one microsoft security pitchwtstreaming.blob.core.windows.net/...presentation... · • steal any...
TRANSCRIPT
Securing
Privileged
Access
Information
Protection
Datacenter
Security
Securing High
Value AssetsInformation Worker
and
Device Protection
Admin Environment
On-Premises
Datacenters
3rd Party SaaS
Customer and
Partner AccessBranch Office Intranet and Remote PCs
High Value Assets
3rd Party IaaS
Mobile Devices
Microsoft AzureOffice 365
Azure Active
Directory
Rights Management
Services Key Management
ServicesIaaSPaaS
More than 200 days (varies by industry)
First Host Compromised Domain Admin Compromised Attack Discovered
Research & Preparation Attacker Undetected (Data Exfiltration)
24-48 Hours
Active Directory and Administrators control all the assets
under attack
One small mistake can
lead to attacker control
Attackers Can
• Steal any data
• Modify
documents
• Impersonate users
• Disrupt business
operations
Active Directory and Administrators control all the assets
Tier 2 Workstation &
Device Admins
Tier 0Domain &
Enterprise Admins
Tier 1Server Admins
1. Beachhead (Phishing Attack, etc.)
2. Lateral Movementa. Steal Credentials
b. Compromise more hosts &
credentials
3. Privilege Escalationa. Compromise unpatched servers
b. Get Domain Admin credentials
4. Execute Attacker Missiona. Steal data, destroy systems, etc.
b. Persist Presence
24-48 Hours
http://aka.ms/pthdemo
How to protect your privileges against these attacks
2-4 weeks 1-3 months 6+ months
Attack Defense
Three Stage Mitigation Plan
http://aka.ms/SPAroadmap
1. Separate Admin account for admin tasks
3. Unique Local Admin Passwords
for Workstationshttp://Aka.ms/LAPS
2. Privileged Access Workstations (PAWs) Phase 1 - Active Directory adminshttp://Aka.ms/CyberPAW
4. Unique Local Admin
Passwords for Servershttp://Aka.ms/LAPS
2-4 weeks 1-3 months 6+ months
First response to the most frequently used attack techniques
First response to the most frequently used attack techniques2-4 weeks 1-3 months 6+ months
Top Priority Mitigations
Attack Defense
2. Time-bound privileges (no permanent admins)http://aka.ms/PAM http://aka.ms/AzurePIM
1. Privileged Access Workstations (PAWs) Phases 2 and 3 –All Admins and additional hardening
(Credential Guard, RDP Restricted Admin, etc.)http://aka.ms/CyberPAW
4. Just Enough Admin (JEA)
for DC Maintenancehttp://aka.ms/JEA
9872521
6. Attack Detectionhttp://aka.ms/ata
5. Lower attack surface
of Domain and DCs http://aka.ms/HardenAD
2-4 weeks 1-3 months 6+ months
Build visibility and control of administrator activity, increase protection against typical follow-up attacks
3. Multi-factor for elevation
2-4 weeks 1-3 months 6+ monthsAttack Defense
2. Smartcard or Passport
Authentication for all adminshttp://aka.ms/Passport
1. Modernize Roles and
Delegation Model
3. Admin Forest for Active
Directory administratorshttp://aka.ms/ESAE
5. Shielded VMs for
virtual DCs (Server 2016
Hyper-V Fabric)http://aka.ms/shieldedvms
4. Code Integrity
Policy for DCs
(Server 2016)
2-4 weeks 1-3 months 6+ months
Move to proactive security posture
2-4 weeks 1-3 months 6+ monthsAttack Defense
How Can Microsoft Services Help?
Assess your current risk level and build a plan
Prioritized
Tailored to your needs
Rapid deployment of proven solutions
Support and operationalize new technologies
Accelerate deployment to maximize your defenses!
ASSUME BREACH
Service
Delivery Management
Proactive
Services
Problem Resolution Services
Premier Support
Cyber Incident Response
Respond - Incident Response via PremierBased on proven response practices
Response ScenarioNon-malicious or Internal
Response ScenarioMalicious - External
What Every Customer Needs to Do Roadmap to improve your cybersecurity position