![]() |
![]() |
|
February 07, 2006Proof that LUA makes you saferI was reading a post over at AdminFoo today when Bryan showed an interesting graphic taken from eWeek Magazine that shows how effective LUA really is in the midst of all the current forms of malware and spyware in the field these days. I thought I would post it for my readers to check out. This is pretty compelling evidence that by using least privilege you can significantly reduce the risk to your computing environments by eliminating the ability for malware to take hold on your system. Take another look at Bryan's post to also get some insight on the original article, and some recommendations he has on how you can use tools like Supsu for LUA now. And of course, you HAVE read "Applying the Principle of Least Privilege to User Accounts on Windows XP" published by the Microsoft Solutions for Security and Compliance group (MSSC) haven't you? Posted by SilverStr at February 7, 2006 02:11 PM | TrackBackComments
Really makes it clear why the mantra is "there's no difference between Power User and Administrator". Posted by: Alun Jones at February 7, 2006 03:44 PMThat's amazing. OK, I have scanned and now downloaded the MSSC document. It looks like SupSU might be smoother than MakeMeAdmin. One thing I'm looking for is having simple installers that can be run from LUA and that only need to spawn a privileged task for a momentary purpose, like adding registry entries. It would be great if there was some sort of amalgamation of techniques that would have that work. The use case I have in mind is simply registering a DLL in a way that works easily for a developer (who is LUA the rest of the time) and also in the deployment. It looks like the pieces should be there. Posted by: orcmid at February 7, 2006 05:06 PMThanks for the link Dana! Posted by: bryan at February 7, 2006 05:34 PM |
![]() ![]()
My 5 Favorite Books
Writing Secure Code
Secure Programming Cookbook Security Engineering Secure Coding Principles & Practice Inside the Security Mind ![]()
My 5 Favorite Papers
Smashing the Stack
Penetration Studies Covert Channel Analysis of Trusted Systems DoD Trusted Computer System Evaluation Criteria NSA Security Recommendation Guides ![]()
Archives
March 2010
October 2009 August 2009 May 2009 April 2009 March 2009 February 2009 January 2009 December 2008 November 2008 October 2008 September 2008 August 2008 July 2008 June 2008 April 2008 January 2008 December 2007 November 2007 October 2007 September 2007 August 2007 July 2007 June 2007 May 2007 April 2007 March 2007 February 2007 January 2007 December 2006 November 2006 October 2006 September 2006 August 2006 July 2006 June 2006 May 2006 April 2006 March 2006 February 2006 January 2006 December 2005 November 2005 October 2005 September 2005 August 2005 July 2005 June 2005 May 2005 April 2005 March 2005 February 2005 January 2005 December 2004 November 2004 October 2004 September 2004 August 2004 July 2004 June 2004 May 2004 April 2004 March 2004 February 2004 January 2004 December 2003 November 2003 October 2003 September 2003 August 2003 July 2003 June 2003 May 2003 April 2003 March 2003 February 2003 January 2003 December 2002 November 2002 October 2002 September 2002 August 2002 July 2002 ![]() |