© Morey J. Haber and Brad Hibbert 2018
Morey J. Haber and Brad HibbertPrivileged Attack Vectorshttps://doi.org/10.1007/978-1-4842-3048-0_22

22. Privileged Account Management Implementation

Morey J. Haber and Brad Hibbert2
(1)
Heathrow, Florida, USA
(2)
Carp, Ontario, Canada
 
Organizations increasingly recognize that properly securing and controlling privileged credentials ranks as one of the best lines of defense against attacks from external hackers as well as from insiders. For optimal results, a privilege management solution should protect privileges at all stages of the cyber kill chain by implementing comprehensive layers of control and analysis. Overall objectives include the following:
  • Reduce the attack surface by limiting the use of privileged accounts and by controlling access to shared privileged accounts across the enterprise.
  • Monitor privileged user, session, and file activities for unauthorized access and/or changes to key files and directories.
  • Analyze asset and user behavior to detect suspicious and/or malicious activities of insiders and/or compromised accounts.
For maximum adoption across an enterprise, a privileged access management solution must also protect privileges without obstructing productivity or overburdening operations.
Implementing an end-to-end privileged access management solution should follow a defined process to minimize costs and distractions, and speed results. When managing privileges as an attack vector, using a simple 12-step approach helps manage risk and provide predictable and documentable results. The result of this 12-step process is that you have greater control and accountability over the accounts, assets, users, systems, and activity that make up your privilege environment.
Throughout the process of selecting and deploying your privileged access management solution, keep in mind these business requirements, as they will help you justify the cost within your organization and risks in mitigating the threat:
  • Minimize total cost of ownership;
  • Provide a fast time to value;
  • Deliver the best information to make the best risk-based decisions.
Remember these steps are just a guide and do not necessarily need to be followed in sequence.

Step 1: Improve Accountability for Privileged Passwords

The most logical starting point for gaining greater control over privileges is by improving accountability over privileged passwords. Not effectively managing shared accounts is a problem that has significant scale and risks. You don’t have to look much further than recent breaches to understand the implications – or the challenges. Certain systems have embedded or hard-coded passwords, leaving opportunities for misuse. In addition to supporting human interaction, passwords are needed for application-to-application and application-to-database access. Passwords are generally static, so there must be protections against passwords leaving the organization. Manual password rotation is unreliable and time consuming. Auditing and reporting on access are complex and error prone. Therefore, how do organizations ensure accountability of shared privileged accounts to meet compliance and security requirements without impacting administrator productivity?
The answer is automation  – automating password and session management; providing secure access control; auditing, alerting, and recording for any privileged account – from local or domain shared administrator, to a user’s personal admin account (in the case of dual accounts), to service, operating system, network device, API keys, database (A2DB) and application (A2A) accounts – even SSH keys. By improving the accountability and control over privileged access, IT organizations can reduce security risks and achieve compliance objectives. With this goal in mind, consider these 10 recommendations for every privileged access management solution:
  1. 1.
    Full network scanning, discovery, and profiling with auto-onboarding.
     
  2. 2.
    Build permission sets dynamically according to data from scans.
     
  3. 3.
    Automatically rotate SSH keys and cycle passwords according to a defined schedule.
     
  4. 4.
    Granular access control, workflow, and auditing.
     
  5. 5.
    A clean, uncluttered user interface for end users that speeds adoption.
     
  6. 6.
    Workflow-based and break glass options for requesting access.
     
  7. 7.
    Password and session management together in the same solution – no requirement for two different interfaces or to be charged separately for each.
     
  8. 8.
    No requirement for additional third-party tools for session management – utilize native tools and applications instead versus introducing a third-party requirement that may have its own risks.
     
  9. 9.
    Leverage an integrated data warehouse and threat analytics across the privileged landscape.
     
  10. 10.
    Flexible deployment options: hardware appliances, virtual appliances, cloud, or software for maximum coverage.
     
With these requirements , organizations can discover all the accounts in their environment, place those accounts under management, and satisfy auditor requests that accounts are now managed.

