TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

How InfoSec Security Controls Create Vulnerability

1 pointsby reader_1000about 9 years ago

1 comment

reader_1000about 9 years ago
Our management thinks that sysadmins should not know admin &#x2F; root passwords and when they need it, they should get it from a privileged identity management [1] software for say 15 minutes. However, I think having an software &#x2F; appliance that has administrator rights on your all infrastructure is more problematic than a disloyal employee. Since it is the master key that opens all the doors, attacker would love them. If an attack succeeds, its result would be global. For a disloyal employee, effect should stay local for a large organization. Also I don&#x27;t understand the idea of trusting some random company&#x27;s employees and their closed source &#x2F; un-audited software but not trusting your own employees. Our management say that this is the industry best practice. Is this really the case? Do your companies also follow this practice?<p>[1] <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Privileged_Identity_Management" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Privileged_Identity_Management</a>