the role of privilege in recent breaches - asimm · • 90% of our staff is service oriented...

30
Security Solutions Inc. Anthony Meyer Regional SE, Canada CyberArk Luc Gagne North America Sales Director IAM Concepts The Role of Privilege in Recent Breaches

Upload: others

Post on 20-May-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Role of Privilege in Recent Breaches - ASIMM · • 90% of our staff is service oriented (Solu‘ons’ Architects, Developers, Specialists and Project Managers) • We offer

Security Solutions Inc.

AnthonyMeyerRegionalSE,CanadaCyberArk

LucGagneNorthAmericaSalesDirectorIAMConcepts

The Role of Privilege in Recent Breaches

Page 2: The Role of Privilege in Recent Breaches - ASIMM · • 90% of our staff is service oriented (Solu‘ons’ Architects, Developers, Specialists and Project Managers) • We offer

Medical Center

About•  PrimaryHospital&Level1TraumaCenter

•  TeachingHospitalforaUniversity

Whathappened•  6,000+Computers&connecteddeviceshitbyRansomwarein2017

•  Refusedtopay&decidedtorebuild

Page 3: The Role of Privilege in Recent Breaches - ASIMM · • 90% of our staff is service oriented (Solu‘ons’ Architects, Developers, Specialists and Project Managers) • We offer

Gaining Access..

AHacker

Intranet

DMZ

RDP

# Weak password gives access to DMZ machine # Finds hash and moves into trusted zone

1

# Discovers IT admin creds with domain privileges # Erases VMware backups to prevent OS roll backs

2

Page 4: The Role of Privilege in Recent Breaches - ASIMM · • 90% of our staff is service oriented (Solu‘ons’ Architects, Developers, Specialists and Project Managers) • We offer

Deploy, Collect and Wait

Intranet

AHacker

# Deploys ransomware to 6k machines; crippling vital systems for client care

3

# Attacker is presumed to have been inside the network for <1 week

4

Page 5: The Role of Privilege in Recent Breaches - ASIMM · • 90% of our staff is service oriented (Solu‘ons’ Architects, Developers, Specialists and Project Managers) • We offer

Remediation

5

DMZ# CyberArk engaged for remediation

5

Intranet

# Vault installed and total remediation completed in 6 weeks 6

Page 6: The Role of Privilege in Recent Breaches - ASIMM · • 90% of our staff is service oriented (Solu‘ons’ Architects, Developers, Specialists and Project Managers) • We offer

Key takeaways

•  Total cost of remediation effort is over $10M

•  If an attacker owns the infrastructure, they can cripple the business in an instant

•  Unmonitored admin credential usage can be devastating, especially without a behavioral analytics platform

•  Password policies remain subject to human error without tool assistance

Page 7: The Role of Privilege in Recent Breaches - ASIMM · • 90% of our staff is service oriented (Solu‘ons’ Architects, Developers, Specialists and Project Managers) • We offer

Entertainment Company

About •  American entertainment company that produces, acquires and distributes

movies What happened •  Destructive malware erases infrastructure. Sensitive data was stolen and

publicized

7

Page 8: The Role of Privilege in Recent Breaches - ASIMM · • 90% of our staff is service oriented (Solu‘ons’ Architects, Developers, Specialists and Project Managers) • We offer

The Attack

8

AHacker

# Attacker utilized a spear phishing to get inside the network

1

# Attacker harvested credentials found on the client PC. Credentials were used to move laterally

2

# Usernames and passwords for admins were kept in Word files with names like Computer Passwords

3

Page 9: The Role of Privilege in Recent Breaches - ASIMM · • 90% of our staff is service oriented (Solu‘ons’ Architects, Developers, Specialists and Project Managers) • We offer

The Attack: continued..

9

Intranet

AHacker

# 7 sets of credentials were found and studio’s entire network mapped. This information was “hard-coded” into destructive malware

3

Page 10: The Role of Privilege in Recent Breaches - ASIMM · • 90% of our staff is service oriented (Solu‘ons’ Architects, Developers, Specialists and Project Managers) • We offer

Key Takeaways

•  Attackers spent a long time in reconnaissance mode without causing any immediate harm.

•  The attackers used to gathered information to blackmail and, in the end, do a lot of damage

•  A Golden Ticket was not necessary, in fact only seven sets of credentials were enough to infiltrate the entire organisation

•  This highlights the fact that it is important to have random and unique passwords for each end point

Page 11: The Role of Privilege in Recent Breaches - ASIMM · • 90% of our staff is service oriented (Solu‘ons’ Architects, Developers, Specialists and Project Managers) • We offer

Insurance Company

About•  InsuranceCompany

•  Over50,000employeesWhathappened•  Disclosedadatabreachin2015.Atfirstsaid35+Mrecordsstolenandlaterrevisedto

75+M

•  Paidarecord$115milliontoseHleU.S.lawsuitsoverdatabreach(significantlyovertheirinsurancecap)

Page 12: The Role of Privilege in Recent Breaches - ASIMM · • 90% of our staff is service oriented (Solu‘ons’ Architects, Developers, Specialists and Project Managers) • We offer

Phishing for access

AHacker GoldenTicket

# Attacker utilized a phishing campaign to get inside the network

1

# Bad actor harvested credentials from a management script written by a contract employee

2

# With admin credentials in hand, attacker generates a “Golden Ticket”

3

Page 13: The Role of Privilege in Recent Breaches - ASIMM · • 90% of our staff is service oriented (Solu‘ons’ Architects, Developers, Specialists and Project Managers) • We offer

I’ve got the golden ticket!

AHacker

# Using address book, attacker searched for users with “database” or “security” in their title

1

# Attacker chose a DBA’s credentials to access a domain server that was connected to an encrypted database

2

# DBA’s unmonitored privileged credentials allowed attacker to decrypt and exfiltrate data for possible sale on the deep web

3

0110100001100001

Page 14: The Role of Privilege in Recent Breaches - ASIMM · • 90% of our staff is service oriented (Solu‘ons’ Architects, Developers, Specialists and Project Managers) • We offer

Wait,thosearen’tmycommands…

DomainAdmins

How long can an attack remain unnoticed?

AHacker

InternalDomain

Addresses&MedicalInfo SocialSecurity#s

Names&Birthdays

CyberArk?

Months!

Page 15: The Role of Privilege in Recent Breaches - ASIMM · • 90% of our staff is service oriented (Solu‘ons’ Architects, Developers, Specialists and Project Managers) • We offer

3 weeks to secure with CyberArk

CyberArkPS

InternalDomain

Addresses&MedicalInfo SocialSecurity#s

Names&Birthdays

DomainAdminsDomainAdmins

AHacker

Page 16: The Role of Privilege in Recent Breaches - ASIMM · • 90% of our staff is service oriented (Solu‘ons’ Architects, Developers, Specialists and Project Managers) • We offer

▪  Golden tickets should only be found in movies

▪  People remain the weakest link in an org’s security chain, especially temporary employees

▪  Encryption is a powerful tool -- unless you have credentials to decrypt and extract

▪  Unmonitored privileged account usage can prove fatal

Key Takeaways

Page 17: The Role of Privilege in Recent Breaches - ASIMM · • 90% of our staff is service oriented (Solu‘ons’ Architects, Developers, Specialists and Project Managers) • We offer

Services Company

About•  Oneoftheworld’slargestOilandGasservices

company

•  BasedintheUS

WhatHappened•  Breachoccurredinearly2017however,thefirm

decidedagainstdisclosingpublicly

•  CalledCyberArktohelpwiththeremedia`on

Page 18: The Role of Privilege in Recent Breaches - ASIMM · • 90% of our staff is service oriented (Solu‘ons’ Architects, Developers, Specialists and Project Managers) • We offer

A flawed environment

InternalDomain

# All users were local admins on their workstations

1

# Personal accounts were used to administrate the network

2

# No two-factor authentication for VPN access

3

BusinessPartners

Page 19: The Role of Privilege in Recent Breaches - ASIMM · • 90% of our staff is service oriented (Solu‘ons’ Architects, Developers, Specialists and Project Managers) • We offer

The attack

InternalDomain

Monster.com--CV

ContractorBusinessPartners

CyberArkPS

Page 20: The Role of Privilege in Recent Breaches - ASIMM · • 90% of our staff is service oriented (Solu‘ons’ Architects, Developers, Specialists and Project Managers) • We offer

Key Takeaways

•  Falling revenues should not be accompanied by security short-cuts

•  Reputation with business partners could falter if attacks effect their environment

•  Two Factor authentication and separation of duties are no longer just security suggestions

•  A dollar saved on security tools can mean millions lost in revenue

Droppingoilpricess`flesindustryspending(link)

Page 21: The Role of Privilege in Recent Breaches - ASIMM · • 90% of our staff is service oriented (Solu‘ons’ Architects, Developers, Specialists and Project Managers) • We offer

7 Step Hygiene Program

Page 22: The Role of Privilege in Recent Breaches - ASIMM · • 90% of our staff is service oriented (Solu‘ons’ Architects, Developers, Specialists and Project Managers) • We offer

SecuritySoluIonsInc.

LucGagneNorthAmericaSalesDirector

416-999-6360

©CopyrightIAMConceptsCorpora`on2018

HelpingcustomersachievetheirIAMgoalsanddeliveringvaluetothebusiness

Page 23: The Role of Privilege in Recent Breaches - ASIMM · • 90% of our staff is service oriented (Solu‘ons’ Architects, Developers, Specialists and Project Managers) • We offer

About IAM Concepts…

©CopyrightIAMConceptsCorpora`on2018

WeoffercosteffecIveIdenIty&AccessManagementstrategies,soPware,consulIngandservices

•  WeareaToronto-basedcompanythatspecializesinIden`ty&AccessManagement.•  90%ofourstaffisserviceoriented(Solu`ons’Architects,Developers,SpecialistsandProjectManagers)

•  WeofferhighlycustomizableManagedServicesandSojwareasaService(SAAS)•  Consul`ng:freeworkshops,largescaleassessments,healthchecks,roadmaps,training•  Cer`fica`onsinthetopIAMvendorsinthemarket•  Implementa`onservices&ProjectManagement•  Cer`fica`onswiththeleadingvendorsinthemarket•  CyberArkTechnologyPartneroftheYear2017

Page 24: The Role of Privilege in Recent Breaches - ASIMM · • 90% of our staff is service oriented (Solu‘ons’ Architects, Developers, Specialists and Project Managers) • We offer

Iden2ty & Access Management challenges

©CopyrightIAMConceptsCorpora`on2018

Whatarewehearingfromcustomers?

•  Lackofresources,trainingandexper`se(lossofknowledgeableemployeestoaHri`on)•  ConfusionaroundIAMsojwaresolu`onsavailable?CloudorOn-Premise?•  HowcanIgetquicker`metovalueformyIAMini`a`ves/projects?•  CanIleverageIAMsojwarethatwealreadyhave?•  HowcanyouhelpmeaddressAccessGovernanceAuditandcompliancerequirements?•  CanyouhelpmebuildabusinesscasetointernallysellourIAMproject?•  HowcanImanageuseraccesswiththerapidgrowthofourmobileworkforceandallofthesedifferentend-userdevices?

Page 25: The Role of Privilege in Recent Breaches - ASIMM · • 90% of our staff is service oriented (Solu‘ons’ Architects, Developers, Specialists and Project Managers) • We offer

IAMConcepts’ Managed Services Offering

©CopyrightIAMConceptsCorpora`on2018

IAMConceptsprovidesanIAMManagedServicetailoredtoeachcustomer’sneeds:

•  Whetheritbeimplementedonthecloudoronpremise

•  Opera`onalmanagementcaninclude:•  Applica`onmanagement•  SecurityAdministra`on

IAM Managed Services

Infrastructure Management Security Administration

Secure VPN

OnPremise Cloud

Aflexible,customizable,andcosteffecIvemanagedserviceoffering

Page 26: The Role of Privilege in Recent Breaches - ASIMM · • 90% of our staff is service oriented (Solu‘ons’ Architects, Developers, Specialists and Project Managers) • We offer

Why our customers are interested in an IAM Managed Service?

©CopyrightIAMConceptsCorpora`on2018

Risk Mitigation

Quality Cost Optimization

• Stabiliza`onofexis`nginfrastructure• Standardservicelevelsofdelivery• Proac`vemonitoringofIAMapplica`ons• Enhancedperformanceandusabilitythroughourassetlibrary• Keypatchesandupdatesreviewedandappliedregularly

• AlignmentofIAMinvestmentswithbusinessobjec`ves• Costcontrolandcontainment• Compe``vepricing

• Elimina`onofneedtotrainandretainhighlyskilledstaff• Founda`onputinplacetomakeotherIAMini`a`ves• ComplexityofmanagingIAMsolu`ons• AdaptabilityofIAMsolu`ontoevolvingneeds

BalancesriskmiIgaIon,costopImizaIon,andqualityservicedelivery

Page 27: The Role of Privilege in Recent Breaches - ASIMM · • 90% of our staff is service oriented (Solu‘ons’ Architects, Developers, Specialists and Project Managers) • We offer

