Privileged accounts have emerged as the primary target for advanced enterprise attacks and have been exploited to perpetrate some of the most devastating cyber-attacks and data breaches in recent memory, including those occurring at Saudi Aramco, South Korea, Global Payments, the South Carolina Department of Revenue, and the U.S. Department of Energy among others. According to a recent report by information security firm Mandiant, "APT intruders prefer to leverage privileged accounts where possible, such as Domain Administrators, service accounts with Domain privileges, local Administrator accounts, and privileged user accounts."
Privileged accounts consist of privileged and administrative accounts, default and hardcoded passwords, application backdoors, and more. These accounts act as a gateway to an organization's most sensitive data, which is accessible across systems, applications and servers. Despite the repeated abuse of privileged accounts in cyber-attacks, organizations continue to have a difficult time identifying and managing these critical vulnerabilities.
Key findings of the survey include:
· Organizations Failing to Accurately Scope the Privileged Problem
o Based on the examination of more than 1200 customer deployments, Cyber-Ark determined that the number of privileged accounts in an organization is typically 3-4 times the number of employees. When asked to estimate the number of privileged accounts in their organization, 86% of respondents from large enterprises (5000+ employees) stated they either didn't know how many accounts they had or that they had no more than 1 per employee. That means at least 2 out of every 3 privileged accounts in these organizations are either unknown or unmanaged.
o Privileged accounts can be found in any device with a microprocessor, including PCs, databases, networked devices like copiers, operating systems and more. When asked where privileged accounts could be found, 63% correctly stated 'all of the above.' This means that 37% of respondents do not understand where privileged accounts exist in their organization.
· Shared Vulnerabilities – Businesses Sharing Privileged Passwords Despite Best Practices
o Fifty one percent of all organizations surveyed stated that privileged and administrative account passwords were shared among "approved" users.
o The problem is more wide spread among large enterprises, where 56% of respondents stated they shared privileged passwords, as opposed to 47% of SMBs (5000 employees or less).
o According to Gartner's "Ten Best Practices for Managing Privileged Accounts," the passwords for 'shared privileged accounts' should never be shared, stating "...sharing super-user account passwords dramatically increases the risk that a password may become known outside the intended groups. Furthermore, poorly controlled use of shared accounts cannot provide the individual accountability that is a security best practice and demanded by regulatory compliance."
· Changing Privileged Passwords – Change Frequency Below Recommended Standards
o Despite 82% of respondents stating they have processes in place for changing privileged passwords, 49% of all businesses take 90 days or longer to change their privileged passwords, while 74% take 60 days or longer. This problem is exacerbated with large enterprises, where 53% take 90 days or longer to change privileged passwords.
o While some industry standards suggest that privileged account passwords be changed "at a frequent interval of no longer than 90 days," the recent spate of attacks using privileged accounts demonstrates this time period is no longer sufficient and leaves organizations vulnerable. Privileged account password changes should be automated and restricted to one-time use to ensure tighter security standards.
"It has become clear that privileged accounts are a priority target for cyber-attackers – every new report highlights this and every new attack reveals the privileged pathway the attackers are travelling. Despite this, organizations are having a difficult time understanding the magnitude of this security problem in their environments because privileged accounts exist everywhere," said John Worrall, CMO of Cyber-Ark. "To minimize the risk associated with these accounts, organizations need to identify where these accounts exist, control access to them, and monitor exactly what is being done with them. Implementing a privileged account security solution to automate these processes helps organizations enforce these controls, while providing a clear audit trail for accountability and security."
Full Research Brief: http://goo.gl/EZJu3
Free Privileged Account Security Risk Assessment: http://www.cyber-ark.com/discover-dna
Cyber-Ark® Software is a global information security company that specializes in protecting and managing privileged users, sessions, applications and sensitive information to improve compliance, productivity and protect organizations against insider threats and advanced external threats. With its award-winning Privileged Identity Management, Privileged Session Management and Sensitive Information Management Suites, organizations can more effectively manage and govern data center access and activities, whether on-premise, off-premise or in the cloud, while demonstrating returns on security investments. Cyber-Ark works with more than 1,200 customers, including more than 40% of the Fortune 100. Headquartered in Newton, Mass., Cyber-Ark has offices and authorized partners in North America, Europe and Asia Pacific. For more information, please visit www.cyber-ark.com.