Top Banner
45

ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins

Jul 08, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins
Page 2: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins

ATTACKERS USING IDENTITY TACTICS

MODERN PERIMETER

(Identity Controls)

Identity Based Security: Zero Trust

Page 3: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins
Page 4: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins

Complexity is the enemy of intelligent security

$1.37MOn average that an

organization spends annually

in time wasted responding to

erroneous malware alerts

1.87MGlobal cybersecurity

workforce shortage by 2022

70 35Security products Security vendors

Is the average for companies

with over 1,000 employees

Global Information Security Workforce Study 2017Nick McQuire, VP Enterprise Research CCS Insight. “The Cost of Insecure Endpoints” Ponemon Institute©

Research Report, June 2017

Page 5: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins

5

73%of accounts are protected

by duplicate passwords,

or the same password

across multiple sites

300% increase in identity-based

attacks over the past year

24-48 HoursThe amount of time it takes an attacker to obtain complete control of the network

81% of breaches are caused by

credential theft

Crippling attacks targeting US cities are on the rise

Page 6: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins

Password-less

Authenticator

App

FIDO2 Security KeysBiometrics

Page 7: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins

7

Reduces compromise by over 99%

Strengthen Credentials

Authentication

Multi-factor Ban common

passwords

Modernize

password

policies

Protect

privileged

accounts

Page 8: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins

Secure identities to reach zero trust

Strengthen

your security posture

with insights and

guidance

Help stop

damaging attacks

with integrated and

automated security

Protect sensitive

information

anywhere it lives

Threat

Protection

Identity & Access

Management

Information

Protection

Security

Management

Intelligent security for the modern workplace Unify enterprise security and user productivity

Holistic security across your digital landscape

Page 9: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins
Page 10: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins
Page 11: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins
Page 12: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins
Page 13: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins
Page 14: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins
Page 15: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins
Page 16: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins

Jon Smith Laptop

Page 17: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins

Jon Smith Laptop

Page 18: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins

Utilize intelligence to drive zero trust policies

Page 19: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins
Page 20: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins

Implement risk-based identity security

Users with leaked credentials

Sign-ins from anonymous IP addresses

Impossible travel to atypical locations

Sign-ins from infected devices

Sign-ins from IP addresses with suspicious activity

Sign-ins from unfamiliar locations

New risk alerts are added as new threats emerge

Page 21: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins

CorporateNetwork

Geo-location

Cloud Access Security BrokerMacOS

Android

iOS

Windows

Endpoint Security

Client apps

Browser apps

Guests

MSA

Azure AD

ADFS

RequireMFA

Allow/block

Block legacyauthentication

Forcepasswordreset******

Limitedaccess

Controls

Employee & PartnerUsers and Roles

Trusted &Compliant Devices

Physical &Virtual Location

Client apps &Auth Method

Conditions

Machinelearning

Policies

Real timeEvaluationEngine

SessionRisk

3

40TB

Effectivepolicy

Conditional Access Controls

Page 22: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins

Social Media Human Resources

Provide oversight for which users have access to what resources

Prompt users to ensure their access is limited to the resources they need

Apply to employees and guest users

Page 23: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins

User Administrator UserAdministrator privileges expire after

a specified interval

Enforce on-demand, just-in-time

administrative access when needed

Ensure policies are met with alerts,

audit reports and access reviews

Microsoft strongly recommends enabling MFA for all admins in your organization, especially subscription owners & tenant admins.

Discover, restrict, and monitor privileged identities

Page 24: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins

Managed apps

Personal apps

Personal apps

Managed appsCorporate data

Personaldata

Multi-identity policy

Personal apps

Managed apps

Copy Paste Save

Save to

personal storage

Paste to

personal

app

Email attachment

Page 25: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins
Page 26: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins
Page 27: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins
Page 28: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins
Page 29: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins
Page 30: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins
Page 31: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins

Mobile Application Management Policies can be applied to devices managed by:

Any MDM Provider

BYOD Devices (No MDM)

Page 32: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins
Page 33: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins

Block on download

Page 34: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins

Block on download

Page 35: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins

Get anomalous usage alerts, new app and trending apps alerts.

On-going analytics

Discover cloud apps in use across your networks and sensitive data they store.

Discovery of cloud apps and data

Comprehensive risk scoring utilizing more than 70 risk factors including regulatory certifications & compliance standards

Understand the risk

Gain visibility into top users, traffic data, app categories, and IP addresses

Understand usage patters

Integrates with your SIEM, Identity and Access Management, DLP and Information Protection solutions

ControlDiscover Protect

Page 36: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins
Page 37: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins

• Unusual file share activity

• Unusual file download

• Unusual file deletion activity

• Ransomware activity

• Activity by a terminated employee

Indicators of a

compromised session

Malicious use

of an end-user

account

Threat delivery

and persistence

!

!

!

Malicious use of

a privileged user

• Activity from suspicious IP addresses

• Activity from anonymous IP addresses

• Activity from an infrequent country

• Impossible travel between sessions

• Logon attempt from a suspicious user agent

• Malware implanted in cloud apps

• Malicious OAuth application

• Multiple failed login attempts to app

• Suspicious inbox rules (delete, forward)

• Unusual impersonated activity

• Unusual administrative activity

• Unusual multiple delete VM activity

Page 38: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins

LabelDiscover Classify

Sensitivity Retention

Data growing at exponential rate

→ Encryption

→ Restrict Access

→ Watermark

→ Header/Footer

→ Retention

→ Deletion

→ Records Management

→ Archiving

→ Sensitive data discovery

→ Data at risk

→ Policy violations

→ Policy recommendations

→ Proactive alerts

Comprehensive policies to protect and govern your most important data – throughout its lifecycle

Unified approach to discover, classify & label

Automatically apply policy-based actions

Proactive monitoring to identify risks

Broad coverage across locations

Apply label

Unified approach

Monitor

Monitor

Page 39: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins

CONFIDENTIAL

What is a sensitivity label?

Tag that is customizable,

in cleartext,

and persistent.

In files and emails, the label is persisted

as document metadata

In SharePoint Online, the label is

persisted as container metadata

The label becomes the basis for applying and

enforcing data protection policies

Page 40: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins

Helps you manage sensitive data stored

on-premise prior to migrating to Office 365

or other cloud services

Use discover mode to identify and report

on files containing sensitive data

Use enforce mode to automatically classify,

label and protect files with sensitive data

Page 41: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins
Page 42: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins

FINANCE

CONFIDENTIAL

Persistent tags that travel with the document

Labels are metadata written to documents

Labels are in clear text so that other systems such as a DLP

engines can read it

Labels can contain visual markers such as a header, footer,

or watermark

Labels can contain encryption to restrict access to the file

or govern allowable file actions in access is granted

(Example: Read Only – Expiration of Access etc)

Page 43: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins

Bring controls directly into user experience

Page 44: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins

Scan & detect sensitive data based on policy

Classify and label data based on sensitivity

Apply protection actions, including encryption,

access restrictions

Track and Report

Page 45: ATTACKERS USING IDENTITY TACTICS · Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins

Thank You

Michael Hobbs

Microsoft Security Solutions

Email: [email protected]

LinkedIn: linkedin.com/in/mihobbs13