(no title)
different_sort | 4 years ago
Workers at organizations get compromised all the time. This doesn’t mean their systems/products are compromised.
different_sort | 4 years ago
Workers at organizations get compromised all the time. This doesn’t mean their systems/products are compromised.
ev1|4 years ago
IMO, support agents also should not have the ability to view or access a customer's account without some form of time limited, auto-resetting-to-opted-out default confirmation that support can view the account from an existing logged in admin.
kichik|4 years ago
jclulow|4 years ago
Okta is not just a bunch of software, it's also staff and processes, and the result is a trusted service they provide to customers. If that service is compromised, it doesn't really seem to matter how?
haswell|4 years ago
I hear what you're saying, but the how does really matter, and will change how customers perceive the issue and make decisions about how to react.
e.g. "databases were open to the Internet and all data has been siphoned" lands quite differently than "a staff member abused their privileges but the scope of abuse was limited to xyz".
If I'm a customer, it tells me a lot about what Okta needs to do next, and how much I should freak out right now. It's still extremely problematic that a staff member (1st or 3rd party) could abuse such privileges, and I immediately have questions about how those privileges were abused and to what actual effect, but it's a fundamentally different problem than other types of breaches.
mardifoufs|4 years ago
MattGaiser|4 years ago
ckozlowski|4 years ago
Eyas|4 years ago