Contenu connexe Similaire à Bomgar 2018 Privileged Access Threat Report (20) Bomgar 2018 Privileged Access Threat Report1. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 1
Internal & External
Threats: How to
Address Growing
Privileged Access &
Identity Threats
May 24, 2018
2. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 2
Sam Elliott
Sr. Director of Security Product
Management
Karl Lankford
Sr. Solutions Engineer
4. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 4
• 2018 Threat Landscape
• “Problems with Privilege”
• Insider and Third-Party Risks
• Protecting Privileged Identities and Access
from Threats
• Q&A
• Additional Resources
Agenda
5. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 5
• 62 % of respondents
think it’s possible or
definite they’ve suffered
a breach through insider
action
• 66% of respondents think
it’s possible or definite
they have suffered a
breach through third-
party access
2018 Threat Landscape
https://www.bomgar.com/resources/whitepapers/privileged-access-threat-report
7. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 7
A Matter of Trust
• Organizations placing high
trust in insiders and third-
party vendors
• Good faith isn’t good enough
11. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 11
More and More
People and Systems
Are Gaining Privileges
• Privileges are easy to give,
but difficult to retract
• Failure to secure credentials
used by non-standard users;
service desks, service
accounts, app to app, third
party vendors, etc.
• Limited visibility into all
privileged accounts across
the enterprise
14. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 14
Insider Risk “Hollywood” example
• Sysadmin
• Misused privileges
• Locked other
administrators out
of their accounts
• Shutdown security
systems
• Result: Actions
caused loss of life
21. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 21
• Not using PIM Solutions
• No control of privileged credentials
• Manually controlling privileged credentials
• Using PIM Solutions
• Less severe security breaches
• Better Visibility
Control
22. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 22
• Not using PIM Solutions
• No control of privileged credentials
• Manually controlling privileged credentials
• Using PIM Solutions
• Less severe security breaches
• Better Visibility
Control
23. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 23
Confidence
• Greater visibility into who’s accessing what systems
• Greater visibility into when the systems are being access and for how long
24. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 24
Security
• Shrink the attack surface
• Deploy solutions with ‘security by
design’
• Deploy solutions that don’t
impede productivity
27. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 27
Problem #1:
Remote Access
#1 attack pathway
Problems to Solve
Problem #2:
Privileged Credentials
Used in almost every data breach
28. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 28
Secure Vendor Access
• External vendors are “low hanging
fruit” because they have to adhere
to your policies
• The number of third-parties
connecting to company networks is
rapidly increasing
• Eliminate VPNs for vendors to
improve security and access
management
29. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 29
Secure Insider Access
• Any employee who has privileged
access:
• IT Admins
• IT Operations
• Operational Technologists
• Service Desks
30. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 30
Discover and Safely Store
Passwords
• Leverage an automated discovery
tool to continuously find privileged
accounts on your network
• Secure and manage credentials in
an enterprise identity management
solution
• Increase productivity by eliminating
check-in/check-out and
automatically injecting credentials
into a session
• Eliminating their visibility to the
credential reduces threat of being
phished or used through another
pathway
31. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 31
Rotate and Randomize
Privileged Credentials
• Ensure every local credential that
has some type of admin right has a
unique credential – no more shared
passwords
• Stop lateral movement by
eliminating common credentials
across endpoints
• If a credential is compromised, it
won’t be useful for long because
it’s rotated
32. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 32
Protect Service Accounts
• Manage business uptime, but
ensure those credentials can still
be rotated
• Critical business systems often
have the same service account for
years
• Ensure critical systems stay
productive and don’t have
cascading failures while securing
them
33. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 33
Fortify App to App Security
• Malicious users can compromise
had coded credentials in a script or
an application
• Remove a prime target with app to
app credential security
• Obscure credential through an
identity management solution and
rotate them to remove threat
36. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 36
• 2018 Privileged Access Threat
Report
• 2018 PATR Infographic
• Four Pitfalls of Privilege
• Six Steps to Secure Access for
Privileged Insiders and Vendors
• Bomgar Privileged Access
• Bomgar Privileged Identity
Additional Resources
38. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 38
Thanks for
Joining Us!
bomgar.com/resources/whitepapers/
privileged-access-threat-report