N.B: This paper is not an InfoSec research article, a history/symbolism essay or an official statement from Yogosha.
It should only be considered as a “Spontaneous Prose”* **of an ongoing journey, about building a bridge between InfoSec and DevOps industries through #SE, #Cloud, #OpenSource and #BugBounty. After all, it’s only full of open-source ideas shared in CC BY-NC 3.0.*
Excuse my French, Kudos for challenging.
But in capitalist reality, as distinguished from its textbook picture, it is not (price) competition which counts but the competition from the new commodity, the new technology, the source of supply, the new type of organization […] Competition which […] strikes not at the margins […] of the existing firms but as their foundations and their very lives. Joseph A. Schumpeter in Capitalism, Socialism and Democracy, 1942
I had many nicknames in my life, but the first and founding one was “ولد الطبيب” (~ Doctor’s son), a kinda “social golden key” in Morocco. This “dom0” nickname learned what empathy, compassion and dedication means directly from the source. From someone that sworn Hippocratic’s oath, spends relentless hours on practice/phone to treat children with intellectual disability or other developmental conditions, but nevertheless finds time to read books.
The reading of all good books is like a conversation with the finest minds of past centuries. — René Descartes
I spent my childhood between a keyboard and a bookshelf. Between “cyber” e-zines and books, where Dostoyevsky’s existentialism confronts TAZ’s anarchism, and where Madchat follows the steps of Al-Khalil ibn Ahmad al-Farahidi.
This childish habit saved me during the last “c’est la meeerde” death valley. Not only as an inspiration source, but also a great mean to sharpen critical thinking. Three books stood out, and were great lighthouses in this ocean of chaos that we call “Information” age.
The first one is "Ces histoires insolites qui ont fait la médecine" (~ The unusual stories that made Medicine) where Prof. Fabiani shares with the reader a glimpse of his history courses in Paris V.
Did you know, for instance, that Socrate last words — I owe the sacrifice of a rooster to Asklepios — were an inspiration for Hippocrates deontology? Or that the École de Chirurgie was built & founded due to a fistula in Louis XIV’s ass? Or that Semmelweis, the “savior of mothers” who gave birth to Evidence-based medicine, died of an infection after being severely beaten by several guards in a mental institution? He was considered mad because he asked physicians to wash their hands between an autopsy and a childbirth to reduce childbed fever.
But the true essence of this book is in its last page, that quickly reads:
[…] Science history is somehow different from History, because it has this unique thread, this unavoidable goal that is scientific truth. And this truth is unique, even if different ways to get a glimpse of it exists. It is then possible to find out some “big picture” patterns. Maybe then we can take some lessons out of it, some critical thinking about our behaviors and errors. Alluding it was the aim of this book. Concerning the future of medicine, I know only one way to predict it, it is to create it…
I’ll just leave those 2 elements here without comments…
… Or maybe add one more wishful thinking: Is it possible to stop these “vulgar” websites from being produced in the first place? Or in other words, can we, as Internet’s doctors, do prevention in this mess we call Digital Information Security?
Let me KISS it for you: Imagine your webapp in a Web Operation Room, having in hand those 3 files.
In InfoSec reality, this DevOpsSec approach have 3 immediate effects:
Pair-Programing: By pushing issues directly to the project tracking software and interact on it. Devs will not only be proficient for correcting it, but will be security aware in situ/in prod, not in a 3 days vanilla security course.
The ability to outsource “security test risks”. Wanna a quick health check for your webapp? Just pop a clean staging image somewhere in “the Cloud”, and give the IP address to your nearest Bug Bounty platform. Even if Hunters finds out some critical vuln, it won’t have operational impact if the testing machines are kept isolated.
As a bonus, Infrastructure as Code possibilities are a good way out for a “Patch once, Deploy at once” strategy that will ease Blue team work, or for a “pre-rolled and compliant” deployment strategy that will give better visibility for Audit & Compliance teams.
We’ve been honored to share a meal, to be challenged and to build bridges all evening with those who have already seen it all.
We received this email the following day:
[…]This original approach (for us Mainframe users) was surprising at first. But it reminded us that Security could and should be observed by different angles, that all of its parts should be enlightened, understood and integrated as a whole, and finally that we need to continuously question what we take for granted.[…] — GSF
Those kind words from those wise people ringed a bell. A bell in Pr. Fabiani’s book epigraph, citing Emile Littré.
Medicine Science, if it don’t want to get belittled as a job, should take care of it’s history, and heal the old monument that time has bequeathed— Emile Littré 1829
Andrew S. Grove describes this *“something changed” *period as a Strategic Inflection Point, or “what happens to a business when a major change takes place in its competitive environment. A major change due to introduction of new technologies”, like what happened not so long ago.
But I’m sure of one thing. Oui nide iou to build this hospital.
$ docker run -d -p 9001:9001 --restart=always -t jess/tor-relay
« Il vaut mieux rêver sa vie que la vivre, encore que la vivre, ce soit encore la rêver. » Marcel Proust