I have to agree an abuse of trust from one trusted services to others would be 
a control point that I would look at within the system. (I am not sure is this 
is based on Service Orientated Architecture type of system or something more 
simplistic).

The 2 factor is definitely a good start up front, but also need to all at the 
control in place throughout the system to ascertain if there is any weak points 
in the design that could be abused.

Z

Edward E. Ziots, CISSP, CISA, CRISC, Security +, Network +
Security Engineer
Lifespan Organization
[email protected]<mailto:[email protected]>
Work:401-255-2497


This electronic message and any attachments may be privileged and confidential 
and protected from disclosure. If you are reading this message, but are not the 
intended recipient, nor an employee or agent responsible for delivering this 
message to the intended recipient, you are hereby notified that you are 
strictly prohibited from copying, printing, forwarding or otherwise 
disseminating this communication. If you have received this communication in 
error, please immediately notify the sender by replying to the message. Then, 
delete the message from your computer. Thank you.
[cid:[email protected]]


From: [email protected] [mailto:[email protected]] On 
Behalf Of Andrew S. Baker
Sent: Wednesday, April 16, 2014 9:45 AM
To: ntsysadm
Subject: Re: [NTSysADM] Secure Communications for Server Orchestration

The boxes in question are all housed in a top-tier hosted data center with 
biometric scanner and audited access.  The biggest concern is logical security.
The goal is to prevent someone who gets access to the master box, and thus has 
automatic authenticated access to several other key systems hosting a mission 
critical application.

Regards,






ASB
http://XeeMe.com/AndrewBaker<http://xeeme.com/AndrewBaker>
Providing Virtual CIO Services (IT Operations & Information Security) for the 
SMB market...




On Tue, Apr 15, 2014 at 10:04 AM, Kurt Buff 
<[email protected]<mailto:[email protected]>> wrote:
Depending on circumstances, I'd work on physical security for the master 
(perhaps putting the master in a separate locked cabinet), and then login 
security for it as well - implement 2FA, such as a proximity card or other 
assurance.
Any idea what the threat model is?

Kurt

On Tue, Apr 15, 2014 at 4:11 AM, Andrew S. Baker 
<[email protected]<mailto:[email protected]>> wrote:
Correct... In addition to using certificate-based logons, rather than 
password-based logons.






ASB
http://XeeMe.com/AndrewBaker<http://xeeme.com/AndrewBaker>
Providing Virtual CIO Services (IT Operations & Information Security) for the 
SMB market...




On Mon, Apr 14, 2014 at 6:31 PM, Kurt Buff 
<[email protected]<mailto:[email protected]>> wrote:
Aside from using public keys vs. passwords?
Kurt

On Mon, Apr 14, 2014 at 9:14 AM, Andrew S. Baker 
<[email protected]<mailto:[email protected]>> wrote:
Good afternoon:
I have an interesting question about secure configuration between puppet 
orchestration master servers and their minions.
(for those who don't use puppet, you can look at it here: 
http://puppetlabs.com/puppet/puppet-enterprise )
The question pertains to using SSH to secure the communication between the 
master server and its slave servers.  What other mechanisms would you consider 
to ensure that this SSH connection does not get abused?  (As it would 
essentially be always active)

Regards,





ASB
http://XeeMe.com/AndrewBaker<http://xeeme.com/AndrewBaker>
Providing Virtual CIO Services (IT Operations & Information Security) for the 
SMB market...








<<inline: image001.png>>

Reply via email to