SlideShare a Scribd company logo
Enemy from Within:
Managing and
Controlling Access
Dr. Eric Cole
Author, SANS Top 20 Critical Controls
Morey J. Haber
VP of Technology, BeyondTrust
Joe Gottlieb
SVP Corporate Development, SailPoint
Is Your Access Control Hacker Proof?
OR
Are You One Click Away From a Breach?
Dr. Eric Cole
2
The difference between a minor breach and a major breach is
based off of what information the adversary was able to
obtain access to.
The question you need to ask is how effective is your access
control?
3
Scenario 1 – Weak Password
SCENARIO
An attacker finds a web portal
that allows access to your
network. The access is based
on a username and password.
Account harvesting is done
via social media and
password cracking is
performed. A weak password
is cracked to obtain access
WHAT FAILED
Password controls and
policies
Monitoring and
detection of password
cracking
REMEDIATION
Account lockout
Strong password policy
with enforcement
4
Scenario 2 – Compromised Credentials
SCENARIO
User does not properly
protect their credentials
and leaves their computer
unlocked at a hotel,
airport or coffee shop.
Adversary is able to
compromise the system
and gain access to both
local and network based
data stores
WHAT FAILED
User awareness
System lockdown
Account monitoring
REMEDIATION
Utilize multi-factor
authentication
Enabled screen lockout
Limit or monitor access when
connected to public networks
5
Scenario 3 – Uncontrolled Data
SCENARIO
Data is constantly copied
and stored on multiple
systems throughout the
organization. No one has
idea where the
information is located
except an adversary.
From the DMZ the
adversary is able to access
and compromise sensitive
information.
WHAT FAILED
Data classification
No control of data
access or permissions
REMEDIATION
Data discovery
Segmentation
Data flow analysis
6
Scenario 4 – Advanced Phishing
SCENARIO
User receives an email
believing it is from their boss
who is on vacation will all
content being valid and
legitimate but attachment
contains malicious code
Since boss is away, email
cannot be verified and
system becomes
compromised with no
remediation
WHAT FAILED
Email filtering and
monitoring
Controlling and
managing access
Privilege escalation
REMEDIATION
Controlling access
Limiting executable
content
7
Scenario 5 – Malicious External
SCENARIO
External adversary targets
systems on the DMZ and
compromises the server
as a pivot point. From the
DMZ they perform lateral
movement and ultimately
compromise sensitive
information from the
database
WHAT FAILED
Provision management
Entitlements
Timely detection
REMEDIATION
Access control
Data classification
Data monitoring
8
Recent Major Breaches
9
Your Organization
• Resources
• Identities
• Entitlements
Interaction Between
Assets and Users
Can Represent Risk
10
Enemy from Within…
• Insider Threats
• External Threats
All Breaches and Exfiltration
of Sensitive Data Need to Leverage
Vulnerabilities and/or Privileges
11
Critical Questions for Managing Risk
Identity & Access Management (IAM) and Privileged Access Management (PAM)
Who has access
to what?
Is that access
appropriate?
Is that access being
used appropriately?
PAMIAM
12
How is that access changing over time?
How do IAM and PAM Fit Together?
Deep Controls for Privileged AccountsBroad Governance for All Accounts
CONTINUOUS MONITORING
SESSION CONTROL
ACCESS CONTROL
DISCOVERY
PROVISIONING
ACCESS CERTIFICATION
ACCESS REQUESTS
CREDENTIAL LOCK DOWN
IAM PAM
13
Combining IAM and PAM for Comprehensive Control
Broad Governance for All Accounts + Deep Controls for Privileged Accounts
CONTINUOUS MONITORING
SESSION CONTROL
ACCESS CONTROL
DISCOVERY
PROVISIONING
ACCESS CERTIFICATION
ACCESS REQUESTS
CREDENTIAL LOCK DOWN
Mobile
Devices
Security
AppliancesDatabase
s
Operating
Systems
SaaS &
Cloud
Network
DevicesDirectoriesStorageSCADAMainfram
e
14
SailPoint Identity & Access Management
15
Compliance
Manager
Lifecycle
Manager
Password
Manager
Dashboards
Reporting
Analytics
Policy
Model
Identity
Warehouse
Role
Model
Workflow
Engine
Risk
Model
3rd Party
Provisioning
Mobile Device
Management
IT Service
Management
IT
Security
Identity
Intelligence Unified Governance
Platform
Cloud
Apps
On-prem
Apps
Directory
Services
Structured
Data
Unstructured
Data
Scenario 1:
Weak
Password
Scenario 3:
Uncontrolled
Data
Scenario 4:
Advanced
Phishing
Scenario 5:
Malicious
External
Reduce user-based risk and mitigate threats
to information assets
3 Address security exposures across large,
diverse IT environments
3 Comply with internal, industry and
government mandates
3
The BeyondInsight IT Risk Management Platform is an integrated suite of software solutions used by IT professionals and security experts to collaboratively:
BeyondTrust Privilege Management Platform
16
Scenario 1:
Weak
Password
Scenario 2:
Compromised
Credentials
Scenario 4:
Advanced
Phishing
Scenario 5:
Malicious
External
Summary
• Attacks are increasingly proactive, sophisticated and
opportunistic
• To minimize risk, enterprises must master the complexity of
access
• IAM and PAM can be combined to achieve comprehensive
control
17
Poll
Thank you for attending
today’s webinar!
Dr. Eric Cole
Author, SANS Top 20 Critical Controls
Morey J. Haber
VP of Technology, BeyondTrust
Joe Gottlieb
SVP Corporate Development, SailPoint

