Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> The CISO and security ops will demand to be completely independent from corp IT, for legit reasons, as the security team needs to treat IT as potential insider threat actors with elevated privileges.

I always wondered: why should security ops not be a potential insider thread actor? In fact, if they were compromised, it would be even worse.

Do we need two different security ops that monitor each other? :)



In most clustered systems, you need at least 3 observers, so that its a clear majority of systems can decide that the observer is not working as expected.

So I guess 5 security OPS teams in different regions of the world, and they can all call a vote if one of the teams is now 'bad' :)


Generally, act vs monitor is the segregation of duties that I have seen best working between platform or IT ops and engineering (act) vs security ops (monitor).

For many high privilege operations there are more segregation of duties in the act side of things - these can be down to plan, authorise, configure, activate, validate or some rollups of these. Another is dual control on the act side, since conspiracy is generally quite hard to do especially if it’s just for pocket-change. Different if it’s $$Billions of fungible cash of course at stake.

People often overcomplicate - simple do/check is often enough.


Isn’t that why some organizations have a red team and a blue team?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: