Se ha denunciado esta presentación.
Se está descargando tu SlideShare. ×

External Attacks Against Privileged Accounts - How Federal Agencies Can Build a Layered Defense

Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Próximo SlideShare
Website security
Website security
Cargando en…3
×

Eche un vistazo a continuación

1 de 11 Anuncio

External Attacks Against Privileged Accounts - How Federal Agencies Can Build a Layered Defense

Descargar para leer sin conexión

This presentation examines the types of attacks that try to exploit privileged credentials, particular in a governmental environment, and explores defensive strategies to bring privileges, and the associated threats, under complete visibility and control.

This presentation examines the types of attacks that try to exploit privileged credentials, particular in a governmental environment, and explores defensive strategies to bring privileges, and the associated threats, under complete visibility and control.

Anuncio
Anuncio

Más Contenido Relacionado

Presentaciones para usted (20)

Anuncio

Similares a External Attacks Against Privileged Accounts - How Federal Agencies Can Build a Layered Defense (20)

Más de BeyondTrust (20)

Anuncio

Más reciente (20)

External Attacks Against Privileged Accounts - How Federal Agencies Can Build a Layered Defense

  1. 1. External Attacks Against Privileged Accounts How Federal Agencies Can Build a Layered Defense in Preparation for a Layered Attack
  2. 2. What’s Privilege got to do with it? The least-privilege approach has gained a lot of credibility recently thanks to one notorious name: Edward Snowden. In this highly publicized breach classified information was accessed via privileges. In response NSA announced it would reduce system administrator privileges by 90%. “Insider and privilege misuse” was identified once again by the 2016 Verizon Data Breach Investigations Report as one of the highest ranking basic patterns of confirmed breach activity. Topped only slightly by miscellaneous errors. MISCELLANEOUS ERRORS INSIDER & PRIVILEGE MISUSE PHYSICAL THEFT
  3. 3. Internal threats may be malicious (designed to cause harm) or unintentional (the result of human error), exposing weaknesses in the agency’s defenses and policies. Regardless of intent, insiders can do significant damage quickly, as they are already inside perimeter-layer security. External threats are designed to exploit vulnerabilities in networks and endpoints; they often seek to gain a foothold where they can act as an insider. Once an attacker gains administrative access, it is easy to make configuration changes that enable the installation of malicious software, and alter security controls for unfettered access to sensitive information. Understanding the Threat to Privileged Accounts Not all insiders are created equal. What happens when an external threat starts to look like an insider?
  4. 4. Malicious Threats are Surprisingly Predictable ATTACK PRIVILEGED ACCOUNTS TO GAIN ENTRY INTO THE INFORMATION SYSTEM ACCESS ANOTHER ENDPOINT REPEAT UNTIL REACHING THE DESIRED SYSTEM OR DATA TAKE ACTION STEAL DATA, ATTACK THE SYSTEM We know what you are saying - how can that possibly be? But external attacks tend to follow the same general pattern. Attackers want to gain control over as many privileged accounts as they possibly can to work laterally across your agency network until they find what they are looking for.
  5. 5. Exploiting Privileged Accounts Try to long on with elevated privileges trying a simple Run should do the trick.. Survey local user privileges - which groups do they belong to? Bait and wait… place an infected file and wait for another user to open it…infecting a second endpoint Crawl through the endpoint’s memory…are there any plaintexts passwords, domain credentials and Kerberos tickets ? To the attacker getting into your system is just problem solving …if one tactic doesn’t work just try another, and another, and another.
  6. 6. A Layered Defense for a Layered Attack Your response to the potential threat of an external attack should address all three attack layers. Be proactive today so you are ready to stop malicious actions tomorrow. Gain Entry Access Endpoints Take Action
  7. 7. Defend Against Gained Entry User Education It’s tough to counteract a person’s natural curiosity. We just want to click that link! Keep phishing top of mind for users. What to look for and what to do if they receive something suspicious. Endpoint Protection Ensure users are running only approved applications with the proper privileges to stop malware before it is installed. Vulnerability Management 99% of exploited vulnerabilities occurred more than a year after the vulnerability was identified and published! Deploy a solution that automatically identifies and rectifies vulnerabilities across the network. Native tools are rarely sufficient.
  8. 8. Defend Against Access Least Privilege Called out in nearly every Federal Cyber Strategy and Mandate, this is a real game changer in protecting your agency’s information systems. Don’t Grant privileges to users. Grant privileges to applications and tasks without providing administrator credentials. This helps IT achieve control and close potential security gaps. Privileged Password Management Ensure all passwords are randomized and rotated automatically on a scheduled basis, or upon check-in. This reduces the threat surface by reducing the window of time an exploited password can be utilized.
  9. 9. Defend Against Malicious Action Behavior Analytics Implementing automated solutions that set baselines for normal behavior, observes changes and identify anomalies that signal critical threats . This can isolate questionable behavior to detect a threat early. This capability is specifically addressed in NIST SP800-53 guidance on control IR- Incident Response. Session Recording The worst case scenario becomes reality- an attacker gains entry. Now what? To be FISMA compliant you must be able to remediate and report on the incident. Beyond compliance you need to keep moving ahead to achieve your mission. Session recording allows you to track how those exploited credentials were used through replay of the session. Now you can form a complete remediation plan based on fact and report as required.
  10. 10. Next Steps 1. Prepare today so you are ready to stop breaches tomorrow. 2. Assess your systems- can you prevent entry, access and action? 3. Talk to a solutions provider about how to address gaps.
  11. 11. Trust the solution relied upon by more than 200 federal departments, agencies and all five branches of the US Military. Learn more about BeyondTrust solutions for Privilege Access Management, and Vulnerability Management in government. www.beyondtrust.com/government federalsales@beyondtrust.com 800-234-9072

×