Top Banner
1 1 Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria © 2013 BeyondTrust Software Bruno Caseiro, CISSP, GWAPT, CEH, MCSE Security Sales Engineer
37

Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

Aug 09, 2015

Download

Technology

Bruno Caseiro
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

1

1

Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

© 2013 BeyondTrust Software

Bruno Caseiro, CISSP, GWAPT, CEH, MCSESecurity Sales Engineer

Page 2: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

2

2

Agenda

About Beyondtrust

Security concepts that are rarely implemented (properly)

High Profile Breaches in 2013 and 2014

What we can do to reduce the attack surface?

Page 3: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

3

3

BeyondInsight IT Risk Management Platform: Capabilities

Privilege & Access ManagementInternal Risk Management

• Privileged Password Management• Shared Account Password Management• Privileged Session Management• Privileged Threat Analytics• User Activity and Entitlement Auditing• AD Bridge for UNIX/Linux and Mac• Automated AD Recovery & Protection

Privilege & Access ManagementInternal Risk Management

• Privileged Password Management• Shared Account Password Management• Privileged Session Management• Privileged Threat Analytics• User Activity and Entitlement Auditing• AD Bridge for UNIX/Linux and Mac• Automated AD Recovery & Protection

Vulnerability Management External Risk Management

• Vulnerability Management• Regulatory Compliance Reporting• Configuration Compliance Assessment• Integrated Patch Management• Endpoint Protection Agents

Vulnerability Management External Risk Management

• Vulnerability Management• Regulatory Compliance Reporting• Configuration Compliance Assessment• Integrated Patch Management• Endpoint Protection Agents

Reporting& Analytics

Central DataWarehouse

AssetDiscovery

AssetProfiling

Asset SmartGroups

UserManagement

Workflow &Notification

Third-PartyIntegration

IT Security:Optimize Controls

IT Risk:Calculate Risk

Management:Prioritize Investments

Compliance & Audit:Produce Reports

IT Operations:Prioritize Mitigation

Page 4: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

4

4

Security concepts rarely implemented (properly)

© 2013 BeyondTrust Software

Page 5: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

5

5

Security concepts that are rarely implemented

Least PrivilegeLeast privilege requires that a user be given no more access privilege than necessary to perform a job, task, or function.

Need to knowShould be used heavily in situations where operational secrecy is a key concern in order to reduce the risk that someone will leak that information to the enemy. It's a companion concept to least privilege and it defines that minimum as a need for that access based on job or business requirements.

Page 6: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

6

6

High Profile Breaches in 2013

© 2013 BeyondTrust Software

Page 7: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

7

7

EDWARD SNOWDEN AND THE NATIONAL SECURITY AGENCY

Edward Snowden, a contractor working as a systems administrator for the NSA, convinced several of his co-workers to provide him with their system credentials, according to a report by Reuters. Snowden may have convinced up to 25 employees at the NSA to give him their usernames and passwords under the pretext that he needed them to do his job.

High Profile Breaches in 2013 - NSA

Page 8: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

8

8

In a statement to CSO, a Vodafone spokes person said that a "sophisticated and illegal intrusion into one of its servers in Germany," and that the attack appears to have been executed by someone inside the company. An individual has been identified by the police, and their assets have been seized, but there was no further information available by deadline. Speculation by local media in Germany has pointed to a sub-contractor who worked with the telecom giant's administration system as the key suspect.

High Profile Breaches in 2013 - Vodafone

Page 9: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

9

9

High Profile Breaches in 2013 2014 - JPMorgan

Page 10: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

10

10

High Profile Breaches in 2013 2014 - ShellShock

Page 11: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

11

11

What we can do to reduce the attack surface?

© 2013 BeyondTrust Software

Page 12: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

12

12

How someone can get access to your systems?

They have a valid credential (username and password);Also this valid credential must have the appropriate privileges;

They can exploit an existing vulnerability in your system and in this case they don’t need credentials;

Page 13: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

13

13

What we can do to reduce the attack surface?

Enforce Least Privilege across your organization;

Control who can access each privileged account and system in your environment;

Audit what users are doing when they are granted privileged access.

Audit who is accessing your data, look for anomalies, create alerts, and fix excessive permissions;

Changes to critical objects in AD (i.e. Domain Admins group); Sensitive files and folders in your systems; Executive or strategic mailboxes in your MS-Exchange; Sensitive records, tables or databases in MS-SQL, Oracle, and DB2.

