Christopher Brumm

183 Followers
67 Following
48 Posts
Security and identity practicioner.
Cloud Security Architect.
MS Cloud sherpa.
🐻🐯🥷
In fresh ❤️ with 🐘
Bloghttps://chris-brumm.medium.com
LinkedInhttps://www.linkedin.com/in/christopherbrumm/

Recommendation of the day: Know your editor! (VSCode edition)

https://youtube.com/playlist?list=PLj6YeMhvp2S5UgiQnBfvD7XgOMKs3O_G6

Getting Started with Visual Studio Code

Learn VS Code's must-have features in short and practical tutorials: Editing code with support from IntelliSense, find anything in the Command Palette, run c...

YouTube

Very interesting!

Game of Thrones in cybersecurity: data gravity, industry consolidation, platform play, private equity, and the great cyber gold rush
https://ventureinsecurity.net/p/game-of-thrones-in-cybersecurity

Game of Thrones in cybersecurity: data gravity, industry consolidation, platform play, private equity, and the great cyber gold rush

One of my longest and most comprehensive deep dives into the future of cybersecurity to date. This piece attempts to define the industry outlook for the next 5-10 years.

Venture in Security

New blog post out: Passwordless Persistence and Privilege Escalation in Azure.

Link: https://posts.specterops.io/passwordless-persistence-and-privilege-escalation-in-azure-98a01310be3f

In this blog post I explain how new passwordless authentication mechanisms like Azure's Certificate Based Authentication can be subverted by adversaries to establish long-term stealthy persistence, and explain a built-in privilege escalation primitive that exists in CBA.

Passwordless Persistence and Privilege Escalation in Azure

Adversaries are always looking for stealthy means of maintaining long-term and stealthy persistence and privilege in a target environment. Certificate-Based Authentication (CBA) is an extremely…

Posts By SpecterOps Team Members

New blog post: "Securing privileged user access with #AzureAD #ConditionalAccess and #IdentityGovernance"

Overview and considerations to enforce security controls for using #PAW, strong authentication and manage access for privileged roles based on tiering levels.

https://www.cloud-architekt.net/securing-privileged-access-conditionalaccess-governance/

Securing privileged user access with Azure AD Conditional Access and Identity Governance

Conditional Access and Entitlement Management plays an essential role to apply Zero Trust principles of “Verify explicitly“ and “Use least-privilege access“ to Privileged Identity and Access. In this article, I like to describe, how this features can be use to secure access to privileged interfaces and how to assign privileged access by considering Identity Governance policies.

Thomas Naunheim

Had some busy days. The CISSP exam was really tough - but I did it 🎂

Now I'm full focused on XMas with little distractions to Administrative Access concepts.

@thomasnaunheim has built some mind-blowing stuff (watch out for his blog) and I have to learn about Entra Permission Management for a customer POC.

Exciting Days 🍍

Are you working with #Microsoft technology and ever wondered how to become an MVP?

Then watch the Microsoft 365 Defender MVP special of the Ninja Show next Wednesday, 21.12.2022 17:00 UTC

https://aka.ms/NinjaShow

@[email protected] and I are among the guests

#NinjaShow #M365Defender #M365D #MVP #MSFT #community

Redirecting...

I don't have the mental capacity to do a whole lot of socialing across all the different sites these days, so here's a list of greatest hits.

https://syfuhs.net/what-happens-when-you-type-your-password-into-windows

What Happens When you Type Your Password into Windows?

Have you ever wondered what happens behind the scenes when you type your password into the Windows logon screen and hit enter?

Overview of the eDiscovery (Premium) solution in Microsoft Purview - Microsoft Purview (compliance)

Learn about the eDiscovery (Premium) solution in Microsoft Purview. This article provides an overview of eDiscovery (Premium) in Microsoft Purview, a tool to help you manage internal and external investigations. It also frames the business reasons for using eDiscovery (Premium) to manage your legal investigations.

Captain's log ⛵🥷

Today I've learned about some #infosec topics:

1. the SCAP protocol: https://en.m.wikipedia.org/wiki/Security_Content_Automation_Protocol

2. Cross-site tracing: https://owasp.org/www-community/attacks/Cross_Site_Tracing

3. and (again) ACID 😵‍💫: https://www.geeksforgeeks.org/acid-properties-in-dbms/

#LifeLongLearning

Security Content Automation Protocol - Wikipedia

Spent half the day with @fabian_bader struggling with #Azure Arc and Azure Monitor Agent #AMA to connect DCs to #Sentinel.
There are a lot of catches and pitfalls here. Hopefully one of us will have time to blog a bit about it.