More Related Content

PDF
How Federal Agencies Can Build a Layered Defense for Privileged Accounts
PDF
External Attacks Against Privileged Accounts - How Federal Agencies Can Build...
PPTX
External Attacks Against Pivileged Accounts
PPTX
Website security
PPTX
Types of Malware (CEH v11)
PPTX
What's new in​ CEHv11?
PPTX
Malicion software
How Federal Agencies Can Build a Layered Defense for Privileged Accounts
External Attacks Against Privileged Accounts - How Federal Agencies Can Build...
External Attacks Against Pivileged Accounts
Website security
Types of Malware (CEH v11)
What's new in​ CEHv11?
Malicion software

What's hot (20)

PPTX
Strategies to Combat New, Innovative Cyber Threats - 2017
PPTX
Ransomware
PPTX
Ransomware: A Perilous Malware
PPTX
Why Insider Threat is a C-Level Priority
PPTX
Distribution Industry: What is Ransomware and How Does it Work?
PPTX
Most Common Application Level Attacks
PPTX
Web server security challenges
PDF
Risk-based Authentication In Cloud | Sysfore
PDF
Learnings from the Cloud: What to Watch When Watching for Breach
PPTX
Security vulnerability
PDF
What is threat intelligence ?
PDF
10 best cybersecurity companies in healthcare for 2021
PPTX
Top 10 web server security flaws
PPTX
Cyber Vulnerabilities & How companies can test them
PPTX
Insider Threat Summit - The Future of Insider Threat Detection
PDF
Healthcare Cybersecurity Survey 2018 - Sirius
PDF
Security in Computing and IT
PDF
Nonprofit Cybersecurity Incident Report
PDF
Ransomware 2020 Report
PDF
The only way to survive is to automate your SOC
Strategies to Combat New, Innovative Cyber Threats - 2017
Ransomware
Ransomware: A Perilous Malware
Why Insider Threat is a C-Level Priority
Distribution Industry: What is Ransomware and How Does it Work?
Most Common Application Level Attacks
Web server security challenges
Risk-based Authentication In Cloud | Sysfore
Learnings from the Cloud: What to Watch When Watching for Breach
Security vulnerability
What is threat intelligence ?
10 best cybersecurity companies in healthcare for 2021
Top 10 web server security flaws
Cyber Vulnerabilities & How companies can test them
Insider Threat Summit - The Future of Insider Threat Detection
Healthcare Cybersecurity Survey 2018 - Sirius
Security in Computing and IT
Nonprofit Cybersecurity Incident Report
Ransomware 2020 Report
The only way to survive is to automate your SOC
Ad

Viewers also liked (20)

