Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Securing the IT operations of a company

Securing the IT operations of a company

Scheduled Pinned Locked Moved The Lounge
databasesysadminjavapostgresqllinux
16 Posts 7 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • P Offline
    P Offline
    Peter Adam
    wrote on last edited by
    #1

    Systems mostly on CentOS, mostly Java applications, mostly Postgresql databases. Compliance requires separating infrastructure operations, application operations, computer operations to be separated. This means that an infrastructure operator is su to be root on a server, an app operator su to be root on a database and have some su rights do keep the apps running, and a computer operator is a lesser mix of the two. Root password and some high priority passwords managed by Password Manager Pro, released after a four-eye check, and changed by PMP after use. But this is not enough. Looks like the gold old four eyes rule is required. Is there a solution to restrict OS/DB to require the consent of two people to execute something with raised privileges? Like launching a nuke-tipped missile with two keys.

    L raddevusR M A 4 Replies Last reply
    0
    • P Peter Adam

      Systems mostly on CentOS, mostly Java applications, mostly Postgresql databases. Compliance requires separating infrastructure operations, application operations, computer operations to be separated. This means that an infrastructure operator is su to be root on a server, an app operator su to be root on a database and have some su rights do keep the apps running, and a computer operator is a lesser mix of the two. Root password and some high priority passwords managed by Password Manager Pro, released after a four-eye check, and changed by PMP after use. But this is not enough. Looks like the gold old four eyes rule is required. Is there a solution to restrict OS/DB to require the consent of two people to execute something with raised privileges? Like launching a nuke-tipped missile with two keys.

      L Offline
      L Offline
      Lost User
      wrote on last edited by
      #2

      Peter Adam wrote:

      Is there a solution to restrict OS/DB to require the consent of two people to execute something with raised privileges? Like launching a nuke-tipped missile with two keys.

      Yes. We call it "common sense", as you would.

      Bastard Programmer from Hell :suss: "If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.

      raddevusR P 2 Replies Last reply
      0
      • L Lost User

        Peter Adam wrote:

        Is there a solution to restrict OS/DB to require the consent of two people to execute something with raised privileges? Like launching a nuke-tipped missile with two keys.

        Yes. We call it "common sense", as you would.

        Bastard Programmer from Hell :suss: "If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.

        raddevusR Offline
        raddevusR Offline
        raddevus
        wrote on last edited by
        #3

        Eddy Vluggen wrote:

        We call it "common sense", as you would.

        Though, of course, "common sense" is an illusion. :rolleyes: EDIT Came back to say : The illusion is shattered the instant anything goes wrong and managers become involved. After that it's all just finger-pointing.

        L 2 Replies Last reply
        0
        • P Peter Adam

          Systems mostly on CentOS, mostly Java applications, mostly Postgresql databases. Compliance requires separating infrastructure operations, application operations, computer operations to be separated. This means that an infrastructure operator is su to be root on a server, an app operator su to be root on a database and have some su rights do keep the apps running, and a computer operator is a lesser mix of the two. Root password and some high priority passwords managed by Password Manager Pro, released after a four-eye check, and changed by PMP after use. But this is not enough. Looks like the gold old four eyes rule is required. Is there a solution to restrict OS/DB to require the consent of two people to execute something with raised privileges? Like launching a nuke-tipped missile with two keys.

          raddevusR Offline
          raddevusR Offline
          raddevus
          wrote on last edited by
          #4

          Peter Adam wrote:

          Is there a solution to restrict OS/DB to require the consent of two people to execute something with raised privileges? Like launching a nuke-tipped missile with two keys

          This is an interesting idea. It's almost the idea of two-factor but with an additional check that the person with the 2nd factor is not the same person who attempted the login. So Op1 attempts to login. Op2 gets a 2-factor notification on her phone and has to accept.

          1 Reply Last reply
          0
          • P Peter Adam

            Systems mostly on CentOS, mostly Java applications, mostly Postgresql databases. Compliance requires separating infrastructure operations, application operations, computer operations to be separated. This means that an infrastructure operator is su to be root on a server, an app operator su to be root on a database and have some su rights do keep the apps running, and a computer operator is a lesser mix of the two. Root password and some high priority passwords managed by Password Manager Pro, released after a four-eye check, and changed by PMP after use. But this is not enough. Looks like the gold old four eyes rule is required. Is there a solution to restrict OS/DB to require the consent of two people to execute something with raised privileges? Like launching a nuke-tipped missile with two keys.

            M Offline
            M Offline
            Mycroft Holmes
            wrote on last edited by
            #5

            We had 2 people with half the password each, then they needed backup for leave/sick events. This naturally was a complete PITA when SA access was required and that invariably occurred when you could not locate both halves of the password. So it became a team of people for each half password at which point the entire thing became a farce.

            Never underestimate the power of human stupidity - RAH I'm old. I know stuff - JSOP

            P 1 Reply Last reply
            0
            • raddevusR raddevus

              Eddy Vluggen wrote:

              We call it "common sense", as you would.

              Though, of course, "common sense" is an illusion. :rolleyes: EDIT Came back to say : The illusion is shattered the instant anything goes wrong and managers become involved. After that it's all just finger-pointing.

              L Offline
              L Offline
              Lost User
              wrote on last edited by
              #6

              raddevus wrote:

              The illusion is shattered the instant anything goes wrong and managers become involved

              Managers being famous for not having the common sense.

              raddevus wrote:

              After that it's all just finger-pointing

              If you a manager yes. All others keep records.

              raddevus wrote:

              Though, of course, "common sense" is an illusion. :rolleyes:

              We just call them Americans :D

              Bastard Programmer from Hell :suss: "If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.

              1 Reply Last reply
              0
              • raddevusR raddevus

                Eddy Vluggen wrote:

                We call it "common sense", as you would.

                Though, of course, "common sense" is an illusion. :rolleyes: EDIT Came back to say : The illusion is shattered the instant anything goes wrong and managers become involved. After that it's all just finger-pointing.

                L Offline
                L Offline
                Lost User
                wrote on last edited by
                #7

                raddevus wrote:

                The illusion is shattered the instant anything goes wrong and managers become involved. After that it's all just finger-pointing.

                That's after it facked up and becoming a Hollywood movie. Common sense says not to be an American. Ehr.. I meant, "before you fack up". Nearly the same.

                Bastard Programmer from Hell :suss: "If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.

                1 Reply Last reply
                0
                • L Lost User

                  Peter Adam wrote:

                  Is there a solution to restrict OS/DB to require the consent of two people to execute something with raised privileges? Like launching a nuke-tipped missile with two keys.

                  Yes. We call it "common sense", as you would.

                  Bastard Programmer from Hell :suss: "If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.

                  P Offline
                  P Offline
                  Peter Adam
                  wrote on last edited by
                  #8

                  There is no common sense nor trust when the daily amount of just the change money measured in 1E3 €s...

                  L 1 Reply Last reply
                  0
                  • P Peter Adam

                    There is no common sense nor trust when the daily amount of just the change money measured in 1E3 €s...

                    L Offline
                    L Offline
                    Lost User
                    wrote on last edited by
                    #9

                    Only if you trust $. Those that do, have trouble with intrinsic value. The paper, EU or US, has none. More debt in those currencies being created, to "save the economy". ha :D

                    Bastard Programmer from Hell :suss: "If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.

                    Greg UtasG P 2 Replies Last reply
                    0
                    • M Mycroft Holmes

                      We had 2 people with half the password each, then they needed backup for leave/sick events. This naturally was a complete PITA when SA access was required and that invariably occurred when you could not locate both halves of the password. So it became a team of people for each half password at which point the entire thing became a farce.

                      Never underestimate the power of human stupidity - RAH I'm old. I know stuff - JSOP

                      P Offline
                      P Offline
                      Peter_in_2780
                      wrote on last edited by
                      #10

                      Back in the mid 1980s, very early days of EFT, I was involved in setting up the crypto infrastructure for a major independent player. Before the days of Diffie-Hellman etc, there was a requirement for link master keys (typically 2 x 56bit DES for EDE) to be manually entered in the other party's crypto box. At least half of the big 4 banks just gave the left and right halves of each key to different people. ... Oh nice. I've got one half. I only need to try about 2^28 possibilities (which was just about feasible in those days) to crack the whole thing. They got all s*itty when we insisted on three full length components to be entered separately, and XORed inside our secure box to make the actual key. Reason for 3 not 2? So there is no leakage through the parity bits in the key. Each component can be odd parity, like the final key. Drove them nuts, but afaik it was never compromised during the 15+ year lifetime of that system. By the time the successor system was implemented, the whole crypto (and comms) landscape had shifted. Cheers from an(other) old fart, Peter

                      Software rusts. Simon Stephenson, ca 1994. So does this signature. me, 2012

                      1 Reply Last reply
                      0
                      • L Lost User

                        Only if you trust $. Those that do, have trouble with intrinsic value. The paper, EU or US, has none. More debt in those currencies being created, to "save the economy". ha :D

                        Bastard Programmer from Hell :suss: "If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.

