Security Basics mailing list archives
Re: in-to-out security
From: ilaiy <ilaiy.e () gmail com>
Date: Tue, 28 Mar 2006 10:35:08 -0600
It may be a difficult to convince the CTO. I faced a similar problem in the place i worked previously. This was one of the point i stressed on " You are implementing these policy not just for safe guarding our network. But you also don't want some computer in our network to be a bot for an attack else where as you "may" be held liable" I have used the policy from SANS .. they are pretty good you may want to add and delete what is needed got your network. www.sans.org/resources/policies/ ./thanks ilaiy On 3/28/06, Joe George <j.george () conservation org> wrote:
Dear all, I hope you're all doing well. A colleague of mine does technical support for some charities on the side. One of his clients is a person who is the CTO of a 400+ person, non-profit organization. This CTO asked my colleague what was the best way to (a particular application or training method) to get his 400+ staff in-line and keep them from doing inappropriate things on the network such as downloading rogue applications, and inadvertently installing apps which can attack the network and other networks. He's looking for an in-to-out solution. This CTO feels he and his team would be able to secure the network from intrusion from outside rogue users by implementing necessary firewall, IDS, etc. I suggested to my colleague that this gentleman can not adequately secure external/internal intrusion and attacks without implementing an acceptable use or some kind of written policy with the assistance of his HR department. I informed him that end-users should have the right to know that their activity is being monitored by the IT staff (which is what I presumed he meant by an application/training method to keep his staff in-line). This CTO fellow, feels that any kind of policy is not a viable option. I told my colleague a written policy will protect the organization and the employees and allow the security team to build and design a security countermeasures, not to mention get the best use of expensive security appliances. Besides rogue applications, I mentioned that other issues such as disgruntled employees, corporate espionage, maintaining data and company integrity are just a few reasons to start off with written policy. My colleague mentioned that his CTO client is not uninformed, but rather too scared to bring up a very controversial solution as written policy to his superiors and the end-users. My questions to you are these: 1. Was I right to suggest this rather than help my colleague look for an app/training solution? 2. How would you convince an obviously passive CTO to do the right thing? 3. If such an application/training exists, can you suggest something? 4. Is it legal to implement user-monitoring without informing the staff? This is where I think policy Thanks in advance. Take it easy, Joe --------------------------------------------------------------------------- EARN A MASTER OF SCIENCE IN INFORMATION ASSURANCE - ONLINE The Norwich University program offers unparalleled Infosec management education and the case study affords you unmatched consulting experience. Tailor your education to your own professional goals with degree customizations including Emergency Management, Business Continuity Planning, Computer Emergency Response Teams, and Digital Investigations. http://www.msia.norwich.edu/secfocus ---------------------------------------------------------------------------
--------------------------------------------------------------------------- EARN A MASTER OF SCIENCE IN INFORMATION ASSURANCE - ONLINE The Norwich University program offers unparalleled Infosec management education and the case study affords you unmatched consulting experience. Tailor your education to your own professional goals with degree customizations including Emergency Management, Business Continuity Planning, Computer Emergency Response Teams, and Digital Investigations. http://www.msia.norwich.edu/secfocus ---------------------------------------------------------------------------
Current thread:
- in-to-out security Joe George (Mar 28)
- Re: in-to-out security ilaiy (Mar 29)
- RE: in-to-out security David Gillett (Mar 29)
- Re: in-to-out security Kenton Smith (Mar 29)
- <Possible follow-ups>
- RE: in-to-out security Jordan.Dallas (Mar 29)
- RE: in-to-out security Beauford, Jason (Mar 29)
- RE: in-to-out security Joe George (Mar 29)