Hacker News new | past | comments | ask | show | jobs | submit login

Both are low probability/high impact. I don't expect a typical company to expose its ___domain controller to the WAN. And if the ___domain controller is down because of a botched update, pretty much everything else in the organisation is down. Not clear to me which one is worse.



You’re absolutely right in every regard, I just want to throw in a little flavor from my experience as a security consultant. I’ve worked with state governments where we had to tune out alerting of failed logins on their ___domain controller because the public login for their public facing site was backed directly by their internal Active Directory server and we were seeing thousands of failed login alerts every day.

The state of infosec is still that bad and unfortunately most consumers can’t know of these problems let alone choose to opt out. Right now much of the cost of a breach is borne by the end users who didn’t choose the poor level of security the organization implemented, and I am increasingly of the opinion that it’s better to bring down your organization’s IT infrastructure than to suffer a catastrophic breach. Because if the pain if borne by the internal IT teams more than the end user (who again often has no knowledge or no choice), eventually the company will be forced to implement better processes.

As long as the real cost of a breach is paid for by end users, organizations have very little incentive to improve.


Thanks, I feel that’s an unpopular opinion for purist, but very real for most people’s day-to-day .


I'm not sure the second one is so low probability. While the ___domain controller is not exposed to an external network, it is still exposed to the workstations.


Good on you for framing this in a realistic way.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: