• Grandwolf319@sh.itjust.works
    link
    fedilink
    arrow-up
    85
    arrow-down
    3
    ·
    edit-2
    1 month ago

    In my experience it’s been IT people telling me you can’t use a certain tool or have more control over your computer cause of their rules.

    The expression is appropriate but the meme assumes that im doubting the IT person’s expertise. I’m not, I’m just not liking the rules that get in the way of my work. Some rules do make sense though.

    Edit: just wanted to point out, yes I agree, you need the rules, they are still annoying tho.

      • Ethan@programming.dev
        link
        fedilink
        English
        arrow-up
        5
        arrow-down
        1
        ·
        1 month ago

        Their rules have stopped me from being able to do my job. Like the time the AV software quarantined executables as I was creating them so I literally could not run my code. When security enforcement prevents me from working, something needs to change.

    • BilliamBoberts@lemmy.world
      link
      fedilink
      arrow-up
      11
      ·
      1 month ago

      As an IT guy, I’d love to give software devs full admin rights to their computer to troubleshoot and install anything as they see fit, it would save me a lot of time out of my day. But I can’t trust everyone in the organization not to click suspicious links or open obvious phishing emails that invite ransomware into the organization that can sink a company overnight.

      • Grandwolf319@sh.itjust.works
        link
        fedilink
        arrow-up
        8
        ·
        1 month ago

        Fair points but as someone who works in cybersecurity. Phishing emails can happen without admin access. I haven’t heard of any randsomware that is triggered by just clicking on a link.

        I think there should be some restrictions but highly technical people should slowly be given more and more control as they gain more trust/experience.

        • lud@lemm.ee
          link
          fedilink
          arrow-up
          4
          ·
          1 month ago

          Of course but the impact could be much worse if the victim is admin on their computer.

          • BilliamBoberts@lemmy.world
            link
            fedilink
            arrow-up
            4
            ·
            1 month ago

            Exactly this. we try to prevent cyberattacks as much as we can, but at a certain point, they’re impossible to perfectly defend against without also totally locking down our users and making it impossible for them to do their jobs. so then the game becomes one of containing the amount of damage an attack can do.

            Security is restriction. our job is to balance our users’ ability to perform their jobs with acceptable levels of risk.

        • Omniraptor@lemm.ee
          link
          fedilink
          arrow-up
          1
          ·
          edit-2
          1 month ago

          Not a security guy but I heard there’s a whole term for it, “one-click attacks”

    • BeigeAgenda@lemmy.ca
      link
      fedilink
      arrow-up
      10
      ·
      1 month ago

      And the more corporate the organisation the more rules, at least the places I have worked trusts developers enough to give local admin, that takes the edge off many tasks.

    • biscuitswalrus@aussie.zone
      link
      fedilink
      arrow-up
      12
      arrow-down
      4
      ·
      1 month ago

      I think you probably don’t realise you hate standards and certifications. No IT person wants yet another system generating more calls and complexity. but here is iso, or a cyber insurance policy, or NIST, or acsc asking minimums with checklists and a cyber review answering them with controls.

      Crazy that there’s so little understanding about why it’s there, that you just think it’s the “IT guy” wanting those.

      • Grandwolf319@sh.itjust.works
        link
        fedilink
        arrow-up
        18
        ·
        1 month ago

        I thought my comment was pretty clear that some rules are justified and that the IT person can just be the bearer of bad news.

        Maybe not, hopefully this comment clarifies.

      • tastysnacks@programming.dev
        link
        fedilink
        arrow-up
        10
        arrow-down
        3
        ·
        1 month ago

        So you don’t trust me, but you trust McAfee to give it full control over the system. Yet my software doesn’t work because something is blocked and nothing is showing up in the logs. But when we take off Mafee, it works. So clearly McAfee is not logging everything. And you trust Mcafee but not me? /s kinda.

        • mosiacmango@lemm.ee
          link
          fedilink
          arrow-up
          5
          arrow-down
          4
          ·
          edit-2
          1 month ago

          No one on earth trusts McAfee, be it the abysmal man or abysmal AV suite.

          If the EDR or AV software is causing issues with your code running, it’s possibly an issue with the suite, but it’s more likely an issue with your code not following common sense security requirements like code signing.

            • mosiacmango@lemm.ee
              link
              fedilink
              arrow-up
              2
              arrow-down
              2
              ·
              1 month ago

              It’s not common, but it should be.

              Still, that was just one example. EDR reacting to your code is likely a sign of some other shortcut being taken during the development process. It might even be a reasonable one, but if so it needs to be discussed and accounted for with the IT security team.

              • tyler@programming.dev
                link
                fedilink
                arrow-up
                1
                ·
                1 month ago

                You’re talking about during CI. Not during the actual coding process. You’re not signing code while you’re debugging.

      • Laser@feddit.org
        link
        fedilink
        arrow-up
        4
        ·
        edit-2
        1 month ago

        I worked in software certification under Common Criteria, and while I do know that it creates a lot of work, there were cases where security has been improved measurably - in the hardware department, it even happened that a developer / manufacturer had a breach that affected almost the whole company really badly (design files etc stolen by a probably state sponsored attacker), but not the CC certified part because the attackers used a vector of attack that was caught there and rectified.

        It seemingly was not fixed everywhere for whatever reason… but it’s not that CC certification is just some academic exercise that gives you nothing but a lot of work.

        Is it the right approach for every product? Probably not because of the huge overhead power certified version. But for important pillars of a security model, it makes sense in my opinion.

        Though it needs to be said that the scheme under which I certified is very thorough and strict, so YMMV.

    • 4am@lemm.ee
      link
      fedilink
      arrow-up
      3
      ·
      1 month ago

      I think the meme is more about perspectives and listening to the way someone thinks about operating IT is very different from the way someone things about architecting IT