Tuesday, 2 June 2015

The Power And Problem Of Privilege In Cybersecurity

All identities are not created equal. There are regular users. And then there are superusers, people who wield far greater access and privilege in the organization’s IT environment.

These privileged identities are necessary—users like database administrators and sys admins do need extensive access to computers, networks and applications—but privileged identities come with risk. In addition, IT departments often give non-technical executives (e.g. VP of Sales, CEOs, CFOs, etc.) broad privilege inside corporate applications, figuring it is better to give too much freedom to upper management than get yelled at when someone can’t create a report.

These elevated permissions make privileged accounts intensely sought by hackers, who can steal far more information and do far more damage if they get their hands on a privileged identity. After all, why rob the branch bank on the corner when you can break into Fort Knox? You want to get maximum return for your effort and privileged identities provide it.

Verizon’s 2015 Data Breach Investigations Report shows that the organization’s most vulnerable point is not just any ol’ password but passwords that hold the proverbial keys to the kingdom, those privileged identities that have root, admin or read/write access privileges for critical infrastructure, apps and data.

If privileged identities are well audited and monitored, and not shared like some viral video, hackers can be discouraged and damage contained. But too often it’s quite simple for cybercriminals to get ahold of privileged identities.

Hackers used basic phishing emails to penetrate the networks of Sony Pictures in fall 2014. An investigation of the hack revealed that a number of top Sony Pictures executives, including CEO Michael Lynton, got fake Apple ID-verification emails in mid-September asking them to go to a phony Apple website to confirm their Apple ID and password. Assuming, correctly, that some of the executives were using the same ID and password at work, the hackers gained broad access and ransacked the Sony files.

The Problem of Pervasive Privilege

It’s not only company executives who present a soft spot for hackers. Increasingly it’s lower-level employees, as privileged identities become more pervasive. With the consumerization of IT and the popularity of BYOD, there has been an explosion of new apps in the enterprise. Employees in every cubicle are using Box, Workday and Salesforce, and they’re not waiting for IT’s permission to do so. They’re using their own apps on their own devices. Many are spinning up servers in the cloud for infrastructure in the cloud, a practice dubbed bring your own server.  So privilege is now being consumerized like apps and devices.

View the original content and more from this author here: http://ift.tt/1Qktn7v


from hacker samurai http://ift.tt/1KKpnii
via IFTTT

No comments:

Post a Comment