<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Security Wale]]></title><description><![CDATA[Cloud, cybersecurity, and that AI thing in between.]]></description><link>https://www.secwale.com</link><image><url>https://substackcdn.com/image/fetch/$s_!ORPU!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F78f4f145-7e22-4eba-9c48-2718e42b7797_252x252.png</url><title>Security Wale</title><link>https://www.secwale.com</link></image><generator>Substack</generator><lastBuildDate>Sat, 04 Apr 2026 01:14:39 GMT</lastBuildDate><atom:link href="https://www.secwale.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Aditya Patel]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[secwale@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[secwale@substack.com]]></itunes:email><itunes:name><![CDATA[Aditya Patel]]></itunes:name></itunes:owner><itunes:author><![CDATA[Aditya Patel]]></itunes:author><googleplay:owner><![CDATA[secwale@substack.com]]></googleplay:owner><googleplay:email><![CDATA[secwale@substack.com]]></googleplay:email><googleplay:author><![CDATA[Aditya Patel]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[The Uncomfortable Truth About Breaking Into Cybersecurity]]></title><description><![CDATA[Why the industry avoids newcomers even when demand is high]]></description><link>https://www.secwale.com/p/truth</link><guid isPermaLink="false">https://www.secwale.com/p/truth</guid><dc:creator><![CDATA[Aditya Patel]]></dc:creator><pubDate>Tue, 06 Jan 2026 05:39:56 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!vc7P!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F643f36d4-1fa6-41e7-ad1c-db9fe54db91c_2048x2048.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vc7P!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F643f36d4-1fa6-41e7-ad1c-db9fe54db91c_2048x2048.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vc7P!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F643f36d4-1fa6-41e7-ad1c-db9fe54db91c_2048x2048.heic 424w, https://substackcdn.com/image/fetch/$s_!vc7P!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F643f36d4-1fa6-41e7-ad1c-db9fe54db91c_2048x2048.heic 848w, https://substackcdn.com/image/fetch/$s_!vc7P!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F643f36d4-1fa6-41e7-ad1c-db9fe54db91c_2048x2048.heic 1272w, https://substackcdn.com/image/fetch/$s_!vc7P!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F643f36d4-1fa6-41e7-ad1c-db9fe54db91c_2048x2048.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vc7P!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F643f36d4-1fa6-41e7-ad1c-db9fe54db91c_2048x2048.heic" width="1456" height="1456" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/643f36d4-1fa6-41e7-ad1c-db9fe54db91c_2048x2048.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1456,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:557356,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.secwale.com/i/183276491?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F643f36d4-1fa6-41e7-ad1c-db9fe54db91c_2048x2048.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vc7P!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F643f36d4-1fa6-41e7-ad1c-db9fe54db91c_2048x2048.heic 424w, https://substackcdn.com/image/fetch/$s_!vc7P!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F643f36d4-1fa6-41e7-ad1c-db9fe54db91c_2048x2048.heic 848w, https://substackcdn.com/image/fetch/$s_!vc7P!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F643f36d4-1fa6-41e7-ad1c-db9fe54db91c_2048x2048.heic 1272w, https://substackcdn.com/image/fetch/$s_!vc7P!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F643f36d4-1fa6-41e7-ad1c-db9fe54db91c_2048x2048.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>There are millions of unfilled cybersecurity roles, yet capable entry-level candidates are rejected every day.</p><p>The industry publicly claims a severe skills shortage while quietly filtering out anyone who has not already been trusted elsewhere.</p><p><strong>That is why &#8220;entry-level&#8221; roles demanding three to five years of experience are so common.</strong></p><p>This is deliberate risk avoidance in a field where one bad hire can be catastrophic.</p><p>If you approach this market like a normal entry-level job hunt, you will keep failing for reasons no one is incentivized to explain. <strong>This post explains how security hiring </strong><em><strong>actually</strong></em><strong> works, and how to work within it.</strong></p><p><em>At the end of this post, you will understand:</em></p><ul><li><p><em>Why cybersecurity hiring behaves differently from software and IT</em></p></li><li><p><em>Why trust, not skill, determines who gets hired at the junior level</em></p></li><li><p><em>How elite hiring culture quietly shut the door on newcomers</em></p></li></ul><div><hr></div><h3><strong>Entry-level, 5 years required.</strong></h3><p>You may have heard the <a href="https://cybersecurityventures.com/jobs/">stat</a>: 3.5 million unfilled cybersecurity jobs globally.</p><p>And yet you apply to dozens of roles, get ghosted by most, and rejected by the rest for &#8220;lack of experience.&#8221; This happens across tech, but it is far more pronounced in cybersecurity. That is not an accident.</p><p>Here&#8217;s what&#8217;s actually happening: <strong>cybersecurity hiring is not a talent market. It&#8217;s a risk market.</strong> That single reframe changes everything.</p><p>When I was a security manager at <strong>Amazon</strong> building out my team, I reviewed hundreds of resumes every week for a handful of critical roles. Even when the role demanded seniority, the bar was unforgiving. The more relevant the experience, at scale, in complex environments, the better. Not because junior candidates lacked ability, but because I could not afford the risk. The role did not allow for learning on the job.</p><p>That is how most security hiring works.</p><p>Hiring managers aren&#8217;t optimizing for growing talent primarily. They&#8217;re optimizing to avoid blame. If they hire a senior and something goes wrong, that&#8217;s bad luck. If they hire a junior and something goes wrong, that&#8217;s bad judgment.</p><p>Software engineering, arguably, tolerates iteration and mistakes better. In cybersecurity, being 99% times right can still be a failing grade.</p><p>The &#8220;skills gap&#8221; is not about skills. It is about risk tolerance. And as the stakes rise, risk tolerance collapses.</p><p>The system is not broken. It is working as designed.</p><p>But this still leaves an obvious question. If security hiring is about avoiding risk, who absorbs that risk?</p><p>The answer is predictable.</p><div><hr></div><h3><strong>Juniors</strong></h3><p>In any risk-averse system, uncertainty gets pushed to the edges. In cybersecurity hiring, juniors are that uncertainty.</p><p>I&#8217;m not here to tell you the system should change. I&#8217;m here to tell you how to win within it. But first, you need to understand why you keep losing.</p><p>Training juniors is expensive in ways job descriptions never mention. Seniors lose hours to mentorship they can&#8217;t afford. Every new hire with access expands the attack surface security teams are supposed to shrink.</p><p>But the real killer is asymmetric consequences. The junior makes the mistake. The manager owns the fallout. <strong>No one gets promoted for taking a risk on a junior.</strong> People absolutely get fired when that risk goes wrong.</p><p>Many teams would rather stay understaffed than take on unknown risk. That open role might stay open for 18 months because &#8220;nobody qualified applied&#8221; is an easier conversation than &#8220;I hired someone junior and they caused an incident.&#8221;</p><p>This is not fair. But it is rational. And there&#8217;s another layer making it worse. One that has nothing to do with risk math and everything to do with culture.</p><div><hr></div><h3><strong>Culture eats strategy for breakfast. And juniors for lunch.</strong></h3><p>I spent years at Amazon and served as a <a href="https://www.aboutamazon.com/news/workplace/amazon-bar-raiser">Bar Raiser</a>. For those unfamiliar: Bar Raisers are trained interviewers who sit on hiring loops to ensure every new hire raises the functional bar (Are they better than 50% of their would-be peers in similar roles?), and, that they have the long term growth potential in the company through cultural fit. <strong>When everyone shares the same mental models, you move faster in a crisis.</strong></p><p>I remember one candidate who was deep functionally and a strong coder. But across multiple interviews, he hadn&#8217;t shown the builder mindset. No ownership signals. No inherent leadership qualities. The hiring manager wanted to hire fast and focused only on technical skills and made an argument to hire the candidate. I pushed back - amazing tech skills don't automatically raise the bar on culture. We did not hire the candidate.</p><p>That system works at Amazon because Amazon invests on both sides. High bar plus high support. Rigorous interviews plus intensive onboarding, and a bazillion mechanisms (like automated tools, paved road solutions) that prevent mistakes from becoming real incidents.</p><p>Here&#8217;s the problem: many companies copied Amazon&#8217;s filter, but few copied Amazon&#8217;s investment. Smaller companies adopted elite hiring standards without the onboarding, mentorship, tooling, or safety nets that make them survivable. <strong>Risk aversion plus borrowed elite culture equals an industry hostile to beginners.</strong></p><div><hr></div><h3><strong>To Wrap It Up</strong></h3><p>The skills gap is real, but not how you&#8217;ve been told.</p><p>There&#8217;s no shortage of people who want security jobs. There&#8217;s a shortage of people that hiring managers feel safe betting on.</p><p>Security hiring avoids risk by design. Juniors are excluded rationally. Elite culture tightened the gate without adding support.</p><p>This is not your fault. But it is your problem.</p><p>Here&#8217;s the one key insight from this post: <strong>In cybersecurity, trust is the entry-level requirement</strong>. You don&#8217;t convince security teams you&#8217;re smart. You convince them you&#8217;re safe. Every resume bullet, every interview answer, every portfolio piece should answer one question: why is hiring me lower risk than hiring nobody?</p><p>In Part 2, I&#8217;ll break this down into two practical paths. One for entering security from adjacent roles. One for borrowing credibility when you have none.</p><p>Your neighborhood security nerd,</p><p>Aditya :)</p>]]></content:encoded></item><item><title><![CDATA[What They Can't Teach You At Cybersecurity School]]></title><description><![CDATA[Your degree gave you the science. The industry demands the art.]]></description><link>https://www.secwale.com/p/school</link><guid isPermaLink="false">https://www.secwale.com/p/school</guid><dc:creator><![CDATA[Aditya Patel]]></dc:creator><pubDate>Mon, 29 Dec 2025 23:09:52 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!GED5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf61f60b-ad27-4f4d-a3ac-473cedfc7ef0_2560x1664.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!GED5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf61f60b-ad27-4f4d-a3ac-473cedfc7ef0_2560x1664.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GED5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf61f60b-ad27-4f4d-a3ac-473cedfc7ef0_2560x1664.heic 424w, https://substackcdn.com/image/fetch/$s_!GED5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf61f60b-ad27-4f4d-a3ac-473cedfc7ef0_2560x1664.heic 848w, https://substackcdn.com/image/fetch/$s_!GED5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf61f60b-ad27-4f4d-a3ac-473cedfc7ef0_2560x1664.heic 1272w, https://substackcdn.com/image/fetch/$s_!GED5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf61f60b-ad27-4f4d-a3ac-473cedfc7ef0_2560x1664.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GED5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf61f60b-ad27-4f4d-a3ac-473cedfc7ef0_2560x1664.heic" width="1456" height="946" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bf61f60b-ad27-4f4d-a3ac-473cedfc7ef0_2560x1664.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:946,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:651187,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.secwale.com/i/182904970?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf61f60b-ad27-4f4d-a3ac-473cedfc7ef0_2560x1664.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!GED5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf61f60b-ad27-4f4d-a3ac-473cedfc7ef0_2560x1664.heic 424w, https://substackcdn.com/image/fetch/$s_!GED5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf61f60b-ad27-4f4d-a3ac-473cedfc7ef0_2560x1664.heic 848w, https://substackcdn.com/image/fetch/$s_!GED5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf61f60b-ad27-4f4d-a3ac-473cedfc7ef0_2560x1664.heic 1272w, https://substackcdn.com/image/fetch/$s_!GED5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf61f60b-ad27-4f4d-a3ac-473cedfc7ef0_2560x1664.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image generated with Gemini.</figcaption></figure></div><p>I spent two years mastering buffer overflows and hunting cross-site scripting vulnerabilities at Johns Hopkins University&#8217;s Information Security Institute. I spent my first week on my first job after grad school learning how to write emails that don't piss people off.</p><p>Guess which skill mattered more?</p><p><strong>No one told you what actually happens when you leave the classroom and enter the corporate world. So I will.</strong></p><p>This isn&#8217;t a rant against formal education. Your professors did their best. Cryptography matters. Network protocols matter. Buffer overflows and the math you suffered through? It matters too. But <strong>there&#8217;s a gap between getting your cybersecurity degree and surviving your first year in the trenches.</strong></p><p>At the end of this post, you will master:</p><ul><li><p>Why technical skills are table stakes, not the game</p></li><li><p>How to speak &#8220;business&#8221; to executives and senior peers</p></li><li><p>What the daily grind actually looks like (spoiler: it&#8217;s not hacking)</p></li></ul><div><hr></div><h3>Dave From Accounting Will Wreck You</h3><p>Here&#8217;s something your textbooks and curriculum didn&#8217;t emphasize: humans are the variable that breaks every perfect security model (a relatable <a href="https://www.secwale.com/p/burrito">story from Chipotle</a> on this).</p><p>You learned AES-256 encryption. Same Origin Policy. Buffer Overflows. All good stuff. Everything you need for a solid foundation. But 60% of security breaches involve a human element (as per <a href="https://www.verizon.com/business/resources/Tea/reports/2025-dbir-data-breach-investigations-report.pdf">Verizon DBIR Report 2025</a>). You can build the most elegant architecture in the world, and yet Dave from accounting clicking a phishing link on a Friday afternoon undoes all of it.