mitigating risk in aging federal it systems

35
Mitigating Risk in Aging Federal IT Shunta Sanders Sr. Systems Engineer Federal Division

Upload: beyondtrust

Post on 22-Jan-2018

189 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Mitigating Risk in Aging Federal IT Systems

Mitigating Risk in

Aging Federal IT

Shunta Sanders

Sr. Systems Engineer

Federal Division

Page 2: Mitigating Risk in Aging Federal IT Systems

Today’s Topics

• Federal Cyber

Security Threat

Survey

• Key Strategies for

Securing Aging

Information

Systems

Page 3: Mitigating Risk in Aging Federal IT Systems

Methodology

• Online survey fielded in

January/February 2017

• 105 responses

• 27 questions

• Limited to:

• U.S. Federal Government

• Mid- to Senior-level IT

Management

• Some Involvement with PAM

Page 4: Mitigating Risk in Aging Federal IT Systems

What Worries Federal IT Managers

MalwareNation State

AttacksApplication

Vulnerabilities

44%44%45%

Page 5: Mitigating Risk in Aging Federal IT Systems

What They are Doing to Combat Risks

63%

91%

88%

Privileged

access

management

Vulnerability

patching

Most important in securing information

environment

Nearly two-thirds report less

than fully mature vulnerability

remediation programs

Page 6: Mitigating Risk in Aging Federal IT Systems

Aging Infrastructure Leads to Costly Breaches

Experienced a

data breach in

the last 6 months

42%

1 in 8 experienced a

breach in the past 30 days

Federal IT systems

experience a breach

every 347 days

Biggest impacts from insider

privilege abuse are lost…

Productivity MoneyReputation

Cost of data breaches across

all Federal IT systems is

$637 Million annually

Breaches Happen

Breaches Hurt

Page 7: Mitigating Risk in Aging Federal IT Systems

Aging Infrastructure Breeds Risk

Biggest impact of aging

IT infrastructure?

Efficiency ComplianceCyber Risk

81%Say aging IT

infrastructure

impacts risk

61%Say aging IT

infrastructure

is a roadblock

to compliance

Page 8: Mitigating Risk in Aging Federal IT Systems

Change is difficult, takes time, and cost money

Government employees

have to contend with:

• Mainframes

• Legacy apps

• Aging OS's

• Aging infrastructure

• Limited budget

• Limited staff

• Status quo in thinking

Page 9: Mitigating Risk in Aging Federal IT Systems

How Can Agencies Address These

Threats?

Page 10: Mitigating Risk in Aging Federal IT Systems

Manage privileged credentials with

greater discipline, eliminate

administrator rights and enforce

least privilege

Page 11: Mitigating Risk in Aging Federal IT Systems

Old or new infrastructure, shared

passwords and SSH keys continue to

persist across host systems, databases,

network devices and applications.

Page 12: Mitigating Risk in Aging Federal IT Systems

Automated Password

Management

Page 13: Mitigating Risk in Aging Federal IT Systems

Local accounts can create significant risk

with everything from weak password

management to account deprovisioning

backdoors.

Page 14: Mitigating Risk in Aging Federal IT Systems

Understand and Limit

Privilege Access

Page 15: Mitigating Risk in Aging Federal IT Systems

Many traditional security tools are

architected for on premise environments.

When extended to the cloud or across

hybrid environments, they leave gaps that

allow for excessive privileged access and

permissions

Page 16: Mitigating Risk in Aging Federal IT Systems

PAM & VMSSecuring Cloud Assets

Page 17: Mitigating Risk in Aging Federal IT Systems

Unauthorized installation of software

applications can insert risk into your

environment.

Page 18: Mitigating Risk in Aging Federal IT Systems

Endpoint

Least Privilege

Page 19: Mitigating Risk in Aging Federal IT Systems

Given it’s easy access and liberal

governance, systems administrators often

use the sudo command for everyday

commands and tasks- bypassing

organizational policy, network security

and compliance requirements.

Page 20: Mitigating Risk in Aging Federal IT Systems

Replace Open Source Tools

Page 21: Mitigating Risk in Aging Federal IT Systems

Isolate legacy systems to reduce

attack surfaces

Page 22: Mitigating Risk in Aging Federal IT Systems

Often the weak link in the security chain

is remote access by third-party vendors

and contractors

Page 23: Mitigating Risk in Aging Federal IT Systems

Controlled network

separation and

activity monitoring.

Page 24: Mitigating Risk in Aging Federal IT Systems

Laptops travel around the world

…clouds stop and start as

needed.

Page 25: Mitigating Risk in Aging Federal IT Systems

Cycling Passwords on Remote Systems

Page 26: Mitigating Risk in Aging Federal IT Systems

Improve the maturity of vulnerability

management through automated

patching

Page 27: Mitigating Risk in Aging Federal IT Systems

With today’s complex

infrastructures how do you know

what’s plugged into your

network- and what risks they

pose?

Page 28: Mitigating Risk in Aging Federal IT Systems

Discovery and Assessment

Page 29: Mitigating Risk in Aging Federal IT Systems

Unite threat intelligence from

multiple sources to better

prioritize risks across the

environment

Page 30: Mitigating Risk in Aging Federal IT Systems

Few vulnerability management

tools extend beyond a data

dump of found vulnerabilities.

Page 31: Mitigating Risk in Aging Federal IT Systems

Prioritize Remediation Based on Active Applications

Page 32: Mitigating Risk in Aging Federal IT Systems

Traditional security analytics

solutions struggle to correlate

diverse data to discern hidden

risks amidst the noise

Page 33: Mitigating Risk in Aging Federal IT Systems

Use Threat Analytics forBetter Decision Making

Page 34: Mitigating Risk in Aging Federal IT Systems

4 Best Practices to Address Threats

Improve the maturity of vulnerability management through automated patching

Manage privileged credentials with greater discipline, eliminate administrator rights and enforce least privilege

Isolate Systems to reduce attack surfaces

Unite threat intelligence from multiple sources to better prioritize risks across the environment and pinpoint anomalies to identify

patterns indicating malicious activity

Page 35: Mitigating Risk in Aging Federal IT Systems

Mr. Shunta Sharod Sanders

Sr. Sales Engineer

BeyondTrust - Federal Division

[email protected]

301-325-0232