Security Basics mailing list archives

Re: in-to-out security


From: ilaiy <ilaiy.e () gmail com>
Date: Tue, 28 Mar 2006 10:35:08 -0600

It may be a difficult to convince the CTO. I faced a similar problem
in the place i worked previously.

This was one of the point i stressed on " You are implementing these
policy not just for safe guarding our network. But you also don't want
some computer in our network to be a bot for an attack else where as
you "may" be held liable"

I have used the policy from SANS .. they are pretty good you may want
to add and delete what is needed got your network.

www.sans.org/resources/policies/


./thanks
ilaiy
On 3/28/06, Joe George <j.george () conservation org> wrote:
Dear all,

I hope you're all doing well.  A colleague of mine does technical
support for some charities on the side.  One of his clients is a person
who is the CTO of a 400+ person, non-profit organization.  This CTO
asked my colleague what was the best way to (a particular application or
training method) to get his 400+ staff in-line and keep them from doing
inappropriate things on the network such as downloading rogue
applications, and inadvertently installing apps which can attack the
network and other networks.  He's looking for an in-to-out solution.
This CTO feels he and his team would be able to secure the network from
intrusion from outside rogue users by implementing necessary firewall,
IDS, etc.  I suggested to my colleague that this gentleman can not
adequately secure external/internal intrusion and attacks without
implementing an acceptable use or some kind of written policy with the
assistance of his HR department.  I informed him that end-users should
have the right to know that their activity is being monitored by the IT
staff (which is what I presumed he meant by an application/training
method to keep his staff in-line).  This CTO fellow, feels that any kind
of policy is not a viable option.  I told my colleague a written policy
will protect the organization and the employees and allow the security
team to build and design a security countermeasures, not to mention get
the best use of expensive security appliances.  Besides rogue
applications, I mentioned that other issues such as disgruntled
employees, corporate espionage, maintaining data and company integrity
are just a few reasons to start off with written policy.  My colleague
mentioned that his CTO client is not uninformed, but rather too scared
to bring up a very controversial solution as written policy to his
superiors and the end-users. My questions to you are these:

1.      Was I right to suggest this rather than help my colleague look
for an app/training solution?
2.      How would you convince an obviously passive CTO to do the right
thing?
3.      If such an application/training exists, can you suggest
something?
4.      Is it legal to implement user-monitoring without informing the
staff?  This is where I think policy

Thanks in advance.

Take it easy,

Joe

---------------------------------------------------------------------------
EARN A MASTER OF SCIENCE IN INFORMATION ASSURANCE - ONLINE
The Norwich University program offers unparalleled Infosec management
education and the case study affords you unmatched consulting experience.
Tailor your education to your own professional goals with degree
customizations including Emergency Management, Business Continuity Planning,
Computer Emergency Response Teams, and Digital Investigations.

http://www.msia.norwich.edu/secfocus
---------------------------------------------------------------------------



---------------------------------------------------------------------------
EARN A MASTER OF SCIENCE IN INFORMATION ASSURANCE - ONLINE
The Norwich University program offers unparalleled Infosec management
education and the case study affords you unmatched consulting experience.
Tailor your education to your own professional goals with degree
customizations including Emergency Management, Business Continuity Planning,
Computer Emergency Response Teams, and Digital Investigations.

http://www.msia.norwich.edu/secfocus
---------------------------------------------------------------------------


Current thread: