Privileged Attack Vectors: Building Effective Defense Strategies
Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com
Privileged Attack Vectors: Building Effective Defense Strategies - - PowerPoint PPT Presentation
Privileged Attack Vectors: Building Effective Defense Strategies Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com Agenda The Threat Landscape Sample Cases What is Privileged Access Management? Twelve
Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com
Management?
Exploitation
& Escalation
& Exfiltration
Attacker exploits asset vulnerabilities to gain entry … hijacks privileges or leverages stolen/cracked passwords … and compromises other network resources. Vulnerable Systems Unmanaged Credentials and Excessive Privileges Limited Visibility
Insider Threats External Threats Hidden Threats
Source: Verizon 2017 Data Breach Investigations Report
definable patterns established as early as 2014
Privilege abuse was behind 81% of insider misuse incidents.
Source: Verizon 2017 Data Breach Investigations Report
Source: Verizon 2015 Data Breach Investigations Report
enterprise password management
teaming behavioral analytics and risk data with security intelligence from best-of-breed security solutions
applications, and assets that they protect
ENTERPRISE PASSWORD MANAGEMENT PRIVILEGE MANAGEMENT SESSION MANAGEMENT ADVANCED REPORTING & ANALYTICS USER BEHAVIOR MONITORING ACTIVE DIRECTORY BRIDGING
Privileged Access Management
Asset Based:
Asset & User Based: Windows & Mac OSX (Desktop, Laptop, Notebook, Tablet, Virtual, etc.)
assets based on documentable risks
unauthorized, and privileged
by user and asset
Script & Command Auditing
Privileges
Industry Standards
capabilities
and tools expose credentials to unaccountable individuals
Cloud-Agnostic – Private or Public
Internet Public Private Air-Gapped
Users Servers DMZ Guest Dumb Devices
IoT IIoT ICS SCADA
Communications and Restricted Lateral Movement Privileged Access
automated workflow
automation success
Correlate Data Between Disciplines Correlate Data for Risks Threat Analytics Pivot Privileged Data Profile Assets, Users, and Applications RBAC and Grouping Workflow and Process Validation Third-Party Integration
ENTERPRISE PASSWORD MANAGEMENT PRIVILEGE MANAGEMENT SESSION MANAGEMENT ADVANCED REPORTING & ANALYTICS USER BEHAVIOR MONITORING ACTIVE DIRECTORY BRIDGING
and when they were performed.
to extract backups.
heterogeneous environments.
Online, etc.
Effective Cyber-Defense Strategies to Protect Organizations” & ”Asset Attack Vectors” (covering Vulnerability Management) – both available from Apress Media
13,000+ customers worldwide; extensive partner community
Comprehensive, integrated, intelligent PAM
Gartner, Forrester, KuppingerCole
30+ years of privilege security firsts + expansive roadmap
Infrastructure Endpoints Secure Remote Access
Privileged Identity and manage sessions with Privileged Access
service desk with the most secure Remote Support software
Password & Session Management
shared accounts
passwords
and user behavior
credential usage
command control
Mac, Unix & Linux privileges and elevate
Privilege Management
On-Premise
PowerBroker Privileged Access Management Platform
Cloud Hybrid
Leader: Forrester PIM Wave, 2016 Leader: Gartner Market Guide for PAM, 2017
Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com