Are the posted questions getting worse?

  • Is it me, or is it at least once a week minimum someone posts a "How do I keep the DBA / Sysadmin from doing / viewing certain things" type question?

  • jasona.work (2/12/2015)


    Is it me, or is it at least once a week minimum someone posts a "How do I keep the DBA / Sysadmin from doing / viewing certain things" type question?

    Where is it this time?

    And my answer to that question: Pink Slip.

    Brandie Tarvin, MCITP Database AdministratorLiveJournal Blog: http://brandietarvin.livejournal.com/[/url]On LinkedIn!, Google+, and Twitter.Freelance Writer: ShadowrunLatchkeys: Nevermore, Latchkeys: The Bootleg War, and Latchkeys: Roscoes in the Night are now available on Nook and Kindle.

  • Brandie Tarvin (2/12/2015)


    jasona.work (2/12/2015)


    Is it me, or is it at least once a week minimum someone posts a "How do I keep the DBA / Sysadmin from doing / viewing certain things" type question?

    Where is it this time?

    And my answer to that question: Pink Slip.

    Gail already took care of it, told the poster that to keep the DBA from viewing certain data, they'd need to encrypt said data.

  • jasona.work (2/12/2015)


    Brandie Tarvin (2/12/2015)


    jasona.work (2/12/2015)


    Is it me, or is it at least once a week minimum someone posts a "How do I keep the DBA / Sysadmin from doing / viewing certain things" type question?

    Where is it this time?

    And my answer to that question: Pink Slip.

    Gail already took care of it, told the poster that to keep the DBA from viewing certain data, they'd need to encrypt said data.

    It actually is a valid question given the amount of identity and data theft we've seen over the past decade. Especially from the disgrunted / greedy employee circuit. Somebody has to be Sysadmin, but that doesn't necessitate them being able to see bank records or tax IDs (etc.).

    Brandie Tarvin, MCITP Database AdministratorLiveJournal Blog: http://brandietarvin.livejournal.com/[/url]On LinkedIn!, Google+, and Twitter.Freelance Writer: ShadowrunLatchkeys: Nevermore, Latchkeys: The Bootleg War, and Latchkeys: Roscoes in the Night are now available on Nook and Kindle.

  • Brandie Tarvin (2/12/2015)


    jasona.work (2/12/2015)


    Brandie Tarvin (2/12/2015)


    jasona.work (2/12/2015)


    Is it me, or is it at least once a week minimum someone posts a "How do I keep the DBA / Sysadmin from doing / viewing certain things" type question?

    Where is it this time?

    And my answer to that question: Pink Slip.

    Gail already took care of it, told the poster that to keep the DBA from viewing certain data, they'd need to encrypt said data.

    It actually is a valid question given the amount of identity and data theft we've seen over the past decade. Especially from the disgrunted / greedy employee circuit. Somebody has to be Sysadmin, but that doesn't necessitate them being able to see bank records or tax IDs (etc.).

    My 2Cents, a DBA that cannot see the data is as useless as a blind driver, alternative measures have to be in place such as

    1) pay them well enough

    2) keep them happy

    3) audit everything

    4) bullet proof NDAs

    ...etc....

    Obviously it goes without saying that the sensitive data must be encrypted/protected as necessary. Insider threats (such as DBAs) cannot be mitigated with a technology only approach.

    😎

  • Eirikur Eiriksson (2/12/2015)


    Brandie Tarvin (2/12/2015)


    jasona.work (2/12/2015)


    Brandie Tarvin (2/12/2015)


    jasona.work (2/12/2015)


    Is it me, or is it at least once a week minimum someone posts a "How do I keep the DBA / Sysadmin from doing / viewing certain things" type question?

    Where is it this time?

    And my answer to that question: Pink Slip.

    Gail already took care of it, told the poster that to keep the DBA from viewing certain data, they'd need to encrypt said data.

    It actually is a valid question given the amount of identity and data theft we've seen over the past decade. Especially from the disgrunted / greedy employee circuit. Somebody has to be Sysadmin, but that doesn't necessitate them being able to see bank records or tax IDs (etc.).

    My 2Cents, a DBA that cannot see the data is as useless as a blind driver, alternative measures have to be in place such as

    1) pay them well enough

    2) keep them happy

    3) audit everything

    4) bullet proof NDAs

    ...etc....

    Obviously it goes without saying that the sensitive data must be encrypted/protected as necessary. Insider threats (such as DBAs) cannot be mitigated with a technology only approach.

    😎

    Last time I went to a security lecture, the recommendation was that the DBA should not be able to see any data except in an emergency. During said emergency a separate computer would be used by a minimum of 2 DBAs at a time, each of whom was entrusted with half the password. The password is randomly created at each use.

    The dedicated machine is keystroke audited (along with other auditing).

    --------------------------------------
    When you encounter a problem, if the solution isn't readily evident go back to the start and check your assumptions.
    --------------------------------------
    It’s unpleasantly like being drunk.
    What’s so unpleasant about being drunk?
    You ask a glass of water. -- Douglas Adams

  • Sioban Krzywicki (2/12/2015)


    Eirikur Eiriksson (2/12/2015)


    Brandie Tarvin (2/12/2015)


    jasona.work (2/12/2015)


    Brandie Tarvin (2/12/2015)


    jasona.work (2/12/2015)


    Is it me, or is it at least once a week minimum someone posts a "How do I keep the DBA / Sysadmin from doing / viewing certain things" type question?

    Where is it this time?

    And my answer to that question: Pink Slip.

    Gail already took care of it, told the poster that to keep the DBA from viewing certain data, they'd need to encrypt said data.

    It actually is a valid question given the amount of identity and data theft we've seen over the past decade. Especially from the disgrunted / greedy employee circuit. Somebody has to be Sysadmin, but that doesn't necessitate them being able to see bank records or tax IDs (etc.).

    My 2Cents, a DBA that cannot see the data is as useless as a blind driver, alternative measures have to be in place such as

    1) pay them well enough

    2) keep them happy

    3) audit everything

    4) bullet proof NDAs

    ...etc....

    Obviously it goes without saying that the sensitive data must be encrypted/protected as necessary. Insider threats (such as DBAs) cannot be mitigated with a technology only approach.

    😎

    Last time I went to a security lecture, the recommendation was that the DBA should not be able to see any data except in an emergency. During said emergency a separate computer would be used by a minimum of 2 DBAs at a time, each of whom was entrusted with half the password. The password is randomly created at each use.

    The dedicated machine is keystroke audited (along with other auditing).

    That seems like an awful lot of pain and is riddled with holes, such as who would set the password to begin with.

    Wouldn't it be easier to find a DBA that's trustworthy and implement Erikur's list above.

  • Ed Wagner (2/12/2015)


    Sioban Krzywicki (2/12/2015)


    Eirikur Eiriksson (2/12/2015)


    Brandie Tarvin (2/12/2015)


    jasona.work (2/12/2015)


    Brandie Tarvin (2/12/2015)


    jasona.work (2/12/2015)


    Is it me, or is it at least once a week minimum someone posts a "How do I keep the DBA / Sysadmin from doing / viewing certain things" type question?

    Where is it this time?

    And my answer to that question: Pink Slip.

    Gail already took care of it, told the poster that to keep the DBA from viewing certain data, they'd need to encrypt said data.

    It actually is a valid question given the amount of identity and data theft we've seen over the past decade. Especially from the disgrunted / greedy employee circuit. Somebody has to be Sysadmin, but that doesn't necessitate them being able to see bank records or tax IDs (etc.).

    My 2Cents, a DBA that cannot see the data is as useless as a blind driver, alternative measures have to be in place such as

    1) pay them well enough

    2) keep them happy

    3) audit everything

    4) bullet proof NDAs

    ...etc....

