ã¿ãªã¼ãºã®ä»¶ãCSPãè¨ç½®ããã¦ãããé²ãã¦ããã¨ãã話ãããã¾ãããããã¯æ£ããã§ããããï¼ CSPãè¨å®ãã¦ããªãã£ãã¨ãã¦ããæ³å®ãã¦ããªãå¤é¨ã¸ã®ãªã¯ã¨ã¹ããçºçãã¦ããªãããå®æçã«ãã§ãã¯ãããã¨ã大äºã§ãããï¼ ã¿ãªã¼ãºã®ãµã¤ãããã®ã¯ã¬ã¸ããã«ã¼ãæ å ±æ¼ããã«ã¤ãã¦ãCSP(Content Security Policy)ãintegrityå±æ§ï¼ãµããªã½ã¼ã¹å®å ¨æ§ï¼ã®éè¦æ§ãããããã£ãã¨ããæè¦ãX(Twitter)ä¸ã§ç®ã«ãã¾ãããããããã§ã®ç·©åã¯é£ããã¨æãã¾ãã ã¾ããCSPã®æ¹ã§ãããä»åã®ä»¶ã§ã¯å ã èªã¿è¾¼ãã§ããã¹ã¯ãªãããæ¹ãããããã¨èããããã®ã§ããªãªã¸ã³ã¨ãã¦ã¯æ£è¦ã®ãã®ã§ããevalã使ããã¦ããã®ã§CSPã§å¶éãããã¨èãã¦ãã人ãå¤ãã§ãããevalã¯é£èªåã®ããã«ä½¿ããã¦ããã®ã§ãevalã使ããªããã¨ã¯å¯è½ã§ããå人çã«ã¯ãé£èªåããªãæ¹ã
AWS Foundational Security Best Practices v1.0.0 (FSBP) standard The AWS Foundational Security Best Practices standard is a set of controls that detect when your AWS accounts and resources deviate from security best practices. The standard lets you continuously evaluate all of your AWS accounts and workloads to quickly identify areas of deviation from best practices. It provides actionable and pres
ããã¯ãè±èµãããããã¼ãµã¤ãã¢ããã³ãã«ã¬ã³ãã¼2022第8æ¥ç®ã®è¨äºã§ãã JSON Web Token(JWT)ã®åèªãç®ã«ãããã¨ãããããã¨æãã¾ãããããã¨ä¸ç·ã«èªè¨¼ã¨èªå¯ããRSAã®ç½²åãæå·åãããã¦OpenIDConnectãOAuth2.0ã¾ã§ã¨é£ããããªç¨èªã¨ã»ããã§èª¬æããããã¨ãå¤ããããJWTã£ã¦é£ãããªãã¨æãããã¡ã§ããããããJWTèªä½ã¯ã·ã³ãã«ã§åããããããã®ã§ããããã§ä»åã¯ç´ ã®JWTã®èª¬æããJWSãããã¦JWT(JWS)ã使ã£ãèªè¨¼ã段éçã«èª¬æãã¦ããã¾ãã ããªããã®è¨äºã¯JWTå ¨ä½ã®ä»çµã¿ã使ãæ¹ã®ç解ãç®çã¨ãã¦ããããã以ä¸ã®èª¬æã¯è¡ãã¾ããã RSAãHMACãªã©æå·åãã¢ã«ã´ãªãºã ã®ç´°ãã説æ JWTãæå·åããJWEã¨JSONã®æå·éµè¡¨ç¾ã®JWKã«ã¤ã㦠OpenIDConnectã¨OAuth2.0ã«ã¤ã㦠è¨äºã¯ä¸è¨ã®ãããªå 容
