Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This is called "break-glass procedure" in enterprise IT (as in "break glass in case of emergency"), and often consists of independent, normally unused, admin accounts on key systems, access info for which is locked in some safe location, e.g. physical safe in a secure location.

Testing this reliably is difficult, though, and often these procedures and their documentation is outdated.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: