• Home
  • Privacy Policy
Breaking News, US News, World News and Bollywood News
  • Home
  • Technology
    Thoughtworks weighs in on multicloud

    Thoughtworks weighs in on multicloud

    You’re missing the boat on cloud-native

    You’re missing the boat on cloud-native

    Red Hat ditches CodeReady name for dev environments

    Red Hat ditches CodeReady name for dev environments

    Project Leyden gets the green light

    Project Leyden gets the green light

    9 nifty libraries for profiling Python code

    9 nifty libraries for profiling Python code

    What is JPA? Introduction to the Jakarta Persistence API

    What is JPA? Introduction to the Jakarta Persistence API

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
  • Entertainment
    Missing Michael McIntyre’s The Wheel? Play the board game with your family instead | Gaming | Entertainment

    Missing Michael McIntyre’s The Wheel? Play the board game with your family instead | Gaming | Entertainment

    Wordle 339 May 24 hints – Struggling with today’s Wordle? Three clues to help with answer | Gaming | Entertainment

    Wordle 339 May 24 hints – Struggling with today’s Wordle? Three clues to help with answer | Gaming | Entertainment

    Daily Quordle 120 hints for May 24 – Clues to help with today’s tricky Quordle puzzle | Gaming | Entertainment

    Daily Quordle 120 hints for May 24 – Clues to help with today’s tricky Quordle puzzle | Gaming | Entertainment

    Daily Quordle 119 HINTS for May 23 – CLUES to help with today’s tricky Quordle puzzle | Gaming | Entertainment

    Daily Quordle 119 HINTS for May 23 – CLUES to help with today’s tricky Quordle puzzle | Gaming | Entertainment

    Roger Moore named the ‘best’ Bond ever and his pick for who should replace Daniel Craig | Films | Entertainment

    Roger Moore named the ‘best’ Bond ever and his pick for who should replace Daniel Craig | Films | Entertainment

    Roger Moore was ‘petrified’ drunk Hollywood star would drop a baby on set ‘He was shaking’ | Films | Entertainment

    Roger Moore was ‘petrified’ drunk Hollywood star would drop a baby on set ‘He was shaking’ | Films | Entertainment

    Trending Tags

      • Bollywood
      • Hollywood
      • Music
    • Lifestyle
      How to grow mint from cuttings – five easy steps for the ‘best flavour and fragrance’

      How to grow mint from cuttings – five easy steps for the ‘best flavour and fragrance’

      Martin Kemp and wife Shirlie share plans for garden while attending Chelsea Flower Show

      Martin Kemp and wife Shirlie share plans for garden while attending Chelsea Flower Show

      Gardening: ‘Key factors’ to consider if plants are not growing – ‘goes for most plants’

      Gardening: ‘Key factors’ to consider if plants are not growing – ‘goes for most plants’

      How to get rid of moles in the garden – 6 methods the experts ‘swear by’

      How to get rid of moles in the garden – 6 methods the experts ‘swear by’

      How to kill weeds without chemicals – 4 easy solutions

      How to kill weeds without chemicals – 4 easy solutions

      Garden ideas: How to make your garden look bigger – ‘best use of outdoor space

      Garden ideas: How to make your garden look bigger – ‘best use of outdoor space

      Trending Tags

      • Golden Globes
      • Game of Thrones
      • MotoGP 2017
      • eSports
      • Fashion Week
    • Nature
    • Business
    • Health
      • Food
    • Fashion
    • Science
    • Sports
    • Travel
    • World News
    No Result
    View All Result
    • Home
    • Technology
      Thoughtworks weighs in on multicloud

      Thoughtworks weighs in on multicloud

      You’re missing the boat on cloud-native

      You’re missing the boat on cloud-native

      Red Hat ditches CodeReady name for dev environments

      Red Hat ditches CodeReady name for dev environments

      Project Leyden gets the green light

      Project Leyden gets the green light

      9 nifty libraries for profiling Python code

      9 nifty libraries for profiling Python code

      What is JPA? Introduction to the Jakarta Persistence API

      What is JPA? Introduction to the Jakarta Persistence API

      Trending Tags

      • Nintendo Switch
      • CES 2017
      • Playstation 4 Pro
      • Mark Zuckerberg
    • Entertainment
      Missing Michael McIntyre’s The Wheel? Play the board game with your family instead | Gaming | Entertainment

