Access Auditing

Started by deanwebb, November 02, 2016, 12:37:43 PM

Previous topic - Next topic

deanwebb

 :awesome:

And by that, I mean...

:problem?:

This involves going through a system and denoting all the access to and from that system. It also involves interesting comments from the compliance guy when you mention how many devices don't support SSH, only telnet... mergers and acquisitions tend to have little surprises like that...

Then there's the circus that results when a vendor uses an account to connect to devices... and the account must be specified as each device is added to the product's supervision. So what happens when the password on that account changes? There will be much clicking and typing, as each of those devices has to be manually edited.

:joy:

And by that, I mean...

:ivan:
Take a baseball bat and trash all the routers, shout out "IT'S A NETWORK PROBLEM NOW, SUCKERS!" and then peel out of the parking lot in your Ferrari.
"The world could perish if people only worked on things that were easy to handle." -- Vladimir Savchenko
Вопросы есть? Вопросов нет! | BCEB: Belkin Certified Expert Baffler | "Plan B is Plan A with an element of panic." -- John Clarke
Accounting is architecture, remember that!
Air gaps are high-latency Internet connections.