- Joined
- Nov 21, 2020
Yes.Has anyone had to deal with borderline braindead "security auditors"?
From stuff like:
"This system has the telnet client installed, that's insecure." "You do realize it doesn't do anything, it just sits there." "Must remove" "Fine, can we install 'nc/NetCat' instead" "Sure"
"This port is open, it's a security vulnerability." "It's a vulnerability on Windows, this is a Linux system and we chose that port for one of our own apps." "Oh, ok" ... next audit ... "This port is open...."
"Stop using insecure SSL ciphers." "We checked the logs, half our idiot clients are still using those." "Well, the checklist says...." Talk to people for approvals, go to tons of meetings, finally get variance.
Then they send you the 200 page report without even bothering to filter by OS or version or verify that it's not patched. 50 pages of Windows vulnerabilities on Linux. 140 more that a real version check would show as patched, RedHat was especially bad for this as they'd backport fixes to versions still listed as vulnerable. 2.3.4 is vulnerable, must upgrade to 2.4.0, but RedHat made 2.3,4-rh1 and patched it but the idiot scanners, and the humans who were supposed to verify the report totally ignored it. 10 pages of maybe actual real stuff.