<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Andrew Tetzeli</title>
    <description>The latest articles on DEV Community by Andrew Tetzeli (@andrewtetzeli).</description>
    <link>https://dev.to/andrewtetzeli</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1812106%2F420deb87-8a08-400a-940d-66ca64b3cfb0.jpg</url>
      <title>DEV Community: Andrew Tetzeli</title>
      <link>https://dev.to/andrewtetzeli</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/andrewtetzeli"/>
    <language>en</language>
    <item>
      <title>DevOps Fail: "Windows Update Zero-Day Being Exploited to Undo Security Fixes"</title>
      <dc:creator>Andrew Tetzeli</dc:creator>
      <pubDate>Wed, 11 Sep 2024 20:21:31 +0000</pubDate>
      <link>https://dev.to/andrewtetzeli/devops-fail-windows-update-zero-day-being-exploited-to-undo-security-fixes-1m97</link>
      <guid>https://dev.to/andrewtetzeli/devops-fail-windows-update-zero-day-being-exploited-to-undo-security-fixes-1m97</guid>
      <description>&lt;p&gt;In not-good news for DevOps, Microsoft released vulnerable software as part of its Updates subsystem. The flaw allowed the rolling back of patches to -- you guessed it -- other security flaws. &lt;a href="https://www.securityweek.com/microsoft-says-windows-update-zero-day-being-exploited-to-undo-security-fixes/" rel="noopener noreferrer"&gt;Security Week&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We're waiting for it to reach the update-to-patch-flawed-update-to-fix-flawed-update-in-the-prior-update stage.&lt;/p&gt;

&lt;p&gt;Stay tuned. We'll keep you posted.&lt;/p&gt;

&lt;p&gt;From the Microsoft bulletin:&lt;/p&gt;

&lt;p&gt;“Microsoft is aware of a vulnerability in Servicing Stack that has rolled back the fixes for some vulnerabilities affecting Optional Components on Windows 10, version 1507 (initial version released July 2015)."&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjpzgiob3inza9zuik3h2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjpzgiob3inza9zuik3h2.png" alt="Image description" width="330" height="350"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>devops</category>
      <category>patches</category>
      <category>updates</category>
    </item>
    <item>
      <title>Big implications for DevOps: German BSI developing measures to prevent another CrowdStrike-style fiasco</title>
      <dc:creator>Andrew Tetzeli</dc:creator>
      <pubDate>Thu, 15 Aug 2024 19:08:56 +0000</pubDate>
      <link>https://dev.to/andrewtetzeli/big-implications-for-devops-german-bsi-developing-measures-to-prevent-another-crowdstrike-style-fiasco-100g</link>
      <guid>https://dev.to/andrewtetzeli/big-implications-for-devops-german-bsi-developing-measures-to-prevent-another-crowdstrike-style-fiasco-100g</guid>
      <description>&lt;p&gt;A very large and top-rated government cybersecurity center, the German Federal Office for Information Security (BSI), has taken the lead in taking steps to fend off another CrowdStrike-style fiasco.&lt;/p&gt;

&lt;p&gt;The BSI's actions should have big implications for DevOps, and not just at CrowdStrike and Microsoft. &lt;/p&gt;

&lt;p&gt;The BSI has been in talks with both CrowdStrike and Microsoft about their DevOps following the July 19 global IT meltdown. As a result, BSI will be working with both companies to ensure that systems can be started in a minimum safe mode, even if serious errors occur.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;BSI's long-term goal is to have new and resilient components designed and implemented offering the same functionality and level of protection as before, but which require less invasive permissions to operating systems. This aims to minimize the impact of software errors.&lt;/p&gt;

&lt;p&gt;BSI has been in direct contact with Crowdstrike in Germany and in the USA since the incident on 19 July 2024. Following the immediate measures taken by the software vendor to prevent further incidents and the provision of an initial workaround for the affected systems, preliminary analysis reports on this incident were continually discussed between Crowdstrike and BSI and subsequently published. Based on the discussions, the evaluation of the available analyses and continued feedback from the vendor, BSI has initially developed the following measures:&lt;/p&gt;
&lt;/blockquote&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Short-term measures until 15 August 2024&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Impact analysis of the security incident in Germany&lt;br&gt;
Continuous tracking of the recovery rate of affected systems (as of 25 July 2024 21:54 CEST and according to Crowdstrike, 97 percent of all systems with Windows sensors are already back online)&lt;br&gt;
Merging already issued short-term warnings with expected incident-related CVEs based on the established CVD process&lt;/p&gt;
&lt;/blockquote&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Medium-term measures until 30 September 2024&lt;/strong&gt;&lt;br&gt;
Evaluation of the upcoming detailed and final analysis report (root cause analysis)&lt;/p&gt;

