Solved

Staff want to build his own server- Suggestions and IT policy

Posted on 2016-10-17
4
90 Views
Last Modified: 2016-10-17
Hi

I have a Staff who is from a different department  and has some IT knowledge  and  says that he has his own PC and he want to build as a server ( Using open source software) and give access to 40 users within our network.
I had told him that we can setup this, but is in a hurry to set this up by himself.

The PC is his own and I may have to give additional permission to install the software and our Antivirus is licensed only for our organisation PC, he may say he will purchase the AV.

I bit concerned about the security implications and wondering a staff who is not in the IT department maintaining own server and don’t want others to think that IT is incapable of setting this server. I have not looked into the staff IT policy still.
Please suggest,  any suggestions much appreciated.
Thanks
0
Comment
Question by:lianne143
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 7

Accepted Solution

by:
No More earned 250 total points
ID: 41846281
Simply tell him no ! Personal computer / server don't belong inside the company, as you never know what he will have installed on it.

And again, company software = company computers only

You are correct to be concerned about security, last thing what i would like to see is, some wanna be IT messing up the network

Also, if you allow this and his server will have some major hardware failure, which would cause damaged port on switch, it goes on your head and personally , I would be quite upset about this
0
 
LVL 28

Assisted Solution

by:masnrock
masnrock earned 125 total points
ID: 41846383
Who is supposed to support everything? And what are the current IT policies?

Have everything go through official processes. Company owned equipment, company owned software, and managed by IT. Also should have to follow company standards and guidelines. Otherwise, you open the door to other users requesting the same thing. And they will all point to this one project as a precedent.

Here is another issue that you open up if you allowed his project the way you want it: Since he owns the hardware and software, what happens if he leaves? Does he get to take that with him, along with any data on the server? Leaves potential for network, policy, and potential legal issues.

Get upper management involved if necessary, but do not allow this. Also, that user could already be trying to get the system built and running.
0
 
LVL 63

Assisted Solution

by:btan
btan earned 125 total points
ID: 41846441
A simple no as personal issued asset and a managed server system will have different risk profile and measures to harden to reduce the exposure to internal and external threat.

It is not so much that the user is not in IT dept or the user is not IT savvy as compared to a true server admin. But this once off turn key approach using open software is going to open up more concern and review on the
- accountability for the compliance of the security baseline,
- access control based on role and least privileged,
- proper segregation of network,
- data protection of company sensitive info and
- incident handling and response processes

The above need to clear and sorted out as a personnal and actual production server will differs. The risk increases as measures are lacking if they are not addressed and go ahead hastily.
0
 

Author Comment

by:lianne143
ID: 41846535
Thanks you so much for your sugessions, you all have been so helpful.I will award your points
David Fiala
masnrock
btan
0

Featured Post

MIM Survival Guide for Service Desk Managers

Major incidents can send mastered service desk processes into disorder. Systems and tools produce the data needed to resolve these incidents, but your challenge is getting that information to the right people fast. Check out the Survival Guide and begin bringing order to chaos.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are looking at this article, you have most likely been hit by some version of ransomware and are trying to find out if there is anything you can do, or what way you should react - READ ON!
Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question