privileged attack vectors: building effective defense ... · • 20+ years security experience •...

31
Privileged Attack Vectors: Building Effective Defense Strategies Morey J. Haber Chief Technology Officer [email protected]

Upload: others

Post on 22-May-2020

20 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Privileged Attack Vectors: Building Effective Defense ... · • 20+ years security experience • Articles on Secure World, Dark Reading, CSO Online, etc. • Author of “Privileged

Privileged Attack Vectors:

Building Effective

Defense Strategies

Morey J. Haber

Chief Technology Officer

[email protected]

Page 2: Privileged Attack Vectors: Building Effective Defense ... · • 20+ years security experience • Articles on Secure World, Dark Reading, CSO Online, etc. • Author of “Privileged

Agenda

• The Threat Landscape

• Sample Cases

• What is Privileged Access

Management?

• Twelve Steps to Privilege Security

• BeyondTrust

Page 3: Privileged Attack Vectors: Building Effective Defense ... · • 20+ years security experience • Articles on Secure World, Dark Reading, CSO Online, etc. • Author of “Privileged

The Threat Landscape

Page 4: Privileged Attack Vectors: Building Effective Defense ... · • 20+ years security experience • Articles on Secure World, Dark Reading, CSO Online, etc. • Author of “Privileged

The Infonomics of Data Breaches

Page 5: Privileged Attack Vectors: Building Effective Defense ... · • 20+ years security experience • Articles on Secure World, Dark Reading, CSO Online, etc. • Author of “Privileged

The Cyber Attack Chain

1. Perimeter

Exploitation

2. Privilege Hijacking

& Escalation

3. Lateral Movement

& Exfiltration

Attacker exploits asset

vulnerabilities to gain entry

… hijacks privileges or

leverages stolen/cracked

passwords

… and compromises other

network resources.

Vulnerable

Systems

Unmanaged Credentials

and Excessive Privileges

Limited

Visibility

Page 6: Privileged Attack Vectors: Building Effective Defense ... · • 20+ years security experience • Articles on Secure World, Dark Reading, CSO Online, etc. • Author of “Privileged

How Are Threat Actors Gaining Privileges ?

• Guessing

• Dictionary attacks

• Brute Force

• Pass the Hash

• Security questions

• Password resets

• Vulnerabilities

• Misconfigurations

• Exploits

• Malware

• Social engineering

• MFA flaws

• Default credentials

• Anonymous

• Predictable

• Shared credentials

• Temporary

• Reused

Insider Threats External Threats Hidden Threats

Page 7: Privileged Attack Vectors: Building Effective Defense ... · • 20+ years security experience • Articles on Secure World, Dark Reading, CSO Online, etc. • Author of “Privileged

Sample Cases

Page 8: Privileged Attack Vectors: Building Effective Defense ... · • 20+ years security experience • Articles on Secure World, Dark Reading, CSO Online, etc. • Author of “Privileged

EMPLOYEES AND OTHER INSIDERS

HAVE UNNECESSARY ACCESS

Employees, vendors and other insiders are often given

excessive access to systems and data – and that access

can go unmonitored.

Source: Verizon 2017 Data Breach Investigations Report

88% of cases, attackers compromise an organization using

definable patterns established as early as 2014

Page 9: Privileged Attack Vectors: Building Effective Defense ... · • 20+ years security experience • Articles on Secure World, Dark Reading, CSO Online, etc. • Author of “Privileged

Privilege abuse was behind 81% of insider misuse incidents.

Source: Verizon 2017 Data Breach Investigations Report

CREDENTIALS ARE SHARED

AND UNMANAGED

Passwords are created and shared, but aren’t audited,

monitored or managed with discipline or accountability.

Page 10: Privileged Attack Vectors: Building Effective Defense ... · • 20+ years security experience • Articles on Secure World, Dark Reading, CSO Online, etc. • Author of “Privileged

IT ASSETS COMMUNICATE

UNCHECKED

Desktops, laptops, servers and applications communicate and

open paths to sensitive assets and data.

