Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking & Finance Review®

Global Banking & Finance Review® - Subscribe to our newsletter

Company

    GBAF Logo
    • About Us
    • Advertising and Sponsorship
    • Profile & Readership
    • Contact Us
    • Latest News
    • Privacy & Cookies Policies
    • Terms of Use
    • Advertising Terms
    • Issue 81
    • Issue 80
    • Issue 79
    • Issue 78
    • Issue 77
    • Issue 76
    • Issue 75
    • Issue 74
    • Issue 73
    • Issue 72
    • Issue 71
    • Issue 70
    • View All
    • About the Awards
    • Awards Timetable
    • Awards Winners
    • Submit Nominations
    • Testimonials
    • Media Room
    • FAQ
    • Asset Management Awards
    • Brand of the Year Awards
    • Business Awards
    • Cash Management Banking Awards
    • Banking Technology Awards
    • CEO Awards
    • Customer Service Awards
    • CSR Awards
    • Deal of the Year Awards
    • Corporate Governance Awards
    • Corporate Banking Awards
    • Digital Transformation Awards
    • Fintech Awards
    • Education & Training Awards
    • ESG & Sustainability Awards
    • ESG Awards
    • Forex Banking Awards
    • Innovation Awards
    • Insurance & Takaful Awards
    • Investment Banking Awards
    • Investor Relations Awards
    • Leadership Awards
    • Islamic Banking Awards
    • Real Estate Awards
    • Project Finance Awards
    • Process & Product Awards
    • Telecommunication Awards
    • HR & Recruitment Awards
    • Trade Finance Awards
    • The Next 100 Global Awards
    • Wealth Management Awards
    • Travel Awards
    • Years of Excellence Awards
    • Publishing Principles
    • Ownership & Funding
    • Corrections Policy
    • Editorial Code of Ethics
    • Diversity & Inclusion Policy
    • Fact Checking Policy
    Original content: Global Banking and Finance Review - https://www.globalbankingandfinance.com

    A global financial intelligence and recognition platform delivering authoritative insights, data-driven analysis, and institutional benchmarking across Banking, Capital Markets, Investment, Technology, and Financial Infrastructure.

    Copyright © 2010-2026 - All Rights Reserved. | Sitemap | Tags

    Editorial & Advertiser disclosure

    Global Banking & Finance Review® is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    1. Home
    2. >Technology
    3. >How a Permissions Report Could Have Plugged the Hole in New Zealand’s Leaky Servers
    Technology

    How a Permissions Report Could Have Plugged the Hole in New Zealand’s Leaky Servers

    Published by Gbaf News

    Posted on October 26, 2012

    6 min read

    Last updated: January 22, 2026

    Add as preferred source on Google
    How a Permissions Report Could Have Plugged the Hole in New Zealand’s Leaky Servers - Technology news and analysis from Global Banking & Finance Review
    Why waste money on news and opinion when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    Rob SobersRob Sobers, Technical Manager with data governance specialist Varonis Systems www.varonis.com, analyses what went wrong when various files were available on New Zealand public access kiosks – and offers up some recommendations on the lessons that can be learned from this public sector governance fiasco…  

    Earlier this month, journalist and researcher Keith Ng blogged about a massive security hole in the New Zealand Ministry of Social Development’s (MSD) network.

    According to Ng, he was able to simply walk up to a public kiosk in the NZ Work and Income office and — without having to resort to cracking a password or planting a trojan — immediately gained access to thousands upon thousands of sensitive files.

    How sensitive were these files?
    According to the news reports from the Southern Hemisphere, the researcher was able to browse, read, and modify a variety of files containing invoices and a variety of other financial data, as well as call system logs and files linking children to medical prescriptions, plus the identities of children in special needs programmes.

    Accessing financial records without permission is one thing, but files involving children – and children with special needs – are an entirely different data protection ballgames.

    The $64,000 question, of course, is how did this happen – and arguably more important from a governance perspective, is the problem a repeatable occurrence?

    Our observations are that there are two leading possibilities: either the kiosks were logged in to a local or remote server using an administrative account (e.g. Domain Admin) with full access to all data on the network; or that the kiosks were logged in with a `normal’ privilege account, but with the file shares incorrectly `permissioned,’ thus allowing global access.

    Most security professionals will find it difficult to believe that the kiosks were logged in with administrator permissions, but this possibility cannot be ruled out.

    The latter possibility, meanwhile – that of broken/excessive permissions – is actually a very common governance problem that our clients experience, and turn to us for professional solutions that not only work, but also will pass muster for relevant governance best practice and regulatory reasons.

    And with version 3.0 of the PCI DSS rules – which mandate a number of rules on organisations that process credit and debit card transactions – this issue is an important one.

    This leads us rather neatly into the next question, namely – what could have been done to prevent this data security disaster from happening?

    Unplugging the kiosks, of course, is only the first step. Truth be told, the kiosks are not the problem. There are many much larger information governance problems at stake here – and at the heart of the data leak headache.

    We decided to approach the issue by offering a few governance tips for any interested parties, as there are some clear lessons that can be learned:
    1) Locate any exposed, sensitive data
    Exposed data can exist in many different forms, not least because IT systems tend to auto-archive and replicate a variety of information, whether it exists in a structured or unstructured format.

    From this step, IT professionals should use a data classification framework to scan their file servers and so determine where their organisation’s most sensitive content resides – and where it is exposed to more people than it should be exposed to.

    Once you have located your organisation’s sensitive data files, you need to ensure that only the right people have access, and then monitor access activity against that sensitive data to ensure that authorised users are not abusing their access.

    If you are CSO/CISO, you will be looking for a solution that is capable of advising monitoring staff – at all times – where all their sensitive data is located, whether – and where – it is over-exposed, and who is accessing that data.

    The bottom line here is that, if someone creates a file with a social security number – or patient ID – and places it into a folder that offers public share access for a kiosk to access, you will want a security platform that alerts key personnel immediately.
     
    2) Identify and remove global access groups from ACLs
    As an IT professional, you should be analysing where `everyone’ or `authenticated users’ appear on ACLs – Access Control Lists – and remove them from the system.

    This step can be a toughie, for the non-trivial reason that it is a major task to trawl through every ACL on every file server or NAS device looking for `everyone’ and you will almost certainly have to pull the global access group without cutting off the people who really need access to the data.
    3) Log and monitor your super users
    This step in the governance process involves setting up alerts for whenever anyone is granted super user and/or administrator privileges.

    This process also involves periodically reviewing the list of people who have privileged access on the platform in question.
    Seasoned governance professionals should also review their IT audit trail to observe – and track – what the super users are doing with their elevated rights.

    Even if the kiosks were mistakenly set up to run under a super user account, if the audit logging function were enabled, then it would almost certainly have noticed an inordinate amount of super user activity from the public kiosks’ IP addresses.
    4) Assign and involve data owners
    This fourth step involves getting what IT professionals call stakeholder buy-in – in the case of access to children’s medical records, for instance, this access should be granted and reviewed not by the IT function, but by the business unit that is responsible for managing the patients – i.e. the medical director.

    By transferring this responsibility to the people who are most equipped to make access control decisions (i.e. data owners), not only do you – as an IT security and governance specialist – end up with better decisions, but you also relieve some of the burden on IT.
     
    So how hard can it be?
    Many of the comments on Ng’s posts were along the lines of `Rookie mistake’ or `Security 101′ but the stark reality is that the process of information governance is much harder than people think, especially in an age where data is somewhat of a contagion and is being created – and replicated – at such a staggering pace.

    In response to the industry commentators such as Ng, I would like ask the rhetorical question: without an automated solution, how would the audit software function know which folders were mistakenly placed with open access to everyone?
    Our observations here at Varonis Systems suggest that it only takes one frustrated person around half a minute to add `everyone’ to an ACL – but it could take several years to discover and correct the access control failure.

    Perhaps worse, once the records are found, how does the IT function know whether the over-exposed data was stolen by someone who isn’t as harmless as Keith Ng?

    That’s the even larger governance question that New Zealand’s government is facing right now.
     
     
     
     
     
     
    More from Technology

    Explore more articles in the Technology category

    Image for Innovation Through Partnership: The Role of External Tech Teams
    Innovation Through Partnership: The Role of External Tech Teams
    Image for Nominations Open for Technology Awards 2026
    Nominations Open for Technology Awards 2026
    Image for Nominations Open for Innovation Awards 2026
    Nominations Open for Innovation Awards 2026
    Image for Archie earns industry recognition across G2, Capterra, and SoftwareReviews
    Archie Earns Industry Recognition Across G2, Capterra, and SoftwareReviews
    Image for The Bankaool Transformation: How a Regional Mexican Bank Became a Fintech Disruptor
    The Bankaool Transformation: How a Regional Mexican Bank Became a FinTech Disruptor
    Image for Submit Your Entry Today for Digital Banking Awards 2026
    Submit Your Entry Today for Digital Banking Awards 2026
    Image for Behavioral AI in Financial Services: Moving Beyond Automation Toward Human Understanding
    Behavioral AI in Financial Services: Moving Beyond Automation Toward Human Understanding
    Image for Submit Your Entry for Brand of the Year Awards Technology Bahrain 2026
    Submit Your Entry for Brand of the Year Awards Technology Bahrain 2026
    Image for Entries Now Open for Best Islamic Open Banking Burkina Faso APIs 2026
    Entries Now Open for Best Islamic Open Banking Burkina Faso APIs 2026
    Image for Entrepreneurial Discipline in the AI Economy: Insights from Dmytro Lavryniuk
    Entrepreneurial Discipline in the AI Economy: Insights From Dmytro Lavryniuk
    Image for Entries Now Open for Best New Digital Wallet Innovation Award 2026
    Entries Now Open for Best New Digital Wallet Innovation Award 2026
    Image for Call for Entries: Best Digital Wallet 2026
    Call for Entries: Best Digital Wallet 2026
    View All Technology Posts
    Previous Technology PostEnsuring Compliance With Stringent Data Security Regulations
    Next Technology PostSecurity Best Practice – How to Keep the Keys to the Kingdom Safe