This text is the result of a conversation I had some time ago with a coworker. The idea came up during a quick coffee break, but over the years I have come to believe that it pointed to a structural problem that deserves to be addressed with a little more calm.
For years, I thought that the problem with cybersecurity was in the details. If I had to be a little more specific today, I would say that the problem is not so much in the details as in what we have done with them: the exception is no longer the exception.

All organizations are full of small special cases. The user who needs local administrator permissions; the umpteenth group in Active Directory that contains only a few people; the application that uses a non-standard port; the legacy database that requires a different backup scheme; the department that needs to run software not included in the whitelist; the manager who needs to be allowed to use USB devices; the server that cannot be patched so as not to break compatibility; the one-off exception in the firewall; the processing of personal data that requires an exception to minimization or retention policies because “the process needs it.”
The nature and number of exceptions is countless.
[Read more…]





