[ale] Security Licensing (wuz: a quick test of web site stupid)

Leam Hall leamhall at gmail.com
Fri Mar 8 11:50:28 EST 2013


On 03/08/2013 11:24 AM, Jim Kinney wrote:
> Exactly. What this does do is require that public facing code that has
> the potential to cause harm is reviewed and approved by someone that
> society, working through bright people in the field, trusts will stamp
> that code as "best available methods at this time". There will still be
> loads of jobs for non-certified coders.
>
> We already have the Business A -> Business B process. It doesn't work
> very well.

Business B has a lousy marketing department then. There is a significant 
need for security and to have CISSP, GIAC, or even Security+ people on 
teams, IF YOU LISTEN TO THEM, helps loads. You can tout the reduced code 
vulnerabilities from meeting X standard and note that you actively 
recruit security talent is leverage.

Damon's point about requiring certification raises a different issue. 
Keep in mind that much of what we know is reinforced by daily usage and 
decreases over time. If you get an RHCE it means you passed a rigorous 
test. If you passed that test a decade ago, like me, you need to show 
that you have kept current. And I don't mean paying for another 
certification, but actively doing stuff in the field.

And doing new stuff, too. A lot has changed in the last decade and there 
are lots of critical bits now that didn't exist then. That's what I love 
about Linux; you can know everything today and tomorrow will bring 
something new.

The questions start to boil down to "What are the best practices that 
(a) actually work and (b) can be implemented with reasonable budgets?" 
and "How do we evaluate the ability to implement and inspect for them?"

Would that be a reasonably fair set of questions?

Leam



More information about the Ale mailing list