←back to thread

341 points hlandau | 4 comments | | HN request time: 0.824s | source
Show context
abigail95 ◴[] No.37962300[source]
> What would a perfect attacker do?

If you had physical access to the computer, some sort of bus interception to exfiltrate data from the machine.

replies(2): >>37962373 #>>37963714 #
whalesalad ◴[] No.37962373[source]
extremely difficult to get physical access in a datacenter
replies(5): >>37962416 #>>37962421 #>>37962655 #>>37963217 #>>37963509 #
1. jacquesm ◴[] No.37963217[source]
All the people working in the datacenter have that level of physical access.

Unless they are very closely supervised they can do a lot of damage without anybody being the wiser until they get caught. I've been in (nominally very secure) DCs on behalf of customers and I've seen:

- unlocked racks

- doors open

- temporary network cables and keyboards, monitors and mice attached to running systems

- systems logged in left unattended

- floor panels raised up and left open unattended exposing cabling

- meet-me rooms with interfaces exposed (gear in racks without doors)

DC personnel tends to trust each other, and they probably shouldn't. But it's hard to be part of a closely knit crew for a long time without getting into a 'get stuff done' mode where protocol and rules are there in principle but less so in practice because it is seen as an efficiency penalty. It's another instance of the 'normalization of deviation' phenomenon.

replies(1): >>37963645 #
2. manxman ◴[] No.37963645[source]
Agree re: everything you said but wanted to add datadentre security staff are some of the most interesting characters I’ve encountered. Not sure I sleep as well at night after seeing what I saw.
replies(1): >>37964756 #
3. OmarAssadi ◴[] No.37964756[source]
Do tell, please; stories about "interesting characters" are often the best.
replies(1): >>37971886 #
4. jacquesm ◴[] No.37971886{3}[source]
GP may well be under NDA and easy to identify.