Valery Milman CYBERARK PRIVILEGED ACCOUNT SECURITY



Similar documents
Privileged - Super Users out of Control

SECURE, MANAGE & CONTROL PRIVILEGED ACCOUNTS & SESSIONS. Presenter: Terence Siau

Learn From the Experts: CyberArk Privileged Account Security. Łukasz Kajdan, Sales Manager Baltic Region Veracomp SA

List of Supported Systems & Devices

Secret Server Qualys Integration Guide

Pass-the-Hash. Solution Brief

Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

Designing & Building an Information Security Program. To protect our critical assets

Presented by: Mike Morris and Jim Rumph

RETHINK SECURITY FOR UNKNOWN ATTACKS

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

ManageEngine Password Manager Pro Vs Thycotic Secret Server

VULNERABILITY & COMPLIANCE MANAGEMENT SYSTEM

Take Control of Identities & Data Loss. Vipul Kumra

STRONGER AUTHENTICATION for CA SiteMinder

CyberArk Privileged Threat Analytics. Solution Brief

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

FREQUENTLY ASKED QUESTIONS

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

Internal Penetration Test

Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management

Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Alert Logic Log Manager

CA SiteMinder SSO Agents for ERP Systems

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security

Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach

24/7 Visibility into Advanced Malware on Networks and Endpoints

Fighting Off an Advanced Persistent Threat & Defending Infrastructure and Data. Dave Shackleford February, 2012

MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION

2013 AWS Worldwide Public Sector Summit Washington, D.C.

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

An New Approach to Security. Chris Ellis McAfee Senior System Engineer

The 10 Pains of UNIX Security. Learn How Privileged Account Security Solutions are the Right Painkiller

The Cloud App Visibility Blindspot

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security

Protecting Sensitive Data Reducing Risk with Oracle Database Security

Why Device Fingerprinting Provides Better Network Security than IP Blocking. How to transform the economics of hacking in your favor

Securing Corporate on Personal Mobile Devices

MySQL Security: Best Practices

Netop Remote Control Security Server

Centrify Server Suite, Standard Edition

APT Advanced Persistent Threat Time to rethink?

Protecting Your Organisation from Targeted Cyber Intrusion

The Hillstone and Trend Micro Joint Solution

Cloud Security:Threats & Mitgations

Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform

Real-Time Database Protection and. Overview IBM Corporation

PowerShell Configuration Guide

Enterprise Random Password Manager Training Guide

Intro to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

NATIONAL CYBER SECURITY AWARENESS MONTH

TIBCO LogLogic. HIPAA Compliance Suite Quick Start Guide. Software Release: December Two-Second Advantage

VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION

RSA Security Anatomy of an Attack Lessons learned

MANAGEMENT IN THE CLOUD ADAM BOSNIAN

Authentication: Password Madness

IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience

Security and Control Issues within Relational Databases

Understanding the Advanced Threat Landscape an MSPs Guide. IT Security: Enabled

TIBCO LogLogic. SOX and COBIT Compliance Suite Quick Start Guide. Software Release: December Two-Second Advantage

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Payment Card Industry (PCI) Data Security Standard

Developing Secure Software in the Age of Advanced Persistent Threats

About SecuPi. Your business runs on applications We secure them. Tel Aviv, Founded

Software that provides secure access to technology, everywhere.

IT Infrastructure and Emerging Technologies

Chris Boykin VP of Professional Services

The Importance of Patching Non-Microsoft Applications

IBM Tivoli Identity Manager

IBM Security re-defines enterprise endpoint protection against advanced malware

Achieving PCI Compliance for: Privileged Password Management & Remote Vendor Access

ProtectID. for Financial Services

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Symantec NetBackup Getting Started Guide. Release 7.1

Enhancing Your Network Security

Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

Roadmap to Solving Enterprise Mobility

RESEARCH NOTE CYBER-ARK FOR PRIVILEGED ACCOUNT MANAGEMENT

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Information Security Services

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Transcription:

Valery Milman CYBERARK PRIVILEGED ACCOUNT SECURITY

Privileged Accounts are Targeted in All Advanced Attacks Anything that involves serious intellectual property will be contained in highly secure systems and privileged accounts are the only way hackers can get in. Avivah Litan, Vice President and Distinguished Analyst at Gartner

Privileged Accounts are Targeted in All Advanced Attacks 100% of breaches involved stolen credentials. APT intruders prefer to leverage privileged accounts where possible, such as Domain Administrators, service accounts with Domain privileges, local Administrator accounts, and privileged user accounts. Mandiant, M-Trends and APT1 Report

