this post was submitted on 27 Nov 2024
156 points (97.0% liked)

Linux

48732 readers
1219 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS
 

Hi all, we are hiring a remote worker and will be supplying a laptop to them. The laptop will be running a Debian variant of Linux on it.

We are a small shop and this is the first time we have entrusted somebody outside of our small pool of trusted employees.

We have sensitive client data on the laptop that they need to access for their day-to-day work.

However, if something goes wrong, and they do the wrong thing, we want to be able to send out some kind of command or similar, that will completely lock, block, or wipe the sensitive data.

We don't want any form of spying or tracking. We are not interested in seeing how they use the computer, or any of the logs. We just want to be able to delete that data, or block access, if they don't return the laptop when they leave, or if they steal the laptop, or if they do the wrong thing.

What systems are in place in the world of Linux that could do this?

Any advice or suggestions are greatly appreciated? Thank you.

you are viewing a single comment's thread
view the rest of the comments
[–] dan@upvote.au 7 points 1 month ago* (last edited 1 month ago) (1 children)

A lot of employers (at least the larger ones) block USB drives and have software to monitor for data exfiltration - monitoring where files are copied to, usage of copy/paste in browsers, etc.

You should always assume that your work devices are being monitored.

[–] notabot@lemm.ee 1 points 1 month ago (1 children)

I agree that you should assume you're being monitored, but, while that helps against malware type exfiltration, it does little to stop someone who is determined to exfiltrate the data as there are a myriad of ways to do so that aren't possible to monitor, such as simply taking a video of the screen whilst displaying the information.

Ultimately, the company has to trust the employee or not give them access to the sensitive data, there's no middle ground.

[–] PowerCrazy@lemmy.ml 2 points 1 month ago (1 children)

This is fundamentally true. However it is possible to limit the bandwidth of data the employee can exfiltrate.

Assuming a privileged employee suddenly becomes a bad actor. Private-keys/certs are compromised, any kind of shared password/login is compromised.

In my case I have a legit access to my company's web-certs as well as service account ssh-key's, etc. If I were determined to undermine my company, I could absolutely get access to our HSM-stored software signing keys too. Or more accurately I'd be able to use that key to compile and sign an arbitrary binary at least once.

But I couldn't for example download our entire customer database, I could get a specific record, I could maybe social engineer access to all the records of a specific customer, but there is no way I'd be able to extract all of our customers via an analog loophole or any standard way. The data set is too big.

I also wouldn't be able to download our companies software source code in it's entirety. Obviously I could intelligently pick a few key modules etc, but the whole thing would be impossible.

And this is what you are trying to limit. If you trust your employees (some you have to), you can't stop them from copying the keys to the kingdom, but you can limit the damage that they can do, and also ensure they can't copy ALL the crown jewels.

[–] notabot@lemm.ee 1 points 4 weeks ago

This is fundamentally true. However it is possible to limit the bandwidth of data the employee can exfiltrate.

That's fair, but the OP was talking about having the sensitive data directly on the laptop, which rather limits your ability to control access to it, and why I was suggesting keeping the data on a server and providing access that way, so limits can be put in place.

Assuming a privileged employee suddenly becomes a bad actor.

Your threat model probably isn't the employee who suddenly goes rogue and tries to grab everything, but the one who spends and extended period of time, carefully, extracting key data. As you, the former can be be mitigated against, but the latter is very much harder to thwart.

But I couldn't for example download our entire customer database, I could get a specific record, I could maybe social engineer access to all the records of a specific customer, but there is no way I'd be able to extract all of our customers via an analog loophole or any standard way. The data set is too big.

That's well set up, but, whilst your competitor would love the whole database, what they're really interested in is the contact details and contract information for maybe your largest three customers. When the dataset to extract is small enough, even quite advanced rate limiting can't really help much. Making sure no one person has access to all of the most valuable data is a good start, but can present practical problems.

And this is what you are trying to limit. If you trust your employees (some you have to), you can't stop them from copying the keys to the kingdom, but you can limit the damage that they can do, and also ensure they can't copy ALL the crown jewels.

I think we're basically saying the same thing. The OP talked about putting all the sensitive information on the employee's laptop, and that's what I was trying to steer them away from.

In the past I've been asked if we can provide our developers access to pull the full source tree, but not copy it anywhere, and, to quote Charles Babbage, "I am not able rightly to apprehend the kind of confusion of ideas that could provoke such a question."

I enjoy the security side of sysadmin work, but I find it rather depressing, as all you can hope to do is lose slowly enough that it's not worth attacking you.