@cR0w The original impetus of Web customization was to allow me almost immediate 180 day search results of something I want to block via my proxy: unwanted SaaS, TLD, geo, file types, UAs. Then I'd immediately know my potential business impact of users, their roles, business units and usage/cadence.
Which has become a fairly standard process:
Read private and public intel reportsReview/draw the attack chainAsk myself what the hell is $that, which is being abused and I've never heard of or considered.Neat. Can we block the root $thing? E.g., trycloudflare, weebly, pythonanywhere, .rarDo it immediately. Or soonish with comms? Sometimes a change control. Or cannot, crap, fine, I'll do DE.I'm a lazy automation engineer. I'd much rather just block or not do a $thing than build a detection and playbook. I just sell it as tech debt avoidance and posture management so I can go outside more.
#blueteam