</p><p>And if <strong>people are your biggest vulnerability</strong>, then the people who control your budget are your biggest constraint. Which brings us to stakeholders.</p><div><hr></div><h3>The Email That Almost Broke Me</h3><p>Early in my career, I was a consultant doing security assessments. Found a gap. Wrote the recommendation. Sent the email to the relevant team and included a senior leader for visibility.</p><p>My phone rang within the hour. The senior leader was yelling. <em>Yelling</em>. They thought I, a lowly outside consultant, was ordering them around. The recommendation wasn&#8217;t even for them. They were just CC&#8217;d.</p><p>Was I technically correct? Yes. Was my communication wrong? Also yes.</p><p><strong>Being right doesn&#8217;t matter if you can&#8217;t bring people along.</strong> Security is a team sport. The team includes executives with their own pressures, egos, and priorities.</p><p>This extends to budgets. Security is a cost center. Sales generates revenue. You - in security - generate... fewer bad things happening?</p><p>You&#8217;ll spend a surprising amount of your career translating technical vulnerabilities into business impact. &#8220;SQL injection vulnerability&#8221; means nothing to a CFO. &#8220;A $4 million regulatory fine and a Wall Street Journal headline&#8221; gets attention.</p><p>But even when you get their attention, you&#8217;ll face the next reality: trade-offs.</p><div><hr></div><h3>Security Is a Trade-Off Problem</h3><p>School presents security as a goal. Industry treats it as a negotiation.</p><p>This took me years to internalize. I used to think my job was finding every vulnerability I could and demanding fixes. Wrong. My job is helping the business make informed decisions about risk.</p><p>Sometimes they need to ship next month. Sometimes the &#8220;right&#8221; fix requires six months of re-architecture. Sometimes the legacy system held together with duct tape processes $50 million daily.</p><p>I&#8217;ve had this conversation hundreds of times. A gap exists. The real fix is substantial. The business can&#8217;t wait. So we negotiate: band-aid now, medium-term mitigation, long-term fix.</p><p>Here&#8217;s what they really don&#8217;t tell you: the long-term fix almost never happens on its own. Never. &#8220;Temporary&#8221; mitigations become permanent fixtures for years. <strong>The only way real fixes happen is through top-down leadership mandates.</strong> Someone with authority saying &#8220;this is a priority&#8221; and keeping the pressure on.</p><p>Risk acceptance is real. Sometimes the business accepts a risk because fixing it costs more than the potential impact. Your job isn&#8217;t preventing that decision. Your job is making sure it&#8217;s informed and documented.</p><p>All of this sounds strategic. But most of your days won&#8217;t feel strategic at all.</p><div><hr></div><h3>The Hacker Hoodie Is a Lie</h3><p>I need to address the elephant in the room: the hacker fantasy.</p><p>You&#8217;ve seen the movies. Hoodies. Dark rooms. Green text on black screens. Here&#8217;s reality: most of your time will be logs, tickets, and spreadsheets.</p><p>Security operations means staring at dashboards. Triaging alerts (mostly false positives). Writing documentation nobody reads until something breaks. Explaining the same risk to the same people for the third time this quarter.</p><p>The career paths are <a href="https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2025/navigating-the-future-6-cybersecurity-career-paths-shaped-by-ai">diverse and evolving</a>. Engineers build systems. SecOps monitors threats. Privacy specialists handle data ethics. Forensics reconstructs incidents. Red teamers emulate attackers. <strong>But everyone, at every level, spends time on operational grind.</strong></p><p>You&#8217;ll generate tickets. Automate repetitive tasks. Update spreadsheets tracking remediation. Glamorous? No. Necessary? Absolutely.</p><p>And then, eventually, something goes wrong.</p><div><hr></div><h3>When It Hits the Fan</h3><p>At some point, there will be a breach.</p><p>School walked you through frameworks. NIST has a nice four-phase model. Clean. Logical. Real incidents are chaos.</p><p>You&#8217;re investigating while containing while communicating while documenting while someone important wants updates every fifteen minutes. Pressure is intense. Information is incomplete. Decisions have direct consequences.</p><p><strong>And remember Dave from accounting? He&#8217;s usually involved.</strong> Most incidents trace back to human error, not sophisticated nation-state attacks. <em>Someone</em> clicked something (<a href="https://netwrix.com/en/resources/blog/mgm-cyber-attack/">MGM Resorts 2023 Ransomware incident</a>). <em>Someone</em> misconfigured something (<a href="https://dl.acm.org/doi/full/10.1145/3546068">Capital One 2019 break</a>). <em>Someone</em> reused a password (<a href="https://en.wikipedia.org/wiki/Colonial_Pipeline_ransomware_attack">Colonial Pipeline 2021 Ransomware attack</a>).</p><p>The glamorous hacking you imagined? Rare. The mundane human mistakes? Constant.</p><p>This brings us full circle: security is about people. Protecting them from threats. Protecting systems from their mistakes. Convincing leadership to fund the work. Managing your own energy, health and motivation while doing it.</p><div><hr></div><h3>You&#8217;re running a Marathon</h3><p>Careers here are rarely linear. I started as a developer. Became a pen tester. Now I'm in security architecture. The path was anything but straight. I&#8217;ve met pen testers who became privacy officers. Network engineers who became CISOs. Developers who stumbled into AppSec and never left.</p><p>But I need to warn you about burnout. Security is always-on. Threats don&#8217;t respect business hours. The stress of being a digital firefighter accumulates. <strong>Set boundaries. Find employers who respect them. This is a marathon.</strong></p><p>The landscape shifts constantly. Now, AI is changing everything and new attack vectors are emerging.</p><p>Skate to where the puck is going. The people who thrive are the ones who never stop learning.</p><div><hr></div><h3>To Wrap It Up</h3><p>Your degree gave you a foundation. But you&#8217;ve only learned half the job.</p><p>The other half is people: understanding them, protecting them from themselves, convincing them to fund your work, communicating risk without making enemies.</p><p>None of this means education was wasted. It means education was the beginning.</p><p><strong>Welcome to the real world. It&#8217;s messier than the textbooks. But it&#8217;s more interesting too.</strong></p><p><em>- Your neighborhood security nerd, Aditya :)</em></p>]]></content:encoded></item><item><title><![CDATA[Goodhart’s Law: Why Your Green Security Dashboard Might Be a Red Flag]]></title><description><![CDATA[The most dangerous number in cybersecurity is a perfect score. Why 'Green' often means you aren't looking hard enough, and how to design incentives for reality.]]></description><link>https://www.secwale.com/p/goodhartslaw</link><guid isPermaLink="false">https://www.secwale.com/p/goodhartslaw</guid><dc:creator><![CDATA[Aditya Patel]]></dc:creator><pubDate>Tue, 16 Dec 2025 17:38:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!GITk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30666d00-51ae-4c14-9b7f-a9756d1ba928_3168x1344.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!GITk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30666d00-51ae-4c14-9b7f-a9756d1ba928_3168x1344.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GITk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30666d00-51ae-4c14-9b7f-a9756d1ba928_3168x1344.heic 424w, https://substackcdn.com/image/fetch/$s_!GITk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30666d00-51ae-4c14-9b7f-a9756d1ba928_3168x1344.heic 848w, https://substackcdn.com/image/fetch/$s_!GITk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30666d00-51ae-4c14-9b7f-a9756d1ba928_3168x1344.heic 1272w, https://substackcdn.com/image/fetch/$s_!GITk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30666d00-51ae-4c14-9b7f-a9756d1ba928_3168x1344.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GITk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30666d00-51ae-4c14-9b7f-a9756d1ba928_3168x1344.heic" width="1456" height="618" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/30666d00-51ae-4c14-9b7f-a9756d1ba928_3168x1344.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:618,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:743750,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.secwale.com/i/181804738?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30666d00-51ae-4c14-9b7f-a9756d1ba928_3168x1344.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!GITk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30666d00-51ae-4c14-9b7f-a9756d1ba928_3168x1344.heic 424w, https://substackcdn.com/image/fetch/$s_!GITk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30666d00-51ae-4c14-9b7f-a9756d1ba928_3168x1344.heic 848w, https://substackcdn.com/image/fetch/$s_!GITk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30666d00-51ae-4c14-9b7f-a9756d1ba928_3168x1344.heic 1272w, https://substackcdn.com/image/fetch/$s_!GITk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30666d00-51ae-4c14-9b7f-a9756d1ba928_3168x1344.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In the early 1900s in British India, the government faced a deadly problem: too many venomous cobras. Their solution seemed logical. They offered a cash bounty for every dead cobra brought in.</p><p>It worked initially. The snake population dropped. But then, the locals grew inventive. They started farming cobras to kill them and collect the bounty. When the government realized this and scrapped the program, the breeders released their worthless snakes into the wild. The result? The cobra population ended up higher than before the program started.</p><p>This is the classic cautionary tale of <strong>Goodhart&#8217;s Law</strong>. Most cybersecurity programs fail for this same simple reason. They violate <a href="https://en.wikipedia.org/wiki/Goodhart%27s_law">Goodhart&#8217;s Law</a>.</p><blockquote><p>When a measure becomes a target, it stops being a good measure.</p></blockquote><p>I&#8217;ve seen this play out repeatedly in many security teams. We introduce metrics to understand risk, and over time those same metrics quietly become goals. Once that happens, behavior shifts. Often not because people are careless or trying to cheat the system, but because they are responding rationally to the incentives in front of them. Basic human behavior.</p><h4>The Problem: Performance Theatre</h4><p>Think about the metrics many of us rely on in cybersecurity. Vulnerability counts. Open Critical/High findings. Phishing simulation click rates. Unpatched libraries. Asset coverage percentages. None are inherently wrong. The problem starts when success is defined by improving the number rather than reducing real risk. Teams naturally focus on what is easiest to fix, while harder, more structural issues get deferred.</p><p>This is how performance theater creeps in. I&#8217;ve watched teams close tickets at impressive speed while long-standing architectural weaknesses remained untouched. Dashboards looked healthy. Reports reassured leadership. Meanwhile, the most critical systems were still exposed. Security improved on paper, not in reality.</p><p>The same pattern shows up in awareness programs. In environments where phishing metrics are enforced too aggressively, people stop reporting real emails because they fear being penalized. The measure that was supposed to improve security ends up eroding trust and weakening detection.</p><h4>The Solution: Tug of War Metrics</h4><p>The strongest teams I&#8217;ve worked with design explicitly for this failure mode. They don&#8217;t abandon metrics, but they refuse to let any single metric stand alone. Every measure is paired with a counter-measure that pulls behavior in the opposite direction, a &#8220;tug of war&#8221; that forces balance.</p><ul><li><p>If you track <strong>Mean Time to Remediate (MTTR)</strong>, you must also track <strong>Incident Recurrence</strong>. (Did we fix it fast, or did we just put a band-aid on it?)</p></li><li><p>If you track <strong>Vulnerability Counts</strong>, you must also track <strong>Exploitability</strong>. (Are we fixing what matters?)</p></li><li><p>If you track <strong>Alerts Closed</strong>, you must also track <strong>Detection Gaps</strong>. (Are we clearing the queue or missing the signal?)</p></li></ul><p>This balance is intentional. Competing metrics create tension, and that tension forces judgment. Judgment is where real security decisions happen. Without it, numbers become a substitute for thinking.</p><p>Culture matters more than most dashboards will ever show. If security makes it difficult for engineers and operators to do their jobs, they will work around it. I&#8217;ve learned to pay attention to friction. How hard is it to do the right thing securely? The answer tells you more than most KPIs.</p><h4>The Takeaway</h4><p>If your security dashboard always looks calm and green, that is not reassurance. It is a question. Real systems are noisy. Real risk is messy. Goodhart&#8217;s Law is your reminder to stop polishing the glass and start listening to the signals underneath it. Balance creates truth.</p>]]></content:encoded></item><item><title><![CDATA[OWASP Top 10 for 2025]]></title><description><![CDATA[The new list of top 10 security risks from OWASP for web applications]]></description><link>https://www.secwale.com/p/owasp2025</link><guid isPermaLink="false">https://www.secwale.com/p/owasp2025</guid><dc:creator><![CDATA[Aditya Patel]]></dc:creator><pubDate>Mon, 10 Nov 2025 17:19:50 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!XQmJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc2fa814-da60-4db6-930e-3d72a87deb6c_1858x514.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XQmJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc2fa814-da60-4db6-930e-3d72a87deb6c_1858x514.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XQmJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc2fa814-da60-4db6-930e-3d72a87deb6c_1858x514.png 424w, https://substackcdn.com/image/fetch/$s_!XQmJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc2fa814-da60-4db6-930e-3d72a87deb6c_1858x514.png 848w, https://substackcdn.com/image/fetch/$s_!XQmJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc2fa814-da60-4db6-930e-3d72a87deb6c_1858x514.png 1272w, https://substackcdn.com/image/fetch/$s_!XQmJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc2fa814-da60-4db6-930e-3d72a87deb6c_1858x514.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XQmJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc2fa814-da60-4db6-930e-3d72a87deb6c_1858x514.png" width="1456" height="403" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bc2fa814-da60-4db6-930e-3d72a87deb6c_1858x514.