PDF
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
PDF
Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks
PDF
HyTrust and VMware-Providing a Secure Virtual Infrastructure
PPTX
Rethinking Security: The Cloud Infrastructure Effect
PPTX
Simplifying Security Management in the Virtual Data Center
PPTX
Transforming the CSO Role to Business Enabler
PDF
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
PDF
Secure Multi Tenancy In the Cloud
PPTX
SDDC Study: SDDC Goes Mainstream
PPTX
Novo Presentation
PDF
Rotary club, dhone may 2013 pml
PPTX
IT3196 final presentation
PDF
Feb pml
PPTX
Novo Presentation
PPTX
1 adam brakman_wax_onwaxoff(director'snotebook#2)
PPT
Matter 123
PDF
R.C DHONE November pml
PDF
November gml
PPTX
piggott zachary_director'snotebook
PDF
January pml r.c. dhone
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks
HyTrust and VMware-Providing a Secure Virtual Infrastructure
Rethinking Security: The Cloud Infrastructure Effect
Simplifying Security Management in the Virtual Data Center
Transforming the CSO Role to Business Enabler
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure Multi Tenancy In the Cloud
SDDC Study: SDDC Goes Mainstream
Novo Presentation
Rotary club, dhone may 2013 pml
IT3196 final presentation
Feb pml
Novo Presentation
1 adam brakman_wax_onwaxoff(director'snotebook#2)
Matter 123
R.C DHONE November pml
November gml
piggott zachary_director'snotebook
January pml r.c. dhone
Ad

Similar to Enemy from Within: Managing and Controlling Access (20)

PDF
Security Fact & Fiction: Three Lessons from the Headlines
PDF
Evidence-Based Security: The New Top Five Controls
PPTX
SoCal HIMSS Privacy Security Webinar
PDF
2011 SC Magazine Insider Threat Keynote
PPTX
Privileged Access Management (PAM): Understanding and Mitigating Insider Secu...
PPTX
Access Control and Maintenance.pptx
DOCX
CHAPTER2Managing Risk Threats, Vulnerabilities, and Exploit.docx
PDF
ISACA Los Angeles 2010 Compliance - Ulf Mattsson
PDF
1. security 20 20 - ebook-vol2
PPT
Information security management v2010
PPTX
NRF Presentation v2
PDF
Cyber Readiness and Hygiene for Government Contractors
PPTX
INFRAGARD 2014: Back to basics security
PPSX
November 2017: Part 6
PPTX
attack vectors by chimwemwe.pptx
PPTX
BSIDES DETROIT 2015: Data breaches cost of doing business
PDF
Data exfiltration so many threats 2016
PPTX
Top 12 Threats to Enterprise
PDF
Anatomy of a breach - an e-book by Microsoft in collaboration with the EU
PDF
Anatomy Of A Breach: The Good, The Bad & The Ugly
Security Fact & Fiction: Three Lessons from the Headlines
Evidence-Based Security: The New Top Five Controls
SoCal HIMSS Privacy Security Webinar
2011 SC Magazine Insider Threat Keynote
Privileged Access Management (PAM): Understanding and Mitigating Insider Secu...
Access Control and Maintenance.pptx
CHAPTER2Managing Risk Threats, Vulnerabilities, and Exploit.docx
ISACA Los Angeles 2010 Compliance - Ulf Mattsson
1. security 20 20 - ebook-vol2
Information security management v2010
NRF Presentation v2
Cyber Readiness and Hygiene for Government Contractors
INFRAGARD 2014: Back to basics security
November 2017: Part 6
attack vectors by chimwemwe.pptx
BSIDES DETROIT 2015: Data breaches cost of doing business
Data exfiltration so many threats 2016
Top 12 Threats to Enterprise
Anatomy of a breach - an e-book by Microsoft in collaboration with the EU
Anatomy Of A Breach: The Good, The Bad & The Ugly

More from BeyondTrust (20)

