Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security Businesses

Has Corporate Info Security Gotten Out of Hand? 466

KoshClassic asks: "What is the right balance between security and productivity, in the corporate IT environment? Looking back at my company, 10 years ago, our machines were connected directly to the Internet, no proxy, no firewall, no antivirus software. Today, my company's proxy server blocks access to: 'bad' web sites (such as Google Groups; our 'antivirus' software prevents our machines (even machines that host production applications) from carrying out legitimate functions, such as the sending of email via SMTP; and individual employees are forced to apply security patches with little or no notice, under threat of their machines loosing network access, if they do not comply by the deadline. On one hand, you can never be too secure, however on the other hand, have we become so secure that we're stifling our own ability to get things done? What is the situation like at other companies?"
This discussion has been archived. No new comments can be posted.

Has Corporate Info Security Gotten Out of Hand?

Comments Filter:
  • Technology (Score:3, Insightful)

    by biocute ( 936687 ) on Wednesday January 18, 2006 @08:53PM (#14505619)
    I think overall mankind's productivity has increased thanks to the technology. I can't say if the IT world would be more convenient if 95% of us were using Linux.

    It's like when cars were first introduced, there were not speed limits, cars were hardly locked and tyres were hardly threaded......

    As cars become more common, more people died in car accidents, so you can't drive too fast anymore, must wear seatbelts and cannot drive drunk.

    As car thefts become a norm, we must lock our cars, when that's not enough, we need to put on the steering lock, alarm, then immobalizer, and now the security datadot. However, I think overall we do benefit from the introduction of vehicles.
  • by heatdeath ( 217147 ) on Wednesday January 18, 2006 @08:57PM (#14505637)
    individual employees are forced to apply security patches with little or no notice, under threat of their machines loosing network access

    I don't think this is unreasonable at all. What's the downside of enforcing a little rigor in your employees, when the alternative is having your entire corporate network become a zombie farm overnight controlled by a mob boss in Russia named Vladamir?
  • Re:Technology (Score:4, Insightful)

    by eobanb ( 823187 ) on Wednesday January 18, 2006 @09:01PM (#14505675) Homepage
    The issue is not with the equivalent of locking your car. The issue is draconian policies like arbitrary blocking of sites like Google Groups. Therefore, I feel that your analogy isn't right for article in that it assumes that "well there are good and bad things about computers, but the good outweighs the bad." No one's arguing that point. Instead it's more like, "well there are good and bad security policies. At what point does it become simply stupid?"
  • by badriram ( 699489 ) on Wednesday January 18, 2006 @09:02PM (#14505678)
    Well if IT installed linux, well they should not be doing something that stupid. However if you decided to install Linux, and the IT folks maintain your computer, i would have to agree with them. Unless you work at a software company, developing apps, or a sys admin you are outta luck.
  • Comment removed (Score:5, Insightful)

    by account_deleted ( 4530225 ) on Wednesday January 18, 2006 @09:07PM (#14505720)
    Comment removed based on user account deletion
  • by Thuktun ( 221615 ) on Wednesday January 18, 2006 @09:13PM (#14505761) Journal
    Hmmm, but my machine is a linux machine! [...] Hmmmm, but my machine is a linux machine! [...] Fortunately I had a dual-boot, so I was able to comply.

    Yeah, weird that they might want a machine running Windows XP to be updated. You might have Linux on the machine, but you also had Windows XP, and it sounds like it was missing security patches.

    And, for the record, my assigned work had no specific XP requirement, and my responsibilities were heavily around Unix.

    And you apparently had a machine with Windows XP missing some (possibly significant) security patches sitting on their network.

    I fail to see how this was stupid of the network admins. Draconian maybe, but it got you to apply the security patches.
  • by Vellmont ( 569020 ) on Wednesday January 18, 2006 @09:18PM (#14505783) Homepage
    He said his responsibilities were heavily around Unix. I kinda doubt he's some low level secretary that wants to install linux for fun. Why not give him the benefit of the doubt and assume he's not in the wrong here?

    I'm guessing the problem is one of compartmentalization. The IT department doesn't talk to the production department, and so doesn't know there's some people that are running linux and not XP. The standard drone-like response of "We're sorry, but until you're machine accepts the updates we can't re-enable the port." really sounds to me like extreme compartmentalization.
  • Try a University (Score:3, Insightful)

    by froschmann ( 765104 ) on Wednesday January 18, 2006 @09:21PM (#14505808)
    Heh, my Christian University is a lot worse than that. We have mandatory antivirus (which seems to run scans at the most inconvienent times. Cancel them and you get kicked off the network.) We also have to run all traffic through a HTTP proxy, because they block all outgoing port 80 traffic. The HTTP proxy logs all traffic which is then sent to our deans and hall directors, as well as kept on record forever. In addition, it blocks such disgusting websites as Ebaumsworld, and hackaday (hacking is illegal, kids). It can be loads of fun trying to get programs without proxy support to work. We also get AIM file transfer (for my non-geek friends from home) disabled, along with bittorrent and pretty much every non HTTP protocol. They even have a packet shaper which detects traffic on the wrong ports and blocks it, so forget about using a proxy. Internet access at schoool can be much worse than at a workplace... Thank the gods for PGP and dial-up!
  • Re:Technology (Score:3, Insightful)

    by Kyosuke77 ( 783293 ) <`ac.ksasu' `ta' `lehciew.yk'> on Wednesday January 18, 2006 @09:22PM (#14505810)
    But then the question is do they have legitimate reasons for doing things like browsing Google Groups? A friend of mine works for RBC Royal Bank as a personal banking manager. Their network is so restricted, he can't access Hotmail.

