Yes, I do think it matters especially in terms of OpSec (this is not Joe’s Widget Company we’re talking about after all). Are Lieutenants told the full details of a battle plan, or only what they need to know to do their job? How about Sergeants? Continuing the battlefield analogy, what about contractors (mercenaries in that context)? If you would prefer, the next time I mention the granularity of “Unix permission” I will include with that a 20-page discussion on what I mean by “Unix permissions.” If I mention the 1st Amendment do I have to include the full text of the amendment? Or can we just stipulate in the interest of brevity that that is not necessary and is already understood? Permissions flow downward. The primary one handing out the permissions should be a stakeholder. The persons below him do have the access he has. Sub-admins is hardly a new concept; they can be contractors and often are. Authority can be delegated; responsibility cannot.
From: Ken Schaefer Sent: Sunday, September 01, 2013 4:00 AM To: [email protected] Subject: RE: [NTSysADM] Re: Finally. Do you think it matters, in this case, whether it’s an FTE or a contractor that has “the keys to the kingdom” – they’d all need to go through the necessary security clearance, and have the right citizenship etc.? For someone who /wants/ to betray their country (e.g. for ideological reasons or monetary inducements), do you think their employment status really matters? Especially if the penalty for getting caught might include being charged with treason? In a large org like NSA, it’s not a matter of simply knowing “UNIX permissions” – that’s a gross over-simplification of the types of systems a large organisation would have. There’d probably be multiple Windows/AD and Windows/standalone environments, multiple UNIX environments, multiple mainframe/host environments, plus multiple systems when application permissions where used. There is no single “key to the kingdom” or a person that has such a key – except the Head/CEO/etc. If you’re saying that every privileged user, from the developer that might implement a back door, to the network admin who might trace traffic, to the backup operator that might duplicate a backup to the person who manages the HR system and who could create a “fake” identity, needs to be an FTE, then I think you’ll find that just about every large business and government agency is “in breach” of your fundamental security principles. Cheers Ken From: [email protected] [mailto:[email protected]] On Behalf Of Daniel Chenault Sent: Wednesday, 4 September 2013 3:08 PM To: [email protected] Subject: Re: [NTSysADM] Re: Finally. Why were the keys to the castle given to a contractor, a non-stakeholder? While we may see a certain amount of laxity in this in industry and business (not to say that's okay, it just happens) in such a sensitive environment, one with a very real potential to be the target of espionage, the keys to the castle should only reside in the hands of an employee. An extremely well-trusted one with a complete knowledge of computer security including using the granularity of Unix permissions to create admin accounts and groups with specific perms to do specific functions. A contractor, in the context of the role within the organization, is not a stakeholder. If the company or organization fails the only impact to the contractor is it's time to find another contract ( assuming he wasn't the cause). Time to find another contract is business-as-usual for a contractor. When one speaks of "tight security protocols" this is part of the discussion: a very clear understanding of each position's role within the organization, how it furthers the mission, the liabilities associated with the position and a plan to ameliorate those liabilities. That discussion comes before filling the position with an asset as that also defines the type of asset; in this context it is employee or contractor. The proper answer is that the system administrator, the ultimate holder of all security secrets, the role with complete trust, is someone who has a stake in the success of the mission and is under the direct authority of a key stakeholder if not key himself. A contractor in such a sensitive environment should never have the full authority of that administrator delegated to him. That violates the whole idea of high security and the reason granularity is exposed in the computer security model (implementation-specific). I consider the above to be a rational and reasoned short examination of how and why the assignments of roles and permissions are to be defined in any organization where the word "security" is used as part of the priorities and goals. The higher the need for tight security (say, 1-10) the more scrutiny each role is given and permissions defined. For the NSA I would say the need is 11. But that's all just my opinion late on a Saturday night. I could be wrong. On Aug 31, 2013, at 21:37, "Ken Schaefer" <[email protected]> wrote: And what are your qualifications/experience, that allow you to make such a call? (I’m assuming that you have no inside knowledge of how the NSA works, and are relying on the public speculation/allegations at el Reg etc.) Cheers Ken From: [email protected] [mailto:[email protected]] On Behalf Of Kurt Buff Sent: Sunday, 1 September 2013 12:03 AM To: [email protected] Subject: Re: [NTSysADM] Re: Finally. On the evidence, absolutely. For an intelligence/espionage operation to be so thoroughly pwned because of such amazingly poor internal operational security, there can be only one conclusion - management responsible for internal security should be fired. I'm just glad they weren't, and I hope that what Snowden took is enough to bring them down, and that it's all revealed to the public. Kurt On Sat, Aug 31, 2013 at 4:20 AM, Ken Schaefer <[email protected]> wrote: So, you’re saying that the feared NSA, which has a bunch of un-discovered rootkits, which able to undertake some of the most advanced espionage in the world, is managed by idiots? Seriously? From: [email protected] [mailto:[email protected]] On Behalf Of Jon Harris Sent: Saturday, 31 August 2013 6:17 AM To: [email protected] Subject: RE: [NTSysADM] Re: Finally. Generally from I have seen in state (Florida) organizations is that they don't like promoting anyone but a moron into supervisory positions. Occasionally someone will make a mistake and promote an intelligent person but not often. I would suspect this is the case with the Feds as well (worked with them too). Several times I have seen them hire those with less brains and longer tongues and large lips over those with brains. As long as this keeps happening then we will continue to see this happen. It will be a long time before they get rid of all the defective management personnel as I would think private companies would have little to gain by keeping them (maybe why they seem to concentrate in public jobs?) and in a government job it is MUCH harder to get rid of them. Jon ---------------------------------------------------------------------------- Date: Fri, 30 Aug 2013 14:34:15 -0400 Subject: Re: [NTSysADM] Re: Finally. From: [email protected] To: [email protected] +13 On Aug 30, 2013 11:05 AM, "Kurt Buff" <[email protected]> wrote: On Fri, Aug 30, 2013 at 10:52 AM, Micheal Espinola Jr <[email protected]> wrote: > > I accidentally hit CTRL-Enter before finishing that email... and apparently that's a shortcut to instantly-send a message in Gmail. Yay! I love learning new things... but anyways - So, yea, this Forbes article was the first I have seen that highlights the real underlying IT problem regarding Snowden - aside from other OT issues. <snip> >> >> I may have missed some article by someone else somewhere, but Its to see Forbes 'get it' before anyone else... >> >> http://www.forbes.com/sites/timworstall/2013/08/30/if-the-nsa-really-let-edward-snowden-do-this-then-someone-needs-to-be-fired/ >> >> -- >> Espi Agreed- massive failure on the part of many people in the NSA in implementing security procedures. Of course, what Snowden showed, beyond that, is the massive failure that is government policy and practices regarding surveillance/espionage in general, so I'm actually quite happy Snowden was able to do what he did. Kurt

