logoalt Hacker News

motorestlast Sunday at 5:05 AM2 repliesview on HN

> Move to the cloud they said. It will be more secure then your intranet they said. Only fools pay for their own Ops team they said.

It seems that the fundamental issue surfaced in the blog post is that developers who work on authorizarion in resource servers are failing to check basic claims in tokens such as the issuer, the audience, and subject.

If your developers are behind this gross oversight, do you honestly expect an intranet to make a difference?

Listen, the underlying issue is not cloud vs self-hosted. The underlying issue is that security is hard and in general there is no feedback loop except security incidents. Placing your apps in a intranet, or VPN, does nothing to mitigate this issue.


Replies

raesene9last Sunday at 7:38 AM

But of course it does provide an additional layer of security that indeed could have reduced the likelihood of this issue being exploited.

For me, the core of the discovered issue was that applications intended purely for use by internal MS staff were discoverable and attackable by anyone on the Internet, and some of those applications had a mis-configuration that allowed them to be attacked.

If all those applications had been behind a decently configured VPN service which required MFA, any attacker who wanted to exploit them would first need access to that VPN, which is another hurdle to cross and would reduce the chance of exploitation.

With a target like MS (and indeed most targets of any value) you shouldn't rely solely on the security provided by a VPN, but it can provide another layer of defence.

For me the question should be, "is the additional security provided by the VPN layer justified against the costs of managing it, and potentially the additional attack surface introduced with the VPN".

show 1 reply
tonyhart7last Sunday at 5:33 AM

"The underlying issue is that security is hard and in general there is no feedback loop except security incidents."

this is tbh, computer architecture is already hard enough and cyber security is like a whole different field especially if the system/program is complex