And who watches YOU may I ask? That's the question 99% of CIOs ask me. When you get canned and have 4 minutes to leave the building, what happens to all of this?
Well, my ldap account would be disabled the moment my boss decides to fire me when he fills out the 'terminate employee' workflow. That for the most part locks me down hard.
At that point a whole huge series of events go into motion. First the lost of my ldap privs would disable my access to email, desktop login's around campus, VPN, Databases, etc.
Next the workflow would notify all everyone required. People in my department would then move to do each individuals jobs. Our software specialist would come to my office to reclaim any software I have checked out, Our PC admin would come reclaim my notebook and other hardware. One of the three guys with access to the same stuff I have such as the vpn/tunneling server would revoke my keys (even though access would already be disabled via ldap). Even the network jacks in my room are placed into a 'dead end' vlan automatically. Finally our security admin would disable my ID and forward my extension to where ever the workflow says it should go. Lastly, security would remove me from the premise and take my badge.
About the only thing that could be bad is the fact I know the root passwords. However our servers are behind a firewall on a vlan with very restrictive acls. We have not had to fire an IT person yet, but the last time we had a network admin leave we did change all of those passwords with in 3 days of his departure. I'd have to not just be on campus, but be plugged into a jack on the right vlan to even make use of the root password. (I've also been trying to move all of our systems to all sudo and a disabled root account).
Eventually, someone would then go though and do an audit on my machines in preparation for the replacement. Because our only public facing ssh server would have my account revoked and because my cert for vpn is revoked (and account disabled) anything non-standard I setup would be useless to me anyway. They would also need to go though my computer and read the source code of any checked out projects I may be working on (and if I was fired so rapidly probably read the code of any project I worked on). They would also need to pry my iPad out of my hands.
We have a minimum of 2 people for every critical system. Most systems have 3. We do audits at least twice a year and try to hit them quarterly. Things have come a long way from a single know it all admin and a bunch of support staff when I started. I'm proud of what I've helped build.
Their biggest problem wouldn't be a security concern. It would be how do we find a guy who can handle all this shit for what we can afford to pay.
Yes RDP can be secured and it's probably fine if you only have a handful of computers you need to expose to the internet. Yes, no one should ever be running as admin even locally. However the biggest use of RDP for us is not home workers (who have notebooks and a vpn), but IT staff who need to do administrative functions from off campus. This means using an admin account at some point.
Further more we are obviously only talking about off campus here because you would never use a VPN on campus (vpn from your lan into your lan?). We are also not talking about VDI because there are even better clients for handling that. The VPN really makes sense even with security taken out of the equation. We have probably 50 heavy VPN users. Are you really suggestion that if we wanted to give them RDP access to a desktop we NAT 50 public IP addresses? I have over 80 servers, if I was going to ssh or vnc/rdp into them again I'd need to waste another 80 ip's. Instead I have only 2 public addresses to worry about. The ssh server and the vpn server. We would have just one, but I need that ssh server in case the vpn breaks (I don't want to drive 30 minutes).
I'm more worried about a intern writing a bad piece of code that exposes company data then I am a ex-employee getting access after they are fired.
This is turning out to be a far better discussion then I expected.