Wednesday, October 22, 2014

St. Francis' Prayer for All Created Things


Having just come from a pheasant hunting trip in KS, this is meaningful. I copied and pasted it from the Arbor, a weekly newsletter from Asbury United Methodist Church in Denton.




St. Francis' Prayer for All Created Things
 
The animals of God's creation inhabit the skies, the earth, and the sea.  They share in the fortunes of human existence and have a part in human life.  God, who confers gifts on all living things, has often used the service of animals or made them reminders of the gifts of salvation.  Animals were saved from the flood and afterwards made a part of the covenant with Noah.  The paschal lamb recalls the Passover sacrifice and the deliverance from slavery in Egypt.  A giant fish saved Jonah; ravens brought bread to Elijah; animals were included in the repentance of Nineveh; and animals share in Christ's redemption of all God's creation.  We, therefore, invoke God's blessing on these animals.  As we do so, let us praise the Creator and thank God for setting us as stewards over all the creatures of the earth.

St. Francis' Prayer for All Created Things
God created us and placed us on the earth
to be stewards of all living things,
therefore let us proclaim the glory of our Creator, saying:
O God, how wonderful are the works of your hands.
Blessed are you, O Lord of the Universe; 
You create the animals and give us the ability to train them to help us in our work.
Blessed are you, O Lord of the Universe; 
You give us food from animals to replenish our energies.
Blessed are you, O Lord of the Universe; 
You give us domestic animals as companions.
Blessed are you, O Lord of the Universe; 
You care for us even as You care for the birds of the air.
Blessed are you, O Lord of the Universe; 
You offered your Son to us as the Passover lamb and in Him willed that we should be called your children.

What Would a Dog Do?


Pheasant Hunting, Teamwork, and Social Genuineness

by: James Carpenter
10-22-2014






Today's blog post comes after a week of vacation. My fellow vacationers and I were pheasant hunting in Kansas and spending time down at the lake - both before and after the pheasant hunting trip of course! During the course of our hunt something occurred to me. To share it with you, you have to understand a little bit about pheasant hunting.

Pheasant hunting is a team effort between and among men and dogs. Multiple dogs are used to locate birds nestled snugly within endless fields of milo, wheat, or some other plant that grabs at your legs and wears you out in 5 minutes. I digress. One dog catches scent, stops, and points right at the bird. The dog's tail will be straight, rigid, and the dog freezes in place. The other dogs will notice this and "honor" the point by doing the same thing. Meanwhile, on the human team we have a line of men walking through the fields in orange regalia, two at the sides of the field and one at the distant end to prevent the birds from running out the back and flying away. Together, men and dogs form a sort of square trap if it were possible.*

Now this is where the subject of this blog begins. Once the bird is found, all manner of hell breaks loose when it flies into the air and in this chaos it seems that time slowed down for me and I was all at once aware of many things. For the record, I wasn't taking drugs and I didn't just get through watching all 3 Matrix movies back to back.


The Dog Team is the Better Team


All hunting jokes aside, the dogs really do have it together. Why? Because they "keep it real." Amazingly, even dogs that haven't worked together form up a good team pretty fast. They're just hardwired to point and honor each other. Keeping it real means they don't have little social nuances that get in the way of the present moment. Imagine a dog that did have our social nuances.

"I see a bird here and I should point it out to the rest of the team but I don't want to point because Sandy (the other dog) said that I point funny last week. Why is Sandy always criticizing me? She is right though, my tail is kinda bent..."

Conversely, another dog might think...

"The problem with Sandy is that she always wants to be #1 dog out here. She HAS to charge in and be the first to find everything and brag about it on Facebook."

This layer is absent in the dogs relationships. They just are who they are and they came to do what they do. They most certainly do have social nuances - but they are genuine - established with purpose and to serve a natural function. They aren't fickle.

The Human Team is a Mixed Bag

Over on the hunting team, we do have little social nuances that influence the experience.  It first begins with expectations as we leave for the trip. I've been on several years worth of hunting trips and have come to discern some types of hunters. There are those who build expectations around how many birds they're going to bring home from the trip. The success of the hunt is measured by the number. There are those that are "there for the experience" - the success of the hunt is measured by the overall experience. There are those that want to show off their latest hunting equipment purchases and fancy new gear - the success of the hunt is the satisfaction of approval by their peers and I'm sure there are some that are a mix of all of those. This all instantaneously comes together in that chaos moment when the bird flies to reveal the effectiveness of the team. Dogs 1: Humans 0.

These nuances also shape how the team works together before the bird flies as well. Those that are about the numbers are usually the first ones taking the shots or positioning themselves to be in the most likely area where a shot is to be taken. Those that are about the experience will form up where they can obtain an overall view of the hunt. Those that want to display their new gear and fancy equipment - well they form up in the most visible spot of course! These classes of hunters and the various others will move through various phases of their hunting career until they eventually become a 'seasoned hunter'. I offer up that EVERY hunter will eventually become a seasoned hunter as they grow in experience and knowledge. Judging from the photo below, you can see where I stand in the cycle. If there were a polar opposite to seasoned hunter - I am there. My role in the human mix is to ensure other people know there is something important that needs to be done.




Seasoned Hunters and Keeping it Real


Seasoned hunters are a lot like the dogs. Genuine. They've come out to do what they do and be who they are. If you can ever get a complete group of those on the Men Team, then it may well be Humans 1: Dogs 1. (Dogs never lose, you see...)

You'll see a seasoned hunter do the following things:
1. Defer a shot to a fellow hunter and bask in the moment of the other person's enjoyment as they engage the excitement of taking the shot.
2. Tell the other hunters - good job, good shot, good ANYTHING. They're always building up the others.
3. Shooting straight: Teaching their fellow man how to hunt better and sharing their advice directly.
4. Honoring the other person, much like the dogs honor each other, to achieve the overall goal.
5. Purposefully missing the opportunity for a greater cause: safety, education, a great story to be told down through the ages, a perceived wrong against nature, etc.
6. Sharing themselves - telling the stories that made them who they are.
7.Accepting the accolades and gifts of others - not necessarily because they want or need them - but because it allows the other person the joy of expressing thanks, honor, and gift-giving.


Wouldn't it be great to work with a team like that! A team is best when it's genuine. Social goofiness is for the birds! If you want to be happy, get things done, and enjoy the moment, ask yourself :

"What would a dog do right about now?" Tip: Under no circumstances should you follow up on one trait of dogs - No butt licking.



* On my latest hunting trip I learned that the fancy tractors used today connect to multiple satellites to plant rows that are mere inches apart! In fact, if the tractor only obtains 7 satellite linkages for triangulation (hepta-angulation?) - that is considered poor! Furthermore, the tractors drives itself. The driver can sleep for all intents and purposes and the tractor will honk the horn when it has reach a point where the human should pay attention. Thus, while it is possible to configure a perfectly square field (or round one) using this technology, the land itself often creates obstacles to doing this - for example, valleys, hills, trees. All of these are fixable to form a perfect square or circle, but why waste the energy! Just plant around them and move on. That's what a dog would do.





Wednesday, September 10, 2014

An Inspiring Note about Personal Values

 
 

An Inspiring Note

by James Carpenter
9-10-2014
 
 
My Pastor sent me this today. It has great implications for our work environments. Imagine if everyone did this sort of introspection and adopted this behavior how our environments would change!


 When Benjamin Franklin was twenty-two years old--he was living in Philadelphia at the time, having run away from an oppressive apprenticeship in his native Boston--he conceived the "bold and arduous project of arriving at moral perfection." In essence, he asked himself the question: "What are the highest priorities in my life?" From this period of introspection, he emerged with twelve "virtues"--his governing values. So there would be no question in his mind what those values meant to him, he qualified every one of them with a written statement. The result of this exercise is shown below:

Temperance - "Eat not to dullness; drink not to elevation."