Source: Verizon 2015 Data Breach Investigations Report

99% of successful attacks leverage known vulnerabilities

Page 11: Privileged Attack Vectors: Building Effective Defense ... · • 20+ years security experience • Articles on Secure World, Dark Reading, CSO Online, etc. • Author of “Privileged

Privileged Access

Management

Page 12: Privileged Attack Vectors: Building Effective Defense ... · • 20+ years security experience • Articles on Secure World, Dark Reading, CSO Online, etc. • Author of “Privileged

Privileged Access Management

• Provides an integrated approach to

enterprise password management

• Enforces least privilege on all endpoints with-

out compromising productivity or security

• Ensures administrator and root compliance

on Unix, Linux, Windows and Mac

• Identifies high-risk users and assets by

teaming behavioral analytics and risk data

with security intelligence from best-of-breed

security solutions

• Achieves unified visibility over accounts,

applications, and assets that they protect

ENTERPRISE

PASSWORD

MANAGEMENT

PRIVILEGE

MANAGEMENT

SESSION

MANAGEMENT

ADVANCED

REPORTING &

ANALYTICS

USER

BEHAVIOR

MONITORING

ACTIVE

DIRECTORY

BRIDGING

Privileged

Access

Management

Page 13: Privileged Attack Vectors: Building Effective Defense ... · • 20+ years security experience • Articles on Secure World, Dark Reading, CSO Online, etc. • Author of “Privileged

Twelve Steps to Privilege

Security

Page 14: Privileged Attack Vectors: Building Effective Defense ... · • 20+ years security experience • Articles on Secure World, Dark Reading, CSO Online, etc. • Author of “Privileged

Step 1: Improve Accountability for Privileged Passwords

Asset Based:

• Privileged account discovery

• Develop permissions model

• Rotate passwords and keys

• Workflow process and auditing

• Define session monitoring

• Segmentation

• User behavior analysis

Page 15: Privileged Attack Vectors: Building Effective Defense ... · • 20+ years security experience • Articles on Secure World, Dark Reading, CSO Online, etc. • Author of “Privileged

Step 2: Implement Least Privilege on Endpoints

• Remove administrator rights

• Implement standard user permissions

• Enforce application control

• Eliminate multiple accounts

• Context-aware rules

• Session monitoring

• Privileged file monitoring

• Layered, multifactor authentication

• Auditing of privileged access

Asset & User Based: Windows & Mac OSX (Desktop, Laptop, Notebook,

Tablet, Virtual, etc.)

Page 16: Privileged Attack Vectors: Building Effective Defense ... · • 20+ years security experience • Articles on Secure World, Dark Reading, CSO Online, etc. • Author of “Privileged

Step 3: Leverage Application Risk Levels

• Limit application privileges to users and

assets based on documentable risks

• Vulnerabilities, unmanaged,

unauthorized, and privileged

• Measure risk for applications executed

by user and asset

Page 17: Privileged Attack Vectors: Building Effective Defense ... · • 20+ years security experience • Articles on Secure World, Dark Reading, CSO Online, etc. • Author of “Privileged

Step 4: Implement Least Privilege on Servers

Script & Command Auditing

• Scripts, commands & shells

• Session monitoring

• Keystroke logging

• Application logging

Privileges

• Auditing

• Context aware

• Application risk analysis

• Segmentation

Industry Standards

• Authentication

• Ticketing

• API integration

• Searching

• Alerting

Page 18: Privileged Attack Vectors: Building Effective Defense ... · • 20+ years security experience • Articles on Secure World, Dark Reading, CSO Online, etc. • Author of “Privileged

Step 5: Privilege Management on Network Devices

• Default or common passwords that are not configured correctly

• Shared credentials across multiple devices for management simplicity

• Excessive password ages due to fear of changing or lack of management

capabilities

• Compromised or insider accounts making changes to allow exfiltration of data

• Outsourced devices and infrastructure where changes in personnel, contracts,

and tools expose credentials to unaccountable individuals

Page 19: Privileged Attack Vectors: Building Effective Defense ... · • 20+ years security experience • Articles on Secure World, Dark Reading, CSO Online, etc. • Author of “Privileged

Step 6: Privilege Management for Virtual and Cloud

Cloud-Agnostic – Private or Public

• License flexibility

• Asset inventory integration

• Docker and container aware

• Discover online and offline instances

• Leverage hypervisor APIs

• Agent technologies

• Respects OA and application hardening

• Fully automated for passwords & API

• Auditing, reporting and change-aware

• Proxy access

• Session management

Page 20: Privileged Attack Vectors: Building Effective Defense ... · • 20+ years security experience • Articles on Secure World, Dark Reading, CSO Online, etc. • Author of “Privileged

Step 7: Privilege Management for IoT, IIoT, ICS,SCADA

Zones

Internet

Public

Private

Air-Gapped

Segmentation

Users

Servers

DMZ

Guest

Dumb Devices

Device Type & Risk

IoT IIoT ICS SCADA

Communications and Restricted Lateral Movement

Privileged Access

Page 21: Privileged Attack Vectors: Building Effective Defense ... · • 20+ years security experience • Articles on Secure World, Dark Reading, CSO Online, etc. • Author of “Privileged