    Yet why does he need to access Hotmail from his work computer? Besides, he can just access it from his Treo, on which he has an unlimited data plan. I don't see that as onerous security, and neither does he. They're a bank for goodness sake! They have very good reasons for locking their network down tight as a drum and restricting both what goes out and comes in. Good reasons like keeping their customers' financial information safe.
  • You made me laugh. (Score:2, Insightful)

    by catahoula10 ( 944094 ) on Wednesday January 18, 2006 @09:24PM (#14505828)
    " Looking back at my company, 10 years ago, our machines were connected directly to the Internet, no proxy, no firewall, no antivirus software. Today, my company's proxy server blocks access to: 'bad' web sites (such as Google Groups; our 'antivirus' software prevents our machines (even machines that host production applications) from carrying out legitimate functions, such as the sending of email via SMTP; and individual employees are forced to apply security patches with little or no notice,"

    Of course its out of hand. Companies, as well as individuals pay alot of money for computers. If we bought a car that needed patching every week to run properly it would be called a lemon. And we have lemon laws. If we bought a TV that needed to be patched every week to work properly we have a warantee to help resolve the issues with that product.

    While the computer itself works fine, its the OS and Applications that need constant patching. When the OS makers and Application sellers are held to the same standards as other products are, then maybe you will see your cost of doing buisness with computers go down.

  • They were right. (Score:5, Insightful)

    by lheal ( 86013 ) <lheal1999@yahoo.cEEEom minus threevowels> on Wednesday January 18, 2006 @09:28PM (#14505843) Journal

    You should have simply rebooted to the XP side and run the updates. If you want the luxury of a dual-boot system, you should be willing to maintain both halves.

    My policy for dual-boot machines is this: No. You can have two machines. I'll get you two monitors you can use dual-head on each machine, a KVM, your own switch, and I'll even clean the goo off your keyboard. But I won't manage a dual boot machine, and I don't want them on my network.

    Why?

    • One side is always down, meaning network monitors need special work
    • Either both sides share one IP address, or each gets its own. Either figure out which one is running, or figure out which address to use.
    • It requires physical intervention (or extraordinary hacks) to reboot remotely to the other OS
    • I can't just wax the whole thing if something goes wrong
    • Rebooting implies root access for whoever is around
    • In short, they're a PITA
  • Unplug, people. (Score:4, Insightful)

    by ubiquitin ( 28396 ) * on Wednesday January 18, 2006 @09:34PM (#14505863) Homepage Journal
    Security has very little to do with updating your virus definitions hourly, and everything to do with knowing when to just unplug the box and find another way to get the job done. What's your risk model? Point granted: the network is a demanding mistress. But fortunately, everyday risk is often handled best by the simplest of means. Stop instant messaging the person one cubicle owner, and get to know your local coffeeshop owner. Or neighborhood banker.
  • Why it's stupid (Score:5, Insightful)

    by Gorimek ( 61128 ) on Wednesday January 18, 2006 @09:37PM (#14505880) Homepage
    The stupid part of the story (as told by the poster) is that these IT "professionals" didn't seem to understand that Linux is incompatible with XP.

    Why are people who don't comprehend - or can't communicate - this employed in an IT organization??

    Had they just explained things the way you explain them in your post, there would be no problem.
  • by jabella ( 91754 ) * on Wednesday January 18, 2006 @09:38PM (#14505884) Journal
    Yes, security is most definitely being used as the stick to beat end-users down as far as 'distractions' go. I have had the fortunate experience to work for a company where the motto is:

    "It's the result that matters."

    If you spend time on slashdot or other forums during the day that's ok (and most definitely not filtered) -- but at the end of the month you have XYZ to get done. If you get it done by working nights / weekends that's your prerogative. Flexibility like this is one of the reasons why we've had zero turnover in my department in almost 5 years.

    The tighter companies restrict internet usage and employee behavior, the less personally attached to the company (and their work) the people get, at least in my experience. Companies with fanatic employees can do great things. Companies with people that feel oppressed are just places to work.

    The first problem you mentioned is what we always call 'management by magazine.' Some exec saw something on cnn / in a magazine / at his country club and wants to know what it's not being run. Thankfully most executives are adverse to spending money -- and in this case it's usually a good way to end some of the ideas they bring to the table.

    Speaking of the idea of 'having something just to have it' -- I think this is a problem that's being pushed along by things like SOX / PCI / CISP / and other compliance programs. "We're required to have intrusion detection" so people get out a checkbook and make rash decisions just to put a check in a column.

  • Re:Technology (Score:5, Insightful)

    by Pig Hogger ( 10379 ) <pig.hogger@g[ ]l.com ['mai' in gap]> on Wednesday January 18, 2006 @09:43PM (#14505910) Journal
    How can blocking Google Groups be seen as draconian. They have no place in a responsible workplace. They are only filled with warez requests, AOL Me Toos, kiddie porn and hentai anyway.
    You must be one of those pointy-haired bosses to say that Google Groups ain't got no business at work.

    Whenever I work as a sysadmin, 90% of the solutions I apply to problems come from Google Groups.

