<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Risky Context]]></title><description><![CDATA[Weekly dose of experience, for infosec auditors, pentesters, and risk assessors. For top-down guys (https://sripati.info/it-matters-in-cybersecurity-if-you-are-a-top-down-or-bottoms-up-person/). ]]></description><link>https://www.sripati.info</link><image><url>https://substackcdn.com/image/fetch/$s_!D1Cd!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c2f5a87-368c-4dc8-be74-19d611a754dc_356x356.png</url><title>Risky Context</title><link>https://www.sripati.info</link></image><generator>Substack</generator><lastBuildDate>Wed, 15 Apr 2026 22:30:33 GMT</lastBuildDate><atom:link href="https://www.sripati.info/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Sripati MS]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[riskycontext@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[riskycontext@substack.com]]></itunes:email><itunes:name><![CDATA[Sripati MS]]></itunes:name></itunes:owner><itunes:author><![CDATA[Sripati MS]]></itunes:author><googleplay:owner><![CDATA[riskycontext@substack.com]]></googleplay:owner><googleplay:email><![CDATA[riskycontext@substack.com]]></googleplay:email><googleplay:author><![CDATA[Sripati MS]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[How to get job as entry level candidate in cybersecurity]]></title><description><![CDATA[Here are some ways for an entry level guy to enter into this field. Remember - very few people can do all the things that are listed below.]]></description><link>https://www.sripati.info/p/how-to-get-job-as-entry-level-candidate-in-cybersecurity</link><guid isPermaLink="false">https://www.sripati.info/p/how-to-get-job-as-entry-level-candidate-in-cybersecurity</guid><dc:creator><![CDATA[Sripati MS]]></dc:creator><pubDate>Mon, 12 May 2025 18:28:18 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/16030cf1-a874-4141-86a7-ca1259674b5d_2000x1333.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xZXf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e4bb664-e143-4403-8967-60b0962467a2_2000x1333.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xZXf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e4bb664-e143-4403-8967-60b0962467a2_2000x1333.jpeg 424w, https://substackcdn.com/image/fetch/$s_!xZXf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e4bb664-e143-4403-8967-60b0962467a2_2000x1333.jpeg 848w, https://substackcdn.com/image/fetch/$s_!xZXf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e4bb664-e143-4403-8967-60b0962467a2_2000x1333.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!xZXf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e4bb664-e143-4403-8967-60b0962467a2_2000x1333.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xZXf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e4bb664-e143-4403-8967-60b0962467a2_2000x1333.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3e4bb664-e143-4403-8967-60b0962467a2_2000x1333.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:728,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;How to get job as entry level candidate in cybersecurity&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="How to get job as entry level candidate in cybersecurity" title="How to get job as entry level candidate in cybersecurity" srcset="https://substackcdn.com/image/fetch/$s_!xZXf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e4bb664-e143-4403-8967-60b0962467a2_2000x1333.jpeg 424w, https://substackcdn.com/image/fetch/$s_!xZXf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e4bb664-e143-4403-8967-60b0962467a2_2000x1333.jpeg 848w, https://substackcdn.com/image/fetch/$s_!xZXf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e4bb664-e143-4403-8967-60b0962467a2_2000x1333.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!xZXf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e4bb664-e143-4403-8967-60b0962467a2_2000x1333.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>Recruiters are noticing that while there are vacancies in information security, very few are entry level. Almost every job asks for prior experience.</p><h3>Here's why.</h3><ol><li><p>Information security is mostly driven by laws and regulations.</p></li><li><p>Information security is still considered as an offshoot of IT. So much so, that having an IT experience is a definite '+'.</p></li><li><p><a href="https://sripati.info/security-is-a-cost-centre/">Infosec is a cost centre</a>. Outsourcing is always a juicier option, than maintaining staff, in-house.</p></li><li><p>Security is like brushing your teeth or taking a daily bath - everyone knows the benefit, still very few people do it (unless forced, either by society or by regulation), unless they get compromised. It's a different ball-game then.</p></li><li><p>When an employer looks to bolster their security status, they hire</p><ol><li><p>The leader (CISO), if they are in a regulated industry or a decent size company. Hiring happens, top-down (senior-most, then senior, then junior, followed by junior-most).</p></li><li><p>Someone slightly experienced, but cheaper than an executive.</p></li></ol></li><li><p>Due to point 1 above, budgets are limited. Skill stacking is a given, resulting in <a href="https://sripati.info/on-cocktail-jds-in-infosec-and-why-they-will-keep-coming/">cocktail JDs</a>. Budgets get depleted by the time it comes to juniors.</p></li></ol><p>One must read the below posts, related to job and work in general. Read them, chew them (in mind, of course).</p><p><a href="https://danielmiessler.com/blog/real-problem-job-market?ref=sripati.info">End of Work - Daniel Miessler's theory on why it is so hard to find and keep a job that makes you happy.</a></p><p><a href="https://www.jaiminton.com/internal-blog/cyber-job-security?ref=sripati.info">Job security in cyber security is changing - Jai Minton's take on the changing job landscape in cybersecurity</a></p><h3>Doesn't mean all is lost, though.</h3><p>Here are some ways for an entry level guy to enter into this field. Remember - very few people can do all the things that are listed below. So, even if you could do 'some' things out of below list, congratulate yourself every-day. And push on.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.sripati.info/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Risky Context! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Few non-negotiable pre-requisites first. These must be sorted out before you put in the hard work.</p><ol><li><p><a href="https://sripati.info/risks-of-a-cybersecurity-career/">Why do you want to get into Infosec</a>? Get your 'why' sorted out.</p></li><li><p>Understand your learning process, is it <a href="https://sripati.info/it-matters-in-cybersecurity-if-you-are-a-top-down-or-bottoms-up-person/">top-down or bottoms-up</a>?</p></li><li><p>Understand the value that you bring to your employer - cheap, open for experiments, can be deployed for anything, always available. Not every senior can do this. This is your value to most of the employers (at least for the first 3-4 years). Remember this. And,</p></li></ol><blockquote><p>Remember to tell yourself every day - Hard choices, easy life. Easy choices, hard life.</p></blockquote><p>After you sort the pre-requisites out, do the following while looking for a job in infosec. Keep updating your CV every 6 months. Keep a daily journal of things that you did at work and learning. It will help you when you update your CV (and in interviews). Remember - pivot when things doesn't seem to be going your way. But, give yourself time before deciding to pivot.</p><ol><li><p>Invest in a desktop (not in that fancy laptop) and build a home-lab. Anant Srivastava has articulated it very well in his c0c0n talk '<a href="https://www.youtube.com/watch?v=rGjXtDpk3fQ">Expanding capability horizons : Homelabs and beyond</a>', watch and take notes.</p><ol><li><p>If you like offence, pick few vulnerable VMs, pick an introductory course (from <a href="https://academy.tcm-sec.com/">TCM Academy</a>; their <a href="https://www.youtube.com/c/thecybermentor">YouTube channel</a> has lot of useful info for no cost) and follow along.</p></li><li><p>If you like defence, setup a defensive lab (<a href="https://mayfly277.github.io/posts/GOADv2/">an AD with DNS</a>, couple of windows machines, 1-2 linux machines, one web server, etc.). Learn how to set up log forwarding, how to analyse logs. Hover to <a href="https://www.securityblue.team/certifications/blue-team-level-1">BTL</a>, <a href="https://letsdefend.io/">Let's Defend</a>, or <a href="https://www.networkdefense.co/courses/">Chris Sanders' courses</a>.</p></li><li><p>Jason Haddix has some pointers for <a href="https://executiveoffense.beehiiv.com/p/executive-offense-free-red-and-blue-training-resources-i-love-training-pt2">red, blue, and purple trainings that are available for free</a>.</p></li><li><p>If you are a developer who is looking to get into security, source code review, web app pentest are some of the ways you can contribute. Pentesterlab runs a very good <a href="https://pentesterlab.com/live-training/">source code review course</a> that you can look into. It is not cheap ($950), but very systematic, with a worthy trainer. Their lab, even otherwise, is a good investment for people who want to get into web app security. Another excellent resource is from makers of Burp Suite Pro - <a href="https://portswigger.net/web-security">the web security academy</a>.</p></li></ol></li><li><p>Document your experience. It is crucial because it tells a recruiter that you are hungry and that you are learning/ amenable to learn. Both are crucial traits that employers look for. It could be a blog, tweets, LinkedIn posts, etc.</p><ol><li><p>If you are learning offence, look for vulnerabilities in open source software, raise PR (Pull Request), and ask for CVE number when they accept your PR.</p></li><li><p>If you are learning defence, document your journey of setting up your homelab, setting up logging, analysing those logs, identifying attacks, responding to them, etc.</p></li></ol></li><li><p>After you have been at it for about 6 months (no less), try contacting CISOs in/ near your city using LinkedIn with crisp, 2-para cover letter. Highlight what you have been doing for your learning, and express interest in joining their team.</p></li><li><p>Visit resume clinics in conferences. Hand out your CVs. This will help you get over your shyness. It will be very difficult initially (doubly so if you are an introvert). Use LinkedIn if you can't visit personally.</p></li><li><p>First 2-3 years are very crucial, after you get a job. Think about them as investment. You need to optimise your initial days. Here's how.</p><ol><li><p>Spend some time (2-3 years) in IT, if your learning happens in a <a href="https://sripati.info/it-matters-in-cybersecurity-if-you-are-a-top-down-or-bottoms-up-person/">bottoms-up</a> manner. Some of the options are -</p><ul><li><p>Helpdesk - You will learn how an organisation works, how to troubleshoot basic issues in IT.</p></li><li><p>Supporting system/ network administrators - You will learn all the ways in which a server or network blows up, how users react, how sysadmins and network admins keep the mis-configurations alive, how they get flagged by auditors as security vulnerabilities, etc.</p></li><li><p>Junior developer - You will learn about how development happens, which will help you in setting up a Secure SDLC practice, or setup secure CI/ CD pipeline, or get into secure code review, or web app pen testing, etc.</p></li></ul></li><li><p>Spend some time in ISO 27001 implementation teams, if you happen to be a <a href="https://sripati.info/it-matters-in-cybersecurity-if-you-are-a-top-down-or-bottoms-up-person/">top-down</a> person. You will learn more about how an organisation works, the processes interact, how work gets done at high level, etc.</p></li></ol></li><li><p>Don't worry if you feel overwhelmed in one specialty (offence, defence, AD, app-sec, governance, compliance, etc.) and looking to pivot. Everything is connected in infosec. You must learn how to connect 'what you are doing now' to 'how will this help in your new role'. Here's an example. Doing application risk assessment is very hard if you don't understand</p><ol><li><p>key vulnerabilities (XSS, resulting in session hijacking; the application storing data on an S3 bucket which is unprotected),</p></li><li><p>the business need of the application (used for customer Video-KYC, which is different from Customer-KYC),</p></li><li><p>its placement in the network (how does risk changes when application and data are stored in vendor network vs. stored in your datacenter),</p></li><li><p>applicable regulations (e.g., for Indian BFSI, RBI regulations around V-KYC, RBI cybersecurity framework, RBI master direction on IT Governance, RBI master direction on Outsourcing of IT activities, DPDP Act of India, etc.), and</p></li><li><p>impact of exploit (session hijacking, coupled with open S3 bucket, leads to ATO - Account Take Over - and customer PII; potentially resulting in fine/ penalty).</p></li></ol></li><li><p>What does the last example mean? It means,</p><ol><li><p>It is Ok to <a href="https://sripati.info/offense-is-not-sexiest-defense-is/">pivot to defence</a> if you find offence overwhelming or not suiting your temperament. However, you must be clear on</p><ul><li><p>why you are doing it, and</p></li><li><p>what value you bring to the other side, when you pivot (e.g., your application development skills make you a juicier candidate to IT, your understanding of application vulnerabilities and exploits make you a better risk assessor in InfoSec Governance or a better SOC analyst because you know application logs better than anyone, your experience in infosec governance makes you a better compliance officer, etc.)</p></li></ul></li><li><p>You must be honest with yourself. Are you pivoting because you know you don't belong to this sub-field or is it just laziness and lethargy? Sometimes, it takes time for information to seep into brain and crystallise into something actionable. Give yourself tough love, because no one else knows you like you do.</p></li></ol></li></ol><p>All the best for your future. May the force be with you.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.sripati.info/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Risky Context! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Bored of working in an Indian Bank as auditor or risk assessor? Remember the promise...]]></title><description><![CDATA[Banking is a boring job for many.]]></description><link>https://www.sripati.info/p/bored-of-working-in-an-indian-bank-as-auditor-or-risk-assessor-remember-the-promise</link><guid isPermaLink="false">https://www.sripati.info/p/bored-of-working-in-an-indian-bank-as-auditor-or-risk-assessor-remember-the-promise</guid><dc:creator><![CDATA[Sripati MS]]></dc:creator><pubDate>Sat, 10 May 2025 17:50:48 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/15a3e6c9-c13a-4f36-b93a-c60a74ed0288_2000x1333.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Hbh1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c3be13d-907d-48db-b8cf-57207b5ac0c8_2000x1333.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Hbh1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c3be13d-907d-48db-b8cf-57207b5ac0c8_2000x1333.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Hbh1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c3be13d-907d-48db-b8cf-57207b5ac0c8_2000x1333.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Hbh1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c3be13d-907d-48db-b8cf-57207b5ac0c8_2000x1333.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Hbh1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c3be13d-907d-48db-b8cf-57207b5ac0c8_2000x1333.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Hbh1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c3be13d-907d-48db-b8cf-57207b5ac0c8_2000x1333.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9c3be13d-907d-48db-b8cf-57207b5ac0c8_2000x1333.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Bored of working in an Indian Bank as auditor or risk assessor? Remember the promise...&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Bored of working in an Indian Bank as auditor or risk assessor? Remember the promise..." title="Bored of working in an Indian Bank as auditor or risk assessor? Remember the promise..." srcset="https://substackcdn.com/image/fetch/$s_!Hbh1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c3be13d-907d-48db-b8cf-57207b5ac0c8_2000x1333.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Hbh1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c3be13d-907d-48db-b8cf-57207b5ac0c8_2000x1333.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Hbh1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c3be13d-907d-48db-b8cf-57207b5ac0c8_2000x1333.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Hbh1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c3be13d-907d-48db-b8cf-57207b5ac0c8_2000x1333.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><p>Banking is a boring job for many.</p><p>Lot of processes, forms to fill (whether offline or online), detailed checks that threaten to make bureaucratic red tape run for money.</p><p>Information security is no exception. Hired as expert counsel, advisory, and management layers, we are expected to advise and guide in a comprehensive manner, covering as many layers as there are.</p><p>This is not only baffling at times, but back-breaking.</p><p>Then why do it?</p><p>For the promise given by the central government to citizens on every piece of paper they count as currency.