Announcement

Collapse
No announcement yet.

written in stone... unbreakable rules of IT

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • written in stone... unbreakable rules of IT

    i know that many of us have had many jobs or do consulting work and are therefore exposed to a wide array of clients... individuals, schools, businesses, large through small, etc. many of these instituions have widely varying needs, their own uniqe internal power structures, and more than a handful of quirky practices.

    i imagine that some of us (depending on the size range of the companies for whom we have worked) have cringed once or twice over something we've been asked to do, been ordered to do, or had to tolerate others doing. especially if a company is small and you're there on a short gig with limited scope you may come across a mail server installed in a boiler room closet when a "server room" ran out of space or a disk array kept in the break room fridge because "it kept overheating" (these are just silly examples... the real stories of some bizzare shit i've seen probably surpass this) and had no authority to alter it since that's not what you're being paid to do.

    however, do you feel that there are certain hard-and-fast rules of IT operation that are unbreakable and that no company or institution has any cause to side step, no matter how quirky their particular story is?

    something that comes to mind for me is the following:

    absolutely every user on the system must have a password and there is no goddamn reason on the face of the earth that someone needs another user's password for any purpose.

    not eloquent or by any means earth-shattering, i know... but that's one of the cardinal rules i refuse to break under any circumstances* and it's a clear flag for me that a previous admin wasn't doing his or her job conscientously if this rule was waived. there is absolutely nothing i can think of that a user is restricted from accomplishing (on a properly-built network) with their own user permissions if they are set properly.

    anyone else have any rules that you think are unbreakable, no matter what the job entails?


    * at many schools i'll setup a generic "student" or "public" account that visitors, unimportant staff, or even very young students can use to access the network's public resources, print stuff, etc. this account typically has an easy to remember password which has at times been the username itself.

    on more than one occasion, however, i've had schools inform me that a group of older students need their own logins. (say, for a photoshop class or other situation where they need to save things to a unique home directory which no one else can foul up) i create the users accounts, complete with long temporary passwords, etc. they login and set their own. after a while i invariably get a teacher or two asking if students can have blank passwords because "they can't remember the password they pick and it slows them down." i always refuse... and i've had the matter escalate all the way to the principal's office one time. that time i simply stated that "the system cannot accept blank passwords" to get him to buzz off. but my favorite off the cuff remark has now become a standard reply to faculty who say their students can't manage to remember or type in a password correctly...

    "then instead of a computer class, why don't you consider teaching a course that demonstrates which end of a boom an individual should grip... as this skill will certainly come in handly later in life for anyone who is incapable of remembering a password by the time they're in high school."
    Last edited by Deviant Ollam; October 19, 2006, 08:50.
    "I'll admit I had an OiNK account and frequented it quite often… What made OiNK a great place was that it was like the world's greatest record store… iTunes kind of feels like Sam Goody to me. I don't feel cool when I go there. I'm tired of seeing John Mayer's face pop up. I feel like I'm being hustled when I visit there, and I don't think their product is that great. DRM, low bit rate, etc... OiNK it existed because it filled a void of what people want."
    - Trent Reznor

  • #2
    Re: written in stone... unbreakable rules of IT

    If they share passwords then it puts the network at risk. It's not necessarily your job to tell them what to do, but instead to offer them advice about the correct way to do things.

    CEO: We want it this way
    IT: We will get hacked and the network will go down and we'll lose sales.
    CEO: I don't care, do it anyway.

    In the end, it's the CEO's company. They'll either pay you to fix it when it breaks (hope you're hourly!) or you may want to look for work elsewhere...
    --- The fuck? Have you ever BEEN to Defcon?

    Comment


    • #3
      Re: written in stone... unbreakable rules of IT

      [QUOTE=Deviant Ollam;83303]i know that many of us have had many jobs or do consulting work and are therefore exposed to a wide array of clients... individuals, schools, businesses, large through small, etc. many of these instituions have widely varying needs, their own uniqe internal power structures, and more than a handful of quirky practices.

      i imagine that some of us (depending on the size range of the companies for whom we have worked) have cringed once or twice over something we've been asked to do, been ordered to do, or had to tolerate others doing. especially if a company is small and you're there on a short gig with limited scope you may come across a mail server installed in a boiler room closet when a "server room" ran out of space or a disk array kept in the break room fridge because "it kept overheating" (these are just silly examples... the real stories of some bizzare shit i've seen probably surpass this) and had no authority to alter it since that's not what you're being paid to do.

      however, do you feel that there are certain hard-and-fast rules of IT operation that are unbreakable and that no company or institution has any cause to side step, no matter how quirky their particular story is?

      something that comes to mind for me is the following:

      absolutely every user on the system must have a password and there is no goddamn reason on the face of the earth that someone needs another user's password for any purpose.

      not eloquent or by any means earth-shattering, i know... but that's one of the cardinal rules i refuse to break under any circumstances* and it's a clear flag for me that a previous admin wasn't doing his or her job conscientously if this rule was waived. there is absolutely nothing i can think of that a user is restricted from accomplishing (on a properly-built network) with their own user permissions if they are set properly.

      anyone else have any rules that you think are unbreakable, no matter what the job entails?


      Well, I will state the obvious to us, as is does not seem to be so obvious to some of my clients. Core equipment (servers, RAIDS, routers, switches) should really be placed in a limited access area. I have seen backbone and core equipment in all kinds of interesting locations, unsecured. My favorite was a company in Colorado that had all their critical processing equipment, in a rack, in the middle of their office area, unsecured. Oh, and in that Colorado laid-back spirit? Didn't have any external access controls to limit who could and could not enter the building. Aside from the conscious perpetrator attempting to bring down their systems, what of the asshat who may "accidentally" hork something up? I asked if it would be too much trouble to put a "cage" around their resources. The answer I received (I am not making this up): "Wow, that would really screw up the feng shui of the office."

      Needless to say they failed their audit, but I hope their feng shui (and critical information) is still intact.

      Regards,
      Valkyrie
      _______________________________
      sapere aude

      Comment


      • #4
        Re: written in stone... unbreakable rules of IT

        Some time ago I was doing some work for a company on a non-IT basis and I got to talking with the business owner about their setup. He made the comment that he was frustrated because his IT guy was always so "paranoid". I told him if his IT guy didn't seem a little paranoid most of the time, he'd better find another IT guy. :P

        Many years ago, I worked as a Network Analyst for a major hospital in my city. I would periodically "test" my users (with so many, it was rare that someone actually knew who I was) by calling up with some cover story and trying to talk them out of their login and password. I was pretty shocked to see how readily people would give up the info, especially if it was to "help me out of a bind".

        So I'm onside with the "no sharing" rule of account management. That's definitely gotta be set in stone.. or silicone... or something rather....

        db

        Comment

        Working...
        X