I know folks yell a lot about offline backups.
Please normalize yelling about offline jump servers too.
It's always good to have a break-glass box.
@LitMoose Wait how does that work? Just a machine you keep offline until you need it when stuff goes off the rails?
@sleeplessone exactly that. With separate accounts, and MFA enforced.
Pre-set to manage what you need them to in case of emergency.

@LitMoose @sleeplessone interesting. I will think about doing this

P

@LitMoose *Facebook network engineers would like to know your location*
@LitMoose include in that break-glass kit both an offline jump server, and an offline domain controller šŸ˜€
@dnlongen @LitMoose yeah I’m thinking a DC you bring online every two weeks or something? Sure it might be out of date but it’s something.
@ksbex @dnlongen most DC's are out of date anyway, if folks are honest.
@LitMoose How would you do this for a complete network? Proposed financial services regulations from the SEC and NYDFS seem to require something like this. #cyberlaw # ransomware @law
@LitMoose In this world of a remote-first workforce, where does this offline box reside? A secure rom at corporate HQ? Say we have a jump host environment that we’ve built as the most secure but also a single point of failure in the network. No admin management happens unless it is behind it. What happens when it crashes or needs to be taken down for a zero-day patch? How do my infrastructure peeps get in?
@streamsthoughts all good questions. To start, they should be gapped in some way from your other infra. If you're an ESXi shop, for instance, these are not part of a cluster or managed through vCenter. These are set aside if something in vCenter goes pear shaped.
As to the how, I would work with the network and systems engineers teams you have, in the locations you have, and come up with a few workable solutions.
If AWS-only shop, your break glass looks different than a hybrid Citrix, *Nix, GCP, with mix of physical boxes.
The trick is gapping and leaving offline, and I'd recommend your EDR be installed on it.
@LitMoose I was just having a nice discussion with our systems engineering and network teams today about this very topic. We need a solution for break glass, PCI compliant, that also can be access from home without heading to a secure rom at HQ. The transitive nature of PCI makes this a challenge.
@streamsthoughts I'm watching so many people offload PCI to a managed provider it's not even funny.
"PCI compliance" is a pain trigger for anyone who's had to deal with it.
I see you're with a credit union. Condolences, there's no escape for you.
That said, it's doable, just ends up looking like dormant, replicated infra with switches for escalated access, fewer open ports, and tunneling.
@LitMoose Yep. It’s a give and take for everyone involved. We’re leaning towards a CA secured, public facing VPN portal, with static creds which the admin team only knows the first half of the passphrase - management knows the 2nd half. From a risk perspective, PCI has helped us get shit done. I love it.
@LitMoose @jerry @yaro might have an opinion here
@nobletrout @LitMoose @jerry my take on breakglass. It’s only breakglass if the action requires two people, is auditable, and has a physical access control. Anything less and it’s just security by obscurity relying on people ā€œdoing the right thingā€.

@LitMoose Also, have an offline backup server host. Like a server that has an interface for your offline backups, has the backup software pre-installed, has all the current backup encryption keys available.

And regularly test restoring your offline backups from this offline backup server to make sure you could restore other servers back to bare metal or a new virtualization host if everything else is a burning pit of despair.