[Info-vax] OpenVMS x64 Atom project
Bill Gunshannon
bill.gunshannon at gmail.com
Fri Jun 4 18:31:26 EDT 2021
On 6/4/21 5:23 PM, Dave Froble wrote:
> On 6/4/2021 2:11 PM, Bill Gunshannon wrote:
>> On 6/4/21 2:02 PM, Dave Froble wrote:
>>> On 6/4/2021 1:49 PM, Simon Clubley wrote:
>>>> On 2021-06-03, Bill Gunshannon <bill.gunshannon at gmail.com> wrote:
>>>>>
>>>>> My backup scheme would have allowed me to resume operations with no
>>>>> more than a 4 hour loss of data. I did that with no additional budet
>>>>> and running strictly COTS.)
>>>>>
>>>>
>>>> What about the data they managed to take a copy of before installing
>>>> malware on your systems ?
>>>
>>> He didn't think of that, huh?
>>
>> Of course I did. Never happened.
>>
>>>
>>> Anybody that stores important data on an internet facing system is
>>> just asking for it to be "shared".
>>
>> In an academic environment systems facing the Internet are a way
>> of life. They can be seucred as can the whole environment. But
>> that doesn't change the fact that systems not needing to face the
>> Internet shouldn't. And things like SCADA systems controlling
>> things like gas pipelines, water systems or electrical grids fall
>> into that category.
>>
>>>
>>> Nobody is paranoid enough.
>>>
>>
>> Paranoia doesn't secure systems or networks. Only diligence can
>> do that.
>>
>> bill
>
> But first one must be paranoid enough to know the systems need to be
> secured.
>
Paranoia doesn't come into play at all. Proper RISK Management.
Proper diligence. Competence in one's field. There have been
dozens of guides published for decades no to protect systems.
DISA STIGs
NIST Security White Papers
SANS Guidelines
Sadly, too many administrators ignore them or think they will
restrict access for regular users too much. You know, there
was a time when even VMS had a DISA STIG. I expect one of
the reasons they dropped it instead of updating it was that
no one administering a system in DISA's domain ever grabbed
a copy.
bill
More information about the Info-vax
mailing list