</p><blockquote><p>I promise to pay the bearer the sum of ....</p></blockquote><p>This promise is why the control functions were designed and mandated by the regulator (RBI). This promise is why you exist.</p><p>Remember this promise the next time you audit or assess the risk of any aspect of country's financial infrastructure. That finding or risk would be your contribution to the nation.</p><p>Remember this the next time you get bored of your job.</p><h2>Sign up for Risky Context</h2><p>I write at the intersection of pentest, auditing, risk management and career advice. I add context to the infosec risk. I help answer the question 'where is the risk?'</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.sripati.info/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.sripati.info/subscribe?"><span>Subscribe</span></a></p><p>No spam. Unsubscribe anytime. Musings based on real experiences, not theory. All Infosec, mashed up.</p><p>At the intersection of pentest, auditing, risk management and career advice. Musings based on real experiences, not theory. All infosec, mashed up.</p><p>&#8206;Follow the Risky Context channel on WhatsApp (if WhatsApp is your thing. Your number is not shared with others when you connect to my channel): <a href="https://whatsapp.com/channel/0029VaDqrFU8aKvQohD5nq0r?ref=sripati.info">https://whatsapp.com/channel/0029VaDqrFU8aKvQohD5nq0r</a></p>]]></content:encoded></item><item><title><![CDATA[Spoke at CPE session, ISACA Muscat Chapter]]></title><description><![CDATA[So, this happened.]]></description><link>https://www.sripati.info/p/spoke-at-cpe-session-isaca-muscat-chapter</link><guid isPermaLink="false">https://www.sripati.info/p/spoke-at-cpe-session-isaca-muscat-chapter</guid><dc:creator><![CDATA[Sripati MS]]></dc:creator><pubDate>Tue, 15 Apr 2025 00:15:44 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/bb895e23-7cd0-477b-b3f2-0e24ae89c0fb_2000x1333.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jbPK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdfdef3fa-55c8-4359-a6ff-222602b4f4bc_2000x1333.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jbPK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdfdef3fa-55c8-4359-a6ff-222602b4f4bc_2000x1333.jpeg 424w, https://substackcdn.com/image/fetch/$s_!jbPK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdfdef3fa-55c8-4359-a6ff-222602b4f4bc_2000x1333.jpeg 848w, https://substackcdn.com/image/fetch/$s_!jbPK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdfdef3fa-55c8-4359-a6ff-222602b4f4bc_2000x1333.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!jbPK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdfdef3fa-55c8-4359-a6ff-222602b4f4bc_2000x1333.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jbPK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdfdef3fa-55c8-4359-a6ff-222602b4f4bc_2000x1333.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dfdef3fa-55c8-4359-a6ff-222602b4f4bc_2000x1333.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:728,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Spoke at CPE session, ISACA Muscat Chapter&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Spoke at CPE session, ISACA Muscat Chapter" title="Spoke at CPE session, ISACA Muscat Chapter" srcset="https://substackcdn.com/image/fetch/$s_!jbPK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdfdef3fa-55c8-4359-a6ff-222602b4f4bc_2000x1333.jpeg 424w, https://substackcdn.com/image/fetch/$s_!jbPK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdfdef3fa-55c8-4359-a6ff-222602b4f4bc_2000x1333.jpeg 848w, https://substackcdn.com/image/fetch/$s_!jbPK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdfdef3fa-55c8-4359-a6ff-222602b4f4bc_2000x1333.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!jbPK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdfdef3fa-55c8-4359-a6ff-222602b4f4bc_2000x1333.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>So, this happened.</p><p>I spoke at a CPE (Continuous Professional Education) session on WAF (Web Application Firewall), its working, and some considerations around its audit and risk assessment (in other words, what to consider if you are to audit or assess risks around WAF).</p><p>Here's the PDF of the session. Credit to the original authors for the images used.</p><p>https://sripati.gumroad.com/l/qgblzj</p><h2>Sign up for Risky Context</h2><p>I write at the intersection of pentest, auditing, risk management and career advice. I add context to the infosec risk. I help answer the question 'where is the risk?'</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.sripati.info/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.sripati.info/subscribe?"><span>Subscribe</span></a></p><p>No spam. Unsubscribe anytime. Musings based on real experiences, not theory. All Infosec, mashed up.</p><p>At the intersection of pentest, auditing, risk management and career advice. Musings based on real experiences, not theory. All infosec, mashed up.</p>]]></content:encoded></item><item><title><![CDATA[Risky Context, W3]]></title><description><![CDATA[Welcome everyone, to another edition of 'Risky Context'.]]></description><link>https://www.sripati.info/p/risky-context-w4</link><guid isPermaLink="false">https://www.sripati.info/p/risky-context-w4</guid><dc:creator><![CDATA[Sripati MS]]></dc:creator><pubDate>Sun, 16 Mar 2025 07:20:36 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/8312cd46-c4f9-49db-888e-413377ae84f6_2000x2000.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kYiG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f5961e6-afe8-4d2f-8aae-e23164b49ba5_2000x2000.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kYiG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f5961e6-afe8-4d2f-8aae-e23164b49ba5_2000x2000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!kYiG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f5961e6-afe8-4d2f-8aae-e23164b49ba5_2000x2000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!kYiG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f5961e6-afe8-4d2f-8aae-e23164b49ba5_2000x2000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!kYiG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f5961e6-afe8-4d2f-8aae-e23164b49ba5_2000x2000.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kYiG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f5961e6-afe8-4d2f-8aae-e23164b49ba5_2000x2000.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7f5961e6-afe8-4d2f-8aae-e23164b49ba5_2000x2000.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:728,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Risky Context, W4&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Risky Context, W4" title="Risky Context, W4" srcset="https://substackcdn.com/image/fetch/$s_!kYiG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f5961e6-afe8-4d2f-8aae-e23164b49ba5_2000x2000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!kYiG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f5961e6-afe8-4d2f-8aae-e23164b49ba5_2000x2000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!kYiG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f5961e6-afe8-4d2f-8aae-e23164b49ba5_2000x2000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!kYiG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f5961e6-afe8-4d2f-8aae-e23164b49ba5_2000x2000.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>Welcome everyone, to another edition of 'Risky Context'. This is the weekly dose for pentesters, auditors, and risk assessors in the world of security. Don't forget to subscribe and share this newsletter.</p><h3><strong>Incidents/ </strong>Write-ups</h3><ol><li><p>James Berthoty has collated details on the tj-actions/changed-files supply chain attack and put them in a structured manner. Brings home the point to pay/ donate for open source if you use them. The repo in question was maintained by one person who's received only few donations. This, considering the fact that the action was used by over 23,000 repositories. This is not sustainable. <a href="https://pulse.latio.tech/p/understanding-and-re-creating-the?ref=sripati.info">Read the blog</a> for more details. <a href="https://www.stepsecurity.io/blog/harden-runner-detection-tj-actions-changed-files-action-is-compromised?ref=sripati.info">StepSecurity also wrote about it</a>and made their <a href="https://github.com/step-security/changed-files?ref=sripati.info">github action</a> free for all. However, the original github action is free of the malware as well. In addition, Swastik Mukherjee has written succinct notes about the compromised GitHub Action as a <a href="https://www.linkedin.com/feed/update/urn:li:activity:7306611902481059840?ref=sripati.info">LinkedIn post</a>.</p></li><li><p>Notes on ByBit cryptocurrency heist</p><ol><li><p>By Vaughan Shanks in his <a href="https://www.linkedin.com/posts/vaughan-shanks_dprk-bybit-cryptocurrency-activity-7305321370622509056--Eur?ref=sripati.info">LinkedIn post</a>. He has listed various sources for his notes, including Mandiant report, in-depth analysis by NCC group. Good read.</p></li><li><p>By Gal Nagli (Wiz staff, also happens to be a world class bug bounty hunter), as a <a href="https://www.linkedin.com/feed/update/urn:li:activity:7306719914562600960/?ref=sripati.info">LinkedIn post</a>. He refers to a <a href="https://www.wiz.io/blog/github-action-tj-actions-changed-files-supply-chain-attack-cve-2025-30066?ref=sripati.info">blog post</a>, that he has written along with few other contributors. Worth a read.</p></li></ol></li><li><p>Renee Bos writes about a case of 'Shadow AI', on <a href="https://www.linkedin.com/feed/update/urn:li:activity:7304034449766154240?ref=sripati.info">LinkedIn</a>. A Disney employee who downloads an AI tool from GitHub, giving cyber-criminals access to his password manager. More info - <a href="https://www.wsj.com/podcasts/tech-news-briefing/a-disney-worker-an-ai-tool-and-the-hack-that-ruined-his-life/b92d06e2-01e7-492e-a44b-90b64c375f7c?ref=sripati.info">WSJ Tech Briefing Podcast episode</a>, <a href="https://futurism.com/the-byte/life-destroyed-ai?ref=sripati.info">Futurism post</a></p></li></ol><h3><strong>On AI</strong></h3><ol><li><p>Linas Beliunas writes about zippy, the robotic chef, who is trained to cook Michelin-quality dishes. Best part, it costs USD 12/hr. <a href="https://www.linkedin.com/posts/linasbeliunas_this-ai-team-taught-a-robot-to-cook-michelin-quality-activity-7306771350067552256-82BU?ref=sripati.info">His LinkedIn post</a></p></li><li><p>Novo Nordisk apparently has started using AI to draft clinical study reports. <a href="https://www.theinformation.com/articles/ozempic-maker-says-ai-is-finally-reliable-enough-to-produce-sensitive-documents?ref=sripati.info">Paywalled article here</a>.</p></li><li><p>Bureaucrats have also <a href="https://www.newscientist.com/article/2472068-revealed-how-the-uk-tech-secretary-uses-chatgpt-for-policy-advice/?ref=sripati.info">started using AI</a>. Seems a natural order of things, considering boss' order to use AI more to increase efficiency. Now that AI generates, consults, and advise for policies, what's next - state sponsored AI poisoning?</p></li><li><p>Roberto Rodriguez, in his <a href="https://blog.openthreatresearch.com/floki-building-an-ai-agentic-workflow-engine-dapr/?ref=sripati.info">blog-post</a>, shares his journey of building an AI agentic workflow engine with open source framework, Dapr.</p></li><li><p>Anthropic CEO talks about AI and its future on an episode of Hard Fork. <a href="https://www.youtube.com/watch?v=YhGUSIvsn_Y&amp;ref=sripati.info">Worth listening</a>.</p></li><li><p>Christian Zot has generated a 50-point checklist to test nginx, using AI. While some items are applicable for almost all web servers, many points are specific to nginx. <a href="https://cristivlad.substack.com/p/nginx-pentesting-checklist?ref=sripati.info">Have a read</a>.</p></li></ol><h3><strong>Thought provoking </strong>posts</h3><ol><li><p>Arstechnica <a href="https://arstechnica.com/gadgets/2025/03/everything-you-say-to-your-echo-will-be-sent-to-amazon-starting-on-march-28/?ref=sripati.info">reports</a> that from March 28, 2025, everything you say to Amazon echo devices will be sent to Amazon. Kathy Reid, says, in <a href="https://www.linkedin.com/feed/update/urn:li:activity:7306435549932789763?ref=sripati.info">her LinkedIn post</a></p></li></ol><blockquote><p>This means everything you say in your home - your domestic environment - is sent to a corporate whose goal is to generate revenue from that speech data.</p></blockquote><ol start="2"><li><p>James Berthoty writes a <a href="https://pulse.latio.tech/p/the-great-cnapp-re-bundle?ref=sripati.info">great post on his blog</a> about how firewall vendors like CheckPoint and PaloAlto have stopped fighting for their share of CNAPP pie and have moved on to AI. worth reading.</p></li><li><p>Sygnia has published their <a href="https://www.sygnia.co/blog/sygnia-2025-field-report-identity-based-attacks/?ref=sripati.info">field report for 2025</a>, based on their incident response investigations throughout 2024. Worth a read.</p></li><li><p><a href="https://www.linkedin.com/in/sandeepwawdane/?ref=sripati.info">Sandeep Wawdane</a>has written <a href="https://thecybersandeep.medium.com/understanding-and-exploiting-nfc-intents-in-android-applications-84c6f95d12e3?ref=sripati.info">a blog post</a>, highlighting NFC intent vulnerabilities in android apps. He has also built an app to help test these issues firsthand.</p></li></ol><h3><strong>To</strong>ols</h3><ol><li><p>Formatify - a BurpSuite request converter extension, <a href="https://www.linkedin.com/feed/update/urn:li:activity:7305800486186639361?ref=sripati.info">created by Siddharth Joshi</a>. Instantly converts HTTP requests into multiple formats like cURL, python, powershell, and more. <a href="https://github.com/dr34mhacks/formatify?ref=sripati.info">Get it here</a>.</p></li><li><p>ExportHunter - Created by <a href="https://www.linkedin.com/in/bhargav-gajera?ref=sripati.info">Bhargav Gajera</a> for testing exported android activities. One can generate and launch APK to call activities with bundles, without using ADB or Android Studio. Saves ton of time. <a href="https://www.linkedin.com/posts/bhargav-gajera_android-cybersecurity-activity-7306890300084424704-ORlf?ref=sripati.info">His LinkedIn post</a>, <a href="https://github.com/Kaaal-El/ExportHunter?ref=sripati.info">tool link</a>.</p></li><li><p>Matt Adams, creator of StrideGPT, released an LLM threat modeling benchmark, <a href="https://www.tmbench.com/?ref=sripati.info">TMBench</a>. Here's what he has to say about it (excerpts from 'about' page of the benchmark)</p><ol><li><p>...My mission with TM-Bench is to provide an open, transparent benchmark for evaluating and improving LLM-based threat modeling capabilities. I believe that rigorous evaluation is essential for responsible AI deployment in security contexts...</p></li><li><p>...TM-Bench is the first benchmark in the world to evaluate the capability of Large Language Models for threat modeling. While other benchmarks exist for general AI capabilities or even some security tasks, TM-Bench is uniquely focused on the complex task of identifying security threats in system designs...</p></li></ol></li><li><p>Hashcat is an excellent tool for cracking hashed passwords. However, I haven't met anyone who remembers hash numbers for all hash types. <a href="https://jonathanh.co.uk/blog/?ref=sripati.info">Jonathan Hodgson</a> has written a blog post on how he used FZF (a fuzzy finder for command line) along with awk and sed to create a shortcut (work on bash and zsh) that simply works. Head over to <a href="https://jonathanh.co.uk/blog/fuzzy-search-hashcat-modes/?ref=sripati.info">the excellent piece</a>.</p></li></ol><h2>Sign up for Risky Context</h2><p>I write at the intersection of pentest, auditing, risk management and career advice. I add context to the infosec risk. I help answer the question 'where is the risk?'</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.sripati.info/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.sripati.info/subscribe?"><span>Subscribe</span></a></p><p>No spam. Unsubscribe anytime. Musings based on real experiences, not theory. All Infosec, mashed up.</p><p>At the intersection of pentest, auditing, risk management and career advice. Musings based on real experiences, not theory. All infosec, mashed up.</p>]]></content:encoded></item><item><title><![CDATA[Risky Context W2: Key Themes and Insights on Cybersecurity Careers]]></title><description><![CDATA[This edition summarises a series of articles from my blog "Risky Context" on various aspects of cybersecurity careers.]]></description><link>https://www.sripati.info/p/risky-context-w2-key-themes-and-insights</link><guid isPermaLink="false">https://www.sripati.info/p/risky-context-w2-key-themes-and-insights</guid><dc:creator><![CDATA[Sripati MS]]></dc:creator><pubDate>Mon, 14 Oct 2024 01:23:23 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/061361a7-f0fb-44a8-85f1-3df0ad758c60_1280x720.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Here I am, again, with my selected articles, in the form of a newsletter. While this will be a weekly newsletter, all of my articles are available on my website (https://sripati.info). Subscribers on my website will get my articles immediately, as I publish them.</p><p>I am a top-down guy. I made lot of mistakes. I learnt from my mistakes, my website and this newsletter is a reflection of them.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.sripati.info/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Risky Context! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>I hope you like it. Not my mistakes, but the learnings.</p><p>This edition summarises a series of articles from my blog "Risky Context" on various aspects of cybersecurity careers.</p><p>Enjoy.</p><div><hr></div><p><strong>Offense vs. Defense (<a href="https://sripati.info/offense-is-not-sexiest-defense-is/">https://sripati.info/offense-is-not-sexiest-defense-is/</a>):</strong></p><ol><li><p><strong>Glamour doesn't equal value:</strong> While offensive security roles like penetration testing or bug bounty hunting often hold a "glamour quotient," defensive security is equally crucial.</p></li><li><p><strong>Leveraging existing skills:</strong> System and network administrators transitioning to cybersecurity can leverage their expertise effectively in defensive roles like threat hunting or SOC analysis.</p></li><li><p><strong>Understanding "why cybersecurity?":</strong> Choosing a career path (offense or defense) should be driven by genuine interest and a clear understanding of "why cybersecurity," ensuring long-term motivation and success.</p></li></ol><p><strong>Top-down vs. Bottoms-up Thinkers (<a href="https://sripati.info/it-matters-in-cybersecurity-if-you-are-a-top-down-or-bottoms-up-person/">https://sripati.info/it-matters-in-cybersecurity-if-you-are-a-top-down-or-bottoms-up-person/</a>):</strong></p><ol><li><p><strong>Different approaches to learning and problem-solving:</strong> Cybersecurity professionals can be categorised as top-down (systems-level thinkers) or bottom-up (preferring hands-on learning) learners.</p></li><li><p><strong>Career paths aligned with thinking style:</strong> Recognizing your thinking style is crucial for choosing a fulfilling career path. Top-down thinkers thrive in roles like auditors, risk assessors, and architects, while bottom-up thinkers excel as security testers, programmers, and bug bounty hunters.</p></li><li><p><strong>Bridging the gap:</strong> While individuals naturally gravitate towards one style, it's possible to develop skills in the other, albeit with additional effort and time. A penetration tester moving to an auditing role will need to learn risk assessment and reporting, while an auditor transitioning to penetration testing will need to acquire technical skills and methodologies.</p></li></ol><p><strong>Cybersecurity Job Descriptions and Expectations:</strong></p><p><a href="https://sripati.info/on-cocktail-jds-in-infosec-and-why-they-will-keep-coming/">https://sripati.info/on-cocktail-jds-in-infosec-and-why-they-will-keep-coming/</a></p><ol><li><p><strong>Cocktail JDs:</strong> The cybersecurity industry is characterized by "cocktail JDs" that combine diverse skill requirements due to security being a cost center and companies seeking to maximize ROI on their hires.</p></li><li><p><strong>Bridging the gap between GRC and technical skills:</strong> While GRC professionals focus on strategic and governance aspects, having hands-on technical experience enhances their effectiveness. Understanding tools and processes allows for better documentation, risk identification, and audit performance.</p></li></ol><p><a href="https://sripati.info/please-don-t-kill-your-ciso-if-he-doesn-t-know-how-a-virus-works/">https://sripati.info/please-don-t-kill-your-ciso-if-he-doesn-t-know-how-a-virus-works/</a></p><ol><li><p><strong>The evolving CISO role:</strong> The CISO role demands a balance of management and technical expertise. While deep technical knowledge like understanding how a virus works might not be necessary, understanding the team's technical explanations is crucial for effective decision-making.</p></li><li><p><strong>Certifications as enablers, not guarantees:</strong> Certifications like CISA and CISM provide valuable knowledge but don't automatically translate to competency. Continuous learning, practical experience, and the ability to apply knowledge are essential.</p></li></ol><p><strong>The Realities of a Cybersecurity Career:</strong></p><p><a href="https://sripati.info/risks-of-a-cybersecurity-career/">https://sripati.info/risks-of-a-cybersecurity-career/</a></p><ol><li><p><strong>Burnout risk:</strong> The dynamic and demanding nature of cybersecurity makes burnout a real risk. Juggling multiple tasks and constant learning can take a toll on mental and physical health.</p></li><li><p><strong>Importance of "why cybersecurity?":</strong> Having a strong "why" is essential for navigating challenges and staying motivated. Understanding your motivations helps you persevere through difficult phases and achieve success.</p></li><li><p><strong>A day in a pen-tester's life:</strong> Beyond the technical aspects of penetration testing, the role involves significant planning, coordination, reporting, and client communication. <a href="https://sripati.info/a-day-in-a-pen-tester-s-life/">https://sripati.info/a-day-in-a-pen-tester-s-life/</a></p></li><li><p><strong>Security as a cost centre:</strong> Recognising that security is often viewed as a cost centre (except in companies providing security services) helps professionals navigate organisational dynamics and advocate for resources effectively. <a href="https://sripati.info/security-is-a-cost-centre/">https://sripati.info/security-is-a-cost-centre/</a></p></li></ol><p><strong>Key Quotes:</strong></p><ol><li><p>"While offense is glamorous, defense is better." ("Offense is not the sexiest game in town, defense is...")</p></li><li><p>"Knowing your thinking and learning process (top-down or bottoms-up) is crucial in general, but it takes center-stage when you mull over a career switch." ("Are you a top-down or bottoms-up person? It will matter while switching career in cybersecurity")</p></li><li><p>"What is invisible (individual needs, desires, and greed) will always drive what is visible (JDs, compensation, market preferences in infosec hiring and purchases, etc.)." ("On cocktail JDs in infosec and why they will keep coming...")</p></li><li><p>"Burn-out is real, more so in cybersecurity." ("Risks of a cybersecurity career")</p></li><li><p>"That &#8220;why&#8221; will be the only thing that could guide you from darkness to light, from &#8220;being naked&#8221; to &#8220;running naked with eureka&#8221;." ("Risks of a cybersecurity career").</p></li></ol><div><hr></div><p>So that's all for this week. See you next week, with some more articles. Please consider subscribing to this newsletter. Being member on my website will get you these articles as soon as I publish them.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.sripati.info/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Risky Context! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Risky Context W1]]></title><description><![CDATA[Unspoken aspects of a career in Penetration Testing]]></description><link>https://www.sripati.info/p/risky-context-w1</link><guid isPermaLink="false">https://www.sripati.info/p/risky-context-w1</guid><dc:creator><![CDATA[Sripati MS]]></dc:creator><pubDate>Sun, 06 Oct 2024 06:12:43 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/3a251de5-2ae2-4b58-9476-bd7683e1e333_1280x720.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<blockquote><p>So, I bit the bullet. Here I am, with my selected articles, in the form of a newsletter. While this will be a weekly newsletter, all of my articles are available on <a href="https://sripati.info">my website</a>. Subscribers on my website will get my articles immediately, as I publish them.</p><p>I am a <a href="https://sripati.info/it-matters-in-cybersecurity-if-you-are-a-top-down-or-bottoms-up-person/">top-down</a> guy. I made lot of mistakes. I learnt from my mistakes, my website and this newsletter is a reflection of them.</p><p>I hope you like it. Not my mistakes, but the learnings.</p><p>The first edition is about <a href="https://sripati.info/not-every-customer-wants-you-to-become-domain-admin/">things that no course on pen testing will teach</a>. Well, maybe some (like reporting), but not all of them.</p><p>I was fortunate to work with extremely talented penetration testers. Here's what I learnt.</p><div><hr></div><p>Penetration testing will be affected a lot by AI, in coming years. Run of the mill testing will be done by AI, eventually. I am sure it is learning from all those test cases, payloads, and reports that are available publicly.</p><p>The articles in this newsletter emphasise that a successful penetration testing career requires more than just technical prowess. It requires a business-minded approach, strong communication skills, and a willingness to contribute to the broader goals of the organisation.</p><ol><li><p><strong><a href="https://sripati.info/business-will-expect-you-to-support-them-in-non-pen-testing-activities/">Penetration testing is not just about technical skills</a>.</strong> While technical expertise is crucial, it's only one piece of the puzzle. Businesses view penetration testers as part of a larger ecosystem, requiring them to contribute to non-technical aspects like marketing, sales, and project management. Supporting business functions beyond penetration testing is crucial for career growth. By understanding and contributing to other business functions, penetration testers can become more well-rounded professionals, improve their career prospects, and gain a better understanding of the industry as a whole.</p></li><li><p><strong><a href="https://sripati.info/to-business-pen-testers-are-like-jumbo-jets/">Penetration testers are valuable assets but need to be profitable</a>.</strong> Businesses operate on a profit-loss model. Just like jumbo jets are expensive when grounded, penetration testers need to be actively engaged in projects to justify their cost. This means contributing to activities beyond just penetration testing, such as mentoring, writing articles, or developing tools.</p></li><li><p><strong><a href="https://sripati.info/you-are-one-cog-in-the-wheel/">Understanding the bigger picture is essential</a>.</strong> A successful penetration tester needs to understand the business context of their work, including client expectations, regulatory requirements, and the impact of their findings. This includes recognising that <a href="https://sripati.info/there-will-be-customers-who-wouldnt-want-you-to-become-domain-admin/">not all customers prioritise achieving domain admin status</a>, and some may prioritise risk assessment over vulnerability identification.</p></li><li><p><strong><a href="https://sripati.info/there-is-value-in-becoming-a-fully-integrated-tester/">Moving from 'vulnerability' to 'risk'</a>.</strong> Clients are ultimately concerned with the risks associated with vulnerabilities, not just the vulnerabilities themselves. Penetration testers who can effectively assess and communicate risk provide more value to clients and are more likely to secure repeat business. This involves understanding and contributing to all stages of a security assessment project, from marketing and sales to reporting and project closure. This holistic approach leads to a more nuanced and effective service delivery.</p></li></ol><div><hr></div><p>So that's all for this week. See you next week, with some more articles. Please consider subscribing to this newsletter. Being member on my website will get you these articles as soon as I publish them.</p></blockquote><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.sripati.info/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Risky Context! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[There is value in becoming a fully-integrated tester…]]></title><description><![CDATA[What&#8217;s integration?]]></description><link>https://www.sripati.info/p/there-is-value-in-becoming-a-fully-integrated-tester</link><guid isPermaLink="false">https://www.sripati.info/p/there-is-value-in-becoming-a-fully-integrated-tester</guid><dc:creator><![CDATA[Sripati MS]]></dc:creator><pubDate>Wed, 17 Jul 2024 20:40:20 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/6cc3aeef-6829-4905-a806-c44c2c30a1b0_2000x2667.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jpuW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae7adfae-9d1a-4839-adc6-ef99c7caf874_2000x2667.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jpuW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae7adfae-9d1a-4839-adc6-ef99c7caf874_2000x2667.jpeg 424w, https://substackcdn.com/image/fetch/$s_!jpuW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae7adfae-9d1a-4839-adc6-ef99c7caf874_2000x2667.jpeg 848w, https://substackcdn.com/image/fetch/$s_!jpuW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae7adfae-9d1a-4839-adc6-ef99c7caf874_2000x2667.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!jpuW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae7adfae-9d1a-4839-adc6-ef99c7caf874_2000x2667.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jpuW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae7adfae-9d1a-4839-adc6-ef99c7caf874_2000x2667.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ae7adfae-9d1a-4839-adc6-ef99c7caf874_2000x2667.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;There is value in becoming a fully-integrated tester&#8230;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="There is value in becoming a fully-integrated tester&#8230;" title="There is value in becoming a fully-integrated tester&#8230;" srcset="https://substackcdn.com/image/fetch/$s_!jpuW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae7adfae-9d1a-4839-adc6-ef99c7caf874_2000x2667.jpeg 424w, https://substackcdn.com/image/fetch/$s_!jpuW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae7adfae-9d1a-4839-adc6-ef99c7caf874_2000x2667.jpeg 848w, https://substackcdn.com/image/fetch/$s_!jpuW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae7adfae-9d1a-4839-adc6-ef99c7caf874_2000x2667.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!jpuW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae7adfae-9d1a-4839-adc6-ef99c7caf874_2000x2667.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><p>What&#8217;s integration? Here&#8217;s one (very rough, high level and extremely simplified) example from FMCG (Fast Moving Consumer Goods) industry.</p><blockquote><p>Every finished product is dependent on some raw materials. Raw materials are bought (from other suppliers), processed, packaged as a product, and then sold.</p></blockquote><blockquote><p>When a business (that, till now, had focused on just selling the product) starts producing the raw materials required for the product, you can say that it is integrated.</p></blockquote><p>Now onto testing (security assessment).</p><p>Here are the various activities that happen before (assessment): -</p><ol><li><p>marketing assessment services</p></li><li><p>meeting potential customers, pitching assessment services</p></li><li><p>preparing and submitting proposals (to potential customers who ask for one)</p></li><li><p>plan for the assessment (scope, number of resources, who will do what, etc.)</p></li><li><p>execute the assessment</p></li><li><p>write the report</p></li><li><p>present the report, highlight major risks to customer infra, app, and data; answer any questions that the customer may have, defend your finding</p></li><li><p>project closure steps (store all assessment data into a secure location, remove customer information, add test cases to your repository, plan for a blog post on company portal, etc.).</p></li></ol><p>Have you noticed (if you are still with me, that is) that assessment is only 1 among many activities done for a successful project?</p><p>Here&#8217;s another breakdown of the assessment activity.</p><ol><li><p>identify vulnerabilities</p></li><li><p>prepare exploit(s)</p></li><li><p>exploit</p></li><li><p>assess the risk (what&#8217;s the impact when the vulnerability is exploited in the current environment, not just any environment).</p></li><li><p>document the risk appropriately.</p></li></ol><p>What does it mean? Customers don&#8217;t pay to know about vulnerabilities that lurk in their infrastructure or app. They want to know about the risk that is inherent in their infrastructure or app.</p><p>Most of testers don&#8217;t want to assess risk. Reasons range from 'don&#8217;t know how to do so' to 'expectations must align with payment'.&nbsp;</p><p>There is huge value in knowing how to do all activities.&nbsp;</p><ol><li><p>It makes you more aware about how each step affects those before and after it, which will bring more nuance to your delivery, and</p></li><li><p>The skill will affect the outcome (from &#8216;vulnerability&#8217; to &#8216;risk&#8217;). Discussion on &#8216;vulnerability&#8217; needs lots of explanation to management. In contrast, management understand &#8216;risk&#8217; (hint: risk management is what business is all about).</p></li><li><p>Eventually, all this results in a satisfied customer, which usually results in more money, down the line.</p></li></ol><p>Happy customer, repeat customer, more business, good referral, etc.</p><blockquote><p>Strive to be a fully-integrated security assessor, not just a tester.</p></blockquote><h2>Sign up for Risky Context</h2><p>I write at the intersection of pentest, auditing, risk management and career advice. I add context to the infosec risk. I help answer the question 'where is the risk?'</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.sripati.info/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.sripati.info/subscribe?"><span>Subscribe</span></a></p><p>No spam. Unsubscribe anytime. Musings based on real experiences, not theory. All Infosec, mashed up.</p><p>At the intersection of pentest, auditing, risk management and career advice. Musings based on real experiences, not theory. All infosec, mashed up.