Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Sys-Admins Reading the Bosses Mail? 398

PetManimal writes "Computerworld has an article about IT staff who have access to corner-office email. Systems administrators, database administrators, storage administrators and higher level IT super users are the types who may access sensitive executive information; one source quoted in the article says that in a company with 1,500 employees, there might typically be five to 10 administrators who have this access. As for how many abuse these priviledges, it's hard to tell, but rogue admins out for workplace revenge or personal gain can wreak havoc: '... Experts agree that the severity of these occurrences generally makes them more harmful than external attacks. One of the biggest obstacles to eliminating unauthorized access is determining how many people have it. Access lists are particularly difficult to formulate in both mature companies, where the number and power of administrators have expanded over periods of years, and small companies, where rapid growth leads to undocumented tangles of administrators who are able to maintain their access because nobody has time to assess their status.'"
This discussion has been archived. No new comments can be posted.

Sys-Admins Reading the Bosses Mail?

Comments Filter:
  • Clearance Control (Score:5, Insightful)

    by Shadow Wrought ( 586631 ) * <shadow.wrought@g m a il.com> on Wednesday October 25, 2006 @12:12PM (#16579472) Homepage Journal
    A friend in the Government once told me that after the Pollard spy scandal the Government rethought the way it handled clearances. So now there is a discreet pool of clearances. There's no reason why a company, new, mature, huge, or small shouldn't be able to institute a similar policy in terms of access.
  • by Anonymous Coward on Wednesday October 25, 2006 @12:12PM (#16579490)
    The article mentions the lack of encryption and I suspect if it ever starts being used the same IT folks who have admin access will end up with the encryption keys, so the added admin and overhead won't buy you more security from prying eyes.
  • by Silver Sloth ( 770927 ) on Wednesday October 25, 2006 @12:14PM (#16579526)
    Knows how to break IT security, but no longer needs to.
  • by cyanics ( 168644 ) on Wednesday October 25, 2006 @12:15PM (#16579578) Homepage Journal
    Would you be upset if your alergist (doctor) had access to your blood work? No. It is his job. Trust is a huge component of system administration, and any company, or corporation, who doesn't understand that the administrator has the keys to the system, needs to take a better look at their corporate layout.

    Admins have access to everything. Or at least they should have access to virtually everything. Because who would you call if it was broken? certainly not the corner office.

    Trust is necessary. You have to trust your admins. And if you have an admin that leaves under suspicious or grievious circumstances, you protect your corporations ass with a dismissal agreement.
  • Dog bites man. I (Score:5, Insightful)

    by wwest4 ( 183559 ) on Wednesday October 25, 2006 @12:18PM (#16579632)
    If you don't have a chain of trust in your IT department you're fucked... even if you do spend bank on "secure internal IT infrastructure."

    The rest of the article is all over the place. There's some mention of rogue admins reading executive e-mail rolled into boilerplate security talk about how X% of security risks are insider threats, and then it finishes up with a vaguely related sales pitch for RSA products, owned by... yep, EMC. The guys providing ComputerWorld with ad revenue on that sidebar.

    Hopefully those scared VPs will hire consultants and purchase EMC products to "secure" their infrastructure from "rogue admins" who are probably reading their e-mail RIGHT NOW.
  • by overshoot ( 39700 ) on Wednesday October 25, 2006 @12:19PM (#16579650)
    sysadmins cannot do their jobs without full access to the systems they support.
    Which isn't the same thing as having full access to the data on them.

    There are, after all, fairly straightforward ways to secure data against the admins (assuming they don't actually install spyware, which is a separate subject.) There are also ways to arrange secure key recovery so that the records can be recovered if Something Happens to the exec, but no one person can do it (say, three board members and an outside law firm.)

  • by qwijibo ( 101731 ) on Wednesday October 25, 2006 @12:19PM (#16579662)
    Policies are the problem, not the solution. The policies grant access only to those who have a legitimate business need. The practical problem occurs when you consider system administration to be an annoying fact of life to be relegated to the lowest bidder. The administrator has a legitimate business need to have priviledged access to the system. That same access means the administrator can do whatever they want. You can implement more policies to make it harder for someone to abuse their position without collusion, but the reality is that all systems have one or more people that you trust implicitly. The problem is that very few people think of making that trust explicit and well known to everyone who relies on it.
  • by Anonymous Coward on Wednesday October 25, 2006 @12:21PM (#16579698)
    If you do not trust your staff, you have other problems.

