Forum: CFEngine Help
Subject: Re: Security Tools and Root Access
Author: sauer
Link to topic: https://cfengine.com/forum/read.php?3,23093,23107#msg-23107

Tom Tucker Wrote:
-------------------------------------------------------
> My company has recently purchased a new security
> tool.  For this tool to
> operate at maximum efficiency root level
> access is required via login credentials, ssh keys
> or sudo rights .
> 
> 1) Are you aware of a wrapper, unique shell or
> simiar tool that could
> provide root level access at a read only level?
> 2) Any recommendations on an open source or
> commerical enterprise level file
> integrity checker similar to Tripwire?
> 3) Is it common for security departments to have
> root level access to all IP
> devices (network, window, unix, etc)?
>     If your security department has root acces...
> what level of agreement do you have between the
> various groups (unix,
> windows, etc) and the security team?

People have already answered the other questions ("no/you should use sudo so 
it's most easily auditable" and "CFengine/Tripwire/Aide", respectively).  But I 
wanted to reiterate on the last one that I can't imagine what a security team 
without root access does.  What kind of organization has a security team which 
is not reponsible for managing access control, and who in their right mind 
would hire someone to manage security but not trust that person?

My organization (a bank and insurance company - lots of regulation) has 
security teams with administrative access upon the platforms they manage.  The 
teams are broken up into major OS (unix/windows/mainframe) and similar 
(application, network, database, etc) teams, and each has admin-level access on 
the security component for which they are responsible.  The agreement for any 
level of access on any platform / application will essentially boil down to 
"your access is only granted in order to enable you to perform tasks which are 
within the scope of your job duties".  There's various auditing / logging / 
monitoring in place to identify activities which exceed the scope - and 
responses to such activities range from "a stern talking to" to "immediate 
termination".

PS - granting Nessus root access is sketchy at best; if you need root to 
identify a vulnerability, it is really a vulnerability? ;)

_______________________________________________
Help-cfengine mailing list
Help-cfengine@cfengine.org
https://cfengine.org/mailman/listinfo/help-cfengine

Reply via email to