Home Tags Access Control

Tag: Access Control

A vulnerability in Cisco WebEx Meeting Center could allow an authenticated, remote attacker to initiate connections to arbitrary hosts. The vulnerability is due to insufficient access control for HTTP traffic directed to the Cisco WebEx Meeting Ce...
The P1735 IEEE standard describes methods for encrypting electronic-design intellectual property(IP),as well as the management of access rights for such IP.

The methods are flawed and,in the most egregious cases,enable attack vectors that allow recovery of the entire underlying plaintext IP.
Implementations of IEEE P1735 may be weak to cryptographic attacks that allow an attacker to obtain plaintext intellectual property without the key,among other impacts.
The latest version of the open source container orchestration framework Kubernetes, Kubernetes 1.8, promotes some long-gestating, long-awaited features to beta or even full production release.

And it adds more alpha and beta features as well.The new additions and promotions:Role-based security features. Expanded auditing and logging functions. New and improved ways to run both interactive and batch workloads. Many new alpha-level features, designed to become full-blown additions over the next couple of releases. [ Are you ready for the container invasion? Learn how to get started with Kubernetes. | Keep up with the latest developments in cloud computing with InfoWorldrsquo;s Cloud Computing newsletter. ]Kubernetes 1.8rsquo;s new security features Earlier versions of Kubernetes introduced role-based access control (RBAC) as a beta feature. RBAC lets an admin define access permissions to Kubernetes resources, such as pods or secrets, and then grant (“bindrdquo;) them to one or more users. Permissions can be for changing thingsnbsp;(“createrdquo;, “updaterdquo;, “patchrdquo;) or just obtaining information about them (“getrdquo;, “listrdquo;, “watchrdquo;). Roles can be applied on a single namespace or across an entire cluster, via two distinct APIs.To read this article in full or to leave a comment, please click here
DAILY VIDEO: Whole Foods is investigating a payment card data breach; Kubernetes 1.8 improves security with role-based access control; Google reports government demands for user data is at an all-time high; and there's more.
The third major release of Kubernetes in 2017 debuts, finally providing stable support for a critical security feature.
The third major release of Kubernetes in 2017 debuts, finally providing stable support for a critical security feature.
The worldrsquo;s first and only autonomous data network underlines its superiority for protecting data.Troon, SCOTLAND, September 22nd, 2017 – Today MaidSafe, developer of the worldrsquo;s first and only autonomous data network, is announcing the Authenticator Release of the SAFE Network.

This Alpha 2 release includes a new mechanism for access control (the Authenticator) that integrates mobile platform support, as well as updated demonstration apps. MaidSafersquo;s progress underlines its commitment to making the security of data... Source: RealWire
One of the hardest parts about writing a user-facing app or service is controlling access to resources.

Decisions about access control are some of the earliest to be made and can make or break an entire platform.
Itrsquo;s usually a trade-off between granularity and speed. Letrsquo;s explore how to leverage Redis to get granular control and speed at the same time.One approach is to set up “user levels,” typically numbers or roles such as “admin,” “regular user,” “privileged user,” etc.

This approach alone is usually not a very viable path as you run into a never-ending additive process (“super-super-adminrdquo; or “disabled-regular-user,” etc.) or create a mess of widely spaced user levels and hope for the best.To read this article in full or to leave a comment, please click here
Aruba's IntroSpect User Entity and Behavior Analytics technology gets integrated with ClearPass Network Access Control to provide an adaptive attack response capability.
A vulnerability in certain filtering mechanisms of access control listsnbsp;(ACLs) for Cisconbsp;ASR 5000 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to bypass ACL rules that have been conf...
A vulnerability in the web proxy functionality of the Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to forward traffic from the web proxy interface of an affected device to the administrative ma...
Although basic operations in Amazon's Simple Storage Services are (as the name implies) - simple - things can get complicated with access control and permissions.