Step 2: Implement Least Privilege Desktops

Once accounts and assets have been discovered and are being consistently managed, the next step to complete privileged access management is implementing least privilege on end-user machines. As a security best practice, organizations should reduce the risk on desktops before servers (such as Windows, Unix or Linux as indicated in step 4) as the endpoint is typically the last mile of security. Secure the last mile first. Some organizations may choose to reverse this order, so depending on the specific business environment and risk, the priorities for these steps could be refined to match the risk level and appetite for the business. In other words, the order of these seven steps can vary but almost always step 1 is the most important and represents the highest privileged attack vector risk.
The process for IT to restrict or enable end-user privileges potentially can be complex and time consuming, but it must be done to support audit or compliance mandates. When environments have standardized desktop images and applications, the process is relatively trivial. If every machine is different, then other desktop priority management techniques might be best first. And although users should not be granted local administrator or power user privileges in the first place, sometimes certain applications require elevated privileges to run. How do IT organizations reduce the risk of users having excessive privileges and subjecting the organization to potential exploitation or compliance violations without obstructing their productivity or overburdening the help desk?
The answer is only through least privilege access for applications - rules-based technology to elevate application privileges without elevating user privileges . By eliminating end-user desktop administrator privileges, simplifying the enforcement of least privilege policies, maintaining application access control, and logging privileged activities, IT closes security gaps, improves operational efficiency, and achieves compliance objectives faster.
Therefore, the top 10 desktop least privilege capabilities should include the following:
  1. 1.
    Default all users to standard privileges while enabling elevated privileges for specific applications and tasks without requiring administrative credentials.
     
  2. 2.
    Enforce restrictions on software installation, usage, and OS configuration changes.
     
  3. 3.
    Eliminate the need for end users to require two accounts.
     
  4. 4.
    Make dynamic least privilege decisions for applications based on that application’s vulnerability, risk, reputation, and compliance profile.
     
  5. 5.
    Match applications to rules automatically based on asset-based policies.
     
  6. 6.
    Report on privileged access to file systems for all users and document system changes during privileged sessions.
     
  7. 7.
    Monitor sessions and log keystrokes during privileged access.
     
  8. 8.
    Provide a technique for using real domain or local privileges when required, including multi-factor authentication.
     
  9. 9.
    Integrate with other privilege solutions to achieve comprehensive privileged access management.
     
  10. 10.
    Leverage an integrated data warehouse and data analytics across the privilege landscape. With this solution, customers gain the ability to efficiently eliminate local admin rights, and make intelligent application elevation decisions based on real-world privileged threats.
     

Step 3: Leverage Application Risk Levels

Now that shared credentials are under management and end users have the privileges they need to perform their jobs – and nothing more - organizations can move to a better understanding of risks to help make better-informed privilege elevation decisions. The challenge, though, is that most risk assessment solutions do little to help security leaders put vulnerability, attack, malware, and risk information in the context of business. Saddled with volumes of rigid data and static reports, the security team is left to manually discern real threats and determine how to act upon them.
Therefore, consider expanding your vulnerability management and risk assessment programs to include privileged access and application control. If teams deem an application too dangerous to execute based on a real-world threat, ransomware, or missing security patch, they should adopt privilege access management policies to compensate for the risk. This is the same as reputation-based application control. This not only stops exploits from becoming a privileged attack vector but also drive-by social threats that can leverage vulnerabilities within the environment until mitigation or remediation steps are available.

Step 4: Implement Least Privilege on Servers

In current information technology environments, business critical, tier-1 applications are attractive targets for threat actors. They contain the sensitive data and applications they want. Accessing privileged user credentials for these resources can provide access to e-commerce data, ERP systems managing employee data, customer information, and sensitive financial data. Having root passwords, superuser status, or other elevated privileges is important for users to do their jobs. But unfortunately, this practice presents significant security risks stemming from intentional, accidental, or indirect misuse of those shared privileges – especially when those shared privileges have access to tier-1 systems that impact the business such as those running on Unix or Linux servers. Traditional responses to this problem include the following:
  • Are inefficient and incomplete (such as native OS options) lacking the ability to delegate authorization without disclosing passwords.
  • Are not secure enough (such as open source sudo or local administrator accounts) to address risk or compliance requirements lacking the ability to record sessions and keystrokes for audits.
  • Don’t account for activity inside scripts and third-party applications, leaving a shortcut to unapproved applications.
  • Don’t offer an efficient migration path away from sudo or shared accounts if it is being used throughout the organization.
Therefore, how do IT organizations limit who has assess to root accounts to reduce the risk of compromises without hindering productivity?
Organizations must be able to efficiently delegate server privileges and authorization without disclosing passwords for root, local, or domain administrators , or other accounts. Recording all privileged sessions for audits, including keystroke information, helps to achieve privileged access control requirements without relying on native tools.
Top 10 server privilege management capabilities include the following:
  1. 1.
    Pluggable Authentication Module (PAM) support to enable utilization of industry-standard authentication systems.
     
  2. 2.
    Advanced control and audit over commands at the system level.
     
  3. 3.
    Powerful and flexible policy language to provide a migration path from native tools.
     
