<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Best Practices for privileged account on laptops in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/8704#M78</link>
    <description>&lt;P&gt;I agree with&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/102722613"&gt;@Deyan&lt;/a&gt;,&amp;nbsp;about an organization's policies&amp;nbsp;being&amp;nbsp;the&amp;nbsp;deciding factor --- If&amp;nbsp;what you're doing isn't an exception, it's a violation...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/754920891"&gt;@mgoblue93&lt;/a&gt;&amp;nbsp;virtualization would be a good solution so long as the host&amp;nbsp;doesn't have processor vulnerabilities like Spectre &amp;amp; Meltdown, which allow compromise of a host from its virtual systems,&amp;nbsp;else a lot of VMs&amp;nbsp;might be be&amp;nbsp;impacted&amp;nbsp;if the host itself gets affected...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 26 Mar 2018 11:14:42 GMT</pubDate>
    <dc:creator>Shannon</dc:creator>
    <dc:date>2018-03-26T11:14:42Z</dc:date>
    <item>
      <title>Best Practices for privileged account on laptops</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/8593#M71</link>
      <description>&lt;P&gt;At our company we've implemented a new security policy for our engineers. The engineers use their laptop as a Swiss army knife, the develop code install software and read their company mail on the device.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the days where the domain account of the engineer was also a local admin, our engineers where happy and content with the policy. Due to mal- and ransomware we started a proof of concept where we changed to a local named admin account to do the programming and installing, and a domain account to access e-mail, ERPand office via Citrix.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In my opinion this is an acceptable solution, this is our normal 'modus operandi' at the IT department, if we need to install something we use the 'runs as...' command.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But you guessed it: Our engineers are not happy with the new policy. So what do you recommend? Have you encountered the same issues and how did you resolve those?&lt;/P&gt;</description>
      <pubDate>Fri, 23 Mar 2018 12:27:27 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/8593#M71</guid>
      <dc:creator>Ramon</dc:creator>
      <dc:date>2018-03-23T12:27:27Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for privileged account on laptops</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/8596#M72</link>
      <description>&lt;P&gt;Restricting rights to a local administrative account may reduce the risk to the system due to compromise&lt;SPAN&gt;&amp;nbsp;at the domain level,&amp;nbsp;&lt;/SPAN&gt;but it&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;definitely has&amp;nbsp;its&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;drawbacks,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;including: -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Decentralized control and management&lt;/LI&gt;&lt;LI&gt;Management of multiple local accounts&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Assuming&amp;nbsp;the&amp;nbsp;benefits aren't justified,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;wouldn't&amp;nbsp;it make more&amp;nbsp;sense to implement / enforce adequate&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;controls&amp;nbsp;in an existing system &amp;amp; its constituents --- rather than&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;change&amp;nbsp;the architecture?&lt;/P&gt;</description>
      <pubDate>Fri, 23 Mar 2018 15:05:37 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/8596#M72</guid>
      <dc:creator>Shannon</dc:creator>
      <dc:date>2018-03-23T15:05:37Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for privileged account on laptops</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/8605#M73</link>
      <description>&lt;P&gt;Turning this around.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You might consider turning that around and having your Engineers remote&amp;nbsp;onto an environment that was a secured sandbox with some systems types had permissions on for developing their code.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thn have them use their laptop effectively as an appliance that they use without permissions to access corporate email, do their admin etc and if essential scour the internet for lolcats...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It would probably make them even less happy, but would allow you to secure a lot of aspects of the dev systems more thoroughly, bubble them up in a few layers, monitor well, &amp;nbsp;and you could always sweeten the deal by providing them some powerful dev platforms that are quick to compile etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;there are a host of &amp;nbsp;solutions and work rounds such as PAM, 2FA, jump boxen, isolation and hardening (Developers really like&amp;nbsp;tthis last one...) that you can employ as well as restricting accounts.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To riff on &lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/783078713"&gt;@Shannon&lt;/a&gt;&amp;nbsp;It does seem to me that by using a local account on a laptop you lose a lot of context on user behaviour and if it’s compromised you don’t have as much visibility into its authentication centrally so by running it like this you might give an attacker a system they can persist on Long tiers while studying and waiting to pivot to some new credentials.&lt;/P&gt;</description>
      <pubDate>Sat, 24 Mar 2018 10:18:08 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/8605#M73</guid>
