http://www.patchmanagement.org/
Go there and sign up.
On 4/26/2016 5:31 PM, Richard Stovall wrote:
<Thread hijack>
How does one subscribe to the fabled patch management list?
</>
On Tue, Apr 26, 2016 at 7:59 PM, Andrew S. Baker <asbz...@gmail.com
<mailto:asbz...@gmail.com>> wrote:
From the article:
/*>>For instance, we recommend using system monitoring tools that
present users with information about the last login attempt, so
they can see if they’re responsible for failed login attempts. <<
*/
Do they really believe that if users are inconvenienced by
password changes every 30 or 60 or 90 days, that they'll actually
bother to match up their activities with information that
indicates last login of the system?
The fact that they could not point to an improved security posture
by their new stance indicates its weakness. Let's see if they
feel the same way about it in 5 or 6 months.
The fact is, we are at a good point in computing history to go
with changing passwords, since so many online services are doing
it. Back when people only had an eternal bankcard pin and a
changing corporate password, it would be easy to see how the
changing password would be a huge annoyance.
Today? Let's see how many users feel that identity theft is a
worthwhile trade-off for password changing convenience, after they
experience the former.
If user convenience is the paramount consideration for information
security, then it's hard to see what other authentication and
authorization options will be deemed acceptable.
-- Two-factor? Inconvenient.
-- Digital certificates? Inconvenient.
Reducing the scope of exposure is the primary purpose of changing
passwords.
*/>>The new password may have been used elsewhere, and attackers
can exploit this too.<< /*
A. Pure Speculation.
B. There's nothing to prevent the current password from being used
somewhere else, too. Frankly, if the next password a user selects
is used somewhere else, then there is an equal chance that they
will use their current password on the next service that they sign
up for. They are just employing poor password hygiene and they are
not only going to do so if the corporate password changes.
*/>>The new password is also more likely to be written down, which
represents another vulnerability. <</*
For any user that is likely to write down their next password,
they are also likely to be reusing passwords across sites. See
previous point.
This means that their poor password practices are *already*
endangering the current environment.
*/>>New passwords are also more likely to be forgotten, and this
carries the productivity costs of users being locked out of their
accounts, and service desks having to reset passwords.<</*
Whine, whine, whine. The deployment of a self-service password
portal eliminates this risk, and is not an uncommon solution.
What has been offered here is not a reason or a set of reasons,
but a set of ill-considered excuses.
Anyhoo, it will be interesting what their guidance is next year...
Regards,
***ASB*
**_http://XeeMe.com/AndrewBaker <http://xeeme.com/AndrewBaker>_
***Providing Expert Technology Consulting Services for the SMB
market…*
* GPG: *1AF3 EEC3 7C3C E88E B0EF 4319 8F28 A483 A182 EF3A
On Mon, Apr 25, 2016 at 6:56 PM, Dave Lum <l...@ochin.org
<mailto:l...@ochin.org>> wrote:
Anyone see the debate on the Patch management list, driven by
this:
https://www.cesg.gov.uk/articles/problems-forcing-regular-password-expiry
I don’t even know how it’s a debate other than the desired
frequency (no one-size-fits-all on that IMO). Even six months
is far better than never. With expiring passwords you at bare
minimum mitigate employee’s that leave.
*David Lum*
*/Systems Administrator III/**
**P:**503.943.2500 <tel:503.943.2500>**
**E:**l...@ochin.org <mailto:l...@ochin.org>**
**A:**1881 SW Naito Parkway, Portland, OR 97201***
Facebook Link <https://www.facebook.com/OCHINinc>Twitter Link
<https://twitter.com/ochininc>Linkedin Link
<http://www.linkedin.com/company/ochin>www.ochin.org
<https://www.ochin.org/>
OCHIN email
Attention: Information contained in this message and or
attachments is intended only for the recipient(s) named above
and may contain confidential and or privileged material that
is protected under State or Federal law. If you are not the
intended recipient, any disclosure, copying, distribution or
action taken on it is prohibited. If you believe you have
received this email in error, please contact the sender with a
copy to complia...@ochin.org <mailto:complia...@ochin.org>,
delete this email and destroy all copies.