logoalt Hacker News

charcircuitlast Saturday at 1:28 AM5 repliesview on HN

The root account shouldn't exist either. Having god accounts is a bad idea security wise. Instead everything should follow the principle of least privilege.


Replies

jandreselast Saturday at 1:53 AM

The problem is how do you set up those permissions without a god object? How do you fix ones that are broken on a running system?

Ultimately the security systems that introduce high complexity in the name of fine grain permission controls end up being the most fragile and hardest to verify. People get stuff wrong then break it further trying to get their job done. The better system is sometimes the one that doesn’t have all of the features but is comprehensible to humans.

show 1 reply
Elucalidavahlast Saturday at 5:28 AM

If you have a privilege to replace the kernel or bootloader, you effectively have all privileges on that system. Therefore, there's no need to complicate the access limitations when you get full access anyway.

nkrisclast Saturday at 1:47 AM

I own the computer. The least privilege I have encompasses every privilege.

show 1 reply
essephlast Saturday at 2:41 AM

You should read over NIST 800-53 AC-2 and AC-6. They go over why privileged accounts are important, why they are used, and how they protect users and organizations.

JIT access should be the goal.

Scroll down to: Implementation Guidance

https://csf.tools/reference/cloud-controls-matrix/v4-0/iam/i...

show 1 reply
cyberaxlast Saturday at 1:42 AM

This sounds good in theory, but in practice it doesn't work. You always end up with an object that has all the privileges.