July 26, 2022, 1:20 a.m. | Arvind Narayanan, Kevin Lee

cs.CR updates on arXiv.org arxiv.org

Information security isn't just about software and hardware -- it's at least
as much about policies and processes. But the research community overwhelmingly
focuses on the former over the latter, while gaping policy and process problems
persist. In this experience paper, we describe a series of security policy
audits that we conducted, exposing policy flaws affecting billions of users
that can be -- and often are -- exploited by low-tech attackers who don't need
to use any tools or exploit …

audits policy security security policy

Information Security Engineers

@ D. E. Shaw Research | New York City

Information Systems Security Engineer (ISSE)

@ Wyetech | Ft. Belvoir, Virginia

Security Consultant, FedRAMP Assessment | Remote US

@ Coalfire | United States

PAI/OSINT Administration Policy SME

@ Accenture Federal Services | Washington, DC

Field CISO

@ Lacework | United States

Risk Advisory Forensic Technology Services Senior

@ KPMG India | Mumbai, Maharashtra, India