    In my consulting work I have worked with systems containing sensitive information. Outside the workplace and outside the context of my particular role the information was of no interest to me.
  • Re:PGP mainstream? (Score:3, Insightful)

    by wwest4 ( 183559 ) * on Wednesday October 25, 2006 @12:21PM (#16579706)
    The problem is: how will PGP stop an admin? Clickity-click, I just logged keystrokes and got Mr. Fancy Pants' private key password. You have to trust your admins to some degree.

  • by jafiwam ( 310805 ) on Wednesday October 25, 2006 @12:22PM (#16579732) Homepage Journal
    Also, maybe access but _logged_ access. And then a process where someone views the logs to look for unauthorized browsing.

    The DMV does it (every once in a while some bozo is fired from the state DMV for looking up minor celebrities information), I am sure many other less involved database systems can too.
  • by pkbarbiedoll ( 851110 ) on Wednesday October 25, 2006 @12:22PM (#16579740)
    Maybe if companies paid their workers fairly and instilled loyalty things like this wouldn't be such a worry. Instead we're asked to do the jobs of several people for fraction of payroll - and not complain about it. What do CEO's think is going to happen?
  • big deal (Score:2, Insightful)

    by dlc3007 ( 570880 ) on Wednesday October 25, 2006 @12:23PM (#16579744)
    I've got read access to the entire financial database. I can find out how much they spent for dinner on their last trip and their salary as well. Luckily for them, I just don't care.
  • by drsmithy ( 35869 ) <drsmithy@gmail. c o m> on Wednesday October 25, 2006 @12:23PM (#16579762)

    ...Then the battle is already lost. You may as well close up shop and go home.

    Which is not to say there aren't unscrupulous people out there who will abuse positions of trust, but this is a HR issue, not a technical/security one (and is most certainly not one limited to the IT department).

  • I have access.. (Score:2, Insightful)

    by Anonymous Coward on Wednesday October 25, 2006 @12:25PM (#16579806)
    I work for a relatively small company with approximately 100 employees, and being one of the two sysadmins, I could easily go in and look at anyone's email. One of the many reasons I have for not doing so is because I have dignity and want to respect peoples privacy, no matter who they are. Also I could probably find some "dirt" about someone, but in the end it does no good, and in some cases would probably piss me off. If there really is dirt going around the office, I would rather hear about it by traditional means, just like everyone else. I also think that knowing about certain situations that might be going on, which have no effect on my day-to-day duties, affects my ability to treat all employees with the same respect that they deserve.
  • by compunut ( 105677 ) on Wednesday October 25, 2006 @12:25PM (#16579810)
    At least in small business, and probably in all business, it is completely necessary for upper IT staff to have complete access to everything. I've lost count of how many times upper level management has come to me with the 'I forgot my password, can you get my stuff back?' request. This is a normal occurrence. If we take away the privileges of IT to access upper management data, then upper management is very likely to lose that data.

    As an anecdote, one of my customers (I am an IT consultant) lost the password to the video surveillance system. They immediately came to me, and were shocked and annoyed when I said 'Sorry, I wasn't involved in the installation of that system and was never informed of the passwords.' In the end, we found that a user had written down the password at one point and were able to get back in that way!

    The point really should be that companies better find upper IT staff that they can TRUST! If they can't trust their IT staff, they have big problems.
  • by Anonymous Coward on Wednesday October 25, 2006 @12:25PM (#16579826)
    with information being so hot these days don't you think organized crime cartels
    would do anything to have one or two admins in any network so they can glean
    information for their benefits? hmm?
  • by Lumpy ( 12016 ) on Wednesday October 25, 2006 @12:26PM (#16579852) Homepage
    here's a few facts for you.

    Computrerworld is nota very highly regarded magazine. It's a freebie they shove down your throat. only middled managers actually put ant value into that rag's words. All this article does is fester distrust of the IT department from managers that have not a clue.

    your IT admins can bury your company and wield far more power than the executive staff combined does. Yet compared to all other departments IT get's the lowest pay.

    One admin with all they keys can easily take down anyone in the company in scandal, legal, whatever. When I worked corperate I had the keys to send emails as any of the executives, Presidents and VP's. I could have placed "evidence" on any of their laptops and done them in.

    IT people typically have the "hero" attitude and do not do such things even in the face of being screwed. WE like to help and do good things for the network and PC's so the risk is low... but I know o some ticking time bombs that will go off eventually if those companies management does no tpull their heads out of their rear.
  • by dc.wander ( 415024 ) on Wednesday October 25, 2006 @12:27PM (#16579874)

    The solution is regularly teaching business ethics to students. Perhaps even make it mandatory to earn a degree. Certainly mandatory for a graduate degree.

    The suggestion that a mandatory degree and ethics classes will solve the problem is laughable. Many examples of why this is so exist: Citigroup, Enron, Worldcom... to name a few. Do they teach business ethics in MBA or CPA programs? Of course they do. Did it help? No.

  • by skids ( 119237 ) on Wednesday October 25, 2006 @12:27PM (#16579882) Homepage

    There are ways to run a business that limit the amount of information that has to be classified so that it can be relayed verbally or by sneakernet. Like not defrauding your workers or business associates is a good start, followed by not raking in huge undeserved stock options and bonuses, not downsizing and outsourcing just because it is the latest fad, and in general being competent to the point that the only people who care what's in your email are the rarer criminal element and not every damn single employee.

    Ahh, driftnet on the switch monitor port. Never has there been such an artistically odd juxtaposition of shoes, porn, corporate logos, and vacation photos.

  • by Shivetya ( 243324 ) on Wednesday October 25, 2006 @12:33PM (#16579984) Homepage Journal
    The still do not need access to the text of the email.

    Sorry, but here are quite a number of methods by which the admin could track down an errant email or such without knowing its contents.

    Its like passwords, your argument has been used before by people who defend systems in which the password is retrievable. The only way for me to know a user's password in my systems is if I set it myself or they tell me. There is not a method to recover them. The same can be done for the text and such of the mail.
  • by spottedkangaroo ( 451692 ) * on Wednesday October 25, 2006 @12:34PM (#16580020) Homepage
    Public key encryption, duh. Then, even if your admins had this access, which they must in some cases, they couldn't read the message anyway. The sooner CEOs catch on, the sooner everyone else will also.
  • by petes_PoV ( 912422 ) on Wednesday October 25, 2006 @12:38PM (#16580082)
    The biggest problem with this is the way lazy exec's just reply to all for every comment they make. If a request for info is sent out to (say) 20 people, it's very possible that all 20 recipients will get all the traffic on this subject - whether it's "sorry I don't know" or "don't bother, we're closing that location" or anything in between.

    You can't back security into an organisation. Either the individuals are prepared to put up with the extra work it needs, or they aren't. Without some effort from everyone, your level of security drops to that of the weakest link (usually the boss)

  • by pilgrim23 ( 716938 ) on Wednesday October 25, 2006 @12:38PM (#16580094)
    Or, they could act like government's true approach to security: everything is so sensitive, nothing can be read by anyone on any level, thereby removing all information from the decision making process. In the case of every corner office I have ever associated with, no change in practice would be observed at all.
  • by cyanics ( 168644 ) on Wednesday October 25, 2006 @12:40PM (#16580118) Homepage Journal
    Good response. However, why on earth would a corner office think that the contents of ANY email were secure. email is basically just plain text. it sits in the spool as basically plain text. it prints on your screen as plain text. there is typically no encoding, no decoding, and anyone who has an email client can read it.

    I guess it is a problem with assumption. Corners assume communication is privileged, and private. Well, it isn't. It's like using a megaphone to talk through the wall to the office next door. Yeah, no one outside your office might hear you, but you don't know how many people are in the next office listening.

    Corners can't assume that email is private. It doesn't work that way.
  • I am a Sysadmin (Score:2, Insightful)

    by darth300z ( 522565 ) on Wednesday October 25, 2006 @12:43PM (#16580190) Homepage
    I am a Sysadmin. I built the network, I built the mail server, I built the VOIP system, and I built the DVR security system. I have control over all of these things. I know what happens here before anyone else does. I see your every move, can listen to your every phone call, and yes, I can read your email.

    We are not regular employees. We aren't the boss. We occupy a grey area, because we control everything.

    My system has millions of dollars flowing through it. You trust me with that, but have a problem with reading an email?

    I am a Sysadmin. Trust me or not. Me reading your email is the least of your problems should you choose not to trust me.
  • by NMerriam ( 15122 ) <NMerriam@artboy.org> on Wednesday October 25, 2006 @12:52PM (#16580380) Homepage
    Its like passwords, your argument has been used before by people who defend systems in which the password is retrievable. The only way for me to know a user's password in my systems is if I set it myself or they tell me. There is not a method to recover them. The same can be done for the text and such of the mail.