ritouã§ãããã®ããããªã¤ã³ã¿ã¼ãããã«ãããåæ稿ã§ãã ããããããã®ããããªã¤ã³ã¿ã¼ãããã®IDé£æºã§ã¯æ¬¡ã®ãããªè¨è¨ã«ãªã£ã¦ãã¾ãããããåãåãããããã¦ããã ãã対å¿ããã ãã¾ããã ããã¾ã§ãQiitaãªã©ã§åæ§ã®å®è£ ä¾ãç´¹ä»ããã¦ããéã«ã¯ã³ã¡ã³ãããã¦ããã ãã¦ãããã®ã§ãã®ã§ãã¢ã³ããã¿ã¼ã³ã®ç´¹ä»è¨äºã¨ãã¦èªãã§ããã ããã°ã¨æãã¾ãã ãGoogleã¢ã«ã¦ã³ãã§ãã°ã¤ã³ãã§ã¯ãããã¨ãã¦ã¼ã¶ã¼ãä½æãããGoogleããåãåã£ãã¡ã¼ã«ã¢ãã¬ã¹([email protected])ãè¨å®ããã 次åãããGoogleã¢ã«ã¦ã³ãã§ãã°ã¤ã³ããããã¨ãGoogleããåãåã£ãã¡ã¼ã«ã¢ãã¬ã¹ã§ã¦ã¼ã¶ã¼ãåç § 試ãã«ã次ã®ãããªæµãã§åä½ã確èªãã¦ã¿ã¾ãã ãGoogleã¢ã«ã¦ã³ãã§ãã°ã¤ã³ãã§ã¢ã«ã¦ã³ãä½æ([email protected]) ãã¡ã¼ã«ã¢ãã¬ã¹å¤æ´ã
2023/10/05 Offersããã®ã¤ãã³ãã§ã®è³æã§ãã https://offers.connpass.com/event/295782/ ã¤ãã³ãå¾ã®æºè¶³åº¦ã¢ã³ã±ã¼ãï¼5ç¹æºç¹ï¼ã®çµæã¯ä»¥ä¸ã«ãªãã¾ãã 5ç¹: 49% 4ç¹: 39% 3ç¹: 8% 2ç¹: 4% ãã¡ãã®ã¹ã©ã¤ãã®å 容ã¯ä»¥ä¸ã®æ¬ã®æç²ã«ãªãã¾ãããã¢ã®å 容ããã®ã¹ã©ã¤ãã§ã¯è§¦ãã¦ããªããã¨ã«ã¤ãã¦ãèå³ããå ´åã¯ä»¥ä¸ã®æ¬ããåç §ãã ããã https://authya.booth.pm/items/1296585 https://authya.booth.pm/items/1550861 æ¬çºè¡¨ã§æ±ã£ã¦ããªãã»ãã¥ãªãã£ã«é¢ãã¦ã¯ä»¥ä¸ã®æ¬ãããããã§ãã https://authya.booth.pm/items/1877818 æ¬ã®è©å¤ https://togetter.com/li/1477483
ä¸æ£ã¢ã¯ã»ã¹ã«ããIDã¨ãã¹ã¯ã¼ãã®æ¼æ´©ãåãã¦ãMD5ã«ããããã·ã¥åã«ã¤ãã¦è©±é¡ã«ãªã£ã¦ãã¾ãããã·ã¹ãã ãä½ãä¸ã§ããã¹ã¯ã¼ãã®ç®¡çãèªè¨¼ã¯ã©ãè¨è¨ãã¹ãããèããããã«ãå°ãæ´çããã¦ã¿ã¾ããããäºå®èª¤èªãããã°ãã©ãã©ããææãã ããã == 2023/8/21è¿½è¨ == ãã®è¨äºã¯ãããã·ã¥ã®ä¿åã®ä»æ¹ä¸ã¤ã¨ã£ã¦ãã沢山ã®å¯¾çæ¹æ³ãå¿ è¦ã§ããã¨ãããã¨ããä¼ãããããã«è¨è¼ãã¦ãã¾ããããã¦ãããããç´¹ä»ããææ³ãåãã°å®å ¨ã¨ãå§ããã¦ãã訳ã§ã¯ãªãã®ã§ããã®ç¹ããçæããã ããã°ã¨æãã¾ããæ»æææ³ã«å¿ãã¦ã®å¯¾å¿çã®å¤é·ãç¥ã£ã¦ããã ããã¨ã§ãã»ãã¥ãªãã£å¯¾çã¯ä¸åº¦è¡ãã°å®å ¨ã¨ãããã®ã§ã¯ãªããã¨ãç¥ã£ã¦é ãããã«ã±ã«ãªãã°å¹¸ãã§ãã == 追è¨çµãã == ãã¹ã¯ã¼ãã®ããã·ã¥å ã¾ãæåã«ãã¹ã¯ã¼ãã®ä¿åæ¹æ³ã§ããä½ãå å·¥ããªãã§å¹³æã§ä¿åããã®ã¯é§ç®ã¨ããã®ã¯ãã ãã¶èª
pictBLandã¨pictSQUAREã«å¯¾ããä¸æ£ã¢ã¯ã»ã¹ãããããã¹ã¯ã¼ããã½ã«ããªãã®MD5ããã·ã¥ã§ä¿åããã¦ãããã¨ã話é¡ã«ãªã£ã¦ãã¾ãã 2023å¹´8æ16æ¥ã«å¤é¨ã®ãã©ã¼ã©ã ã«pictSQUAREããçªåããæ å ±ã¨ä¸»å¼µãããã¼ã¿è²©å£²ã®åå¼ãæã¡æããæ稿ãè¡ãããï¼ä¸ç¥ï¼ãã¹ã¯ã¼ãã¯MD5ã«ããããã·ã¥åã¯è¡ããã¦ãããã®ã®ã½ã«ãä»ä¸ã¯è¡ããã¦ããªãã£ããããåç´ãªãã¹ã¯ã¼ãã使ç¨ããã¦ãã29ä¸4512件ã¯å ã®æååãå¤æãã¦ããã¨æ稿ãï¼ãã以å¤ã®26ä¸8172件ã¯ã¾ã MD5ããã·ã¥åãããã¾ã¾ã¨èª¬æãï¼ ä¸æ£ã¢ã¯ã»ã¹ã«ããpictBLandãpictSQUAREã®æ å ±æµåºã®å¯è½æ§ã«ã¤ãã¦ã¾ã¨ãã¦ã¿ã - piyolog ããå¼ç¨ ããã«é¢é£ãã¦MD5ããã·ã¥ãã½ã«ãã«é¢ãããã¤ã¼ã(post)ã観å¯ããã¨ãããã©ããã½ã«ãã®ç解ãééã£ã¦ããæ¹ãå¤ããããªæ°ããã¾ããã
The twelve-factor app manifesto recommends that you pass application configs as ENV variables. However, if your application requires a password, SSH private key, TLS Certificate, or any other kind of sensitive data, you shouldn't pass it alongside your configs. When you store your secret keys in an environment variable, you are prone to accidentally exposing themâexactly what we want to avoid. Her
å¤æ©è½ãªã¦ã§ããµã¼ãã¼ã¨ãã¦2004å¹´ã«ç»å ´ããNginxã¯ã2023å¹´6ææç¹ã§ã¯æ¥çãããã·ã§ã¢ã¨ãªãã»ã©äººæ°ãéãããµã¼ãã¼ã§ãããããªNginxã®è¨å®ã«ããã¦ãã¹ã©ãã·ã¥ãä¸ã¤ä»ãããä»ããªããã®å·®ã§å¤§ããªã»ãã¥ãªãã£ãã¼ã«ãã§ãã¦ãã¾ãåé¡ã«ã¤ãã¦ã大æãã¹ã¯ã¼ãããã¼ã¸ã£ã¼ãGoogle製ã®ãã¼ã«ã®ä¾ãã¨ãããã¦ã»ãã¥ãªãã£ã¢ããªã¹ãã®ããã¨ã«ã»ããã¢ããããããã°ã§è§£èª¬ãã¦ãã¾ãã Hunting for Nginx Alias Traversals in the wild https://labs.hakaioffsec.com/nginx-alias-traversal/ Nginxã®è¨å®ã«ã¯ãç¹å®ã®URLã¸ã®ã¢ã¯ã»ã¹ãã©ãå¦çããã¹ãããè¨è¿°ã§ãããlocationãã¨ãããã£ã¬ã¯ãã£ããåå¨ãã¦ãããURLããµã¼ãã¼å ã®ãã¡ã¤ã«ã«å¯¾å¿ãããã®ã«ããå©ç¨ããã¦ãã¾ããä¾
