Security Manager's Journal: When executives want to be above the law
Security policies work best when they apply equally to everyone in the company. Of course, there are always some people who think they should be exceptions.
Computerworld - What do you do when your company's executives insist on special treatment that violates your security policy? This week, I ran into this problem.
A company executive decided that he should not be constrained by the same security policy everyone else has to adhere to. This attitude is really nothing new -- executives often get special treatment, presumably because they have some direct influence over IT's budget and resources -- but this is the first time I've actually heard it said out loud. Usually the "executive privilege" is discussed quietly, in back rooms and hallways, because it's demoralizing for regular employees to hear that VIPs are held to a different standard than the rest of us. Special privileges for executives tend to be a dirty little secret.
Here's what happened. The executive in question wanted to download a program from the Internet, to install on his laptop. Our policy is to block people from downloading and installing stuff found on the Internet. I think that is relatively normal, given the broad range of risks associated with random Internet software, such as malware, Trojans, license violations and compliance concerns. So he was blocked from downloading the software installer by our Web filtering system, which is configured to enforce our policy. He then contacted our help desk, whose staff has been trained in the process for handling exception requests. So far, so good. The help desk offered to download the software for our esteemed VIP, which is part of the process. Of course, that would have to be approved, but it's the first "counter offer" in our process -- giving requestors what they need, without giving them access.
This is where things started to break down. The executive objected to being given the installer file by the help desk. He argued that he and the other execs should not have their Web browsing activities restricted at all! He demanded that the entire category of "downloads" be unblocked for his account. In the process, he was overbearing and unprofessional (in my opinion, after later looking at the email exchange), essentially bullying the help desk representative (who remained very professional). So the help desk representative proceeded to the next exception level, which is to provide a request form to unblock the category, as requested. Now, to be honest, I would not have wanted to approve that request. But I didn't get the chance, because the executive signed off in a huff, pulling rank. He could have followed the process, but instead he insisted on being above the law.
More by J.F. Rice
- Security Manager's Journal: Trapped: Building access controls go kablooey
- Security Manager's Journal: We manage our threats, but what about our vendors?
- Security Manager's Journal: With Heartbleed, suddenly the world is paying attention to security
- Security Manager's Journal: A rush to XP's end of life
- Security Manager's Journal: Security flaw shakes faith in Apple mobile devices
- Security Manager's Journal: Cyberattacks just got personal
- Security Manager's Journal: Target breach unleashes fresh scams
- Security Manager's Journal: Giving thanks for SIEM
- Security Manager's Journal: Hashing out secure applications
- Security Manager's Journal: Why the shutdown is like the cloud
- Top 10 Reasons to Strengthen Information Security with Desktop Virtualization Regain control and reduce risk without sacrificing business productivity and growth
- Preventing Sophisticated Attacks: Anti-Evasion & Advanced Evasion Techniques McAfee Next Generation Firewall applies sophisticated analysis techniques specifically to detect advanced evasion techniques (AET).
- The Security Industry's Dirty Little Secret The debate over advanced evasion techniques (AETs) This report summarizes the findings of a McAfee commissioned research group to determine the level of understanding IT security professionals have about AETs...
- Demand More, Get the Most from the Move to a Next-Generation Firewall Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!