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:403,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:125525,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.secwale.com/i/178512424?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc2fa814-da60-4db6-930e-3d72a87deb6c_1858x514.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!XQmJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc2fa814-da60-4db6-930e-3d72a87deb6c_1858x514.png 424w, https://substackcdn.com/image/fetch/$s_!XQmJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc2fa814-da60-4db6-930e-3d72a87deb6c_1858x514.png 848w, https://substackcdn.com/image/fetch/$s_!XQmJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc2fa814-da60-4db6-930e-3d72a87deb6c_1858x514.png 1272w, https://substackcdn.com/image/fetch/$s_!XQmJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc2fa814-da60-4db6-930e-3d72a87deb6c_1858x514.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><a href="https://owasp.org/Top10/">The OWASP<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> Top 10 list for 2025</a> has been released, four years after its previous iteration. The list is a general assessment of significant risks in web application security. Its structure and changes from the 2021 list offer insight into the state of the industry, highlighting areas where we are improving and, more often, where we continue to fail. These are my brief thoughts on the list in general.</p><h4><strong>1. Broken Access Control (A01:2025) </strong>&#128081;</h4><p>Broken Access Control occurs when an application fails to enforce restrictions on authenticated users, allowing them to act outside their intended permissions. This includes bypassing authorization checks, accessing unauthorized resources, or performing privileged actions without proper validation. Examples include authorization bypass using <a href="https://cheatsheetseries.owasp.org/cheatsheets/Insecure_Direct_Object_Reference_Prevention_Cheat_Sheet.html">Insecure Direct Object Reference</a>.</p><p>This category remains at the top, which speaks volumes about the difficulty of implementing effective authorization models in complex systems. It now incorporates the 2021&#8217;s No. 10 Server Side Request Forgery (SSRF).</p><h4><strong>2. Security Misconfiguration (A02:2025) </strong>&#9881;&#65039;</h4><p>Security Misconfiguration refers to improper implementation of security controls across any layer of the application stack: network, web servers, databases, or cloud configurations. Examples include default credentials, public cloud buckets, missing security headers, misconfigured CORS policies, or unnecessary features enabled (e.g., verbose error messages, admin interfaces).</p><p>This category is a notable jump from #6 to #2. This is less a failure of technology and more a failure of process. Misconfigurations, such as leaked credentials, are a direct result of complexity. The axiom &#8220;complexity is the worst enemy of security&#8221; holds true here.</p><h4><strong>3. Software Supply Chain Failures (A03:2025) </strong>&#128230;</h4><p>Software Supply Chain Failures refer to security risks introduced through third-party components, libraries, tools, or services integrated into an application. These failures occur when external dependencies are compromised, outdated, or poorly managed, leading to vulnerabilities that propagate across systems.</p><p>This category expands on 2021&#8217;s &#8220;Vulnerable and Outdated Components.&#8221; The <a href="https://en.wikipedia.org/wiki/2020_United_States_federal_government_data_breach">SolarWinds</a> and <a href="https://en.wikipedia.org/wiki/Log4Shell">Log4j</a> incidents demonstrated the systemic risk of modern software development and spiral dependencies. We are building systems with components we do not control or fully understand - a robust third party risk management is needed here.</p><h4><strong>4. Cryptographic Failures (A04:2025) </strong>&#128273;</h4><p>Cryptographic failures refer to the improper implementation, configuration, or usage of cryptographic mechanisms intended to protect data in transit or at rest. This includes weak or outdated algorithms, insecure key generation or storage, missing encryption altogether (sadly still prevalent), or misuse of protocols (TLS 1.2 vs TLS 1.3).</p><p>This category has dropped two slots from #2 suggests some progress, but this area remains critical. The core problem often lies not in the algorithms themselves but in their implementation and key management. <em>Dance like no one is watching. Encrypt like everyone is.</em></p><h4><strong>5. Injection (A05:2025) </strong>&#128137;</h4><p>Injection vulnerabilities occur when untrusted data is sent to an interpreter as part of a command or query. This allows attackers to alter the intended logic of the program, often leading to unauthorized access, data leakage, or system compromise.</p><p>Injection attacks have been a known risk for decades; this category has dropped 2 slots from 2021&#8217;s No. 3 (and 2017&#8217;s No. 1). They includes a range of issues from Cross-site Scripting (high frequency/low impact) to SQL Injection (low frequency/high impact) vulnerabilities. <a href="https://genai.owasp.org/llm-top-10/">&#8220;Prompt Injection&#8221; for LLMs is no. 1</a> in the OWASP Top 10 for LLM 2025 list - so injection attacks as a category are not going anywhere unfortunately.</p><h4><strong>6. Insecure Design (A06:2025) </strong>&#128208;</h4><p>Insecure Design refers to flaws in the architecture and design of an application that create inherent security weaknesses, regardless of how well the implementation is executed. Unlike implementation bugs, insecure design is about <em>what</em> is built, not <em>how</em> it&#8217;s built. Examples include client-side enforcing security logic, lack of authentication or authorization mechanisms consistently, absence of secure defaults, direct object reference without access control, missing logging at key interfaces, etc.</p><p>This category, introduced in 2021, reflects the industry&#8217;s growing recognition that security needs to be considered at the design phase, not as an afterthought. This requires a shift in mindset across the development lifecycle.</p><h4><strong>7. Authentication Failures (A07:2025) </strong>&#9989;</h4><p>Authentication failures occur when an application incorrectly implements identity verification mechanisms, allowing attackers to compromise credentials, bypass login systems, or impersonate users.</p><p>This categories is in a steady position on the list at #7. Despite improvements through standardized frameworks (like OAuth2, OpenID Connect, and SAML), misconfigurations and poor implementation still expose systems to brute-force attacks, credential stuffing, and session hijacking. The risk is amplified in APIs and mobile apps where tokens and credentials are often mishandled.</p><h4><strong>8. Software or Data Integrity Failures (A08:2025) </strong>&#9878;&#65039;</h4><p>Software or Data Integrity Failures occur when a system fails to adequately protect the consistency and trustworthiness (&#8220;integrity&#8221;) of its code, configuration, or data, particularly when processing input from untrusted sources or updating code components. This includes issues like allowing unverified serialization-deserialization of sensitive objects, failing to use cryptographic checks (like hashes or digital signatures) on firmware updates, or trusting input without validation, encoding, or proper type and schema verification.</p><p>This category is remaining at #8. It emphasizes the need to verify the integrity of data and code. In this AI era (yes, I said it - <em>AI era</em>) , where data poisoning can have significant consequences, ensuring data has not been tampered with is essential for trustworthy systems.</p><h4><strong>9. Logging &amp; Alerting Failures (A09:2025) </strong>&#128680;</h4><p>This vulnerability arises when security-relevant events are not properly recorded, monitored, or acted upon. It includes missing, insufficient, or improperly configured logging mechanisms, as well as the absence of timely alerting systems that can detect and escalate suspicious activity.</p><p>This category has a slight name change (previously &#8220;Security Logging and Monitoring Failures&#8221;). Per OWASP, the name change emphasizes the necessity of detection as well as response capabilities. It is not enough to simply log events; we need effective alerting mechanisms to identify and act on security incidents in a timely manner. Great logging with no intelligent alerting is of minimal value.</p><h4><strong>10. Mishandling of Exceptional Conditions (A10:2025) </strong>&#129327;</h4><p>Mishandling of Exceptional Conditions occurs when systems fail to properly handle unexpected or abnormal conditions. Examples include failing to roll back failed operations entirely, exposing detailed stack traces in error messages, or allowing race conditions where the security state is incorrectly calculated or manipulated.</p><p>This category is a new entry on the list. This points to the need for systems to fail securely (a secure design principle) and handle unexpected events gracefully. Flaws here can lead to race conditions or replay attacks - this precise concept led to a recent cloud outage. It&#8217;s a reminder that security must consider not just the &#8220;happy path&#8221; of system operation, but also what happens when things go wrong.</p><h3>So what?</h3><p>The OWASP Top 10 is a useful tool for prioritizing security efforts. But the list itself is a symptom of a larger, systemic problem: our inability to build secure software in the first place. The 2025 update shows that while some categories shift, the core issues remain stubbornly familiar: access control, misconfiguration, supply chain risk, and insecure design. These are not just technical problems - they&#8217;re organizational, procedural, <strong>and cultural</strong>. We must move beyond simply addressing this list and start addressing the fundamental engineering and process issues that generate these vulnerabilities.</p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p><strong>OWASP</strong> stands for the <strong>Open Worldwide Application Security Project</strong>, a non-profit foundation dedicated to improving the security of software.</p></div></div>]]></content:encoded></item><item><title><![CDATA[Aadhaar: One ID to Rule Them All - But Should It?]]></title><description><![CDATA[What could go wrong when biometric data of 1.4 billion people is at risk?]]></description><link>https://www.secwale.com/p/aadhaar</link><guid isPermaLink="false">https://www.secwale.com/p/aadhaar</guid><dc:creator><![CDATA[Aditya Patel]]></dc:creator><pubDate>Wed, 05 Feb 2025 06:40:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!jhr_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36d8b03c-7243-4288-977c-a6e27debd566_1480x826.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jhr_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36d8b03c-7243-4288-977c-a6e27debd566_1480x826.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jhr_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36d8b03c-7243-4288-977c-a6e27debd566_1480x826.png 424w, https://substackcdn.com/image/fetch/$s_!jhr_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36d8b03c-7243-4288-977c-a6e27debd566_1480x826.png 848w, https://substackcdn.com/image/fetch/$s_!jhr_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36d8b03c-7243-4288-977c-a6e27debd566_1480x826.png 1272w, https://substackcdn.com/image/fetch/$s_!jhr_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36d8b03c-7243-4288-977c-a6e27debd566_1480x826.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jhr_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36d8b03c-7243-4288-977c-a6e27debd566_1480x826.png" width="1456" height="813" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/36d8b03c-7243-4288-977c-a6e27debd566_1480x826.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:813,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1440220,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!jhr_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36d8b03c-7243-4288-977c-a6e27debd566_1480x826.png 424w, https://substackcdn.com/image/fetch/$s_!jhr_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36d8b03c-7243-4288-977c-a6e27debd566_1480x826.png 848w, https://substackcdn.com/image/fetch/$s_!jhr_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36d8b03c-7243-4288-977c-a6e27debd566_1480x826.png 1272w, https://substackcdn.com/image/fetch/$s_!jhr_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36d8b03c-7243-4288-977c-a6e27debd566_1480x826.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>&#128075; Dear reader, hope you&#8217;re healthy and happy. In this post we will cover:</em></p><ul><li><p><em>What is Aadhaar biometric system of India (think: SSN on steroids)</em></p></li><li><p><em>How Aadhaar access is expanding</em></p></li><li><p><em>Privacy quagmire it will lead to</em></p></li></ul><p><em>Buckle up!</em></p><div><hr></div><p>Imagine you walk into a bar. Not just any bar, but one where they don&#8217;t check your ID at the door. Instead, they scan your face, fingerprint, and maybe even ask for a DNA sample just to serve you a beer. The bartender assures you it&#8217;s all for your own good&#8212;better service, no fake IDs, and an overall smoother experience. You hesitate, but hey, the beer is cold, and you don&#8217;t want to be <em>that</em> guy making a fuss.</p><p>Next thing you know, every bar in town starts doing it. Then the donut shops. Then restaurants, grocery stores, and even gas stations. Soon, it&#8217;s impossible to buy anything without handing over your biometrics. And the kicker? You never explicitly agreed to any of this. You just wanted a drink.</p><p>That, in a nutshell, is the Aadhaar expansion story in India.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OGKH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc90bc6dc-a462-4d07-91dd-a83d48de577f_1492x828.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OGKH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc90bc6dc-a462-4d07-91dd-a83d48de577f_1492x828.png 424w, https://substackcdn.com/image/fetch/$s_!OGKH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc90bc6dc-a462-4d07-91dd-a83d48de577f_1492x828.png 848w, https://substackcdn.com/image/fetch/$s_!OGKH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc90bc6dc-a462-4d07-91dd-a83d48de577f_1492x828.png 1272w, https://substackcdn.com/image/fetch/$s_!OGKH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc90bc6dc-a462-4d07-91dd-a83d48de577f_1492x828.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OGKH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc90bc6dc-a462-4d07-91dd-a83d48de577f_1492x828.png" width="1456" height="808" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c90bc6dc-a462-4d07-91dd-a83d48de577f_1492x828.