  • Re:Management? (Score:2, Insightful)

    by 246o1 ( 914193 ) on Wednesday January 18, 2006 @09:47PM (#14505921)
    "There are plenty of corporate-level antivirus solutions that will allow the control of virus scanning policies so that you could enable the sending of e-mail through SMTP. If it's corporate policy not to allow it, then it really isn't a computer problem, but a company policy problem."

    Well, it seems to me that the question is really about whether corporate security policies have gotten out of hand, not about the technology itself (though a key feature of any technology, as any Mac user will be glad to lecture you about, is its usability/implementation). On this question, I can't speak much from my own personal experiences (never worked at a big corporation), but anecdotally there does seem to be a certain amount of paranoia in corporate environments beyond what is called for.

    I believe that many "security measures" are actually implemented more broadly than necessary because the side effects (lessened ability to use the internet, etc.) are mostly seen as good by the people who make decisions. In business, the further the chain of underlings between the decision-maker and the regular employee, the less likely they will just trust you (the employee) to do your job and the more likely they will impose restrictions to insure you can't visit slashdot/fark/apple.com etc.

    "It seems to me that the network environment doesn't suffer from too much security, but that the existing security needs to be better managed so that it doesn't prove detrimental to the productivity of the employees."

    I think this is true (again, not from direct personal experience, so take this with plenty of salt), but part of it is due to a lack of understanding of network/security technology by many decision makers. If you are unsure about anything, and there's tons of money and/or your job riding on it, you err on the side of caution, regardless of inconveniences to your employees. Even in my very relaxed work environment, a great deal of our internet functionality has been taken away for little apparent reason.

    Of course, even if all the security decisions were left to the IT people (never interfered with by less expert management types), there would still be plenty of problems for any company-wide network solutions. I look forward to hearing about what people think would be ideal (this being slashdot, there will be some good, specific answers somewhere in this thread).
  • Re:Management? (Score:4, Insightful)

    by rblancarte ( 213492 ) on Wednesday January 18, 2006 @10:00PM (#14506005) Homepage
    I very much agree with what you are saying here. I mean, what I see in the message posted is some poor IT policies. Just picking it apart (just like you did):

    Looking back at my company, 10 years ago, our machines were connected directly to the Internet, no proxy, no firewall, no antivirus software.

    I am pretty sure that most people agree, this is not acceptable, and 10 years ago, this would also be considered dangerous.

    Today, my company's proxy server blocks access to: 'bad' web sites (such as Google Groups)

    First off, blocking objectional sites is a good thing. There are a number of things in a work environment that are unacceptable. Sure, some good sites will be gotten as well, but the IT department should have a policy such that you can ask for sites to be allowed if they are being blocked and really shouldn't be. Considering the information on Google Groups, I think that you are looking at a site that really should be allowed.

    our 'antivirus' software prevents our machines (even machines that host production applications) from carrying out legitimate functions, such as the sending of email via SMTP

    Time to get new anti-virus software. Good AV software, will allow you to scan message in- and out- bound via POP, IMAP and SMTP.

    individual employees are forced to apply security patches with little or no notice, under threat of their machines loosing network access, if they do not comply by the deadline

    Very poor policy. This should be handled by professional IT workers. Not because the end user doesn't know what is going on, they might, however, something could go wrong, and someone better equiped to handle those issues should be on hand for them. Like the parent said, at this point, you could even have these patches be automated.

    The main message asked about other companies, so ... I used to be an IT worker for an international law firm (before returning to school). Everything that was just described would have never happened at that place. The IT staff handled all computer issues. With most of the security being done in a way that was transparent to the end users. AV software - they didn't notice it, and it auto updated itself. Firewall - blocked objectional sites, but there was a policy to allow them, because some times it was necessary to view them (sometimes you have to serve legal documents to the porn companies). And patches were handled by the IT staff, usually in off hours.
    To me you have an IT staff for a reason, they are there to handle computer issues. They should not be there to be some draconian department that weilds their power as if they are doing you a favor. They are there to handle your computer problems. They should also take some of the responsibility for that as well, which includes handling most of the issues that you listed.

    RonB
  • by Savage-Rabbit ( 308260 ) on Wednesday January 18, 2006 @10:02PM (#14506014)
    Yeah, weird that they might want a machine running Windows XP to be updated. You might have Linux on the machine, but you also had Windows XP, and it sounds like it was missing security patches.

    The fact that he hadn't noticed the loginscripts for over a week indicates to me that the didn't use his XP installation at work alot and even then how can you assert it wasn't patched? He may even have had to wait until a patch becaeme available to qualify for a connection because his XP installation was already fully patches! Off hand I am guessing this guy probably got issued a laptop from his employer and used installed Linux on it for day to day for home as well as for work use dual booted with XP for mostly for gaming and perhaps for that once-in-a-blue-moon that he couldn't get something done at work with Wine+[Random M$ application] and for Gaming.

    I fail to see how this was stupid of the network admins. Draconian maybe, but it got you to apply the security patches.

    It is stupid because they could have exempted him from their Windows specific policy quite easily. It is stupid because they may even have given him a hard time because they didn't even know how to exempt a non Windows boxen from their MS specific setup. All it would have taken was to send somebody up stairs to check out his setup for security and if it was OK adapt the policy. If you are an IT tech that works alot around Engineers, non-MS admins or Programmers you are going to have to get used to cases like this (ie. escaped mental patients who use Linux or OS.X in a corporate environment) and unless you find out how to cater to people running non-MS Operating systems you will quickly find out that you haven't got any friends willing to do you a favor when you really need it (ie. when you have screwed up and need a quick fix from the local nerds).
  • by justin_w_hall ( 188568 ) on Wednesday January 18, 2006 @10:32PM (#14506180) Homepage
    Disclaimer: I work on the security team for a rather large (Fortune 5) corporation.

