• teft@piefed.social
    link
    fedilink
    English
    arrow-up
    8
    ·
    11 hours ago

    Lots of companies maintain access logs. Anything with high security you want to be able to audit who accessed what and when.

      • teft@piefed.social
        link
        fedilink
        English
        arrow-up
        5
        ·
        10 hours ago

        Normally you just have the systems admin or an automated system look into it. It depends on your security setup.

        • Valmond@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          1
          ·
          10 hours ago

          Yeah I guess that’s the only sane way to do it. A tiny bit crazy the whole system exists, an automatic verification lights up, but only after the dude left.

          Why did he have access to all that for starters, why wasn’t the alarms ringing when he did it etc. seems like security at Intel is kind of wonky. 🤷🏻‍♀️

          • teft@piefed.social
            link
            fedilink
            English
            arrow-up
            2
            arrow-down
            1
            ·
            9 hours ago

            It might just come down to they never experienced the exact type of espionage so didn’t have strong guardrails to prevent this. Hopefully some security engineers learned a lesson from this and will change their processes.