Author: Sam

  • Governing the Ungovernable

    Governing the Ungovernable

    If you’re in the technical CyberSecurity space the recent rise in Artificial Intelligence has probably caused you a sleepless night or two, and rightly so.

    In this new series of articles we’ll look in detail at the steps you can take to create or improve your governance program for AI.

    New technology always gets a hype behind it, and we’ve seen this sort of thing before, machine learning? crypto and the blockchain? web 2.0?. AI has blown past the blockchain in hype scale but it’s not that new really. The concept of AI, ML and Neural Networks has been around for years but we have never seen it be this capable before, especially at consumer accessible scale.

    So before I go off on a rant about RAM prices being 300% up so someone can make a video of a cat playing the guitar with no effort (or hit the ultra hypocrite and use it to generate the image at the start of this article) lets talk about governing it, especially in the enterprise.

    Standard Governance Policies

    In the enterprise? Sort your policies out. AUP? Update it, Info Sec Policy? Update it. You need robust, AI specific policies in place immediately. If you haven’t got these you have no baseline, you have no defence or capability to manage users and their use of tools. If it’s not written down then ‘I didn’t know that was the rule’ always stands.

    Risk and reward

    Risk assessment, the risks AI bring are new for both personal and the enterprise. We hear lots of things about 10x Engineering, efficiency, speed and improvements. That’s all well and good but if AI is 10x faster then it can cause damage 10x faster too. It’s not about not doing something as a security team or even an individual, its about doing it correctly.

    If you as an individual were given a book on medicine and told some of the content might be wrong but we can’t tell you which one, would you use it all?.

    At an enterprise if your CISO or Head of Security came to the board and said I want this incredible new firewall, it will protect us, its really expensive, also it might all change tomorrow and sometimes it’s wrong?. You’d be laughed out the room.

    As reported online, Meta’s AI Alignment director, recently had to manually intervene as OpenClaw started deleting her emails even though she explicitly told it not too. Upon querying the LLM it advised her she ‘had every right to be angry’.

    AI provenance has created a major shadow IT problem. Existing tools and technical controls don’t work all that well against a lot of it. EDR’s and Web Gateways took a while to catch up. When reviewing your risk and reward you must decide what data you’re willing to give away, does the model use your information to train future models, do you retain ownership of data. This is relatively standard for SaaS products, but I can’t remember experiencing such an influx of new ‘products’ that so many different types of users want to use. The closest comparison I can remember was when easy cloud storage like dropbox appeared, files and data were being thrown everywhere for a while.

    Data Classification

    Data Classification is imperative for Enterprise AI. A robust data classification and retention period definition is imperative.

    Classification and labelling lets you define your data controls. Some platforms have classification built in. Microsoft CoPilot for example has a ‘quick win’ in allowing CoPilot to be locked into your tenancy, on an E5 license CoPilot can be restricted and managed via Azure Unified Labelling and Security Policies.

    Enterprise AI Governance

    So how can we reduce risk in enterprise. A combination of steering, guidance and guardrails is in order. You must assess your use. You need to define which tools you are using and for what and you need to classify your data.

    Creating a set of rules for which ever AI you’re using is key. Deterministic rules are important and your internal policies may need reformatting, you need to agree on controls for how your AI should behave. Using a markdown format allows AI to read and process the rules you define.

    A Quick Example

    You want to create a set of steering for an AI coding assistant, As a company you have that coding assistant and a cloud provider and your engineers.

    You have a requirement that all your HTTP connections are TLS and use version 1.3. It’s an easy rule to write.

    Markdown
    | Rule ID | Rule | Reference |
    | --- | --- | --- |
    | RULE001 | You must use TLS 1.3 | Internal Reference 

    Rendered the markdown is easy to read for a human, the plain markdown make s it easy to read for an AI.

    Next you use your cloud provider controls to apply a guardrail control that stops the deployment of anything not TLS1.3. Your engineers with the AI coding assistant now have steering to prevent the creation of something not using TLS1.3 and you have your guardrail to cover any gaps or errors in that process.

    Next up we’ll look at all of these things in detail.

  • Multi-Device VPN Gateway

    Multi-Device VPN Gateway

    In this post we’re going to use a Raspberry Pi and 4G LTE dongle to create a VPN Gateway for your devices.

    Raspberry Pi and Mobile Dongle

    Why? You may have devices that aren’t capable of connecting directly to a VPN like Smart TV’s and games consoles. Using a Raspberry Pi and mobile broadband dongle also lets you take it to hotels or on holidays.


    Prerequisites and Kit

    • A Raspberry Pi 4+
    • USB Mobile Dongle – I’m using a SIM7600G-H 4G from WaveShare.
    • Power, MicroSD and peripherals.
    • Battery pack if you want to use the Pi without mains.
    • Relevant mobile data plan and SIM.
    • Familiarity with Debian/Ubuntu linux and the command line will be a huge help.

    Pi Setup


    All of this configuration is done using the latest Raspbian OS and a Pi 5. I used the Raspberry Pi disk writer to write the default installer to an SD Card. There’s an easy install guide here. You will need root privileges.


    LTE Mobile Dongle Setup

    We’ll need to set up the and enable the dongle. You may need to install the minicom packages.

    Bash
    sudo apt install minicom

    Now plug the dongle into the Pi and look for USB

    Find the USB Device ID

    Bash
    ls /dev/ttyUSB

    Connect to the dongle using minicom replace the ‘2’ with the relevant device number shown in the previous command.

    Bash
    sudo minicom -D /dev/ttyUSB2

    You should be connected to the dongle and you will need to run the following to enable LTE and modem mode for our Pi.

    Bash
    AT+CUSBPIDSWITCH=9011,1,1

    In order to actually call the dongle as an interface you should then run the following commands

    Bash
    ip -a

    Now use the usb interface name to start the dhclient

    Bash
    sudo dhclient -v usb0 #replace 0 if required, (unless you're already running a USB network device it will almost always be 0)

    You should now be able to browse the net on your pi with the mobile dongle!.


    Setting up the Pi as an Access Point

    We need to setup the Wifi Access Point. It’s important to note we are using Bookworm Raspbian and it defaults to network manager. The following commands will set up an access point using the onboard WiFi card on the Pi.

    Create a connection called ‘vpn-gateway’ with the SSID nrfs-ap1

    Bash
    nmcli con add con-name vpn-gateway ifname wlan0 type wifi ssid \"nrfs-ap1\"

    Set the connection to use a Pre Shared Key to authenticate

    Bash
    nmcli con modify vpn-gateway wifi-sec.key-mgmt wpa-psk

    Set the Pre Shared Key (Password)

    Bash
    nmcli con modify vpn-gateway wifi-sec.psk \"123456789\"

    Set the wireless mode and IP version to 4. We are just going to share the IP for internet access.

    Bash
    nmcli con modify vpn-gateway 802-11-wireless.mode ap 802-11-wireless.band bg ipv4.method shared

    To bring the connection up you can run

    Bash
    nmcli con up vpn-gateway

    The password here is set to 123456789, obviously you should change this to something good!.


    Iptables forwarding

    Use iptables to forward all the traffic to your modem. This is the bare minimum and ‘should just work’ option. We can lock down the rules later if we need too. You will need to match the 0 to your usb device.

    Bash
    sudo iptables -t nat -A POSTROUTING -o usb0 -j MASQUERADE

    Connect to AP to test You should be able to see your network SSID from your phone or other device, you should be able to connect and all being well you should be able to browse the internet!

    In Part 2 we will set up the VPN connection and route the traffic down the vpn tunnel.