how federal agencies can build a layered defense for privileged accounts

65
External Attacks Against Privileged Accounts How Federal Agencies Can Build a Layered Defense in Preparation for a Layered Attack

Upload: beyondtrust

Post on 19-Mar-2017

225 views

Category:

Software


0 download

TRANSCRIPT

Page 1: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

External Attacks Against

Privileged Accounts

How Federal Agencies Can Build a

Layered Defense in Preparation for a Layered Attack

Page 2: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Agenda

• How did we get here?

• What is the result?

• By the numbers.

• Moving Forward.

• Summary

Page 3: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

How Did We Get Here?

Page 4: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Vanishing Perimeter

Ongoing requirements to expose on-prem

resources to employees, partners, customers,

and vendors.

Page 5: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Complex Requirements

Our infrastructure is extremely complex

Page 6: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Friction Free

Demand for better

collaboration with

business partners

without the complex

security requirements

Page 7: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Cost

Advanced security comes with a

financial cost

Page 8: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

User Education

Social engineering

and phishing is

successful due to lack

of good on-going user

education

Page 9: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

How Did 2016 Look?

Page 10: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

6,435 CVE’s Published in 2016

Top Vendors in 2016:

793 492548698(2 Remote 8 Local

Gain Privilege)

(10 Elevated local

user privilege)

Page 11: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Over

450Vulnerabilities with

exploit code

available

Over

250Vulnerabilities could

be mitigated if user

does not have

admin rights

Over

750local exploits

that do not require

elevated rights

Page 12: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

What is the Result?2017 U.S. Federal Government Survey Findings

Page 13: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

50%

Page 14: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Have experienced

1-2 breaches in the

last 24 months

Page 15: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

61%

Page 16: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Believe it is rare attackers

leverage vulnerabilities to

gain access to privilege

Page 17: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

80%

Page 18: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Of people felt aging infrastructure

has an impact on

• Ability to achieve mission

• Achieve compliance

• Reduce cyber security risk

Page 19: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Top 3 Risks

Page 20: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Risks identified by senior

leadership

• Application vulnerabilities

• Nation state attacks

• Malware

Page 21: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

26%

Page 22: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Admitted to storing passwords in spreadsheets

Page 23: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

By the Numbers

Page 24: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

63%

Page 25: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Insider & Privilege Abuse

Confirmed data breaches

leveraging:

• Weak Password

• Default Password

• Stolen Passwords

Page 26: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

33%

Page 27: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Insider & Privilege Abuse

Incidents involve end users

who have access to sensitive

data as a requirement to do

their jobs.

Page 28: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

40%

Page 29: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Of errors occurred due to user error

because of a capacity shortage

Honorable Mention

Publishing Errors – Publishing a document to the internet

Misconfiguration – ex. Mistake in a firewall rule exposes access

Page 30: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

99%

Page 31: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Malware hashes are seen

for only 58 seconds or less.

Most malware was seen

only once.

Malware is smart enough to

modify its own hash

Page 32: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

1 min, 40 sec

Page 33: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Median time for the first user of a phishing

campaign to open the malicious email

Page 34: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

3 min, 45 sec

Page 35: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Median time to the first

click on the attachment

Page 36: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

12%

Page 37: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Users who clicked on the

malicious attachments

allowing an attack to succeed.

Page 38: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

10

Page 39: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Number of Vulnerabilities that account

for 85% of breaches

96% of All breaches are from

vulnerabilities over 1 year old. Our

challenge is what 10 vulnerabilities

Page 40: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

10 & 100

Page 41: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Half of all exploitations happen

between 10 and 100 days after

the vulnerability is published

Page 42: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

90% of Cyberespionage breaches capture

trade secrets or proprietary information

14% of Insider and Privilege Misuse are in

leadership roles

14% of Insider and Privilege Misuse are

system admin and developers

Page 43: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Moving ForwardEstablish Achievable Goals

Page 44: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Implement controls so a

compromise can be contained

Page 45: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Establish security zones so

systems and credentials are not

used outside of those zones

Page 46: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Tie accounts to

humans and avoid

users leveraging

unnamed accounts

like root

Page 47: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

When possible avoid

using credentials in

apps leverage

SAML / claims

Page 48: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Have access rules that

adjust based on a systems

increasing risk or users

decreasing trust

Page 49: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Moving ForwardRecommendations

Page 50: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Prioritize Security

Page 51: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Multi-factor Authentication

Page 52: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Ongoing User Education

Page 53: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Prioritization with Patching

Page 54: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Automated Credential

Management

Page 55: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Understand and Limit

Privilege Access

Page 56: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Application Control

Page 57: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Account Reduction

Page 58: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

User Behavior Analysis

on All Users

Page 59: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Audit, Audit, Audit and Audit

Page 60: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Common Sense

Page 61: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Network Segmentation

Page 62: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Egress Filtering

Page 63: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Next Steps

1. Prepare today so you are ready to stop

breaches tomorrow.

2. Establish a process to secure identities

and define trust level?

3. Understand the difference between

security asset and identity risk

4. Talk to a solutions provider about how to

identify and address gaps.

Page 64: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Q & A

Page 65: How Federal Agencies Can Build a Layered Defense for Privileged Accounts

Trust the solution relied upon by more than 200 federal

departments, agencies and all five branches of the US Military.

Learn more about BeyondTrust solutions for Privilege Access

Management, and Vulnerability Management in government.

www.beyondtrust.com/government

[email protected]

800-234-9072