One of the most difficult decisions in any given enviroment is the distribution of trust. Who can you trust and with how much access? If you have a Systems Administrator on-site then they probably have super user access . . .
One of the most difficult decisions in any given enviroment is the distribution of trust. Who can you trust and with how much access? If you have a Systems Administrator on-site then they probably have super user access on at least one or more boxes within your enterprise. What about techs who occassionaly need to perform tasks that are beyond the range of their limited access?

The issue of trust is a difficult one. We all spend so much time focusing our energies on unknown parties trying to get into our systems that we often forget that we need to consider what those who are already inside can do.

This SunWorld article discusses some of the issues involved in dealing with internal trust decisions and what can be done to protect critical systems from internal attack.

The link for this article located at SunWorld is no longer available.