and preventing data exfiltration attempts is challenging. Our knights utilize cloud tools like Amazon GuardDuty for threat detection, including data exfiltration attempts and Macie to discover, classify, and protect sensitive data which leverage machine learning to enhance security.\u00a0<\/p>\n<p>This will help our stronghold defenders, allowing them to test and enhance egress solutions systematically.<\/p>\n<\/div>\n                                    <\/div>\n            <\/div> \n        <\/div>\n    <\/div>\n<\/section>\n\n\n\n<!-- itid-two_columns_section.php -->\n\n<section class=\"itid-two_columns_section\" id=\"itid-two_columns_section_block_769715196fcd107fee29c706621bc105\">\n    <div class=\"container-fluid\">\n                <div class=\"row\">\n            <div class=\"col\">\n                <div class=\"title\">\n                    <h4>ML threats<\/h4>\n                <\/div>\n            <\/div>\n        <\/div>\n                <div class=\"row\">\n            <div class=\"col\">\n                <div class=\"texts-block\">\n                    <div class=\"text-block\">\n                        <div class=\"text\"><p>It&#8217;s essential to acknowledge that ML models may undergo training on datasets that aren&#8217;t necessarily fortified with the highest security measures. Within this context, certain prevalent threats emerge:\u00a0<\/p>\n<ul>\n<li><strong>Execution via API:<\/strong> This avenue opens the door to potential vulnerabilities, exposing systems to the perils of man-in-the-middle attacks and various other exploitative moves.<\/li>\n<\/ul>\n<\/div>                    <\/div>\n                    <div class=\"text-block\">\n                        <div class=\"text\"><ul>\n<li><strong>Account manipulation through online and offline attacks:<\/strong> The landscape is rife with threats targeting account integrity, manifesting through both online and offline assault vectors.<\/li>\n<li><strong>The Exploitation of ML models from compromised sources:<\/strong> In an era where the modern &#8220;hype&#8221; for hackers revolves around exploiting ML models sourced from compromised channels, the specter of data poisoning and stolen intellectual property becomes bigger.<\/li>\n<\/ul>\n<\/div>                    <\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n            <\/div>\n<\/section>\n\n\n\n<!-- itid-text_image_quotes_section.php -->\n\n<section class=\"itid-text_image_quotes_section\" id=\"itid-text_image_quotes_section_block_04df45d4189fea68df1bd595d498a9f8\">\n    <div class=\"container-fluid\">\n        <div class=\"row\">\n                        <div class=\"col-lg-4\">\n                <div class=\"text\"><p>Additional information can be found by the <strong><a href=\"http:\/\/github.com\/mitre\/advmlthreatmatrix\" rel=\"noopener\">link<\/a><\/strong>.<\/p>\n<p>I recommend using the Adversarial ML Threat Matrix to raise awareness in this area.We have worked hard to protect the stronghold from the new threat of hackers.<\/p>\n<p>Defending against security threats in modern software environments is a multifaceted challenge that demands a proactive and adaptive approach. Our knights integrate AI into the cybersecurity arsenal, which not only bolsters the defenses but also gains a powerful ally in the ongoing battle against evolving threats. Embracing these technologies is not just a strategic move; it&#8217;s a necessity in safeguarding the integrity and resilience of the software ecosystems.<\/p>\n<p>The treasury is filled with the profits from the sales, and the stronghold is safe once again.<\/p>\n<\/div>\n            <\/div> \n        <\/div>\n    <\/div>\n        <div class=\"blocks\">\n        <div class=\"image\" style=\"background-image: url(https:\/\/itcluster.lviv.ua\/wp-content\/uploads\/2024\/02\/image-4.png);\"><\/div>        <div class=\"quote\" style=\"background-color: #005C71;\"><h2>Our knights integrate AI into the cybersecurity arsenal, which not only bolsters the defenses but also gains a powerful ally in the ongoing battle against evolving threats.<\/h2><\/div>    <\/div>\n    <\/section>\n","protected":false},"featured_media":47227,"template":"single-itid-clear.php","itid":[],"class_list":["post-48325","itid","type-itid","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/itcluster.lviv.ua\/en\/wp-json\/wp\/v2\/itid\/48325"}],"collection":[{"href":"https:\/\/itcluster.lviv.ua\/en\/wp-json\/wp\/v2\/itid"}],"about":[{"href":"https:\/\/itcluster.lviv.ua\/en\/wp-json\/wp\/v2\/types\/itid"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itcluster.lviv.ua\/en\/wp-json\/wp\/v2\/media\/47227"}],"wp:attachment":[{"href":"https:\/\/itcluster.lviv.ua\/en\/wp-json\/wp\/v2\/media?parent=48325"}],"wp:term":[{"taxonomy":"itid","embeddable":true,"href":"https:\/\/itcluster.lviv.ua\/en\/wp-json\/wp\/v2\/itid?post=48325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}