I want to join our organisation AD with a recently acquired company’s AD for federated access. What are the security risks I should consider?

As per the title. What risks and controls should I consider? Are there any questions i need to ask the external party AD before setting up the ‘Trust’ between the 2 ADs?

Continue reading I want to join our organisation AD with a recently acquired company’s AD for federated access. What are the security risks I should consider?

Is my domain controller at risk if allow untrusted devices (partner) access to an app? [closed]

I would like to give a partner organisation and their users access to an app.
The users have been provided AD accounts from my organisation.
They will use their company devices (not assured) to access the app over the internet.
The user wi… Continue reading Is my domain controller at risk if allow untrusted devices (partner) access to an app? [closed]

After creating an AWS user for S3 access with access key and secret key, how do I share these with the user?

I have a private S3 bucket. I want a user from an external organisation to have access.
I have added a user in IAM. How does this external user get notified and how do I share credentials?
The secret key, at a minimum, should not be shared… Continue reading After creating an AWS user for S3 access with access key and secret key, how do I share these with the user?

How do you build in the capability to automate the ability to discover and apply security patches in your ci/cd pipeline?

Within a DevSecOps Ci/Cd pipeline, one of the best practices is to automatically discover and apply patches to vulnerable software prior to deployment.
Is it possible to check a CVE database, find patches, and then deploy? I want to build … Continue reading How do you build in the capability to automate the ability to discover and apply security patches in your ci/cd pipeline?

Would adding encryption to an MPLS provide additional protection for application access which is over TLS?

I have users at a remote site who access business application via an MPLS. The applications use HTTPS (TLS). The MPLS connection that we have is non-encrypted. The data is sensitive.
Would adding encryption to the MPLS provide additional … Continue reading Would adding encryption to an MPLS provide additional protection for application access which is over TLS?

Would adding encryption to an MPLS provide additional protection for application access which is over TLS?

I have users at a remote site who access business application via an MPLS. The applications use HTTPS (TLS). The MPLS connection that we have is non-encrypted. The data is sensitive.
Would adding encryption to the MPLS provide additional … Continue reading Would adding encryption to an MPLS provide additional protection for application access which is over TLS?

What can a malicious user do with a shared android tablet on a corporate network via connected to corp WIFI?

We are deploying android tablets with a shared pin for users in an office.
If the device was stolen or in the hands of a hacker, what can a hacker do on the network (realistically)?
Android does NOT have a command prompt so therefore would… Continue reading What can a malicious user do with a shared android tablet on a corporate network via connected to corp WIFI?

What are the risks of allowing general users to add printers to their company laptops?

I work for a company with a large user base. There is a requirement to allow users to add printers to their laptops e.g. when working from home.
What are the security risks?
Is their a bad actor can use a printer to hack the laptop?
Can a … Continue reading What are the risks of allowing general users to add printers to their company laptops?