</p><p>&#8206;Follow the Risky Context channel on WhatsApp (if WhatsApp is your thing. Your number is not shared with others when you connect to my channel): <a href="https://whatsapp.com/channel/0029VaDqrFU8aKvQohD5nq0r?ref=sripati.info">https://whatsapp.com/channel/0029VaDqrFU8aKvQohD5nq0r</a></p>]]></content:encoded></item><item><title><![CDATA[There will be customers who wouldn’t want you to become domain admin…]]></title><description><![CDATA[Regulation is still the driving force behind the pentesting industry.]]></description><link>https://www.sripati.info/p/there-will-be-customers-who-wouldnt-want-you-to-become-domain-admin</link><guid isPermaLink="false">https://www.sripati.info/p/there-will-be-customers-who-wouldnt-want-you-to-become-domain-admin</guid><dc:creator><![CDATA[Sripati MS]]></dc:creator><pubDate>Wed, 17 Jul 2024 14:40:47 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/366faa3a-5cc5-4f0a-88be-35f050e35c32_2000x1333.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<ol><li><p>Regulation is still the driving force behind the pentesting industry. For some customers, it is a hygiene thing. For most of them, though, it is a checkbox that must be ticked (we get our environment tested every quarter, no vulnerabilities, we are secure, etc). They won&#8217;t be happy when you become domain admin. No happy customer, no repeat business, no job!</p></li><li><p>Then there are customers who would ask - &#8220;that&#8217;s ok. Tell me what is the impact? Why should I worry about you becoming domain admin? I have SOC, EDR, XDR, yeh-DR, wo-DR&#8230;&#8221;. Before you hit the snooze button, remember this customer. This customer will challenge you. And this challenge is different from the technical duels that you have with your buddies over lunch. &#8216;Agree to dis-agree&#8217; won&#8217;t help here. Your attack narrative must have post-exploitation scenarios (leadership email compromise, setting up backdoor AD or VPN account, disabling 2FA on attacker VPN profile, whitelisting Google Drive on DLP to exfiltrate KYC data, etc.).</p></li><li><p>Then there are security teams who would get hurt if you become domain admin, because they get to answer the question - how come we get hacked with all these fancy tools supposedly protecting us? Who likes visiting principal&#8217;s office, ever?</p></li></ol><blockquote><p>You need to get customer requirements clear. Are they &#8216;ok&#8217; if you become a domain admin?</p></blockquote><h2>Sign up for Risky Context</h2><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ybuu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1221ab6-569e-4676-bf25-b04f59f4c17d_2000x1333.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ybuu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1221ab6-569e-4676-bf25-b04f59f4c17d_2000x1333.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Ybuu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1221ab6-569e-4676-bf25-b04f59f4c17d_2000x1333.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Ybuu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1221ab6-569e-4676-bf25-b04f59f4c17d_2000x1333.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Ybuu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1221ab6-569e-4676-bf25-b04f59f4c17d_2000x1333.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ybuu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1221ab6-569e-4676-bf25-b04f59f4c17d_2000x1333.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e1221ab6-569e-4676-bf25-b04f59f4c17d_2000x1333.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;There will be customers who wouldn&#8217;t want you to become domain admin&#8230;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="There will be customers who wouldn&#8217;t want you to become domain admin&#8230;" title="There will be customers who wouldn&#8217;t want you to become domain admin&#8230;" srcset="https://substackcdn.com/image/fetch/$s_!Ybuu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1221ab6-569e-4676-bf25-b04f59f4c17d_2000x1333.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Ybuu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1221ab6-569e-4676-bf25-b04f59f4c17d_2000x1333.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Ybuu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1221ab6-569e-4676-bf25-b04f59f4c17d_2000x1333.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Ybuu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1221ab6-569e-4676-bf25-b04f59f4c17d_2000x1333.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><p>I write at the intersection of pentest, auditing, risk management and career advice. I add context to the infosec risk. I help answer the question 'where is the risk?'</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.sripati.info/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.sripati.info/subscribe?"><span>Subscribe</span></a></p><p>No spam. Unsubscribe anytime. Musings based on real experiences, not theory. All Infosec, mashed up.</p><p>At the intersection of pentest, auditing, risk management and career advice. Musings based on real experiences, not theory. All infosec, mashed up.</p><p>&#8206;Follow the Risky Context channel on WhatsApp (if WhatsApp is your thing. Your number is not shared with others when you connect to my channel): <a href="https://whatsapp.com/channel/0029VaDqrFU8aKvQohD5nq0r?ref=sripati.info">https://whatsapp.com/channel/0029VaDqrFU8aKvQohD5nq0r</a></p>]]></content:encoded></item><item><title><![CDATA[Business will expect you to support them in non-pentesting activities...]]></title><description><![CDATA[This is part of a series of posts, first one here.]]></description><link>https://www.sripati.info/p/business-will-expect-you-to-support-them-in-non-pen-testing-activities</link><guid isPermaLink="false">https://www.sripati.info/p/business-will-expect-you-to-support-them-in-non-pen-testing-activities</guid><dc:creator><![CDATA[Sripati MS]]></dc:creator><pubDate>Tue, 09 Apr 2024 02:18:23 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/fb5d89c5-9775-4df4-87c1-72ebabb0c70d_2000x2214.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IXT0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffce8a3b5-e9ef-433d-877e-aa3d170383ff_2000x2214.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IXT0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffce8a3b5-e9ef-433d-877e-aa3d170383ff_2000x2214.jpeg 424w, https://substackcdn.com/image/fetch/$s_!IXT0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffce8a3b5-e9ef-433d-877e-aa3d170383ff_2000x2214.jpeg 848w, https://substackcdn.com/image/fetch/$s_!IXT0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffce8a3b5-e9ef-433d-877e-aa3d170383ff_2000x2214.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!IXT0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffce8a3b5-e9ef-433d-877e-aa3d170383ff_2000x2214.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IXT0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffce8a3b5-e9ef-433d-877e-aa3d170383ff_2000x2214.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fce8a3b5-e9ef-433d-877e-aa3d170383ff_2000x2214.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Business will expect you to support them in non-pentesting activities...&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Business will expect you to support them in non-pentesting activities..." title="Business will expect you to support them in non-pentesting activities..." srcset="https://substackcdn.com/image/fetch/$s_!IXT0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffce8a3b5-e9ef-433d-877e-aa3d170383ff_2000x2214.jpeg 424w, https://substackcdn.com/image/fetch/$s_!IXT0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffce8a3b5-e9ef-433d-877e-aa3d170383ff_2000x2214.jpeg 848w, https://substackcdn.com/image/fetch/$s_!IXT0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffce8a3b5-e9ef-433d-877e-aa3d170383ff_2000x2214.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!IXT0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffce8a3b5-e9ef-433d-877e-aa3d170383ff_2000x2214.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><p>This is part of a series of posts, <a href="https://sripati.info/not-every-customer-wants-you-to-become-domain-admin/">first one here</a>.</p><p>As mentioned in <a href="https://sripati.info/you-are-one-cog-in-the-wheel/">one of my previous posts</a>, a pentester is a critical, but one of the many, part in the overall business.</p><p>It also means that all those business parts (recruiter, marketing, sales, pre-sales, project management, project lead, etc.) always need some inputs from pentester. Those inputs not only make their lives easier, but also helps them perform better. And, they appreciate your contribution which helps you during &#8216;appraisal time&#8217;. Everyone wins.</p><p>If you, as a pentester, support them, it will help you in your career (not just in one-off appraisal).</p><p>Let&#8217;s examine how.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CeOB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53079532-0ba6-477b-b8bf-679fe289bf3e_565x585.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CeOB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53079532-0ba6-477b-b8bf-679fe289bf3e_565x585.png 424w, https://substackcdn.com/image/fetch/$s_!CeOB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53079532-0ba6-477b-b8bf-679fe289bf3e_565x585.png 848w, https://substackcdn.com/image/fetch/$s_!CeOB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53079532-0ba6-477b-b8bf-679fe289bf3e_565x585.png 1272w, https://substackcdn.com/image/fetch/$s_!CeOB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53079532-0ba6-477b-b8bf-679fe289bf3e_565x585.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CeOB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53079532-0ba6-477b-b8bf-679fe289bf3e_565x585.png" width="565" height="585" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/53079532-0ba6-477b-b8bf-679fe289bf3e_565x585.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:585,&quot;width&quot;:565,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Business will expect you to support them in non-pentesting activities...&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Business will expect you to support them in non-pentesting activities..." title="Business will expect you to support them in non-pentesting activities..." srcset="https://substackcdn.com/image/fetch/$s_!CeOB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53079532-0ba6-477b-b8bf-679fe289bf3e_565x585.png 424w, https://substackcdn.com/image/fetch/$s_!CeOB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53079532-0ba6-477b-b8bf-679fe289bf3e_565x585.png 848w, https://substackcdn.com/image/fetch/$s_!CeOB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53079532-0ba6-477b-b8bf-679fe289bf3e_565x585.png 1272w, https://substackcdn.com/image/fetch/$s_!CeOB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53079532-0ba6-477b-b8bf-679fe289bf3e_565x585.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Contributing to other allied functions within will help you grow into a better team player, who understands what everyone brings to the table, and can contribute to it as well.</p><p>Makes you a juicier candidate (than others), in the job and while looking for the job.</p><h2>Sign up for Risky Context</h2><p>I write at the intersection of pentest, auditing, risk management and career advice. I add context to the infosec risk. I help answer the question 'where is the risk?'</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.sripati.info/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.sripati.info/subscribe?"><span>Subscribe</span></a></p><p>No spam. Unsubscribe anytime. Musings based on real experiences, not theory. All Infosec, mashed up.</p><p>At the intersection of pentest, auditing, risk management and career advice. Musings based on real experiences, not theory. All infosec, mashed up.</p><p>&#8206;Follow the Risky Context channel on WhatsApp (if WhatsApp is your thing. Your number is not shared with others when you connect to my channel): <a href="https://whatsapp.com/channel/0029VaDqrFU8aKvQohD5nq0r?ref=sripati.info">https://whatsapp.com/channel/0029VaDqrFU8aKvQohD5nq0r</a></p>]]></content:encoded></item><item><title><![CDATA[To business, pen-testers are like jumbo-jets...]]></title><description><![CDATA[...profitable only when on-air, expensive when in hanger.]]></description><link>https://www.sripati.info/p/to-business-pen-testers-are-like-jumbo-jets</link><guid isPermaLink="false">https://www.sripati.info/p/to-business-pen-testers-are-like-jumbo-jets</guid><dc:creator><![CDATA[Sripati MS]]></dc:creator><pubDate>Sun, 31 Mar 2024 12:31:27 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/61684e8a-88ec-46c3-9460-5a577f1e563a_2000x1500.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!R2VH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40326802-0c96-4040-9a3f-ad0c297fce91_2000x1500.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!R2VH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40326802-0c96-4040-9a3f-ad0c297fce91_2000x1500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!R2VH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40326802-0c96-4040-9a3f-ad0c297fce91_2000x1500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!R2VH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40326802-0c96-4040-9a3f-ad0c297fce91_2000x1500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!R2VH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40326802-0c96-4040-9a3f-ad0c297fce91_2000x1500.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!R2VH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40326802-0c96-4040-9a3f-ad0c297fce91_2000x1500.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/40326802-0c96-4040-9a3f-ad0c297fce91_2000x1500.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;To business, pen-testers are like jumbo-jets...&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="To business, pen-testers are like jumbo-jets..." title="To business, pen-testers are like jumbo-jets..." srcset="https://substackcdn.com/image/fetch/$s_!R2VH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40326802-0c96-4040-9a3f-ad0c297fce91_2000x1500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!R2VH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40326802-0c96-4040-9a3f-ad0c297fce91_2000x1500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!R2VH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40326802-0c96-4040-9a3f-ad0c297fce91_2000x1500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!R2VH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40326802-0c96-4040-9a3f-ad0c297fce91_2000x1500.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><p>...profitable only when on-air, expensive when in hanger.</p><p>This is part of a series of posts, <a href="https://sripati.info/not-every-customer-wants-you-to-become-domain-admin/">first one here</a>.</p><p>Here&#8217;s one way of looking at flow of money in a company (this is a simplified scenario, actual accounting is more complex): -</p><ol><li><p>Company bids for and wins a project.</p></li><li><p>A team is allocated to work on the project.</p></li><li><p>For the entire time that the team is working on the project, their salaries, cost of the tool used, any logistical costs incurred, etc. are earmarked as &#8216;expenses&#8217; towards that project.</p></li><li><p>After the work is done, invoices are raised to the customer.</p></li><li><p>When customer pays against the invoices, company books the payment as &#8216;revenue&#8217;.</p></li></ol><blockquote><p>In a business, every hire has to be useful and contribute to the business in one way or the other.</p></blockquote><p>Pen-testers are useful when they are deployed on a project. That&#8217;s when pen-tester&#8217;s salary is offset against invoices raised on projects (salaries are one of the biggest entries under &#8216;opex&#8217; heading in a balance sheet).</p><p>It is a red flag when you are not involved in any project or not doing any pentesting for your company. Here&#8217;s how it will unfold: -</p><ol><li><p>During business reviews (how much we earned, what are the expenses, whats our profit pre and post EBITDA, etc.), performance of each business unit (BU) is presented.</p></li><li><p>If security assessment BU is not performing, additional questions are asked.</p></li></ol><p>While this happens at top management layer, middle management also has their internal reviews. In these internal reviews, each project is reviewed.</p><ol><li><p>If a project has more resources than planned, it gets questioned.</p></li><li><p>If a project is incurring more cost than planned, it gets scrutinised in detail.</p></li><li><p>If a project has not raised any invoice, since its start, it gets scrutinised.</p></li></ol><p>In a security assessment company, pentesters are among the highest-paid techies apart from the business executives, of course.</p><blockquote><p>The closer you are to business, higher will be the payout.</p></blockquote><p><em>When the company performs, you will be praised for your contributions. When company doesn&#8217;t perform well, every one&#8217;s contributions will be reviewed and re-aligned.</em></p><p>So, ensure that you are always involved and contribute to the business. You can do so by,</p><ol><li><p>pentesting for a customer,</p></li><li><p>preparing reports for more than one pentest,</p></li><li><p>mentoring junior pentesters,&nbsp;</p></li><li><p>writing articles on company blog,&nbsp;</p></li><li><p>submitting cfp for a conference,&nbsp;</p></li><li><p>actually speaking in a conference,&nbsp;</p></li><li><p>working towards releasing a tool that helps company in pentesting project, etc.) that helps your company execute pentest faster and better.