[ale] Write permission

Jim Kinney jim.kinney at gmail.com
Wed May 25 17:57:09 EDT 2016


Auditd apparently is a total mystery to the people who want to ENFORCE
SECURITY. They are convinced the REAL SECURITY comes with a very large
price tag and a new process that MUST BE VETTED FOR ACCURACY.

I can't _wait_ to hand them a log file from auditd along with an
explanation of what it means.
On May 25, 2016 5:51 PM, "Vernard Martin" <vernard at gmail.com> wrote:

> On 5/16/2016 6:18 PM, Jim Kinney wrote:
>
>>
>> Happily, this isn't DoD. Just HIPPA. Must strike a balance between
>> absolute security (standalone system with no networking in a room with
>> armed guards will to shoot on site) and usability (woo! Free-for-all and
>> everyone has root - NOT ON MY WATCH!).
>>
>>> Either you need security or you don't.
>>>
>>
>> Need security that prevents accidental relocation and makes deliberate
>> abuse difficult but most importantly, traceable back to the now
>> expelled/fired idiot.
>>
> Auditd can be configured to give you enough info to trace who/what is
> going on. Add sudo logs to that and you can probably track an offender
> quite fast.
>
> Or you can use the crappy EASH package that does all this and is absurdly
> old and not supported by the developer anymore. But it *does* work.
>
> V
>
> _______________________________________________
> Ale mailing list
> Ale at ale.org
> http://mail.ale.org/mailman/listinfo/ale
> See JOBS, ANNOUNCE and SCHOOLS lists at
> http://mail.ale.org/mailman/listinfo
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.ale.org/pipermail/ale/attachments/20160525/f6527133/attachment.html>


More information about the Ale mailing list