      <dc:creator>Early_Adopter</dc:creator>
      <dc:date>2018-03-24T10:18:08Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for privileged account on laptops</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/8616#M74</link>
      <description>&lt;P&gt;I've seen your approach used and I consider it a good compromise.&amp;nbsp; Non privileged daily use account and a separate local admin (or admin of a set of systems) for software installs and configuration changes.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many benefits .. entering a new password is quick, admin account is never left logged in.&amp;nbsp; Email and primary tools on one system which helps productivity.&amp;nbsp; PCI DSS requires this type of setup and this fact could be motivation for end users.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Offering users separate terminal servers / jump servers works too but then you run into having to provide the same custom hardware they would enjoy on their PC.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 25 Mar 2018 13:41:27 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/8616#M74</guid>
      <dc:creator>HackneyB78</dc:creator>
      <dc:date>2018-03-25T13:41:27Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for privileged account on laptops</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/8656#M75</link>
      <description>&lt;P&gt;As a software developer, and someone who has led teams of software developers, I wouldn't be happy about this either.&amp;nbsp; Ha!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My laptop is indeed my swiss army knife.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But I do have to say, in my experience, I haven't had problems with staff&amp;nbsp;and&amp;nbsp;malware because they had admin rights.&amp;nbsp; Generally,&amp;nbsp;they're doing legit work and visiting legit sites on their laptops.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1.&amp;nbsp; Are you sure this is a technical problem?&amp;nbsp; If someone is downloading&amp;nbsp;crap on their&amp;nbsp;work resources, I would say that's a performance management problem -- they're violating their EULA and/or SLA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2.&amp;nbsp; A good technical solution is to virtualize the development environment.&amp;nbsp; Have a development environment template which the developer deploys based upon their needs.&amp;nbsp; They have root access to only the guest (which makes them happy) but not the host (which makes YOU happy).&amp;nbsp; If the guest ever gets hosed, you just delete it and the developer redeploys from template.&lt;/P&gt;</description>
      <pubDate>Sun, 25 Mar 2018 17:51:14 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/8656#M75</guid>
      <dc:creator>mgoblue93</dc:creator>
      <dc:date>2018-03-25T17:51:14Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for privileged account on laptops</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/8658#M76</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/754920891"&gt;@mgoblue93&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yeah it’s poor to lose capability -&amp;nbsp;not nice... but you can better control what people can do from virtuliaed/ constrained HW. On the compliance &amp;nbsp;it think&amp;nbsp;quite often the dev will be targeted from a site they legitimately use - waterholing/ phishing etc. Social engineering is much easier if they are an admin.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 25 Mar 2018 18:20:08 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/8658#M76</guid>
      <dc:creator>Early_Adopter</dc:creator>
      <dc:date>2018-03-25T18:20:08Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for privileged account on laptops</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/8700#M77</link>
      <description>&lt;P&gt;I believe that here again you need to compare security vs performance and comfort of staff.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In my opinion which is mostly leaning towards security - I would not allow local admin accounts on laptops that are known and usable by the personnel. Network accounts should be used for both administrative and user functions - separated and provided to the relevant employees based on their role.&lt;/P&gt;&lt;P&gt;Assuming a company has policy towards acceptable IT use, internet/mail usage, desktop/laptop computing - I would say that the admin privileges on the laptops for the normal users (developers or whoever) could only introduce risks for them to breach any of the policies.&lt;/P&gt;&lt;P&gt;I am not sure why a developer is "happy" when they have privileges to modify the registry keys under Windows for example... but I definitely see risk in having privileged beyond your job requirements.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;My opinion is that company's policies should be enforced to the most possible extend via the technology and if for example - compliance to the acceptable use policy requires that admin rights are removed from employees - then do it - explain to them that even if they had admin rights - the would be breaching company policy if they perform prohibited functions. Sorry if this sounds unrealistic to you but I believe that's how it should work...&lt;/P&gt;</description>
      <pubDate>Mon, 26 Mar 2018 10:15:07 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/8700#M77</guid>
      <dc:creator>Deyan</dc:creator>
      <dc:date>2018-03-26T10:15:07Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for privileged account on laptops</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/8704#M78</link>