</p></li></ol><p>Strive to be useful at all times.&nbsp;</p><p>I believe we all suffer from Parashurama&#8217;s curse to Karna. I believe it is so because we all are slowly turning into Karna (believing we don&#8217;t get our fair share, then lying to get ahead in life, doing all sorts of bad things in name of friendship, etc.). But I digress.</p><blockquote><p>Bottom line - You won&#8217;t remember all your contributions when needed (aka &#8216;appraisal time&#8217;). So, keep a journal of all the times that you proved &#8216;useful&#8217; to your company.</p></blockquote><p>While down-time is required, nothing beats usefulness.&nbsp;</p><h2>Sign up for Risky Context</h2><p>I write at the intersection of pentest, auditing, risk management and career advice. I add context to the infosec risk. I help answer the question 'where is the risk?'</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.sripati.info/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.sripati.info/subscribe?"><span>Subscribe</span></a></p><p>No spam. Unsubscribe anytime. Musings based on real experiences, not theory. All Infosec, mashed up.</p><p>At the intersection of pentest, auditing, risk management and career advice. Musings based on real experiences, not theory. All infosec, mashed up.</p><p>&#8206;Follow the Risky Context channel on WhatsApp (if WhatsApp is your thing. Your number is not shared with others when you connect to my channel): <a href="https://whatsapp.com/channel/0029VaDqrFU8aKvQohD5nq0r?ref=sripati.info">https://whatsapp.com/channel/0029VaDqrFU8aKvQohD5nq0r</a></p>]]></content:encoded></item><item><title><![CDATA[Not every customer wants you to become domain admin...]]></title><description><![CDATA[Penetration testing (and security assessments in general) has evolved a lot in the last decade or so.]]></description><link>https://www.sripati.info/p/not-every-customer-wants-you-to-become-domain-admin</link><guid isPermaLink="false">https://www.sripati.info/p/not-every-customer-wants-you-to-become-domain-admin</guid><dc:creator><![CDATA[Sripati MS]]></dc:creator><pubDate>Thu, 21 Mar 2024 18:02:23 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/277164b3-f2e1-414b-a43d-b34a9c77b541_2000x1125.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IAP4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42271985-d2e0-4aa6-b9e6-46183635b747_2000x1125.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IAP4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42271985-d2e0-4aa6-b9e6-46183635b747_2000x1125.jpeg 424w, https://substackcdn.com/image/fetch/$s_!IAP4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42271985-d2e0-4aa6-b9e6-46183635b747_2000x1125.jpeg 848w, https://substackcdn.com/image/fetch/$s_!IAP4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42271985-d2e0-4aa6-b9e6-46183635b747_2000x1125.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!IAP4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42271985-d2e0-4aa6-b9e6-46183635b747_2000x1125.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IAP4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42271985-d2e0-4aa6-b9e6-46183635b747_2000x1125.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/42271985-d2e0-4aa6-b9e6-46183635b747_2000x1125.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Not every customer wants you to become domain admin...&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Not every customer wants you to become domain admin..." title="Not every customer wants you to become domain admin..." srcset="https://substackcdn.com/image/fetch/$s_!IAP4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42271985-d2e0-4aa6-b9e6-46183635b747_2000x1125.jpeg 424w, https://substackcdn.com/image/fetch/$s_!IAP4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42271985-d2e0-4aa6-b9e6-46183635b747_2000x1125.jpeg 848w, https://substackcdn.com/image/fetch/$s_!IAP4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42271985-d2e0-4aa6-b9e6-46183635b747_2000x1125.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!IAP4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42271985-d2e0-4aa6-b9e6-46183635b747_2000x1125.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><p>Penetration testing (and security assessments in general) has evolved a lot in the last decade or so. At the same time, the underlying expectations of customers and business (that has hired the tester) has changed as well. This has lot of impact on a penetration tester's career.</p><h3>What is this about?</h3><p>This is about the other side of the fence. The non-pen-testing activities in a pen-testing company, why are they required, and where do you (the pen-tester) fit in. I hope that it helps you understand the big-picture (if there is such a picture) better.</p><p>To be fair, I don&#8217;t think I am the only one with these thoughts. Experienced pen-testers may already have seen all of these. However, I also think that lot of other pen-testers and wannabe testers won&#8217;t know about these.</p><p><strong>And, you need to know.</strong></p><p>So, here they are.</p><ol><li><p><a href="https://sripati.info/you-are-one-cog-in-the-wheel/">You are one cog in the wheel</a>.</p></li><li><p><a href="https://sripati.info/to-business-pen-testers-are-like-jumbo-jets/">To business, pen-testers are jumbo jets.</a></p></li><li><p><a href="https://sripati.info/business-will-expect-you-to-support-them-in-non-pen-testing-activities/">Business will expect you to support them in non-pen-testing activities.</a></p></li><li><p><a href="https://sripati.info/there-will-be-customers-who-wouldnt-want-you-to-become-domain-admin/">There will be customers who wouldn&#8217;t want you to become domain admin.</a></p></li><li><p>Reporting and soft skills are under-rated [in penetration tests].</p></li><li><p><a href="https://sripati.info/there-is-value-in-becoming-a-fully-integrated-tester/">There is value in becoming a fully-integrated tester.</a></p></li><li><p>You can pivot to these areas [from pen-testing]</p></li></ol><div><hr></div><h2>Sign up for Risky Context</h2><p>I write at the intersection of pentest, auditing, risk management and career advice. I add context to the infosec risk. I help answer the question 'where is the risk?'</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.sripati.info/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.sripati.info/subscribe?"><span>Subscribe</span></a></p><p>No spam. Unsubscribe anytime. Musings based on real experiences, not theory. All Infosec, mashed up.</p><p>At the intersection of pentest, auditing, risk management and career advice. Musings based on real experiences, not theory. All infosec, mashed up.</p><p>&#8206;Follow the Risky Context channel on WhatsApp (if WhatsApp is your thing. Your number is not shared with others when you connect to my channel): <a href="https://whatsapp.com/channel/0029VaDqrFU8aKvQohD5nq0r?ref=sripati.info">https://whatsapp.com/channel/0029VaDqrFU8aKvQohD5nq0r</a></p>]]></content:encoded></item><item><title><![CDATA[You are one cog in the wheel...]]></title><description><![CDATA[&#8230; a very important one, but few more are needed before a business takes off and money starts rolling in.]]></description><link>https://www.sripati.info/p/you-are-one-cog-in-the-wheel</link><guid isPermaLink="false">https://www.sripati.info/p/you-are-one-cog-in-the-wheel</guid><dc:creator><![CDATA[Sripati MS]]></dc:creator><pubDate>Thu, 21 Mar 2024 17:55:22 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/0c487d8e-dfc7-4460-8d5a-95dffba4b559_2000x1312.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cMxS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3084c04a-6037-4f09-8ad2-178982c017bb_2000x1312.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cMxS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3084c04a-6037-4f09-8ad2-178982c017bb_2000x1312.jpeg 424w, https://substackcdn.com/image/fetch/$s_!cMxS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3084c04a-6037-4f09-8ad2-178982c017bb_2000x1312.jpeg 848w, https://substackcdn.com/image/fetch/$s_!cMxS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3084c04a-6037-4f09-8ad2-178982c017bb_2000x1312.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!cMxS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3084c04a-6037-4f09-8ad2-178982c017bb_2000x1312.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cMxS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3084c04a-6037-4f09-8ad2-178982c017bb_2000x1312.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3084c04a-6037-4f09-8ad2-178982c017bb_2000x1312.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;You are one cog in the wheel...&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="You are one cog in the wheel..." title="You are one cog in the wheel..." srcset="https://substackcdn.com/image/fetch/$s_!cMxS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3084c04a-6037-4f09-8ad2-178982c017bb_2000x1312.jpeg 424w, https://substackcdn.com/image/fetch/$s_!cMxS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3084c04a-6037-4f09-8ad2-178982c017bb_2000x1312.jpeg 848w, https://substackcdn.com/image/fetch/$s_!cMxS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3084c04a-6037-4f09-8ad2-178982c017bb_2000x1312.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!cMxS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3084c04a-6037-4f09-8ad2-178982c017bb_2000x1312.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><p>&#8230; a&nbsp;very important one, but few more are needed before a business takes off and money starts rolling in.</p><p>This is first in the '<a href="https://sripati.info/not-every-customer-wants-you-to-become-domain-admin">things no pen-testing course will teach you</a>' series. Here's the introductory post.</p><p><em>A pen-testing (or security assessment) business needs to make money, like all other businesses. A pen-tester is a very important part of that business, but not the only important part.</em></p><p>The other important parts of business are the following people with the below skills (Simplified for brevity, please don&#8217;t nitpick):-&nbsp;</p><ol><li><p>Ability to convince people to give you a chance</p><ol><li><p>Marketing - Ability to make right noises so that market takes notice of your presence</p></li><li><p>Sales - Ability to meet prospective customers, pitch your services</p></li><li><p>Pre-Sales - Ability to write a kick-ass proposal that sells your services, with enough details to convince a customer to hire your company (pre-sales)</p></li></ol></li><li><p>Project Manager - Ability to plan, schedule, and divide pen-testers for each assessment.</p><ol><li><p>A pen-testing business needs pen-testing projects.</p></li><li><p>With each project, comes need of pen-testers.</p></li><li><p>Multiple projects run in a pen-testing company, at any point in time. Which means,&nbsp;</p></li><li><p>If you don&#8217;t plan the projects properly,&nbsp;</p><ol><li><p>you may not have pen-tester available for upcoming projects,</p></li><li><p>you may put less pen-testers for a project that require more,</p></li><li><p>you may put more pen-testers for a project that doesn&#8217;t need as many,</p></li><li><p>you may not know whether you need to hire more pen-testers or let few go (as you are not getting any more projects).</p></li></ol></li></ol></li><li><p>Project Lead - Ability to create presentations conveying your findings to variety of customers at client business (yes, there are more than one type of customer in each company that you pen-test. More about that later).</p></li><li><p>Finance or Accounting - Ability to measure whether the (pen-testing) business is gaining money, or losing it. Without this ability, you won&#8217;t know whether you are growing, or shrinking.</p></li><li><p>Recruiters - Ability to identify talented pen-testers and to assist in the overall hiring process.</p></li></ol><div><hr></div><h2>Sign up for Risky Context</h2><p>I write at the intersection of pentest, auditing, risk management and career advice. I add context to the infosec risk. I help answer the question 'where is the risk?'</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.sripati.info/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.sripati.info/subscribe?"><span>Subscribe</span></a></p><p>No spam. Unsubscribe anytime. Musings based on real experiences, not theory. All Infosec, mashed up.</p><p>At the intersection of pentest, auditing, risk management and career advice. Musings based on real experiences, not theory. All infosec, mashed up.</p><p>&#8206;Follow the Risky Context channel on WhatsApp (if WhatsApp is your thing. Your number is not shared with others when you connect to my channel): <a href="https://whatsapp.com/channel/0029VaDqrFU8aKvQohD5nq0r?ref=sripati.info">https://whatsapp.com/channel/0029VaDqrFU8aKvQohD5nq0r</a></p>]]></content:encoded></item><item><title><![CDATA[Ask for this first, when you join as a CISO]]></title><description><![CDATA[No, it is not bigger team, corner office, or that new tool promising to remove all your infosec worries.]]></description><link>https://www.sripati.info/p/ask-for-this-when-you-join-as-a-ciso</link><guid isPermaLink="false">https://www.sripati.info/p/ask-for-this-when-you-join-as-a-ciso</guid><dc:creator><![CDATA[Sripati MS]]></dc:creator><pubDate>Mon, 19 Feb 2024 21:30:01 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/cdaa0328-40ee-4d2b-8e81-a0c81fc414c3_2000x1333.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4WZK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf985cb7-6af1-4ec4-930f-0ec7f4c08d6c_2000x1333.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4WZK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf985cb7-6af1-4ec4-930f-0ec7f4c08d6c_2000x1333.jpeg 424w, https://substackcdn.com/image/fetch/$s_!4WZK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf985cb7-6af1-4ec4-930f-0ec7f4c08d6c_2000x1333.jpeg 848w, https://substackcdn.com/image/fetch/$s_!4WZK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf985cb7-6af1-4ec4-930f-0ec7f4c08d6c_2000x1333.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!4WZK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf985cb7-6af1-4ec4-930f-0ec7f4c08d6c_2000x1333.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4WZK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf985cb7-6af1-4ec4-930f-0ec7f4c08d6c_2000x1333.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cf985cb7-6af1-4ec4-930f-0ec7f4c08d6c_2000x1333.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Ask for this first, when you join as a CISO&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Ask for this first, when you join as a CISO" title="Ask for this first, when you join as a CISO" srcset="https://substackcdn.com/image/fetch/$s_!4WZK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf985cb7-6af1-4ec4-930f-0ec7f4c08d6c_2000x1333.jpeg 424w, https://substackcdn.com/image/fetch/$s_!4WZK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf985cb7-6af1-4ec4-930f-0ec7f4c08d6c_2000x1333.jpeg 848w, https://substackcdn.com/image/fetch/$s_!4WZK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf985cb7-6af1-4ec4-930f-0ec7f4c08d6c_2000x1333.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!4WZK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf985cb7-6af1-4ec4-930f-0ec7f4c08d6c_2000x1333.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><p>No, it is not bigger team, corner office, or that new tool promising to remove all your infosec worries.</p><h3>Get read-only access on all network devices in the company (switches, routers, firewall, etc.).</h3><p>Not for yourself, but for your team.</p><p>Do I hear a &#8216;why&#8217;? glad you asked.</p><blockquote><p>Network is the nerve centre of a company. Access to the networking devices (switch, router, network firewall) will help the security team understand, among other things,</p></blockquote><ol><li><p><em>Segmentation (how is the network divided? Do we have a DMZ? Is it empty? Are all servers in one part of the network or sprinkled across town?, etc.)</em></p></li><li><p><em>VPN configurations (is the VPN configuration same across all firewalls? Are there any users who are present on all firewalls? Do all VPN users have mac binding, MFA, integration with NAC? are any VPN users exempted? etc.)</em></p></li><li><p><em>Access control (TACACS, Radius, local accounts, password policies - or lack thereof, etc.)</em></p></li><li><p><em>Traffic flow (allowed/ denied) - which part of network can talk to every other part? Which part of network is isolated?</em></p></li><li><p><em>Network pathways associated with critical assets,</em></p></li><li><p><em>End of sale, end of services, etc.</em></p></li></ol><h3>The access will also help you answer some crucial questions</h3><ol><li><p>Whether any new asset added to the network?</p></li><li><p>What are the network pathways open to your critical assets?</p></li><li><p>Which ports are allowed on your critical assets?</p></li><li><p>Whether 2FA is configured with VPN?</p></li><li><p>Whether 1 user ID is duplicated on multiple firewalls with same configuration (e.g., 2FA)?, etc.</p></li></ol><p>As a CISO, you must ask for this access.</p><p>Use all your goodwill, charm, and pull to have this access. It will pay good dividend.</p><h3>However, a tool is only as good as the person wielding it. You will get administrators for the tool, but you will need someone who could identify security risks while going through the data provided by the tool.