{"id":1410,"date":"2021-02-11T09:00:00","date_gmt":"2021-02-11T15:00:00","guid":{"rendered":"https:\/\/packitforwarding.com\/?p=1410"},"modified":"2021-02-11T07:57:35","modified_gmt":"2021-02-11T13:57:35","slug":"trust-no-one","status":"publish","type":"post","link":"https:\/\/packitforwarding.com\/index.php\/2021\/02\/11\/trust-no-one\/","title":{"rendered":"Trust No One?"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Solarwinds<\/h2>\n\n\n\n<p>The last few months have been crazy when it comes to cybersecurity. It started with the SolarWinds Orion security breach. The software used by a vast majority of enterprise customers in the world was altered to include a malicious payload. This altered version was then disseminated to the world through SolarWinds update servers.<\/p>\n\n\n\n<p>The initial guidance of many in the information security community, including the US-CERT, was to immediately shut down all SolarWinds Orion servers and leave them off. This was the right thing to do at the time.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">TeamViewer<\/h2>\n\n\n\n<p>This week the town of Oldsmar, Florida was targeted by a bad actor that gained access to their water treatment plant&#8217;s SCADA system. The actor used TeamViewer to remotely control the SCADA control PC. While doing so they increased the amount of Sodium Hydroxide (lye) put into the treated water. The amount would have poisoned the town&#8217;s water supply. Thankfully the operator on duty noticed the change and corrected it quickly. <\/p>\n\n\n\n<p>The details of this attack aren&#8217;t yet fully known, but it is <a href=\"https:\/\/arstechnica.com\/information-technology\/2021\/02\/breached-water-plant-employees-used-the-same-teamviewer-password-and-no-firewall\/\" target=\"_blank\" rel=\"noreferrer noopener\">reported<\/a> that the TeamViewer installed on the machine was using a simple username and password combination without MFA. This is a common, albeit insecure, configuration of the TeamViewer software. My speculation is that there will be more details coming out that will indicate a chain of events, probably including a compromise of a third party that used TeamViewer to support the SCADA system. <\/p>\n\n\n\n<p>In both of these attacks, the response has been quick to vilify the software used. In TeamViewer&#8217;s case, it&#8217;s always been targeted by cybersecurity teams as a problem, but it&#8217;s one of those applications that seem to be ubiquitous in most environments. Mostly this is because it is easy to use and is used by many organizations to support their customers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Unpopular Opinion<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"427\" data-attachment-id=\"1414\" data-permalink=\"https:\/\/packitforwarding.com\/index.php\/2021\/02\/11\/trust-no-one\/pexels-photo-932638\/\" data-orig-file=\"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2021\/02\/pexels-photo-932638.jpeg?fit=1880%2C1253&amp;ssl=1\" data-orig-size=\"1880,1253\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;Photo by Blaque X on &lt;a href=\\&quot;https:\/\/www.pexels.com\/photo\/fish-underwater-932638\/\\&quot; rel=\\&quot;nofollow\\&quot;&gt;Pexels.com&lt;\/a&gt;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;fish underwater&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"pexels-photo-932638\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;Photo by Blaque X on &lt;a href=&quot;https:\/\/www.pexels.com\/photo\/fish-underwater-932638\/&quot; rel=&quot;nofollow&quot;&gt;Pexels.com&lt;\/a&gt;&lt;\/p&gt;\n\" data-large-file=\"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2021\/02\/pexels-photo-932638.jpeg?fit=640%2C426&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2021\/02\/pexels-photo-932638.jpeg?resize=640%2C427&#038;ssl=1\" alt=\"fish underwater\" class=\"wp-image-1414\" srcset=\"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2021\/02\/pexels-photo-932638.jpeg?w=1880&amp;ssl=1 1880w, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2021\/02\/pexels-photo-932638.jpeg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2021\/02\/pexels-photo-932638.jpeg?resize=1024%2C682&amp;ssl=1 1024w, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2021\/02\/pexels-photo-932638.jpeg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2021\/02\/pexels-photo-932638.jpeg?resize=1536%2C1024&amp;ssl=1 1536w, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2021\/02\/pexels-photo-932638.jpeg?w=1280&amp;ssl=1 1280w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><figcaption>Photo by Blaque X on <a href=\"https:\/\/www.pexels.com\/photo\/fish-underwater-932638\/\" rel=\"nofollow\">Pexels.com<\/a><\/figcaption><\/figure>\n\n\n\n<p>I hold the potentially unpopular opinion that we can&#8217;t always just say throw it out. Cybersecurity is a spectrum between secure systems and allowing business processes to function. We can make a completely secure system by powering it off, encasing it in concrete, and dumping it into the Marianas Trench, but that system isn&#8217;t able to support the business. Likewise, we could remove all barriers to the business being able to do their work, but this would quickly lead to a massive breach. <\/p>\n\n\n\n<p>Even if every instance of SolarWinds and TeamViewer is eliminated from a corporate network, the needs that they filled will still exist. Instead of SolarWinds maybe they will use PRTG or another competitor. TeamViewer might be replaced with a competitor like LogMeIn. In either case the replacement could be just as vulnerable as the original. It&#8217;s not possible to say to the business that they have to just not fill these roles. Monitoring systems and remote access for support are both needed to maintain business processes.