    I would say, compare the environment of the public internet to how it was ten years ago. Would you place your unpatched Windows machine directly on the public internet now? You have (roughly) ten minutes before another infected machine exploits one of the dozen out-of-the-box vulnerabilities that will allow them to run anything it wants on your PC. Not the case ten years ago.

    Unfortunately, what was once a rather quiet suburb filled with geeks posting to Usenet and using Mosaic is now a post-nuclear, disease filled demilitarized zone where so many infected systems simply sit and try to infect others that a defenseless machine (or a network of them) is doomed.

    Trying to manage security in this environment is a much more difficult job than it ever has been, and every month that goes by makes it more difficult. We shudder on the second Tuesday of every month at what new terrifying vulnerability Microsoft will tell us is in their product that's deployed on a hundred thousand machines on our network. We plead with other IT teams (networking, server admins, client admins) to implement our tools and software and protect the environment, but most of them get pushed to the back burner, either because it's "too invasive", i.e. it annoys the end user too much; or it costs too much; or they just don't have the time.

    Then MS05-039 [microsoft.com] is released. We plead and plead for the patches to be distributed right away because of how severe the threat is. But users like the submitter can't stand to have their PC rebooted unless it's the absolute perfect time. Plus, we have 1700+ applications to test compatibility with the patch on, on hundreds of different PC environments. And it requires a service pack we don't have deployed everywhere, again, because it's too invasive.

    Then Zotob.E [symantec.com] gets into the environment, and shuts down large sites in a matter of minutes. Then people scream even louder! Where is security? Why didn't they prevent this?

    Because no one takes security seriously until it's too late.

    From a security admin's perspective, we never have enough resources or management support to fully defend against even the most prevalent threats. Because security (and, as most admins know, IT in general) is underfunded. Because of (very real) scenarios like I described above, we have much more support than we did, and things are improving.

    I guess my point is, step into our shoes for a few days. We don't enjoy being draconian - we like Google Groups as much as anyone else! But there are so many attack vectors that we have to be concerned about to protect the environment - and it only takes one. One of my co-workers is fond of the saying, "the hackers only have to be lucky once - you have to be lucky all of the time."

    I guarantee every IT admin reading this is thinking, well, if you did this instead of that, if you had two hundred guys on your security team, with all of them testing patches, while listening to every end user complaint and rectifying their situation immediately, you could stay out of the end-user's way! Trust me - we know. We wish our teams were as stacked as they should be. Heck, we wish it wasn't necessary at all to have to defend against stuff like WMF [microsoft.com], where any end-user clicking on a link from their IM buddy could get exploited in a second... we wish it wasn't like this. We wish things could go back to how they were ten years ago. The reality is, this is the internet we built and we are fighting to protect our assets from.
  • by ZenShadow ( 101870 ) on Wednesday January 18, 2006 @10:38PM (#14506213) Homepage
    You seem to forget two things:

    (a) Freedom cuts both ways. People have freedom of expression, and people have the freedom of employees to prevent themselves from being exposed to porn in the workplace. If you're looking at porn at work, you're taking the latter right away from all your coworkers. Which do you take away: the right that one person enjoys, or the right that many people enjoy? Perhaps a poor explanation, but the principle is valid.

    (b) The workplace is not a free environment. You are working for someone, on THEIR property. What you do on your own time is your own business. What you do on company property is very much the company's business.

    Freedom does not mean "I can do whatever the hell I want, whenever the hell I want, wherever the hell I want," at least if it is to be applied to more than one person.

    --S
  • Oh, good Lord. (Score:1, Insightful)

    by Anonymous Coward on Wednesday January 18, 2006 @10:39PM (#14506220)
    All this whole comment is about is "I can't surf without penalty, I can't run my own machine, wahh..."

    First: Did you buy the network infrastructure? If not, then you don't make policy.
    Second: Did you buy the computer? No? Then again, you can't bitch about the way it's controlled.

    Why stop SMTP mail? On a Windows network, if you're running Exchange, there is NO reason to have SMTP mail enabled. Outlook transfers its mail to Exchange for delivery. Unless, of course, you're trying to bypass the corporate mail server.

    "Overzealous Proxy Servers" - ? Hardly. Deny all, explicitly allow.

    In most cases, you do NOT own the computer. Even if you DO (contractor), then you don't own the network infrastructure.

    Too many liabilities - including morons like the submitter - are why *real* IT staffs have to keep things under tight control and wraps, so that when the next Windows vulnerability surfaces, we can limit its impact and rampant stupidity.

    However, since this is gonna be posted AC, nobody will read it anyway .....
  • by bataras ( 169548 ) on Wednesday January 18, 2006 @10:46PM (#14506253)
    While I'm all for having 2 machines over 1 dual boot, I don't follow your logic points for why 2 machines are better for you as the IT person...

    * One side is always down, meaning network monitors need special work

    If you give the guy 2 machines, one side could still be "always" down as he may turn on only the one he needs while working. The fact that he can work now with a dual boot machine means exactly this.

    * Either both sides share one IP address, or each gets its own. Either figure out which one is running, or figure out which address to use.

    If you gave him 2 machines, you'd have probably 2 IPs as well. Though not necessarily if he has one in use at a time. Maybe he switched the single network cable allowed in his cube when he switches machines.

    * It requires physical intervention (or extraordinary hacks) to reboot remotely to the other OS

    Why would you be remotely rebooting his machine? And changing the lilo ini file (or windows boot.ini) to default to the other os before rebooting doesn't seem like an "extraordinary hack" anyway. I'm sure you're probably a couple of clicks away from a boot-to-other-OS script/tool too.

    * I can't just wax the whole thing if something goes wrong

    And if you gave him 2 machines, you -can- just wax the whole thing?

    * Rebooting implies root access for whoever is around

    But if you gave him 2 machines, you'd still need this implied root access to reboot them.

    * In short, they're a PITA

    I'm not quite conviced.
  • by LurkerXXX ( 667952 ) on Wednesday January 18, 2006 @10:53PM (#14506288)
    It is stupid because they could have exempted him from their Windows specific policy quite easily. It is stupid because they may even have given him a hard time because they didn't even know how to exempt a non Windows boxen from their MS specific setup. All it would have taken was to send somebody up stairs to check out his setup for security and if it was OK adapt the policy.

    But it wasn't ok. He had a dual boot system, with one of the OS's way behind on patches. That's not secure. Any time he rebooted into the other OS he'd be wide open for exploits that had come out since the patch was publicised. If he was admining the box properly and maintaining ALL the software on it himself it wouldn't have been an issue.

  • Re:Technology (Score:3, Insightful)

    by Metzli ( 184903 ) on Wednesday January 18, 2006 @11:08PM (#14506374)
    Exactly. I do IT security and, as a general rule, access to many sites are blocked. If someone can come up with a business justification for why they need access, then I don't have a problem with it. I've been a sysadmin where I needed to use web-based email to communicate with a vendor because the corporate mail servers often blacklisted legitimate traffic. If you need something to get your job done and are willing to explain it in a document to your boss and mine, then I'm pretty good about letting you get to what you deem critical.

    Yes, there are some IT folks who get a power trip over what they can keep people from accessing, but I would argue that most of us aren't like that. Every business has data that is considered sensitive, but some (financial, medical, legal, etc.) have data that is considerably more sensitive.

    Before saying that IT is draconian, ask yourself how secure you want the business holding your data to be. Would feel comfortable knowing that your bank records are held at a place that doesn't do regular updates of the OSes and A/V software? Would you want your credit card info at a place that doesn't control which system can send SMTP traffic to the outside world, especially since it could be used to send your records to anywhere on the globe? Would you want your medical records held in a place that allows its normal business users to access IM servers, possilby introducing worms into the network and/or using the IM service to send out your data? Is this paranoid? Possibly. Is it a realistic view? Absolutely.

    The OP talked about the way things were years ago. Ten years ago, it was also a wild west on the Internet. I personally had a Unix workstation hacked, as did a friend. The threats exist and they can be very serious, so IT has to take them seriously. The main problem that many IT shops have (my current one included) is that we still have problems with the delicate balance between security and usability. The users need to understand that what we do is done for the good of the company and our customers, but we need to understand that the job still has to get done.
  • Re:Technology (Score:2, Insightful)

    by TheSkyIsPurple ( 901118 ) on Wednesday January 18, 2006 @11:14PM (#14506405)
    Yeah, those are bad as well, but there is no generally accepted method of dealing with those.

    You can't just search everyone's belongings as they enter the workplace... and simply having the materials wouldn't imply that they were going to be used at the workplace... You can't reasonably put a camera in everyone office monitoring for these sorts of activity either... It's just not a tractable problem.

    However, a webpage has been requested... it is being acted upon... and it is something that can be monitored.

    I've seen employment cases lost on much weaker issues...
  • by Stargoat ( 658863 ) <stargoat@gmail.com> on Wednesday January 18, 2006 @11:17PM (#14506425) Journal
    I work in a bank. If we fuck up IT security, someone loses a lot of money. The only place more stressful is a hospital. Someone fucks up IT security there, people die.

    IT security was a bit of a joke 7 years ago. It isn't funny any more.
  • by ocbwilg ( 259828 ) on Wednesday January 18, 2006 @11:32PM (#14506520)
    Looking back at my company, 10 years ago, our machines were connected directly to the Internet, no proxy, no firewall, no antivirus software.

    Looking back 10 years ago, your biggest threat was someone bringing a virus-infected floppy disk into work and taking down one of the 20 computers in your 50-person office. But hey, if you want to connect your PC to the Internet with no proxy, no firewall, and no virus protection, then be my guest. I doubt your PC lasts 24 hours before it becomes unusable.

    Today, my company's proxy server blocks access to: 'bad' web sites (such as Google Groups;

    And also very likely thousands of hacking, piracy, virus, worm, spyware, and phishing-related sites.

    our 'antivirus' software prevents our machines (even machines that host production applications) from carrying out legitimate functions, such as the sending of email via SMTP

    If it really is a legitimate purpose, you shouldn't have any problems being granted an exception for your specific case. Everywhere I have ever worked has done so.

    and individual employees are forced to apply security patches with little or no notice, under threat of their machines loosing network access, if they do not comply by the deadline.

    Ah, now I see. Your administration is incompetent. Under no circumstances should end users be installing security patches. They should be installed by administrators (if not automatically), and there shouldn't be any concern about cutting off non-compliant PCs because there won't be any. Anything less isn't security at all.

    have we become so secure that we're stifling our own ability to get things done?