      <description>&lt;P&gt;I agree with&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/102722613"&gt;@Deyan&lt;/a&gt;,&amp;nbsp;about an organization's policies&amp;nbsp;being&amp;nbsp;the&amp;nbsp;deciding factor --- If&amp;nbsp;what you're doing isn't an exception, it's a violation...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/754920891"&gt;@mgoblue93&lt;/a&gt;&amp;nbsp;virtualization would be a good solution so long as the host&amp;nbsp;doesn't have processor vulnerabilities like Spectre &amp;amp; Meltdown, which allow compromise of a host from its virtual systems,&amp;nbsp;else a lot of VMs&amp;nbsp;might be be&amp;nbsp;impacted&amp;nbsp;if the host itself gets affected...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Mar 2018 11:14:42 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/8704#M78</guid>
      <dc:creator>Shannon</dc:creator>
      <dc:date>2018-03-26T11:14:42Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for privileged account on laptops</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/8728#M79</link>
      <description>&lt;P&gt;See if understand both comments.&lt;/P&gt;&lt;P&gt;Don't take technical measures but translate those measures into a Policy and steer on behavior.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do not hide the cookie jar, but tell them it's not allowed to eat cookies, and leave the cookie jar on the shelf. Correct?&lt;/P&gt;</description>
      <pubDate>Mon, 26 Mar 2018 13:59:03 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/8728#M79</guid>
      <dc:creator>Ramon</dc:creator>
      <dc:date>2018-03-26T13:59:03Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for privileged account on laptops</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/8732#M80</link>
      <description>&lt;P&gt;Hey Ramon,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Actually it is - have your policies and use the technology you have to enforce them. If you do not allow eating of cookies - hide them.... if that makes sense...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Looking at your comment - I'd say that the positioning is wrong.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1st is the law - "dont eat cookies" then it the distribution of controls to ensure that wont happen - hide the cookies, lock the jar, put a guard to stay next to them..... whatever&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;in this case - the developers have the cookies right in front of them - if the company does not&amp;nbsp;allow eating them - it should hide them.... not leave the cookies right in front of them and rely only on the policy.... - hope that makes sense.... Security Technology is&amp;nbsp;&lt;U&gt;only there to help organizations enforce their policies&lt;/U&gt; (written or not)&lt;/P&gt;</description>
      <pubDate>Mon, 26 Mar 2018 14:09:16 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/8732#M80</guid>
      <dc:creator>Deyan</dc:creator>
      <dc:date>2018-03-26T14:09:16Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for privileged account on laptops</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/8738#M81</link>
      <description>&lt;P&gt;Let me&amp;nbsp;correct / clarify both of your statements&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/109619831"&gt;@Ramon&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;'Don't take technical measures but translate those measures into a Policy and steer on behavior.'&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Correction&lt;/STRONG&gt;: Don't&amp;nbsp;take extreme technical measures&amp;nbsp;if costs outweigh benefits, but ensure that your control measures comply with the organisation's policy, and adequately enforce the policy.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;'Do not hide the cookie jar, but tell them it's not allowed to eat cookies, and leave the cookie jar on the shelf.'&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Correction:&amp;nbsp;Continue to eat cookies, but also&amp;nbsp;ensure the following: -&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;SPAN&gt;The cookie jar is kept tightly closed&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;The cookie jar is kept in&amp;nbsp;a locked cabinet&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;There's a curtain covering the cabinet&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;There's a&amp;nbsp;sign on the cookie jar warning people not to take the cookies&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;The cookie jar is regularly checked to make sure the cookies aren't touched&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;There's a pet dog that growls when anyone goes for the cookies&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;As controls, there are &lt;U&gt;preventive controls&lt;/U&gt; (1, 2 &amp;amp; 3), &lt;U&gt;deterrent controls&lt;/U&gt; (4) and &lt;U&gt;detective controls&lt;/U&gt; (5 &amp;amp; 6)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Mar 2018 14:25:32 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/8738#M81</guid>
      <dc:creator>Shannon</dc:creator>
      <dc:date>2018-03-26T14:25:32Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for privileged account on laptops</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/8742#M82</link>
