sshahone | 5 years ago | on: Show HN: Contribute security features and bug patches to open source projects
sshahone's comments
sshahone | 5 years ago | on: Restrict Access to your internal websites on AWS with BeyondCorp
(1) Zero trust access (like BeyondCorp, protects application and services when a user, user credentials, user devices are compromised)
(2) Network micro-segmentation (contain impact when one network segment is compromised, dynamic network assignment)
(3) Zero trust browsing (protection for users from getting infected with malicious contents served by trusted but compromised websites)
Honestly, I am only more familiar with zero trust access, and for this, I can recommend you first read -> BeyondCorp A New Approach to Enterprise Security [0] by Google. The trend was kickstarted from that paper
sshahone | 5 years ago | on: Restrict Access to your internal websites on AWS with BeyondCorp
For BeyondCorp, it essentially:
* Must be Layer 7 protocol, access privilege aware (achieved by an identity-aware access proxy).
* Promotes authorization as opposed to authentication only.
* Should be able to enforce security policies (time, location, context, 2fa).
* Must be aware of the security state of the user device.
Shameless plug: Check out our zero trust service access project TRASA (https://github.com/seknox/trasa). It's free and opensource and addresses many of the requirements outlined by BeyondCorp.
sshahone | 5 years ago | on: HashiCorp Boundary
It's a BeyondCorp like a user identity and layer 7 aware access proxy for RDP, SSH, Web, and Database protocols with privileged access management, native two-factor auth agents, and device trust policies.
Disclaimer: I am a core maintainer of this project.
sshahone | 5 years ago | on: Show HN: Trasa – zero trust service access platform
Weak access to internal services are often overlooked and are one of the primary vectors of system compromise and data breach. With features such as agentless two-factor authentication, privilege access security(protecting keys to your kingdom), device authentication (verify user devices along with passwords), TRASA ensures that access to internal services is well protected.
sshahone | 5 years ago | on: Show HN: Trasa – zero trust service access platform
Think of Keycloak as human resource admin, which enrolls an employee and applications in an organization, and assign them a badge for security clearance to access those applications. TRASA is a system that polices misuse of their security clearance (malicious insider) and protects applications and services from compromised accounts threats (stolen credentials).
sshahone | 5 years ago | on: Show HN: Trasa – zero trust service access platform
TRASA is a unified access control project with identity-aware access proxy, privileged access management, two-factor authentication, device trust, and access policy features that enable secure remote access to Web, SSH, RDP, and Database services.
It's an opensource and self-hostable alternative to Duo Beyond, Cloudflare Access, Okta Access, and other similar services.
Disclosure: I am one of the core contributors to this project.