9. Systems
⇐
&rArr
A Slightly ad-hoc Security Modelling
5th: Governance - the inside attack
Oophaga ⇔ CAcert
root key
2 admins
offline root
revocation at business level
vetting of sysadms
Доверяй, но проверяй
(trust, but verify)