You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-**In-person verification mandatory** — final-round interviews conducted on-site or at a trusted venue
83
+
- Hardware wallet issuance and setup conducted in-person or via verified secure delivery
84
+
- Dual-authorization requirements for all privileged actions
85
+
- Periodic re-verification, especially after extended remote-only periods
86
+
87
+
### Defeating Deepfakes: Liveness Verification
88
+
89
+
Video interviews are now a primary vector for DPRK operative infiltration. Pre-recorded deepfake video can fool a casual interviewer, particularly when audio "technical difficulties" are used as cover. Standard video calls are not sufficient for identity verification at Levels 2 and 3.
90
+
91
+
Incorporate unpredictable, interactive requests into video calls:
92
+
93
+
- Ask the candidate to turn their head sideways and hold the position
94
+
- Have them read a randomly generated phrase displayed on screen for the first time during the call
95
+
- Request a hand movement across the face mid-stream
96
+
- Ask them to screen-share and perform a live technical task requiring real-time interaction with their environment
97
+
98
+
The goal is to introduce enough unpredictable real-time interaction that a pre-rendered deepfake cannot keep up.
99
+
100
+
> ⚠️ Any candidate who persistently, escalatingly avoids in-person interaction — even for high-value roles — warrants a security review. This is a documented indicator of DPRK IT worker activity.
101
+
102
+
### Hardened Onboarding
103
+
104
+
The sequence in which access is provisioned matters:
105
+
106
+
1.**Identity first.** Provision the IdP account with phishing-resistant MFA before any other access.
107
+
2.**Environment setup.** Issue the managed device, provision VDI access, or configure enterprise browser policies before any production system access.
108
+
3.**Scoped access.** Apply least-privilege from day one. Don't grant broad "we'll scope it later" permissions.
109
+
4.**Secrets hygiene briefing.** Ensure the new team member understands secrets management practices.
110
+
111
+
### Instant Offboarding
112
+
113
+
1.**Disable the IdP account first** — this cascades across all connected SSO applications immediately.
114
+
2.**Kill active sessions** — force session revocation in all applications.
115
+
3.**Rotate all shared secrets** — any API keys, shared passwords, or access tokens the departing person had access to.
116
+
4.**Recover hardware** — retrieve issued devices and remotely wipe.
117
+
5.**Audit access** — review the access log for the 30-day period prior to offboarding for anomalous activity.
118
+
119
+
> ⚠️ The period between a decision to terminate and actual offboarding is the highest-risk window for insider data exfiltration. For sensitive roles, access revocation should happen simultaneously with or before any notification.
120
+
63
121
## Hardening your organization
64
122
65
123
1. Define and implement tight access control rules for all of your employees, especially remote ones. Avoid giving
0 commit comments