Build Roadblock For Attacks Through Rule Of Least Privilege

  /     /     /  
Publicated : 22/11/2024   Category : security


Build Roadblock For Attacks Through Rule Of Least Privilege


Attack against Coke shows once again why organizations need to better control their privileged accounts



Reports surfacing this week about a 2009
deep dive by Chinese hackers into Coca-Cola IT infrastructure
that potentially scuppered a huge merger stand as evidence once again that enterprises need to be better at enforcing the rule of least privilege, security experts warn. If reports from
BloombergBusinessweek
hold true, the 2009 attack against Coke follows a remarkably familiar script, as attackers sent malware-laden spearphishing messages to company executives, owned their machines, and leveraged privileged accounts held by the victims to gain further access into the network.
Privileged accounts have emerged as the primary target for attackers -- if you examine some of the most spectacular breaches of the past few years, they all have a privileged connection, says Adam Bosnian, executive vice president of Americas and corporate development for Cyber-Ark, pointing to other attacks against Global Payments, the U.S. Chamber of Commerce, and the Utah medical records breach. Hackers gain access to administrative and privileged accounts -- once inside, they elevate privileges to gain access to additional servers, databases, and other high-value systems.
And yet many organizations fail to even assess the risk that elevated rights on endpoints and privileged accounts for network resources pose to their businesses. A survey conducted by privileged management vendor Viewfinity this summer found that 68 percent of organizations didnt even know who had local administrator rights on their machines, a configuration vulnerability frequently used by spearphishing attackers to start attacking the network from the proverbial side door.
According to Bosnian, part of the problem of runaway privileges in the enterprise is that many organizations have too narrow of a view of what exactly a privileged account really is.
The common belief is that if youre managing the user names, roles, and privileges of your IT employees personal accounts, then youre successfully controlling all privileged accounts and access, he says. Whether theyre called hard-coded passwords, admin passwords, or privileged accounts, theyre all privileged access points that provide a direct -- and often anonymous -- route to an organizations most sensitive data and infrastructure.
By rights, adherence to the rule of least privilege -- or the maxim that no account should ever have more rights authorized to it than necessary for a user to get his job done -- should be the No. 1 driver for identity and access management, says Marcus Carey, security researcher for Rapid7.
This is critical because limiting privileges is an excellent way to limit the spread of malware once network resources are compromised, he says. However, the principle of least privilege is one of the hardest information security tenets to maintain. It is nearly impossible for large enterprises to manage this without identity and access management.
[Hackers fixate on SQL injections -- CSOs, not so much. See
The SQL Injection Disconnection
.]
Of course, IAM products alone cant do much to enforce the rule of least privilege. It also takes coordinated effort to focus automation, policy, and teamwork into the right direction. For example, frequent access reviews are important to prevent privileges from creeping upward, says Jackson Shaw, senior director of product management at Quest Software, now a part of Dell.
Embrace an access review policy and regular, automated access alerts that notify two or more administrators of access changes, employee changes, or other critical issues, Shaw says. Notifying more than one administrator helps overcome negligence. To prevent access creep, access privileges must be dynamically linked to human resources and staffing databases.
Similarly, best practices should drive IAM implementation choices that lead to restrictions in privilege authorizations that lead to a least privilege posture, Shaw says.
Some of the most common implementation options to help get to a least-privilege state include assigning appropriate access directly to users based on well-defined roles, limiting access to administrator and root accounts, and making sure that the passwords to these accounts are not shared, are changed frequently, and that there are controls in place to limit and track their use, he says.
Have a comment on this story? Please click Add Your Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ Travel agency fined £150,000 for breaking Data Protection Act. ◂
Discovered: 23/12/2024
Category: security

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Build Roadblock For Attacks Through Rule Of Least Privilege