TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Ask HN: How to make Enterprise Security not Suck?

2 pointsby academia_hackabout 2 years ago
My org is looking at getting past security audits for enterprise and government customers. I&#x27;ve got a lot of say in how we implement compliance but little say as to if we should do it. We&#x27;re selling into a highly regulated sector looking at ITAR and CMMC and similar stuff.<p>Today, we&#x27;re pretty much a BYOD shop (we buy new employees unmanaged laptops). People manage their own devices and we do colab stuff with Google Workspace. Developers love this because they don&#x27;t have to &quot;mother may I&quot; IT for every tool and library.<p>There&#x27;s a lot of pressure from our compliance lead to go with endpoint management, big corporate antivirus (e.g. Sophos), active directory accounts, kicking people off OSX to windows, etc. We&#x27;ve got an endless parade of MSP consultants and vendors trying to pitch $500k assessment and remediation packages as well and I&#x27;m worried leadership will bite and we&#x27;ll end up developing on devices that can basically only open excel.<p>My worry is that this&#x27;ll choke our product operations to death. Clearly we have to do something, but I don&#x27;t want to go overboard. Everytime I push back I&#x27;m told that &quot;security is important&quot; (true but vacuous) and asked for comparable alternatives.<p>Have y&#x27;all experienced any small companies that get this right and strike a good balance?

4 comments

ericalexander0about 2 years ago
I&#x27;ve built security programs from the ground up at two companies and have worked in compliance&#x2F;security&#x2F;cyber&#x2F;etc for over 16 years. I&#x27;m also a maker and an engineer. I understand how security&#x2F;compliance side sees the world, and how engineers see the world.<p>I hate to say it, but security&#x2F;compliance tends to cargo cult. They implement what&#x27;s accepted by whatever compliance framework they need to achieve. PCI, FedRAMP, SOX, SOC, CIS, etc, etc.<p>Engineers want to break things down to components and understand why each component is required. AKA thinking from first principles.<p>Mixing the two is like oil and water. Security and compliance don&#x27;t have in-depth explanations for why they need to do something, they just need to check a box, and they know how it&#x27;s most often checked. They know &quot;nobody got fired for buying Sophos&#x2F;Windows&#x2F;AD&#x2F;etc&quot;. They can&#x27;t explain it from first principles, nor do they want to take the risk of going outside of known solutions.<p>So how do you negotiate? The box they&#x27;re trying to check is likely well documented. Ask to see the documentation for the requirement(s). From there you can propose alternate solutions that meet those requirements. Try to find examples of your proposal being accepted, so you don&#x27;t run into the &quot;nobody got fired for buying x&quot;.
josephcsibleabout 2 years ago
If security is important to your org, then they should fire for incompetence anyone who says &quot;let&#x27;s force everyone to switch to Windows for security reasons&quot;.<p>Also, consider that all of those stupid &quot;security&quot; rules generally delay the rollout of updates, which often contain fixes for security vulnerabilities. I wish that companies would say something like &quot;if there&#x27;s ever a known vulnerability in something in production that a &quot;security&quot; rule doesn&#x27;t let you immediately deploy the patch for, then said rule is immediately rescinded and may never be reinstated.&quot;
评论 #35991547 未加载
thesuperbigfrogabout 2 years ago
&gt;&gt; Today, we&#x27;re pretty much a BYOD shop (we buy new employees unmanaged laptops). People manage their own devices and we do colab stuff with Google Workspace. Developers love this because they don&#x27;t have to &quot;mother may I&quot; IT for every tool and library.<p>BYOD may be fast and easy for employees, but it makes employees a ripe target for attacks:<p><a href="https:&#x2F;&#x2F;www.securityweek.com&#x2F;circleci-hacked-malware-employee-laptop&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.securityweek.com&#x2F;circleci-hacked-malware-employe...</a><p><a href="https:&#x2F;&#x2F;www.zdnet.com&#x2F;article&#x2F;how-one-hacked-laptop-led-to-an-entire-network-being-compromised&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.zdnet.com&#x2F;article&#x2F;how-one-hacked-laptop-led-to-a...</a><p><a href="https:&#x2F;&#x2F;www.pcmag.com&#x2F;news&#x2F;hacker-breached-lastpass-by-installing-keylogger-on-employees-home-computer" rel="nofollow">https:&#x2F;&#x2F;www.pcmag.com&#x2F;news&#x2F;hacker-breached-lastpass-by-insta...</a><p>If your shop is serious about security, then more controls over BYOD are a must. That usually means no more BYOD or a more managed BYOD to ensure that there is no vulnerable software on employee devices.
bob1029about 2 years ago
&gt; We&#x27;re selling into a highly regulated sector looking at ITAR<p>&gt; Developers love this because they don&#x27;t have &quot;mother may I&quot; IT for every tool and library.<p>And herein lies the friction. Someone is going to walk away from this unhappy. It&#x27;s either going to be the developers or the compliance teams (and then the customers).<p>We are a ~10 person company selling software to US financial institutions. Really important software that is responsible for things like filling out legal documents that are not feasible for humans to review every time. For us, compliance&#x2F;security is basically the #1 product feature. Clearly, with 10 people we don&#x27;t have a lot of bandwidth for running audits or getting into disputes with our customers&#x27; compliance teams over whether or not a QA server&#x27;s disk is encrypted and using the appropriate key rotation schedules.<p>What we did is decide to get all the way into the rabbit hole with Microsoft. Like 100% of the way. I know - many things they do really really suck - but the compliance offerings <i>and industry perception</i> they provide are nearly unbeatable (at least for our fintech customers). If you compose your product&#x2F;service exclusively from components that are compliant [0], you will not necessarily be compliant-by-default but this is a hell of a lot better than any other starting point I&#x27;ve seen. AWS and GCP have similar offerings, but there are other considerations with these vendors for our business.<p>At the end of the day, making an audit easier is about proving you have less control and trust fewer parties than you would otherwise desire to. In our case, subjecting ourselves to <i>actually</i> having less control and fewer vendors was the best way to achieve this. When you can&#x27;t touch or see things, compliance usually can&#x27;t hold you accountable for them anymore. It really is a &quot;game&quot; and you can certainly play it to win.<p>To be clear - our day to day operations are wonderful. We don&#x27;t have to screw with janky Citrix-style remote desktops and other security theatrics <i>precisely because</i> we are so aggressively using cloud native resources to prove that we are playing by the rules. Now, if you are a 100 or 1000+ person company, I think there are a lot of different things you could consider. Getting into bed with Microsoft at 10 employees was the only rational thing we could come up with.<p>Strategically, if you intend to do business with customers encumbered by ITAR, et. al., then you had better be prepared to radically shift your product technology to align with those compliance requirements. Following these rules really sucks but your ability to easily comply with them can become a serious competitive edge. Imagine your competitors willingness to sacrifice technological principles (i.e. &quot;fuck Microsoft&quot;) in order to beat you to market. This helped cure me of my cargo cult tendencies pretty quickly.<p>[0]: <a href="https:&#x2F;&#x2F;learn.microsoft.com&#x2F;en-us&#x2F;compliance&#x2F;regulatory&#x2F;offering-home" rel="nofollow">https:&#x2F;&#x2F;learn.microsoft.com&#x2F;en-us&#x2F;compliance&#x2F;regulatory&#x2F;offe...</a>