[personal profile] mjg59
Working in information security means building controls, developing technologies that ensure that sensitive material can only be accessed by people that you trust. It also means categorising people into "trustworthy" and "untrustworthy", and trying to come up with a reasonable way to apply that such that people can do their jobs without all your secrets being available to just anyone in the company who wants to sell them to a competitor. It means ensuring that accounts who you consider to be threats shouldn't be able to do any damage, because if someone compromises an internal account you need to be able to shut them down quickly.

And like pretty much any security control, this can be used for both good and bad. The technologies you develop to monitor users to identify compromised accounts can also be used to compromise legitimate users who management don't like. The infrastructure you build to push updates to users can also be used to push browser extensions that interfere with labour organisation efforts. In many cases there's no technical barrier between something you've developed to flag compromised accounts and the same technology being used to flag users who are unhappy with certain aspects of management.

If you're asked to build technology that lets you make this sort of decision, think about whether that's what you want to be doing. Think about who can compel you to use it in ways other than how it was intended. Consider whether that's something you want on your conscience. And then think about whether you can meet those requirements in a different way. If they can simply compel one junior engineer to alter configuration, that's very different to an implementation that requires sign-offs from multiple senior developers. Make sure that all such policy changes have to be clearly documented, including not just who signed off on it but who asked them to. Build infrastructure that creates a record of who decided to fuck over your coworkers, rather than just blaming whoever committed the config update. The blame trail should never terminate in the person who was told to do something or get fired - the blame trail should clearly indicate who ordered them to do that.

But most importantly: build security features as if they'll be used against you.

Date: 2023-01-23 01:32 pm (UTC)
metahacker: Close-up of a computer screen showing a linux terminal. (drwxrwxrwx)
From: [personal profile] metahacker
A friend has a rule "never bring a weapon to a fight if you don't want it used on you" and I think that's the same thought here...

Secure boot?

Date: 2023-01-23 10:37 pm (UTC)
From: (Anonymous)
In almost all cases secure boot is used to prevent users from using their devices like they see fit...

Date: 2023-01-24 01:37 pm (UTC)
From: (Anonymous)
I'm writing from a locked down ThinkPad X280 that is unable to boot anything else than my employer's Linux. I wish i could install Alpine Linux...

Thank you Matthew for the SecureBoot support in Linux.

Date: 2023-01-25 01:12 am (UTC)
azurelunatic: Vivid pink Alaskan wild rose. (Default)
From: [personal profile] azurelunatic
[this is good]

Date: 2023-01-25 07:37 am (UTC)
hairyears: Spilosoma viginica caterpillar: luxuriant white hair and a 'Dougal' face with antennae. Small, hairy, and venomous (Default)
From: [personal profile] hairyears
That applies to managerial procedures and systems of organisation, too!

Gatekeeping 'undesirables' out of the banking system; patients with chronic 'timewasting' conditions out of access to medical care; excluding developers with dyslexia or sensory deficits from online-testing shortlists for interviews...

All of these things are available for use against the dangerous fools who implemented them.

And don't get me started on the dangers of flagging a company or personal bank account with 'suspected money laundering': the same mechanism, and the same opportunity for malice without review redress or accountability is available e to anyone in the know who wishes to denounce a neighbour for housing employing or being an undocumented immigrant.

I doubt that the systems that do this are competently secured against malicious misuse. Or indeed, intentional 'misuse': the purpose of a system os whatever the system actually does.


Edited (spelling ) Date: 2023-01-25 07:42 am (UTC)

Profile

Matthew Garrett

About Matthew

Power management, mobile and firmware developer on Linux. Security developer at Aurora. Ex-biologist. [personal profile] mjg59 on Twitter. Content here should not be interpreted as the opinion of my employer. Also on Mastodon.

Expand Cut Tags

No cut tags