Research reports and anecdotal evidence repeatedly show that major
vulnerabilities -- perhaps the largest risks -- come from insider
threats. That is, trusted people betraying their positions and trust.

But what's the answer? Watchers watching watchers watching each other?

Decades ago, as a system programmer responsible for site security, I
was open with management about my having the keys to the kingdom because
there were no checks or even full reporting on my actions. Now, prudent
or mandated "separation of duties" discipline wouldn't grant such
unrestricted freedom. But beyond that concept, what's done in
small/medium-size/large installations to balance risk mitigation against
staff productivity? What tools and practices are used?

Of course, sometimes common sense dictates what to do. At that
installation where I worked, a second-shift operator was fired for
cause, given two weeks notice, and allowed to work through it. I
objected -- especially since he worked alone -- but was overruled. As
best we could tell, nothing bad happened. But it seemed a foolish risk
with potentially awful -- and perhaps hard to detect until much later --
consequences. So please also mention bad practices, missed
opportunities, risks not usually addressed.

As usual, extra credit for copying replies to me directly so they're not
buried in list digests.

As usual, thanks...

--
Gabriel Goldberg, Computers and Publishing, Inc.       [email protected]
3401 Silver Maple Place, Falls Church, VA 22042           (703) 204-0433
LinkedIn: http://www.linkedin.com/in/gabegold            Twitter: GabeG0

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to