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:808,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1015760,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OGKH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc90bc6dc-a462-4d07-91dd-a83d48de577f_1492x828.png 424w, https://substackcdn.com/image/fetch/$s_!OGKH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc90bc6dc-a462-4d07-91dd-a83d48de577f_1492x828.png 848w, https://substackcdn.com/image/fetch/$s_!OGKH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc90bc6dc-a462-4d07-91dd-a83d48de577f_1492x828.png 1272w, https://substackcdn.com/image/fetch/$s_!OGKH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc90bc6dc-a462-4d07-91dd-a83d48de577f_1492x828.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Aadhaar Card</figcaption></figure></div><p><strong><a href="https://en.wikipedia.org/wiki/Aadhaar">Aadhaar</a>, a 12-digit identity system, is linked to the biometrics of more than 1.4 billion people in India.</strong> Let that number sink in for a moment. It&#8217;s 2x the population of entire Europe. And 4x the US population. Imagine if your Social Security number was paired with your fingerprints and iris scans, and then made available not just for government services and core services (like banking) but also for private businesses e-commerce apps, concert tickets or pizza delivery.</p><p>Originally, Aadhaar was supposed to be a simple fix for an age-old problem: making sure government subsidies reached the right citizens. And it is true that Aadhaar has made life simpler, it is an ID that's accepted everywhere in the government. I recall once trying to get my Indian passport renewed and struggling to keep up with which ID is accepted where. </p><p>Over time, though, private companies like banks or cellphone companies started tapping into the Aadhaar database to verify customers. A landmark Indian <a href="https://www.scobserver.in/cases/beghar-foundation-ks-puttaswamy-aadhaar-review-case-background/#:~:text=The%20Supreme%20Court%20dismissed%20a,and%20Services)%20Act%2C%202016.">Supreme Court ruling in 2018</a> thankfully put strict limits on that practice.</p><p>Now, in 2025, the <a href="https://techcrunch.com/2025/02/02/india-expands-aadhaar-authentication-for-businesses-raising-privacy-concerns/">Indian government has decided to loosen those restrictions</a> again. Private companies in e-commerce, healthcare, travel, and hospitality will be able to use Aadhaar authentication to verify customers.</p><p>From the original <a href="https://pib.gov.in/PressReleaseIframePage.aspx?PRID=2098223">Press Release</a>:</p><blockquote><p><em>The amendment enables both <strong>government and non-government entities</strong> to <strong>avail Aadhaar authentication service</strong> for providing various services in the public interest for related specific purposes like enablement of innovation, spread of knowledge, promoting ease of living of residents and enabling better access to services for them.</em></p></blockquote><p>No evaluation criteria:</p><blockquote><p><em>Any entity seeking Aadhaar authentication will be required to apply with the details of intended requirements to the concerned ministry or department of the Central or the State government in a format being made available on a portal for this purpose. The applications will be examined by UIDAI and MeitY will issue the approval based on the recommendation of UIDAI.</em></p></blockquote><p>The government promises this will improve service delivery, reduce fraud, and make life easier for the average citizen. Because why wouldn&#8217;t you want to trust your personal data - fingerprints, iris scans, and all - to a bunch of businesses? It&#8217;s not like data breaches ever happen, <a href="https://logix.in/blog/massive-aadhaar-data-breach/">right?</a></p><p>It sounds like progress, until you start asking the hard questions.</p><p>Privacy advocates, including yours truly, are nervous. We worry this shift could resurrect elements of the Aadhaar Act that the Indian Supreme Court had already struck down. The Indian government insists all businesses must apply for approval before using Aadhaar authentication, but the criteria for approval remain murky. Who gets access? How will they be monitored? What happens if they misuse it? All valid concerns, all largely unanswered.</p><h4><strong>A leaked password you cannot ever change</strong></h4><p>India&#8217;s colossal population makes the stakes enormous. In the US, people might fear identity theft if their Social Security number falls into the wrong hands. Multiply that fear by a factor of a billion, and toss in biometric data that can&#8217;t exactly be changed if leaked.</p><p>Meanwhile, a comprehensive data protection law in India is still <em>pending</em> to be fully operational. So, we now have a system where private companies will have broader access to sensitive biometric authentication, while the rules on how they should handle that data remain vague at best. <strong>We are building a highway and punting the traffic laws to later.</strong></p><p>Then there&#8217;s the issue of <em>voluntary</em> usage. Technically, Aadhaar authentication remains optional. But what happens when private businesses start making it the easiest, or even the <em>only</em>, way to access services? Just as you could technically <em>not </em>use Aadhaar to get a SIM card or open a bank account, but good luck finding a hassle-free alternative, this could quickly become a &#8220;voluntary&#8221; requirement. <strong>That&#8217;s how de facto mandates work. You don&#8217;t have to comply, but life sure gets a lot harder if you don&#8217;t.</strong></p><p>India&#8217;s experiment is unfolding in real-time. On one hand, it could spark a wave of new tech innovations and supercharge online services. On the other, it tests the boundaries of privacy and fairness on a massive scale. Nobody wants to be locked out of essential services because of a technical glitch, nor do they want Big Brother (or Big Business) tracking their every move.</p><p><em>So, coming back to the bar.</em></p><p>At first, handing over a fingerprint for a beer seemed harmless. But now, every business in town wants a piece of that data, and opting out is becoming less of a choice. Before long, you start wondering: was the convenience really worth it? Or did we all just trade a little too much privacy for the promise of a smoother experience?</p><p>Aadhaar is at that tipping point. The system has undeniable benefits, but this latest expansion could be a turning point, either towards seamless, secure digital identity verification or a sprawling privacy crisis waiting to happen.</p><p>And once you hand over your data, there&#8217;s no taking it back.</p>]]></content:encoded></item><item><title><![CDATA[[Security Talk] The Dark Side of ChatGPT]]></title><description><![CDATA[Recording and slides from my talk on AI safety at BsidesNYC23 in New York city]]></description><link>https://www.secwale.com/p/bsidesnyc23</link><guid isPermaLink="false">https://www.secwale.com/p/bsidesnyc23</guid><dc:creator><![CDATA[Aditya Patel]]></dc:creator><pubDate>Sat, 22 Apr 2023 19:40:15 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!TeE2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd91e990-0a8a-432a-a83b-f58224fa9a16_1798x1030.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TeE2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd91e990-0a8a-432a-a83b-f58224fa9a16_1798x1030.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TeE2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd91e990-0a8a-432a-a83b-f58224fa9a16_1798x1030.png 424w, https://substackcdn.com/image/fetch/$s_!TeE2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd91e990-0a8a-432a-a83b-f58224fa9a16_1798x1030.png 848w, https://substackcdn.com/image/fetch/$s_!TeE2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd91e990-0a8a-432a-a83b-f58224fa9a16_1798x1030.png 1272w, https://substackcdn.com/image/fetch/$s_!TeE2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd91e990-0a8a-432a-a83b-f58224fa9a16_1798x1030.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TeE2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd91e990-0a8a-432a-a83b-f58224fa9a16_1798x1030.png" width="1456" height="834" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cd91e990-0a8a-432a-a83b-f58224fa9a16_1798x1030.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:834,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:127420,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!TeE2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd91e990-0a8a-432a-a83b-f58224fa9a16_1798x1030.png 424w, https://substackcdn.com/image/fetch/$s_!TeE2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd91e990-0a8a-432a-a83b-f58224fa9a16_1798x1030.png 848w, https://substackcdn.com/image/fetch/$s_!TeE2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd91e990-0a8a-432a-a83b-f58224fa9a16_1798x1030.png 1272w, https://substackcdn.com/image/fetch/$s_!TeE2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd91e990-0a8a-432a-a83b-f58224fa9a16_1798x1030.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Dear, reader.<br><br>I had the pleasure of <a href="https://bsidesnyc.org/schedule/#session-26">talking about AI safety</a> at BsidesNYC23 in New York city on Apr 22, 2023.<br><br><strong>Abstract</strong>: ChatGPT is here to stay. With the increasing reliance on Artificial Intelligence everywhere, it is crucial to consider the security and privacy implications of generative AI. <strong>The talk will cover</strong> potential misuse of AI: spreading false information, abusing its capabilities to assist with security attacks such as phishing or malware, and the difficulties in detecting and mitigating malicious input and output.<br>The goal of this talk is to increase awareness and understanding of the security challenges with generative AIs. And to encourage efforts to ensure the safe and secure use of these powerful tools.</p><p>Here&#8217;s the talk recording.</p><div id="youtube2-x0coh7acrC0" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;x0coh7acrC0&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/x0coh7acrC0?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>And, here is the slide deck.</p><div class="file-embed-wrapper" data-component-name="FileToDOM"><div class="file-embed-container-reader"><div class="file-embed-container-top"><image class="file-embed-thumbnail-default" src="https://substackcdn.com/image/fetch/$s_!0Cy0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack.com%2Fimg%2Fattachment_icon.svg"></image><div class="file-embed-details"><div class="file-embed-details-h1">Bsidesnyc23 The Dark Side Of Chatgpt Aditya Patel</div><div class="file-embed-details-h2">5.05MB &#8729; PDF file</div></div><a class="file-embed-button wide" href="https://www.secwale.com/api/v1/file/6af9f384-9482-4b3b-8757-0b62baee106e.pdf"><span class="file-embed-button-text">Download</span></a></div><a class="file-embed-button narrow" href="https://www.secwale.com/api/v1/file/6af9f384-9482-4b3b-8757-0b62baee106e.pdf"><span class="file-embed-button-text">Download</span></a></div></div><p>Please reach out if you&#8217;ve any questions/comments.</p><p></p>]]></content:encoded></item><item><title><![CDATA[AI Safety]]></title><description><![CDATA[Is AI, and generative AI specifically, as revolutionary as the PC, or internet, or the mobile phones? Bill Gates argues, it is. Sharing my takeaways and a hot take.]]></description><link>https://www.secwale.com/p/bill-gates-on-artifical-intelligence</link><guid isPermaLink="false">https://www.secwale.com/p/bill-gates-on-artifical-intelligence</guid><dc:creator><![CDATA[Aditya Patel]]></dc:creator><pubDate>Thu, 06 Apr 2023 19:04:25 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!WeLu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F226e6b91-c9ac-484f-9373-ffab194c962c_5387x3591.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WeLu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F226e6b91-c9ac-484f-9373-ffab194c962c_5387x3591.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WeLu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F226e6b91-c9ac-484f-9373-ffab194c962c_5387x3591.jpeg 424w, https://substackcdn.com/image/fetch/$s_!WeLu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F226e6b91-c9ac-484f-9373-ffab194c962c_5387x3591.jpeg 848w, https://substackcdn.com/image/fetch/$s_!WeLu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F226e6b91-c9ac-484f-9373-ffab194c962c_5387x3591.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!WeLu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F226e6b91-c9ac-484f-9373-ffab194c962c_5387x3591.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WeLu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F226e6b91-c9ac-484f-9373-ffab194c962c_5387x3591.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/226e6b91-c9ac-484f-9373-ffab194c962c_5387x3591.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:4103472,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!WeLu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F226e6b91-c9ac-484f-9373-ffab194c962c_5387x3591.jpeg 424w, https://substackcdn.com/image/fetch/$s_!WeLu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F226e6b91-c9ac-484f-9373-ffab194c962c_5387x3591.jpeg 848w, https://substackcdn.com/image/fetch/$s_!WeLu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F226e6b91-c9ac-484f-9373-ffab194c962c_5387x3591.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!WeLu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F226e6b91-c9ac-484f-9373-ffab194c962c_5387x3591.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><a href="https://unsplash.com/photos/qgyr3l6xZJk">Image credit.</a></figcaption></figure></div><p>Bill Gates recently wrote an excellent essay: <a href="https://www.gatesnotes.com/The-Age-of-AI-Has-Begun">The Age of AI has begun</a></p><p>While I respect the positive outlook the essay presents, I don&#8217;t full agree with everything. Here&#8217;re my top takeaways and a quick hot take.</p><p>&#128205; <strong>AI is the next big thing.</strong> Bill Gates draws parallels between the impact of AI and previous technological revolutions, and anticipates that AI will have a profound and pervasive influence on every aspect of human life and society in the next decade.</p><blockquote><p><em>The development of AI is as fundamental as the creation of the microprocessor, the personal computer, the Internet, and the mobile phone.</em></p><p><em>(source: <a href="https://www.gatesnotes.com/The-Age-of-AI-Has-Begun">The Age of AI has begun</a>)</em></p></blockquote><p>&#128205; <strong>AI will help the society at large.</strong> He explores some of the potential benefits of AI for addressing some of the world&#8217;s biggest challenges, such as reducing child mortality, improving education, fighting climate change, and advancing scientific discovery, and provides some concrete examples of how AI is already making a positive difference in these areas. Like, the <a href="https://www.gatesnotes.com/The-Year-Ahead-2023#ALChapter6">AI powered ultrasound machines</a> that can help save mothers and their babies in low-income, remote areas. </p><p>&#128205; <strong>AI safety.</strong> He also recognizes some of the potential risks and challenges of AI, such as ethical dilemmas, social implications, job displacement, and malicious use, and urges governments, businesses, and individuals to prepare for them by investing in research, education, regulation, and ethics.</p><p>This last point stands out.. overall, the essay is great, but to some extent downplays the risks of AGI - Artificial General Intelligence (for my own opinions and biases as a security professional at least). For instance, risks with AGI are not sufficiently explained</p><blockquote><p><em>&#8230; we&#8217;ll have an incredibly powerful AGI. It will be able to do everything that a human brain can, but without any practical limits on the size of its memory or the speed at which it operates.</em></p><p><em>(source: <a href="https://www.gatesnotes.com/The-Age-of-AI-Has-Begun">The Age of AI has begun</a>)</em></p></blockquote><p>AI poses serious threats and challenges like: biases, hallucinations, misinformation, and privacy implications.. ChatGPT has shown that AI is awesome and has almost unbound capabilities, but we should be more cautious and critical.</p><p>What do you think?</p><div><hr></div><p><strong>&#128213;</strong><em><strong> Security Wale</strong> is a blog about cloud, cybersecurity, and in between - written by Aditya Patel (more <a href="https://www.secwale.com/about">here</a>). To support this effort, consider subscribing (it&#8217;s free) and spreading the word.</em></p>]]></content:encoded></item><item><title><![CDATA[A simple mental model for Threat Modeling]]></title><description><![CDATA[Threat Modeling is a security activity that&#8217;s made more complicated than it should be. Presenting a simple mental model to approach threat modeling.]]></description><link>https://www.secwale.com/p/threatmodeling</link><guid isPermaLink="false">https://www.secwale.com/p/threatmodeling</guid><dc:creator><![CDATA[Aditya Patel]]></dc:creator><pubDate>Tue, 14 Mar 2023 01:03:02 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!n1wD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F741c62bd-5462-4667-bb1d-893bb86ec9c4_900x675.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!n1wD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F741c62bd-5462-4667-bb1d-893bb86ec9c4_900x675.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!n1wD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F741c62bd-5462-4667-bb1d-893bb86ec9c4_900x675.jpeg 424w, https://substackcdn.com/image/fetch/$s_!n1wD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F741c62bd-5462-4667-bb1d-893bb86ec9c4_900x675.jpeg 848w, https://substackcdn.com/image/fetch/$s_!n1wD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F741c62bd-5462-4667-bb1d-893bb86ec9c4_900x675.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!n1wD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F741c62bd-5462-4667-bb1d-893bb86ec9c4_900x675.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!n1wD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F741c62bd-5462-4667-bb1d-893bb86ec9c4_900x675.jpeg" width="900" height="675" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/741c62bd-5462-4667-bb1d-893bb86ec9c4_900x675.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:675,&quot;width&quot;:900,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Venice Painting - Vintage Venice black and white by Georgi Dimitrov&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Venice Painting - Vintage Venice black and white by Georgi Dimitrov" title="Venice Painting - Vintage Venice black and white by Georgi Dimitrov" srcset="https://substackcdn.com/image/fetch/$s_!n1wD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F741c62bd-5462-4667-bb1d-893bb86ec9c4_900x675.jpeg 424w, https://substackcdn.com/image/fetch/$s_!n1wD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F741c62bd-5462-4667-bb1d-893bb86ec9c4_900x675.jpeg 848w, https://substackcdn.com/image/fetch/$s_!n1wD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F741c62bd-5462-4667-bb1d-893bb86ec9c4_900x675.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!n1wD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F741c62bd-5462-4667-bb1d-893bb86ec9c4_900x675.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>&#128075; Dear reader, hope you&#8217;re healthy and happy. In this post we will cover:</em></p><ul><li><p><em>What is threat modeling, and why you should care</em></p></li><li><p><em>Why is it unique and complex</em></p></li><li><p><em>How to do threat modeling, and a simple mental model for it.</em></p></li></ul><p><em>Buckle up!</em>&nbsp;</p><div><hr></div><p>Threat modeling, in cybersecurity, is a process of identifying, and mitigating potential threats to a system.</p><p>It is one of the many security activities, like SAST (Static Application Security Testing) aka secure code reviews; and DAST (Dynamic Application Security Testing) aka penetration tests. There are also techniques like runtime analysis or dependency checks, more relevant for microservices. And bug bounties, and IR gamedays among a few others. Among all these, threat modeling holds its place firmly.</p><p><strong>Why do we need threat modeling?</strong> It&#8217;s all about money, baby. Also security. The primary objective of threat modeling is to identify potential security weaknesses <em>early</em> and address them before they become too expensive to fix. It also helps identify issues that cannot be found by other security activities by looking at design of a system. Like this ingenious #crappydesign below. No pentest or code review will find an equivalent issue, threat modeling will.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NEwE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F817d1bcd-6422-4ca3-a0a2-a3cbce3821a1_640x853.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NEwE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F817d1bcd-6422-4ca3-a0a2-a3cbce3821a1_640x853.png 424w, https://substackcdn.com/image/fetch/$s_!NEwE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F817d1bcd-6422-4ca3-a0a2-a3cbce3821a1_640x853.png 848w, https://substackcdn.com/image/fetch/$s_!NEwE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F817d1bcd-6422-4ca3-a0a2-a3cbce3821a1_640x853.png 1272w, https://substackcdn.com/image/fetch/$s_!NEwE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F817d1bcd-6422-4ca3-a0a2-a3cbce3821a1_640x853.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NEwE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F817d1bcd-6422-4ca3-a0a2-a3cbce3821a1_640x853.png" width="324" height="431.83125" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/817d1bcd-6422-4ca3-a0a2-a3cbce3821a1_640x853.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:853,&quot;width&quot;:640,&quot;resizeWidth&quot;:324,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NEwE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F817d1bcd-6422-4ca3-a0a2-a3cbce3821a1_640x853.png 424w, https://substackcdn.com/image/fetch/$s_!NEwE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F817d1bcd-6422-4ca3-a0a2-a3cbce3821a1_640x853.png 848w, https://substackcdn.com/image/fetch/$s_!NEwE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F817d1bcd-6422-4ca3-a0a2-a3cbce3821a1_640x853.png 1272w, https://substackcdn.com/image/fetch/$s_!NEwE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F817d1bcd-6422-4ca3-a0a2-a3cbce3821a1_640x853.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Design flaw: when your security gate is a ladder!</figcaption></figure></div><p>Not just that, the Open Web Application Security Project (OWASP), a non-profit security organization, produces a list of top 10 most critical security risks to web applications. The list is produced every 3-4 years and is widely used in cybersecurity. In its latest edition, &#8220;A04:2021 &#8211; Insecure Design&#8221; is a new entry at #4.</p><blockquote><p><em>A04:2021-Insecure Design is a new category for 2021, with a focus on risks related to design flaws. If we genuinely want to "move left" as an industry, <strong>we need more threat modeling</strong>, secure design patterns and principles, and reference architectures. An insecure design cannot be fixed by a perfect implementation as by definition, needed security controls were never created to defend against specific attacks.</em></p><p><em>(<a href="https://owasp.org/Top10/A04_2021-Insecure_Design/">Source: OWASP</a> / emphasis in <strong>bold</strong> mine)</em></p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZVKe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdbea081-59a5-4091-b507-e5d0a487a164_936x258.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZVKe!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdbea081-59a5-4091-b507-e5d0a487a164_936x258.png 424w, https://substackcdn.com/image/fetch/$s_!ZVKe!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdbea081-59a5-4091-b507-e5d0a487a164_936x258.png 848w, https://substackcdn.com/image/fetch/$s_!ZVKe!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdbea081-59a5-4091-b507-e5d0a487a164_936x258.png 1272w, https://substackcdn.com/image/fetch/$s_!ZVKe!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdbea081-59a5-4091-b507-e5d0a487a164_936x258.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZVKe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdbea081-59a5-4091-b507-e5d0a487a164_936x258.png" width="936" height="258" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fdbea081-59a5-4091-b507-e5d0a487a164_936x258.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:258,&quot;width&quot;:936,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ZVKe!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdbea081-59a5-4091-b507-e5d0a487a164_936x258.png 424w, https://substackcdn.com/image/fetch/$s_!ZVKe!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdbea081-59a5-4091-b507-e5d0a487a164_936x258.png 848w, https://substackcdn.com/image/fetch/$s_!ZVKe!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdbea081-59a5-4091-b507-e5d0a487a164_936x258.png 1272w, https://substackcdn.com/image/fetch/$s_!ZVKe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdbea081-59a5-4091-b507-e5d0a487a164_936x258.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">OWASP Top 10 (See A04:2021)</figcaption></figure></div><p>So we understand why Threat Modeling is important. However, of all the security activities, it&#8217;s the wierdest: unique and complex.</p><p><strong>Threat Modeling is unique</strong> because</p><ul><li><p>It cannot be fully automated (yet), as it requires an analysis pedigree of humans.</p></li><li><p>It is simple to learn, but difficult to master. Just like learning how to drive or swim. (But unlike chess, which is also simple to learn, but <em>very</em> difficult to master)</p></li><li><p>It&#8217;s a <a href="https://www.secwale.com/p/burrito">human-centric security</a> activity.&nbsp;</p></li><li><p>There are many, many techniques available for it. All are cumbersome.</p></li></ul><p><strong>Threat Modeling is complex</strong> because there are a bazillion ways to do it. Few popular threat modeling methodologies are <a href="https://www.schneier.com/academic/archives/1999/12/attack_trees.html">Attack Trees</a> (Schneir, 1998/99) which is an attacker centric visualization of threats; <a href="https://en.wikipedia.org/wiki/STRIDE_(security)">STRIDE</a> (Microsoft, 1999) which is a developer centric mnemonic to cover basic security categories; <a href="https://attack.mitre.org/">ATT&amp;CK</a> framework (MITRE, 2013) is an intrusion centric knowledge base of tactics and techniques; and <a href="https://versprite.com/blog/what-is-pasta-threat-modeling/">PASTA</a> (Versprite, 2015), which is a risk centric threat modeling process popularly used <a href="https://about.gitlab.com/handbook/security/threat_modeling/">at Gitlab</a>. There are at least 10 others that I have come across, plus tens of their custom variations. Moral of the story is that there is no one size fits all. Probably some lead security architect in your organization preferred one approach over the other and introduced it - and now you&#8217;re stuck with it.</p><p>In all of these techniques though, the goal of the threat modeling is common:</p><p><strong>To wear an attacker&#8217;s hat</strong>, and list out threats, rank them, and create practical mitigations.</p><h3>A simple mental model</h3><p>Over the years, I have developed a mental model that can be applied agnostic to the various techniques above. Obviously, this is what has worked for me and I am simply sharing it, not to introduce yet another technique, rather to share my learnings in a condensed format. First, follow these steps to build a threat model.</p><h4><strong>&#128506; Step 0: Architecture - Find what to threat model.</strong></h4><p>Understand the system through whatever-the-hell you can find about it: business docs, technical docs, diagrams, demos, etc. Anything but code, as it will be distracting. Then identify scope and list assumptions. As you do these steps, try to see forest among the trees.</p><h4><strong>&#128176; Step 1: Assets - Find what to protect.</strong></h4><p>Identify &#8220;Assets&#8221; in the system. An asset is a data or functionality or component that needs to be protected. Examples:</p><ul><li><p>A01 - Credentials</p></li><li><p>A02 - Credit Card Numbers</p></li><li><p>A03 - Transient data stored in memory for processing</p></li><li><p>A04 - Business Logic/Functionality. And so on..</p></li></ul><h4><strong>&#127917; Step 2: Threat Actors - Find who to protect from.</strong></h4><p>Identify &#8220;Threat Actors&#8221;, these are the internal or external malicious actors trying to compromise the system. Examples:</p><ul><li><p>TA01 - Malicious insider, application admin</p></li><li><p>TA02 - Novice insider with access, user from another department</p></li><li><p>TA02 - Malicious outsider, script kiddie</p></li><li><p>TA03 - Malicious outsider, nation state. And so on..</p></li></ul><h4><strong>&#128678; Step 3: Controls - Learn about protections.</strong></h4><p>Identify &#8220;Controls&#8221; that are planned or are in place. Examples:</p><ul><li><p>C01 - Single Sign On authentication</p></li><li><p>C02 - RBAC authorization</p></li><li><p>C03 - Encryption</p></li><li><p>C04 - Key management. And so on..</p></li></ul><h4><strong>&#9997;&#65039; Step 4: Draw a threat model diagram</strong></h4><p>This can be a new simple architecture diagram, or an overlay on top of an existing diagram by marking trust boundaries (a trust boundary could be a network boundary, a compute unit or a data store, etc.), assets, threat actors, and controls. Here&#8217;s a good sample (<a href="https://github.com/michenriksen/drawio-threatmodeling">source</a>).</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8rqG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F162b190a-560a-489e-850f-a2ed5ef172a6_1114x686.