How to set up laptop for corporate usage, so contents can be erased.
Hi all, we are hiring a remote worker and will be supplying a laptop to them. The laptop will be running a Debian variant of Linux on it.
We are a small shop and this is the first time we have entrusted somebody outside of our small pool of trusted employees.
We have sensitive client data on the laptop that they need to access for their day-to-day work.
However, if something goes wrong, and they do the wrong thing, we want to be able to send out some kind of command or similar, that will completely lock, block, or wipe the sensitive data.
We don't want any form of spying or tracking. We are not interested in seeing how they use the computer, or any of the logs. We just want to be able to delete that data, or block access, if they don't return the laptop when they leave, or if they steal the laptop, or if they do the wrong thing.
What systems are in place in the world of Linux that could do this?
Any advice or suggestions are greatly appreciated? Thank you.
As someone else said, I'd go with an MDM vendor instead of trying to build something yourself.
The most secure thing would be to have the person connect to a remote server and do all their work on the remote server, essentially just using the laptop like a thin client.
Provide a Laptop with Windows on it, because that is easier to lockdown.
apply desirable OS lock downs like blocking usb ports prevent storage devices, don't give the user admin rights, etc.
Setup a VPN server (openvpn should do) and configure the laptop with a VPN client. Configure the client so it blocks network connections that don't go via the VPN. If you want to give them internet access you'll need a proxy and firewall and DLP solution. At this point it all gets very complex and expensive.
The real answer is you are probably screwed without investing a bunch of time, effort, and cost.
You might get away with more basic security measures if the user has very limited IT knowledge.
I suggest getting legal advice before you give the user access to your data in the manner you intend.
That Crowd strike outage was pretty evident of how easy windows is to secure. Linux had the same failure but since admins are able to secure the OS in a more granular way and can update packages in situ without touching the registry, Linux users could still boot into their OS and patch the broken file. No such luck in Windows.
Windows users could boot into safe mode and modify/delete the problem file. There just wasn't any tool to roll out this fix 'automatically'.
Once IT dealt with it I stopped paying attention to the situation, but I wonder if any tool was created to help the poor souls managing thousands of PCs?
@Charzard4261@horse_battery_staple , any computer running Crowdstrike, Bitlocker, and no remote access during the prebooted environment would certainly require manual intervention. Also, all those Bitlocker keys having to be manually inserted for computers that required physically being present? Hell in a shell.
Absolutely this for windows. Linux however allowed crowdstrike to run without it being a boot time event. I administer a mixed environment. I worked 18 hours straight remediating that outage.
No. If the device was encrypted it had to be done locally. Laptops had to either be wiped and restored to backup or a sysadmin had to reset the machine locally with a local admin. There was no remote remediation possible unless the sysadmin gave the user a local admin account and password.
On Linux I was able to push the new file over the network and reboot the machine.
On windows companies were shipping laptops or restoring to backups.
I dual boot windows and EndeavourOS. Every 6 to 12 months I make a concerted effort to make the switch 100% but it hasn't worked out yet. So while Linux is great windows is unavoidable. In this use case I suspect managing Windows tools will be simpler, though I agree that effectiveness next to Linux options won't be equal.
At home I'm 100% linux. When I was freelance I built out pure linux systems for small businesses. Nextcloud, Odoo, Google Docs were what I deployed. I still support some clients and it's only getting easier.
DLP solutions are honestly a joke. 99% of the case they only cost you a fortune and prevent nothing. DLP is literally a corporate religion.
What you mentioned also makes sense if you are windows shop running AD. If you are not, setting it up to lock 1 workstation is insane.
Also, the moment the data gets put on the workstation you failed. Blocking USB is still a good idea, but does very little (network exfiltration is trivial, including with DLP solutions). So the idea to use remotely a machine is a decent control, and all efforts and resources should be put in place to prevent data leaving that machine.
Obviously even this is imperfect, because if I can see the data on my screen I can take a picture and OCR it. So the effort needs to go in ensuring the data is accessed on a need basis.
That was kinda my point. Securing a laptop that will have access to data you want to protect from loss is a near bottomless pit of issues. There comes a point you have to do a risk assessment and apply a level of security that meets your legal requirements and contractual obligations. I'm sure this is all doable on Linux as well but the low cost / easily available tools are mostly for Windows.
I suspect that taking the "secured remote session" approach is probably good enough for their needs. It just needs a client app you can trust to respect the security rules they want to enforce (no screen shots, no screen recording, no data transfers for any sort, etc).
OCRing what is on screen is not really stoppable unless you force them to keep their camera on so you can monitor them 24/7. But if you try hard enough there is usually a way around most security measures.
Either way, they need to decide what the risk impact vs likelihood profile is, and what the business can tolerate. They'll need to discuss it with legal and data protection folks to assess that.
One tip is to embed records and values that look meaningful, but are unique, into the copy of the data given to the specific employee. This can be used to potentially prove that a data breach was a result of something that employee did. We like to put QUID's as invisible watermarks in document headers. These trigger our DLP systems which is always funny cos its usually an employee who is leaving and wants to keep something. I love those conversions.
I like the idea of canaries in documents, I think is a good point but obviously it only applies to certain types of data. Still a good idea.
Looking at OP, they seem a small shop, with a limited budget. Seriously the best recommendation I think is to use some kind of remote storage for data (works as long as the employee complies) and to make sure the access control is done in a decent way (reducing the blast of employee behaving maliciously). Anything else is probably out of reach for a small company without a security department.
Maybe I sounded too harsh, that's just because in this post I have seen all kinds of comments who completely missed the point (IMHO) and suggested super complicated technical implementations that show how disconnected some people can be from real technical operations, despite the good tech skills.