    We haven't, but it sounds like the folks running the show at your place may have. But it also sounds like they don't know what they're doing either.
  • by aaronl ( 43811 ) on Wednesday January 18, 2006 @11:59PM (#14506695) Homepage
    Your dual boot would require all sorts of special circumstance things. If you're maintaining hundreds or thousands of machines, having a few that you can't just use your tools for creates problems. Having to reboot a machine means having to log into your machine special and wait for it to come around. The more people do it, the more unreasonable it gets.

    The two machine situation is much easier to deal with. Send everything a WOL packet, wait for them to boot, do your work. Or just set policy that machines don't get turned off, if you like.

    Remember, that is *not* your computer. It's the company computer that they let you use. You play by their rules... complain, find other work, whatever, but if you want to mess around, do it at home.

    I would rather deal with VMWare than with dual-boot. I would rather still to have two machines at the desk. It is the easiest of all available options for having two OS's at one desk.

    ---

    You see, one of a two machine setup will not always be down, as you can have both on at the same time. With dual-boot, you have no choice, one *must* be down at all times.

    You get different IPs for different ethernet addresses. You have two machines with two network cards, so you have two IPs, simple as that. This is not a problem. From administrative standpoint, two IPs is easy to deal with. You just include both in your management software and away you go. One machine with two OS's doesn't work this way.

    You *would* be remotely rebooting the machine. It is absolutely asinine to think that you would go to each machine in person. It would take weeks to get a single update deployed in most corporate settings if you did that. If you have to write some silly set of scripts to do things, you now have a nonstandard setup. You can't manage that machine as a UNIX box or a Windows box; you have to make a special group for all Linux machines, BSD machines, Solaris machines, etc, and then *another* set of special groups for every combination of those.

    If the person has two machines, you have the standard Windows image and the standard Linux (or whatever) image. You drop whichever is appropriate onto the broken machine. The user should never have critical data only stored on the workstation.
  • Re:Technology (Score:2, Insightful)

    by aaronl ( 43811 ) on Thursday January 19, 2006 @12:06AM (#14506734) Homepage
    I believe you completely missed the GP's point.

    First, the reason the certs don't matter is because you can get by without learning anything. You *can*, however, learn a lot from those programs, if you want to. Getting the cert means the opportunity for organized education on the topic.

    Second, if you have to use Google Groups, or whatever, for something ridiculous, like 90% of your problems, then you probably don't know what you're doing. Using all available avenues to solve your problem is certainly needed. Always needing to look for help whenever you have a problem shows lack of experience and education. This goes back to getting yourself certs to better your ability; you could also just buy a book and get a similar betterment.

    Sure I look at Google for answers to problems, but for many problems, I know how to deal with it already. Most of the time that I look up something, it's a reference to the problem that I'm solving, because I don't remember the exact procedure. However, if you're dead in the water because your Internet link is broken, and you have to look 90% of your issues up on Google, you're screwed.
  • Re:unconvincing. (Score:4, Insightful)

    by bitslinger_42 ( 598584 ) on Thursday January 19, 2006 @12:25AM (#14506852)

    Insightful? You gotta be kidding!

    I have been a corporate security professional for over 10 years, and the only people that I ever get whines from like the parent are typically engineers or IT people who either believe that a) they are God's gift to computers and/or b) the rules don't apply to them. I may seem a bit pissy here, but it just burns me to read posts like this from people who clearly have never tried to think about security from the perspective of the business protecting its assets.

    Contrary to what most people seem to think, companies do not exist for the convience of the employees. It is the other way around. Employees have jobs to do what the company tells them to. If the policies at your company don't allow for any way for you to do your job, talk to management. More than likely, either an alternative solution exists, or the business function you're trying to do hasn't come up before and security will have to figure out how to incorporate it. If the problem is that the official method of doing your job isn't as convenient, as cool, or as uber as what you'd like to do, then either get over it or get a different job. Corporate policies and standards are put in place to homogenize the environment, ease support, and maintain regulatory compliance. They are not put in place, at least in my company, to inconvenience employees. In fact, the point behind security efforts in my environment is to enable the business to do everything they need to do, but in a manner that doesn't put the company at risk. Some times, this means that one business unit will have to accept a less-than-optimal solution because of more pressing issues at another, but we haven't been faced yet with a situation where there's been no way to safely do a valid business function.

    In large corporations, in particular, security decisions are frequently a balance between the needs of very different business units. For example, a unit that provides credit functions to customers in the US is regulated by the Gramm-Leach-Bliley Act [ftc.gov], but a manufacturing unit in the same corporation wouldn't be normally. GLBA may apply to both, however, unless there is some system in place to prevent mistakes at the manufacturing unit from affecting the credit unit. So, while encrypted, authenticated wireless access may not be convenient for an engineer at the manufacturing unit, without internal firewalls to segment security zones, encrypted, authenticated wireless is the only option.

    Don't get me wrong, we do things I don't agree with. Proxy blocking, for example, seems pointless to me. Surfing porn from a company system is not a technical issue, it is an HR issue. Have a policy that states what is acceptable, give one warning per user, then fire their ass. Believe me, Internet usage reports get much cleaner when someone at a site has been fired recently, regardless of what the proxy is blocking.

    Oh, yeah. The so-called draconian policies we have in place have created an environment where a really, really bad virus outbreak is 2-3 machines worldwide. Before we went down this path, there were worms that affected thousands of systems all around the world. We also have a very, very low incidence of harassment issues, we have five-nines uptime on our production systems, we've never had to completely sever our Internet connections to deal with security threats, and we've managed to balance security and business function well enough that end-users rarely have to contact the help desk because a security measure is preventing them from doing their job. Things may not work this well at other companies, but whinging on /. isn't likely to change that anyway.

  • Re:Management? (Score:1, Insightful)

    by Anonymous Coward on Thursday January 19, 2006 @01:59AM (#14507309)
    From your statement above of the activities you've been involved in stopping, I'd say you're part of a relative few IT professionals who seem to really know how to effectively control computer abuse. If I ever had to work with a supporting IT department that had skills like that, I'd feel honoured. My experience has been that if a computing department has skilled employees, policies and procedures for end users will be sane and acceptible. Contrary to that, if an IT department does not have skilled employees, a great way to mask that fact is to hide behind draconian security policies.

    I've moved from one camp to the other, from IT Support/Security to application development. I also relatively recently moved development jobs and found the present organisation I work for were paralysed by an outsourced security company. Not long after I started I was pulled in to help the in house IT manager site cases to our outsourced IT security why the current deployment conditions had to change. It was quite a nice change to watch the formally static outsourced IT company start to help us create solutions to problems whereas before their continued message had been straight "No" with very little room for maneuvering.

    From a security professionals point of view, I guess there is nothing more frustrating then trying to educate users as to why they can't do something and move them to alternatives, then watching them just try do it again.

    Back to your original post though, nice work and keep on truckin: ) Though I'm still glad I moved from support/security to development, if I'd stayed in that field I'd hope to have achieved similar things.
  • by Anonymous Coward on Thursday January 19, 2006 @02:00AM (#14507315)
    First, I doubt any user owns any of the computers at your company. Stop thinking of the computer in your office or your backpack as YOUR computer. But don't stop there -- correct your thinking while you're at it: start thinking of that computer as a SERVICE the company provides to its employees to do what and ONLY what the company wants you to do.

    You do NOT have ANY rights regarding that computer, the software installed on it, how it runs, etc. You also should NOT be browsing the web for personal enjoyment or reading personal email.

    Face reality - you are there to do a job and any time you spend doing something else is time you are being unethical. Do you think your colleagues on the GM assembly lines have ANY sympathy for your whining? They have every minute of their working day scripted by the timing of the line, down to how long they get in the bathroom. Most IT workers in the US spend 80% of their day surfing the web or chatting online, then go home and bitch about how the IT group cut off AOL access.

    You are there to DO WHAT YOU ARE TOLD and to SERVE THE COMPANY TO EARN YOUR PAY. You are NOT there to go to websites the company doesn't ask you to visit. Do what you're told or find a better job, if you really think you can.

    I am soooo sick of whiny white-collar workers who think they really work after surfing the web all day - you'd think none of those people knows a person with a real job.
  • by Money for Nothin' ( 754763 ) on Thursday January 19, 2006 @02:16AM (#14507377)

    On one hand, you can never be too secure, however on the other hand, have we become so secure that we're stifling our own ability to get things done?

    Yes, you *can* be too-secure. "Too much security" occurs when you can't get work done -- as is your case. The only *real* question facing corporate IT is "what amount of liberty is necessary to perform the duties of the employee requesting that access?" In true totalitarian style, the old computer security saying "that which is not expressly-permitted is forbidden" is the basic principle of current corporate IT security.

    We have this same problem where I work. Thank shitty MSFT security for the current mess...

    On a related, more-general note, security and liberty are *always* at odds. They logically must be: if you are restricted from performing action A, then you are not at liberty to perform action A. Simple as that.

    For a real-world example: if you are locked-out of somebody's home, then you are not free to open the door to that home. The home is secure against your entry (at least from this particular vector).

    Frankly, he who wants to be both safe and free will never have what cannot be.
  • by starfishsystems ( 834319 ) on Thursday January 19, 2006 @02:54AM (#14507516) Homepage
    My policy for dual-boot machines is this: No.

    Realistically, it seems like there are really two ways to go here. Either build an environment in which all elements can be rigorously locked down and validated, or be prepared to contain the effects of allowing people to attach foreign equipment such as laptops or other systems that they maintain to their own standards.

    Security comes down to defining the conditions of ownership and trust at each point in the computing environment. That's something agreed at the policy level, but then enforced through all the technical mechanisms we know and love.

    So you're right to talk about policy, but try to step up one level of abstraction. From a policy perspective, a dual boot system and a laptop are both examples of foreign, volatile equipment. If you forbid one, it makes no sense to allow the other. If you allow either, somebody has to fund the additional risk containment.

  • Re:Management? (Score:3, Insightful)

    by rmm4pi8 ( 680224 ) <rmiller@reasonab ... t ['ler' in gap]> on Thursday January 19, 2006 @03:44AM (#14507672) Homepage
    1) Ever heard of a file server?

    2) Take the box off the new while it's doing the sim. Thus, sim gets done, box doesn't get owned, net stays secure.

    3/4) These aren't evidence that your IT department values security over ease-of-use, but rather that they're totally incompetent, utterly crazy, or both.
  • Re:Management? (Score:4, Insightful)

    by maxwell demon ( 590494 ) on Thursday January 19, 2006 @06:34AM (#14508093) Journal

    1) A bug in one of our products affects an important customer. Engineering works feverishly to release updated firmware to fix the problem. As soon as the fix is validated, we e-mail it to the customer, but they never get the attachment. Why? IT decided to block attachments for unknown file types. The director of my division calls IT and compains. The response: "Sorry, that's our new policy." Our solution: I fly to Germany to hand deliver the updated firmware on a CD. Cost to the company: about $4000 in travel, 2 days of my time, and a customer who thinks we're crazy.