    Obviously it goes without saying that the sensitive data must be encrypted/protected as necessary. Insider threats (such as DBAs) cannot be mitigated with a technology only approach.

    😎

    Last time I went to a security lecture, the recommendation was that the DBA should not be able to see any data except in an emergency. During said emergency a separate computer would be used by a minimum of 2 DBAs at a time, each of whom was entrusted with half the password. The password is randomly created at each use.

    The dedicated machine is keystroke audited (along with other auditing).

    That seems like an awful lot of pain and is riddled with holes, such as who would set the password to begin with.

    Wouldn't it be easier to find a DBA that's trustworthy and implement Erikur's list above.

    It is also hard it you only have one DBA.:-)

  • djj (2/12/2015)


    Ed Wagner (2/12/2015)


    Sioban Krzywicki (2/12/2015)


    Eirikur Eiriksson (2/12/2015)


    Brandie Tarvin (2/12/2015)


    jasona.work (2/12/2015)


    Brandie Tarvin (2/12/2015)


    jasona.work (2/12/2015)


    Is it me, or is it at least once a week minimum someone posts a "How do I keep the DBA / Sysadmin from doing / viewing certain things" type question?

    Where is it this time?

    And my answer to that question: Pink Slip.

    Gail already took care of it, told the poster that to keep the DBA from viewing certain data, they'd need to encrypt said data.

    It actually is a valid question given the amount of identity and data theft we've seen over the past decade. Especially from the disgrunted / greedy employee circuit. Somebody has to be Sysadmin, but that doesn't necessitate them being able to see bank records or tax IDs (etc.).

    My 2Cents, a DBA that cannot see the data is as useless as a blind driver, alternative measures have to be in place such as

    1) pay them well enough

    2) keep them happy

    3) audit everything

    4) bullet proof NDAs

    ...etc....

    Obviously it goes without saying that the sensitive data must be encrypted/protected as necessary. Insider threats (such as DBAs) cannot be mitigated with a technology only approach.

    😎

    Last time I went to a security lecture, the recommendation was that the DBA should not be able to see any data except in an emergency. During said emergency a separate computer would be used by a minimum of 2 DBAs at a time, each of whom was entrusted with half the password. The password is randomly created at each use.

    The dedicated machine is keystroke audited (along with other auditing).

    That seems like an awful lot of pain and is riddled with holes, such as who would set the password to begin with.

    Wouldn't it be easier to find a DBA that's trustworthy and implement Erikur's list above.

    It is also hard it you only have one DBA.:-)

    Just cut him in half :hehe:

    Luis C.
    General Disclaimer:
    Are you seriously taking the advice and code from someone from the internet without testing it? Do you at least understand it? Or can it easily kill your server?

    How to post data/code on a forum to get the best help: Option 1 / Option 2
  • Ed Wagner (2/12/2015)


    Sioban Krzywicki (2/12/2015)


    Eirikur Eiriksson (2/12/2015)


    Brandie Tarvin (2/12/2015)


    jasona.work (2/12/2015)


    Brandie Tarvin (2/12/2015)


    jasona.work (2/12/2015)


    Is it me, or is it at least once a week minimum someone posts a "How do I keep the DBA / Sysadmin from doing / viewing certain things" type question?

    Where is it this time?

    And my answer to that question: Pink Slip.

    Gail already took care of it, told the poster that to keep the DBA from viewing certain data, they'd need to encrypt said data.

    It actually is a valid question given the amount of identity and data theft we've seen over the past decade. Especially from the disgrunted / greedy employee circuit. Somebody has to be Sysadmin, but that doesn't necessitate them being able to see bank records or tax IDs (etc.).

    My 2Cents, a DBA that cannot see the data is as useless as a blind driver, alternative measures have to be in place such as

    1) pay them well enough

    2) keep them happy

    3) audit everything

    4) bullet proof NDAs

    ...etc....

