{"id":13869,"date":"2018-11-20T04:30:17","date_gmt":"2018-11-20T12:30:17","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/11\/20\/news-7636\/"},"modified":"2018-11-20T04:30:17","modified_gmt":"2018-11-20T12:30:17","slug":"news-7636","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/11\/20\/news-7636\/","title":{"rendered":"The big fix"},"content":{"rendered":"<p><strong>Credit to Author: Sharky| Date: Tue, 20 Nov 2018 03:00:00 -0800<\/strong><\/p>\n<p>Pilot fish at a federal agency gets a visit from a power user who can&#8217;t get access to the data he needs &#8212; and he&#8217;s not at all happy.<\/p>\n<p>&#8220;We used a very effective security product that could narrow down access to a specific user or dataset,&#8221; says fish. &#8220;But you had to be careful to install any new rules in the right place, because once a rule was found it was applied, even if one with more relaxed access followed.<\/p>\n<p>&#8220;As soon as I checked, I could see that I had misplaced the rule I had created for him.<\/p>\n<p>&#8220;Now, normally if I made a mistake I&#8217;d admit to it and apologize. This particular day this fellow, an otherwise nice guy, was at it like a dog with a bone, demanding <i>How did it happen? Who did this?<\/i> over and over.<\/p>\n<p>&#8220;For whatever reason, that rubbed me the wrong way. So I said, &#8216;Let&#8217;s fix the problem now, we can fix the blame later.&#8217;<\/p>\n<p>&#8220;That got him all self-righteous and indignant, but it distracted him enough to drop the subject and let me correct the problem.<\/p>\n<p>&#8220;A week later, I set up a security ID with limited security authority, so he could manage his own datasets without having to consult me. He was happy, and I had no further problems with him after that.&#8221;<\/p>\n<p style=\"font-size: 0.875em;\"><strong>Give Sharky access to your true tale of IT life.<\/strong> <i>I&#8217;ll file off the identifying marks if you send it to me at <a href=\"mailto:sharky@computerworld.com\" rel=\"nofollow\">sharky@computerworld.com<\/a>. You can also comment on today&#8217;s tale at <a href=\"https:\/\/plus.google.com\/u\/0\/communities\/113252326043973101081\" rel=\"nofollow\"><strong>Sharky&#8217;s Google+ community<\/strong><\/a>, and read thousands of great old tales in the <a href=\"http:\/\/www.computerworld.com\/search?query=+sharky&amp;s=d&amp;start=0\" title=\"Sharky's archives on easier-to-navigate pages\"><strong>Sharkives<\/strong><\/a>.<\/i><\/p>\n<p><em>Get Sharky&#8217;s outtakes from the IT Theater of the Absurd delivered directly to your Inbox. Subscribe now to the <a href=\"http:\/\/www.computerworld.com\/newsletters\/signup.html\" title=\"Daily Shark Newsletter subscription page\">Daily Shark Newsletter<\/a>.<\/em><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3322557\/security\/the-big-fix.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Sharky| Date: Tue, 20 Nov 2018 03:00:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>Pilot fish at a federal agency gets a visit from a power user who can&#8217;t get access to the data he needs &#8212; and he&#8217;s not at all happy.<\/p>\n<p>&#8220;We used a very effective security product that could narrow down access to a specific user or dataset,&#8221; says fish. &#8220;But you had to be careful to install any new rules in the right place, because once a rule was found it was applied, even if one with more relaxed access followed.<\/p>\n<p>&#8220;As soon as I checked, I could see that I had misplaced the rule I had created for him.<\/p>\n<p>&#8220;Now, normally if I made a mistake I&#8217;d admit to it and apologize. This particular day this fellow, an otherwise nice guy, was at it like a dog with a bone, demanding <i>How did it happen? Who did this?<\/i> over and over.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3322557\/security\/the-big-fix.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[714],"class_list":["post-13869","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13869","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13869"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13869\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13869"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13869"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13869"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}