  4. 4.
    Extensive support for many Windows, Unix, and Linux platforms.
     
  5. 5.
    Record and index all sessions for quick discovery during audits.
     
  6. 6.
    Broker permissions transparently, ensuring user productivity and compliance.
     
  7. 7.
    Change management of all settings and policy configuration, allowing full audit of who has changed what, version control, and rollback of all existing configuration files.
     
  8. 8.
    REST API for easier integration with third-party products.
     
  9. 9.
    Integrate all policies, roles, and log data via a web-based console.
     
  10. 10.
    Leverage an integrated data warehouse and threat analytics across the privilege landscape.
     
With this capability, you gain complete control over root and administrator access on any type of server operating system.

Step 5: Network Devices

The most common username and passwords for network devices are not necessarily the defaults that come with the device even though we are now very much aware of the risk. Most administrators change them. Unfortunately, in some environments, they can be guessed or compromised using brute force password attacks. In addition, the second most common privilege flaw is to use the same ones across the entire infrastructure (password reuse) and rarely, if ever, are they changed in mass, even if you have outsourced the management. This problem can lead to a variety of malicious activities, including recent vulnerabilities that can replace the device’s bootstrap loader with a piece of custom malware.
The risks can stem from a simple lack of privileged account management on network devices include these:
  • Default or common passwords that are not configured correctly;
  • Shared credentials across multiple devices for management simplicity;
  • Excessive password ages due to fear of changing or lack of management capabilities;
  • Compromised or insider accounts making changes to allow exfiltration of data;
  • Outsourced devices and infrastructure where changes in personnel, contracts, and tools;
  • expose credentials to unaccountable individuals.
Anyone of these could lead to excessive risk for your infrastructure. As such, organizations should look beyond desktops and servers when planning their Privilege Account Management security program by including these devices. Additionally with newer privilege solutions organizations can move beyond the boolean “access” or “no access” authorization models commonly used in many network devices. Organization now have access to proxy gateways that can enforce command whitelistinglacklisting, session monitoring, active alerting and more.

Step 6: Virtual and Cloud Data Centers

Growing use of virtualized data centers and cloud environments for processing, storage, or application hosting and development have opened up new avenues for would-be hackers or malicious insiders to access sensitive data and disrupt organizations inappropriately. Despite these risks, cloud adoption continues to accelerate. As such, organizations must secure access to these environments to mitigate security risks while meeting the cost and efficiency demands of hosting more applications and services in the cloud.
Like traditional desktops and servers, unknown or undermanaged virtualized and cloud environments can create a significant security gap that opens networks to security breaches, data loss, intellectual property theft, and regulatory compliance issues. The first step in getting control over these assets is discovery. There are several techniques used to discover assets in virtualized and cloud environments including the following:
  • Performing standard network discovery or scanning from a host machine with “line of sight” access to the virtualized environment;
  • Querying the Hypervisor or Cloud Management Platform to retrieve the inventory of virtualized assets, or configuring an active notification upon inventory updates;
  • Using agents that are preinstalled on the base image library, or that are installed during the normal server provisioning process;
  • Querying a third-party asset management solution.
Once cloud instances are found, they must be managed to limit exposure. From a privileged management perspective, the options to secure these assets are like that of traditional desktops and servers:
  • Use a password vaulting solution to manage the passwords across all virtualized machines automatically;
  • Use a session management solution to control and monitor virtual machines access;
  • Use native delegation capabilities of the underlying OS to reduce the privileges associated to users interacting with the system;
  • Use a privilege management agent with least privilege architecture to reduce exposure to administrator, root, and privileged developer accounts.
Now that the virtualized machines are under control, what about the hypervisor and cloud management platform itself? Here again, inappropriate or malicious activates at this management level could have a devastating impact on the business. This includes administrators of your VMWare, Microsoft Hyper-V, Amazon AWS, and Microsoft Azure environments. To counteract this threat, organizations again have several options:
  • Use a password vaulting solution to automatically manage the passwords across all hypervisor and cloud management platforms;
  • Use a session management solution to control and monitor all cloud management activities;
  • Use native or third-party delegation capabilities of the hypervisor andor cloud management provider to reduce the privileges associated to users interacting with the system.

Step 7: IoT Devices

With a growing number and sophistication of software attacks, it has become significantly more challenging for organizations to protect their environments. Recently a new generation of distributed denial of service attacks has emerged that represents a significant risk to organizations and governments alike. Like a lot of IT terms, the definition of IoT is open for interpretation. Typically, we think of IoT devices as being DVR’s, CCTV, microphones, webcams, home automation, etc. But in reality, it can mean anything connected to the Internet, including video conferencing equipment, network printers, and more.
The number one vulnerability with IoT devices is the use of hard-coded, default, and/or weak passwords. Even when administrators change default passwords, most credentials can be still guessed via brute force attacks, especially when weak or shared passwords are used across the IoT infrastructure.

Step 8: DevOps

DevOps is a compound acronym for Software DEVelopment and Information Technology OPerationS . It is a designation for the communication and synergy between software developers and information technology departments. The goal of DevOps is not typical software application development but focuses on the programmatic automation of infrastructure management, whether it is software delivery, instance management, or automation for rapid deployment of resources and their corresponding operations management.
For commercial application developers, or programmers that create custom DevOps applications for your business, consider how beneficial it would be for your end users, or other applications, to never require entering a username and password for connectivity. If the tools stored credentials automatically or queried a management solution to prove authorization, end users like database administrators would never need administrator rights to access a database. Management tools for services, remote access, and infrastructure would automatically recognize the logged-on user, the asset they are on, be fully context aware, and seamlessly request and pass credentials. Privileged Access Management solutions for password management make this capability a potential reality using an Application Program Interface (API) to set, retrieve, and process credential and password requests. Some of the benefits of this approach for DevOps are the following:
  • Secure Applications – Privileged Access Management (PAM) API’s are designed to provide better security for all applications that require a user or application to enter static credentials for normal operations. Developers can call a PAM API and retrieve the latest credentials for the user, application, infrastructure, cloud solution, or database to authenticate and release the credentials upon termination of the session. This can trigger automatic, randomized cycling of the password or other automated processes to meet business objectives. Users never see, or know, the latest credentials for any given resource or application.
  • Attack Vector Mitigation – Using a PAM API secures the runtime of applications and avoids hacking techniques like Pass-the-Hash. This approach is far more secure than Single Sign-on (SSO) since the password is constantly being rotated per session, user, or other criteria, even if it is shared.
  • Developer Simplification – This approach improves the agility and responsiveness of IT by never requiring the entry of a username and password for connectivity to create custom applications. End users, like database administrators, never need administrator rights to access a database if the tools retrieve stored credentials automatically.

Step 9: Unify Management

It is no secret that information technology and security professionals are overloaded with privilege, vulnerability, and attack information. Unfortunately, advanced persistent threats (APTs) often go undetected because traditional security analytics solutions are unable to correlate diverse data to discern hidden risks. Seemingly isolated events are written off as exceptions, filtered out, or lost in a sea of data. The threat actor continues to traverse the network, and the damage continues to multiply. How do security and IT operations teams gain an understanding of where threats are coming from, prioritize them, and quickly mitigate the risks?
Data analytics enables teams to identify the data breach threats typically missed by other security analytics solutions. Solutions pinpoint specific, high-risk users and assets by correlating low-level privilege, vulnerability and threat data from a variety of third-party solutions.
Therefore, any data analytics and unified management solution should contain the following top 10 capabilities:
  1. 1.
    Correlate low-level data from a variety of third-party solutions to uncover critical threats.
     
  2. 2.
    Correlate system activity against application risk data and malware.
     
  3. 3.
    Report on compliance, benchmarks, threat analytics, what-if scenarios, resource requirements, and more.
     
  4. 4.
    View, sort, and filter historical data for multiple perspectives.
     
  5. 5.
    Locate network (local and remote), web, mobile, cloud, and virtual assets, as well as privileged accounts.
     
  6. 6.
    Profile IP, DNS, OS, Mac address, users, accounts, password ages, ports, services, software, processes, hardware, event logs, and more.
     
  7. 7.
    Group, assess, and report on assets by IP range, naming convention, OS, domain, applications, business function, Active Directory, and more.
     
  8. 8.
    Import from Active Directory, LDAP , IAM, or set custom permissions.
     
  9. 9.
    Workflow, ticketing, and notification to coordinate IT and security teams.
     
  10. 10.
    Share data with leading SIEM, GRC, NMS, and help desk solutions.
     
By unifying privileged access management and other threat management solutions, IT and security teams have a single, contextual lens through which to view and address user and asset risk by activity, asset, user, and privilege.