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8rqG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F162b190a-560a-489e-850f-a2ed5ef172a6_1114x686.png 424w, https://substackcdn.com/image/fetch/$s_!8rqG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F162b190a-560a-489e-850f-a2ed5ef172a6_1114x686.png 848w, https://substackcdn.com/image/fetch/$s_!8rqG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F162b190a-560a-489e-850f-a2ed5ef172a6_1114x686.png 1272w, https://substackcdn.com/image/fetch/$s_!8rqG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F162b190a-560a-489e-850f-a2ed5ef172a6_1114x686.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8rqG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F162b190a-560a-489e-850f-a2ed5ef172a6_1114x686.png" width="1114" height="686" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/162b190a-560a-489e-850f-a2ed5ef172a6_1114x686.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:686,&quot;width&quot;:1114,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8rqG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F162b190a-560a-489e-850f-a2ed5ef172a6_1114x686.png 424w, https://substackcdn.com/image/fetch/$s_!8rqG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F162b190a-560a-489e-850f-a2ed5ef172a6_1114x686.png 848w, https://substackcdn.com/image/fetch/$s_!8rqG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F162b190a-560a-489e-850f-a2ed5ef172a6_1114x686.png 1272w, https://substackcdn.com/image/fetch/$s_!8rqG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F162b190a-560a-489e-850f-a2ed5ef172a6_1114x686.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">A sample threat model of an n-tier web application</figcaption></figure></div><h4><strong>&#128165; Step 5: Enumerate threats</strong></h4><p>Now that you&#8217;ve understood the system &#8594; listed assets &#8594; listed threat actors &#8594; listed controls &#8594; drawn a threat model diagram with trust zones; you can start writing threats.</p><p>How do you write the threats? Do you refer to a threat library (like the one provided by the ATTACK framework) and select the ones relevant for you, but then what&#8217;s the point of all this hoopla? Do you just write what comes to mind (&#8220;what could go wrong&#8221;), but then will it be exhaustive, and is it a structured approach?</p><div class="pullquote"><p>This is where most threat modeling techniques leave you in the dark. And this is where the mental model comes into play.<br><br>&#129504; <strong>If a &#8220;threat actor&#8221; can acquire an &#8220;asset&#8221; by abusing/bypassing a &#8220;control&#8221;, you&#8217;ve a &#8220;threat&#8221;.</strong></p></div><p>So, review the threat model you&#8217;ve in front of you section by section (or asset by asset), and see if a threat actor can compromise/steal an asset due to a missing or weak security control across a trust zone, if yes, there&#8217;s your threat. Yes, you&#8217;d need some security experience or training to do so. Yes, a threat library will help. No, it cannot be fully automated. And yes, you can do it. Let&#8217;s illustrate this with a few examples.</p><p>In the diagram above, locate <strong>TA01</strong> (malicious user) and <strong>TA04</strong> (compromised wordpress blog). <strong>TA01</strong> is able to steal <strong>A04</strong> (blog admin credentials) because there is no security control at the wordpress blog and also because it is compromised due to <strong>TA04</strong>. (This is a general example, so there are many assumptions here, for e.g., <strong>TA04</strong> could be due to an unpatched wordpress engine). So our threat becomes:</p><pre><code><strong>Threat</strong>: A malicious user steals wordpress credentials from the wordpress blog admin console

<strong>Mitigation</strong>: 1) Patch Wordpress to latest version. 2) Require any user to authenticate using strong credentials and MFA before accessing the compromised.</code></pre><p>Let&#8217;s take another example:</p><pre><code><strong>Threat</strong>: Launch Distributed-Denial-of-Service (DDoS) attack to XYZ application at the frontend.

<strong>Mitigation</strong>: Follows the recommendations of <a href="https://docs.aws.amazon.com/whitepapers/latest/aws-best-practices-ddos-resiliency/welcome.html">AWS Best Practices for DDoS Resiliency</a> whitepaper: Filter out bad requests (CloudFront and API Gateway endpoint only accepts well-formed HTTP requests), managed services can automatically scale to absorb attack (and the user can also apply throttling limits in API Gateway or restrict access using AWS GeoIP block).</code></pre><h4><strong>&#128119;&#8205;&#9794;&#65039; Step 6: Put threats to action</strong></h4><p>Once you&#8217;ve created threats and written some practical mitigations to remove or reduce the risk, you need to convert the threats to something actionable like a developer user story and corresponding tasks. Here&#8217;s a sample for it.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qzXu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facdd9613-d7c2-4269-a4a4-69376fb3e5ab_2560x1440.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qzXu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facdd9613-d7c2-4269-a4a4-69376fb3e5ab_2560x1440.png 424w, https://substackcdn.com/image/fetch/$s_!qzXu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facdd9613-d7c2-4269-a4a4-69376fb3e5ab_2560x1440.png 848w, https://substackcdn.com/image/fetch/$s_!qzXu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facdd9613-d7c2-4269-a4a4-69376fb3e5ab_2560x1440.png 1272w, https://substackcdn.com/image/fetch/$s_!qzXu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facdd9613-d7c2-4269-a4a4-69376fb3e5ab_2560x1440.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qzXu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facdd9613-d7c2-4269-a4a4-69376fb3e5ab_2560x1440.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/acdd9613-d7c2-4269-a4a4-69376fb3e5ab_2560x1440.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:345974,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qzXu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facdd9613-d7c2-4269-a4a4-69376fb3e5ab_2560x1440.png 424w, https://substackcdn.com/image/fetch/$s_!qzXu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facdd9613-d7c2-4269-a4a4-69376fb3e5ab_2560x1440.png 848w, https://substackcdn.com/image/fetch/$s_!qzXu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facdd9613-d7c2-4269-a4a4-69376fb3e5ab_2560x1440.png 1272w, https://substackcdn.com/image/fetch/$s_!qzXu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facdd9613-d7c2-4269-a4a4-69376fb3e5ab_2560x1440.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Create developer user stories and tasks from your prioritized threats</figcaption></figure></div><h3>Wrapping it up</h3><p>The thing with mental models is that you form them on your own accord through: <em>processing information &#8594; identifying key concepts &#8594; deliberate practice &#8594; testing your understanding &#8594; and &#8594; experience</em>. My goal here is to give you a reference pointer on how <em>my</em> mental model looks when it comes to threat modeling, and inspire you (doesn&#8217;t matter if you&#8217;re a security SME or a software dev) to take on threat modeling.</p><p>In future related posts, I will share some end to end threat models of public systems; and how to scale threat modeling at the speed of your business. If you&#8217;ve ideas, requests or suggestions, let me know.</p><div><hr></div><p>&#128213; <em><strong>Security Wale</strong> is a blog about cloud, cybersecurity, and in between - written by Aditya Patel (more <a href="https://www.secwale.com/about">here</a>). To support this effort, consider subscribing (it&#8217;s free) and spreading the word.</em></p>]]></content:encoded></item><item><title><![CDATA[The Cloud Conundrum: S3 Encryption]]></title><description><![CDATA[AWS will now encrypt all new data in its Amazon S3 storage service by default. Huge announcement, secure default for the win, sure, but it *may* give a false sense of security. Here&#8217;s how.]]></description><link>https://www.secwale.com/p/encryption</link><guid isPermaLink="false">https://www.secwale.com/p/encryption</guid><dc:creator><![CDATA[Aditya Patel]]></dc:creator><pubDate>Mon, 16 Jan 2023 17:59:49 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!19gJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5674518-9a25-4ffa-9045-a2dbfd564e12_1900x1066.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!19gJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5674518-9a25-4ffa-9045-a2dbfd564e12_1900x1066.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!19gJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5674518-9a25-4ffa-9045-a2dbfd564e12_1900x1066.png 424w, https://substackcdn.com/image/fetch/$s_!19gJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5674518-9a25-4ffa-9045-a2dbfd564e12_1900x1066.png 848w, https://substackcdn.com/image/fetch/$s_!19gJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5674518-9a25-4ffa-9045-a2dbfd564e12_1900x1066.png 1272w, https://substackcdn.com/image/fetch/$s_!19gJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5674518-9a25-4ffa-9045-a2dbfd564e12_1900x1066.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!19gJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5674518-9a25-4ffa-9045-a2dbfd564e12_1900x1066.png" width="1456" height="817" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a5674518-9a25-4ffa-9045-a2dbfd564e12_1900x1066.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:817,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2130959,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!19gJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5674518-9a25-4ffa-9045-a2dbfd564e12_1900x1066.png 424w, https://substackcdn.com/image/fetch/$s_!19gJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5674518-9a25-4ffa-9045-a2dbfd564e12_1900x1066.png 848w, https://substackcdn.com/image/fetch/$s_!19gJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5674518-9a25-4ffa-9045-a2dbfd564e12_1900x1066.png 1272w, https://substackcdn.com/image/fetch/$s_!19gJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5674518-9a25-4ffa-9045-a2dbfd564e12_1900x1066.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>&#128075; Dear reader: Hope you&#8217;re staying safe, and going strong with your new year resolutions. This is first part of a series of posts I wish to write on peculiar cloud security challenges. In this post, I will cover:</em></p><ul><li><p><em>Encryption at rest in cloud</em></p></li><li><p><em>Amazon S3 and its encryption options</em></p></li><li><p><em>How cloud&#8217;s server side encryption can give a false sense of security, and what you can do about it</em></p></li></ul><div><hr></div><p>Encryption is a tricky concept. It&#8217;s simple at the surface, but dig a level deeper and it unravels like Game of Thrones subplots.</p><p>Let&#8217;s take AWS' recent announcement that all new objects in Amazon S3 (Simple Storage Service) will now be encrypted by default.</p><blockquote><p><em>Amazon S3 now applies server-side encryption with Amazon S3 managed keys (SSE-S3) as the base level of encryption for every bucket in Amazon S3. Starting January 5, 2023, all new object uploads to Amazon S3 will be automatically encrypted at no additional cost and with no impact on performance.&nbsp;</em></p><p><em>(<a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/default-encryption-faq.html">Source: AWS docs</a>)</em></p></blockquote><p>What was earlier a 1-click setup, is now zero-click. AWS, and its S3 service specially, operate at a mind boggling scale. There are <a href="https://www.linkedin.com/feed/update/urn:li:activity:7016875593275232257/">280 trillion objects</a> in S3, averaging over 100 million requests per second. To be able to support transparent encryption on all new objects, while not breaking any existing functionality, dependencies and applications - is impressive to say the least. Kudos to the engineering teams.</p><p><strong>But.. does the default SSE-S3 encryption provide effective confidentiality? And, does it help in reducing impact of one of the primary causes of CISO migraines, i.e., data leakage via intentional or accidental public S3 buckets?</strong></p><p><strong>Short answer: No.</strong></p><p>I&#8217;m a big proponent of AWS, and can say from experience that AWS takes security very seriously. However, in this case, server side encryption with default S3 keys (SSE-S3) can be misconstrued, potentially leading to inaction from customers to employ stricter encryption schemes (which are all available natively in AWS btw) on sensitive data.</p><p>Let&#8217;s dive in.</p><h3>Cryptography - a quick primer</h3><p>Encryption converts readable data to a random looking blob. It is the reason we can watch dog videos in private, or crib about things on group chats (well, mostly), or buy toilet paper online securely. On a serious note, encryption is a fundamental tool for cybersecurity to the extent that it can be an enabler of human rights, by allowing freedom of speech through end-to-end encryption. It <em>is</em> a big deal to get it right.</p><p>Technically, encryption is the process of converting plaintext data into ciphertext. There are 2 types of encryption: symmetric and asymmetric. Symmetric encryption uses the same key to encrypt and decrypt the data. Asymmetric encryption uses separate keys to do the same, and is also called public key cryptography. We will limit this blog post to symmetric encryption of data at rest, which is the data stored on disks. </p><pre><code>encrypt(plaintext, key) &#8594; ciphertext</code></pre><p>The efficacy of a good encryption scheme depends upon the strength of encryption algorithm (the lock) and the encryption key (key).</p><p>&#128274; First is the lock, i.e., the algorithm itself. There are many encryption algorithms available, the most common type today is Advanced Encryption Standard with 256 bit key (AES-256). There is enough evidence, backed by gory mathematical proofs, to safely assume that the AES-256 encryption algorithm is not broken, <em>for now</em>. From one <a href="https://scrambox.com/article/brute-force-aes/">estimate</a>, if we use the combined compute power of every PC on earth (estimated 2 billion PCs), it&#8217;d take 13,689 trillion trillion trillion trillion years to brute force AES-256. For comparison, the age of the universe is a meager 14 billion years. Quantum computers might change the equation sooner than later, but for now AES-256 is considered a quantum resistant algorithm. Moral of the story here is to trust the researchers and don&#8217;t invent your crypto.</p><p>&#128273; Then comes the key. As a wise man once said: if a thief has your key, no lock is strong enough. That&#8217;s why protecting the key is the most important part of a secure encryption scheme. So in theory, it&#8217;s pretty simple to protect your data. Choose a vetted encryption algorithm, and protect the key. In practice, things are more complex.