-----Original Message-----
From: Kurt Buff [mailto:[email protected]] 
Sent: Friday, 7 January 2011 3:41 PM
To: NT System Admin Issues
Subject: Re: AD and firewall ports

On Thu, Jan 6, 2011 at 18:11, Ken Schaefer <[email protected]> wrote:
> Hi,
>
>> Then you should turn of all your computers, encase them in concrete, 
>> and launch them into outer space - and into the Sun. That is the best 
>> way of stopping anyone compromising one of your machines.
>
>Got to love the straw man argument.

How is this a straw man? Putting your data into the sun is going to make it 
more secure.
Far less usable, but far harder to steal.
Since considerations of usability and convenience are not on your list, you 
better start launching your servers.

That is the logical conclusion that can be drawn from your argument.


>> Hint: go and read some books on security first. *All* security is risk 
>> mitigation.
>> For example: that's why we still have passwords that are only "x" 
>> characters long, rather than "x + 1" (where x is any number less than 
>> infinity).
>
> And you exaggerate again. We have passwords that are 'x' characters long (I 
> tend to use 20+ character 
> passphrases myself) because the effort to crack them is, so far, infeasible, 
> due to the lack of rainbow 
> tables of the size necessary to do so, and the lack of time to brute force 
> them before I change them. 
> If firms (such as my own work, I'll admit) are so foolish as to ignore this 
> limit, then they will likely suffer for it, 
> and deserve to do so.

But they are NOT uncrackable.
They are not unguessable
They are able to by bypassed by beating them out of someone physically
Etc.
Etc.
The 20 character password is "good enough", but it is not as secure as the 21 
character password, which in turn is not as secure as the 22 character 
password, and so on ad infinitum

At some point you have to decide that the *risk* of password compromise is *not 
worth* the cost (inconvenience) of having more complex passwords or 2FA 

You *mitigate risk* (password compromise) by picking an acceptable level of 
risk. That level of acceptable risk varies from place to place. The local 
coffee shop might have lower security requirements than the local bank.


>> Everything in security is about:
>> a) analysing what risks you face,
>> b) working out what the likelihood of it eventuating
>> c) working out the cost of the likelihood eventuating
>> d) working out the cost of making the risk go away
>> e) working out whether it's cost effective to implement (d) given 
>> (a)(b)(c)
>
> It's a b) that the risk mitigation wizards fail. Spectacularly. IMHO, "risk 
> mitigation" is a mantra 
> that has gone way too far, in the relentless pursuit of cost and effort 
> savings. The above 
> recommendation to turn a firewall into a safe passage for intruders is a 
> prime example.

What on earth are you talking about? Risk mitigation is saying "is someone 
breaks into our DMZ, we can't have them break into our main network, so there 
is no trust relationship"
Alternatively, the entire business might have all their data in the DMZ anyway 
(or in a hosted data centre), in which case, once someone "0wns" the DMZ, then 
they own everything anyway, so what's point of cumbersome barriers and 
sneakernet?

>> That is why a national government has a far more secure, cumbersome 
>> network than your average business. Because the risks are different.
>
> Oh, yeah - that's worked out well, hasn't it? I believe you have that problem 
> by the wrong end of the stick. National government networks are more 
> cumbersome, 
> and not more secure, in the main. That's because they're, wait for it, run by 
> bureaucrats. 
> They danced the risk mitigation dance, and we got wikileaks, infected thumb 
> drives, 
> virus infestations on supposedly secure networks, and all manner of silliness.

See, I work as an architect for one of those big vendors (two letters long), 
for a national government, managing their base platform infrastructure (you can 
go google SOEasy). I /know/ that the risks that governments face are different 
to other customers I have worked for, which is why security is different.

Not every customer needs 5 years of log retention of every event of every 
device. Not every customer needs multiple levels of encryption (at rest, at the 
file level, end-to-end on the wire). Not every customer needs physically 
separate networks. And not every customer needs to keep their DMZ machines off 
the domain.

>> That why we don't all blithely implement the same way of doing things. 
>> Because doing things *costs* money (whether that be products, 
>> convenience, productivity etc)
>
> And doing them intelligently costs less money than doing them stupidly.

That's not the point. Implementing something as simple as file encryption 
incurs *costs*, because you have to start to worry about recovery, about DoS 
attacks and so on.

Do *you* encrypt every single file you have on your network? Why not? Surely 
it's more secure than not doing it? My guess is that it costs too much for the 
benefit you will receive.




~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to