On Mon, 30 Apr 2012 10:09:37 -0500 Nick Anderson <n...@cmdln.org> wrote: 

NA> Well I think if we approach this with the expectation that we will stop
NA> someone with root access from doing anything then we just performing an
NA> exercise in futility.

NA> You could argue that security is only the the inverse of convenience. We
NA> take steps to make accessing something we don't want someone to access
NA> less and less convenient. A determined person will take whatever
NA> measures necessary to reach their goal if its that important to them. If
NA> you don't want something to be accessed, its best to ensure it never exists.

At a previous job we used Verdasys tools (http://www.verdasys.com) to
log and block file accesses and other low-level security events.  It
won't stop a determined attacker, but Verdasys' tools work at such a low
level that you can at least expect some notice that strange things are
happening.  Maybe that's what msvoboda is looking for.

Ted
_______________________________________________
Help-cfengine mailing list
Help-cfengine@cfengine.org
https://cfengine.org/mailman/listinfo/help-cfengine

Reply via email to