    Obviously it goes without saying that the sensitive data must be encrypted/protected as necessary. Insider threats (such as DBAs) cannot be mitigated with a technology only approach.

    😎

    Last time I went to a security lecture, the recommendation was that the DBA should not be able to see any data except in an emergency. During said emergency a separate computer would be used by a minimum of 2 DBAs at a time, each of whom was entrusted with half the password. The password is randomly created at each use.

    The dedicated machine is keystroke audited (along with other auditing).

    That seems like an awful lot of pain and is riddled with holes, such as who would set the password to begin with.

    Wouldn't it be easier to find a DBA that's trustworthy and implement Erikur's list above.

    Password is software generated, IIRC

    It is hard enough to find a DBA that knows what they're doing, now you want trustworthy too? : -)

    Seriously though, that's really hard to know from an interview.

    I laughed through most of the presentation because it required so many more resources than ANY place I'd ever worked had. Not least of which: time.

    I kept thinking "Yep, that sure would be secure. Good luck finding more than a handful of companies that can/would do this."

    --------------------------------------
    When you encounter a problem, if the solution isn't readily evident go back to the start and check your assumptions.
    --------------------------------------
    It’s unpleasantly like being drunk.
    What’s so unpleasant about being drunk?
    You ask a glass of water. -- Douglas Adams

  • Sioban Krzywicki (2/12/2015)


    Ed Wagner (2/12/2015)


    Sioban Krzywicki (2/12/2015)


    Eirikur Eiriksson (2/12/2015)


    Brandie Tarvin (2/12/2015)


    jasona.work (2/12/2015)


    Brandie Tarvin (2/12/2015)


    jasona.work (2/12/2015)


    Is it me, or is it at least once a week minimum someone posts a "How do I keep the DBA / Sysadmin from doing / viewing certain things" type question?

    Where is it this time?

    And my answer to that question: Pink Slip.

    Gail already took care of it, told the poster that to keep the DBA from viewing certain data, they'd need to encrypt said data.

    It actually is a valid question given the amount of identity and data theft we've seen over the past decade. Especially from the disgrunted / greedy employee circuit. Somebody has to be Sysadmin, but that doesn't necessitate them being able to see bank records or tax IDs (etc.).

    My 2Cents, a DBA that cannot see the data is as useless as a blind driver, alternative measures have to be in place such as

    1) pay them well enough

    2) keep them happy

    3) audit everything

    4) bullet proof NDAs

    ...etc....

    Obviously it goes without saying that the sensitive data must be encrypted/protected as necessary. Insider threats (such as DBAs) cannot be mitigated with a technology only approach.

    😎

    Last time I went to a security lecture, the recommendation was that the DBA should not be able to see any data except in an emergency. During said emergency a separate computer would be used by a minimum of 2 DBAs at a time, each of whom was entrusted with half the password. The password is randomly created at each use.

    The dedicated machine is keystroke audited (along with other auditing).

    That seems like an awful lot of pain and is riddled with holes, such as who would set the password to begin with.

    Wouldn't it be easier to find a DBA that's trustworthy and implement Erikur's list above.

    Password is software generated, IIRC

    It is hard enough to find a DBA that knows what they're doing, now you want trustworthy too? : -)

    Seriously though, that's really hard to know from an interview.

    I laughed through most of the presentation because it required so many more resources than ANY place I'd ever worked had. Not least of which: time.

    I kept thinking "Yep, that sure would be secure. Good luck finding more than a handful of companies that can/would do this."

    I recognize what you are saying and agree to the extent of WYPIWYG or What You Pay Is What You Get. There are known methods of separating the grain from the husks, applicable for DBAa too.

