Well, I can only speak to my own experience.

In every SMORG that I've entered as a "new consultant", I've found that there 
are a number (generally MANY) users who have membership in high-privilege 
groups or have access to high-privilege accounts. Usually, this comes as a 
surprise to their supervisors, and the IT person often does not know what 
membership in those groups entails. They simply are aware that "hey, if I put 
Josie into group A, she stops complaining."

Am I suggesting that those IT people are idiots? No. I've learned that most IT 
people are VERY well meaning, but it is simply impossible to know everything. 
Once you learn about the "objective domain" (OD) for your company (that is, the 
problems and priority of various issues within a given organization) an IT 
person tends to focus on that OD. This is quite reasonable.

It often takes an outside party (such as myself, or any number of other 
qualified individuals) to take an "objective look" at access and policies to 
determine whether they make sense - especially within such guidelines as 
NIST-800, SOX-70, HIPAA, PCI, etc. Or even within the audit guidelines of a 
particular company. I've often found that access to high-privilege accounts is 
political - for example, the CFO who controls IT wants to have access to 
everything that IT does.  Well, I can understand that - but from an audit 
perspective, that's ridiculous. The CFO doesn't know how to use that privilege 
and their account may represent an access path that is otherwise "uncontrolled" 
and therefore unsecureable. The smart CFO will agree that she doesn't want that 
as an audit "finding".

When explained from a rational perspective, almost all (99%+) of folks are OK 
with this. Those few left are typically dealt with by explaining the issue to 
the CEO of the company.

That's my introduction. :-) Given my experience, I prefer to implement a weekly 
password change on all non-basic accounts (that is, anything that has 
above-standard access). Am I paranoid? Perhaps. How many people, in a properly 
controlled environment, is this likely to affect? Less than 5.

-----Original Message-----
From: Kurt Buff [mailto:[email protected]] 
Sent: Wednesday, March 04, 2009 4:10 PM
To: NT System Admin Issues
Subject: Re: Password Policy Change

I was only thinking about the standard user base, but I think I agree.

Elucidate your thoughts? *Every* employee termination, or only upon
termination where the employee/manager had access to privileged
accounts?

I assume that you're thinking about rainbow tables and pass-the-hash attacks.



On Wed, Mar 4, 2009 at 12:29, Michael B. Smith
<[email protected]> wrote:
> I think that's fine as long as you change the passwords on any 
> higher-privilege accounts upon every employee termination, managerial change, 
> or every two weeks and review the need-to-know of those passwords on a 
> regular basis.
>
> I am one of a relatively small (but growing) contingent who believes that any 
> higher-privilege account (including service account) should be changed far 
> more frequently than a low-privilege/normal-user account.
>
> -----Original Message-----
> From: Kurt Buff [mailto:[email protected]]
> Sent: Wednesday, March 04, 2009 2:49 PM
> To: NT System Admin Issues
> Subject: Re: Password Policy Change
>
> If the account was created more than 60 days ago, setting this policy
> will force a password change at next logon.
>
> If the account was created less than 60 days ago, setting this policy
> will force a password change when the account reaches 60 days.
>
> FWIW, I don't like a 60 day period. If I had my druthers, I'd enforce
> a very long password (greater than 16 characters) and force the
> password change at 180 or 365 days. This is spite of rainbow tables
> and pass-the-hash attacks.
>
> Kurt
>
> On Wed, Mar 4, 2009 at 07:51, John Hornbuckle
> <[email protected]> wrote:
>> Right now, our users' passwords don't expire. We're looking at changing that.
>>
>> My question is this... If I decide to enable password expiration, how is the 
>> expiration date calculated for my users?
>>
>> Let's say that today I set passwords to expire every 60 days. Will all 
>> current users' passwords expire 60 days from today? Or will all current 
>> users' passwords expire today, if those passwords are 60 days or older?
>>
>>
>>
>> John Hornbuckle
>> MIS Department
>> Taylor County School District
>> 318 North Clark Street
>> Perry, FL 32347
>>
>> www.taylor.k12.fl.us
>>
>>
>>
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to