@dwizzzleMSFT
David Weston (DWIZZZLE)
5 years
security is just basic fundamentals. You don’t need to spend a bunch on magic Products. You need a organized process for ensuring the basics are put in place and stay in place. Patch, good auth, restricted priv, app control. There are no shortcuts, it’s not as hard as you think
@Alex_T_Weinert
Alex Weinert
5 years
This is a huge deal. Legacy hacking tools on legacy auth are responsible for the vast majority of attacks. Data point: account compromise rates in tenants who have disabled legacy auth are 67% lower than overall rates!
3
66
177
9
80
357

Replies

@dwizzzleMSFT
David Weston (DWIZZZLE)
5 years
I talked about security engineers focusing on what they like. Same for secops. Redteam and apt Aren’t scared of your threat hunting, huge ioc collection, or your edr. You are asymmetric. They are scared of patching, upgrading, Mfa disabling, macros and powershell, app control.
3
16
99
@dwizzzleMSFT
David Weston (DWIZZZLE)
5 years
Don’t play their game, make them play yours.
1
16
124
@dwizzzleMSFT
David Weston (DWIZZZLE)
5 years
During the next redteam outbrief, ask them “if i did x, y, z basic hardening measure what would they do instead” When you hear that long pause and a non answer, go make that happen. @epakskape and I do that after almost every pwn2own to plan. It works.
1
9
68
@Smefner
Tony Smerychynski
5 years
@dwizzzleMSFT @SwiftOnSecurity Don't even get me started. Human issues not tech issues. People get complacent and like new shiny toys. The only killer app is a calendar with the monthly reminder "update system".
1
0
4
@dwizzzleMSFT
David Weston (DWIZZZLE)
5 years
@Smefner @SwiftOnSecurity Yes this is what separates the people who want to improve security from those that just want to play with tech
0
1
6
@bpauwels
$BP
5 years
@dwizzzleMSFT @SwiftOnSecurity Sadly getting the basics right in a large company is THAT hard. Not cause of technology but bureaucracy and fragmentation.
1
0
0
@dwizzzleMSFT
David Weston (DWIZZZLE)
5 years
@bpauwels @SwiftOnSecurity Then security people have to be good at navigating the bureaucracy and being effective. No surrender
0
0
0
@dwizzzleMSFT
David Weston (DWIZZZLE)
5 years
@nightmodesec @SwiftOnSecurity It’s easier when it’s presented as the only real option
0
0
2
@TKatsapas
TimK
5 years
@dwizzzleMSFT Secure workstations, smartcards, user rights restrictions, some form of tiering (atleast tier 0),laps, Bitlocker,security baselines, firewalls, IPsec, protected users group for t0 admins. That's my 2c
0
0
1
@Avibm
Avi Ben-Menahem
5 years
@dwizzzleMSFT Or as I like to put it - brush your teeth every night and change you underwear daily - basic hygiene...:)
0
0
3
@LaughingBrook
Jonathan Johnson
5 years
@dwizzzleMSFT @SwiftOnSecurity “We are spending so much time analyzing and reporting for ‘compliance’ that we don't have time to patch and configure security!”
1
0
5
@OMGCyberSec
OMG Cyber Security
5 years
@dwizzzleMSFT I keep saying this “80-90% of all incidents could have been avoided or the impact reduced by just doing the basics right (security hygiene) in the 1st place” I also say “technology without the foundations in place; processes, procedures & training, is like building on quicksand”
0
0
2
@cveiche
andre protas
5 years
@dwizzzleMSFT “Totally agree, but It’s not as hard as you think” really depends on the environment. :-/
1
0
2
@JohnRConstable
John R. Constable
5 years
@dwizzzleMSFT @dinodaizovi For SMBs on very limited budgets, just doing these sec basics is all that's usually possible anyway.
0
0
1