    😎

  • Luis Cazares (2/12/2015)


    djj (2/12/2015)


    Ed Wagner (2/12/2015)


    Sioban Krzywicki (2/12/2015)


    Eirikur Eiriksson (2/12/2015)


    Brandie Tarvin (2/12/2015)


    jasona.work (2/12/2015)


    Brandie Tarvin (2/12/2015)


    jasona.work (2/12/2015)


    Is it me, or is it at least once a week minimum someone posts a "How do I keep the DBA / Sysadmin from doing / viewing certain things" type question?

    Where is it this time?

    And my answer to that question: Pink Slip.

    Gail already took care of it, told the poster that to keep the DBA from viewing certain data, they'd need to encrypt said data.

    It actually is a valid question given the amount of identity and data theft we've seen over the past decade. Especially from the disgrunted / greedy employee circuit. Somebody has to be Sysadmin, but that doesn't necessitate them being able to see bank records or tax IDs (etc.).

    My 2Cents, a DBA that cannot see the data is as useless as a blind driver, alternative measures have to be in place such as

    1) pay them well enough

    2) keep them happy

    3) audit everything

    4) bullet proof NDAs

    ...etc....

    Obviously it goes without saying that the sensitive data must be encrypted/protected as necessary. Insider threats (such as DBAs) cannot be mitigated with a technology only approach.

    😎

    Last time I went to a security lecture, the recommendation was that the DBA should not be able to see any data except in an emergency. During said emergency a separate computer would be used by a minimum of 2 DBAs at a time, each of whom was entrusted with half the password. The password is randomly created at each use.

    The dedicated machine is keystroke audited (along with other auditing).

    That seems like an awful lot of pain and is riddled with holes, such as who would set the password to begin with.

    Wouldn't it be easier to find a DBA that's trustworthy and implement Erikur's list above.

    It is also hard it you only have one DBA.:-)

    Just cut him in half :hehe:

    Mitad DataBase Administrator or DataBase Mitad Administrator, how would you put it?:w00t:

    😎

  • Sioban Krzywicki (2/12/2015)


    Ed Wagner (2/12/2015)


    Sioban Krzywicki (2/12/2015)


    Eirikur Eiriksson (2/12/2015)


    Brandie Tarvin (2/12/2015)


    jasona.work (2/12/2015)


    Brandie Tarvin (2/12/2015)


    jasona.work (2/12/2015)


    Is it me, or is it at least once a week minimum someone posts a "How do I keep the DBA / Sysadmin from doing / viewing certain things" type question?

    Where is it this time?

    And my answer to that question: Pink Slip.

    Gail already took care of it, told the poster that to keep the DBA from viewing certain data, they'd need to encrypt said data.

    It actually is a valid question given the amount of identity and data theft we've seen over the past decade. Especially from the disgrunted / greedy employee circuit. Somebody has to be Sysadmin, but that doesn't necessitate them being able to see bank records or tax IDs (etc.).

    My 2Cents, a DBA that cannot see the data is as useless as a blind driver, alternative measures have to be in place such as

    1) pay them well enough

    2) keep them happy

    3) audit everything

    4) bullet proof NDAs

    ...etc....

    Obviously it goes without saying that the sensitive data must be encrypted/protected as necessary. Insider threats (such as DBAs) cannot be mitigated with a technology only approach.

    😎

    Last time I went to a security lecture, the recommendation was that the DBA should not be able to see any data except in an emergency. During said emergency a separate computer would be used by a minimum of 2 DBAs at a time, each of whom was entrusted with half the password. The password is randomly created at each use.

    The dedicated machine is keystroke audited (along with other auditing).

    That seems like an awful lot of pain and is riddled with holes, such as who would set the password to begin with.

    Wouldn't it be easier to find a DBA that's trustworthy and implement Erikur's list above.

    Password is software generated, IIRC

    It is hard enough to find a DBA that knows what they're doing, now you want ...

    I'd complete that sentence with "to find two DBAs to do the job of one."

    I can almost see a randomly generated password reset after each use. But with two people, somebody still has to split that password in two to hand to the dbas. I would assume it is not always the same two dbas to do the work. Or that it is not always the same half of the password each person gets.