</h3><h2>Sign up for Risky Context</h2><p>I write at the intersection of pentest, auditing, risk management and career advice. I add context to the infosec risk. I help answer the question 'where is the risk?'</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.sripati.info/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.sripati.info/subscribe?"><span>Subscribe</span></a></p><p>No spam. Unsubscribe anytime. Musings based on real experiences, not theory. All Infosec, mashed up.</p><p>At the intersection of pentest, auditing, risk management and career advice. Musings based on real experiences, not theory. All infosec, mashed up.</p><p>&#8206;Follow the Risky Context channel on WhatsApp (if WhatsApp is your thing. Your number is not shared with others when you connect to my channel): <a href="https://whatsapp.com/channel/0029VaDqrFU8aKvQohD5nq0r?ref=sripati.info">https://whatsapp.com/channel/0029VaDqrFU8aKvQohD5nq0r</a></p>]]></content:encoded></item><item><title><![CDATA[6 elements that every penetration test report must have]]></title><description><![CDATA[Important disclaimer - it is very important that you vet the report template with the customer before you start the engagement.]]></description><link>https://www.sripati.info/p/6-elements-that-every-pentest-report-must-have</link><guid isPermaLink="false">https://www.sripati.info/p/6-elements-that-every-pentest-report-must-have</guid><dc:creator><![CDATA[Sripati MS]]></dc:creator><pubDate>Sun, 18 Feb 2024 21:30:31 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/6532e091-fe01-4d07-b8c5-73fc2fb467e3_2000x2221.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BblL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F200c7537-c30e-44cb-8b81-fa467bef88af_2000x2221.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BblL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F200c7537-c30e-44cb-8b81-fa467bef88af_2000x2221.jpeg 424w, https://substackcdn.com/image/fetch/$s_!BblL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F200c7537-c30e-44cb-8b81-fa467bef88af_2000x2221.jpeg 848w, https://substackcdn.com/image/fetch/$s_!BblL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F200c7537-c30e-44cb-8b81-fa467bef88af_2000x2221.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!BblL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F200c7537-c30e-44cb-8b81-fa467bef88af_2000x2221.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BblL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F200c7537-c30e-44cb-8b81-fa467bef88af_2000x2221.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/200c7537-c30e-44cb-8b81-fa467bef88af_2000x2221.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;6 elements that every penetration test report must have&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="6 elements that every penetration test report must have" title="6 elements that every penetration test report must have" srcset="https://substackcdn.com/image/fetch/$s_!BblL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F200c7537-c30e-44cb-8b81-fa467bef88af_2000x2221.jpeg 424w, https://substackcdn.com/image/fetch/$s_!BblL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F200c7537-c30e-44cb-8b81-fa467bef88af_2000x2221.jpeg 848w, https://substackcdn.com/image/fetch/$s_!BblL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F200c7537-c30e-44cb-8b81-fa467bef88af_2000x2221.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!BblL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F200c7537-c30e-44cb-8b81-fa467bef88af_2000x2221.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><p>Important disclaimer - it is very important that you vet the report template with the customer before you start the engagement. It is important so that they can suggest any changes ahead of the chaos.</p><p>So here are the most important elements of a pentest report, in that order,</p><h3>Introduction</h3><ol><li><ol><li><p>What is this document</p></li><li><p>How to read this report</p></li></ol></li></ol><p>Here's an example.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hslT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c93cdbf-1ea0-4768-844d-b424bd4c8185_1048x780.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hslT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c93cdbf-1ea0-4768-844d-b424bd4c8185_1048x780.png 424w, https://substackcdn.com/image/fetch/$s_!hslT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c93cdbf-1ea0-4768-844d-b424bd4c8185_1048x780.png 848w, https://substackcdn.com/image/fetch/$s_!hslT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c93cdbf-1ea0-4768-844d-b424bd4c8185_1048x780.png 1272w, https://substackcdn.com/image/fetch/$s_!hslT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c93cdbf-1ea0-4768-844d-b424bd4c8185_1048x780.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hslT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c93cdbf-1ea0-4768-844d-b424bd4c8185_1048x780.png" width="1048" height="780" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9c93cdbf-1ea0-4768-844d-b424bd4c8185_1048x780.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:780,&quot;width&quot;:1048,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;6 elements that every penetration test report must have&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="6 elements that every penetration test report must have" title="6 elements that every penetration test report must have" srcset="https://substackcdn.com/image/fetch/$s_!hslT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c93cdbf-1ea0-4768-844d-b424bd4c8185_1048x780.png 424w, https://substackcdn.com/image/fetch/$s_!hslT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c93cdbf-1ea0-4768-844d-b424bd4c8185_1048x780.png 848w, https://substackcdn.com/image/fetch/$s_!hslT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c93cdbf-1ea0-4768-844d-b424bd4c8185_1048x780.png 1272w, https://substackcdn.com/image/fetch/$s_!hslT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c93cdbf-1ea0-4768-844d-b424bd4c8185_1048x780.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">An example Introductory page/ slide for your report.</figcaption></figure></div><h3>Executive summary</h3><ol><li><ol><li><p>you get two types of customers in every engagement. One who implements your recommendation, and another one who pays for the pentest. This summary is for the one who pays. Make it count.</p></li><li><p>kill chain/ attack-narrative Infographic, key risks, impact, high level recommendations, potential timelines (if possible).</p></li><li><p>Leaders want to know the key risks and the exposure (e.g., potential fine from regulator, reputation risk, risk of non-compliance, etc.).</p></li><li><p>with each key risk, link all different vulnerabilities that are part of that risk</p></li><li><p>No details, but lot of references to locations (in the current report) where the finding is detailed.</p></li><li><p>It will be better if this part of report is printed and hand-delivered to the customer.</p></li></ol></li></ol><h3>Table of Findings</h3><p>usual suspects to go here (#, ID, title, small description with impact, risk rating, reference to the location in current document). Here's an example.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!pi0-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54656275-9142-4481-ba22-a01062caac7c_1470x238.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!pi0-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54656275-9142-4481-ba22-a01062caac7c_1470x238.png 424w, https://substackcdn.com/image/fetch/$s_!pi0-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54656275-9142-4481-ba22-a01062caac7c_1470x238.png 848w, https://substackcdn.com/image/fetch/$s_!pi0-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54656275-9142-4481-ba22-a01062caac7c_1470x238.png 1272w, https://substackcdn.com/image/fetch/$s_!pi0-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54656275-9142-4481-ba22-a01062caac7c_1470x238.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!pi0-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54656275-9142-4481-ba22-a01062caac7c_1470x238.png" width="1470" height="238" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/54656275-9142-4481-ba22-a01062caac7c_1470x238.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:238,&quot;width&quot;:1470,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;6 elements that every penetration test report must have&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="6 elements that every penetration test report must have" title="6 elements that every penetration test report must have" srcset="https://substackcdn.com/image/fetch/$s_!pi0-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54656275-9142-4481-ba22-a01062caac7c_1470x238.png 424w, https://substackcdn.com/image/fetch/$s_!pi0-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54656275-9142-4481-ba22-a01062caac7c_1470x238.png 848w, https://substackcdn.com/image/fetch/$s_!pi0-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54656275-9142-4481-ba22-a01062caac7c_1470x238.png 1272w, https://substackcdn.com/image/fetch/$s_!pi0-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54656275-9142-4481-ba22-a01062caac7c_1470x238.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Sample table of findings</figcaption></figure></div><h3>Detailed Findings</h3><p>Some ppl include attack narratives here, others add one table per finding, divided by severity/ risk levels. At the minimum, each finding should have the following fields</p><ol><li><ol><li><p>finding ID (also see 'table of findings' above).</p></li><li><p>severity/ risk</p></li><li><p>finding title (should combine vulnerability and impact)</p></li><li><p>finding details (should explain vulnerability, impact, and justification for severity/ risk rating)</p></li><li><p>remediation</p></li><li><p>other info for compliance purposes (e.g., CWE ID, any CVE ID, OWASP TOP-10/ ASVS/ Testing Guide reference). Many regulations expect this information to be present for each vulnerability. Not including this information may result in an audit finding.</p></li></ol></li></ol><h3>Scope, Methodology</h3><p>why is this at the end?</p><ol><li><ol><li><p>Becoz it doesn&#8217;t matter much, at least for the report. It is discussed, agreed upon, and approved much prior to the report. It is kept in report for record purposes and for the first type of customer (refer executive summary).</p></li><li><p>Sure, someone may want to check the coverage. However, overall, the most important items for customer are already described above.</p></li></ol></li></ol><h3>Other relevant Annexure</h3><ol><li><p>Output from automated tools like Nessus, nmap, burp suite, sqlmap, etc.</p></li><li><p>Criteria for severity/ risk ratings (why a vulnerability/ risk is 'high', 'medium', or 'low', etc.)</p></li></ol><p>Some elements that I have not included here, but are assumed to be present, are: -</p><ol><li><p>Cover page, logo,</p></li><li><p>document title, client name (name, email ID of the point of contact)</p></li><li><p>document control (who created/ when, who approved/ when, change tracker)</p></li><li><p>vendor contact details</p></li></ol><h3><strong>Additional Guidance</strong></h3><div class="captioned-image-container"><figure><p><a href="https://www.linkedin.com/feed/update/urn:li:activity:7224760749938638848/?ref=sripati.info">Pentest-Tools.com on LinkedIn: 10 things NOT to do in your pentest reports: &#10060; Give generic&#8230;</a></p><figcaption class="image-caption"><a href="https://www.linkedin.com/feed/update/urn:li:activity:7224760749938638848/?ref=sripati.info">10 things NOT to do in your pentest reports: &#10060; Give generic recommendations that don&amp;#39;t account for the client&amp;#39;s context. &#10060; Outline the impact of a&#8230;</a></figcaption><figcaption class="image-caption"><a href="https://www.linkedin.com/feed/update/urn:li:activity:7224760749938638848/?ref=sripati.info">LinkedInView Profile</a></figcaption></figure></div><div class="captioned-image-container"><figure><p><a href="https://pentest-tools.com/blog/pentest-reports-tips-ethical-hackers?ref=sripati.info">Pro tips from 10 ethical hackers for stellar reports</a></p><figcaption class="image-caption"><a href="https://pentest-tools.com/blog/pentest-reports-tips-ethical-hackers?ref=sripati.info">Delve into the collective wisdom of 10 seasoned offensive security pros who&#8217;ve shared their insider tips on mastering the art of pentest reporting.</a></figcaption><figcaption class="image-caption"><a href="https://pentest-tools.com/blog/pentest-reports-tips-ethical-hackers?ref=sripati.info">Pentest-Tools.comIoana Rijnetu</a></figcaption></figure></div><div class="captioned-image-container"><figure><p><a href="https://www.hackthebox.com/blog/penetration-testing-reports-template-and-guide?ref=sripati.info">Penetration testing reports: A powerful template and guide</a></p><figcaption class="image-caption"><a href="https://www.hackthebox.com/blog/penetration-testing-reports-template-and-guide?ref=sripati.info">Writing solid penetration testing reports is an important skill. Here&#8217;s a ready-to-use penetration testing template and guide inspired by our Academy module.</a></figcaption><figcaption class="image-caption"><a href="https://www.hackthebox.com/blog/penetration-testing-reports-template-and-guide?ref=sripati.info">Hack The BoxTreyCraf7</a></figcaption></figure></div><div class="captioned-image-container"><figure><p><a href="https://pentestreports.com/?ref=sripati.info">Penetration Test reports</a></p><figcaption class="image-caption"><a href="https://pentestreports.com/?ref=sripati.info">Curated list of pentest reports from various security companies and individuals. Great content to learn about penetration testing methodologies and techniques.</a></figcaption><figcaption class="image-caption"><a href="https://pentestreports.com/?ref=sripati.info">Pentest reports</a></figcaption></figure></div><div class="captioned-image-container"><figure><p><a href="https://www.blackhillsinfosec.com/your-reporting-matters-how-to-improve-pen-test-reporting/?ref=sripati.info">Your Reporting Matters: How to Improve Pen Test Reporting - Black Hills Information Security</a></p><figcaption class="image-caption"><a href="https://www.blackhillsinfosec.com/your-reporting-matters-how-to-improve-pen-test-reporting/?ref=sripati.info">Brian B. King&nbsp;// This is a companion post to BBKing&#8217;s &#8220;Hack for Show, Report for Dough&#8221; report, given at BSides Cleveland in June 2019. The fun part of pentesting is [&#8230;]</a></figcaption><figcaption class="image-caption"><a href="https://www.blackhillsinfosec.com/your-reporting-matters-how-to-improve-pen-test-reporting/?ref=sripati.info">Black Hills Information SecurityBHIS</a></figcaption></figure></div><div class="captioned-image-container"><figure><p><a href="https://github.com/juliocesarfort/public-pentesting-reports?ref=sripati.info">GitHub - juliocesarfort/public-pentesting-reports: A list of public penetration test reports published by several consulting firms and academic security groups.</a></p><figcaption class="image-caption"><a href="https://github.com/juliocesarfort/public-pentesting-reports?ref=sripati.info">A list of public penetration test reports published by several consulting firms and academic security groups. - juliocesarfort/public-pentesting-reports</a></figcaption><figcaption class="image-caption"><a href="https://github.com/juliocesarfort/public-pentesting-reports?ref=sripati.info">GitHubjuliocesarfort</a></figcaption></figure></div><div class="captioned-image-container"><figure><p><a href="https://www.antisyphontraining.com/course/reporting-for-pentesters-with-bb-king/?ref=sripati.info">Reporting for Pentesters with BB King - Antisyphon Training</a></p><figcaption class="image-caption"><a href="https://www.antisyphontraining.com/course/reporting-for-pentesters-with-bb-king/?ref=sripati.info">This course helps you know what makes a good report good. It discusses the reporting mindset, and the foundational principles that always lead to a report you can be proud of, regardless of the tools you use for the test or for writing the report.</a></figcaption><figcaption class="image-caption"><a href="https://www.antisyphontraining.com/course/reporting-for-pentesters-with-bb-king/?ref=sripati.info">Antisyphon Training</a></figcaption></figure></div><h2>Sign up for Risky Context</h2><p>I write at the intersection of pentest, auditing, risk management and career advice. I add context to the infosec risk. I help answer the question 'where is the risk?'</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.sripati.info/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.sripati.info/subscribe?"><span>Subscribe</span></a></p><p>No spam. Unsubscribe anytime. Musings based on real experiences, not theory. All Infosec, mashed up.</p><p>At the intersection of pentest, auditing, risk management and career advice. Musings based on real experiences, not theory. All infosec, mashed up.</p><p>&#8206;Follow the Risky Context channel on WhatsApp (if WhatsApp is your thing. Your number is not shared with others when you connect to my channel): <a href="https://whatsapp.com/channel/0029VaDqrFU8aKvQohD5nq0r?ref=sripati.info">https://whatsapp.com/channel/0029VaDqrFU8aKvQohD5nq0r</a></p>]]></content:encoded></item><item><title><![CDATA[On cocktail JDs in infosec and why they will keep coming...]]></title><description><![CDATA[I see lot of opinion and feedback on JDs that ask for hands-on experience for a leadership role in infosec or a cocktail of administration experience.]]