• Valmond@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      10
      ·
      13 hours ago

      Who logs who reads files? And even if, who checks those logs? Gotta be a wild system.

      • a4ng3l@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        8 hours ago

        Siems and such systems are designed for that. Could be part of SOC or CSIRT. Generally all large companies have that. It’s also getting more accessible to smaller structures in the form of « as a service ». A data leak is a data leak whatever the vector so shit needs to be detected & acted upon. It’s all fun & fair games when about Intel secrets it seems but what when a dickhead steals medical data or other perso stuff ?

      • teft@piefed.social
        link
        fedilink
        English
        arrow-up
        8
        ·
        10 hours ago

        Lots of companies maintain access logs. Anything with high security you want to be able to audit who accessed what and when.

          • teft@piefed.social
            link
            fedilink
            English
            arrow-up
            5
            ·
            9 hours ago

            Normally you just have the systems admin or an automated system look into it. It depends on your security setup.

            • Valmond@lemmy.world
              link
              fedilink
              English
              arrow-up
              1
              arrow-down
              1
              ·
              9 hours ago

              Yeah I guess that’s the only sane way to do it. A tiny bit crazy the whole system exists, an automatic verification lights up, but only after the dude left.

              Why did he have access to all that for starters, why wasn’t the alarms ringing when he did it etc. seems like security at Intel is kind of wonky. 🤷🏻‍♀️

              • teft@piefed.social
                link
                fedilink
                English
                arrow-up
                2
                arrow-down
                1
                ·
                9 hours ago

                It might just come down to they never experienced the exact type of espionage so didn’t have strong guardrails to prevent this. Hopefully some security engineers learned a lesson from this and will change their processes.

      • Cypher@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        ·
        10 hours ago

        I check those logs, not for Intel though.

        The systems that support this range from simple to unnecessarily complex.

          • Cypher@lemmy.world
            link
            fedilink
            English
            arrow-up
            5
            ·
            9 hours ago

            Yes that’s a small part of my job.

            I setup monitoring systems, ingest logs and create rules to detect unusual or malicious behaviour.

            Then I perform investigations which sometimes turn into forensic investigations, which sometimes results in legal action.