Silicon Shecky

Infosec Practitioner

  • About
  • Categories
    • General
    • Computers
    • Software
    • Rants
    • Security
    • Internet/Music
    • Reviews
    • Microsoft
    • Hardware
    • Mobile Computing
  • Links
    • Infosec
      • Burbsec
      • Infosec Exchange Mastodon
      • Hacks4Pancakes Blog
      • Krebs On Security
      • Bleeping Computer
  • Archives

Connect

  • Bluesky
  • LinkedIn
  • Mastodon
  • RSS
  • Twitter

[footer_backtotop]

Copyright © 2025 ·Sixteen Nine Pro Theme · Genesis Framework by StudioPress · WordPress

Solarwinds Sunbursts a Supernova: Early lessons learned

December 22, 2020 By Michael Kavka Leave a Comment

There will be more fallout from Solarwinds to come. More companies will realize they are compromised due to either SUNBURST or SUPERNOVA (got to love the catchy, similar style names).

The question is what are you and your company going to do about it? What have you and your company learned?

Do not just throw money at this. Vendors will start trying to use this as a marketing ploy, especially to those that do in house development. If you do in house development, work on getting your Secure Development Lifecycle (SDLC) better. Do not over promise and over push your developers. If developers say they need some extra time for security testing, understand it will save you more issues in the long run. Understand that meeting compliance check boxes will not mean that security was met.

The rest of the corporate world should be doing a few things starting with your people and processes. Make sure that your company has in place a solid detection process, which includes enough staff, proper logging, solid SIEM/SOAR rules and notebooks, and a solid Incident Response plan. If your company is lacking in any of these, and that includes keeping people trained, it will be money well spent in the long term. Your company will get breached at some point and these processes plus properly trained people will always be needed. There is no perfect security, so detection is as important if not more important.

Understand there is no magic bullet. Security is a process not a destination, and burned out, overworked security people (especially in the SOC) do your company no good. Compensating by getting more and more tools without enough staff will cause burnout. People can only do so much in any given time. Make sure they get time off, and that means not disturbing them when they are off, if possible.

These are the lessons every company should learn from this situation.

 

 

Filed Under: Rants, Security Tagged With: Security, Solarwinds, Sunburst, Supernova

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

RSS Taggart Institute Intel Feed

  • Microsoft: Copilot now lets you build apps, automate workflows October 28, 2025 Sergiu Gatlan
  • Microsoft sued for allegedly tricking millions into Copilot M365 subscriptions October 28, 2025 Bill Toulas
  • Exclusive: OpenAI’s Atlas browser — and others — can be tricked by manipulated web content October 28, 2025 djohnson
  • HTTPS by default October 28, 2025 Google
  • Google Chrome to warn users before opening insecure HTTP sites October 28, 2025 Sergiu Gatlan
  • TEE.Fail attack breaks confidential computing on Intel, AMD, NVIDIA CPUs October 28, 2025 Bill Toulas
  • GCP-2025-063 October 28, 2025 Google Cloud Documentation
  • Grokipedia Is the Antithesis of Everything That Makes Wikipedia Good, Useful, and Human October 28, 2025 Jason Koebler
  • Rogue Goodreads Librarian Edits Site to Expose 'Censorship in Favor of Trump Fascism’ October 28, 2025 Matthew Gault
  • New Android malware mimics human typing to evade detection, steal money October 28, 2025

Browse by tags

Active Directory Android Antivirus Apple Beta Chrome Computers Exchange Exchange 2007 Firefox General Thoughts Google InfoSec Internet Explorer iOS iPad IT Linux Mac Malware Microsoft OS OSx Patches Rants SBS SBS 2008 Security Security Patches Server SMB Software Support Surface TechEd Tweets Ubuntu Verizon Virus Vista vulnerabilities Windows Windows 7 Windows 8 XP