      <description>&lt;P&gt;&amp;gt; On the compliance &amp;nbsp;it think&amp;nbsp;quite often the dev&lt;/P&gt;&lt;P&gt;&amp;gt; will be targeted from a site they legitimately&lt;/P&gt;&lt;P&gt;&amp;gt; use - waterholing/ phishing etc. Social&lt;/P&gt;&lt;P&gt;&amp;gt; &amp;nbsp;engineering is much easier if they&lt;/P&gt;&lt;P&gt;&amp;gt; are an admin&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hear this kind of&amp;nbsp;reply a lot.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I respectfully shake my head.&amp;nbsp; That's a process or management-type response.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A dev is not targeted any more or any less than any other role in the organization.&amp;nbsp; And the notion of being an admin is a straw man argument.&amp;nbsp; Why? Two words:&amp;nbsp; Microsoft Outlook.&amp;nbsp; Anyone in the organization can open a link, other than the devs, and potentially do just as much damage as the devs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Before reading on though, please note, I AM NOT advocating for a lack of controls or a development environment that is a free-for-all.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I disagree because people are losing sight of and the understanding of the difference between supported and supporting roles.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1.&amp;nbsp; A business is in business to make money.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2.&amp;nbsp; Q.&amp;nbsp; Does the software product or does the system administration bring in the money?&amp;nbsp; A.&amp;nbsp; Of course the software development end product&amp;nbsp;is the revenue source.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Therefore, software developers are the supported role and system administration is supporting of the software developers.&amp;nbsp; NOT the other way around.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now, if a software developer is loading malware on the system, they should be taken out back and flogged.&amp;nbsp; Especially doing something like that in this day and age.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But that's a personnel control and not a technical one.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For the technical, that's why I provided my idea.&amp;nbsp; I'm sure there are many other ways to help the OP out.&amp;nbsp; But developers need to have the freedom to download and install stuff for prototyping and testing purposes.&amp;nbsp; Submitting baseline change requests to SAs all the time is not efficient nor a practical way of doing business.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The SAs need to have some control over the enterprise so they can manage and protect it.&amp;nbsp; That's why isolating an environment is a win-win for everyone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Mar 2018 14:33:44 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/8742#M82</guid>
      <dc:creator>mgoblue93</dc:creator>
      <dc:date>2018-03-26T14:33:44Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for privileged account on laptops</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/8744#M83</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/783078713"&gt;@Shannon&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;nbsp;virtualization would be a good solution so long as the host&lt;/P&gt;&lt;P&gt;&amp;gt; doesn't have processor vulnerabilities like Spectre &amp;amp;&lt;/P&gt;&lt;P&gt;&amp;gt; Meltdown, which allow compromise&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That's a separate issue unrelated to the original post&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The OP asked for strategies on how to keep the developers from compromising his/her network while still providing the developers the capability they say they need.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Your reply outlines a vulnerability which is taken care of by patching.&amp;nbsp; Not the differences between development and administration.&amp;nbsp; I'm sure the OP keeps his/her systems patched.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Mar 2018 14:38:49 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/8744#M83</guid>
      <dc:creator>mgoblue93</dc:creator>
      <dc:date>2018-03-26T14:38:49Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for privileged account on laptops</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/8748#M84</link>
      <description>&lt;P&gt;Actually, there is a relationship. The whole reason was to reduce the risks&amp;nbsp;of systems&amp;nbsp;impacted due to a domain account getting compromised by malware, right?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Malware can be&amp;nbsp;engineered&amp;nbsp;to exploit these vulnerabilities, and impact a system.&amp;nbsp;Both Spectre &amp;amp; Meltdown are hardware vulnerabilities, and so can't be properly patched at the system level.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No doubt&amp;nbsp;isolation is the best bet, but you may not be able to achieve this&amp;nbsp;only through virtualization (unless the hardware isn't vulnerable) in which case network isolation is also an option.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Mar 2018 14:53:37 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/8748#M84</guid>
      <dc:creator>Shannon</dc:creator>
      <dc:date>2018-03-26T14:53:37Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for privileged account on laptops</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/12747#M345</link>
