Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics //

Security Monitoring

11/15/2013
05:27 PM
50%
50%

Modeling Users And Monitoring Credentials Prevents Breaches

Attackers quickly grab usernames and passwords to leverage an initial compromise into full-blown network access, but companies that monitor user authentication can head off attacks

Legitimate user credentials are the digital lifeblood of attackers looking to compromise a network. With valid credentials, attackers can infiltrate a target network, elevate their privileges to gain access to more sensitive data, and take control of critical systems.

To combat an attacker's ability to use stolen credentials, companies need to model the behavior of every user -- especially those people, such as system administrators, with access to privileged accounts. Using that baseline, businesses can detect whether the use of a credential falls outside of what is typical or allowed by policy, says Philip Lieberman, president of Lieberman Software, a privileged-account management provider.

"You have to look at not only what a person can do and who they are, but to look at their behavior and whether that behavior has become risky," Lieberman says. "Then you can respond to a high-risk score by shutting down the account if the behavior of the user is becoming anomalous."

At the Cloud Security Alliance (CSA) Congress in December, Lieberman and industry experts will discuss how authentication can be used to better secure cloud services and network infrastructure from attack. The fundamental problem is that few companies have a good idea of how many privileged-user credentials are in existence, where they are stored, and whether an account is still necessary for business, he says.

Companies typically have three or four privileged accounts per employee, most which are not monitored or managed by the business, according to a recent survey by CyberArk, a privileged-account security firm. Finding those accounts and monitoring their access is critical to heading off insider attacks and more persistent external attackers, says John Worrall, chief marketing officer for CyberArk.

"The advanced threat from the outside really goes south for [companies] once the attackers compromise an insider's privileged credential," he says. "So you really want to have real-time monitoring of behaviors -- then you can build these profiles of what is expected."

Similar to financial firms tracking credit-card usage, monitoring behavior allows companies to determine whether an employee's account exhibits irregular behavior. Logging in from a different country, outside of work hours or to several accounts in one session, are all likely signs of compromise, Worrall says.

[Top executives, power users, and IT administrators may have access to more than they should. Here are some tips for keeping them in check. See How To Monitor And Control Privileged Users.]

In addition, companies should look at their password policies and work to limit privileged access, Lieberman says. A single user should not be logged into his privileged account while doing day-to-day work. Rather, he should have to elevate privilege only when necessary. Taking that approach limits the exposure of that particular user and the account credential, he says.

"This is a matter of behavior, not a matter of technology," he says. "We have to spend a lot of time on training the behavior of our customers to operate their business in a sane way that gives them some resiliency."

Companies also need to survey their use of privileged accounts, searching for default passwords, backdoor accounts, accounts for workers no longer employed by the company, and accounts that are rarely, or never, used.

Companies also can work with their authentication providers to use the most appropriate type of security for privileged accounts. Mobile authentication provider Nok Nok Labs can query a mobile device and attempt to use the strongest possible type of authentication, a technique that helps secure the cloud service from attackers, says Brendon Wilson, director of product management for Nok Nok Labs.

"There is a bunch of advanced capabilities on mobile devices -- increasingly secure chips and secure elements -- all of these things can be used to make the authentication piece stronger, whether for an enterprise, a consumer business, or a Web service," he says.

Yet companies cannot just rely on strong authentication to keep out attackers. They have to assume the attackers are already inside their perimeters, Lieberman says.

"If you wake up every day knowing that someone is in your systems, and you shouldn't stop looking for them, then I think you have a pretty good chance of preventing a breach," he says.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
7 Tips for Infosec Pros Considering A Lateral Career Move
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2020
For Mismanaged SOCs, The Price Is Not Right
Kelly Sheridan, Staff Editor, Dark Reading,  1/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment:   It's a PEN test of our cloud security.
Current Issue
IT 2020: A Look Ahead
Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year. Download it today!
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7245
PUBLISHED: 2020-01-23
Incorrect username validation in the registration processes of CTFd through 2.2.2 allows a remote attacker to take over an arbitrary account after initiating a password reset. This is related to register() and reset_password() in auth.py. To exploit the vulnerability, one must register with a userna...
CVE-2019-14885
PUBLISHED: 2020-01-23
A flaw was found in the JBoss EAP Vault system in all versions before 7.2.6.GA. Confidential information of the system property's security attribute value is revealed in the JBoss EAP log file when executing a JBoss CLI 'reload' command. This flaw can lead to the exposure of confidential information...
CVE-2019-17570
PUBLISHED: 2020-01-23
An untrusted deserialization was found in the org.apache.xmlrpc.parser.XmlRpcResponseParser:addResult method of Apache XML-RPC (aka ws-xmlrpc) library. A malicious XML-RPC server could target a XML-RPC client causing it to execute arbitrary code. Apache XML-RPC is no longer maintained and this issue...
CVE-2020-6007
PUBLISHED: 2020-01-23
Philips Hue Bridge model 2.X prior to and including version 1935144020 contains a Heap-based Buffer Overflow when handling a long ZCL string during the commissioning phase, resulting in a remote code execution.
CVE-2012-4606
PUBLISHED: 2020-01-23
Citrix XenServer 4.1, 6.0, 5.6 SP2, 5.6 Feature Pack 1, 5.6 Common Criteria, 5.6, 5.5, 5.0, and 5.0 Update 3 contains a Local Privilege Escalation Vulnerability which could allow local users with access to a guest operating system to gain elevated privileges.