Identify if you can get compromised by external attacks

Audit your vulnerabilities, prioritize, and fix them.

Page 14: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

14

14

How to enforce Least Privilege?

Solution: PowerBroker for Windows

© 2013 BeyondTrust Software

Page 15: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

16

16

Who have local administrators rights today?

Page 16: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

17

17

Which applications requested elevation?

Page 17: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

18

18

Assign admin rights only to approved / business applications

Page 18: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

19

19

Session Monitoring – Audit what users are doing after launching applications with admin rights?

Page 19: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

20

20

How to control access to privileged accounts?

Solution: PowerBroker Password Safe

© 2013 BeyondTrust Software

Page 20: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

22

22

PowerBroker Password Safe

Manager(Web Interface)

Approval Request

Approval Administrati

on,

Auditing, etc.

Password Request

Password(Retrieved via SSH, HTTPS)

Password Request

Password(Retrieved via API, PBPSRUN)

Login w/ Password

Login w/Password

PowerBroker SafeAdministrator

or Auditor(Web or CLI Interface)

User(Web Interface)

Applicationor Script

Routers /Switches

Firewalls WindowsServers

Unix/LinuxServers

SSH/TelnetDevices

IBM iSeriesServers

IBM ZSeriesServers

AD/LDAPDirectories

Databases

22

11

33

44

BB

CC

Page 21: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

23

23

Session Management

Page 22: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

25

25

Account password age – identify issues!

Page 23: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

26

26

Service Account Usage

Page 24: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

27

27

Audit your environment

Microsoft File Servers, Active Directory, Exchange, Event Viewer;Databases: Oracle, MSSQL, and DB2

© 2013 BeyondTrust Software

Page 25: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

28

28

Monitor any change that occurs in A.D.User, Group, OU, Printer (deleted, changed, created, etc)

Who? When? Where? What?

Page 26: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

29

29

Protect critical objects in A.D.Specify that in the “domain admins” group, only the user “cassio” can

make changes. Even other domain admins will not be able to change that.

Page 27: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

30

30

Audit for File ServersWho accessed the file salary.xls in the last 30/60/90 days?

Who is really accessing/changing your critical data?Email me if someone delete or change the file secrets.doc

Page 28: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

31

31

Audit of EventsWhat are the errors or security events that are happening in my servers?

You are seeing user accounts being lock out. Where it’s happening?Would you like to get alerts when some type of events are generated?

Page 29: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

32

32

Audit for Microsoft ExchangeAn email message has “disappeared”. When it happened, who deleted?

Who is reading your CEO e-mail messages? Only him? Really?Would you like to receive an alert when if it occurs?

Page 30: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

33

33

Audit for MSSQL, Oracle, and DB2What changes occurred in the last 24 hours?

Is there someone looking at sensitive tables like salary, credit cards, etc?Would you like to receive an alert if a suspicious activity occurs?

Page 31: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

34

34

Audit your vulnerabilities, prioritize, and patch them!Solution: Retina CS – Vulnerability Mgmt

© 2013 BeyondTrust Software

Page 32: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

35

BeyondInsight Retina CSAudit Vulnerabilities across all your IT environment

Page 33: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

36

36

Where is your risk is higher?

Page 34: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

37

37

Patch Management

- Patches for Microsoft (Windows, MSSQL, Office, etc);- Java;- Adobe;- Winrar;- Firefox, Chrome, etc

Page 35: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

38

38

Risk Matrix Reduction

Page 36: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

39

39

Challenge - You will be surprised!

How many administrators you have in your environment

How many service accounts you have in your environment

Who is accessing your top 5 sensitive folders?

If you create and add a “hacker” account to the Domain Admins group, when people will realize that?

Last time that the password for these devices where changed: Domain administrator on Windows; Administrator account in your MS-Windows workstations; Root in your Linux and Unix systems; Admin password for your networking devices (switches, firewall, etc); SA password for your MS-SQL or Sysadmin for your Oracle

How many vulnerabilities can be exploited remotely? I mean, easily exploited remotely by tools already available on Internet

Page 37: Reduciendo riesgos a través de controles de acceso, manejo de privilegios y auditoria

40

40

Thank You!Bruno [email protected] # 18

© 2013 BeyondTrust Software