    Except that assigning a new password and "destroying" the old one is a perfectly acceptable solution. So there is no need for anyone to be able to recover the old one. Destroying a document is not an acceptable solution -- if my boss needs me to recover a document, I need to be able to do it, whether it is by interacting with the application, searching through cache data, or scouring the individual hard disk sectors.

    Ultimately it does come down to trust (or greater monitoring), but you can't remove the fundamental ability of IT to be able to access all corporate data in some manner if you expect them to provide comprehensive support to the organization.
  • by Orange Crush ( 934731 ) on Wednesday October 25, 2006 @12:57PM (#16580492)
    The still do not need access to the text of the email. Sorry, but here are quite a number of methods by which the admin could track down an errant email or such without knowing its contents.

    That depends on who you work for/with. My boss likes to ask for things like:

    "Can you print me a copy of that e-mail I sent about our new sales strategy a few months ago? I think I deleted it."

    "Do you remember who you sent it to?

    "No."

    "Do you remember the date you sent it?"

    "Oh, a while ago."

    "What was it about?"

    "Sales."

    So anyway, when you work for people who routinely ask you questions that are about as specific as: "Hey, can you find me the thing I wrote about something just the other day?" it's helpful to be able to do fulltext searches and keep blunt throwable objects out of arm's reach.

  • by nine-times ( 778537 ) <nine.times@gmail.com> on Wednesday October 25, 2006 @01:01PM (#16580560) Homepage

    Yeah, people don't get what's going. In the first place, e-mail isn't a secure form of communication. It's usually transmitted unencrypted, and often your authentication to your e-mail server isn't encrypted. Whoever is running your e-mail server, whether it's your ISP or Google, can read your e-mail if they really want, and mostly you're relying on them to be disinterested in the matters you're sending back and forth. People should understand this.

    However, the second component here is that, if you can't trust your IT staff, you are in big trouble. The reason is this: even if you put security measures in place to restrict IT access to e-mail messages, your IT staff is going to have to put that in place. If you can't trust the person who institutes your security, you won't know for sure whether they left themselves a back-door in. Basically, you're trying to lock people out of a system that they've set up themselves, and they know the system better than you do (or you probably wouldn't have hired them).

    So the best solution-- the only solution-- is to hire IT people you can trust. When you hand over control of your network to someone, imagine it being like handing over keys to a storage room with all your information in it, with only their integrity to keep them from browsing through it.

    As an aside: you should also be careful about the communications you have through your office e-mail. Even well-intentioned trustworthy support personnel might stumble across it while fixing problems or troubleshooting. Take it from a guy who's accidentally stumbled across e-mail from an executive's mistress before. I was just browsing trough our spam filter to look for false positives, and there it was. I wasn't looking for it, wish I hadn't seen it, and didn't want to know, but there it was. So as a rule, if you have personal information you wouldn't feel comfortable telling your IT people (like that you're having an affair and doing coke on weekends), don't talk about it in your work e-mail account.

  • by kabocox ( 199019 ) on Wednesday October 25, 2006 @01:06PM (#16580694)
    Frankly, I say it's a nightmare for a small company when a big boss reads shit like this, freaks out, and all of a sudden you have to spend the next week trying to implement some goofy policy that will either be totally ignored, or tossed aside when it becomes a hassle. For larger companies, yes, internal security is no laughing matter. For small companies, when there's one, maybe 2 admins running the show, it's a wasted expense. They don't need intricate security policies. They need nothing more than, "Okay, I can access everything, everyone else can access their own shit. Done."

    And this is what is really wrong with IT now. In 100-200 years maybe when the industry starts to get alittle mature things will change, but currently the one or two computer guys have access to everything school of thought is really what's wrong with the entire industry. I'll consider this industry to be growing up when any small business could hire/fire/transfer admins with complete confidence that the new guy has complete access and the old guy has zero access without carrying home backups or enough info to successfully compete with the company. We just aren't there, yet. I know that I'm trust worthy, but I wouldn't trust any other IT person. I wouldn't trust Bill Gates or Linus to be left with ulitmate unchecked power over all my machines. Why would I want a setup where just 1 guy may or may not have complete control/access to the small network? Of course you need to define "small business." If you are talking about 10 networked computers and one temp. computer contracter guy that comes in to set things up or do windows up dates every 3 months or so, then your reasoning makes sense, but is still off. That computer guy no matter how trusted shouldn't have complete control over the network. What happens when that trusted computer guy is killed by a drunk driver, and then you have to hire a new guy?
  • by nine-times ( 778537 ) <nine.times@gmail.com> on Wednesday October 25, 2006 @01:24PM (#16581034) Homepage
    And what do you do about the IT personnel who have rights sufficient to circumvent logging or alter the logs? The difference from you DMV situation is that you're talking about logging random DMV workers, and not the person who set up the system and maintains it, therefore having read/write access to everything.
  • Funny but... (Score:3, Insightful)

