Security Basics mailing list archives
RE: Permissions and rights for security professionals inside organizations
From: sharon_joyner () timeinc com
Date: Thu, 27 May 2004 14:22:42 -0400
In an ideal world, where the ideal separation of duties is possible, security professionals who only do security administration should not have full access to business data and should only be able to modify permissions. Of course, this means that they could grant permission to themselves for sensitive data, but administrative tasks should be audited to mitigate the risk. Unfortunately, most systems are Microsoft or Unix and this separation of duties is usually impractical. Auditing administrative tasks is therefore mandatory to mitigate the risk of admins doing bad things. Sharon Joyner, CISSP IS Security Administrator Warner Publisher Services 9210 King Palm Drive Tampa, FL 33619 Tel: 813-664-8147 Fax: 813-664-8195 -----Original Message----- From: acrypto [mailto:acrypto () comcast net] Sent: Thursday, May 27, 2004 1:50 AM To: security-basics () lists securityfocus com Subject: Permissions and rights for security professionals inside organizations A policy and or procedure question: I am curious to know what levels of access security professionals are granted inside organizations. Should the security team maintain administrative and root type access for all systems? Should there be a process by which they can obtain this level of access at any time if they don't maintain it constantly? Should security professionals be limited to only read access but to all data? Or, should security professionals only have access upon request for any system, data, or resource? Are there any policies or best practices that address this issue? Thanks in advance for any insight you can provide, acrypto ------------------------------------------------------------------------ --- Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off any course! All of our class sizes are guaranteed to be 10 students or less to facilitate one-on-one interaction with one of our expert instructors. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. Visit us at: http://www.infosecinstitute.com/courses/ethical_hacking_training.html ------------------------------------------------------------------------ ---- ----------------------------------------------------------------------- This message is the property of Time Inc. or its affiliates. It may be legally privileged and/or confidential and is intended only for the use of the addressee(s). No addressee should forward, print, copy, or otherwise reproduce this message in any manner that would allow it to be viewed by any individual not originally listed as a recipient. If the reader of this message is not the intended recipient, you are hereby notified that any unauthorized disclosure, dissemination, distribution, copying or the taking of any action in reliance on the information herein is strictly prohibited. If you have received this communication in error, please immediately notify the sender and delete this message. Thank you. --------------------------------------------------------------------------- Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off any course! All of our class sizes are guaranteed to be 10 students or less to facilitate one-on-one interaction with one of our expert instructors. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. Visit us at: http://www.infosecinstitute.com/courses/ethical_hacking_training.html ----------------------------------------------------------------------------
Current thread:
- Permissions and rights for security professionals inside organizations acrypto (May 27)
- <Possible follow-ups>
- RE: Permissions and rights for security professionals inside organizations sharon_joyner (May 28)