Security Manager's Journal: When executives want to be above the law
Security policies work best when they apply equally to everyone in the company. Of course, there are always some people who think they should be exceptions.
Computerworld - What do you do when your company's executives insist on special treatment that violates your security policy? This week, I ran into this problem.
A company executive decided that he should not be constrained by the same security policy everyone else has to adhere to. This attitude is really nothing new -- executives often get special treatment, presumably because they have some direct influence over IT's budget and resources -- but this is the first time I've actually heard it said out loud. Usually the "executive privilege" is discussed quietly, in back rooms and hallways, because it's demoralizing for regular employees to hear that VIPs are held to a different standard than the rest of us. Special privileges for executives tend to be a dirty little secret.
Here's what happened. The executive in question wanted to download a program from the Internet, to install on his laptop. Our policy is to block people from downloading and installing stuff found on the Internet. I think that is relatively normal, given the broad range of risks associated with random Internet software, such as malware, Trojans, license violations and compliance concerns. So he was blocked from downloading the software installer by our Web filtering system, which is configured to enforce our policy. He then contacted our help desk, whose staff has been trained in the process for handling exception requests. So far, so good. The help desk offered to download the software for our esteemed VIP, which is part of the process. Of course, that would have to be approved, but it's the first "counter offer" in our process -- giving requestors what they need, without giving them access.
This is where things started to break down. The executive objected to being given the installer file by the help desk. He argued that he and the other execs should not have their Web browsing activities restricted at all! He demanded that the entire category of "downloads" be unblocked for his account. In the process, he was overbearing and unprofessional (in my opinion, after later looking at the email exchange), essentially bullying the help desk representative (who remained very professional). So the help desk representative proceeded to the next exception level, which is to provide a request form to unblock the category, as requested. Now, to be honest, I would not have wanted to approve that request. But I didn't get the chance, because the executive signed off in a huff, pulling rank. He could have followed the process, but instead he insisted on being above the law.
More by J.F. Rice
- Security Manager's Journal: Trapped: Building access controls go kablooey
- Security Manager's Journal: We manage our threats, but what about our vendors?
- Security Manager's Journal: With Heartbleed, suddenly the world is paying attention to security
- Security Manager's Journal: A rush to XP's end of life
- Security Manager's Journal: Security flaw shakes faith in Apple mobile devices
- Security Manager's Journal: Cyberattacks just got personal
- Security Manager's Journal: Target breach unleashes fresh scams
- Security Manager's Journal: Giving thanks for SIEM
- Security Manager's Journal: Hashing out secure applications
- Security Manager's Journal: Why the shutdown is like the cloud
- EndPoint Interactive eGuide In this eGuide, Network World, Computerworld, and CIO examine two endpoint trends - BYOD and collaboration - and offer tips and advice on...
- Mobile First: Securing Information Sprawl Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps...
- Cybersecurity Imperatives: Reinvent your Network Security The Rise of CyberSecurity
- Surescripts Case Study- Securing Keys and Certificates Surescripts implemented Venafi's Trust Protection Platform™ to secure digital keys and certificates, ensure the privacy and confidentiality of electronic clinical information for its...
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities.
- Deep Dive into Advanced Networking and Security with Hybrid Cloud Security and networking are among the top concerns when moving workloads to the cloud. VMware vCloud® Hybrid Service™ enables you to extend your... All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!