Security Basics mailing list archives

RE: Notebook policy (need advice)


From: "Sipes, Bob" <bob.sipes () eds com>
Date: Fri, 26 Jan 2007 14:06:34 -0500

Good Afternoon,

        You could connect to the back end systems using VPN over a cellular modem connection (slow, but it works).  
This does not address the sensitive data being recorded, but the preliminary data necessary for the warrant.  Have a 
nice day!

Sincerely,

Bob Sipes


-----Original Message-----
From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On Behalf Of Patton Roub
Sent: Friday, January 26, 2007 11:10 AM
To: Eric Furman; c
Subject: RE: Notebook policy (need advice)

What would be your recommendation to the drug enforcement Special Agent who is recording the sensitive data outside the 
house of a suspect, and then using that data to create a search warrant on that computer to present to a Judge down the 
street?  Oh, did I mention the data he must have downloaded earlier to make sure he is looking for the right guy?  
Wireless is not available, and we don't want Special Agents climbing poles.

Never ever say never.

Regards

Patton J Roub


-----Original Message-----
From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On Behalf Of Eric Furman
Sent: Thursday, January 25, 2007 2:09 PM
To: security-basics () lists securityfocus com
Subject: RE: Notebook policy (need advice)

I'll give you one very simple policy that you should enforce that will make most of your concerns moot:

NEVER EVER EVER STORE SENSITIVE DATA ON A LAPTOP!

Anybody, and I mean ANYBODY, found with sensitive data on their laptop should have it seized and they should be 
immediately dismissed.

There is virtually no reason to ever store sensitive data on a laptop.
Sensitive data should only ever reside on hardened servers in a physically secured server room. If your employees need 
to work with this data there are several means to securely access this data remotely.

(And, indeed, make sure the room AND its data storage is truly secure. There have been recent break-ins at certain 
companies and data tapes containing sensitive data were stolen.)

On Wed, 24 Jan 2007 22:50:47 -0500, "Tony UcedaVĂ©lez"
<tonyuv () versprite com> said:
Definitely agree with the previously made comments on the use of full 
disk encryption and points made on AV, however, I wanted to simply add 
to those points by saying that the issuance of notebooks should be 
focused on those user groups that would most benefit from a portable 
computing device.

Not all positions within a company require the use of a notebook for 
work (although, in the near future this may very well change).  
Obviously, the portability of laptops could be recommended to be 
reserved for those who travel/ telecommute or use it for working 
sessions in company war rooms (developers, project managers come to 
mind).  Point here is that the scope and applicability of any security 
policy could achieve a more targeted audience, versus a broad unknown 
audience who truly don't benefit by having a notebook.

This recommendation is obviously touch to act upon in organization's 
where notebooks have already been issued without specific 
consideration to the job function.  However, if possible the added 
value in the above mentioned is the following:

1. IT Operations adheres to imaging and providing laptops to those 
whose roles and responsibilities require the use of a notebook.  Often 
times, IT Ops groups elect to image a resource that is readily 
available or one in which the user prefers.
2. Again, a policy surrounding notebook usage will be geared to a 
specific audience instead of rolling out a policy to everyone, 
regardless of whether they have a notebook or not. Improved 
accountability, focused security CBT modules (related to mobile 
computing) are some positive by-products that result.
3. Cost savings can be multi-fold here.  Since roles and 
responsibilities will dictate who gets a notebook, cost savings are 
realized not only on the price per notebook, but also the costs 
associated with software licenses that are specific to portable information assets.

Again, this suggestive advice obviously depends on the 'mobile' 
culture of your company's workforce.  Also affecting the above is 
whether you'll be able to 'backtrack' to make such a recommendation.

Regarding local admin use, again, I would revert to what the roles and 
responsibilities are for the employees and creating various images 
that coincide with their respective user groups/ types.  Ideally, a 
collaborative effort between HR and IT Security should make this work.

Btw, along with AV and FDE, I'd include in the policy the use of 
personal firewalls and HIPS agents, especially for the road warriors 
of your organization.

Hope this helps.

Best Regards,

Tony UcedaVĂ©lez, CISA, GIAC
VerSprite, LLC
(office) 678.938.3434
(email) tonyuv () versprite com
(web)   www.versprite.com
 




-----Original Message-----
From: listbounce () securityfocus com 
[mailto:listbounce () securityfocus com]
On Behalf Of Nicolas Arias
Sent: Tuesday, January 23, 2007 8:12 AM
To: security-basics () lists securityfocus com
Subject: Notebook policy (need advice)


Hi guys!, in my company we have a lot of notebooks, but theres no 
formal security policy about them.

Can you tell me how do you handle this?

Do you give an local admin for the owner?, do you use full disk 
encryption?, what about anti-virus and external scans?

Any idea is going to be really preciated.

Cheers!!



Current thread: