I’ve never worked in companies over, say 1000 people. Usually, there are one or two people who have full access to the database, hosting, Virtualization servers, etc. The lastest Marriott hack got me thinking: how do large organizations like these make sure employees don’t mess with their precious data? In my case, one disgruntled employee could pose a HUGE risk because he/she would know the login/password combination of a lot of critical systems (I worked in healthcare back then).
[+] [-] magic-chicken|7 years ago|reply
- Dont use passwords for databases. Make services use integrated authentication to interact with the database.
- Developers / operations dont have read / write access to production tables. It can be obtained momentarily for ad-hocs operations.
- When the database needs to be modified, the script goes through a change management system and it is executed at a planned time, ideally by another person.
- If you use private keys, ex for symmetric encryption, don't store them with the data it's used to encrypt.
- Use database level encryption on sensitive data to prevent anyone with read access to snoop on PII.
- Enable database level audit and change tracking.
- Developers don't push their own changes to production.
[+] [-] tnolet|7 years ago|reply
- private networks, using bastion hosts to access when needed.
- very robust and regularly tested backups in case someone screws up the data.
- hardware tokens to access and authenticate any critical parts.
[+] [-] JBReefer|7 years ago|reply
The fact that anything works has gotten way weirder to me as I've gotten older - I've seen a bunch of codebases and persistence setups, and it all seems so fragile.
[+] [-] coldcat|7 years ago|reply
[+] [-] _RPM|7 years ago|reply
[+] [-] abramN|7 years ago|reply
[+] [-] aprdm|7 years ago|reply