USENIX Technical Program - Abstract - 13th Systems Administration Conference - LISA '99
Adverse Termination Procedures -or- "How To Fire A System Administrator
Matthew F. Ringel and Thomas A. Limoncelli, Lucent Technologies/Bell Labs
Abstract
When an employee is terminated, his or her access to the
organization's network and computer systems must be removed. However,
the most difficult employee to terminate is often the person that
built the system. We propose a three tier model for coordinating
access removal that is useful in normal and adverse termination
scenarios. We then work through a number of case studies to see how
the model performs in this difficult situation. We feel this model
performs extremely well. We also discuss, informally, how to minimize
the risk of backdoors and how employees can reduce the possibility of
being blamed for security incidents if they are terminated.
|