<\/p>\n\n\n\n<p>A worse prospect is that by blocking tools, the business will circumvent security and IT all together. Shadow IT is worse than any application. It&#8217;s better to know what is being run. At least then you can put controls around the application.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Final Thoughts<\/h2>\n\n\n\n<p>Breaches make great headlines. IT professionals though should take the time to make reasonable decisions about long term responses though. Proper procedures, controls, and audits are the way to go. No network is completely secure. In fact, we need to assume that EVERY network will be compromised. Our job is to minimize the damage. My company has an internal motto of &#8220;Negative One Trust&#8221; in all that we do. Zero Trust is possible and should be the goal. Yes it&#8217;s painful at times to implement, but the benefits out pace that pain. <\/p>\n\n\n\n<p>Look at your traffic, north-south and east-west. Should your SolarWinds server be talking directly to an external DNS server? Should those DNS packets contain data that&#8217;s not DNS? We have to look for the anomalies and block them. The days of trusting all traffic from our internal hosts is past. We must trust but verify!<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-4-3 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/As6y5eI01XE?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\"><\/iframe><\/span>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Solarwinds The last few months have been crazy when it comes to cybersecurity. It started with the SolarWinds Orion security breach. The software used by a vast majority of enterprise customers in the world was altered to include a malicious payload. This altered version was then disseminated to the world through SolarWinds update servers. The [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1415,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"Trust No One? An unpopular opinion about Solarwinds and TeamViewer. #cybersecurity #infosec #zerotrust #ciscochampion","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[88,137],"tags":[138,225],"class_list":["post-1410","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cybersecurity","tag-cybersecurity","tag-opinion"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Trust No One? -<\/title>\n<meta name=\"description\" content=\"With every breach, there must be a root cause. But do these root causes always need to be excised? Not with Zero Trust networks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/packitforwarding.com\/index.php\/2021\/02\/11\/trust-no-one\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trust No One? -\" \/>\n<meta property=\"og:description\" content=\"With every breach, there must be a root cause. But do these root causes always need to be excised? Not with Zero Trust networks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/packitforwarding.com\/index.php\/2021\/02\/11\/trust-no-one\/\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/packitforwarding\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/packitforwarding\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-11T15:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i1.wp.com\/packitforwarding.com\/wp-content\/uploads\/2021\/02\/pexels-photo-5473950.jpeg?fit=867%2C1300&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"867\" \/>\n\t<meta property=\"og:image:height\" content=\"1300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ben Story\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/www.twitter.com\/ntwrk80\" \/>\n<meta name=\"twitter:site\" content=\"@ntwrk80\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ben Story\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2021\\\/02\\\/11\\\/trust-no-one\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2021\\\/02\\\/11\\\/trust-no-one\\\/\"},\"author\":{\"name\":\"Ben Story\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#\\\/schema\\\/person\\\/441c2562293c45fbcf483f246430e6c8\"},\"headline\":\"Trust No One?