[continued from previous message]
(internal and external) who are incentivized to say "no" because it's
easier and faster than documenting variances; or approving
compensating controls... Auditors who don't understand the system
holistically and won't/can't see why a compensating control addresses
one or more requirements... Or lawyers and insurers who are unwilling
or unable to understand the technical nuances and prioritize "exact
compliance" over actual security.
I'd love to have systems that were both secure and compliant with
policy, but if I have to choose one over the other, I'll tend toward
actual security.
------------------------------
Date: Wed, 4 Sep 2024 20:27:27 -0600
From: Charles Cazabon <
charlesc@pyropus.ca>
Subject: Re: Standard security policies and variances (Kilby, RISKS-34.43]
Having run into this situation myself a number of times, I can relate that things don't always -- or perhaps even usually -- go as smoothly as this suggestion assumes.
Large organizations set standard baseline policies. Frontline helpdesk or security folks apply the baseline policies, because it's a Standard Policy. Someone requests a variance - such as me, for accessibility reasons - and it turns out to be essentially impossible to get *any* variance, because in
large organizations it's no one's job to create and apply those variances or otherwise deviate from the standard policy, and the incentives are all
against doing so.
E.g., 18 months later, I was still waiting for that variance...
------------------------------
Date: Sat, 28 Oct 2023 11:11:11 -0800
From:
RISKS-request@csl.sri.com
Subject: Abridged info on RISKS (comp.risks)
The ACM RISKS Forum is a MODERATED digest. Its Usenet manifestation is
comp.risks, the feed for which is donated by panix.com as of June 2011.
SUBSCRIPTIONS: The mailman Web interface can be used directly to
subscribe and unsubscribe:
http://mls.csl.sri.com/mailman/listinfo/risks
SUBMISSIONS: to risks@CSL.sri.com with meaningful SUBJECT: line that
includes the string `notsp'. Otherwise your message may not be read.
*** This attention-string has never changed, but might if spammers use it.
SPAM challenge-responses will not be honored. Instead, use an alternative
address from which you never send mail where the address becomes public!
The complete INFO file (submissions, default disclaimers, archive sites,
copyright policy, etc.) has moved to the ftp.sri.com site:
<risksinfo.html>.
*** Contributors are assumed to have read the full info file for guidelines!
OFFICIAL ARCHIVES: http://www.risks.org takes you to Lindsay Marshall's
delightfully searchable html archive at newcastle:
http://catless.ncl.ac.uk/Risks/VL.IS --> VoLume, ISsue.
Also,
ftp://ftp.sri.com/risks for the current volume/previous directories
or
ftp://ftp.sri.com/VL/risks-VL.IS for previous VoLume
If none of those work for you, the most recent issue is always at
http://www.csl.sri.com/users/risko/risks.txt, and index at /risks-34.00
ALTERNATIVE ARCHIVES:
http://seclists.org/risks/ (only since mid-2001)
*** NOTE: If a cited URL fails, we do not try to update them. Try
browsing on the keywords in the subject line or cited article leads.
Apologies for what Office365 and SafeLinks may have done to URLs.
Special Offer to Join ACM for readers of the ACM RISKS Forum:
<
http://www.acm.org/joinacm1>
------------------------------
End of RISKS-FORUM Digest 34.44
************************
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)