Silence - "Speak not but what may benefit others or yourself; avoid trifling conversation."

Order - "Let all your things have their place; let each part of your business have its time."

Resolution - "Resolve to perform what you ought; perform without fail what you resolve."

Frugality - "Make no expense but to do good to others or yourself; that is, waste nothing."

Industry - "Lose no time; be always employed in something useful; cut off all unnecessary actions."

Sincerity - "Use no hurtful deceit; think innocently and justly, and, if you speak, speak accordingly."

Justice - "Wrong none by doing injuries; or omitting the benefits that are your duty."

Moderation - "Avoid extremes; forbear resenting injuries so much as you think they deserve."

Cleanliness - "Tolerate no uncleanliness in body, clothes, or habitation."

Tranquility - "Be not disturbed at trifles, or at accidents common or unavoidable."

Chastity - "Rarely use venery but for health or offspring, never to dullness, weakness, or the injury of your own or another's peace or reputation."

Monday, August 25, 2014

Two Simple Steps to Protect Your Email Address and Phone #

by: James Carpenter, CISM, CISSP, CISA, MBA



     There are two pieces of information about you that, if they get out of control, your life starts getting out of control. Those two pieces of information are your email address and your phone number. What led me to devise a solution which controls these two data points in my life was the increasing propagation of interactions on the internet which require an email address, phone #, or other contact information to "continue" to use their service. Anytime I see the word "Free" I just laugh because nothing is free. Somehow, some way, when you give up your information - you will be contacted! There will be a cost! Therefore, I was always hesitant about giving out my email and phone # because I knew, once it was out, it was out. There was no turning back. These two simple solutions are useful when submitting resumes, filling out surveys, entering your contact information into drawings, or other situations where you don't want to give out your real information. Heck, I could even see it work great for the dating scene! For the record, I don't think I invented any of this; however, when I tell people about it, I see light bulbs going off - I see excitement - so I'm sharing it with you today.

Protecting your email

    The solution for your email is to first create or have a "home" email. This email account is your "real" email account. You've probably already got one. It's the email you use everyday. For me, this is a Gmail account but it can be any account you want. I like the idea of your real email account being an account with one of the big free email providers because you can count on it to always be available from anywhere. 



    What's great about this is, if you are unsure about giving your email out, for example when you post a resume on a public resume site, you can make up an email address for that particular scenario. If your name was Jane Doe, you could create one called Jane.D@yourdomain.us and post your resume with confidence. 

Here's some benefits:
1. If you start getting spam, you'll know right away where the compromise of your email address came from because you created that email for that particular instance.
2. You can cut all emails to that address off in one fell swoop! Simply log into your domain site and build a rule to kill emails destined for that address.
3. Best of all, by owning a domain, you have portability across your internet providers with a custom domain name you created. If you move or switch internet providers, you can keep your custom email addresses.

Protecting your phone #

    I use my cell phone for EVERYTHING! I really don't want my cell# getting out. You can do the same thing for your phone # that you can with email addresses - abstract your real phone number with a proxy number. There are probably many services that offer this but I personally use Google Voice. Services such as these allow you to obtain a free phone # and forward all calls and texts to your real phone. You no longer have to give out your real phone #. You can, ironically, find all these services and the Google Voice service by using Google. Search "Google Voice" or "Alternatives to Google Voice". 


About Privacy

    It is critical that you know by using Gmail, or Google Voice or any other "free" service that nothing is "free". There is a privacy impact; that I believe it is "impersonal" in nature. Impersonal in the sense that, no person is involved; rather, machines. Free services scan your emails and your voice-mails and extract meaning for commercial purposes. The best example I can give is this; If you send and receive a lot of emails related to playing chess, don't be surprised if the advertisements running in your email web browser start showing the latest chessboards or custom chess pieces. I'm not so sure about voice-mail; however, I do know that certain providers can translate your voice mails into text and SMS the message to you. While this is quite fascinating, it is a clear indication of voice recognition technology at work and once one can convert voice to text one can then analyze for commercial purposes, i.e. advertisements. My personal position on this is - it's worth the trade-off. There's no human reading my inbox or listening to my voice-mails and even if they were, they would immediate hang up when they found out I was always talking about the latest crystal chess pieces available. (Maybe I'll write a future article entitled "Avoid privacy problems by having a boring life"). I digress...

Closing


    The world is becoming increasingly data driven. Corporations are seeking every ounce of data they can get to extract value. This great collection of data is often referred to as "big data". It is an appropriate label because the idea is to get as much data about you (and me) as possible to market effectively or achieve some other purpose (hopefully not nefarious!) This will not change and will only increase as we enter into this new age of data driven decision making and a data driven economy. The saavy among us will therefore sieze ownership of our information and move into the age with an attitude that recognizes the value of our personal data and creates efficient mechanisms to best protect it; either by not giving it out, or by abstracting it to those who would otherwise take it for "free". Using these "free" services to your advantage in this manner creates a symbiotic relationship which benefits both parties. It doesn't have to be a one way street. 












Wednesday, August 13, 2014

Identity and Access Management Considerations in Complex Environments

Identity and Access Management 

Considerations for Complex Environments

by: James Carpenter, CISA, CISM, CISSP

A friend and I were discussing the various opportunities and challenges with the enterprise Identity and Access Management (IAM) solution we implemented years ago in a large, complex environment. There were so many aspects of IAM covered in that conversation that I felt like I had to write it down somewhere so I wouldn't forget just how complex this thing really was! Wouldn't you know it, at about the same time I saw a job posting looking for someone skilled in IAM to assist in the IAM merger of two organizations and that sealed the deal. I had my subject for a blog! Following is my list of the major lessons learned, the opportunities uncovered, considerations in planning, and other anecdotal tidbits to help others along with this complex subject.

It's a Journey!

Firstly, implementing a full-scope IAM solution is a journey. This isn't something you knock out in couple of months. I think of IAM as a journey comprised of several back to back projects; each delivering it's own type of benefit. Additionally, some of these projects are more accurately represented as program components of IAM which are ongoing forever; maintenance, if you will. I modeled it below.



Figure 1
Starting from left to right, the first two things (orange) you'll want to do is set the proper foundations which drive your automation. These foundations are establishing Role Based Access (RBAC) and the HR Actions and Criteria that your HR system will use to drive the IAM engine. These are super critical to get right. There is room for tweaking but the farther you get down the road of automation, the more impact subsequent changes can have and the more complex the analysis becomes prior to implementing those changes. Also, different companies have different HR actions that they wish to automate and some that they don't want automated. I will discuss some situations where not automating may be in your best interests later in the article.

Moving into the green shape we connect our directory. This is where we get our first massive return on investment (ROI).  It is also at this crucial point where staff skillsets start needing to change and where your first technical complexities begin. I will also elaborate on this later in the article as well. Notice that upon connecting the directory we have P1 (Project 1) 'Migrate apps to directory'. This should have been going on all along as part of an overall application strategy but it simply means - "all those other applications that you have that aren't tied to your directory authentication" - those need to be aligned. You increase the power and ROI of your IAM solution when you standardize your authentication to something that is already "hitched" to automation. You won't be building new connectors to applications per-se; rather you'll be writing new logic within existing connectors. P1 is one of those aforementioned 'forever projects'. You will always have applications onboarding in large, complex environments. Thus, the arrow extends perpetually to the right. 
     
    By the model, the next area to hit is your critical applications. You'll have to determine what those are but typically an organization will have 5-10 of these. These are applications that are the backbone of your organization, are subject to heavy controls auditing, or comprise the majority of your authentication and access needs (volume). Once you connect these critical applications, you begin another 'forever project' called 'Access Certifications', or checking the validity of your RBAC decisions on a periodic basis. Times change and so will your IAM logic which maps to your RBAC settings in your IAM. For example: When you initially established your RBAC, you may have build a model that authorized staff in Finance to have Remote Access, Finance Department Network Drive Access, and access to the Financial Application. What happens if, over time, several new applications came on board and/or the network drive structure changed such that the old directory rights are no longer valid? You'll have to update your RBAC list and consequently the logic in your IAM solution. This can be ongoing by some cyclical process or periodically assessed to ensure you don't have 'role drift' - situations where designed network and application access drift from the requirements of the job role. Doing this will take you a long way (to the good side!) in your audits.

The last step is to integrate your remaining applications. This is the last step in my model because as you mature your IAM implementation, you will note that there will be increasing complexity and a decrease in 'apparent' ROI or 'bang for your buck'. The work you do from here on out will be a balancing act best characterized by a favorite phrase of mine - "automate until it becomes painful." See Figure 2 below. The sweet spot is high benefit to the organization and low-medium complexity. 

Figure 2
Three signs of decreasing ROI when automating an IAM solution are:
1. Less bang for your buck. You put in hours, days, or months of labor into automation but only automate a small percentage of users or applications. The effort may not justify the outcome.
2. Complexity becomes unmanageable - similar to point 1 but maybe your efforts should be on the "other side" of automation - an application strategy that reduces/consolidates the number of applications you have or centralizes the authentication to your directory. You might have other problems that you needn't tackle with your IAM solution.
3. You're having trouble justifying further expansion to your leadership. Maybe an IAM technician wants to do it for the sake of your IAM solution becoming a monument to technical awesomeness but if you can't justify it, your leaders won't buy in.

 

Automation and RBAC 

By the model in Figure 1, we're still talking about orange territory here but there's plenty to say about linking your IAM solution into your HR system and directory to create automation. Common automation use-cases are employee resignations or terminations, new hires, leave of absences, and suspensions. What does your company want to do related to access in these situations? This is where your RBAC decisions come into play. Notice that in the model, I started with connecting the directory. In my experience, starting your RBAC with the directory first is a massive win. In most cases, your directory will be Microsoft's Active Directory (AD). By connecting to AD first you instantly gain automation against network file shares leveraging AD, your desktop and laptop environment, and a good chunk of all your applications leveraging AD authentication. This is a big win and here you should write your first rules.

The first rules to get established should be those around access - not necessarily the roles within an application or what network shares can be accessed - just whether the account can log in or not period. Is this account enabled or disabled? So many audit findings and incidents revolve around accounts that were not disabled in a timely manner. Linking your HR system to your directory via the IAM engine creates a rapidly compliant and effective environment for this problem. It's your first big ROI out of the box. See Figure 3 below for how this can be architected.


Figure 3
 

When wouldn't I want to automate?

Earlier, I noted that there are some situations when you don't want to automate. One such situation might be your employee portal where all employees, even former ones, can go to view their paychecks (or past paychecks), W-4, benefits, etc. I've ran into situations where some companies allow former employees to retain access to their HR system. The key here will be to limit what is accessible for former employees. You'll have to be keen on restricting access within the HR system once the employee leaves, something the IAM engine can automate.

Another situation where you might not want to disable access relates to your training system. I've worked for companies where employees and contractors could be suspended until they took mandatory online training. In such cases, their access was disabled. You might be surprised at the number of employees in a large organization that fail to take their mandatory training on time and get suspended. Of course, the real fix here is to ensure all employees take their training but in the case where some don't and have their account flagged for suspension - you'll want to leave the training access enabled so they can work their way out of suspension.

There might be a few of you out there that are saying "Automate everything! Even these two scenarios should be automated." To that I say, "Thank you" because it introduces a nice segway into the next section where I discuss a key concept - flexibility.

