Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Google Security The Internet

Google Restricting Internet Access To Some Employees To Reduce Cyberattack Risk (cnbc.com) 58

Google is starting a new pilot program where some employees will be restricted to internet-free desktop PCs. From a report: The company originally selected more than 2,500 employees to participate, but after receiving feedback, the company revised the pilot to allow employees to opt out, as well as opening it up to volunteers. The company will disable internet access on the select desktops, with the exception of internal web-based tools and Google-owned websites like Google Drive and Gmail. Some workers who need the internet to do their job will get exceptions, the company stated in materials.

In addition, some employees will have no root access, meaning they won't be able to run administrative commands or do things like install software. Google is running the program to reduce the risk of cyberattacks, according to internal materials. "Googlers are frequent targets of attacks," one internal description viewed by CNBC stated. If a Google employee's device is compromised, the attackers may have access to user data and infrastructure code, which could result in a major incident and undermine user trust, the description added. Turning off most internet access ensures attackers cannot easily run arbitrary code remotely or grab data, the description explained.

This discussion has been archived. No new comments can be posted.

Google Restricting Internet Access To Some Employees To Reduce Cyberattack Risk

Comments Filter:
  • In addition, some employees will have no root access

    I think someone is using AI to write these articles. That should read, "In addition, MOST employees will have no root access. . .

    The only people who should have admin rights are programmers and IT staff. Everyone else gets locked down, including the folks at the top. There is no legitimate reason for the average person to have admin rights on a business machine.
    • Re:Say what? (Score:5, Insightful)

      by hab136 ( 30884 ) on Wednesday July 19, 2023 @12:32PM (#63699434) Journal

      >The only people who should have admin rights are programmers and IT staff

      That's usually a significant portion, if not the majority, of people in a software company.

      • I would say less than a quarter of Google's employees will fall into that category. You may not have an idea just how many support staff are needed in a company that large.

    • Re:Say what? (Score:4, Insightful)

      by Chris Mattern ( 191822 ) on Wednesday July 19, 2023 @12:52PM (#63699484)

      "The only people who should have admin rights are programmers and IT staff"

      And at that, only some IT staff should be root, and few programmers (application programmers do *not* need to be root).

      • I see applications all the time that fail without admin access, and I immediately know they were developed in an insecure environment.

        I hate it, it's so stupid. Very few things should require admin access to RUN. To install, sure. To change some configuration items, possibly. But not to run. The problem is lazy devs and a lack of a whip-wielding overseer.

        • Why doesn't Google use their own solution? ChromeOS in a VM with VPN restricted to outside Internet. Then lock the main machine to the corporate network.

          • ChromeOS needs a lot of work before it becomes a useful VDI client.

            I wish Google could work on this, because if they can make ChromeOS into something that isn't absurdly painful for VDI work, it would be quite useful, and gives businesses a lot more security options.

      • And at that, only some IT staff should be root, and few programmers (application programmers do *not* need to be root).

        There's been some times back when doing Oracle DBA work that I needed root....I had a good relationship with my SA's and they gave me sudo root access.

        I knew enough to be VERY careful when doing anything....and got in/out quickly when I needed it.

      • application programmers do *not* need to be root

        When you are programming an application, and you need to install some tool or library on which the application depends, and you file a ticket requesting installation of the tool or library and its related header files on your development PC, how long does it usually take for the IT department to process this ticket?

        • Between virtualisation, namespaces, fakeroot/fakechroot, does anyone really need any special privileges for that use case as a developer? Sure, if they have WDAC, fapolicyd or the like without exceptions in place they might, but that would stop them compiling things which target said libraries anyway!
    • Re: (Score:2, Insightful)

      by Bert64 ( 520050 )

      Even programmers should generally not have root access to their main corporate workstation that is used for email and other internal tasks. There will usually be separate development machines for them to test code on. Test/dev machines should be isolated, and not contain any sensitive data aside from the code being actively worked on.

      Same with IT staff, no need to have admin privileges on your local machine (it should really be a dumb terminal), and only on certain systems you are responsible for managing,

      • by jonadab ( 583620 )
        In practice, if IT staff don't have the ability to install software on a given computer, they're not going to use that computer for anything of consequence, certainly not for something that's as big of a time-sink as email can be. The problem is that a normal computer set up for a normal user, isn't really usable for us. It takes ten times as long as it should to get anything done and is incredibly frustrating, because you don't have any of your tools. So that computer is going to sit there collecting du
        • by DarkOx ( 621550 )

          Can I suggest your attitude here is why we are still struggling to solve the same IT security problems that have been subject of most discussion for more than a decade now?

          if IT staff don't have the ability to install software on a given computer, they're not going to use that computer for anything of consequence, certainly not for something that's as big of a time-sink as email can be. The problem is that a normal computer set up for a normal user, isn't really usable for us.

          Why if its so bad you can't or won't use it, it can't really be 'good' for anyone else can it. Maybe you should be trying to fix that?

          But you are different right - you don't ever run binaries from lower trust sources than what is in you general supply chain right? If you use FOSS tools or scripts you carefully audit all of them for RATs,

          • Can I suggest your attitude here is why we are still struggling to solve the same IT security problems that have been subject of most discussion for more than a decade now?

            What discussion are you talking about exactly?

            if IT staff don't have the ability to install software on a given computer, they're not going to use that computer for anything of consequence, certainly not for something that's as big of a time-sink as email can be. The problem is that a normal computer set up for a normal user, isn't really usable for us.

            Why if its so bad you can't or won't use it, it can't really be 'good' for anyone else can it. Maybe you should be trying to fix that?

            Why don't you go and fix that, instead of asking people who want to do their jobs efficiently to do the exact opposite – mucking about with pointless drivel for the sake of making some holier-than-thou infosec wannabe like you happy?

            But you are different right - you don't ever run binaries from lower trust sources than what is in you general supply chain right? If you use FOSS tools or scripts you carefully audit all of them for RATs, backdoors, etc, don't you? I mean you saved so much time not using that 'normie setup'!

            Personally I don't anything in Outlook anyone else in the company probably should not need or want to do. I don't run rando tool on my host system either - I don't want machine where I do basic office work fouled up and krufted up. I have VM for these things that does not get my account on corporate systems, if I need to authenticate something on the VM. I usually shut the VM down and roll my passwords.

            I'll close this off with something people like you really need to read: https://kellyshortridge.com/bl... [kellyshortridge.com]

            If you can see yourself in that text, maybe stop being a jerk and let people do their job for once.

            • by DarkOx ( 621550 )

              Nope I don't see it. Actually I see someone in that, who I would not let near anything important. He clearly has worked with some bad security practitioners, which absolutely do exist and in large numbers. However he is really unimaginative when he gets into his whole business about "outcomes" and has no sense at all about the need to control blast radius _especially_ in today's environment of zero trust models and cloud deployments.

              My point is security gateways and process need to be as low friction and

          • by jonadab ( 583620 )

            > Can I suggest your attitude here is why we are still struggling
            > to solve the same IT security problems that have been
            > subject of most discussion for more than a decade now?

            You can suggest whatever you want. It doesn't change anything.

            > Why if its so bad you can't or won't use it, it can't really be
            > 'good' for anyone else can it.

            This argument is entirely specious. Most users aren't trying to do the kinds of things that network administrators do, or anything in even remotely the same bal

      • programmers may need root to make images / debug code / install or update dev tools.

        • by Bert64 ( 520050 )

          All of which should be done on a different machine not used for day to day corporate tasks...
          Either multiple physical devices on an isolated network as needed, or remote access to dev boxes where you do have root.

          • All of which should be done on a different machine not used for day to day corporate tasks...

            Either multiple physical devices on an isolated network as needed, or remote access to dev boxes where you do have root.

            When working remotely...yes you can and generally do ssh into your remote boxes.

            But I've needed elevated prims on my local box to run some things locally to prepare things to scp over to the remote box.

            While I agree there's not many use cases...there are some.

            And not everywhere will give you m

          • by flink ( 18449 )

            Doing dev on a remote box sounds like a nightmare unless you solely code in vi.

            • Doing dev on a remote box sounds like a nightmare unless you solely code in vi.

              Do you really think that people go into a datacenter to work on boxes? It's all remote. They only question is how far away.

              • by flink ( 18449 )

                Doing dev on a remote box sounds like a nightmare unless you solely code in vi.

                Do you really think that people go into a datacenter to work on boxes? It's all remote. They only question is how far away.

                Yeah, but no one codes the multi 100k line application that gets deployed to the data center remotely via a terminal. You code it locally on your dev machine, check it into source control, and your build system produces an artifact or code bundle that gets deployed. Remoting to the data center is for config tweaks or debugging, not development. Any day I find myself shelling into the data center by hand and touching files is going to be a bad day.

          • The same for internet access. Really should be a separate machine. But then again all their productivity tools should be on a separate internal network.

    • Linux distros need root or gui sudo admin for wifi. SUSE Linux needs ROOT password to join wifi networks.
      Some even need it to install updates in GUI / desktop

    • Developers are some of the worst people to give elevated rights to.

      IT encompasses so many roles that it's an ineffective solution to say IT should have admin rights.

      Even when a user has elevated rights it should be through a separate account.

  • That's how most companies should run their IT. Internet browsers shouldn't be any closer to intranet access than behind a VM barrier, though the Cloudflare isolated browser works too.

    Internet access on work computers (and by extension BYOD) were clearly completely retarded. Everyone was doing it wrong for half a century and now finally sanity is setting in ... took you guys long enough.

  • by xwin ( 848234 ) on Wednesday July 19, 2023 @12:38PM (#63699444)
    No-script and adblocker can mitigate 99.9% of all browser based attacks. But of course google will never do this as it sends the wrong message. Root access in itself is not a problem, it is the idiot behind the keyboard that is the problem. I have seen people running builds as root just so they can save few keystrokes. Properly installed and configured sudo is sufficient to allow needed root access while providing adequate security.
    People use ssh keys without passwords and re-use same ssh key for everything. In general convenience overrides all security considerations. That is why attacks succeed.
    • We should give everyone access to the nuclear launch codes. We'll just trust them to be smart enough not to use them. Sounds like a solid plan.

  • by Baron_Yam ( 643147 ) on Wednesday July 19, 2023 @12:46PM (#63699468)

    Google should know better. Nobody should have admin access, not even those who actually need it... those people who need it should have a secondary account they invoke for admin tasks.

    As for general Internet access, outside of a truly secure environment (where the computers should have anything not mandatory be prohibited) I find it best to point employees to an Internet usage policy and then let them have filtered access. Yes, every once in a while you have to slap somebody's wrist. It's better than treating everyone like they're on a chain gang.

    • by oic0 ( 1864384 )
      I'm sooooo tired of typing in my username and password for every little mundane task that requires admin privileges. Microsoft needs to do something to make it less of a chore.
      • The problem is the underlying security is weak - when the UAC pops up demanding your attention, it's because what you're trying to do can be useful to a malicious actor.

        I admit it would be nice if you could authorise individual tasks permanently - say you like to fiddle with your network card properties or something. Rather than having to deal with entering your admin credentials each time, there should also be a checkbox for 'always allow on this account'. One and done.

        I don't know from a coding perspect

    • need good self install software tools that bypass needing root / sudo needing to call the help desk for each software update takes to long.

    • >"As for general Internet access, outside of a truly secure environment (where the computers should have anything not mandatory be prohibited) I find it best to point employees to an Internet usage policy and then let them have filtered access. Yes, every once in a while you have to slap somebody's wrist. It's better than treating everyone like they're on a chain gang."

      We have a whitelist with many hundreds of approved site domains that are used for general business. Lots of resource sites, our vendors,

    • Well you know...it's all that "move fast and break things" attitude in Silicon Valley

      /sarcasm

  • That such a "cloud" and advertising company would choose to lock its own employees from the environment created by them reeks of irony.

    Of course, the reality is we need aggressive steps beyond this for improved resiliency.

  • I have been on all sides of this issue. In a very large organization I was...

    - The developer swearing up and down that admin access was absolutely necessary
    - The team lead defending this viewpoint to his supervisor
    - The supervisor being given "absolutely not" by the maturing security practice and discussing it with the team lead
    - Part of the "focus group" considering the question from the security side
    - The security auditor looking from the outside in

    Over the years, the devs won the fight less and less freq

    • Downloading unvetted things just to try them out is how things go sideways. A great many programmers don't see themselves as the risk that they are.

      What halfway decent dev team doesnâ(TM)t set up a lab environment? Oh, lookâ¦an old VMWare server thatâ(TM)s gone out of serviceâ¦pop it onto a separate VLAN (or even better, a physically separate LAN) with limited access to the internet, etc.

      Download and play all you want in your isolated sandbox. But your corporate laptop is locked down.

    • My killer argument was "if the computer illiterate boss secretary who spends more time on Facebook and Instagram than working has admin access to her crate, giving it to devs who do know the security implications can't make it worse".

      It did get me some VERY nasty looks from the CEO, but you just don't fuck with your CISO if you know what's good for you.

  • Most companies have those policy anyway regarding admin access, and strong firewalls to restrict content and security risks. This no 'internet' access thing is something different I'm sure of it. It's more likely they have people not performing their duties properly and spending too much time doing X, and if they directly target X people will perceive it as being against X or try to distract it as that, so google doesn't want to restrict access to X or multiple sites that people are taking part in X, and is

  • You exclude the two main attack vectors and think you're getting safer, right?

  • I thought it was fairly common to have a locked-down workstation with no internet access for administration of critical systems. The term I know them as is "Privileged Administrative Workstations" or PAWs for short.

    https://aka.ms/cyberpaw [aka.ms]

    • It is. This article is flamebait, and leaves out any kind of useful details.

      I would say it is a flat out lie, but I am sure there is some small bit of truth to this article. What part is true is unclear.

  • The world's largest Internet company scared of the Internet. Proof that the impending implosion is near.

  • It sounds like it's just their development desktop PC that's being locked down. If they need to access things like Stack Overflow they can probably use their laptop.

  • This move does undermine Google's BeyondCorp mantra to a degree.

    https://cloud.google.com/beyondcorp/ [google.com]

  • There is no way that Google does not already have a fully firewalled internal network for employees with TFA and VPNs for access. That is pretty much standard for any company, especially since Google is a major cloud provider.

    Also, having root access on a single box has nothing to do with enterprise network security. Those are two totally different issues. The standard at almost all companies, Google included, is to only give out a root credentials to employees with a need to have them.

    This is probably idio

Don't tell me how hard you work. Tell me how much you get done. -- James J. Ling

Working...