</p><p>Any modern production application usually has many different data sources, and hence many encryption schemes and keys. For instance, <a href="https://aws.amazon.com/solutions/case-studies/pinterest-proserve/">Pinterest currently stores and manages 1 exabyte of data on AWS</a>. Nope - that&#8217;s not a typo, that is <a href="https://www.backblaze.com/blog/what-is-an-exabyte/">one frickin&#8217; exabyte</a>, or 1 billion gigabytes of data, which needs to be protected.</p><p>This humongous amount of data is unlikely to be in a single data store. So now, you need to manage encryption across all the applicable data stores, equating to potentially thousands of encryption keys. Add to it the security best practice of rotating the keys periodically, or in case of an incident, deleting a whole bunch of keys. Doing this on your own is a nightmare. Ask <a href="https://youtu.be/e22yxe2iyZM">Harry Potter</a>.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!THmr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8904765a-f96a-49b4-b80f-6bea50b3f17e_540x216.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!THmr!,w_424,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8904765a-f96a-49b4-b80f-6bea50b3f17e_540x216.gif 424w, https://substackcdn.com/image/fetch/$s_!THmr!,w_848,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8904765a-f96a-49b4-b80f-6bea50b3f17e_540x216.gif 848w, https://substackcdn.com/image/fetch/$s_!THmr!,w_1272,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8904765a-f96a-49b4-b80f-6bea50b3f17e_540x216.gif 1272w, https://substackcdn.com/image/fetch/$s_!THmr!,w_1456,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8904765a-f96a-49b4-b80f-6bea50b3f17e_540x216.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!THmr!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8904765a-f96a-49b4-b80f-6bea50b3f17e_540x216.gif" width="540" height="216" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8904765a-f96a-49b4-b80f-6bea50b3f17e_540x216.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:216,&quot;width&quot;:540,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Daily Wizarding World | Harry potter, Wizarding world, Harry potter gif&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Daily Wizarding World | Harry potter, Wizarding world, Harry potter gif" title="Daily Wizarding World | Harry potter, Wizarding world, Harry potter gif" srcset="https://substackcdn.com/image/fetch/$s_!THmr!,w_424,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8904765a-f96a-49b4-b80f-6bea50b3f17e_540x216.gif 424w, https://substackcdn.com/image/fetch/$s_!THmr!,w_848,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8904765a-f96a-49b4-b80f-6bea50b3f17e_540x216.gif 848w, https://substackcdn.com/image/fetch/$s_!THmr!,w_1272,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8904765a-f96a-49b4-b80f-6bea50b3f17e_540x216.gif 1272w, https://substackcdn.com/image/fetch/$s_!THmr!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8904765a-f96a-49b4-b80f-6bea50b3f17e_540x216.gif 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Luckily, you don&#8217;t have to. There are key management services both for on premise and cloud. In AWS, the service is called AWS Key Management Service (AWS KMS).</p><p>This brings us to the types of encryption choices available in S3.</p><h3>Encryption in Amazon S3</h3><p>You can either do <strong>Server Side Encryption (SSE)</strong>, in which Amazon S3 encrypts your data as it writes it to disks in its data centers and decrypts it for you when you access it. With server side encryption, there are 3 broad ways to manage your encryption keys.</p><p><strong>One</strong> option is for S3 to fully manage the encryption keys (SSE-S3). This option places the most trust in AWS, and is the reason I&#8217;m writing this post. <strong>A second</strong> option is for customers to use a key that is managed by the Amazon Key Management Service (SSE-KMS). This option gives customers control and transparency over access to their keys with strong auditing. Spoiler: this is my recommendation for most use-cases. <strong>Third</strong> option is for the customer to provide and manage the key, but have S3 perform the actual encryption and decryption (SSE-C). This gives customers a level of separation between themselves and AWS; do note that there&#8217;s a small window where the encryption key will be present on AWS servers to do encryption and decryption. Using either of these 3 ways, you can choose to give all the encryption, decryption and associated compute headaches to AWS.</p><p>Or, you can say hey AWS, I don&#8217;t trust you, I will do the <strong>Client Side Encryption (CSE)</strong>, in which you encrypt your data locally and pass it to the Amazon S3 service for storage and retrieval. You&#8217;ve 2 further options here: Use a key stored in AWS Key Management Service (AWS KMS). Or, use a key that you store within your application.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!goBx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa30cdc12-9099-4397-9fa1-29e70cab1a3a_3217x2117.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!goBx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa30cdc12-9099-4397-9fa1-29e70cab1a3a_3217x2117.png 424w, https://substackcdn.com/image/fetch/$s_!goBx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa30cdc12-9099-4397-9fa1-29e70cab1a3a_3217x2117.png 848w, https://substackcdn.com/image/fetch/$s_!goBx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa30cdc12-9099-4397-9fa1-29e70cab1a3a_3217x2117.png 1272w, https://substackcdn.com/image/fetch/$s_!goBx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa30cdc12-9099-4397-9fa1-29e70cab1a3a_3217x2117.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!goBx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa30cdc12-9099-4397-9fa1-29e70cab1a3a_3217x2117.png" width="1456" height="958" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a30cdc12-9099-4397-9fa1-29e70cab1a3a_3217x2117.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:958,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1912273,&quot;alt&quot;:&quot;Encryption-at-rest options in Amazon S3&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Encryption-at-rest options in Amazon S3" title="Encryption-at-rest options in Amazon S3" srcset="https://substackcdn.com/image/fetch/$s_!goBx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa30cdc12-9099-4397-9fa1-29e70cab1a3a_3217x2117.png 424w, https://substackcdn.com/image/fetch/$s_!goBx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa30cdc12-9099-4397-9fa1-29e70cab1a3a_3217x2117.png 848w, https://substackcdn.com/image/fetch/$s_!goBx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa30cdc12-9099-4397-9fa1-29e70cab1a3a_3217x2117.png 1272w, https://substackcdn.com/image/fetch/$s_!goBx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa30cdc12-9099-4397-9fa1-29e70cab1a3a_3217x2117.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>Figure 1: Encryption-at-rest options in Amazon S3</em></figcaption></figure></div><p><strong>Security is a tradeoff problem.</strong> Your security decisions may come at the cost of convenience or performance or a higher spend. If you can safely create and manage your own keys in your applications for instance, you, and only you, will have access to the unencrypted material (assuming your access controls are rock solid). Choose client side encryption for highly regulated industries, business critical and the most paranoid of use cases. For the rest, the tradeoff problem may lean towards using the other option, the server side encryption.</p><p>And as per an AWS blog, server side encryption may be the way to go. I agree.</p><blockquote><p><em>While client-side encryption still has an important role in security and data protection, two of its disadvantages are that it depends on clients having a secure source of randomness, which is not always easy, and it is CPU intensive on the client. For more simplicity and efficiency, our services also offer server-side encryption.<br><br><a href="https://aws.amazon.com/blogs/developer/updates-to-the-amazon-s3-encryption-client/">(Source: AWS blog)</a></em></p></blockquote><p>Now, let&#8217;s go back to the news announcement, that AWS now encrypts all new object uploads with SSE-S3 server side encryption. So does it provide any meaningful confidentiality?</p><h3>So does it?</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_R-7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b19e351-8332-48fc-82a9-f7aa067862eb_498x314.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_R-7!,w_424,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b19e351-8332-48fc-82a9-f7aa067862eb_498x314.gif 424w, https://substackcdn.com/image/fetch/$s_!_R-7!,w_848,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b19e351-8332-48fc-82a9-f7aa067862eb_498x314.gif 848w, https://substackcdn.com/image/fetch/$s_!_R-7!,w_1272,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b19e351-8332-48fc-82a9-f7aa067862eb_498x314.gif 1272w, https://substackcdn.com/image/fetch/$s_!_R-7!,w_1456,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b19e351-8332-48fc-82a9-f7aa067862eb_498x314.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_R-7!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b19e351-8332-48fc-82a9-f7aa067862eb_498x314.gif" width="498" height="314" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5b19e351-8332-48fc-82a9-f7aa067862eb_498x314.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:314,&quot;width&quot;:498,&quot;resizeWidth&quot;:498,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Friends Ross GIF - Friends Ross It So Does Not GIFs&quot;,&quot;title&quot;:&quot;Friends Ross GIF - Friends Ross It So Does Not GIFs&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Friends Ross GIF - Friends Ross It So Does Not GIFs" title="Friends Ross GIF - Friends Ross It So Does Not GIFs" srcset="https://substackcdn.com/image/fetch/$s_!_R-7!,w_424,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b19e351-8332-48fc-82a9-f7aa067862eb_498x314.gif 424w, https://substackcdn.com/image/fetch/$s_!_R-7!,w_848,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b19e351-8332-48fc-82a9-f7aa067862eb_498x314.gif 848w, https://substackcdn.com/image/fetch/$s_!_R-7!,w_1272,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b19e351-8332-48fc-82a9-f7aa067862eb_498x314.gif 1272w, https://substackcdn.com/image/fetch/$s_!_R-7!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b19e351-8332-48fc-82a9-f7aa067862eb_498x314.gif 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In my opinion, no, the SSE-S3 server side encryption does not provide any meaningful security assurance when it comes to confidentiality of data. Here&#8217;s why.</p><p><strong>One</strong>. It is mostly a checkbox exercise. This may appease some auditors but not all (disclaimer: nothing against auditors, I work very closely with them at Amazon, and they understand security better than most). For example, SSE-S3 meets PCI DSS&#8217; encryption requirement but not the segregation of duties requirement.</p><p><strong>Next</strong>, at best SSE-S3 adds a defense in depth protection against a physical loss, theft or confiscation of an AWS hard drive storing your data. Think crazy scenarios like a tornado or fire, followed by more chaos and somehow the AWS hard drive landing at Goodwill. If the data on it is unencrypted, game over. As you can imagine, the likelihood of this happening is about the same as that of the United States winning a cricket world cup.</p><p><strong>Lastly</strong>, in SSE-S3, since S3 encrypts and decrypts the data transparently to <em>anyone with access</em> to the bucket, on its own it will <strong>not</strong> protect leaked S3 buckets&#8217; contents from being read. Public S3 buckets is unfortunately still a fairly common scenario.</p><p><strong>Why does AWS even provide this option then? </strong>For one, some encryption is better than no encryption. Few compliance attestations may be happy with it, since it gives you a defense in depth option. It also provides some practical <a href="https://twitter.com/colmmacc/status/1560709523978854401">benefits</a> for AWS to wipe out the hard drives more easily and securely (delete the key and you get crypto shredding). Also worth noting, there are no additional costs for using SSE-S3.</p><p><strong>What should you do instead? </strong>My suggestion is to go with any of the other options in Figure 1. At a minimum, go with the server side encryption with KMS keys, SSE-KMS.</p><p><strong>SSE-KMS provides a good balance between security and usability.</strong> For reading and writing contents of S3, it requires users to have access to <em>both</em> the object and the key. Enter multiple permission policies at IAM, S3 and KMS level, and hence segregation of duties. Now if a bucket is made public, and if it&#8217;s encrypted with SSE-KMS, it&#8217;s a very low likelihood that its contents will be world readable. Win!</p><h3>Takeaways</h3><p>If you&#8217;re new to AWS, you might be wondering, wow this is complicated. It is, and I didn&#8217;t even cover all the scenarios. Here&#8217;re the takeaways:</p><ol><li><p><strong>Don&#8217;t invent your crypto.</strong> Choose a cryptographic algorithm vetted by academia and industry such as AES-256.</p></li><li><p><strong>Outsource key generation and management.</strong> Prefer not to create and manage your own cryptographic keys if it&#8217;s not your core competency. Use the cloud service provider&#8217;s key management service instead.</p></li><li><p><strong>SSE-KMS for the win.</strong> That means, in AWS for your data in S3, prefer the server side encryption with KMS keys (SSE-KMS) for most use cases.</p></li><li><p><strong>SSE-S3 may be misleading.</strong> Server side encryption with S3 keys (SSE-S3) shows AWS&#8217; commitment to security, but IMO it doesn&#8217;t provide benefits beyond a compliance checkbox and a very low probability scenario of AWS data-center compromise.</p></li></ol><p>To wrap it up, here&#8217;s a relevant quote, attributed to Amazon CTO Werner Vogels: </p><p><em>&#8220;Dance like nobody's watching. Encrypt like everyone is.&#8221;</em></p><div><hr></div><p><em>Disclaimer: Opinions expressed are solely my own and do not express the views or opinions of my employer.</em></p><p><em>P.S. This article made it to the <a href="https://news.ycombinator.com/item?id=34403852">frontpage of Hackernews</a>. Good discussion there as a further reading.</em></p>]]></content:encoded></item><item><title><![CDATA[Burrito Centric Security]]></title><description><![CDATA[Cybersecurity needs a people centric approach. Mistakes happen, as I realized on a recent Chipotle run.]]></description><link>https://www.secwale.com/p/burrito</link><guid isPermaLink="false">https://www.secwale.com/p/burrito</guid><dc:creator><![CDATA[Aditya Patel]]></dc:creator><pubDate>Wed, 04 Jan 2023 22:11:43 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!WEtC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdae61858-dadd-485c-8de2-b6380b43709a_740x420.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WEtC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdae61858-dadd-485c-8de2-b6380b43709a_740x420.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WEtC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdae61858-dadd-485c-8de2-b6380b43709a_740x420.png 424w, https://substackcdn.com/image/fetch/$s_!WEtC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdae61858-dadd-485c-8de2-b6380b43709a_740x420.png 848w, https://substackcdn.com/image/fetch/$s_!WEtC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdae61858-dadd-485c-8de2-b6380b43709a_740x420.png 1272w, https://substackcdn.com/image/fetch/$s_!WEtC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdae61858-dadd-485c-8de2-b6380b43709a_740x420.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WEtC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdae61858-dadd-485c-8de2-b6380b43709a_740x420.png" width="728" height="413.18918918918916" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/dae61858-dadd-485c-8de2-b6380b43709a_740x420.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:420,&quot;width&quot;:740,&quot;resizeWidth&quot;:728,&quot;bytes&quot;:93834,&quot;alt&quot;:&quot;Chipotle burrito&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Chipotle burrito" title="Chipotle burrito" srcset="https://substackcdn.com/image/fetch/$s_!WEtC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdae61858-dadd-485c-8de2-b6380b43709a_740x420.png 424w, https://substackcdn.com/image/fetch/$s_!WEtC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdae61858-dadd-485c-8de2-b6380b43709a_740x420.png 848w, https://substackcdn.com/image/fetch/$s_!WEtC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdae61858-dadd-485c-8de2-b6380b43709a_740x420.png 1272w, https://substackcdn.com/image/fetch/$s_!WEtC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdae61858-dadd-485c-8de2-b6380b43709a_740x420.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Happy New Year &#127881;! In this post, I will cover:</em></p><ul><li><p><em>What is People-Centric Cybersecurity</em></p></li><li><p><em>Why &#8220;humans are the weakest link is security&#8221; needs a revisit</em></p></li><li><p><em>How to reduce human mistakes in security</em></p></li></ul><div><hr></div><p>Recently at a regular Chipotle preorder-and-grab-food run, I realized that the bag they gave me was lighter than usual. Our order is always the same, so even a slight change in weight would have been noticeable. It turned out, the missing item was neither a side of hot salsa nor a bag of chips, rather it was the burrito! I pointed out the mistake, and they promptly fixed it. Phew.</p><p>This happened despite Chipotle having a process for digital orders with dedicated second &#8220;make lines&#8221;.</p><blockquote><p><em>Tech-enabled second make lines: After implementing second make lines in most stores for online orders, Chipotle digitized many, adding visual screens that guide staff through the order to ensure that it's more accurate.</em></p><p><em>(<a href="https://newsroom.chipotle.com/2019-02-08-Chipotle-Opens-2-500th-Restaurant-Highlighting-Continued-Growth">Source: Chipotle newsroom</a>)</em></p></blockquote><p><strong>Mistakes happen. We&#8217;re humans after all. Security is no different.</strong></p><p>People are considered the achilles heal of security, because unfortunately, they often are. As per Verizon 2022 Data Breach Investigations Report (DBIR), 82% (!!) of all security breaches in 2022 involved a human element.</p><blockquote><p><em>The human element continues to drive breaches. This year 82% of breaches involved the human element. Whether it is the Use of stolen credentials, Phishing, Misuse, or simply an Error, people continue to play a very large role in incidents and breaches alike.</em></p><p><em><a href="https://www.verizon.com/business/en-gb/resources/2022-data-breach-investigations-report-dbir.pdf">(Source: Verizon DBIR 2022, page 8)</a></em></p></blockquote><p>As a result, if you look at most security best practices, say these from AWS, you&#8217;d notice that they take a very blunt approach such as keeping people away from data.</p><blockquote><p><em>Keep people away from data: Use mechanisms and tools to reduce or eliminate the need for direct access or manual processing of data. This reduces the risk of mishandling or modification and human error when handling sensitive data.</em></p><p><em><a href="https://docs.aws.amazon.com/wellarchitected/latest/framework/sec-design.html">(Source: AWS Well-Architected Framework, Design principles)</a></em></p></blockquote><p>But.. at the end of the day, you cannot keep people away from data and systems. There will always be someone on a team somewhere who will need access, or worse, may have direct access nonetheless.</p><p>Next up, comes fixing people related security issues via, training.</p><p>Security trainings help in creating awareness but a one size fits all approach is not sufficient. More often than not, security trainings are dull, mandatory affairs - which no one pays attention to. When was the last time you enjoyed <em>and</em> remembered all your security training takeaways?</p><p>Let&#8217;s say stars align and you create the world&#8217;s most engaging series of security trainings, it might still not work. There&#8217;s so much noise, stress, fatigue and distraction in this pandemic driven IT world today, that mistakes are bound to happen. Training humans, trusting them to make the right choices, and then yelling &#8220;i told you so&#8221; (although satisfying) is not the solution.&nbsp;</p><h3>So what can be done?</h3><p>If changing culture is hard, changing human behavior is next to impossible. There&#8217;s thousands of years of evolutionary baggage that we carry: <em>fear</em> and <em>greed</em> are factors that will likely continue to be exploited by adversaries. That's where the synergy between man and machine comes in.</p><p><strong>Enter people-centric security.</strong> In cybersecurity, there&#8217;s a concept called people-centric security, which means putting people at the heart of security, instead of considering them the weakest link. </p><p>Here are some things that we can do to reduce human mistakes in security and achieve a people-centric security vision.</p><p><strong>&#127791; One. Use automation to reduce cognitive load, and Artificial Intelligence (AI) to augment human decision making. </strong>This way you&#8217;re assisting humans to make less mistakes. They will be able to thrive with data driven decisions. For instance: initial screening for a security issue can be done by a tool; enrich incident response tickets with more relevant information for a security analyst to triage more effectively; or pre-populate security configurations using a predetermined baseline in new applications. Use-cases are endless, but the idea is simple: use machine learning to augment human decisions.</p><p><strong>&#127791; Two. Train users with the right expectations. </strong>Security training and awareness is important, however, it&#8217;s just another layer in your arsenal to improve the security posture overall. Users need to be familiar with basic security hygiene like keeping all software up to date, multi-factor authentication and how to avoid phishing attempts. Train users, but don&#8217;t expect it to be a panacea.</p><p><strong>&#127791; Three. Make security easy.</strong> As a security practitioner, instead of giving people a checklist of bazillion best practices, or hundreds of resources, give them an easy button (a simple intuitive solution) that takes care of security <em>automagically</em>. Developers should choose a solution because it makes their life easy: something faster, more reliable, less complex. Security achieved through such a solution can be a happy byproduct.</p><p><strong>&#127791; Four. Assume things will fail.</strong> Even with all these mechanisms successfully in place, assume things will fail, because they will. Build strong detection and auto-remediation capabilities in your systems (again, powered by AI). Build defense in depth. Build resilience. Build processes. And test these in peacetime through tabletop exercises and hands-on simulations.&nbsp;I see humans fiddling with systems, sometimes misconfiguring them, regularly, both at AWS and Amazon. Fortunately, we have mechanisms in place to detect &#8594; correct, and in some cases even prevent it.</p><h3>Wrapping it up</h3><p>I was lucky to detect &#8594; correct the case of missing burrito, our Chipotle order hasn&#8217;t changed since 200 BC, I&#8217;d have detected even a missing chip. And what about the experience? It&#8217;s okay, mistakes happen. All we need is to develop some empathy, trust that humans will make mistakes, prepare for it, and march towards people (enjoying burrito) centric security.</p><div><hr></div><p><em><strong>&#128213; Security Wale</strong> is a blog about cloud, cybersecurity, and in between - written by Aditya Patel. This is a passion project, where Aditya shares his learnings, opinions and rants from over a decade of working in the IT industry in United States. For a living, currently, he protects &#9729;&#65039; cloudy things at Amazon/AWS. Earlier, Aditya has done software security consulting, masters in Information Security from Johns Hopkins, and computer science engineering. To support this effort, consider subscribing (it&#8217;s free) and spreading the word.</em></p>]]></content:encoded></item><item><title><![CDATA[LastPass is at it again]]></title><description><![CDATA[LastPass, the cloud password manager, announced they were breached. Again.]]></description><link>https://www.secwale.com/p/lastpass</link><guid isPermaLink="false">https://www.secwale.com/p/lastpass</guid><dc:creator><![CDATA[Aditya Patel]]></dc:creator><pubDate>Fri, 23 Dec 2022 20:52:26 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!s84n!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6db06e-82f2-41b7-bdf4-6a3e88660009_3896x2559.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!s84n!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6db06e-82f2-41b7-bdf4-6a3e88660009_3896x2559.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!s84n!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6db06e-82f2-41b7-bdf4-6a3e88660009_3896x2559.jpeg 424w, https://substackcdn.com/image/fetch/$s_!s84n!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6db06e-82f2-41b7-bdf4-6a3e88660009_3896x2559.jpeg 848w, https://substackcdn.com/image/fetch/$s_!s84n!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6db06e-82f2-41b7-bdf4-6a3e88660009_3896x2559.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!s84n!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6db06e-82f2-41b7-bdf4-6a3e88660009_3896x2559.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!s84n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6db06e-82f2-41b7-bdf4-6a3e88660009_3896x2559.jpeg" width="1456" height="956" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/ee6db06e-82f2-41b7-bdf4-6a3e88660009_3896x2559.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:956,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:5534896,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!s84n!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6db06e-82f2-41b7-bdf4-6a3e88660009_3896x2559.jpeg 424w, https://substackcdn.com/image/fetch/$s_!s84n!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6db06e-82f2-41b7-bdf4-6a3e88660009_3896x2559.jpeg 848w, https://substackcdn.com/image/fetch/$s_!s84n!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6db06e-82f2-41b7-bdf4-6a3e88660009_3896x2559.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!s84n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fee6db06e-82f2-41b7-bdf4-6a3e88660009_3896x2559.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">The Death of Socrates (1787). Metropolitan Museum of Art, New York.</figcaption></figure></div><p>LastPass, the password manager service, <a href="https://blog.lastpass.com/2022/12/notice-of-recent-security-incident/">announced</a> that there were breached <em>again</em>. </p><p>From The Verge&#8217;s <a href="https://www.theverge.com/2022/12/22/23523322/lastpass-data-breach-cloud-encrypted-password-vault-hackers">story</a></p><blockquote><p>If you have an account you use to store passwords and login information on LastPass, or you used to have one and hadn&#8217;t deleted it before this fall, your password vault may be in hackers&#8217; hands. Still, the company claims you might be safe if you have a strong master password and its most recent default settings. However, if you have a weak master password or less security, the company says that &#8220;as an extra security measure, you should consider minimizing risk by changing passwords of websites you have stored.&#8221;</p></blockquote><p>LastPass has been terrible at security over the past few years! This is almost the worst that can happen to a password manager service, I&#8217;d be panicking if I were their CEO or CISO at the moment.</p><p>Breaches happen.. but the way LastPass has handled this (and earlier breaches) is a case study on how not to handle breach disclosures. They had a breach in August 2022, and are now saying attackers used data from that breach to target an employee to attack again in November 2022 - <strong>this time stealing encrypted password vaults!</strong> </p><p>Not only the timing and manner of their disclosure is horrible (at Christmas when most IT departments/folks are on vacation), their recommendation is to change each and every password in your vault (and since the URLs are unencrypted, attackers have an easier way targeting specific high-reward website accounts).</p><p>And it doesn&#8217;t end here&#8230; in theory a breach like this should not matter, because your vault is encrypted with a strong encryption algorithm, which can&#8217;t be brute forced in a practical amount of time&#8230;. that&#8217;s what you&#8217;d expect. Sorry, not the case here! <strong>Lastpass uses a custom version of PBKDF2 encryption algorithm with 100,100 iterations (the more the better).. but also still allows the ones with fewer iteration</strong> (pre 2018 accounts have 5000 iterations as reported by Verge). So attackers have a good chance of breaking cypto on many of the stolen vaults.</p><blockquote><p>It&#8217;s also worth noting that if you have an older account (prior to a newer default setting introduced after 2018), a weaker password-strengthening process may have been used to protect your master password. According to LastPass, it currently uses &#8220;a stronger-than-typical implementation of 100,100 iterations of the Password-Based Key Derivation Function,&#8221; but when a <em>Verge</em> staff member checked their older account using <a href="https://support.lastpass.com/help/about-password-iterations-lp030027">a link</a> the company includes in its blog, it told them their account was set to 5,000 iterations.</p></blockquote><p>This is just great. LastPass users, time to change all your passwords and switch to <a href="https://1password.com/">1Password</a> or <a href="https://bitwarden.com/">Bitwarden</a>.</p>]]></content:encoded></item></channel></rss>