    by Anonymous Coward on Wednesday October 25, 2006 @01:26PM (#16581062)
    but the title is still insightful. This is old news. At work, I'm a domain admin. I have unrestricted access to all the files on tends of thousands of workstations. And to countless shares on hundreds of servers, with lots of infos and documents. And several Exchange servers. And many large databases. Webservers too. You name it, I can access it, totally unrestricted. I have access to tape backup libs. I can read the CEO's mail and documents no problem. I could install keyloggers or anywhere or do packet sniffing or such.

    But, well paid employees in a job that doesn't suck aren't typically motivated to do immoral stuff. I get paid well, I'm respected, my hours are decent, etc. I have no reason to be disgruntled and do bad stuff. On the other hand, I can say I'm a fairly ethical person (saying otherwise would be false modesty). The idea is to have good employees, and keep them happy.

    Now, if I was some guy paid below what I deserve, in a high stress job that sucks, risking to be outsourced and all, with management making every second of your life miserable and such, poor workplace politics and the old backstabbing between co-workers, then yeah, I wouldn't be surprised when something bad happens... It's old news, disgruntled ppl will sometimes do that kind of stuff.
  • by Anonymous Coward on Wednesday October 25, 2006 @01:37PM (#16581240)
    re trusted guy getting hit by a car.

    Here, there's also an "if sysadmins get run over" domain admin account detailed in an envelope in the company safe (with appropriate precautions to make tampering evident).

    Use of that password and account will light up every sysadmins pager / mobile and is logged as critical in all monitoring kit. So there's the means to ensure business continuity, but a massive lart ready for anyone who abuses their access to that envelope.

    You still need to read the network docs and know wtf you're doing, but the solution works for us.
  • Re:big deal (Score:3, Insightful)

    by MrNougat ( 927651 ) <ckratsch@nOspAm.gmail.com> on Wednesday October 25, 2006 @01:42PM (#16581338)
    Luckily for them, I just don't care.


    You just haven't found anything worth caring about yet. Wait till you find out that all of the people who are at the same level in the org chart as you are make $20K more a year than you, and they all come to you all the time to get things done because none of them know what they're doing. Or that the person reporting to you makes $30K more. Or that the company subsidizes the CEO's political fundraisers (worse if it's for a political party you strongly oppose).

    Keep looking, you'll find something.
  • by DDLKermit007 ( 911046 ) on Wednesday October 25, 2006 @02:01PM (#16581698)
    Honestly you were better off leaving. Once you make your goals known to an employer that it's "higher paycheck or I'm leaving" your going to be leaving. They would have kept you around for a couple months till the contract was signed and the other party couldn't get out of it/they didn't care and you would have been canned once they could find someone to replace you. If a company isn't transparent with it's lifeblood (ie it's workers/key players) your best off getting the hell out while the getting is good. Sad thing is the only workers that usualy get any level of transparency is contract workers (or clout for that matter). Fine by me given I switched to that a couple years ago. Old clients at over double the regular rate. A good deal to me.
  • by chris_mahan ( 256577 ) <chris.mahan@gmail.com> on Wednesday October 25, 2006 @02:18PM (#16581982) Homepage
    Who keeps the systems where your private key is stored?
    On your desktop machine? Who keeps your desktop machine?
    On your USB? a) Are you violating a policy for using a USB device? and b) When then USB is plugged-in, it's part of the machine (see above)

    If it's passphrase encrypted, are you 100% sure that there isn't a software keylogger on your machine?

    Trust me, you can't hide anything from competent sysadmins.

    The only way to make sure you control your machine is to install it, secure it, and manage it yourself, but then you've become the sysadmin.

    And it may very well be that the company won't allow anyone but an experienced and trusted sysadmin to plug such a machine into the corporate network (for good reason I might add).

    So you might as well get used to the idea that sysadmins have access to everything on the network.

    [puts on sysadmin hat]
    Ad that is how it should be anyway if you want the network to even start down the path of better security.

  • postcard (Score:5, Insightful)

    by martin ( 1336 ) <maxsec@gmail.SLACKWAREcom minus distro> on Wednesday October 25, 2006 @02:23PM (#16582086) Journal
    Let me think, when all this email started getting popular in the mid 1990's wasn't the advice to treat it as postcard....

    ie it could be read during transmission buy the post-office worker (sys-admin)....

    just a gentle reminder.
  • by metamatic ( 202216 ) on Wednesday October 25, 2006 @02:28PM (#16582192) Homepage Journal
    Nope. You just encrypt everything. [...] If a user requires assistance in finding a file in an encrypted filesystem, then the admin might have to use remote desktop (or visit in person) and find the file under the supervision of the user.

    But in that scenario, IT can still get access to the encrypted data if they really want to. They can install a key logger and a tool that records your screen contents at intervals. Face it, you have to trust everyone who's able to install software on your computer.

    So while encryption may be able to reduce the number of IT staff who can read your e-mail--maybe the server admins can't read it now, only malicious desktop admins--you won't ever reduce the number to 0.

    Yeah its a real pain in the ass to do this, and it will require a lot of extra training for the users, but it is possible.

    It's a real pain in the ass, it requires lots of training, increases the risk of data loss, and it still doesn't actually prevent IT from being able to read your data. That's why nobody does it.

  • by NMerriam ( 15122 ) <NMerriam@artboy.org> on Wednesday October 25, 2006 @02:31PM (#16582236) Homepage
    Yes, it's possible. And even in your scenario, the admin ultimately has the ability to get at the data (albeit with a supervisor). You simply cannot remove that requirement the way you can with passwords, because you cannot destroy the data.

    Ultimately you do have to trust the IT department not to go to the vault together and decrypt everything over the weekend. They have to be able to decrypt things without the user, that's just a fundamental requirement for data preservation. You can put all the auditing and supervision on the process you like, but you can never escape the requirement unless you're willing to lose all data when an employee is killed in a car accident.
  • by Total_Wimp ( 564548 ) on Wednesday October 25, 2006 @02:41PM (#16582426)
    Insightful indead. Companies choose to trust CxOs, accountants, bookeepers and physical security personnel. These people can cause a tremendous amout of damage to a company, up to, and including, the complete collapse of the company (Enron, Worldcom, etc).

    The question isn't whether to trust, but under what conditions? Accountants and bookeepers often have checks, balances, licenses and bonding. CxOs have major positions of repsonsibilty with the salaries to match, and now they have Sarbanes-Oxley too. Physical security folks are often bonded, polygraphed, drug tested, etc.

    So which of these are most applicable to IT? Do we have checks, balances, licensing, bonding, major positions of responsibility with the salaries to match? Do we have polygraphs or drug tests? Do we have laws like SOX that put us in the hot seat if things go wrong?

    I'm not sugesting we should do any particular one of these things, but as IT continues to mature, and IT is seen, as it should be, as a single point of failure that could cause damage up to, and including, the complete collapse of the company, we're going to need to proffesionalize our practices to the point much greater than the blind faith that often exists today.

    TW

    (note: I know IT has a major role in SOX compliance, but we're not held responsible unless the company in question builds that into the system. Many companies aren't, at least not to the extent they should. If SOX causes more shops to know exactly who has access to email, and exactly how to go about making sure they're responsible and holding them accountable then, well, problem solved. I personally don't think SOX alone is enough.)
  • Re:Bullshit (Score:3, Insightful)

    by pmc ( 40532 ) on Wednesday October 25, 2006 @03:13PM (#16582880) Homepage
    There are three parts to IT security - confidentiality, integrity, and availability. An IT security policy must balance these. Your solution sacrifices availability. Maybe in some situations it is worth it, but in others it won't be. You say data should be secure - what do you mean? If data is on a public web server you know it isn't confidential, but you definitely want the webserver to be up, and you certainly don't want anyone unauthorised to change it.

    In your example (which boils down to two man working, essentially) you have increased the cost of support - is it worth paying? That depends - what are you relying on to enforce it (procedural or technical measures, a combination of these)? What are you protecting?

    There is also the rather tricky problem of defining who the owner is. If you have a data area with multiple people accessing it how do you put in sensible processes to manage this, and to recover the data when Fred fubars the spreadsheet. How do you audit use of the data (and do you even bother)?