      Missing Michael McIntyre’s The Wheel? Play the board game with your family instead | Gaming | Entertainment

      Wordle 339 May 24 hints – Struggling with today’s Wordle? Three clues to help with answer | Gaming | Entertainment

      Wordle 339 May 24 hints – Struggling with today’s Wordle? Three clues to help with answer | Gaming | Entertainment

      Daily Quordle 120 hints for May 24 – Clues to help with today’s tricky Quordle puzzle | Gaming | Entertainment

      Daily Quordle 120 hints for May 24 – Clues to help with today’s tricky Quordle puzzle | Gaming | Entertainment

      Daily Quordle 119 HINTS for May 23 – CLUES to help with today’s tricky Quordle puzzle | Gaming | Entertainment

      Daily Quordle 119 HINTS for May 23 – CLUES to help with today’s tricky Quordle puzzle | Gaming | Entertainment

      Roger Moore named the ‘best’ Bond ever and his pick for who should replace Daniel Craig | Films | Entertainment

      Roger Moore named the ‘best’ Bond ever and his pick for who should replace Daniel Craig | Films | Entertainment

      Roger Moore was ‘petrified’ drunk Hollywood star would drop a baby on set ‘He was shaking’ | Films | Entertainment

      Roger Moore was ‘petrified’ drunk Hollywood star would drop a baby on set ‘He was shaking’ | Films | Entertainment

      Trending Tags

        • Bollywood
        • Hollywood
        • Music
      • Lifestyle
        How to grow mint from cuttings – five easy steps for the ‘best flavour and fragrance’

        How to grow mint from cuttings – five easy steps for the ‘best flavour and fragrance’

        Martin Kemp and wife Shirlie share plans for garden while attending Chelsea Flower Show

        Martin Kemp and wife Shirlie share plans for garden while attending Chelsea Flower Show

        Gardening: ‘Key factors’ to consider if plants are not growing – ‘goes for most plants’

        Gardening: ‘Key factors’ to consider if plants are not growing – ‘goes for most plants’

        How to get rid of moles in the garden – 6 methods the experts ‘swear by’

        How to get rid of moles in the garden – 6 methods the experts ‘swear by’

        How to kill weeds without chemicals – 4 easy solutions

        How to kill weeds without chemicals – 4 easy solutions

        Garden ideas: How to make your garden look bigger – ‘best use of outdoor space

        Garden ideas: How to make your garden look bigger – ‘best use of outdoor space

        Trending Tags

        • Golden Globes
        • Game of Thrones
        • MotoGP 2017
        • eSports
        • Fashion Week
      • Nature
      • Business
      • Health
        • Food
      • Fashion
      • Science
      • Sports
      • Travel
      • World News
      No Result
      View All Result
      Updates News
      No Result
      View All Result
      Home Technology

      4 models for escalating access permissions during emergencies

      admin by admin
      January 17, 2022
      in Technology
      0
      4 models for escalating access permissions during emergencies
      0
      SHARES
      9
      VIEWS
      Share on FacebookShare on Twitter


      When building modern applications, managing access permissions during operational events is tricky.

      Security best practices specify that engineers—developers and operations engineers—should have as little access as possible to the production application and its infrastructure. Sometimes business requirements or industry regulations require access to production to be severely restricted. But even without industry or business requirements, security best practices, such as the principle of least privilege, dictate that engineers should have as little access to production as possible, including those engineers responsible for managing on-call operational issues.

      However, this can become an issue when an on-call engineer must deal with a problem in a production application. When permissions are tightly controlled, on-call engineers occasionally need additional permissions to resolve production issues. Sometimes simple acts, such as rebooting a production server, are beyond the normal permissions of an on-call engineer but may be required in an emergency.

      How do on-call engineers perform these activities during an emergency? By performing a permission escalation. This is an action that temporarily gives an engineer additional permissions in order to perform emergency procedures that would normally be beyond their permission allowances.

      But how can an engineer escalate their permissions without the ability to escalate their permissions itself becoming a security vulnerability?

      There are four ways to accomplish permission escalation that can grant your on-call engineers the permissions they require while limiting the security vulnerabilities inherent in granting the additional permissions. Each has advantages and disadvantages.

