Thank you for your comments. I have slightly different outlook with regard to 
data security. I understand why the ars design means that the ui is vulnerable.

Thanks 
Jon


---- Jason Miller wrote ----

>** 
>
>I agree with LJ and BMC. Read Only functionality is not meant to be a data 
>security enforcing measure. It is a UI feature.
>
>
>True permissions and enforcing workflow is going to be even more critical 
>assuming a very easy to use RESTful web service is right around the corner. 
>Any user can simply install Postman and have their way with your data easier 
>that ever before.
>
>
>That makes me wonder if maybe there should be an option to disable RESTful web 
>services?  Maybe shutting down Jetty is sufficient enough? This will allow 
>organizations perform a security review prior to enabling this powerful 
>feature.
>
>
>Jason
>
>
>On Tue, Apr 21, 2015 at 1:00 PM, LJ LongWing <[email protected]> wrote:
>
>** 
>
>Jon,
>
>I unfortunately must agree with BMC on this one....if they have change 
>permission, they have change permission.  There are any number of ways to 
>update the data without using Mid-Tier....so, if they truly should not be 
>modifying the data, you will need to either enforce it via permissions (give 
>ability to submit, but not ability to change), or, as you stated, build Filter 
>based workflow to lock the fields down from a change perspective.
>
>
>On Tue, Apr 21, 2015 at 1:29 PM, Jon Young <[email protected]> 
>wrote:
>
>** 
>
>Hi Listers
>
> 
>
>Sorry if this has been discussed recently before;  I’ve got the tricky task of 
>explaining to clients that Read-Only fields can be modified by users by a 
>simple hack.  I wondered if any of your employers/ clients see this as a data 
>security risk and if you have any solutions for this?
>
> 
>
>Issue:
>
>---------
>
>Sometimes, we want users to be able to modify a field so we give that field a 
>Change permission, and give the user that permission.  For example, we want a 
>user to enter a short description on a Change Request.
>
> 
>
>Later, we don’t want the user to modify that field.  For example, when a 
>Change Request has been approved.  We don’t really want the user to change 
>details.  To prevent this, we make the field Read-Only.
>
> 
>
>The vulnerability is that even though that field is Read-Only they can modify 
>the field using tools included in web browsers.  If our users are external to 
>our organisation we can not control what browsers they use.
>
> 
>
>So this is only an issue is a user is deliberately trying to misuse the system 
>– the sort or users we’d like to take security precautions against.
>
> 
>
>BMC’s Stance
>
>---------------------
>
>BMC, the lead architect, has stated that Read-Only fields are a display 
>characteristic to assist the user interface.
>
> 
>
>Solutions
>
>-------------
>
>We could crate filters that fire when we know a fields are read-only for the 
>current user to check the TR value and prevent the commit.  This is a lot of 
>overhead for fixing this vulnerability in BMC’s ITSM application, let alone 
>customisations and bespoke applications.
>
> 
>
>Alternatively, we could audit the fields.  It doesn’t prevent the issue but 
>would at least help to check if the field was changed.
>
> 
>
>As BMC don’t see this as a bug or a vulnerability my hopes of mid tier/ server 
>fix for this are somewhat muted!
>
> 
>
>Thanks
>
>Jon
>
>_ARSlist: "Where the Answers Are" and have been for 20 years_ 
>
>
>_ARSlist: "Where the Answers Are" and have been for 20 years_ 
>
>
>_ARSlist: "Where the Answers Are" and have been for 20 years_ 

_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
"Where the Answers Are, and have been for 20 years"

Reply via email to