    There are ways to cope with all of this, but a blanket "you lose your password, you lose your information (unless you put into action this very expensive process)" isn't a panacea.

    Finally - you say "all data in business can be reproduced, at the cost of time and effort". The first part, generally, isn't true. The "cost time and effort" also is misleading - sure, there will be problems where pouring money at them will get you better answers, but the business can't afford it (and it wouldn't be the first business that went down because they had an inappropriate security policy). It's a paradox, I suppose - important data is the only sort you can't afford to recover, because if it wasn't important you wouldn't need to.
  • by Wanker ( 17907 ) * on Wednesday October 25, 2006 @03:34PM (#16583212)
    If you don't want somebody else to see it, never type it.

    I use the phone a lot.


    I don't suppose you use voice-over-IP phones? I bet it would be trivial to set up auto-transcript on our CEO's phone IP...
  • by Dark_MadMax666 ( 907288 ) on Wednesday October 25, 2006 @03:38PM (#16583264)
    Seriously why it is such an issue? Yes - admins have access to most everything. So what? - its one of the upsides of being a sysadmin. you have to run backups , configure systems and such- your CIO will not do that (and most probably does not have skills for this either) . Now there is logging tools /products for auditing all secure object level access, but who is gonna implement them and put it in place? -That right exact same people .

      You don't bitch about plumber having access your basement ,or auto mechanic driving your car in repair bay , so don't bitch about people carrying weight of systems support of having necessary privileges.

      I can bitch about HR too - they have the most private information about employees (I saw HR files /data - in no way I would want them have that if I could) -but corporate culture justifies that .At least with sysadmins its a pretty good technical justification.

  • by rilian4 ( 591569 ) on Wednesday October 25, 2006 @03:39PM (#16583274) Journal
    When it comes down to it, there has to be a sysadmin at some level who is trusted to have complete access to the network. My mentor in college taught me and my classmates that a good sysadmin should always have a VERY trusted person who has access to a copy of the main password(s) to the network in case of physical injury or incapacitation. This trusted person has to know and be held accountable that they cannot use this information other than in an emergency.

    You simply cannot run a network effectively if you do not have full access to it. Somebody at some level has to be entrusted with this. The check/balance on this has to come from some kind of background check that would leave a resonable amount of certainty in the trustworthiness of the potential sysadmin.

    As Peter Parker's Uncle told him: "With great power comes great responsibility". A sysadmin should be trusted with that power in order to be as effective as possible but should also have to live up to the responsibility as well.
  • by Anonymous Coward on Wednesday October 25, 2006 @03:48PM (#16583442)
    I too have seen many knee-jerk reactions by management to any number of real or perceived problems.

    Think about it. A group of highly paid MBAs sit in a room and come up with an IT solution you are supposed to implement.

    It really doesn't matter whether or not their solution is workable. You MUST embrace it.

    If you do not embrace it, you will always be remembered as the "difficult one".

    And really, the stupider the idea is, the faster it will go away and be forgotten. It is kind of like evolution, good ideas live and bad ideas die.

    In the end, the managers will not remember the solution, or the problem. All they will remember is whether or not you were a "team player" or the "difficult one". Just always agree and do your best to implement. When it dies, let it die quietly. No funeral. No wake. Just let it go.
  • by sfjoe ( 470510 ) on Wednesday October 25, 2006 @03:52PM (#16583504)
    Since the government is already produces nothing tangible and operates as a net drain on the economy anyway

    It's fascinating how this particular piece of right-wing propaganda has become gospel through sheer repetition. When you add up the cumulative value of roads, schools, firehouses, ports and other government-sponsored projects it is most defintely NOT a net drain on the economy. Quite the contrary - it drives the economy.

  • by SharpFang ( 651121 ) on Wednesday October 25, 2006 @03:58PM (#16583602) Homepage Journal
    Who polices the police?

    If the company is huge, it's hard to audit all the systems to ensure no backdoors - especially that local admins have years of experience with said systems, often with custom modifications auditors will have no idea about. If the company is small, it's very expensive to employ a reliable external contractor who will implement security properly (and won't side with the admin instead of the boss, "overlooking" some backdoor). It may be easier in a new company where a system is created from scratch and a different crew is in charge of creating it, than the crew that will maintain it, but still there's nothing that stops an admin from installing an exploit instead of a patch on the mailserver and only regular, unexpected (and very expensive) audits can detect it.

