There seem to be a few easy solutions to this... But I'm an ignoramus - so correct me ;-)

Log into the switch and disable the port that corresponds to the cable to pull. I can do that on even my cheap switches here at home.

Put a rule in the site firewall to shut down the attacking IPs, or the IP of the server in question.

If you don't have those passwords, you or they probably know who does. And they can probably be reached in less than 35 minutes.

Interestingly enough, if the people calling are from the SOC and know about the attack, they are associated with network security - and they probably know how to access the switches (using whatever authentication is used locally) and IP addresses of the switches and/or firewalls. Because of this, my first thought might be to wonder if this is some kind of a social engineering attack with me as the attack vector... Independently validate who they are and that there is indeed such an emergency...

If it's real, and they don't know the access credentials, then there is probably an emergency lock box with authentication information that it's time to open...

The best answer I suppose is to refer them to the documented procedure for dealing with an emergency security incident - which almost certainly does not involve calling me ;-). Not that you would say that...



On 5/9/2013 9:36 PM, unix_fan wrote:

No one answered, so I'll take a crack at it.

Atom Powers <[email protected]> writes
To: Michael Tiernan <[email protected]>

On May 7, 2013 9:15 AM, "Michael Tiernan" <[email protected]> wrote:
"Here's a situation,
[describe computer version of Kobayashi Maru problem].
This sounds like fun. What are some of your favorite "unwinnable" problems?

Scenario:

You are working with a group putting together a a proposal.

There are senior engineers and finance people in the group, whose primary role 
is to create PDFs, word files, and excel spreadsheets - the electronic 
artifacts of the proposal.  You are the IT guy, your mission is to ensure the 
team gets the artifacts copied into the appropriate directory. You will them 
create one zip file and transmit to the customer's site.

You have the instructions for how to transmit the files, you have the 
credentials entrusted to you, and you have wisely tested it beforehand so that 
you are confident it works. The transmit instructions specify that it has to be 
in one zip file, and no passwords should be required to open the resulting 
documents when they are unzipped at the customer's end.


It's 11pm local time and the deadline for submission is an hour away, but the 
proposal team is finishing up. The team just told you that in five minutes you 
will have *all* the final docs in the team folder, and you can start zipping 
them up and transmitting. You know from past experience it will take 
approximately 20 minutes to complete a comparable size transmission. The 
customer has told you that midnight is a hard deadline as they have automated 
closing off network access.


Dilemma:
You get a frantic call from the remote Security Operations Center (SOC) on your work 
mobile phone. A sophisticated attack is under way exfiltrating significant amounts of 
your company's IP - engineering drawings, pricing information, etc. The Security team had 
discovered it, was confirming it, but they have suddenly been locked out of the 
exfiltration servers and the key KVM over IP switch. They found that you were working 
after hours and literally need a local "boot on the ground" to run over to the 
East Campus server room, and unplug a specific network cable.

If you drive over there now, execute flawlessly and return, you estimate it 
will take you at *least* 35 minutes.

Problem:
What do you do?

Describe your actions and thoughts - e.g how you prioritize and what your first 
step is.
_______________________________________________
Discuss mailing list
[email protected]
https://lists.lopsa.org/cgi-bin/mailman/listinfo/discuss
This list provided by the League of Professional System Administrators
  http://lopsa.org/
_______________________________________________
Discuss mailing list
[email protected]
https://lists.lopsa.org/cgi-bin/mailman/listinfo/discuss
This list provided by the League of Professional System Administrators
http://lopsa.org/

Reply via email to