      BTG or Break the Glass

      The BTG or Break the Glass model allows an on-call engineer to request from a system process an escalation of permissions, to be used only in an emergency situation. When the engineer requests these additional permissions, an automated system grants them the necessary permissions, but it immediately logs the request and sends a notification to appropriate management to let them know of the request. Because the engineer is aware of this notification, they know they can only “Break the Glass” during an actual emergency, and that they will have to explain their actions later, such as during an upcoming incident review. This makes it unlikely that someone will request these additional permissions except when absolutely necessary.

      This model is typically very easy to implement in a production environment, and allows engineers the flexibility they require during an emergency. However, the review process is a reactive process, not a proactive process. This means that management can only review what happened that caused the engineer to escalate their permissions after the fact. If a disgruntled engineer requests a BTG to get permissions to perform a nefarious activity, management will know about it only after it occurs, not before. Because of this, the BTG model is great for moderately secure environments, but is not acceptable when a high level of security or protection against potential employee bad actions is required.

      Logged escalation

      In the logged escalation model, when an engineer needs to perform certain privileged activities beyond their normal permission level, they use specific commands that are logged and monitored for inappropriate access. For example, if an engineer requires access to a protected private network, they may log in to a bastion host, a server that gives them access to the protected private network. The bastion host logs all activities the engineer performs, making them available for examination after the event. The intent is to ensure that no bad actor got in and performed inappropriate actions on the protected network, yet legitimate activities can still take place normally.

      Similar to the BTG model, the logged escalation model allows any engineer with appropriate permissions to access the production network for any appropriate purposes, not just an emergency. However, these users only have access from within a “glass house” environment—an environment where every action taken is made visible for analysis later. This provides many of the same advantages of the BTG model, but with similar disadvantages. Namely, management will know about nefarious activity only after it has occurred and has no ability to prevent it beforehand.

      Two-person escalation

      Two-person escalation is an enhancement of the BTG model, where the BTG escalation is allowed only if two independent people are working together on the problem, and they both authorize the escalation. Then, by policy, all actions they take under BTG must be reviewed by both parties, and both parties must be involved in all escalation activities performed.

      This is a vast improvement in security over the basic BTG model, because it mostly eliminates the disgruntled employee from being able to damage production simply by issuing a BTG escalation. Instead, two employees must work together to proactively perform any actions. No single employee can damage a system without having a second employee as an accomplice, which significantly improves the overall security.

      The two-person escalation model can be harder to enforce, due to the policy requirements that people must follow for it to be effective. It has to be untenable for an engineer to work with another engineer to grant two-person BTG access, then allow the lone engineer exclusive and unmonitored use of the access. Such a problem defeats the purpose of the two-person escalation model.

      Limited-scope tools

      For maximum security, limited-scope tools is the best model. This involves creating custom tooling that performs specific activities necessary to provide operational maintenance to a production application. If you need to perform some action beyond your normal capabilities, you invoke the action using a tool that is custom-designed to perform that access.

      For example, if an on-call engineer must reboot a production server, they would normally log in to the production server as “root” and reboot the server. This requires a level of permissions that is unacceptable in most production environments. However, imagine a web console that gives an operations engineer the push-button ability to initiate a reboot of production servers. They can, using their normal permissions, perform a specific action that would normally require escalated permissions.

      The advantage of the limited-scope tools model is that it gives the user the exact capabilities they require, and only those capabilities. This preserves the principle of least permission, yet gives the operator the specific capabilities they require. The custom tool typically also provides the benefits of the logged escalation model by keeping track of who uses the tool and when it is used, so the activities involved can be tracked and examined later during an incident review.

      The downside of the limited-scope tools model is that it doesn’t provide a generic escalation model, but gives access only to specific capabilities that were imagined ahead of time, using tooling created to allow that action. If you must perform some action that requires escalated permissions, and no tool is available to perform that action, you as an operations engineer may be simply out of luck.

      As such, while limited-scope tools is the best, safest model overall, it often is not used alone but in conjunction with one of the other models for unanticipated permissions that might be needed. However, this can lessen the security advantages inherent in this model.

      Which model is best?

      These four methods are all best practices, but work only for some businesses and are unacceptable to others. In practice, a combination of multiple methods is usually employed. By selecting the processes, complexities, and operational monitoring appropriate for your business and industry, you can implement permission-escalation without unduly compromising your application and its security.

      Copyright © 2022 IDG Communications, Inc.