Breaches you were pwned in A "breach" is an incident where data has been unintentionally exposed to the public. Using the 1Password password manager helps you ensure all your passwords are strong and unique such that a breach of one service doesn't put your other services at risk. Pastes you were found in A paste is information that has been published to a publicly facing website designed to share
ã¯ããã«@typesã¹ã³ã¼ãã管çãã¦ããDefinitely Typedã¯ãMicrosoftããæ¯æ´ãåãã¦ãããã®ã®ãMicrosoftã®èå¼±æ§å ±å¥¨éå¶åº¦ã«ãããã»ã¼ããã¼ãã¼ã®å¯¾è±¡ã§ã¯ããã¾ããã1 æ¬è¨äºã¯ãå ¬éããã¦ããæ å ±ãå ã«èå¼±æ§ã®åå¨ãæ¨æ¸¬ããå®éã«æ¤è¨¼ãããã¨ãªãæ½å¨çãªèå¼±æ§ã¨ãã¦å ±åããåé¡ã«é¢ãã¦èª¬æãããã®ã§ãããç¡è¨±å¯ã®èå¼±æ§è¨ºæè¡çºãæ¨å¥¨ãããã¨ãæå³ãããã®ã§ã¯ããã¾ããã Definitely Typedã«èå¼±æ§ãçºè¦ããå ´åã¯ãDefinitely Typedã®ã¡ã³ãã¼ã¸å ±åãã¦ãã ããã è¦ç´Definitely Typedã®ãã«ãªã¯ã¨ã¹ã管çBotã«èå¼±æ§ãåå¨ããæªæã®ãããã«ãªã¯ã¨ã¹ããDefinitelyTyped/DefinitelyTypedãªãã¸ããªã¸ãã¼ã¸ãããã¨ãå¯è½ã ã£ãã ããã«ãããnpmä¸ã®@typesã¹ã³ã¼ãé ä¸ã«åå¨ã
2022å¹´8æ7æ¥ãç±³å½ã®ã¯ã©ã¦ãã³ãã¥ãã±ã¼ã·ã§ã³ãã©ãããã©ã¼ã ãµã¼ãã¹ãæä¾ããTwilioã¯å¾æ¥å¡ãã¹ããã·ã³ã°ã«ããã¢ã«ã¦ã³ã侵害ãåãããã®å¾ã«å社ãµã¼ãã¹ã®é¡§å®¢é¢é£æ å ±ã¸ä¸æ£ã¢ã¯ã»ã¹ãçºçãããã¨ãå ¬è¡¨ãã¾ãããã¾ããCloudflareãé¡ä¼¼ã®æ»æã«åãã¦ãããã¨ãå ¬è¡¨ãã¾ãããããã§ã¯é¢é£ããæ å ±ãã¾ã¨ãã¾ãã ç±³å½2社ãç¸æ¬¡ãå ¬è¡¨ Twilioã¨Cloudflareã¯ãå¾æ¥å¡ã«å¯¾ããä½è ããIT管çè ããã®éç¥ã«ãªããã¾ããSMSãéããè¨è¼ãããURLãããã£ãã·ã³ã°ãµã¤ãã¸èªå°ãããäºä¾ãçºçãããã¨ãå ±åã 2022å¹´8æ7æ¥ Twilio Incident Report: Employee and Customer Account Compromise 2022å¹´8æ10æ¥ Cloudflare The mechanics of a sophisticated
