Hello,

In order to properly evaluate any sort of defensive strategy, one must
first attempt to answer the following questions : who is your adversary?
what are their potential capabilities? do they have access to financial
resources? to what extent? and do they have the luxory of time? what is
the extent of *your* financial resources? what are *your* capabilities?

A proper baseline must be established.

However, I think the question should be modified to include access control
mechanisms in general; otherwise, we are comparing apples to oranges.
A network based firewall will not protect against a web application
vulnerability, however an application firewall might, compartmentalization
might, RBAC might... depends on the circumstances.

Suppose, theoretically, we can quantify security and measure the level of
security that a system possesses. What influence would the concept of
susceptibility to attack have on this measurable quantity? Access control
mechanisms would reduce exposure, in turn, reducing the system's
susceptibility to attack, but does it make the system any more secure?
Does the concept of vulnerability still exist within an environment of
implicit trust?

IMNSHO, access control is often misused as a tool of obfuscation.

One should always assume that the security controls in place within an
infrastructre CAN and WILL be circumvented; then, architect accordingly.

The most common mistake made within the security industry is failure to do
so.

Bottom line -- system hardening is your first line of defence. Not doing
so creates a risk. However manageable that risk may be in the short term,
the survivability of your system will be reduced in the long term.


----------------------------------
John Daniele

Technical Security & Intelligence
http://www.tsintel.com
----------------------------------

Reply via email to