      Source link

      admin

      admin

      • Trending
      • Comments
      • Latest
      Plant warning as bamboo causes £100,000 of damage to Hampshire property

      Plant warning as bamboo causes £100,000 of damage to Hampshire property

      January 31, 2022
      Social workers warned weeks before baby Mitchell died in 2019 | TV & Radio | Showbiz & TV

      Social workers warned weeks before baby Mitchell died in 2019 | TV & Radio | Showbiz & TV

      January 2, 2022
      Yorkshire nan on how to make Yorkshire puddings with no ingredients weighed

      Yorkshire nan on how to make Yorkshire puddings with no ingredients weighed

      February 15, 2022
      Newcastle transfer news: Last-gasp offer made for Dele Alli in late Everton hijack attempt | Football | Sport

      Newcastle transfer news: Last-gasp offer made for Dele Alli in late Everton hijack attempt | Football | Sport

      January 31, 2022
      Missing Michael McIntyre’s The Wheel? Play the board game with your family instead | Gaming | Entertainment

      Missing Michael McIntyre’s The Wheel? Play the board game with your family instead | Gaming | Entertainment

      0
      Boris Johnson slammed by Indie band for using their song ‘Blue Bunch Of Corrupt W****rs’ | Music | Entertainment

      Boris Johnson slammed by Indie band for using their song ‘Blue Bunch Of Corrupt W****rs’ | Music | Entertainment

      0
      Call Your Mom, Because Sue Grafton’s Alphabet Murder Mystery Books Are Becoming A Show

      Call Your Mom, Because Sue Grafton’s Alphabet Murder Mystery Books Are Becoming A Show

      0
      Release Date, Cast, And More

      Release Date, Cast, And More

      0
      Missing Michael McIntyre’s The Wheel? Play the board game with your family instead | Gaming | Entertainment

      Missing Michael McIntyre’s The Wheel? Play the board game with your family instead | Gaming | Entertainment

      May 24, 2022
      How to grow mint from cuttings – five easy steps for the ‘best flavour and fragrance’

      How to grow mint from cuttings – five easy steps for the ‘best flavour and fragrance’

      May 24, 2022
      8 Super-Chic Airport Looks From Cannes Film Festival 2022

      8 Super-Chic Airport Looks From Cannes Film Festival 2022

      May 24, 2022
      Wordle 339 May 24 hints – Struggling with today’s Wordle? Three clues to help with answer | Gaming | Entertainment

      Wordle 339 May 24 hints – Struggling with today’s Wordle? Three clues to help with answer | Gaming | Entertainment

      May 24, 2022

      Recent News

      Missing Michael McIntyre’s The Wheel? Play the board game with your family instead | Gaming | Entertainment

      Missing Michael McIntyre’s The Wheel? Play the board game with your family instead | Gaming | Entertainment

      May 24, 2022
      How to grow mint from cuttings – five easy steps for the ‘best flavour and fragrance’

      How to grow mint from cuttings – five easy steps for the ‘best flavour and fragrance’

      May 24, 2022
      8 Super-Chic Airport Looks From Cannes Film Festival 2022

      8 Super-Chic Airport Looks From Cannes Film Festival 2022

      May 24, 2022
      Wordle 339 May 24 hints – Struggling with today’s Wordle? Three clues to help with answer | Gaming | Entertainment

      Wordle 339 May 24 hints – Struggling with today’s Wordle? Three clues to help with answer | Gaming | Entertainment

      May 24, 2022
      Breaking News, US News, World News and Bollywood News

      Follow Us

      Browse by Category

      • Bollywood
      • Business
      • Entertainment
      • Fashion
      • Food
      • Health
      • Hollywood
      • Lifestyle
      • Music
      • Nature
      • Science
      • Sports
      • Technology
      • Travel
      • World News

      Recent News

      Missing Michael McIntyre’s The Wheel? Play the board game with your family instead | Gaming | Entertainment

      Missing Michael McIntyre’s The Wheel? Play the board game with your family instead | Gaming | Entertainment

      May 24, 2022
      How to grow mint from cuttings – five easy steps for the ‘best flavour and fragrance’

      How to grow mint from cuttings – five easy steps for the ‘best flavour and fragrance’

      May 24, 2022
      • Home
      • Privacy Policy

      © 2021 Updates News

      No Result
      View All Result

      © 2021 Updates News