This image includes the work that is distributed in the Apache License Version 2.0 ããã«ã¡ã¯ãæ ªå¼ä¼ç¤¾Flatt Securityã§ã¤ã³ã¿ã¼ã³ããã¦ããMarina (@marin_a___) ã§ããæ¬ç¨¿ã¯ã½ããã¦ã§ã¢ãµãã©ã¤ãã§ã¼ã³é åã§æ³¨ç®ãéãã Sigstore ããã¸ã§ã¯ãã«ã¤ãã¦ã®è¨äºã§ãã Sigstoreã¨ã¯ Cosign ã«ãããã¼ã«ã«ã®éµãã¢ãç¨ããç½²åæ¹æ³ å ¬ééµã¨ç§å¯éµã®ãã¢ã®ä½æ ä½æããéµãç¨ããã³ã³ããã¤ã¡ã¼ã¸ã®ç½²å å ¬ééµãç¨ããç½²åæ¤è¨¼ å°ã¾ã¨ã: å ¨ä½ã®æµã éµç®¡çã«é¢ããèª²é¡ OpenID Connect ãæ´»ç¨ããç½²åï¼Keyless Signingï¼ Keyless Signing ã®ä»çµã¿ Keyless Signing ã®å ·ä½çãªå©ç¨æ¹æ³ æ¹æ³1: 人åã§èªè¨¼ã
åããæã£ã¦ããã¨ãã¡ãã£ã¨æ¸ããã«ããããªããªã£ãã®ã§ãã¨ã ãæ¸ãã¾ããã èæ¯ åé¡ æ¤ç¥ãã¦ããæ¹ãæ£ããããã«è¦ããã¡ æ¡ä»¶ãæããã®ãé£ãã ç°å¢ã®åç¾ãé£ãã æ¤ç¥æ°ãå¤ãæ¹ãè¯ãããã«è¦ãã æ£è§£ãã©ããã®å¤æãé£ãã ã«ãã¼ç¯å²ã®æ£ç¢ºãªè¦æ¥µããé£ãã æ¤ç¥ãããªãã»ããå¬ãã ã¾ã¨ã èæ¯ ãå誰ã ãã£ã¦ãªããããããªãã®ã§æ¸ãã¦ããã¨ãTrivyã¨ããèå¼±æ§ã¹ãã£ãã¼ã®ã¡ã³ããããã£ã¦ãã¾ãã github.com ã¨ããæåãªæ¹ã«ãã以ä¸ã®ãã¤ã¼ããããã¾ããã I just discovered, during @cloudflare #SecurityWeek no less, that Trivy (the vuln scanner) doesn't detect known issues in Alpine images. Including a critica
æ¬æ¸ã§ã¯GitHub Organizationãã»ãã¥ã¢ã«éç¨ããæ¹æ³ã«ã¤ãã¦è§£èª¬ãã¾ãã GitHubã¯å¤§å¤ä¾¿å©ãªãµã¼ãã¹ã§ãå人å©ç¨ã®ã¿ãªããçµç¹ã§æ´»ç¨ãããã±ã¼ã¹ãå¤ãã§ãããããGitHubã®åæè¨å®ã¯å©ä¾¿æ§éè¦ã§ãããã»ãã¥ãªãã£å¯¾çã¯å©ç¨è ã«ããæ示çãªè¨å®ãå¿ è¦ã§ãã æ¬æ¸ã§ã¯æå¤ã¨æ¥æ¬èªã§ã¾ã¨ã¾ã£ãæ å ±ããªããOrganizationã¬ãã«ã®ãã¹ããã©ã¯ãã£ã¹ãä½ç³»åãã¦ãã¾ããGitHub Organization管çè ã¯ãã¡ããã®ãã¨ãã½ããã¦ã§ã¢éçºè ã«ãæçãªæ å ±ãæä¾ãã¾ãã
