Book now with code EOY2025
rogue2shadow wrote: » Who's arse does this fall on if the information is compromised? :P
Bl8ckr0uter wrote: » Not mine. But what I want is some sort of quantifiable measurement that shows how SSL doesn't provide enough protection. I mean a lot of security is "security theater" but this guy is not the type (neither is my boss). I may feel bad about it doing what it does but they will shrug it off until I pull out some numbers. I have a way of showing that but I'd still like to have a job later lol.
Bl8ckr0uter wrote: » Thanks for the responses guys:@IT_Consultant: I would still feel much better if it wasn't plain text across the browser. Im your experience do have you seen that most web developers do send information in this manner?
it_consultant wrote: » Heck no, I thought we were just talking about plain text between the web servers and the back end servers. If, for example, you put a password in a website and you can see the PW in the URL string...that is not good. The risk being that someone can either see over your shoulder or can parse your internet history if your computer is stolen.
it_consultant wrote: » I think IPSEC is probably what I would do since it encrypts all the traffic between the servers and is fairly easy to implement.
RobertKaucher wrote: » What type of data is this that is being xfered?
Bl8ckr0uter wrote: » Sensitive information. I don't know if I can legally say.
RobertKaucher wrote: » Is there a legal requirement to go beyond something other than SSL? Is there a legal requirement regarding the data for your industry at all?
it_consultant wrote: » HIPAA would not apply in this case since the information being transmitted in clear text is not publicly available.
it_consultant wrote: » I assume everyone working there has had a HIPAA compliant background check. Physical security is also important, can people just walk into the server room? Do you use cipher locks or keys? Often, in practical terms, a locked door will stop most man in the middle attacks. Your coworkers are right in a lot of ways in assuming that SSL is secure enough for this task. Securing it inside the LAN is a little overboard. You should be more concerned with the possibility of a data leak from one of the employees. Those are far more common. Those cannot be stopped by IPSEC or SSL.
Bl8ckr0uter wrote: » Yes. HIPAA requires PHI data in transit to be "protected". I read that as encrypted since if the session suffers a MITM attack, the data wouldn't be protected.
it_consultant wrote: » 90% of security is behavior.
it_consultant wrote: » Its harder to execute a MITM attack than you might think. Its very easy for sensitive data to be left in public on an unencrypted drive. 90% of security is behavior.
Use code EOY2025 to receive $250 off your 2025 certification boot camp!