Architect to Promote Flexibility

As you clean up your environment and automate by building the IAM engine and adopting an application strategy that centralizes your authentication back to your directory, your directory engineers may start complaining that the directory is running slow. One reason for this is that you are aiming an increasing amount of authentication queries at the directory and it's getting bogged down. There are ways to optimize this; for example, by ensuring your users are organized properly and LDAP queries are not searching the ENTIRE directory. However, even after all optimization is done, you may need to peel off separate authentication directories to promote flexibility. See Figure 4 and 5 below for a before/after example of this.


Figure 4
In the "Before" example we see that all the organization's applications are querying a single directory. Also, there are some inefficient queries going on that are searching authentication requests from the root. Yikes! I bet it takes a long time to log in at this place! And, for all the Directory admins out there, we see the unnecessary OU that exists in every organization. You know it's true!!



Figure 5


Now we see the "After" configuration. We have created a separate directory to store user information and have synchronized it with the root directory. Also, we are only propagating what we need to authenticate the applications we move over to the new directory (Directory2). We have selected a few applications, such as our training and HR application noted above, to move over to this directory. By doing this, we have fixed the "all or nothing" problem related to enabling/disabling accounts and created some flexibility. Also note that the admins still didn't get rid of the unnecessary OU. They'll probably bring in contractors for that. :-)



Technical Complexity and Staff Skillsets

I did note that I would elaborate on staff skillsets and technical complexity. The more you automate, the less staff you'll need on the manual side of things (creating accounts, disabling accounts, modifying accounts) and the more staff you'll need on the automation side of things (managing the IAM solution) although it's not a one-for-one relationship.

One reason for this will be the mechanisms used for account touches (creating accounts, disabling accounts, and modifying accounts) will be form or web based from the IDM engine vs. logging into each application and setting up an account. Access Management staff can enter the data into a form or webpage hosted by the IAM solution and the IAM solution can create the accounts. Your goal will be to standardize on these form or web based entry points to promote consistency. Another good reason to utilize the IAM form or web based entry points is workflow. Most enterprise IAM solutions have some form of workflow. You'll want workflow for your non-RBAC (manual) processes because most access requests will need some form of approval workflow.

Another reason for the shift in skillsets will be the upkeep of the IAM itself. Connectors will need to be built to applications, troubleshot to ensure updates are occurring in a timely manner, forms and web pages developed, etc. This is an opportunity for your organization to grow your access management staff. Access management doesn't have to be a dead-end job. It can lead to IAM and subsequently workflow development which can open all kinds of doors. Once an individual understands that most applications are essentially forms and workflows atop a database and they can develop in those environments - a bright new world opens up. It's much more than programming and testing - it's talking to people, understanding business, and translating that into workflow. Good people skills and business process understanding come in handy. Have any people like that? They will be good candidates.

 

Wrapping Up

 There is much more to say on this subject such as staffing models for transitioning to an IAM, Budgeting for an IAM, project plans for implementation of an IAM, how to sell IAM to your leadership, etc but I've run out of steam!

I will finish with this: If implemented and managed properly, an IAM solution will become the backbone of an organization's access management solution, save money, increase compliance and efficiency, and provide opportunity for growth of IT staff.

If you're interested in learning more about IAM solutions or are implementing an IAM and would like assistance in planning and design please feel free to reach out to me through LinkedIn or email me at iamhelp@98g.us. I would be happy to help your organization get it done right the first time. 





Monday, July 28, 2014

Designing your career


Designing Your Career

or maybe your life?

by James Carpenter | 7-28-2014


I recently resigned from my job and in the weeks following have been engaged in the activities that all job seekers face - updating resumes, LinkedIn, references, etc. When all these activities are complete and ready to present to recruiters or submit to online job applications - that's when all the philosophical questions start coming up. If they don't come up because you thought of them yourself, they'll come up because an interviewer asks them in some form. I've had to learn this firsthand.

 What kind of job do I REALLY want? What do I want out of my next job? When I get a job, even a job that I really like, what am I doing with my income? I don't want to work for work's sake - I want to be on a path to something larger; part of something bigger. Why do I, or we,  go to work in the first place?   It's really interesting what the answers to these questions reveal. I confess that I haven't figured it all out yet. I'm still exploring these answers but I have come away with some answers for myself. My questions, answers, and this approach may help you too.

Define Who You Are

Who are you? What do you feel is your purpose for being alive? These are crucial questions because they define a compelling reason for why you work. Businesses operate according to a strategic plan so that their daily activities aren't random; rather, they are aligned to a goal. Businesses operate to make money in order to take that money and invest in their business purpose(s). Operating in this manner drives achievement. When I really analyzed who I was, I found out there are three reasons why I want to work.

1. To contribute meaningfully to something larger than myself that I believe in and am passionate about
2. To be a light to those around me and "lift up" the work environment
3. To be socially engaged and stay "connected" to life

These three reasons were founded upon my self-defined purpose for being on this planet.

The only purpose (again, speaking for myself) that I can discern which has any permanent value  is that I'm here to bring glory to God. I bring glory to Him through my work by doing those three things. For you, it may be completely different. If you were to define what your purpose is - what would it be? That is a foundational question. Like a business strategy, everything you do in life, including work, should align to that. Start here by taking the time to define who you are and what your purpose for being alive is.

Define Core Values

In addition to defining who you are, defining core values which you can express is also important. Being able to express your core values is important because it means you've thought them through enough to articulate them, defend them, and stand firmly upon them. When it really gets down to brass tacks, so far, what I've come up with for myself is:

1. Freedom - I don't want to control anybody and I don't want anybody controlling me
2. In every situation -  Be a positive factor not a negative factor

About Freedom

In my work life, I've experienced control in various sorts of ways including monetary, political, and emotional. I haven't seen physical control in the workplace yet but I'm sure I'll see it someday! In any of these situations, we're talking about the opposite of freedom. I've seen people work because they must or they will lose their quality of life - they are living paycheck to paycheck. This is a form of control and it creates fear. Related, I've seen people taken advantage of emotionally. People who are eager to please, for example (people pleasers), and people who take advantage of that. On the flip side, I've been in the position where I could control people through paychecks or politics and I've found this to be quite exhausting when I've been foolish enough to engage in that behavior. If you want a work life free of worry and full of energy, I recommend these as goals: humility, sincerity, integrity, purpose, and personal financial freedom (pay off those bills (everything!) so you can't be financially controlled!)

About Positivity

Concerning being a positive factor, I mean "don't race to criticism or negativity." There are so many opportunities at work to pursue criticism, to take part in gossip, or to self promote at the cost of others. Rise above this and be a positive factor. Find out for yourself if someone is "Bad" or "Good". Don't just go by what you've heard. Everyone deserves a chance.

Of course, these two aforementioned core values are ones that I came up with. Yours may be different.

Adding it up

When you add up "Who you are" with your "Core Beliefs" you can then start answering those bigger questions such as "Why do I work?" and "Why do I want to work for XYZ company?" In my own exploration I found out that the reasons I work simultaneously progress my own life mission and any company's mission that I might work for - a double whammy! It's not about title, power, or  a certain amount of money. For me, those are not enduring things.

I am (and you should be able to as well) now able to work my way backwards from the larger philosophical questions to those that are being asked presently. "Why do you want to work for XYZ company?" I want to work for XYZ company because I believe in what you're doing, I want to be a part of it, and it aligns to what I'm doing in my life. As an example, I offer up what that translation looks like for me:

Who I am, or want to be (in a job): Someone who contributes meaningfully to something larger than myself and that I"m passionate about.

What I believe in: Not to be controlled or control others

Career Design

Find a job (or series of jobs which form a career):
a.  That aligns to my passions, or that interests me enough to become passionate about it
b. Where I can be a positive influence
c. That pays enough to meet my personal objectives

Reflecting on this things, it turns out that I don't NEED a high paying, high power job, replete with all the stress. I need a fulfilling job that meets enduring ends.