ANDPADãã¼ããã¼ã ã®åç°(tomtwinkle)ã§ãã Node.jsã® mysqljs/mysql ã®ä»æ§ã«èµ·å ããSQLã¤ã³ã¸ã§ã¯ã·ã§ã³ã話é¡ã«ä¸ãã£ã¦ããã®ã§ãããGolangã®ORMã§ããGormã§ãåããããªãä»æ§ãããããï¼ ã¨ãã注æåèµ·ã®æå³ãè¾¼ãã¦çãå·ãã¾ããã â» 2022/02/21è¿½è¨ ã³ã¼ãã¬ãã¥ã¼ãèªååãã¦ææãã¦ãããè¨äºãå ¬éãã¾ããï¼ tech.andpad.co.jp Node.jsã®MySQLããã±ã¼ã¸ã«ãããã¨ã¹ã±ã¼ãå¦çã ãã§ã¯é²ããªããé ãããSQLã¤ã³ã¸ã§ã¯ã·ã§ã³ | æ ªå¼ä¼ç¤¾Flatt Security TL;DR Gormã®Query Conditionsé¢æ°ã«é¢ããå±éºãªä»æ§ 対ç ç· ã TL;DR Gormã®Conditionsé¢æ°(Find, First, Delete...)ã使ç¨ããéã第2å¼æ°ã®å¤ã«Stringãå¼ã渡
IPã¢ãã¬ã¹ã¯ãELB (å½å å)ãGlobal Accelerator(æµ·å¤å) ã®IPã¢ãã¬ã¹ã§å©ç¨ä¸ã®ãã®ã§ããã $ host 75.2.71.201 201.71.2.75.in-addr.arpa domain name pointer a5b041b48e73d3807.awsglobalaccelerator.com. $ host 52.194.15.214 214.15.194.52.in-addr.arpa domain name pointer ec2-52-194-15-214.ap-northeast-1.compute.amazonaws.com. $ host dev.classmethod.jp dev.classmethod.jp has address 75.2.71.201 dev.classmethod.jp has address 99.83.1
2021å¹´12æ10æ¥ãJavaãã¼ã¹ã®ãã°åºåã©ã¤ãã©ãªãApache Log4jãã®2.xç³»ãã¼ã¸ã§ã³ï¼ä»¥éã¯Log4j2ã¨è¨è¼ï¼ã§ç¢ºèªãããæ·±å»ãªèå¼±æ§ãä¿®æ£ãããã¼ã¸ã§ã³ãå ¬éããã¾ãããã»ãã¥ãªãã£é¢ä¿çµç¹ã§ã¯éå»è©±é¡ã«ãªã£ãHeartbleedãShellshockã¨åã¬ãã«ã®èå¼±æ§ã¨ãè©ä¾¡ãã¦ãã¾ããããã§ã¯é¢é£ããæ å ±ãã¾ã¨ãã¾ãã ï¼ï¼ä½ãèµ·ããã®ï¼ Javaãã¼ã¹ã®ãã°åºåã©ã¤ãã©ãªLog4j2ã§æ·±å»ãªèå¼±æ§ï¼CVE-2021-44228ï¼ãä¿®æ£ãããã¼ã¸ã§ã³ãå ¬éãããããã®å¾ãä¿®æ£ãä¸å®å ¨ã§ãã£ããã¨ãªã©ãçç±ã«2件ã®èå¼±æ§ãä¿®æ£ãããã åºãå©ç¨ããã¦ããã©ã¤ãã©ãªã§ããããå½±é¿ãåãã対象ãå¤ãåå¨ããã¨ã¿ãããæ»æã容æã§ãããã¨ãã2014å¹´ã®HeartbleedãShellshock以æ¥ã®å±éºæ§ãããã¨ã¿ãåãããããThe Apache Software
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}