Download presentation
Presentation is loading. Please wait.
Published byFrancine Patterson Modified over 9 years ago
1
Security in a shared infrastructure Björn Brolin
2
What’s the security policy What is Your assets? The unique information and function of Your IT-services Who is in control of those assets? Some companies don’t even have a single employee left Do You have a security policy? Most have but… Does it really apply to the people in control of Your assets
3
What’s the security policy We’re good, we have a written agreement that the partner will follow our security policy Lets say the partner have more than a hundred customers. Is it even realistic to assume they can comply with everyones policy We’re good, we use cloud services No security policy required?
4
Access entanglement Partner Customer 1 Customer 2 Customer 3
5
Access entanglement Information leakage RDP mapped devices Shared management of IT-resources Shared access to backend infrastructure Unauthorized access RDP mapped devices again
6
Access entanglement Weak security settings Skipping certificate validation Difficult to solve what CA:s to trust Jumphosts can make a huge difference But will also lead to a more complex administration
7
Azure web hosting plan modes under the hood The new portal allows for shell command execution Specifically stated that privileged commands are limited Difficult to screen filter every command with potential security implications Virtual Machine is close to identical regardless of hosting plan
8
Just enough administration, Just in time JEA: Package certain administrative tasks and restrict its use JIT: Admin rights are available only at certain times.
9
Just enough administration
10
LSA protection and identity theft Lslsass revisited Terminal session connect using /restrictedAdmin DisableRestrictedAdmin HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\ Debated in the security community as a weakness because it enables passing the hash to the remote desktop service RunAsPPL HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa Lsass is created as a protected process 3:rd party lsass extensions will not load any more unless they are signed correctly
11
Brave new world, F*ck Security!! :) Everything gets more interconnected every day End user equipment is no longer considered to be strictly for business use In this fast changing environment, what is the obvious strategy Holding back might strand important projects to a degree so that they fail Focus the security efforts wisely
12
Thank You For Your Time Björn Brolin bjorn.brolin@truesec.se
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.