&lt;p&gt;Review of the current and the improved test concept of Crowdstrike by BSI in coordination with other international partner agencies and discussion of necessary adjustments with Crowdstrike&lt;br&gt;
Clarification of future measures to ensure a rapid rollout of business logic/signatures while strictly guaranteeing the operational stability of customer systems&lt;br&gt;
Testing the effectiveness of the progressive and closely monitored update rollout process to customers as already announced by Crowdstrike with extended telemetry analyses by Crowdstrike for immediate detection of faults after installation of the updates&lt;br&gt;
Raising the awareness of organizations using Crowdstrike products about fundamental operational risks (cf. &lt;a href="https://www.crowdstrike.com/terms-and-conditions-de/" rel="noopener noreferrer"&gt;https://www.crowdstrike.com/terms-and-conditions-de/&lt;/a&gt;) and creating sufficient operational redundancies for critical deployment scenarios&lt;/p&gt;
&lt;/blockquote&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Long-term measures until 31 December 2024&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Discussion of concrete possibilities for evaluating the vendor's software development processes by independent third parties based on announcements already made by Crowdstrike&lt;br&gt;
Establishing a cooperation between BSI, Crowdstrike, and Microsoft with the objective to ensure booting of the system at least in a restricted mode, even in the event of serious malfunction of the EDR tool&lt;br&gt;
Initial discussions with all relevant stakeholders on the architecture of EDR tools to increase their resilience&lt;/p&gt;
&lt;/blockquote&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Further measures in 2025&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Design and implementation of new, more resilient architectures for running EDR tools with the minimum required privileges while maintaining the same functionality and same level of protection&lt;br&gt;
Involving all other software vendors in this product category, all relevant operating system platforms and, in general, providers of products with (currently still) high privileges&lt;br&gt;
BSI is in continued contact with the vendor Crowdstrike and with Microsoft regarding the operational and strategic processing of the security incident expecting concrete results and solutions. In the meantime, Crowdstrike has published a large amount of additional information that already describes the initial implementation of the above measures.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.bsi.bund.de/EN/Service-Navi/Presse/Pressemitteilungen/Presse2024/240729_Folgemassnahmen_Crowdstrike.html" rel="noopener noreferrer"&gt;https://www.bsi.bund.de/EN/Service-Navi/Presse/Pressemitteilungen/Presse2024/240729_Folgemassnahmen_Crowdstrike.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;These measures by the BSI are important and necessary. They will enhance DevOps, and should result in improved operability of systems and continuity, for businesses and consumers. They also work toward needed reform and improvement of not just DevOps but governmental guidance. They represent a growing trend toward inter-sector cooperation between state entities and private software companies.&lt;/p&gt;

</description>
      <category>devops</category>
      <category>cybersecurity</category>
      <category>testing</category>
    </item>
    <item>
      <title>More AI, please. It can aid coding and is not a threat -- survey.</title>
      <dc:creator>Andrew Tetzeli</dc:creator>
      <pubDate>Sun, 04 Aug 2024 15:33:45 +0000</pubDate>
      <link>https://dev.to/andrewtetzeli/more-ai-please-it-can-aid-coding-and-is-not-a-threat-survey-3029</link>
      <guid>https://dev.to/andrewtetzeli/more-ai-please-it-can-aid-coding-and-is-not-a-threat-survey-3029</guid>
      <description>&lt;p&gt;The latest Stack Overflow Developer Survey -- hey, Dev.to, let's do some more surveys, too! -- shows developers welcome AI as an aid to coding and do not feel threatened by it at all. &lt;a href="https://stackoverflow.blog/2024/07/24/developers-want-more-more-more-the-2024-results-from-stack-overflow-s-annual-developer-survey/" rel="noopener noreferrer"&gt;Survey.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I would agree that "AI is largely non-threatening because it has not replaced the human in the loop."  AI can be a complement and is nowhere near being a replacement to human coding.&lt;/p&gt;

&lt;p&gt;AI extensions to commonly used development platforms like Visual Code or Visual Studio code can be useful, as borne out by the survey. It's worth seeing how much and how far the standalone AI coding aids progress for software development.&lt;/p&gt;

&lt;p&gt;Perhaps unsurprising is that developers believe AI is not yet quite ready for or good at solving complex tasks. As the AI models and their backends become more sophisticated, however, and with even more computing resources dedicated to them, that situation should improve. It's most likely just a matter of time.&lt;/p&gt;

</description>
      <category>ai</category>
      <category>coding</category>
      <category>survey</category>
    </item>
    <item>
      <title>AWS vs. DevOps</title>
      <dc:creator>Andrew Tetzeli</dc:creator>
      <pubDate>Thu, 01 Aug 2024 01:09:38 +0000</pubDate>
      <link>https://dev.to/andrewtetzeli/aws-vs-devops-1p82</link>
      <guid>https://dev.to/andrewtetzeli/aws-vs-devops-1p82</guid>
      <description>&lt;p&gt;Without explanation, Amazon Web Services has cut back on its DevOps services. &lt;a href="https://devclass.com/2024/07/31/aws-quietly-freezes-codecommit-now-closed-to-new-customers-also-breaking-its-control-tower-templates/" rel="noopener noreferrer"&gt;DevClass article&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Back in June 2024 AWS CodeCommit quietly stopped onboarding new customers. That's not good. Not good at all, for AWS, its customers, or DevOps.&lt;/p&gt;

&lt;p&gt;An entity the size of AWS exerts influence and pull on other large companies and their approaches to DevOps. AWS's maneuver could leave openings for other companies, however, to step up their DevOps offerings.&lt;/p&gt;

&lt;p&gt;It will certainly for the short-term drive more people to GitHub or GitLab. They have more robust DevOps environments and features than most. &lt;/p&gt;

&lt;p&gt;Other ripple effects may follow. Stay tuned.&lt;/p&gt;

</description>
      <category>devops</category>
      <category>community</category>
      <category>wtf</category>
    </item>
    <item>
      <title>CrowdStrike vs. DevOps</title>
      <dc:creator>Andrew Tetzeli</dc:creator>
      <pubDate>Sun, 21 Jul 2024 00:07:20 +0000</pubDate>
      <link>https://dev.to/andrewtetzeli/crowdstrike-vs-devops-39ie</link>
      <guid>https://dev.to/andrewtetzeli/crowdstrike-vs-devops-39ie</guid>
      <description>&lt;p&gt;Let's start by getting the "WTF" out of the way. WTF, by the way.&lt;/p&gt;

&lt;p&gt;Now, the CrowdStrike debacle reads like a dystopian novel, some sort of amalgam of Dostoevsky meets Kafka meets Heinlein. &lt;/p&gt;

&lt;p&gt;CrowdStrike's buggy patch, itself absurd, unleashed absurdly damaging and widespread upheavals and disruptions to normal life around the world. &lt;/p&gt;

&lt;p&gt;CrowdStrike's actions have presented us with &lt;strong&gt;_The Curious Case of CrowdStrike vs. DevOps. _&lt;/strong&gt; We see that CrowdStrike has something against DevOps.&lt;/p&gt;

&lt;p&gt;In one corner, we have CrowdStrike -- a Goliath, publicly traded and now publicly berated -- and in the other, DevOps, a logic-based methodology for producing secure, functioning software.&lt;/p&gt;

&lt;p&gt;It would seem that CrowdStrike got a Technical Knock Out (TKO) against DevOps. CrowdStrike definitely succeeded in stomping all over good DevOps.&lt;/p&gt;

&lt;p&gt;Yet it was a success of abject failure.&lt;/p&gt;

&lt;p&gt;Good DevOps ultimately prevails. It keeps itself and its adherents alive and kicking, developing and releasing software that runs and certainly doesn't cause an easily avoidable global meltdown by preventing hundreds of thousands, millions, of systems from booting up and operating.&lt;/p&gt;

&lt;p&gt;Time will tell how CrowdStrike fares after this colossal snafu that fubar'ed so many computers and services.&lt;/p&gt;

&lt;p&gt;We'll be dissecting this case study of &lt;strong&gt;_The Curious Case of CrowdStrike vs. DevOps. _&lt;/strong&gt; for a long time, and into the future, if not the figurative corporate corpse. We'll have to see how the latter part plays out.&lt;/p&gt;

&lt;p&gt;DevOps will keep on keeping on. We'll get more and more into refining, explaining, and hopefully applying it. &lt;/p&gt;

&lt;p&gt;I look forward to being part of that process. And I hope you'll join me.&lt;/p&gt;

</description>
      <category>devops</category>
      <category>testing</category>
      <category>news</category>
      <category>learning</category>
    </item>
  </channel>
</rss>