\",\"datePublished\":\"2021-02-11T15:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2021\\\/02\\\/11\\\/trust-no-one\\\/\"},\"wordCount\":677,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#\\\/schema\\\/person\\\/441c2562293c45fbcf483f246430e6c8\"},\"image\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2021\\\/02\\\/11\\\/trust-no-one\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/pexels-photo-5473950.jpeg?fit=867%2C1300&ssl=1\",\"keywords\":[\"cybersecurity\",\"opinion\"],\"articleSection\":[\"Blog\",\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2021\\\/02\\\/11\\\/trust-no-one\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2021\\\/02\\\/11\\\/trust-no-one\\\/\",\"url\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2021\\\/02\\\/11\\\/trust-no-one\\\/\",\"name\":\"Trust No One? -\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2021\\\/02\\\/11\\\/trust-no-one\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2021\\\/02\\\/11\\\/trust-no-one\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/pexels-photo-5473950.jpeg?fit=867%2C1300&ssl=1\",\"datePublished\":\"2021-02-11T15:00:00+00:00\",\"description\":\"With every breach, there must be a root cause. But do these root causes always need to be excised? Not with Zero Trust networks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2021\\\/02\\\/11\\\/trust-no-one\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2021\\\/02\\\/11\\\/trust-no-one\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2021\\\/02\\\/11\\\/trust-no-one\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/pexels-photo-5473950.jpeg?fit=867%2C1300&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/pexels-photo-5473950.jpeg?fit=867%2C1300&ssl=1\",\"width\":867,\"height\":1300,\"caption\":\"Photo by cottonbro on Pexels.com\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2021\\\/02\\\/11\\\/trust-no-one\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/packitforwarding.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trust No One?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#website\",\"url\":\"https:\\\/\\\/packitforwarding.com\\\/\",\"name\":\"\",\"description\":\"Paying it forward to the next generation of IT.\",\"publisher\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#\\\/schema\\\/person\\\/441c2562293c45fbcf483f246430e6c8\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/packitforwarding.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#\\\/schema\\\/person\\\/441c2562293c45fbcf483f246430e6c8\",\"name\":\"Ben Story\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1\",\"width\":489,\"height\":250,\"caption\":\"Ben Story\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1\"},\"description\":\"In the course of my career, I have had the pleasure of working in multiple verticals including Education, Logistics and Healthcare. Although I started as a systems administrator (aka server jockey), I am now firmly in the network engineering arena. Currently I am working for a multi-state hospital system.\",\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/packitforwarding\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/benstory\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/www.twitter.com\\\/ntwrk80\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Trust No One? -","description":"With every breach, there must be a root cause. But do these root causes always need to be excised? Not with Zero Trust networks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/packitforwarding.com\/index.php\/2021\/02\/11\/trust-no-one\/","og_locale":"en_US","og_type":"article","og_title":"Trust No One? -","og_description":"With every breach, there must be a root cause. But do these root causes always need to be excised? Not with Zero Trust networks.","og_url":"https:\/\/packitforwarding.com\/index.php\/2021\/02\/11\/trust-no-one\/","article_publisher":"https:\/\/www.facebook.com\/packitforwarding","article_author":"https:\/\/www.facebook.com\/packitforwarding","article_published_time":"2021-02-11T15:00:00+00:00","og_image":[{"width":867,"height":1300,"url":"https:\/\/i1.wp.com\/packitforwarding.com\/wp-content\/uploads\/2021\/02\/pexels-photo-5473950.jpeg?fit=867%2C1300&ssl=1","type":"image\/jpeg"}],"author":"Ben Story","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/www.twitter.com\/ntwrk80","twitter_site":"@ntwrk80","twitter_misc":{"Written by":"Ben Story","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/packitforwarding.com\/index.php\/2021\/02\/11\/trust-no-one\/#article","isPartOf":{"@id":"https:\/\/packitforwarding.com\/index.php\/2021\/02\/11\/trust-no-one\/"},"author":{"name":"Ben Story","@id":"https:\/\/packitforwarding.com\/#\/schema\/person\/441c2562293c45fbcf483f246430e6c8"},"headline":"Trust No One?","datePublished":"2021-02-11T15:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/packitforwarding.com\/index.php\/2021\/02\/11\/trust-no-one\/"},"wordCount":677,"commentCount":0,"publisher":{"@id":"https:\/\/packitforwarding.com\/#\/schema\/person\/441c2562293c45fbcf483f246430e6c8"},"image":{"@id":"https:\/\/packitforwarding.com\/index.php\/2021\/02\/11\/trust-no-one\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2021\/02\/pexels-photo-5473950.jpeg?fit=867%2C1300&ssl=1","keywords":["cybersecurity","opinion"],"articleSection":["Blog","Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/packitforwarding.com\/index.php\/2021\/02\/11\/trust-no-one\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/packitforwarding.com\/index.php\/2021\/02\/11\/trust-no-one\/","url":"https:\/\/packitforwarding.com\/index.php\/2021\/02\/11\/trust-no-one\/","name":"Trust No One? -","isPartOf":{"@id":"https:\/\/packitforwarding.