Download presentation
Presentation is loading. Please wait.
Published byGavin Cunningham Modified over 6 years ago
1
Six Steps to Secure Access for Privileged Insiders and Vendors
Sam Elliott | Bomgar
2
Agenda Current threat landscape
Challenges with traditional Privileged Access Management Balancing security and productivity to drive business value 6 Steps to Secure Access Q&A
3
About the Speaker SAM ELLIOTT
Director of Security Product Management, Bomgar Sam Elliott is responsible for the product management group that is driving product strategy for Bomgar's security products. He has more than a decade of information security, ITSM, and IT operations management experience. He also is a seasoned expert in the areas of cyber-security, data center discovery, systems configuration management, and ITSM. He resides in Atlanta, GA, with his family and can be found on
11
Threat Landscape A breach is a matter of if, not when
High trust still placed in people
12
Privileged Access Privileged Access Management traditionally focused on just the credential or account. That’s only half the battle against attackers. Expand focus to not only include privileged credentials, but also remote access mechanisms used by both employees and vendors.
13
What is #1 Method of Compromise?
14
Remote Access is #1 Method of Compromise
Extremely easy for threat actors to find unsecured remote access pathways. Most security organizations don’t have visibility into all of the remote access pathways into their networks. Different teams & external vendors using their preferred tools. No centralized monitoring or auditing. 2017 Global Security Report
15
81% of Hacking-related Breaches Leveraged Stolen and/or Weak Passwords
Privileged credentials are highly targeted “keys to the kingdom”. Admin passwords are often shared across teams. Many organizations forget about privileged credentials used by service desks, service accounts, app to app, third-parties, etc. 2017 Data Breach Investigations Report
18
The Birth of a New Security Hole
“Due to timing of the <Insert Important Event> let’s get this up and running and we will circle back about patching and hardening methods..” Boss Guy “If security slows down production which in turn reduces profitability, [executive management is] never going to side with IT. It's a matter of risk balancing, and if they've never experienced a security breach, they're going to take the risky route until they do.” Reddit Commenter
20
Accounts Access
21
+ 6 Steps to Secure Access Secure the CONNECTION Defend the CREDENTIAL
1 2 Secure vendor access Secure insider access 3 Remove risk of shared passwords 4 Rotate & randomize privileged credentials 5 Secure Service Accounts 6 Remove threat target with app to app security
22
Secure Vendor Access External vendors are “low hanging fruit” because they have to adhere to your policies. Number of third-parties connecting to company networks is rapidly increasing. Eliminate VPNs for vendors to improve security and access management. 2017 Secure Access Threat Report
23
Secure Insider Access Any employee who has privileged access:
IT Admins IT Operations Operational Technologists Service Desks Only 41% of security professionals trust employees with privilege access completely 2017 Secure Access Threat Report
24
Remove Risk of Shared Passwords
Use a password vault or safe so users don’t see actual credentials. Increase productivity by eliminating check- in/check-out and directly inject credentials into a remote session. Eliminating their visibility to the credential reduces threat of being phished or used through another pathway.
25
Rotate & Randomize Privileged Credentials
Ensure every local credential that has some type of admin right has a unique credential. Stop lateral movement by eliminating common credentials across endpoints. If credential is compromised, won’t be useful for long because it’s rotated.
26
Secure Service Accounts
Manage business uptime, but ensure those credentials can still be rotated. Critical business systems often have the same service account for years. Ensure critical systems stay productive while securing them.
27
Remote Threat Target with App to App Security
Malicious users can compromise hard coded credentials in a script or an application. Remove a prime target with app to app credential security. Obscure credential through a Vault and rotate to remove threat.
28
+ 6 Steps to Secure Access Secure the CONNECTION Defend the CREDENTIAL
1 2 Secure vendor access Secure insider access 3 Remove risk of shared passwords 4 Rotate & randomize privileged credentials 5 Secure Service Accounts 6 Remove threat target with app to app security
29
Summary Securing privileged credentials is a must, but don’t just fight half the battle. Discover and take control of all of the remote access pathways being used by both insiders and vendors. Follow the 6 Steps to Secure Access – in the order that makes sense for your organization. Don’t be an assumption cabbie
30
Summary
31
Questions?
32
Thank you for attending!
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.