      <description>&lt;P&gt;Hi Ramon,&lt;/P&gt;&lt;P&gt;You're even more generous than I would be!&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The code development should be done in a separate test and development network that's segregated from your production network.&amp;nbsp; The engineers and developers can RDP to the dev network and do whatever they want there to their heart's content.&amp;nbsp;&lt;/P&gt;&lt;P&gt;In prod network, all the techies (the engineers, developers, even system admins) should use a standard account with no special privileges, including no ability to install software other than what your company has already whitelisted, for all their daily activity like emails, writing documents, so forth.&amp;nbsp; Those with a need for elevated privileges should have a separate privileged account with privileges appropriate for their responsibilities.&amp;nbsp; Highly privileged accounts (domain admins, root) should be secured in some way, such as a privileged account management system like CyberArk or Balabit, or use of split passwords for 4-eye checks.&lt;/P&gt;&lt;P&gt;Any engineers who object should attend security awareness training.&lt;/P&gt;&lt;P&gt;My recommendation is to stand tough - and if you need to, get senior management to stand tough along side you - and tell the engineers the wild west days are over.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jul 2018 14:30:23 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/12747#M345</guid>
      <dc:creator>DanPeterson</dc:creator>
      <dc:date>2018-07-24T14:30:23Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for privileged account on laptops</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/12797#M346</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1448846979"&gt;@DanPeterson&lt;/a&gt;&amp;nbsp;nailed it.&amp;nbsp; In addition all auth should be multifactor.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All production admin accounts should be virtual and and those virtual sessions should be blown away DAILY.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dev teams have no business in prod.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Laptops should be eliminated as they are risks.&amp;nbsp; Every developer should have a dumb terminal.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jul 2018 17:14:52 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/12797#M346</guid>
      <dc:creator>Flyslinger2</dc:creator>
      <dc:date>2018-07-25T17:14:52Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for privileged account on laptops</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/12800#M347</link>
      <description>&lt;P&gt;This &lt;A href="https://www.beyondtrust.com/blog/privilege-management-development-teams/" target="_self"&gt;webinar from Beyond Trust specific to Privileged Accounts for Developers&lt;/A&gt; may be of interest to you. They are generally pretty good at starting those with problem analysis, general solutions and only then moving to the promotion of their own products addressing the problem:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jul 2018 17:20:33 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/12800#M347</guid>
      <dc:creator>vt100</dc:creator>
      <dc:date>2018-07-25T17:20:33Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for privileged account on laptops</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/16687#M663</link>
      <description>&lt;P&gt;Hi Ramon,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I understand correct,you want to&amp;nbsp;both least privilege and productivity on employee laptops. CyberArk EPM can easily fit your needs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here comes short brief for EPM, if you want to get more details, please let me know.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;CyberArk Endpoint Privilege Manager helps remove the barriers to enforcing least privilege and allows&lt;BR /&gt;organizations to block and contain attacks at the endpoint, reducing the risk of information being stolen or&lt;BR /&gt;encrypted and held for ransom. A combination of privilege management, application control and targeted&lt;BR /&gt;credential theft protection stops and contains damaging attacks at the endpoint of entry. Unknown&lt;BR /&gt;applications run in a restricted mode to contain threats and credential theft protection blocks credential&lt;BR /&gt;theft attempts. These critical protection technologies are deployed as a single agent to strengthen and&lt;BR /&gt;harden all desktops, laptops and servers.&lt;BR /&gt;CyberArk Endpoint Privilege Manager also enables security teams to enforce granular least privilege&lt;BR /&gt;policies for IT administrators, helping organizations effectively segregate duties on Windows servers.&lt;BR /&gt;Complementing these privilege controls, the solution also delivers application controls designed to manage&lt;BR /&gt;and control which applications are permitted to run on endpoints and servers&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Sam Lu,&amp;nbsp; CISSP, CISM, CISA, CCIE#9892&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Email: &lt;A href="mailto:sam.lu@cyberark.com" target="_blank"&gt;sam.lu@cyberark.com&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Nov 2018 01:09:36 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/16687#M663</guid>
      <dc:creator>metasploit</dc:creator>
      <dc:date>2018-11-28T01:09:36Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for privileged account on laptops</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/16688#M664</link>
      <description>Hi Sam, Thanks for your answer, I've downloaded the spec sheet just now. Will definitely look into this.&lt;BR /&gt;&lt;BR /&gt;Ramon</description>
      <pubDate>Wed, 28 Nov 2018 06:52:29 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/16688#M664</guid>
      <dc:creator>Ramon</dc:creator>
      <dc:date>2018-11-28T06:52:29Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for privileged account on laptops</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/16689#M665</link>
      <description>&lt;P&gt;Good, drop me email if you need more help.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Nov 2018 07:10:18 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Best-Practices-for-privileged-account-on-laptops/m-p/16689#M665</guid>
      <dc:creator>metasploit</dc:creator>
      <dc:date>2018-11-28T07:10:18Z</dc:date>
    </item>
  </channel>
</rss>

