One chestnut from my history in lottery game development:

While our security staff was incredibly tight and did a generally good job, oftentimes levels of paranoia were off the charts.

Once they went around hot gluing shut all of the “unnecessary” USB ports in our PCs under the premise of mitigating data theft via thumb drive, while ignoring that we were all Internet-connected and VPNs are a thing, also that every machine had a RW optical drive.

  • ditty@lemm.ee
    link
    fedilink
    arrow-up
    14
    arrow-down
    1
    ·
    1 year ago

    For our org, we are required to do this for our cybersecurity insurance plan

    • Natanael@slrpnk.net
      link
      fedilink
      arrow-up
      7
      ·
      1 year ago

      Tell them NIST now recommends against it so the insurance company is increasing your risks

      • Hobo@lemmy.world
        link
        fedilink
        arrow-up
        4
        ·
        1 year ago

        The guideline is abundantly clear too with little room for interpretation:

        5.1.1.1 Memorized Secret Authenticators

        Verifiers SHOULD NOT impose other composition rules (e.g., requiring mixtures of different character types or prohibiting consecutively repeated characters) for memorized secrets. Verifiers SHOULD NOT require memorized secrets to be changed arbitrarily (e.g., periodically). However, verifiers SHALL force a change if there is evidence of compromise of the authenticator.

        https://pages.nist.gov/800-63-3/sp800-63b.html