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/packitforwarding.com\/index.php\/2021\/02\/11\/trust-no-one\/#primaryimage"},"image":{"@id":"https:\/\/packitforwarding.com\/index.php\/2021\/02\/11\/trust-no-one\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2021\/02\/pexels-photo-5473950.jpeg?fit=867%2C1300&ssl=1","datePublished":"2021-02-11T15:00:00+00:00","description":"With every breach, there must be a root cause. But do these root causes always need to be excised? Not with Zero Trust networks.","breadcrumb":{"@id":"https:\/\/packitforwarding.com\/index.php\/2021\/02\/11\/trust-no-one\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/packitforwarding.com\/index.php\/2021\/02\/11\/trust-no-one\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/packitforwarding.com\/index.php\/2021\/02\/11\/trust-no-one\/#primaryimage","url":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2021\/02\/pexels-photo-5473950.jpeg?fit=867%2C1300&ssl=1","contentUrl":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2021\/02\/pexels-photo-5473950.jpeg?fit=867%2C1300&ssl=1","width":867,"height":1300,"caption":"Photo by cottonbro on Pexels.com"},{"@type":"BreadcrumbList","@id":"https:\/\/packitforwarding.com\/index.php\/2021\/02\/11\/trust-no-one\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/packitforwarding.com\/"},{"@type":"ListItem","position":2,"name":"Trust No One?"}]},{"@type":"WebSite","@id":"https:\/\/packitforwarding.com\/#website","url":"https:\/\/packitforwarding.com\/","name":"","description":"Paying it forward to the next generation of IT.","publisher":{"@id":"https:\/\/packitforwarding.com\/#\/schema\/person\/441c2562293c45fbcf483f246430e6c8"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/packitforwarding.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/packitforwarding.com\/#\/schema\/person\/441c2562293c45fbcf483f246430e6c8","name":"Ben Story","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/02\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1","url":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/02\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1","contentUrl":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/02\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1","width":489,"height":250,"caption":"Ben Story"},"logo":{"@id":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/02\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1"},"description":"In the course of my career, I have had the pleasure of working in multiple verticals including Education, Logistics and Healthcare. Although I started as a systems administrator (aka server jockey), I am now firmly in the network engineering arena. Currently I am working for a multi-state hospital system.","sameAs":["https:\/\/www.facebook.com\/packitforwarding","https:\/\/www.linkedin.com\/in\/benstory","https:\/\/x.com\/https:\/\/www.twitter.com\/ntwrk80"]}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2021\/02\/pexels-photo-5473950.jpeg?fit=867%2C1300&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pay9MD-mK","jetpack-related-posts":[{"id":161,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/07\/comptia-cysa-objective-1-2\/","url_meta":{"origin":1410,"position":0},"title":"CompTIA CySA+ Objective 1.2","author":"Ben Story","date":"January 7, 2019","format":false,"excerpt":"Given a scenario, analyze the results of a network reconnaissance.CompTIA Cybersecurity Analyst (CySA+) Certification Exam Objectives Version 3.0 While gathering the reconnaissance about a network, the data must be turned into actionable information.\u00a0 The first type of analysis is the point in time analysis.\u00a0 Sources for such analysis may include\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"Photo by PhotoMIX Ltd. from Pexels","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/11\/pexels-photo-95916.jpeg?fit=640%2C426&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/11\/pexels-photo-95916.jpeg?fit=640%2C426&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/11\/pexels-photo-95916.jpeg?fit=640%2C426&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":573,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/05\/03\/librenms\/","url_meta":{"origin":1410,"position":1},"title":"LibreNMS","author":"Ben Story","date":"May 3, 2019","format":false,"excerpt":"Although I don't currently run LibreNMS in my own network, it is one of those tools that I keep in my toolbox. LibreNMS is a fork of the Observium project. The tool is written in PHP and can be run on any Linux with either Apache or NGINX. Setup