></description><link>https://www.sripati.info/p/on-cocktail-jds-in-infosec-and-why-they-will-keep-coming</link><guid isPermaLink="false">https://www.sripati.info/p/on-cocktail-jds-in-infosec-and-why-they-will-keep-coming</guid><dc:creator><![CDATA[Sripati MS]]></dc:creator><pubDate>Sun, 18 Feb 2024 10:19:34 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/11371d52-7922-4936-8f31-b7658cdedc3d_2000x1333.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Shwh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93da6b27-9705-4827-8ba1-37a1116a447d_2000x1333.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Shwh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93da6b27-9705-4827-8ba1-37a1116a447d_2000x1333.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Shwh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93da6b27-9705-4827-8ba1-37a1116a447d_2000x1333.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Shwh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93da6b27-9705-4827-8ba1-37a1116a447d_2000x1333.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Shwh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93da6b27-9705-4827-8ba1-37a1116a447d_2000x1333.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Shwh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93da6b27-9705-4827-8ba1-37a1116a447d_2000x1333.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/93da6b27-9705-4827-8ba1-37a1116a447d_2000x1333.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;On cocktail JDs in infosec and why they will keep coming...&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="On cocktail JDs in infosec and why they will keep coming..." title="On cocktail JDs in infosec and why they will keep coming..." srcset="https://substackcdn.com/image/fetch/$s_!Shwh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93da6b27-9705-4827-8ba1-37a1116a447d_2000x1333.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Shwh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93da6b27-9705-4827-8ba1-37a1116a447d_2000x1333.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Shwh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93da6b27-9705-4827-8ba1-37a1116a447d_2000x1333.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Shwh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93da6b27-9705-4827-8ba1-37a1116a447d_2000x1333.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><p>I see lot of opinion and feedback on JDs that ask for hands-on experience for a leadership role in infosec or a cocktail of administration experience.</p><h3>I don&#8217;t think they will stop anytime soon. I think they will keep coming for quite some time. Here's why.</h3><ol><li><p><a href="https://sripati.info/security-is-a-cost-centre/">InfoSec is a cost centre</a> for almost every company, except in a firm that provides it as a service.</p></li><li><p>Due to the <a href="https://www.sans.org/cybersecurity-careers/20-coolest-cyber-security-careers/?ref=sripati.info">many dimensions that infosec has branched into</a> myriad set of skills are required if a firm wants to keep themselves secure from all threats (penetration testing, soc, threat hunting, administration of security tools, etc.).</p></li><li><p>Due to point 1, companies want to maximise their return on investment (employee salaries are a major opex item).</p></li><li><p>The first hire in any new department/ function is always the leader. The leader is then expected to hire, train, and utilise the optimal resources (read - at as minimum a cost as possible, without hurting the company) to achieve desired outcome. Hence the rise of outsourcing of many security activities.</p></li><li><p>Information security, as a career and industry, is still evolving. Employers are still trying to figure whether they need such a function in-house (cue - rise of MSSP and vCISO), whether the position of CISO really deserves a seat at the table, do they need a CISO (a strategic advisor) or Head of Infosec (more hands on administration and involvement), etc.</p></li><li><p>Due to points 3, 4, and 5, the employers try to cram as many skills and experience requirements as they can, into a JD.</p></li></ol><p>That, is the reason why you see so many mixed JDs (CISO requiring 5 years of C++ development experience, looking for significant IT experience for a junior role, etc.) in infosec.</p><h3>However, is this situation bad enough to warrant a rant?</h3><p>Let&#8217;s take a cocktail JD as example - administration experience as a requirement for a GRC role.</p><p>Not every company has use for a GRC professional full-time. Companies want (and need) governance and strategic infosec advice, but they also need people who can implement them. These are in a very short supply.</p><p>Our understanding of GRC is different from that of an employer. For many of those, it involves</p><ol><li><p>Documentation (processes, SoP, position papers, project plans, ToR, RFP),</p></li><li><p>Coordination (interfacing with other departments; facilitating people who are 2-3 layers deep on infosec issues, why you want them to do the work, what is it that you exactly want them to do, facing audits, getting the findings closed, etc.),</p></li><li><p>Project management, with activities that are 2-layers deep at each step.</p></li></ol><blockquote><p>We think 'strategy', they see 'documentation'.</p></blockquote><blockquote><p>We think 'security program management', they see 'someone who will do all jobs related to security, including driving a security program'.</p></blockquote><p>Add to it the following facts,</p><ol><li><p>We are at odds with all other disciplines in a company (we are in our infancy, industry is still figuring out how to treat us and where to put us in the org chart),</p></li><li><p>Most of GRC work is hard to prove (unless the process yields tangible benefits or stakeholder delight), and</p></li><li><p>Most of the us as practitioners are not doing a good job of making employers aware of the nuances and challenges of their role, and the value they can bring except by way of a lament/ rant.</p></li></ol><p>I have said before that <a href="https://sripati.info/dont-focus-on-admin-certs-when-you-want-to-become-a-pentester-however/">you don't need administrative certifications when your aim is to understand how-something-works-so-that-you-can-break-it</a>. However, some level of hands-on experience is an advantage that you don't want to miss on. Hands-on experience on technology is a boost to GRC activities.</p><p>My GRC skills improved drastically, once I spent time on tools.</p><ol><li><p>I could write better processes that aligned with the environment (rather than advising industry best practices), perform a security audit better, identify more risks in the environment than before, understand a regulatory advice and suggest a better way forward than &#8216;best practices&#8217;, etc.</p></li><li><p>I could identify serious findings in a ticketing solution because I spent some time with the tool.</p></li><li><p>I could suggest a patch management process that utilised the current tool and manpower better due to my familiarity with their tech stack, my understanding of the way patching works there.</p></li></ol><p>So, I think we will continue to see the cocktail JDs in InfoSec for some more time.</p><blockquote><p>What is invisible (individual needs, desires, and greed) will always drive what is visible (JDs, compensation, market preferences in infosec hiring and purchases, etc.).</p></blockquote><h2>Sign up for Risky Context</h2><p>I write at the intersection of pentest, auditing, risk management and career advice. I add context to the infosec risk. I help answer the question 'where is the risk?'</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.sripati.info/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.sripati.info/subscribe?"><span>Subscribe</span></a></p><p>No spam. Unsubscribe anytime. Musings based on real experiences, not theory. All Infosec, mashed up.</p><p>At the intersection of pentest, auditing, risk management and career advice. Musings based on real experiences, not theory. All infosec, mashed up.</p><p>&#8206;Follow the Risky Context channel on WhatsApp (if WhatsApp is your thing. Your number is not shared with others when you connect to my channel): <a href="https://whatsapp.com/channel/0029VaDqrFU8aKvQohD5nq0r?ref=sripati.info">https://whatsapp.com/channel/0029VaDqrFU8aKvQohD5nq0r</a></p>]]></content:encoded></item><item><title><![CDATA[Don't focus on admin certs when you want to become a Pentester. However...]]></title><description><![CDATA[I see lot of people aiming at getting administrative certifications (e.g., CCNA, CCNP, Microsoft Certification exams, etc.), when they aim to become a penetration tester.I have spent quite some time with penetration testers and have noticed that this approach has its own perils.I have tried to list them here, have a read.]]></description><link>https://www.sripati.info/p/dont-focus-on-admin-certs-when-you-want-to-become-a-pentester-however</link><guid isPermaLink="false">https://www.sripati.info/p/dont-focus-on-admin-certs-when-you-want-to-become-a-pentester-however</guid><dc:creator><![CDATA[Sripati MS]]></dc:creator><pubDate>Thu, 15 Feb 2024 21:30:51 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/da15e76d-201d-471d-81d2-a6610348769b_2000x1771.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xS0U!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83c22fcd-27ae-45c6-b84c-cc9bacba74e7_2000x1771.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xS0U!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83c22fcd-27ae-45c6-b84c-cc9bacba74e7_2000x1771.jpeg 424w, https://substackcdn.com/image/fetch/$s_!xS0U!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83c22fcd-27ae-45c6-b84c-cc9bacba74e7_2000x1771.jpeg 848w, https://substackcdn.com/image/fetch/$s_!xS0U!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83c22fcd-27ae-45c6-b84c-cc9bacba74e7_2000x1771.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!xS0U!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83c22fcd-27ae-45c6-b84c-cc9bacba74e7_2000x1771.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xS0U!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83c22fcd-27ae-45c6-b84c-cc9bacba74e7_2000x1771.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/83c22fcd-27ae-45c6-b84c-cc9bacba74e7_2000x1771.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Don't focus on admin certs when you want to become a Pentester. However...&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Don't focus on admin certs when you want to become a Pentester. However..." title="Don't focus on admin certs when you want to become a Pentester. However..." srcset="https://substackcdn.com/image/fetch/$s_!xS0U!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83c22fcd-27ae-45c6-b84c-cc9bacba74e7_2000x1771.jpeg 424w, https://substackcdn.com/image/fetch/$s_!xS0U!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83c22fcd-27ae-45c6-b84c-cc9bacba74e7_2000x1771.jpeg 848w, https://substackcdn.com/image/fetch/$s_!xS0U!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83c22fcd-27ae-45c6-b84c-cc9bacba74e7_2000x1771.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!xS0U!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83c22fcd-27ae-45c6-b84c-cc9bacba74e7_2000x1771.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><p>I see lot of people aiming at getting administrative certifications (e.g., CCNA, CCNP, Microsoft Certification exams, etc.), when they aim to become a penetration tester.I have spent quite some time with penetration testers and have noticed that this approach has its own perils.I have tried to list them here, have a read.</p><h3>The problem</h3><p>Strong foundations are important to become a penetration tester.<br>Often, certification study guides (e.g.,those for CCNA, Network+, Security+, etc.) are prescribed to learn the basics.<br>Nothing wrong in getting certified, along the way, is it?</p><p>However, we end up missing forest for trees.</p><h3>I assume you want to become a pentester</h3><p>A Pentester breaks into things (systems, networks, web applications, mobile apps, IoT, lateset-fad-here).</p><p>In order to do so, a Pentester needs 3 crucial skills</p><h3>The 3 crucial skills to become a pentester</h3><ol><li><p>An understanding of how things work (so that they can be broken into). One needs to constantly keep learning to do so.</p></li><li><p>An eye to look at a system (IT asset, process, workflow, etc.) and to identify the weak points.</p></li><li><p>Willpower to keep moving when you are stuck and not leave the field.</p></li></ol><blockquote><p>While it is important to understand how a network works (CCNA) and how it is secured (CCNP), I believe trying for these certifications is a waste of time, <strong>if pen testing is your goal</strong>. Here's why...</p></blockquote><ol><li><p>Humans are builders first.</p></li><li><p>Breaking things doesn't come naturally to us.</p></li><li><p>The administrative certifications are all builder/ maintainer certs. They primarily teach 'how something works', not 'how to break it'.</p></li></ol><p>Now consider this.</p><ol><li><p>A Pentester's job is getting tougher by day. Hardened networks/ applications, evolving firewalls, <a href="https://sripati.info/security-is-a-cost-centre/">shrinking budgets</a>, make job very difficult for a pentester.</p></li><li><p>As a pentester, you will be required to learn 'how to break into this thing' on a daily basis.</p></li><li><p>The key question should not be 'how does this work?' but 'how to break it?'</p></li><li><p>More often, we focus more on the first question, forgetting the second one.</p></li><li><p>However, it does not mean you stop learning things (you won't be a better pentester unless you learn how things work).</p></li><li><p>What it means is this...</p></li></ol><blockquote><p>Keep the second question in mind (how to break it) while looking for answer to first question (how this works).</p></blockquote><h2>Sign up for Risky Context</h2><p>I write at the intersection of pentest, auditing, risk management and career advice. I add context to the infosec risk. I help answer the question 'where is the risk?'</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.sripati.info/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.sripati.info/subscribe?"><span>Subscribe</span></a></p><p>No spam. Unsubscribe anytime. Musings based on real experiences, not theory. All Infosec, mashed up.</p><p>At the intersection of pentest, auditing, risk management and career advice. Musings based on real experiences, not theory. All infosec, mashed up.</p><p>&#8206;Follow the Risky Context channel on WhatsApp (if WhatsApp is your thing. Your number is not shared with others when you connect to my channel): <a href="https://whatsapp.com/channel/0029VaDqrFU8aKvQohD5nq0r?ref=sripati.info">https://whatsapp.com/channel/0029VaDqrFU8aKvQohD5nq0r</a></p>]]></content:encoded></item><item><title><![CDATA[appeared on br3akpoint with neelu tripathi]]></title><description><![CDATA[Never thought this would happen.]]></description><link>https://www.sripati.info/p/appeared-on-br3akp0int-with-neel</link><guid isPermaLink="false">https://www.sripati.info/p/appeared-on-br3akp0int-with-neel</guid><dc:creator><![CDATA[Sripati MS]]></dc:creator><pubDate>Wed, 14 Feb 2024 21:30:26 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/6861d67c-7859-45fe-806a-a683a8dc1359_2000x2667.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qUq7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fe53a58-4954-449b-aa39-1ef85a18fd5d_2000x2667.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qUq7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fe53a58-4954-449b-aa39-1ef85a18fd5d_2000x2667.jpeg 424w, https://substackcdn.com/image/fetch/$s_!qUq7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fe53a58-4954-449b-aa39-1ef85a18fd5d_2000x2667.jpeg 848w, https://substackcdn.com/image/fetch/$s_!qUq7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fe53a58-4954-449b-aa39-1ef85a18fd5d_2000x2667.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!qUq7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fe53a58-4954-449b-aa39-1ef85a18fd5d_2000x2667.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qUq7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fe53a58-4954-449b-aa39-1ef85a18fd5d_2000x2667.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9fe53a58-4954-449b-aa39-1ef85a18fd5d_2000x2667.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;appeared on br3akpoint with neelu tripathi&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="appeared on br3akpoint with neelu tripathi" title="appeared on br3akpoint with neelu tripathi" srcset="https://substackcdn.com/image/fetch/$s_!qUq7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fe53a58-4954-449b-aa39-1ef85a18fd5d_2000x2667.jpeg 424w, https://substackcdn.com/image/fetch/$s_!qUq7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fe53a58-4954-449b-aa39-1ef85a18fd5d_2000x2667.jpeg 848w, https://substackcdn.com/image/fetch/$s_!qUq7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fe53a58-4954-449b-aa39-1ef85a18fd5d_2000x2667.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!qUq7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fe53a58-4954-449b-aa39-1ef85a18fd5d_2000x2667.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><p>Never thought this would happen.</p><p><a href="https://www.linkedin.com/in/neelutripathy/?ref=sripati.info">Neelu Tripathy</a> is a wonderful podcast host.</p><p>She not only put a first-timer guest (me, the clueless) at ease, she also prodded me with thoughtful questions. I wondered if she felt like pulling teeth. Very graceful and prepared host, though.