CyberArk Overview Trusted experts in privileged account security World-class Customers Over 1,500 privileged account security customers it s all we do! Approach privileged accounts as a security challenge Designed and built from the ground up for security Focus on solving business problems Privileged account security goes well beyond audit Only comprehensive privileged account security solution One solution, focused exclusively on privileged accounts Enterprise proven Best Advanced Persistent Threat (APT) Protection Excellence award finalist in the Best Security Company category SC 2013

Privileged Accounts are everywhere PRIVILEGE Shared Admin Accounts Application to Application Accounts Cloud Accounts

Attack analysis RSA SecureID attack 1) The attacker sent phishing e-mails with the subject line 2011 Recruitment Plan to two small groups of employees over the course of two days. 2) One employee retrieved the message from his junk mail and opened the attached Excel file. 3) The spreadsheet contained malware that used a previously unknown, or zero-day, flaw in Adobe s Flash software to install a backdoor.

Attack analysis RSA SecureID attack 3) After installing a stealthy tool that allowed the hacker to control the machine from afar, he stole several account passwords belonging to the employee and used them to gain entry into other systems. 4) From those systems the attacker could gain access to other employees with access to sensitive data. 5) Then came stage three: spiriting RSA files out of the company to a hacked machine at a hosting provider, and then on to the hacker himself.

Privileged Accounts are everywhere Privileged Accounts Perimeter Breach Attack Goal DETECT PROTECT RESPOND

But That Fact is Not Well Understood In Your Estimation, How Many Privileged Accounts Are There In Your Organization? 40% 30% 20% 10% 0% 1-250 251-500 501-1,000 1,001-5,000 5,001+ Don't know Cyber-Privileged Account Security & Compliance Survey, May 2013 (Enterprise > 5000 Employees)

Where do your privilege accounts reside? Databases Oracle MSSQL DB2 Informix Sybase MySQL Any ODBC Operating Systems Windows Unix/Linux AS400 OS390 HPUX Tru64 NonStop ESX OVMS Mac SAP WebSphere WebLogic Applications Windows: Services Scheduled Tasks IIS App Pools IIS Anonymous COM+ Oracle Application ERP System Center Configuration Manager Generic Interface Network Devices SSH/Telnet ODBC Windows Registry Web Interfaces Web Sites Cisco Juniper Nortel Alcatel Quntum F5 Security Appliances FW1, SPLAT IPSO PIX Netscreen FortiGate ProxySG Directories and Credential Storage AD SunOne Novel UNIX Kerberos UNIX NIS Remote Control and Monitoring HMC HPiLO ALOM Digi CM DRAC

Privileged Accounts are Targeted in All Advanced Attacks

Privileged Accounts are Targeted in All Advanced Attacks

Attack analysis Dnepropetrovsk Governance Retrieval Network account from the server Access Website bug, on internally connected webserver Network credentials Usage Access Nagios for network reconnaissance

Nagios - infrastructure monitoring map

Cont. Access Access machine with admin creds Retrieval Same admin credentials used for multiple IT services Network admin credentials Usage Delete and sabotage IT administration panels Access standard password on central IT credentials repository Retrieval Retrieve credentials to servers and communication equipment Asset credentials Usage Recover device configurations and sensitive documents with account/password combinations

Cont. Access Documented passwords and schemes Retrieval Get credentials from files User accounts in governor s office Usage Collect information from ranking officials and secretaries Access Access governor s personal assistant s computer Retrieval Retrieve personal password Governor s personal assistant s account Usage Access personal email and other information

Pass the Hash Attack On Privileged credentials

Credentials more than what you think Forms of credentials Passwords Biometric identification Magnetic tape on credit cards and more Password hashes! Designed to protect the account password from being exposed BUT can also assist an attacker in gaining privileged access to your most sensitive assets myp4ssw0rd Password 4f0a7091dd17d4bb9276b3c8 ecc8c9fb8920f93dd8ba66ebe 173220ecd0ecf91 Hash One way Function

Pass-the-Hash (PtH) a form of Credential Theft First published in 1997. Has been a beloved toy by attackers since 2008. Widely covered during 2013. A by-design flaw in Windows. Microsoft: We can t mitigate. How simple is it to leverage an attack?

Pass-the-Hash (PtH) a form of Credential Theft

Pass-the-Hash how does it really work?

CyberArk - Solving The Privileged Account Security Problem Threats Advanced Threat Insider Threats Securing the Hybrid Cloud Securing Application Credentials Securing Shared Admin Accounts Sharing Sensitive Information Audit & and Compliance Control & Accountability for Privileged Users Monitor & Record Privileged Activity Compliance Reporting Remote User Access Control Auditing Secure File Transfer Industrial Controls/SCADA Securing and Monitoring Shared Smart Grid Security Admin Accounts for ICS Systems Controlling and Monitoring Remote Vendors

Contact us for more information: http://www.cyberark.com/contact/ Valery Milman Valery.Milman@Cyberark.com