    About the best way I know how such situation can be handled is to have dedicated, loyal employees and care for them.
    I didn't read my boss' mail. He was a nice guy and it would be rude, and I wouldn't do rude things to a nice guy.
  • by AHumbleOpinion ( 546848 ) on Wednesday October 25, 2006 @04:04PM (#16583686) Homepage
    ... followed by not raking in huge undeserved stock options and bonuses ...

    While I agree that there have been terrible abuses here, I also recognize that sometimes these options and bonuses are appropriate but that is not always readily apparent. First there is the agent problem. The boss is sometimes merely an agent of the owner(s), how do you make sure he acts in a manner that improves the owners situation rather than his own? Options are one way. This also works up and down the ranks, for bosses and workers. The other area where a big seemingly undeserved bonus is appropriate is for the founder(s) who lost interest/investment income by spending his/her saving to start a business, lost salary income as he/she worked for no salary or a partial salary in the early days of the business, who risked their financially security and reputation to pursing a dream, etc. If they get a couple of big bonuses to repay and compensate for the preceding once the company becomes established, IMHO that is fair. I've seen small companies get bought out, and I've seen employees complain that they got a far smaller bonus than the founder they worked side by side with. What these employees failed to realize is that they took little risk, and that their boss made personal sacrifices so that their payroll checks were there on schedule.

    Is the above a typical scenario? I have no idea, but I have seen it a couple of times. I believe it happens often enough to warrant mentioning among the stream of expected "bosses are evil and all profit should go to those doing the work" follow ups. Like many topics, things are far more complicated than they seem.
  • by Anonymous Coward on Wednesday October 25, 2006 @04:53PM (#16584452)
    Well, he was talking about the military... And it surely is a drain on the economy, producing only dead people and depleted uranium waste.
  • by MrZaius ( 321037 ) on Wednesday October 25, 2006 @07:16PM (#16586118) Homepage
    http://www.lacba.org/Files/Main%20Folder/Documents /%20Ethics%20%20%20Opinions/Files/Eth514.pdf [lacba.org]
    Los Angeles Bar Association: "Lawyers are not required to encrypt e-mail containing confidential client communications because e-mail poses no greater risk of interception and disclosure than regular mail, phones or faxes."

    http://www.netlawtools.com/security/emailsecurity1 .html [netlawtools.com]
    The American National Bar Association takes a similar stance, but the above link does warn that if an unencrypted email is intercepted, the lawyer may be held legally liable.

    While it certainly should be necessary for important legal, medical, and other confidential information to be encrypted, it doesn't appear that the Bar association is quite as far ahead of the game as one would hope.
  • Re:Bullshit (Score:3, Insightful)

    by The One and Only ( 691315 ) <[ten.hclewlihp] [ta] [lihp]> on Wednesday October 25, 2006 @07:33PM (#16586286) Homepage
    In big business, the data should be secure. Period. You lose your password, you lose your information - it's that simple.

    That's a perfect strategy for security if you completely disregard human behavior. If you set the stakes so high for forgetting your password, you end up with people either using ridiculously simple passwords (so they remember) or writing their passwords on post-it notes underneath their keyboard. Congratulations, now your system is less secure.

  • Who me? Never. (Score:1, Insightful)

    by devfsadm ( 841265 ) on Thursday October 26, 2006 @01:56AM (#16589682)
    If it's that important sign it and encrypt it. If you're a manager and you are sending out financial or personal information plain text you shouldn't have your job. You should work for the VA.
  • by jesterzog ( 189797 ) on Thursday October 26, 2006 @02:53AM (#16589952) Journal

    We do this in a lot of places too, and I think there are perfectly good reasons for it, including security. (eg. If my account ever gets hacked, someone probably still needs to know a much more secure password if they want to give the account more access.) Another is just plain robustness. It's harder for me to accidentally break things when I don't have access to them.

    At least as importantly, though, I think it helps the users actually trust us more easily. Most of our users realise that we don't automatically have access to their documents, for instance. They also know from experience that we'll tend to ask them if we ever need to give ourselves access. Another example is with watching (and controlling) their desktops, usually for tech support. We could quite easily configure things to be able to connect at any time, but instead we make sure that whenever we do it, they first get a prompt which asks them if they'll give permission. Obviously it doesn't mean we can't do things without them knowing, but having policies about that sort of thing which people understand really makes it easier to work with the other people in the organisation.

Mathematicians practice absolute freedom. -- Henry Adams

Working...