Beefy Boxes and Bandwidth Generously Provided by pair Networks
No such thing as a small change
 
PerlMonks  

Re^3: Rediscovering Hubris

by eyepopslikeamosquito (Archbishop)
on Jan 20, 2021 at 04:52 UTC ( [id://11127119]=note: print w/replies, xml ) Need Help??


in reply to Re^2: Rediscovering Hubris
in thread Rediscovering Hubris

I agree having to use print with a newline instead of say is not a good reason to upgrade ... yet I'm struggling to understand your seemingly blase attitude towards Security. (Oh, and I strongly agree that chromatic's Perl (and agile dev) books are awesome! ;-).

I suspect you come from a different (smaller?) commercial environment than me. Do you have Security auditors? We do, they use tools (luckily mostly Windows-only for now) and they have the ear of upper management. If you're using a version of Perl open to security exploits (see perlsec ... DoS attacks based on Perl hash algorithmic complexity spring to mind) or any product (including Perl) that is out of official support, they'd be all over you like hair on soap.

They don't have the time to understand all the nuances of every product running on every computer so they tend to heavily rely on tools and enforce blanket rules, such as "you are not allowed to use a product that is out of support" or "you must regularly check for exploits and patch your software promptly".

Replies are listed 'Best First'.
Re^4: Rediscovering Hubris
by Leitz (Scribe) on Jan 20, 2021 at 13:13 UTC

    Security and auditing are valid concerns, but dangerous topics to wander into.

    My work has often been in larger shops; from a couple hundred servers, to a few thousand, and up to "we don't really know". Security, and auditing, varied. Early on "it works" was sufficient. Later, when corporate started listening to us talk about needing to upgrade and defend, internal and external auditing became more common. I won't say everything was perfect, but at least we could talk about things openly and management would listen.

    However, Perl and CPAN quickly become issues. Large shops use a variety of "solutions", and those use a variety of languages and language tools. Large shops can seldom audit the tool chain. With CPAN, it becomes even more problematic; every module increases your vulnerability footprint and fragility. In general, a large shop has three options:

    1. Pay for support for every language and every module used.
    2. Pay for a large enough staff to support every language and module used.
    3. Shift legal liability to the OS and Solution vendors since that's what they are paid for.

    Any guesses as to which one usually gets picked? :P

    Keep in mind, we've seen OS vulnerabilities that only affect "Version X and later." New versions of software can provide new functionality as well as increased performance, etc. However, that very "new" is an open invitation to new bugs and vulnerabilities. All software has bugs. New software has new bugs. Assuming newer is better is not a valid security posture.

    Chronicler: The Domici War (domiciwar.net)

    General Ne'er-do-well (github.com/LeamHall)

      Assuming newer is better is not a valid security posture.

      Assuming "free of known vulnerabilities" is, however.

Log In?
Username:
Password:

What's my password?
Create A New User
Domain Nodelet?
Node Status?
node history
Node Type: note [id://11127119]
help
Chatterbox?
and the web crawler heard nothing...

How do I use this?Last hourOther CB clients
Other Users?
Others romping around the Monastery: (3)
As of 2024-03-29 05:52 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?

    No recent polls found