    I can also see the use of a keylogger.

    But seriously, vet the DBA, implement encryption where necessary, audit the database and security, and put a keylogger on it if you must.

    But in the end, you still need to trust the DBA to do the job. If you can't trust your DBA, then why trust the CTO, CIO, CEO or board for that matter?

    If you find the DBA can't be trusted, fire that person.

    Jason...AKA CirqueDeSQLeil
    _______________________________________________
    I have given a name to my pain...MCM SQL Server, MVP
    SQL RNNR
    Posting Performance Based Questions - Gail Shaw[/url]
    Learn Extended Events

  • ... Mark one off, 15 days on the calendar to go. 15 days on the calendar to go, 15 days to go, ...

  • SQLRNNR (2/12/2015)


    Sioban Krzywicki (2/12/2015)


    Ed Wagner (2/12/2015)


    Sioban Krzywicki (2/12/2015)


    Eirikur Eiriksson (2/12/2015)


    Brandie Tarvin (2/12/2015)


    jasona.work (2/12/2015)


    Brandie Tarvin (2/12/2015)


    jasona.work (2/12/2015)


    Is it me, or is it at least once a week minimum someone posts a "How do I keep the DBA / Sysadmin from doing / viewing certain things" type question?

    Where is it this time?

    And my answer to that question: Pink Slip.

    Gail already took care of it, told the poster that to keep the DBA from viewing certain data, they'd need to encrypt said data.

    It actually is a valid question given the amount of identity and data theft we've seen over the past decade. Especially from the disgrunted / greedy employee circuit. Somebody has to be Sysadmin, but that doesn't necessitate them being able to see bank records or tax IDs (etc.).

    My 2Cents, a DBA that cannot see the data is as useless as a blind driver, alternative measures have to be in place such as

    1) pay them well enough

    2) keep them happy

    3) audit everything

    4) bullet proof NDAs

    ...etc....

    Obviously it goes without saying that the sensitive data must be encrypted/protected as necessary. Insider threats (such as DBAs) cannot be mitigated with a technology only approach.

    😎

    Last time I went to a security lecture, the recommendation was that the DBA should not be able to see any data except in an emergency. During said emergency a separate computer would be used by a minimum of 2 DBAs at a time, each of whom was entrusted with half the password. The password is randomly created at each use.

    The dedicated machine is keystroke audited (along with other auditing).

    That seems like an awful lot of pain and is riddled with holes, such as who would set the password to begin with.

    Wouldn't it be easier to find a DBA that's trustworthy and implement Erikur's list above.

    Password is software generated, IIRC

    It is hard enough to find a DBA that knows what they're doing, now you want ...

    I'd complete that sentence with "to find two DBAs to do the job of one."

    I can almost see a randomly generated password reset after each use. But with two people, somebody still has to split that password in two to hand to the dbas. I would assume it is not always the same two dbas to do the work. Or that it is not always the same half of the password each person gets.

    I can also see the use of a keylogger.

    But seriously, vet the DBA, implement encryption where necessary, audit the database and security, and put a keylogger on it if you must.

    But in the end, you still need to trust the DBA to do the job. If you can't trust your DBA, then why trust the CTO, CIO, CEO or board for that matter?

    If you find the DBA can't be trusted, fire that person.

    The system also splits the password.

    You don't know you can't trust them until it is too late. And what about the trustworthy one who becomes disgruntled?

    And yes, why would you trust any of those people? I've seen so many of them run companies into the ground.

    --------------------------------------
    When you encounter a problem, if the solution isn't readily evident go back to the start and check your assumptions.
    --------------------------------------
    It’s unpleasantly like being drunk.
    What’s so unpleasant about being drunk?
    You ask a glass of water. -- Douglas Adams

Viewing 15 posts - 47,416 through 47,430 (of 66,000 total)

You must be logged in to reply to this topic. Login to reply