Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Securing the IT operations of a company

Securing the IT operations of a company

Scheduled Pinned Locked Moved The Lounge
databasesysadminjavapostgresqllinux
16 Posts 7 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • P Peter Adam

    Systems mostly on CentOS, mostly Java applications, mostly Postgresql databases. Compliance requires separating infrastructure operations, application operations, computer operations to be separated. This means that an infrastructure operator is su to be root on a server, an app operator su to be root on a database and have some su rights do keep the apps running, and a computer operator is a lesser mix of the two. Root password and some high priority passwords managed by Password Manager Pro, released after a four-eye check, and changed by PMP after use. But this is not enough. Looks like the gold old four eyes rule is required. Is there a solution to restrict OS/DB to require the consent of two people to execute something with raised privileges? Like launching a nuke-tipped missile with two keys.

    M Offline
    M Offline
    Mycroft Holmes
    wrote on last edited by
    #5

    We had 2 people with half the password each, then they needed backup for leave/sick events. This naturally was a complete PITA when SA access was required and that invariably occurred when you could not locate both halves of the password. So it became a team of people for each half password at which point the entire thing became a farce.

    Never underestimate the power of human stupidity - RAH I'm old. I know stuff - JSOP

    P 1 Reply Last reply
    0
    • raddevusR raddevus

      Eddy Vluggen wrote:

      We call it "common sense", as you would.

      Though, of course, "common sense" is an illusion. :rolleyes: EDIT Came back to say : The illusion is shattered the instant anything goes wrong and managers become involved. After that it's all just finger-pointing.

      L Offline
      L Offline
      Lost User
      wrote on last edited by
      #6

      raddevus wrote:

      The illusion is shattered the instant anything goes wrong and managers become involved

      Managers being famous for not having the common sense.

      raddevus wrote:

      After that it's all just finger-pointing

      If you a manager yes. All others keep records.

      raddevus wrote:

      Though, of course, "common sense" is an illusion. :rolleyes:

      We just call them Americans :D

      Bastard Programmer from Hell :suss: "If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.

      1 Reply Last reply
      0
      • raddevusR raddevus

        Eddy Vluggen wrote:

        We call it "common sense", as you would.

        Though, of course, "common sense" is an illusion. :rolleyes: EDIT Came back to say : The illusion is shattered the instant anything goes wrong and managers become involved. After that it's all just finger-pointing.

        L Offline
        L Offline
        Lost User
        wrote on last edited by
        #7

        raddevus wrote:

        The illusion is shattered the instant anything goes wrong and managers become involved. After that it's all just finger-pointing.

        That's after it facked up and becoming a Hollywood movie. Common sense says not to be an American. Ehr.. I meant, "before you fack up". Nearly the same.

        Bastard Programmer from Hell :suss: "If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.

        1 Reply Last reply
        0
        • L Lost User

          Peter Adam wrote:

          Is there a solution to restrict OS/DB to require the consent of two people to execute something with raised privileges? Like launching a nuke-tipped missile with two keys.

          Yes. We call it "common sense", as you would.

          Bastard Programmer from Hell :suss: "If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.

          P Offline
          P Offline
          Peter Adam
          wrote on last edited by
          #8

          There is no common sense nor trust when the daily amount of just the change money measured in 1E3 €s...

          L 1 Reply Last reply
          0
          • P Peter Adam

            There is no common sense nor trust when the daily amount of just the change money measured in 1E3 €s...

            L Offline
            L Offline
            Lost User
            wrote on last edited by
            #9

            Only if you trust $. Those that do, have trouble with intrinsic value. The paper, EU or US, has none. More debt in those currencies being created, to "save the economy". ha :D

            Bastard Programmer from Hell :suss: "If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.

            Greg UtasG P 2 Replies Last reply
            0
            • M Mycroft Holmes

              We had 2 people with half the password each, then they needed backup for leave/sick events. This naturally was a complete PITA when SA access was required and that invariably occurred when you could not locate both halves of the password. So it became a team of people for each half password at which point the entire thing became a farce.

              Never underestimate the power of human stupidity - RAH I'm old. I know stuff - JSOP

              P Offline
              P Offline
              Peter_in_2780
              wrote on last edited by
              #10

              Back in the mid 1980s, very early days of EFT, I was involved in setting up the crypto infrastructure for a major independent player. Before the days of Diffie-Hellman etc, there was a requirement for link master keys (typically 2 x 56bit DES for EDE) to be manually entered in the other party's crypto box. At least half of the big 4 banks just gave the left and right halves of each key to different people. ... Oh nice. I've got one half. I only need to try about 2^28 possibilities (which was just about feasible in those days) to crack the whole thing. They got all s*itty when we insisted on three full length components to be entered separately, and XORed inside our secure box to make the actual key. Reason for 3 not 2? So there is no leakage through the parity bits in the key. Each component can be odd parity, like the final key. Drove them nuts, but afaik it was never compromised during the 15+ year lifetime of that system. By the time the successor system was implemented, the whole crypto (and comms) landscape had shifted. Cheers from an(other) old fart, Peter

              Software rusts. Simon Stephenson, ca 1994. So does this signature. me, 2012

              1 Reply Last reply
              0
              • L Lost User

                Only if you trust $. Those that do, have trouble with intrinsic value. The paper, EU or US, has none. More debt in those currencies being created, to "save the economy". ha :D

                Bastard Programmer from Hell :suss: "If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.

                Greg UtasG Offline
                Greg UtasG Offline
                Greg Utas
                wrote on last edited by
                #11

                Much like "We had to destroy the village to save it."

                Robust Services Core | Software Techniques for Lemmings | Articles
                The fox knows many things, but the hedgehog knows one big thing.

                <p><a href="https://github.com/GregUtas/robust-services-core/blob/master/README.md">Robust Services Core</a>
                <em>The fox knows many things, but the hedgehog knows one big thing.</em></p>

                1 Reply Last reply
                0
                • P Peter Adam

                  Systems mostly on CentOS, mostly Java applications, mostly Postgresql databases. Compliance requires separating infrastructure operations, application operations, computer operations to be separated. This means that an infrastructure operator is su to be root on a server, an app operator su to be root on a database and have some su rights do keep the apps running, and a computer operator is a lesser mix of the two. Root password and some high priority passwords managed by Password Manager Pro, released after a four-eye check, and changed by PMP after use. But this is not enough. Looks like the gold old four eyes rule is required. Is there a solution to restrict OS/DB to require the consent of two people to execute something with raised privileges? Like launching a nuke-tipped missile with two keys.

                  A Offline
                  A Offline
                  AnotherKen
                  wrote on last edited by
                  #12

                  I recall that MS SQL can be setup with privileges like that out of the box, if that wasn't possible you would just have to get some decent programmer(s) to write your database authorization code for you. This can be done by having users log into the auth server before they can access the database. Of course then you have to consider how that system could potentially be compromised to gain unauthorized access to the database.

                  1 Reply Last reply
                  0
                  • L Lost User

                    Only if you trust $. Those that do, have trouble with intrinsic value. The paper, EU or US, has none. More debt in those currencies being created, to "save the economy". ha :D

                    Bastard Programmer from Hell :suss: "If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.

                    P Offline
                    P Offline
                    Peter Adam
                    wrote on last edited by
                    #13

                    Are you married?

                    L 1 Reply Last reply
                    0
                    • P Peter Adam

                      Are you married?

                      L Offline
                      L Offline
                      Lost User
                      wrote on last edited by
                      #14

                      I have been. Only once ofcourse, one doesn't keep making the same errors. So. I have to say no to your proposal :D

                      Bastard Programmer from Hell :suss: "If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.

                      P 1 Reply Last reply
                      0
                      • L Lost User

                        I have been. Only once ofcourse, one doesn't keep making the same errors. So. I have to say no to your proposal :D

                        Bastard Programmer from Hell :suss: "If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.

                        P Offline
                        P Offline
                        Peter Adam
                        wrote on last edited by
                        #15

                        How many people stood there to watch and testify that you both said "Yes"? Was it about $?

                        L 1 Reply Last reply
                        0
                        • P Peter Adam

                          How many people stood there to watch and testify that you both said "Yes"? Was it about $?

                          L Offline
                          L Offline
                          Lost User
                          wrote on last edited by
                          #16

                          You pissed me off with your question.

                          Peter Adam wrote:

                          How many people stood there to watch and testify that you both said "Yes"?

                          Without parents, just two. Of those two, she facked one. Will not make that mistake again.

                          Bastard Programmer from Hell :suss: "If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.

                          1 Reply Last reply
                          0
                          Reply
                          • Reply as topic
                          Log in to reply
                          • Oldest to Newest
                          • Newest to Oldest
                          • Most Votes


                          • Login

                          • Don't have an account? Register

                          • Login or register to search.
                          • First post
                            Last post
                          0
                          • Categories
                          • Recent
                          • Tags
                          • Popular
                          • World
                          • Users
                          • Groups