MAC Address Filtering and Hiding SSID Won’t Protect Your Wi-Fi NetworkBy Linda IkechukwuiOS 14 and macOS Sequoia 15 introduces a new privacy feature: randomised MAC addresses for Wi-Fi networks. Hence, if you're still relying on MAC Address Filtering or SSID Hiding to secure your enterprise Wi-Fi network, it's time to rethink your strategy.See more
Announcing Device Identity for OktaBy Carl TashianWe've created a device authentication factor for Okta.See more
Why passwords and OTPs suck By Linda IkechukwuWith phishing attacks on the rise, passwords are no longer a reliable method for granting infrastructure access or authenticating users. It is time to adopt authentication methods that don't rely on shared secrets.See more
New Release of Smallstep ACME RA: Automating internal TLS with ACME + Google CASBy Carl TashianWe're excited to announce a new release of our HSM-backed cloud ACME server, the Smallstep ACME Registration Authority for Google CA Services.See more
2020 Certificate Management Survey ResultsBy Mike MaxeyInternal PKI continues to be essential but struggles with modern practices. But don't worry, there is hope.See more
Introducing Smallstep ACME RA: Automating internal TLS with ACME + Google CASBy Carl TashianWe're excited to announce our new HSM-backed cloud ACME server, the Smallstep ACME Registration Authority for Google CA Services.See more
Announcing X.509 Certificate FlexibilityBy Carl TashianWe've added X.509 certificate templates to Step CertificatesSee more
Embarrassingly easy private certificate management for VMs on AWS, GCP, and AzureBy Mike Malonestep and step-ca (v0.11.0) adds support for cloud instance identity documents (IIDs), making it embarrassingly easy to get certificates to workloads running on public cloud virtual machines (VMs). This post introduces IID-based authentication with step and step-ca, and notes some interesting architectural and security details.See more
Prove you are not human -- Take the ACME ChallengeBy Mike MaxeyAutomating internet security with the Let’s Encrypt certificate authority has led to the massive acceleration of safe web browsing. As we roll out ACME protocol support and give away some free hoodies, we want to thank Let’s Encrypt and the IETF for making it all possible.See more
Run your own private CA & ACME server using step-caBy Mike MaxeyWith today's release (v0.13.0), you can now use ACME to get certificates from step-ca. ACME (RFC8555) is the protocol that Let's Encrypt uses to automate certificate management for websites. ACME radically simplifies the deployment of TLS and HTTPS by letting you obtain certificates automatically, without human interaction.See more
Trust Anchors In Modern Systems; Don’t Overlook The Bottom TurtleBy Mike MaxeyThis issue is a discussion about the trust anchor and dependencies of systems. While a clever turtle reference often satisfies the room, getting a real answer to this question is fundamental to modern security practices.See more
Great Minds Really Do Think Alike! No really, they do!By Mike MaxeyGreat Minds Really Do Think Alike! I found an inarguable topic in the most unlikely of places, deep in the conversations between cyber-security experts.See more
Traffic, Bridge Tolls, and Secure Browsing - How Automation Secures The InternetBy Mike MaxeyIn this post, we will explore how successful public internet practices provide a set of instructions for how the industry should be thinking about securing internal systems. The second edition of the Modern Security for Leaders series.See more
Instincts, Fast Cars, and Modern Security - Why I Joined smallstepBy Mike Maxeysmallstep’s vision is centered on modernizing security practices using the best available technology to solve security challenges. Now you’re probably saying (as I was at this point), there are hundreds of companies out there spending billions of dollars on modernizing practices. How much market is really left for a scrappy startup? Turns out a lot!See more
Step v0.9.0: Curl mTLS services with SSO certificates via OAuth OpenID ConnectBy Max FurmanIntroducing step v0.9.0: Most enterprise IAM systems expose OpenID Connect (a suite of single-sign-on protocols that allow the creation of accounts and login into third party applications using a single account per user identity). In step v0.9.0 you can now leverage OpenID Connect to authenticate with step certificates to make issuance of personal certificates simple.See more
Everything you should know about certificates and PKI but are too afraid to askBy Mike MaloneCertificates and public key infrastructure (PKI) are hard. No shit, right? I know a lot of smart people who''ve avoided this particular rabbit hole. Eventually, I was forced to learn this stuff because of what it enables: PKI lets you define a system cryptographically. It''s universal and vendor-neutral yet poorly documented. This is the missing manual.See more
The case for using TLS everywhereBy Mike MaloneThis post has a simple purpose: to persuade you to use TLS everywhere. By everywhere, I mean everywhere. Not just for the public internet, but for every internal service-to-service request. Not just between clouds or regions. Everywhere. Even inside production perimeters like VPCs. I suspect this will elicit a range of reactions from apathy to animosity. Regardless, read on.See more
Step: A New Zero Trust Swiss Army Knife from SmallstepBy Mike MaloneA better security model exists. Instead of relying on IP and MAC addresses to determine access we can cryptographically authenticate the identity of people and software making requests. It’s a simple concept, really: what matters is who or what is making a request, not where a request comes from. In short, access should be based on production identitySee more