                        Greg UtasG Offline
                        Greg UtasG Offline
                        Greg Utas
                        wrote on last edited by
                        #11

                        Much like "We had to destroy the village to save it."

                        Robust Services Core | Software Techniques for Lemmings | Articles
                        The fox knows many things, but the hedgehog knows one big thing.

                        <p><a href="https://github.com/GregUtas/robust-services-core/blob/master/README.md">Robust Services Core</a>
                        <em>The fox knows many things, but the hedgehog knows one big thing.</em></p>

                        1 Reply Last reply
                        0
                        • P Peter Adam

                          Systems mostly on CentOS, mostly Java applications, mostly Postgresql databases. Compliance requires separating infrastructure operations, application operations, computer operations to be separated. This means that an infrastructure operator is su to be root on a server, an app operator su to be root on a database and have some su rights do keep the apps running, and a computer operator is a lesser mix of the two. Root password and some high priority passwords managed by Password Manager Pro, released after a four-eye check, and changed by PMP after use. But this is not enough. Looks like the gold old four eyes rule is required. Is there a solution to restrict OS/DB to require the consent of two people to execute something with raised privileges? Like launching a nuke-tipped missile with two keys.

                          A Offline
                          A Offline
                          AnotherKen
                          wrote on last edited by
                          #12

                          I recall that MS SQL can be setup with privileges like that out of the box, if that wasn't possible you would just have to get some decent programmer(s) to write your database authorization code for you. This can be done by having users log into the auth server before they can access the database. Of course then you have to consider how that system could potentially be compromised to gain unauthorized access to the database.

                          1 Reply Last reply
                          0
                          • L Lost User

                            Only if you trust $. Those that do, have trouble with intrinsic value. The paper, EU or US, has none. More debt in those currencies being created, to "save the economy". ha :D

                            Bastard Programmer from Hell :suss: "If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.

                            P Offline
                            P Offline
                            Peter Adam
                            wrote on last edited by
                            #13

                            Are you married?

                            L 1 Reply Last reply
                            0
                            • P Peter Adam

                              Are you married?

                              L Offline
                              L Offline
                              Lost User
                              wrote on last edited by
                              #14

                              I have been. Only once ofcourse, one doesn't keep making the same errors. So. I have to say no to your proposal :D

                              Bastard Programmer from Hell :suss: "If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.

                              P 1 Reply Last reply
                              0
                              • L Lost User

                                I have been. Only once ofcourse, one doesn't keep making the same errors. So. I have to say no to your proposal :D

                                Bastard Programmer from Hell :suss: "If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.

                                P Offline
                                P Offline
                                Peter Adam
                                wrote on last edited by
                                #15

                                How many people stood there to watch and testify that you both said "Yes"? Was it about $?

                                L 1 Reply Last reply
                                0
                                • P Peter Adam

                                  How many people stood there to watch and testify that you both said "Yes"? Was it about $?

                                  L Offline
                                  L Offline
                                  Lost User
                                  wrote on last edited by
                                  #16

                                  You pissed me off with your question.

                                  Peter Adam wrote:

                                  How many people stood there to watch and testify that you both said "Yes"?

                                  Without parents, just two. Of those two, she facked one. Will not make that mistake again.

                                  Bastard Programmer from Hell :suss: "If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.

                                  1 Reply Last reply
                                  0
                                  Reply
                                  • Reply as topic
                                  Log in to reply
                                  • Oldest to Newest
                                  • Newest to Oldest
                                  • Most Votes


                                  • Login

                                  • Don't have an account? Register

                                  • Login or register to search.
                                  • First post
                                    Last post
                                  0
                                  • Categories
                                  • Recent
                                  • Tags
                                  • Popular
                                  • World
                                  • Users
                                  • Groups