Privileged Attack Vectors: Building Effective Defense Strategies - - PowerPoint PPT Presentation

privileged attack vectors
SMART_READER_LITE
LIVE PREVIEW

Privileged Attack Vectors: Building Effective Defense Strategies - - PowerPoint PPT Presentation

Privileged Attack Vectors: Building Effective Defense Strategies Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com Agenda The Threat Landscape Sample Cases What is Privileged Access Management? Twelve


slide-1
SLIDE 1

Privileged Attack Vectors: Building Effective Defense Strategies

Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com

slide-2
SLIDE 2

Agenda

  • The Threat Landscape
  • Sample Cases
  • What is Privileged Access

Management?

  • Twelve Steps to Privilege Security
  • BeyondTrust
slide-3
SLIDE 3

The Threat Landscape

slide-4
SLIDE 4

The Infonomics of Data Breaches

slide-5
SLIDE 5

The Cyber Attack Chain

  • 1. Perimeter

Exploitation

  • 2. Privilege Hijacking

& Escalation

  • 3. Lateral Movement

& Exfiltration

Attacker exploits asset vulnerabilities to gain entry … hijacks privileges or leverages stolen/cracked passwords … and compromises other network resources. Vulnerable Systems Unmanaged Credentials and Excessive Privileges Limited Visibility

slide-6
SLIDE 6

How Are Threat Actors Gaining Privileges ?

  • Guessing
  • Dictionary attacks
  • Brute Force
  • Pass the Hash
  • Security questions
  • Password resets
  • Vulnerabilities
  • Misconfigurations
  • Exploits
  • Malware
  • Social engineering
  • MFA flaws
  • Default credentials
  • Anonymous
  • Predictable
  • Shared credentials
  • Temporary
  • Reused

Insider Threats External Threats Hidden Threats

slide-7
SLIDE 7

Sample Cases

slide-8
SLIDE 8

EMPLOYEES AND OTHER INSIDERS HAVE UNNECESSARY ACCESS

Employees, vendors and other insiders are often given excessive access to systems and data – and that access can go unmonitored.

Source: Verizon 2017 Data Breach Investigations Report

88% of cases, attackers compromise an organization using

definable patterns established as early as 2014

slide-9
SLIDE 9

Privilege abuse was behind 81% of insider misuse incidents.

Source: Verizon 2017 Data Breach Investigations Report

CREDENTIALS ARE SHARED AND UNMANAGED

Passwords are created and shared, but aren’t audited, monitored or managed with discipline or accountability.

slide-10
SLIDE 10

IT ASSETS COMMUNICATE UNCHECKED

Desktops, laptops, servers and applications communicate and

  • pen paths to sensitive assets and data.

Source: Verizon 2015 Data Breach Investigations Report

99% of successful attacks leverage known vulnerabilities

slide-11
SLIDE 11

Privileged Access Management

slide-12
SLIDE 12

Privileged Access Management

  • Provides an integrated approach to

enterprise password management

  • Enforces least privilege on all endpoints with-
  • ut compromising productivity or security
  • Ensures administrator and root compliance
  • n Unix, Linux, Windows and Mac
  • Identifies high-risk users and assets by

teaming behavioral analytics and risk data with security intelligence from best-of-breed security solutions

  • Achieves unified visibility over accounts,

applications, and assets that they protect

ENTERPRISE PASSWORD MANAGEMENT PRIVILEGE MANAGEMENT SESSION MANAGEMENT ADVANCED REPORTING & ANALYTICS USER BEHAVIOR MONITORING ACTIVE DIRECTORY BRIDGING

Privileged Access Management

slide-13
SLIDE 13

Twelve Steps to Privilege Security

slide-14
SLIDE 14

Step 1: Improve Accountability for Privileged Passwords

Asset Based:

  • Privileged account discovery
  • Develop permissions model
  • Rotate passwords and keys
  • Workflow process and auditing
  • Define session monitoring
  • Segmentation
  • User behavior analysis
slide-15
SLIDE 15

Step 2: Implement Least Privilege on Endpoints

  • Remove administrator rights
  • Implement standard user permissions
  • Enforce application control
  • Eliminate multiple accounts
  • Context-aware rules
  • Session monitoring
  • Privileged file monitoring
  • Layered, multifactor authentication
  • Auditing of privileged access

Asset & User Based: Windows & Mac OSX (Desktop, Laptop, Notebook, Tablet, Virtual, etc.)

slide-16
SLIDE 16

Step 3: Leverage Application Risk Levels

  • Limit application privileges to users and

assets based on documentable risks

  • Vulnerabilities, unmanaged,

unauthorized, and privileged

  • Measure risk for applications executed

by user and asset

slide-17
SLIDE 17

Step 4: Implement Least Privilege on Servers

Script & Command Auditing

  • Scripts, commands & shells
  • Session monitoring
  • Keystroke logging
  • Application logging

Privileges

  • Auditing
  • Context aware
  • Application risk analysis
  • Segmentation

Industry Standards

  • Authentication
  • Ticketing
  • API integration
  • Searching
  • Alerting
slide-18
SLIDE 18

Step 5: Privilege Management on Network Devices

  • Default or common passwords that are not configured correctly
  • Shared credentials across multiple devices for management simplicity
  • Excessive password ages due to fear of changing or lack of management

capabilities

  • Compromised or insider accounts making changes to allow exfiltration of data
  • Outsourced devices and infrastructure where changes in personnel, contracts,

and tools expose credentials to unaccountable individuals

slide-19
SLIDE 19

Step 6: Privilege Management for Virtual and Cloud

Cloud-Agnostic – Private or Public

  • License flexibility
  • Asset inventory integration
  • Docker and container aware
  • Discover online and offline instances
  • Leverage hypervisor APIs
  • Agent technologies
  • Respects OA and application hardening
  • Fully automated for passwords & API
  • Auditing, reporting and change-aware
  • Proxy access
  • Session management
slide-20
SLIDE 20

Step 7: Privilege Management for IoT, IIoT, ICS,SCADA

Zones

Internet Public Private Air-Gapped

Segmentation

Users Servers DMZ Guest Dumb Devices

Device Type & Risk

IoT IIoT ICS SCADA

Communications and Restricted Lateral Movement Privileged Access

slide-21
SLIDE 21

Step 8: Privilege Automation for DevOps

  • Only allow approved assets; identify unacceptable variations
  • Identify security risks and automatically remediate them
  • Ensure configuration hardening
  • Eliminate all locations for hard-coded credentials
  • Platform-agnostic, from cloud to on premise
  • Limit all users, including privileged access, in the DevOps

automated workflow

  • Provide security and performance visibility to ensure security and

automation success

slide-22
SLIDE 22

Step 9: Privilege Management Unification

Correlate Data Between Disciplines Correlate Data for Risks Threat Analytics Pivot Privileged Data Profile Assets, Users, and Applications RBAC and Grouping Workflow and Process Validation Third-Party Integration

ENTERPRISE PASSWORD MANAGEMENT PRIVILEGE MANAGEMENT SESSION MANAGEMENT ADVANCED REPORTING & ANALYTICS USER BEHAVIOR MONITORING ACTIVE DIRECTORY BRIDGING

slide-23
SLIDE 23

Step 10: Privileged Account Integration

slide-24
SLIDE 24

Step 11: Privileged Auditing and Recovery

  • Audit and roll back changes and identify who, what, where,

and when they were performed.

  • Restore from the Active Directory recycle bin without having

to extract backups.

  • Audit, report, and recover across a complex Windows or

heterogeneous environments.

slide-25
SLIDE 25

Step 12: Integrate the Identity Access Stack

slide-26
SLIDE 26
slide-27
SLIDE 27

Morey J. Haber

  • 20+ years security experience
  • Articles on Secure World, Dark Reading, CSO

Online, etc.

  • Author of “Privileged Attack Vectors: Building

Effective Cyber-Defense Strategies to Protect Organizations” & ”Asset Attack Vectors” (covering Vulnerability Management) – both available from Apress Media

slide-28
SLIDE 28

PROVEN

13,000+ customers worldwide; extensive partner community

COMPLETE

Comprehensive, integrated, intelligent PAM

LEADER

Gartner, Forrester, KuppingerCole

INNOVATIVE

30+ years of privilege security firsts + expansive roadmap

slide-29
SLIDE 29

Infrastructure Endpoints Secure Remote Access

  • Secure credentials with

Privileged Identity and manage sessions with Privileged Access

  • Empower and protect your

service desk with the most secure Remote Support software

Password & Session Management

  • Gain accountability over

shared accounts

  • Eliminate hard-coded

passwords

  • Monitor privileged sessions

and user behavior

  • Enforce appropriate

credential usage

  • Eliminate Admin\root rights
  • Enforce Application &

command control

  • Efficiently delegate Windows,

Mac, Unix & Linux privileges and elevate

  • Enforce appropriate use
  • Risk based privilege decisions

Privilege Management

On-Premise

PowerBroker Privileged Access Management Platform

Cloud Hybrid

slide-30
SLIDE 30
  • Table1. PASM Vendors and Their Key Capabilities

PAM Industry Leader

Leader: Forrester PIM Wave, 2016 Leader: Gartner Market Guide for PAM, 2017

slide-31
SLIDE 31

Questions?

Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com