YK: So far no MFA for Maxwell and NAF. To close a possible breach from compromised Maxwell and NAF accounts, and limit the impact of possible hacks, we will limit the accessibility from Maxwell and NAF systems to the internal network, in a multi-step approach.
Access from the Maxwell and NAF subnets to machines in the internal network via SSH or RDP (Windows) is no longer possible. (Access from the internal network to Maxwell and NAF via SSH remains possible, as well as SSH within the Maxwell and NAF subnets.)
Access to the Windows infrastructure is no longer possible: All traffic to the subnets .69 and .97 as well as to all Windows Domain Controllers will be blocked, on all ports.
Access to the Windows Home and Group Volumes ("H:,S:,N:"), is no longer possible.
If you know of subnets and services that you want to see protected against possible attacks from Maxwell and NAF, please inform us, so that we can include these into a next iteration.
We also know that some users access e.g. beamline gateway systems from a Maxwell display node. Experts should see whether other ways of access are possible (e.g. through bastion+MFA), or whether the IP of such systems should be excluded from the measures above. Please name such systems, if necessary! It must be clear that such an exception should not remain indefinitely, since it is a source of possible intrusion.
Further communication: