Tag Archive for: database

“Who dropped the DB?” Find out with Teleport Database Access • Graham Cluley


Teleport

Graham Cluley Security News is sponsored this week by the folks at Teleport. Thanks to the great team there for their support!

You’re woken up at 3 am, only to discover your worst nightmare. The new intern just deleted the production database during routine maintenance by accident. You quickly restore from a backup. During the retrospective, you discover that while onboarding, access was provided to all databases, but with full permissions and very similar Postgres URLs, it quickly became apparent that this was an elementary mistake.

At Teleport, we help people solve these problems. First, we start with making it easy to connect the right resource securely, baking in best practices for bastion hosts and securing endpoints, and making sure to never expose a DB to the internet instead of going through the Teleport proxy. Next up, Teleport Authenticate makes it easy to onboard and offboard users, and Teleport Authorize makes sure that users and machines can perform specific tasks. E.g., Only let the intern read the production DB, but don’t let them drop it. Lastly, Teleport Audit Log provides a stream of structured events that make monitoring and early detection of issues a breeze.

All of this might sound expensive, but all of the above features are available in our free & open-source community edition. At Teleport, we believe the strongest security should be available to all, and if your company has specific compliance requirements or needs advanced workflows, Teleport can help with its Enterprise edition.

Try Teleport

We have a few options to try Teleport. You can start with one of our many getting started guides, or try an interactive demo track for Teleport Server Access & Teleport Kubernetes Access.


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.


Source…

Prosecutor won’t charge reporter who uncovered database flaw


Prosecutor Wont Charge Reporter Who Uncovered Database Flaw
KOAM Image

ST. LOUIS, Mo. – A Missouri prosecutor will not charge a journalist who exposed a state database flaw. That flaw he discovered allowed public access to thousands of teachers’ Social Security numbers. The Governor had ordered a criminal investigation into the journalist.

(Previous Article: Missouri Governor accuses reporter of hacking DESE website)

The Database Flaw

In October of 2021, the State shut down the Missouri Department of Elementary and Secondary Education webpage. It happened after St. Louis Post-Dispatch reporter uncovered a security flaw that could have potentially exposed teachers’ sensitive information.

State officials say someone took the records of at least three educators, unencrypted the source code from the webpage, and viewed the social security numbers of those specific educators.

The St. Louis Post-Dispatch reported it discovered the vulnerability in a web application that allowed the public to search teacher certifications and credentials.

The newspaper held off publishing a story about the flaw until the state fixed it.

The Investigation into the Database Flaw

Governor Parson announced a criminal investigation in October of 2021. He alleged the newspaper journalist was “acting against a state agency to compromise teachers’ personal information in an attempt to embarrass the state and sell headlines for their news outlet. We will not let this crime against Missouri teachers go unpunished.”

Democratic state Rep. Ashley Aune, of Kansas City, accused Parson of a “smear campaign” against the Post-Dispatch journalist when it was Parson’s administration that stored the private information and left it unprotected.

“This fiasco perfectly illustrates why Missouri needs to get serious about confronting 21st century cyberthreats,” Aune said.

Aune helped write a section of Senate Bill 49 that created the Missouri Cybersecurity Commission.

The Post-Dispatch released a statement in which it said the reporter in question did the right thing by reporting the issue.

“A hacker is someone who…

Source…

Who dropped the DB? Find out with Teleport Database Access • Graham Cluley


Teleport

Graham Cluley Security News is sponsored this week by the folks at Teleport. Thanks to the great team there for their support!

You’re woken up at 3 am, only to discover your worst nightmare. The new intern just deleted the production database during routine maintenance by accident. You quickly restore from a backup. During the retrospective, you discover that while onboarding, access was provided to all databases, but with full permissions and very similar Postgres URLs, it quickly became apparent that this was an elementary mistake.

At Teleport, we help people solve these problems. First, we start with making it easy to connect the right resource securely, baking in best practices for bastion hosts and securing endpoints, and making sure to never expose a DB to the internet instead of going through the Teleport proxy. Next up, Teleport Authenticate makes it easy to onboard and offboard users, and Teleport Authorize makes sure that users and machines can perform specific tasks. E.g., Only let the intern read the production DB, but don’t let them drop it. Lastly, Teleport Audit Log provides a stream of structured events that make monitoring and early detection of issues a breeze.

All of this might sound expensive, but all of the above features are available in our free & open-source community edition. At Teleport, we believe the strongest security should be available to all, and if your company has specific compliance requirements or needs advanced workflows, Teleport can help with its Enterprise edition.

Try Teleport

We have a few options to try Teleport. You can start with one of our many getting started guides, or try an interactive demo track for Teleport Server Access & Teleport Kubernetes Access.


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.


Source…

Comparing house security with computer security – IT fundamentals