←back to thread

410 points gpi | 9 comments | | HN request time: 2.295s | source | bottom
1. blindriver ◴[] No.43996627[source]
There should be an ISO standard with respect to how much power and information that front line customer support agents have. The more information you need, like changing passwords or accessing personal information, should get forwarded to higher level customer support agents with better training and more monitoring. This way you can design customer support experience with as little exposure to security issues as possible.
replies(3): >>43996724 #>>43997870 #>>43997978 #
2. whyever ◴[] No.43996724[source]
They main defense against internal attacks is bookkeeping. Banks have been dealing with this for thousands of years. I recommend the corresponding chapter in Security Engineering by Ross Anderson: https://www.cl.cam.ac.uk/archive/rja14/Papers/SEv3-ch12.pdf
replies(1): >>44001414 #
3. wepple ◴[] No.43997870[source]
> better training and more monitoring.

That’s very load-bearing. It won’t help.

The CS reps are based in a LCOL country so the opportunity for theft is simply incredibly lucrative.

What is really needed, is customer-in-the-loop for access to their data. The problem is, not all accesses would make sense. Doing analytics over the data of the top 1% of customers, for example, requires some level of access, but would freak out those customers if they had to approve it.

replies(1): >>43997938 #
4. wat10000 ◴[] No.43997938[source]
If it would freak out the customers, maybe they shouldn’t be doing it.
replies(1): >>43999270 #
5. xyst ◴[] No.43997978[source]
Compartmentalization is a very expensive customer support model.
replies(1): >>43998035 #
6. caseyohara ◴[] No.43998035[source]
So are $20M ransoms and the reputational damage from data breaches.
7. wepple ◴[] No.43999270{3}[source]
That’s a nice thought, but naive.

What about, for example, a higher-tier support person performing QA over someone else’s work? What about DFIR teams doing research on potential abuse? Etc etc.

8. SoftTalker ◴[] No.44001414[source]
Bookkeeping will alert you to employees stealing your money. It won't alert you to employees selling information.
replies(1): >>44020619 #
9. whyever ◴[] No.44020619{3}[source]
Access logs do help with this. They have been successfully used by the police to identify rogue officers abusing their access to police databases.