One\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/05\/LibreNMS-tool-02.png?fit=1200%2C603&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/05\/LibreNMS-tool-02.png?fit=1200%2C603&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/05\/LibreNMS-tool-02.png?fit=1200%2C603&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/05\/LibreNMS-tool-02.png?fit=1200%2C603&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/05\/LibreNMS-tool-02.png?fit=1200%2C603&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":885,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/08\/26\/ccna-cyberops-secops-objectives-4-7-and-4-8\/","url_meta":{"origin":1410,"position":2},"title":"CCNA CyberOps SECOPS &#8211; Objectives 4.7 and 4.8","author":"Ben Story","date":"August 26, 2019","format":false,"excerpt":"Map DNS logs and HTTP logs together to find a threat actor Implementing Cisco Cybersecurity Operations (210-255) Map DNS, HTTP, and threat intelligence data together Implementing Cisco Cybersecurity Operations (210-255) Understanding logs from DNS servers and HTTP servers is important. Analyzing data from the logs can help with determining security\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"Photo by Lex Photography from Pexels","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/10\/pexels-photo-1109541.jpeg?fit=640%2C426&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/10\/pexels-photo-1109541.jpeg?fit=640%2C426&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/10\/pexels-photo-1109541.jpeg?fit=640%2C426&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":166,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/15\/comptia-cysa-objective-2-3\/","url_meta":{"origin":1410,"position":3},"title":"CompTIA CySA+ Objective 2.3","author":"Ben Story","date":"January 15, 2019","format":false,"excerpt":"Compare and contrast common vulnerabilities found in the following targets within an organization.CompTIA Cybersecurity Analyst (CySA+) Certification Exam Objectives Version 3.0 Servers There are many kinds of servers (server applications) in Enterprise networks.\u00a0 The most common vulnerabilities are for web servers and database servers. Web servers may have vulnerabilities in\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"Photo by Philipp Birmes from Pexels","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-830891.jpeg?fit=640%2C426&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-830891.jpeg?fit=640%2C426&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-830891.jpeg?fit=640%2C426&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":491,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/06\/ccna-cyberops-secfnd-objective-2-3\/","url_meta":{"origin":1410,"position":4},"title":"CCNA CyberOps SECFND Objective 2.3","author":"Ben Story","date":"March 6, 2019","format":false,"excerpt":"Describe these terms: Threat actor, run book automation, chain of custody, reverse engineering, sliding window anomaly detection, PII and PHI.Understanding Cisco Cybersecurity Fundamentals (210-250) Threat Actor A threat actor is the individual or group that performs the attack or security incident. Several types of threat actors exist. Script kiddies: Uses\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/09\/pexels-photo-373543.jpeg?fit=640%2C426&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/09\/pexels-photo-373543.jpeg?fit=640%2C426&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/09\/pexels-photo-373543.jpeg?fit=640%2C426&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":374,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/23\/comptia-cysa-objective-3-4\/","url_meta":{"origin":1410,"position":5},"title":"CompTIA CySA+ Objective 3.4","author":"Ben Story","date":"January 23, 2019","format":false,"excerpt":"Given a scenario, analyze common symptoms to select the best course of action to support incident response. CompTIA Cybersecurity Analyst (CySA+) Certification Exam Objectives Version 3.0 Common Network-Related Symptoms Bandwidth consumption: It is important to have a baseline before an incident to know what is normal on the network. Deviation\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"Photo by rawpixel.com from Pexels","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-905874.jpeg?fit=640%2C378&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-905874.jpeg?fit=640%2C378&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-905874.jpeg?fit=640%2C378&ssl=1&resize=525%2C300 1.5x"},"classes":[]}],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/posts\/1410","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/comments?post=1410"}],"version-history":[{"count":4,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/posts\/1410\/revisions"}],"predecessor-version":[{"id":1418,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/posts\/1410\/revisions\/1418"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/media\/1415"}],"wp:attachment":[{"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/media?parent=1410"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/categories?post=1410"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/tags?post=1410"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}