    Did the director tell the IT department about your specific file type, so they could just add that to the white list of allowed attachments instead of just allowing all sorts of attachments? If he did, and they refused to add that file type, it's their fault. If he didn't, then it's his fault. BTW, hand delivery is indeed crazy: If an email attachment had beed enough, surely mailing them a CD-R with the patches would have done it as well, and would surely have cost you less. But even for email, there might be solutions, like uuencode (which makes the file part of the mail text instead of an attachment, and therefore might not be detected/blocked by the automatic filters).

    2) We are completing the timing analysis for a new ASIC. The simulations take about a week to complete, and if they are interrupted we have to start over. The only problem is that every time we start the tests, IT deploys a new security patch and forces a reboot of the PC before the testing can complete. This happens repeatedly and results in a 2 month delay in getting the chips made. We make up some of that lost time, but the project still slips by more than a month. As a result, we were contractually obligated to refund $200,000 of the NRE we got for doing the work since we missed our dates.

    Did you talk to the IT department about this? Would it have been an option to take the PC from the net during the testing period, and then apply all securiy patches in one bulk before reconnecting it?

    3) We use ClearCase for source code control. Everyone in the company with a unix account had access to the source code and could check in and check out files. Our IT department decided this was a security risk -- reasonable, I suppose. To correct the problem, without notice they disabled access for everyone. They then sent out an email saying that anyone who needed access had to fill out a form, get it signed by a manager, and fax it to their department. They were so bombarded with these requests that it took about 3 weeks to process them all and get everyone's access restored. It took them about 2 weeks to get to mine. During that time, my company paid me a fat salary to sit at my desk and learn how to work a rubik's cube. I can now work a rubik's cube in about 90 seconds, but this is of questionable value to my company.

    Ok, this one is clearly a stupid action from your IT department.

    4) To increase password security, our IT department implemented a new password policy. All passwords must be at least 8 characters long, contain at least one uppercase character, one lowercase character, and one number or symbol. All passwords must be changed every 30 days. When changing your password, you can't use any of the last 10 passwords you have used. Every system that requires a login must use a different password (I have a windows login, a unix login, a SAP login, and a login for an internal bug tracking tool). Ironically, all of these systems use LDAP authentication which was implemented about 2 years ago so that we could use the SAME password for all our accounts. If you enter the wrong password 5 times, your account gets locked out and you have to issue a ticket to the help desk to get your account restored. This usually takes about a day. The result of this new policy: people write their passwords on post-it notes and stick it on their monitor because they

  • Re:Management? (Score:5, Insightful)

    by Alioth ( 221270 ) <no@spam> on Thursday January 19, 2006 @06:56AM (#14508140) Journal
    Someone needs to get hold of your IT department and tell them they don't work in a vacuum. It *is* possible to design a good security, update, patch etc. policy - but it HAS to be done in conjunction with the rest of the business (and the rest of the business must at least understand a little bit about information security and the need for an orderly process). Your IT department management is incompetent by the sounds of it.
  • Re:Management? (Score:5, Insightful)

    by cowbutt ( 21077 ) on Thursday January 19, 2006 @07:01AM (#14508150) Journal
    Seconded. Good information security should ideally be transparent, and with a bit of work on the part of the people implementing it, often can be. Sometimes, it's even possible for the good security to facilitate working practices that wouldn't have previously been considered possible.
  • Re:Management? (Score:5, Insightful)

    by dclydew ( 14163 ) <dclydew@gmail.com> on Thursday January 19, 2006 @11:25AM (#14509428)
    In your first two examples, I think that the security team was being entirely reasonable. Files should not be transmitted via email, tools like FTP/SFTP appear much more suited for such work. Using the right tools, often improves security. In the second instance, taking the system off of the network while building should fix the problem. I wouldn't be surprised if the third example had to do with SOX, since we had to do something similar here. All systems had to have a managed trail that could tell us which employees had access, when they accessed and what they accessed. On a number of older systems, we found lots of generic ID's that were being used by multiple employees. We didn't have the luxury of slowly fixing this issue. We were told by the auditors that it HAD to HAPPEN IMMEDIATELY, or we would fail complaince.

    The password thing sounds bad. 8 characters is ok (though not really mush more secure these days), no repeating of old passwords is ok (again not great), but 30 days is very bad. 30 days to lead to two problems. 1) People write it down on sticky notes; B) People make easy to remember "MyFebPwd1" "MyMarchPwd1" etc.

    It sounds like the person who made your password policy could do with a dose of accurate information about the usability of passwords. However, the other stuff seems reasonable to me.
  • by Pac ( 9516 ) <paulo...candido@@@gmail...com> on Thursday January 19, 2006 @11:46AM (#14509638)
    From your examples, it looks like your whole IT deparment is working very hard to be downsized or outsourced. From my experience, the minute a smart VP or CEO (or, a common case, an external consultant who has the VP or the CEO's ear) notices and documents the kind of impact they are having in the bottom line, lots of high and middle heads will start rolling. Having inflexible rules when your market is evolving or constantly changing (and when your market is global it is always changing and evolving) is so dumb it hurts - when have we called the high priests back to the computer room, anyway? I though we had all agreed to send them home for good by the end of the 70's.

With your bare hands?!?

Working...