Unchained
March 1, 2025

Safe Could Have Done a Lot Differently, Says Polygon’s CISO - Unchained w/ Mudit Gupta

In this episode of Unchained, Mudit Gupta, Chief Information Security Officer at Polygon, delves into the security oversights that led to a significant breach at Safe. With a focus on security architecture and operational protocols, Gupta provides a critical analysis of the incident, offering insights into how such vulnerabilities can be mitigated in the future.

1. Security Architecture Flaws

  • "It showed the poor level of security architecture or afterthought they had for the product. First of all, no single developer should have had access to push to production."
  • Safe's security architecture was fundamentally flawed, allowing a single developer to push changes to production without oversight, which is a critical vulnerability.
  • Gupta emphasizes the importance of multi-person verification for production changes, a policy followed at Polygon, to prevent unauthorized access and modifications.
  • The breach highlights the need for robust security protocols, especially for critical systems like Safe, where a single point of failure can lead to significant consequences.

2. Lack of Monitoring and Alerting

  • "This change happened on 19th February, but Safe had no monitoring or alerting around changes, and it went unnoticed for two days."
  • Safe's failure to implement effective monitoring and alerting systems allowed the breach to go undetected for two days, exacerbating the impact.
  • Gupta points out that timely detection through monitoring could have mitigated the breach's effects, potentially saving Bybit from being compromised.
  • The incident underscores the necessity of real-time monitoring and alerting mechanisms to quickly identify and respond to unauthorized changes.

3. The Threat of Advanced Persistent Threats

  • "I can't blame the developer for being compromised. If Lazarus wants to compromise you or me, they will."
  • Gupta acknowledges the formidable threat posed by advanced persistent threats like Lazarus, which can compromise individuals despite strong personal security measures.
  • The discussion highlights the importance of designing systems that do not rely on the security of a single individual, as even the most secure individuals can be targeted and compromised.
  • Organizations must assume that individuals can be compromised and design their security architecture to minimize the impact of such events.

Key Takeaways:

  • Robust security architecture is crucial to prevent unauthorized access and modifications, especially in critical systems.
  • Effective monitoring and alerting systems are essential for timely detection and response to security breaches.
  • Security protocols should be designed to minimize reliance on individual security, acknowledging the threat of advanced persistent threats.

Actionable Insights:

  • Implement multi-person verification for all production changes to enhance security.
  • Establish real-time monitoring and alerting systems to detect unauthorized changes promptly.
  • Design security systems that assume individuals can be compromised, reducing reliance on personal security.

For further insights and detailed discussions, watch the full podcast: Link

Others You May Like