{"id":50,"date":"2004-10-18T18:22:44","date_gmt":"2004-10-19T01:22:44","guid":{"rendered":"http:\/\/www.redmonk.com\/jgovernor\/wp\/?p=50"},"modified":"2004-10-18T18:22:44","modified_gmt":"2004-10-19T01:22:44","slug":"sarbanes-oxley-policy-forbids-google-desktop-search-install","status":"publish","type":"post","link":"https:\/\/redmonk.com\/jgovernor\/sarbanes-oxley-policy-forbids-google-desktop-search-install\/","title":{"rendered":"Sarbanes Oxley Policy Forbids Google desktop search install"},"content":{"rendered":"<p>Google is a platform-its a tool that <a href=\"http:\/\/www.google-watch.org\/bigbro.html\">can be abused<\/a>. That is why generic reassurances such as the lame &#8211; Don&#8217;t Be Evil &#8211; just don&#8217;t go anywhere far enough. Google seems to have a problem with policy&#8211; the kind of policy that allows a user to make their own decisions about potential risks in using the service. <a href=\"http:\/\/www.controlscaddy.com\/\">Chris Byrne<\/a> calls this out clearly in his <a href=\"http:\/\/www.controlscaddy.com\/A55A69\/bccaddyblog.nsf\/plinks\/CBYE-65T55K\">latest<\/a> blog. According to Chris:<\/p>\n<p>The bottom line here is that Google should have been up front in their documentation and disclosed what exactly the install process would do, what ports would be needed and why they would be needed. One of the questions in the help section is &#8220;Does Desktop Search install malicious software?&#8221; The answer they give is &#8220;No. When you download and install Google Desktop Search, you&#8217;re just getting Desktop Search. That&#8217;s it. End of story.&#8221; Like a politician in a debate, the answer really is not as clear as it should be. That is just plain wrong and irresponsible of Google. <\/p>\n<p>Taking Chris&#8217; thoughts to their natural conclusion, i believe that corporate IT departments should immediately make a clear commitment to either<\/p>\n<p><b>a. fully support Google Desktop Search, including end to end security remediation<\/p>\n<p>or <\/p>\n<p>b. completely ban use of the product on corporate networks<\/b><\/p>\n<p>These organizations are already thrashing to try and cope with current security breaches and threats, especially in the context of enterprise desktops. Now Google has added another potential exploit, a new listener to the desktop. Of course SP2 should block the port, as should a personal firewall, but GDS certainly adds a new risk in terms of corporate desktops and operational controls in enterprises.<\/p>\n<p>I would advise the IT department to go for b above and work out whether to support the tool later, once risks can be better assessed and more eyeballs have got to work on the problem. It may seem a shame to lock down end user apps &#8211; especially ones that fall into the &#8220;productivity&#8221; space. But which is worse&#8211;annoying a few end users or failing a Sarbanes Oxley audit&#8211;i think in this case you may find the CEO is on your side&#8230;<\/p>\n<p>As Bruce Schneier keeps trying to<a href=\"http:\/\/www.schneier.com\/blog\/\">  help us understand<\/a>&#8211;you can&#8217;t remove risk entirely. But you can help people make more informed decisions. Google hasn&#8217;t helped its users enough in this case. Google is not just a tool for home users. It it is also now an important business application. Google therefore needs to do a better job of helping enterprise customers build usage policies, especially if it really wants be different from Microsoft, which has had, for example, some <a href=\"http:\/\/www.theregister.co.uk\/2004\/10\/11\/ms_legal_mail_autodestruct\/\">email policy issues<\/a>.<\/p>\n<p>Policy may be boring, but it gives us a basis for decision making that goes beyond gut instinct. Don&#8217;t be Evil is just a matter of opinion. Don&#8217;t install <a href=\"http:\/\/desktop.google.com\/about.html\">GDS <\/a>on a machine used for corporate business, even at home for now&#8211;is a sensible IT policy.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google is a platform-its a tool that can be abused. That is why generic reassurances such as the lame &#8211; Don&#8217;t Be Evil &#8211; just don&#8217;t go anywhere far enough. Google seems to have a problem with policy&#8211; the kind of policy that allows a user to make their own decisions about potential risks in<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","footnotes":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[1],"tags":[],"class_list":["post-50","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9wfjh-O","_links":{"self":[{"href":"https:\/\/redmonk.com\/jgovernor\/wp-json\/wp\/v2\/posts\/50","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/redmonk.com\/jgovernor\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/redmonk.com\/jgovernor\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/redmonk.com\/jgovernor\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/redmonk.com\/jgovernor\/wp-json\/wp\/v2\/comments?post=50"}],"version-history":[{"count":0,"href":"https:\/\/redmonk.com\/jgovernor\/wp-json\/wp\/v2\/posts\/50\/revisions"}],"wp:attachment":[{"href":"https:\/\/redmonk.com\/jgovernor\/wp-json\/wp\/v2\/media?parent=50"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/redmonk.com\/jgovernor\/wp-json\/wp\/v2\/categories?post=50"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/redmonk.com\/jgovernor\/wp-json\/wp\/v2\/tags?post=50"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}