CyberArk Managed Services from IAMConcepts

©CopyrightIAMConceptsCorpora`on2018

3StepProcessforon-boardingaCyberArkManagedService

FuncIon Coverage

Applica`onSupport CyberArkPASwithCri`calPlasorms:AD,Linux,AIX(100servers)

Coverage 8x5on36Term

ServicesProvided •  ProblemandIncidentManagement•  Maintenance,patching,andhot-fix•  Managementandrepor`ng

Environments Non-Produc`on&Produc`on

ServiceLevelObjec`ves

Jointlydefinedaccordingtopriorityincidentresponse`meobjec`ves

Func`onalEnhancements

OndemandviaRequestforServiceop`on(i.e.securityadministra`onorcustomiza`ons)

CyberArkManagedServiceallowsclientstomiIgaterisks,opImizecosts,andfocusestheSecurityAdminteamonTrueSecurityAdministraIonacIviIes

Step1DefinetheManagedService

Step2One`metransi`onservicefortechnicalandopera`onaltransi`on

Step3On-goingManagedServiceforthedura`onoftheterm

OurCyberArkManagedServiceOfferingDesignedtobeaflexible,customizable,andcosteffec`vesolu`ontailoredtofitclientspecificrequirementssuchas:•  PAMProblemandIncidentmanagement

•  Ticketandincidentstatus,correc`vemeasures,rootcauseanalysis•  PAMPeriodicInfrastructureMaintenance

•  Preventa`vemaintenance•  Performancetuning•  Patchingandsecurityhot-fix

•  RegularServicereviews•  Func`onalEnhancements–uponrequest

SampleCaseStudyAwealthmanagementservicesproviderrequiredCyberArkapplica`onmanagedservicestoaddressskillsgapandmanagecosts,withoutaddingcomplexity

Page 28: The Role of Privilege in Recent Breaches - ASIMM · • 90% of our staff is service oriented (Solu‘ons’ Architects, Developers, Specialists and Project Managers) • We offer

Privilege Access Management and ID Governance

©CopyrightIAMConceptsCorpora`on2018

Organiza`onsarelookingtoconnectiden`tygovernanceandprivilegeaccessmanagementintoaunifiedsolu`onthatmeetsauditandcompliancerequirements,increasesopera`onalefficiency,andaddressesrisk.IAMConceptshasworkedwithtwobestofbreedsolu`ons–integra`ngSailPoint’sIden`tyLifecycleandGovernancecapabili`eswithCyberArk’sPrivilegedAccountSecuritysolu`on–addingiden`tycontrolstoprivilegeaccess.Thissolu`onprovidesourclientswithacompleteprivilegeaccessmanagementandIDgovernanceasingleautomatedpolicy-basedprocessto:•  Gainvisibilitytoprivilegeusersandtheaccesslandscapebyimpor`ngprivileged

en`tlementsmanagedbyCyberArkintoSailPoint•  CerIfyprivilegeaccessrequiredandremoveexcessrightsfromSailPointtoaleastprivilege

model,withrevoca`onautoma`callyreflectedinCyberArkduringaccessreviewsandcer`fica`on

•  IdenItylifecycle,processesandcontrolsforprivilegedusersaremanagedinSailPoint,suppor`ngaccessrequestsandCRUDprovisioning(Create–Read–Update–Delete),withprivilegeden`tlementsautoma`callyaddedinCyberArk

•  AuditandreporIngoftheen`reprocess,fromiden`typrovisioningtoprivilegedaccountusage

IDLifecycle

Create Read

Delete Update

Governance

ü  PolicyMgtü  Cer`fyü  Report

PrivilegedAccountSecurity

Page 29: The Role of Privilege in Recent Breaches - ASIMM · • 90% of our staff is service oriented (Solu‘ons’ Architects, Developers, Specialists and Project Managers) • We offer

ThepreferredNorthAmericanIden3tyandAccessManagementServiceproviderwithover100+customers,leveragingtop3erstrategicpartnersandvendorsto

meettheneedsofourclients.

WeoffercosteffecIveIdenIty&AccessManagementstrategies,soPware,consulIngandservices

Page 30: The Role of Privilege in Recent Breaches - ASIMM · • 90% of our staff is service oriented (Solu‘ons’ Architects, Developers, Specialists and Project Managers) • We offer

Security Solutions Inc.

AnthonyMeyerRegionalSE,CanadaCyberArk

LucGagneNorthAmericaSalesDirectorIAMConcepts

Thank you!