denverpilot
Tied Down
So do you also fire the entire team that designed a data system that kept critical data on storage accessible directly to the web server?
Firing CEOs is boring. They'll have a job offer making more than the entire development team in less than a year.
And how about the chief security officer? CEO leaves but CSO doesn't? Largest and most information packed data breach in history (so far... there will be a bigger one, these won't stop happening) and the top security person still has a job?
The reality is, the code all sucks. Building any modern system is layer on layer of bugs. Mitigating data theft has to be done by the design up front. The code should always be assumed to have holes in it the size of a barn door.
Or don't collect the data in the first place. Best security of all.
Every server admin out there knows of at least one big security hole somewhere in a system they maintain. If they don't push hard enough to patch it before it's exploited, but they did push, did they do their job? Should they be fired if the timing of the rain dance doesn't go their way?
When the Dev team says they don't have enough people to upgrade some module they used from the net and didn't write, that completely changed its API in the upgrade to fix the security bug upstream, should they be fired if they can't get that change through QA and out to Production before the Production side is hacked?
I don't know the answers, I just know the code quality goes down by the size of the code base -- and nobody can afford to fix all the bugs. Nobody puts in 80 hour weeks auditing trusted modules. That's how OpenSSL had a hole the size of a Mack truck for a decade that nobody noticed. And that's a team who does audit code. Most dev teams simply don't. Not to that level.
The warning of my wise old CS prof keeps echoing. She said, "Be careful what you put in databases." Nobody's been careful about that, ever.
And in this particular case, you can't opt-out of your data being in there. You're literally not allowed to say no. Blocks and freezes aren't the fix for this type of data breach. Being able to say no, I don't want you putting that data in a database in the first place about me, is.
Firing CEOs is boring. They'll have a job offer making more than the entire development team in less than a year.
And how about the chief security officer? CEO leaves but CSO doesn't? Largest and most information packed data breach in history (so far... there will be a bigger one, these won't stop happening) and the top security person still has a job?
The reality is, the code all sucks. Building any modern system is layer on layer of bugs. Mitigating data theft has to be done by the design up front. The code should always be assumed to have holes in it the size of a barn door.
Or don't collect the data in the first place. Best security of all.
Every server admin out there knows of at least one big security hole somewhere in a system they maintain. If they don't push hard enough to patch it before it's exploited, but they did push, did they do their job? Should they be fired if the timing of the rain dance doesn't go their way?
When the Dev team says they don't have enough people to upgrade some module they used from the net and didn't write, that completely changed its API in the upgrade to fix the security bug upstream, should they be fired if they can't get that change through QA and out to Production before the Production side is hacked?
I don't know the answers, I just know the code quality goes down by the size of the code base -- and nobody can afford to fix all the bugs. Nobody puts in 80 hour weeks auditing trusted modules. That's how OpenSSL had a hole the size of a Mack truck for a decade that nobody noticed. And that's a team who does audit code. Most dev teams simply don't. Not to that level.
The warning of my wise old CS prof keeps echoing. She said, "Be careful what you put in databases." Nobody's been careful about that, ever.
And in this particular case, you can't opt-out of your data being in there. You're literally not allowed to say no. Blocks and freezes aren't the fix for this type of data breach. Being able to say no, I don't want you putting that data in a database in the first place about me, is.