</p><p>I am grateful for the opportunity and enjoyed my time as a guest.</p><p>I spoke about ISO 27001, it&#8217;s a standard I like a lot.I also spoke about usual challenges during implementation, and some ways to address them.Please listen to it, ignore my hand gestures, and let me know what you think of it.</p><div class="captioned-image-container"><figure><div id="youtube2-NXkRLBZEhvs" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;NXkRLBZEhvs&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/NXkRLBZEhvs?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div></figure></div><h2>Sign up for Risky Context</h2><p>I write at the intersection of pentest, auditing, risk management and career advice. I add context to the infosec risk. I help answer the question 'where is the risk?'</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.sripati.info/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.sripati.info/subscribe?"><span>Subscribe</span></a></p><p>No spam. Unsubscribe anytime. Musings based on real experiences, not theory. All Infosec, mashed up.</p><p>At the intersection of pentest, auditing, risk management and career advice. Musings based on real experiences, not theory. All infosec, mashed up.</p><p>&#8206;Follow the Risky Context channel on WhatsApp (if WhatsApp is your thing. Your number is not shared with others when you connect to my channel): <a href="https://whatsapp.com/channel/0029VaDqrFU8aKvQohD5nq0r?ref=sripati.info">https://whatsapp.com/channel/0029VaDqrFU8aKvQohD5nq0r</a></p>]]></content:encoded></item><item><title><![CDATA[Remember these clauses & covenants while any enterprise application is being finalised for purchase]]></title><description><![CDATA[How to ensure that, as a CISO, all the tools are properly integrated with your SOC?]]></description><link>https://www.sripati.info/p/remember-this-clause-while-implementing-an-it-tool</link><guid isPermaLink="false">https://www.sripati.info/p/remember-this-clause-while-implementing-an-it-tool</guid><dc:creator><![CDATA[Sripati MS]]></dc:creator><pubDate>Wed, 14 Feb 2024 21:30:15 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/5846826b-3f9c-4b4b-b67a-1e84e8fea0c7_2000x1335.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1AQF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cbfce90-a300-4f4d-8368-147485341294_2000x1335.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1AQF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cbfce90-a300-4f4d-8368-147485341294_2000x1335.jpeg 424w, https://substackcdn.com/image/fetch/$s_!1AQF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cbfce90-a300-4f4d-8368-147485341294_2000x1335.jpeg 848w, https://substackcdn.com/image/fetch/$s_!1AQF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cbfce90-a300-4f4d-8368-147485341294_2000x1335.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!1AQF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cbfce90-a300-4f4d-8368-147485341294_2000x1335.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1AQF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cbfce90-a300-4f4d-8368-147485341294_2000x1335.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6cbfce90-a300-4f4d-8368-147485341294_2000x1335.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1AQF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cbfce90-a300-4f4d-8368-147485341294_2000x1335.jpeg 424w, https://substackcdn.com/image/fetch/$s_!1AQF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cbfce90-a300-4f4d-8368-147485341294_2000x1335.jpeg 848w, https://substackcdn.com/image/fetch/$s_!1AQF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cbfce90-a300-4f4d-8368-147485341294_2000x1335.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!1AQF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cbfce90-a300-4f4d-8368-147485341294_2000x1335.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@cytonn_photography?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Cytonn Photography</a> / <a href="https://unsplash.com/?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Unsplash</a></figcaption></figure></div><blockquote><p>These clauses and covenants must be part of your Service Level Agreements (SLA) with service providers.</p></blockquote><p>There are few parties while any enterprise application is bought for use within a company. They are: -</p><ol><li><p>User Department - End-users for the application. May or may not contribute to budget (to buy the application).</p></li><li><p>IT - Budget to buy the application usually comes from this department. IT also helps in providing overall technical support in evaluating, procuring, deployment, maintenance, and support (on behalf of the customer).</p></li><li><p>InfoSec - In regulated entities, this function is responsible to say '<em>go ahead and deploy it in production environment. It is safe to use, relevant controls are implemented to address any adversary exploiting any security weaknesses in this application and hurting us</em>'.</p></li><li><p>OEM (Original Equipment Manufacturer) - A term used to describe both hardware and software providers. People who create them.</p></li><li><p>System Integrators (SI) - The company who helps in buying, implementing, maintaining, and supporting the application.</p></li></ol><h3>A basic premise - right of a customer to have a bug-free and secure application/ service delivery.</h3><p>A <a href="https://sklaw.au/dictionary/covenant-context-contracts/">covenant in legal term</a> refers to a promise made by one party to another to either do or refrain from doing a certain act.</p><p>As a customer, it is our right to be able to use a secure and bug-free experience. Vendors must strive for it. As a consequence, they must not charge their customers for fixing bugs or security vulnerabilities.</p><p><em>What if this clause or covenant is not present in your agreements with the vendor or SI (System Integrator) of the enterprise software? They may seek compensation for fixing bugs or security vulnerabilities! This will cost your company by increased OPEX (Operating Expenditure). CFO won't be pleased.</em></p><h3>Ask your application vendor/ System integrator to help integrating logs from the system to your SOC/ SIEM. You will have lot of difficulty in doing so, without their help.</h3><p>Ideally, all security related logs from your IT tools should come to your SOC.<br>This is important so that SOC team is alerted when any anomaly happens.</p><p>HelpDesk/ Ticketing systems, business critical applications (Core Banking Systems, CRM, Enterprise Content Management Systems, version control systems, etc. are some examples of such tools.</p><p>There is a catch, however.</p><blockquote><p><em>Someone needs to figure out those security logs (their construct, the most important security events from these tools and </em>the<em> type of logs that indicate those events) and prepare use-cases and alerts for them. your SOC will be a tooth-less tiger, otherwise.</em></p></blockquote><p>Your SOC team will know how the SOC and associated tools work, they know how to collect the log, how to create use-cases and alerts. They will also know about logging capabilities of most of IT tools, e.g., firewall, IDS/ IPS, etc.</p><p>However, they won't always know which security events are logged by third party applications. They will need support from your SI (System Integrator)/ OEM (Original Equipment Manufacturer).</p><p>Your SI, while implementing the application for you, must help your SOC team to prepare appropriate use-cases. They may do so by making your SOC team aware of the what security events are being logged by the application, construct of the log, etc.</p><p>However, your SI/ OEM won't help you unless you make this activity, a part in their SoW/ SLA.</p><blockquote><p>Make sure that you,</p></blockquote><blockquote><p>Put this activity in your SoW (while identifying proper SI for implementing your enterprise application), that you will need them to help your SOC team to create relevant use-cases and alerts. and,</p></blockquote><blockquote><p>add relevant clauses in your system integrator's contract.</p></blockquote><p>Otherwise you won't get proper logs, nor will you be able to prepare appropriate use-cases/ configure alerts.</p><p><strong>You will be sitting ducks when an attack happens on the application.</strong></p><p>You also need to ensure that your SOC analysts fight <a href="sripati.info/want-to-fight-alert-fatigue-in-soc-do-this/">alert-fatigue</a>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.sripati.info/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">I write at the intersection of pentest, auditing, risk management and career advice. I add context to the infosec risk. I help answer the question 'where is the risk?'</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Want to fight alert fatigue (in SOC)? Do this...]]></title><description><![CDATA[Alert fatigue happens when a soc analyst ends up looking at too many alerts, resulting in missing crucial alerts. So, what's the way out? Read on.]]></description><link>https://www.sripati.info/p/want-to-fight-alert-fatigue-in-soc-do-this</link><guid isPermaLink="false">https://www.sripati.info/p/want-to-fight-alert-fatigue-in-soc-do-this</guid><dc:creator><![CDATA[Sripati MS]]></dc:creator><pubDate>Tue, 13 Feb 2024 21:30:02 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/f8f82c89-fd61-446c-a8ed-30240c501f07_2000x1334.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!b17P!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1416278a-89bb-4876-8daf-e501095fe065_2000x1334.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!b17P!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1416278a-89bb-4876-8daf-e501095fe065_2000x1334.jpeg 424w, https://substackcdn.com/image/fetch/$s_!b17P!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1416278a-89bb-4876-8daf-e501095fe065_2000x1334.jpeg 848w, https://substackcdn.com/image/fetch/$s_!b17P!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1416278a-89bb-4876-8daf-e501095fe065_2000x1334.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!b17P!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1416278a-89bb-4876-8daf-e501095fe065_2000x1334.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!b17P!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1416278a-89bb-4876-8daf-e501095fe065_2000x1334.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1416278a-89bb-4876-8daf-e501095fe065_2000x1334.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!b17P!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1416278a-89bb-4876-8daf-e501095fe065_2000x1334.jpeg 424w, https://substackcdn.com/image/fetch/$s_!b17P!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1416278a-89bb-4876-8daf-e501095fe065_2000x1334.jpeg 848w, https://substackcdn.com/image/fetch/$s_!b17P!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1416278a-89bb-4876-8daf-e501095fe065_2000x1334.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!b17P!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1416278a-89bb-4876-8daf-e501095fe065_2000x1334.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@siavashghanbari?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Siavash Ghanbari</a> / <a href="https://unsplash.com/?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Unsplash</a></figcaption></figure></div><p>Security Operations Center (SOC) is an important part of any defensive infrastructure.</p><p>It is only natural to create alerts for use-cases that an organization deem important. However, alert fatigue could kick-in.</p><p>Alert fatigue happens when a soc analyst ends up looking at so many alerts, that his/ her ability to decide on a suitable action is hampered.</p><p>This puts the organisation at risk. The analyst may miss a crucial alert. However, the analyst didn't do it on purpose. he/ she just got fatigued by looking at so many alerts in a day.</p><p>So, what's the way out?</p><p>one trick could be to name your alerts so that they scream at you to pay attention. e.g., imagine an alert titled in the format below: -</p><blockquote><p>'device control'-'your favourite AV'-'a removable storage device was inserted'</p></blockquote><p>compared to the alert title below: -</p><blockquote><p>'someone inserted a USB'</p></blockquote><p>Which one screams at you? Which title doesn't need you to understand/ de-cipher the meaning?</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.sripati.info/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">I write at the intersection of pentest, auditing, risk management and career advice. I add context to the infosec risk. I help answer the question 'where is the risk?'</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>At the intersection of pentest, auditing, risk management and career advice. Musings based on real experiences, not theory. All infosec, mashed up.</p><p>&#8206;Follow the Risky Context channel on WhatsApp (if WhatsApp is your thing. Your number is not shared with others when you connect to my channel): <a href="https://whatsapp.com/channel/0029VaDqrFU8aKvQohD5nq0r">https://whatsapp.com/channel/0029VaDqrFU8aKvQohD5nq0r</a></p>]]></content:encoded></item><item><title><![CDATA[Security is a cost centre]]></title><description><![CDATA[security is a cost centre in every company, except ...]]></description><link>https://www.sripati.info/p/security-is-a-cost-centre</link><guid isPermaLink="false">https://www.sripati.info/p/security-is-a-cost-centre</guid><dc:creator><![CDATA[Sripati MS]]></dc:creator><pubDate>Mon, 12 Feb 2024 21:30:00 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/5093c831-cd4d-4168-a001-b00c7ca21bd7_2000x1502.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mv0n!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56522b58-0209-4515-b3dc-5262bcf87d5a_2000x1502.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mv0n!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56522b58-0209-4515-b3dc-5262bcf87d5a_2000x1502.jpeg 424w, https://substackcdn.com/image/fetch/$s_!mv0n!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56522b58-0209-4515-b3dc-5262bcf87d5a_2000x1502.jpeg 848w, https://substackcdn.com/image/fetch/$s_!mv0n!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56522b58-0209-4515-b3dc-5262bcf87d5a_2000x1502.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!mv0n!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56522b58-0209-4515-b3dc-5262bcf87d5a_2000x1502.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mv0n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56522b58-0209-4515-b3dc-5262bcf87d5a_2000x1502.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/56522b58-0209-4515-b3dc-5262bcf87d5a_2000x1502.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mv0n!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56522b58-0209-4515-b3dc-5262bcf87d5a_2000x1502.jpeg 424w, https://substackcdn.com/image/fetch/$s_!mv0n!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56522b58-0209-4515-b3dc-5262bcf87d5a_2000x1502.jpeg 848w, https://substackcdn.com/image/fetch/$s_!mv0n!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56522b58-0209-4515-b3dc-5262bcf87d5a_2000x1502.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!mv0n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56522b58-0209-4515-b3dc-5262bcf87d5a_2000x1502.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@joshappel?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Josh Appel</a> / <a href="https://unsplash.com/?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Unsplash</a></figcaption></figure></div><p><a href="https://www.investopedia.com/terms/c/cost-center.asp">Investopedia defines a cost centre</a> as a department/ function within a company that doesn't add to profits, but needs money to operate. e.g., human resources, accounting, admin/ housekeeping, etc.</p><p>They also define a profit centre (in the same page) as a function/ department that adds to profit by their actions. examples include sales, business development, activities directly related to a company's primary line of business, etc.</p><p>In most of the companies, information security is implemented because some regulation/ law/ customer asks for it, lest they lose their business/ customer. Companies whose shares are traded in public, banks, insurance companies, etc. are examples of some organisations that have some security related mandates to follow.</p><h3><em>The only place where security is a profit centre is in a company that provides security services or products. In those companies, the function is directly related to their primary line of business.</em></h3><p><em>It is a cost centre everywhere else.</em></p><p>Every CISO knows it, then why am I talking about it?</p><p>Because 'yad bhaavam, tad bhavati' (as the intention, so you shall be).</p><p>Later...</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.sripati.info/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">I write at the intersection of pentest, auditing, risk management and career advice. I add context to the infosec risk. I help answer the question 'where is the risk?'</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>At the intersection of pentest, auditing, risk management and career advice. Musings based on real experiences, not theory. All infosec, mashed up.</p><p>&#8206;Follow the Risky Context channel on WhatsApp (if WhatsApp is your thing. Your number is not shared with others when you connect to my channel): <a href="https://whatsapp.com/channel/0029VaDqrFU8aKvQohD5nq0r">https://whatsapp.com/channel/0029VaDqrFU8aKvQohD5nq0r</a></p>]]></content:encoded></item></channel></rss>