Step 8: Privilege Automation for DevOps

• Only allow approved assets; identify unacceptable variations

• Identify security risks and automatically remediate them

• Ensure configuration hardening

• Eliminate all locations for hard-coded credentials

• Platform-agnostic, from cloud to on premise

• Limit all users, including privileged access, in the DevOps

automated workflow

• Provide security and performance visibility to ensure security and

automation success

Page 22: Privileged Attack Vectors: Building Effective Defense ... · • 20+ years security experience • Articles on Secure World, Dark Reading, CSO Online, etc. • Author of “Privileged

Step 9: Privilege Management Unification

Correlate Data Between Disciplines Correlate Data for Risks

Threat Analytics Pivot Privileged Data

Profile Assets, Users,

and ApplicationsRBAC and Grouping

Workflow and Process Validation Third-Party Integration

ENTERPRISE

PASSWORD

MANAGEMENT

PRIVILEGE

MANAGEMENT

SESSION

MANAGEMENT

ADVANCED

REPORTING &

ANALYTICS

USER

BEHAVIOR

MONITORING

ACTIVE

DIRECTORY

BRIDGING

Page 23: Privileged Attack Vectors: Building Effective Defense ... · • 20+ years security experience • Articles on Secure World, Dark Reading, CSO Online, etc. • Author of “Privileged

Step 10: Privileged Account Integration

Page 24: Privileged Attack Vectors: Building Effective Defense ... · • 20+ years security experience • Articles on Secure World, Dark Reading, CSO Online, etc. • Author of “Privileged

Step 11: Privileged Auditing and Recovery

• Audit and roll back changes and identify who, what, where,

and when they were performed.

• Restore from the Active Directory recycle bin without having

to extract backups.

• Audit, report, and recover across a complex Windows or

heterogeneous environments.

Page 25: Privileged Attack Vectors: Building Effective Defense ... · • 20+ years security experience • Articles on Secure World, Dark Reading, CSO Online, etc. • Author of “Privileged

Step 12: Integrate the Identity Access Stack

Page 26: Privileged Attack Vectors: Building Effective Defense ... · • 20+ years security experience • Articles on Secure World, Dark Reading, CSO Online, etc. • Author of “Privileged
Page 27: Privileged Attack Vectors: Building Effective Defense ... · • 20+ years security experience • Articles on Secure World, Dark Reading, CSO Online, etc. • Author of “Privileged

Morey J. Haber

• 20+ years security experience

• Articles on Secure World, Dark Reading, CSO

Online, etc.

• Author of “Privileged Attack Vectors: Building

Effective Cyber-Defense Strategies to Protect

Organizations” & ”Asset Attack Vectors”

(covering Vulnerability Management) – both

available from Apress Media

Page 28: Privileged Attack Vectors: Building Effective Defense ... · • 20+ years security experience • Articles on Secure World, Dark Reading, CSO Online, etc. • Author of “Privileged

PROVEN

13,000+ customers

worldwide; extensive

partner community

COMPLETE

Comprehensive,

integrated, intelligent PAM

LEADER

Gartner, Forrester,

KuppingerCole

INNOVATIVE

30+ years of privilege

security firsts +

expansive roadmap

Page 29: Privileged Attack Vectors: Building Effective Defense ... · • 20+ years security experience • Articles on Secure World, Dark Reading, CSO Online, etc. • Author of “Privileged

Infrastructure

Endpoints

Secure Remote

Access

Secure credentials with

Privileged Identity and

manage sessions with

Privileged Access

Empower and protect your

service desk with the most

secure Remote Support

software

Password & Session

Management

Gain accountability over

shared accounts

Eliminate hard-coded

passwords

Monitor privileged sessions

and user behavior

Enforce appropriate

credential usage

Eliminate Admin\root rights

Enforce Application &

command control

Efficiently delegate Windows,

Mac, Unix & Linux privileges

and elevate

Enforce appropriate use

Risk based privilege decisions

Privilege

Management

On-Premise

PowerBroker Privileged Access Management Platform

Cloud Hybrid

Page 30: Privileged Attack Vectors: Building Effective Defense ... · • 20+ years security experience • Articles on Secure World, Dark Reading, CSO Online, etc. • Author of “Privileged

Table1. PASM Vendors and Their Key Capabilities

PAM Industry Leader

Leader: Forrester PIM Wave, 2016 Leader: Gartner Market Guide for PAM, 2017

Page 31: Privileged Attack Vectors: Building Effective Defense ... · • 20+ years security experience • Articles on Secure World, Dark Reading, CSO Online, etc. • Author of “Privileged

Questions?

Morey J. Haber

Chief Technology Officer

[email protected]