Insecure ID Management and Access Control
One of the most common ways in which attackers have broken into target networks is by stealing and misusing third-party access credentials.
Suppliers, contractors, technology vendors and others often require direct access to your system for a variety of reasons. Poorly managed access privileges give attackers a way to gain access to your network via a third-party account and to use that access to try and jump onto other more systems and network segments. Target is perhaps the best-known example. But over the years scores of other organizations have experienced similar breaches.
"Attackers can more easily leverage overextended credentials through third parties," says Sam Abadir, vice president of industry solutions at Lockpath. Often third-parties do not pay as much attention to security training for phishing and social engineering attacks, making them relatively easy targets for credential theft. "Companies we work with are starting to realize the risk around identity management, as it relates to the access given to third parties, which is often overlooked," Abadir says.
Image Source: Michael Traitov via Shutterstock