Re: [JOB / Recommendation] Evil documentation

2002-07-18 Thread David Cantrell

On Tue, Jul 16, 2002 at 02:37:55PM +0100, Chris Benson wrote:
> On Tue, Jul 16, 2002 at 01:24:22PM +0100, Jonathan Peterson wrote:
> > My company needs some security policies and procedures documentation. 
> > 
> > I have no intention of reducing my own sanity by actually sitting down 
> > to write all this. So, does anyone know of any freelancers or cheap 
> Good move :-) A few years ago (maybe ~10 :-() There was a package on the
> net that provided a canned best-practice AUP

There's a canned security policy somewhere on securityfocus.  I have it
bookmarked at home if nyone wants it.

Doing that sort of thing is one of the areas I'm looking for a permie job
right now.

-- 
David Cantrell | Benevolent Dictator | http://www.cantrell.org.uk/david

  Longum iter est per praecepta, breve et efficax per exempla.
  -- Seneca Philosophus, Epistulae




Re: [JOB / Recommendation] Evil documentation

2002-07-17 Thread Greg McCarroll

* Richard Clyne ([EMAIL PROTECTED]) wrote:
> Having been involved in producing these sort of policies for my company,
> I think it will take a lot longer for them to be produced, unless you
> don't mind having unenforceable policies from an HR perspective.  
> 

One of the ways to get around the enforcing of the policy from the 
viewpoint of the IT department can be to simply not enforce it outside
of your department. 

Instead, produce a monthly one page report for distribution to senior
management that shows a fairly arbitrary set of security statistics
broken down by department, this theoretically should encourage senior
managers to enforce the policies within their department.

For instance if a password needs to be changed every 30 days, set the
lockout to 45 days and record the departments with 30-45 day old
passwords on the report. Record any department who have employee's
leave and IT equipment (laptops) unaccounted for. 

You can go as big brother as you want, scan pc's registry's for
machines without a passworded screensaver setup. Scan HD's for .mdb's,
.xls's and .doc's that are stored locally instead of on the fileserver
(hence they are not backed up and are more subsceptible to physical
theft). Record machines found to have viruses on them.

This way you avoid having to argue with Joe in Accounts Receivable
about why he likes to use his big brother screensaver that does not
support passwords.

HTH, YMMV, IMHO,

Greg

-- 
Greg McCarroll http://www.mccarroll.org.uk/~gem/
   jabber:[EMAIL PROTECTED]
msn:[EMAIL PROTECTED]




RE: [JOB / Recommendation] Evil documentation

2002-07-17 Thread Richard Clyne

Having been involved in producing these sort of policies for my company,
I think it will take a lot longer for them to be produced, unless you
don't mind having unenforceable policies from an HR perspective.  

There are boilerplate versions on the SANS site that can act as a start
point.
Richard

-Original Message-
From: Jonathan Peterson [mailto:[EMAIL PROTECTED]]
Sent: 16 July 2002 13:24
To: [EMAIL PROTECTED]
Subject: [JOB / Recommendation] Evil documentation


My company needs some security policies and procedures documentation. 
You know, the kind of thing that says in writing "Users must change 
passwords every 30 days" and "Changes to firewall configuration must be 
approved in writing by the CTO" and so on.

I have no intention of reducing my own sanity by actually sitting down 
to write all this. So, does anyone know of any freelancers or cheap 
agencies who do this kind of thing? We're more than happy for it to be 
mostly boilerplate stuff, but prior experience is required.

I think it's a few (i.e. less than 6) grands worth of work.
-- 
Jonathan Peterson
Technical Manager, Unified Ltd, +44 (0)20 7383 6092
[EMAIL PROTECTED]





Re: password expiry (was Re: [JOB / Recommendation] Evil documentation)

2002-07-16 Thread Aaron Trevena

On Tue, 16 Jul 2002, Michael Stevens wrote:

> On Tue, Jul 16, 2002 at 01:34:19PM +0100, Nicholas Clark wrote:
> > I'm not convinced that frequent password changing is good, because I find
> > it seems to lead to either frequent password resetting by administrators
> > (with inherent social engineering vulnerability) or passwords written down,
> > which also isn't secure. I guess the security idea is that the password on a
> 
> Or people generating passwords based on a predictable base and a
> changing element that changes just enough to fulfill the requirement
> to change one's password.
> 

Indeed. I know of a certain finiancial institution that every employee in 
the office incre,mented the number on the end of their password by 1 each 
month. Worse still the passwords were guessable so half the employees were 
able to guess the managers password in two guesses or less.

Policy is nothing without the associated training and buy-in. People have 
to be encouraged to go with the program and blanket polcies without 
buiy-in and training will result in worse security and people digging 
their heels in.

A.

-- 
http://termisoc.org/~betty";> Betty @ termisoc.org 
"As a youngster Fred fought sea battles on the village pond using a 
complex system of signals he devised that was later adopted by the Royal 
Navy. " (this email has nothing to do with any organisation except me)







Re: [JOB / Recommendation] Evil documentation

2002-07-16 Thread Chris Benson

On Tue, Jul 16, 2002 at 01:24:22PM +0100, Jonathan Peterson wrote:
> My company needs some security policies and procedures documentation. 
> 
> I have no intention of reducing my own sanity by actually sitting down 
> to write all this. So, does anyone know of any freelancers or cheap 

Good move :-) A few years ago (maybe ~10 :-() There was a package on the
net that provided a canned best-practice AUP, with some tools (shell
scripts) to ensure new users read-and-confirmed the AUP and recorded
their acceptance.

It was written by the MD of a small company to save him explaining
things over and over and thrown open for all to use and extend.  

I've just been Googling for it without success: I thought it had a
snappy acronym, but can't find it now ...

http://www.eff.org/CAF/  (in the Archives section) has some notes about
policies.
-- 
Chris Benson




Re: password expiry (was Re: [JOB / Recommendation] Evil documentation)

2002-07-16 Thread Jonathan Peterson



Michael Stevens wrote:
> On Tue, Jul 16, 2002 at 01:34:19PM +0100, Nicholas Clark wrote:
> 
>>I'm not convinced that frequent password changing is good, because I find
>>it seems to lead to either frequent password resetting by administrators
>>(with inherent social engineering vulnerability) or passwords written down,
>>which also isn't secure. I guess the security idea is that the password on a
> 
> 
> Or people generating passwords based on a predictable base and a
> changing element that changes just enough to fulfill the requirement
> to change one's password.

Actually I agree - I'm not a fan of frequent password changing. I think 
it mainly protects against people who have shared their password. This 
is a big problem. People in offices are always doing things like phoning 
a colleague from home saying "I need to see if I've got an email from 
[client] today, but my modem's not working, can you just go into my 
email and check for me?" and then telling their password to the colleague.

For those of us who don't share passwords, a good, long, random password 
that we finally manage to memorise is much better.

The real solution is of course two factor authentication. Go SecurID!!*

-- 
Jonathan Peterson
Technical Manager, Unified Ltd, +44 (0)20 7383 6092
[EMAIL PROTECTED]

*Expensive but works well.





password expiry (was Re: [JOB / Recommendation] Evil documentation)

2002-07-16 Thread Nicholas Clark

On Tue, Jul 16, 2002 at 01:24:22PM +0100, Jonathan Peterson wrote:
> My company needs some security policies and procedures documentation. 
> You know, the kind of thing that says in writing "Users must change 
> passwords every 30 days" and "Changes to firewall configuration must be 

Personally I find that my brain interprets that as "users must forget
passwords every 30 days". What goes wrong is that $^O says "your password
will expire in $n days, would you like to change it?" and I go "oh bugger",
make something new up that I think I'll remember, change it to that, and
then promptly forget it.

I'm not convinced that frequent password changing is good, because I find
it seems to lead to either frequent password resetting by administrators
(with inherent social engineering vulnerability) or passwords written down,
which also isn't secure. I guess the security idea is that the password on a
piece of paper is now only valid for 15.5 days on average, so the system is
now more secure than it used to be, when pieces of paper remained valid for
months. I just wonder if it creates more paper users.

Nicholas Clark