Step 10: Privileged Account Integration

Please consider step 4 for a moment. Once you have greater control over privileged access in server environments, the next logical step is to bring those systems under consistent management, policy, and single sign-on. Unix, Linux, and Mac have traditionally been managed as stand-alone systems – each a silo with its own set of users, groups, access control policies, configuration files, and passwords to remember. Managing a heterogeneous environment that contains these silos – plus a Microsoft or cloud environment – leads to inconsistent administration for IT, unnecessary complexity for end users, and a vast sprawling of alias accounts. These are known threats and areas of interest for a threat actor.
Therefore, how do IT organizations achieve consistent policy configuration to achieve compliance requirements, a simpler experience for users and administrators, and less risk from an improperly managed system?
The ideal solution is to centralize authentication for Unix, Linux, and Mac environments by extending Microsoft Active Directory’s Kerberos authentication and single sign-on capabilities to these platforms. By extending Group Policy to these non-Windows platforms you gain centralized configuration management, reducing the risk and complexity of managing a heterogeneous environment and stop the sprawl of alias accounts.
The Top 5 Active Directory bridge capabilities should include these:
  1. 1.
    No requirement to modify Active Directory schema to add Linux, Unix, or Mac OS X systems to the network. This provides stability as the technology evolves.
     
  2. 2.
    Provide a pluggable framework with an interface similar to Microsoft’s Management Console on Linux or Mac OS X, and full support for Apple’s Workgroup Manager application would allow for seamless management and control of Mac system settings,
     
  3. 3.
    Single sign-on for any enterprise application that supports Kerberos or LDAP,
     
  4. 4.
    Provide a single familiar toolset to manage both Windows and Unix systems (ex: Active Directory Users and Computers, ADUC),
     
  5. 5.
    Allow users to use their Active Directory credentials to gain access to Unix, Linux and Mac, consolidating various password files, NIS, and LDAP repositories into Active Directory and removing the need to manage user accounts separately.
     
These concepts will enable simplified configuration management and policy for non-Windows systems and will help improve security and the user experience . This approach will help your organization be more efficient by reducing the number of logins (and the accordant help desk calls when they are forgotten), and the number of different systems, configurations, and policies to manage. Thus, the lower number of accounts, the less to audit and lower the risk surface for a threat actor.

Step 11: Auditing and Recovery

Once you have your non-Windows systems integrated into Active Directory, the next step is to audit user activity to gain additional insight into AD changes that could impact the business. But trying to keep up with all the changes made manually in Active Directory is an extremely time-consuming and complex process, with delays in discovering and addressing changes possibly leading to business disruption, not to mention the security and compliance implications of such changes.
When you include other Microsoft technology in the mix, understanding the “Who, What, When, and Where” of changes across the Windows infrastructure is even more complex.
Therefore, how do IT organizations better understand changes, have the capability to roll them back if necessary, and establish the right entitlements in the first place across a complex Windows infrastructure so they can more effectively protect the business?
Organizations need centralized real-time change auditing for Active Directory, File Servers, Exchange, and SQL, as well as the ability to restore Active Directory objects or attributes and to establish and enforce entitlements across the Windows infrastructure. Through simpler administration, organizations can mitigate the risks of unwanted changes performed by threat actors, insiders, and better understand user activity to meet compliance requirements.
To perform these necessary forensics tasks, consider these top 3 auditing and protection capabilities:
  1. 1.
    Audit and identify who, what, where, and when changes were performed.
     
  2. 2.
    Provide a mechanism for Active Directory backups and recovery. Rolling back an accidental (or threat actors) permission change could level unforeseen gaps in security.
     
  3. 3.
    Audit and report across multiple Windows domains and trusted servers.
     
With this capability , you gain detailed, real-time auditing of AD environments, and the ability to restore unwanted changes when threats or even mistakes arise. If you know that a threat actor has granted themselves privileges, would you want to know too? Auditing and recovery of privileges in AD is a simple step to identify and mitigate this risk also.

Step 12: Integrate the Identity Stack

Identity and access management (IAM) plays a critical role in an organization’s IT security strategy. As organizations grow, so do the number of applications, servers, and databases used. Access to the organization’s resources is typically managed through IAM solutions, which offer capabilities like single sign-on, provisioning, user management, access control, and governance. But securing an organization’s sensitive data and applications requires more. Provisioned users, regardless of privileges, can leave an organization exposed if activity of their usage is not monitored and documented properly. Identity and access management solutions help IT teams answer ‘Who has access to what?’ But, to achieve complete user visibility, privileged access management solutions address the remaining questions: ‘Is that access appropriate?’ and ‘Is that access being used appropriately? That is, PAM solutions should be providing more visibility and deeper auditing of the access and use of privileged accounts. Many times, IAM solutions will add users to a system or applications group, but will not provide the details as to what access that group membership provides, or access to the detailed session log or keystrokes collected during the privileged session. As such, PAM extends the visibility of the IAM solution to tighten security and audit controls further.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.145.156.122