PDF
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
PDF
10 Steps to Better Windows Privileged Access Management
PDF
Tips to Remediate your Vulnerability Management Program
PDF
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
PDF
5 Steps to Privilege Readiness (infographic)
PDF
Unearth Active Directory Threats Before They Bury Your Enterprise
PDF
8-step Guide to Administering Windows without Domain Admin Privileges
PDF
Securing DevOps through Privileged Access Management
PDF
Crush Common Cybersecurity Threats with Privilege Access Management
PDF
Active Directory Auditing Tools: Building Blocks or just a Handful of Dust?
PDF
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
PDF
Unix / Linux Privilege Management: What a Financial Services CISO Cares About
PDF
Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)
PDF
Mitigating Risk in Aging Federal IT Systems
PDF
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
PDF
Hacker techniques for bypassing existing antivirus solutions & how to build a...
PDF
Prevent Data Leakage Using Windows Information Protection (WIP)
PDF
Defense in Depth: Implementing a Layered Privileged Password Security Strategy
PDF
Managing Unix Accounts in Today's Complex World: Stop the Shadow IT and Be Mo...
PDF
The Hacker Playbook: How to Think Like a Cybercriminal to Reduce Risk
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
10 Steps to Better Windows Privileged Access Management
Tips to Remediate your Vulnerability Management Program
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
5 Steps to Privilege Readiness (infographic)
Unearth Active Directory Threats Before They Bury Your Enterprise
8-step Guide to Administering Windows without Domain Admin Privileges
Securing DevOps through Privileged Access Management
Crush Common Cybersecurity Threats with Privilege Access Management
Active Directory Auditing Tools: Building Blocks or just a Handful of Dust?
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
Unix / Linux Privilege Management: What a Financial Services CISO Cares About
Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)
Mitigating Risk in Aging Federal IT Systems
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
Hacker techniques for bypassing existing antivirus solutions & how to build a...
Prevent Data Leakage Using Windows Information Protection (WIP)
Defense in Depth: Implementing a Layered Privileged Password Security Strategy
Managing Unix Accounts in Today's Complex World: Stop the Shadow IT and Be Mo...
The Hacker Playbook: How to Think Like a Cybercriminal to Reduce Risk

Recently uploaded (20)

PPTX
CHAPTER 2 - PM Management and IT Context
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Digital Strategies for Manufacturing Companies
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PPTX
ManageIQ - Sprint 268 Review - Slide Deck
PDF
medical staffing services at VALiNTRY
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PPTX
L1 - Introduction to python Backend.pptx
PPTX
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
System and Network Administration Chapter 2
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
CHAPTER 2 - PM Management and IT Context
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Odoo POS Development Services by CandidRoot Solutions
Wondershare Filmora 15 Crack With Activation Key [2025
Digital Strategies for Manufacturing Companies
Design an Analysis of Algorithms I-SECS-1021-03
Upgrade and Innovation Strategies for SAP ERP Customers
ManageIQ - Sprint 268 Review - Slide Deck
medical staffing services at VALiNTRY
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
VVF-Customer-Presentation2025-Ver1.9.pptx
L1 - Introduction to python Backend.pptx
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
Which alternative to Crystal Reports is best for small or large businesses.pdf
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
System and Network Administration Chapter 2
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)

Enemy from Within: Managing and Controlling Access

  • 1. Enemy from Within: Managing and Controlling Access Dr. Eric Cole Author, SANS Top 20 Critical Controls Morey J. Haber VP of Technology, BeyondTrust Joe Gottlieb SVP Corporate Development, SailPoint
  • 2. Is Your Access Control Hacker Proof? OR Are You One Click Away From a Breach? Dr. Eric Cole 2
  • 3. The difference between a minor breach and a major breach is based off of what information the adversary was able to obtain access to. The question you need to ask is how effective is your access control? 3
  • 4. Scenario 1 – Weak Password SCENARIO An attacker finds a web portal that allows access to your network. The access is based on a username and password. Account harvesting is done via social media and password cracking is performed. A weak password is cracked to obtain access WHAT FAILED Password controls and policies Monitoring and detection of password cracking REMEDIATION Account lockout Strong password policy with enforcement 4
  • 5. Scenario 2 – Compromised Credentials SCENARIO User does not properly protect their credentials and leaves their computer unlocked at a hotel, airport or coffee shop. Adversary is able to compromise the system and gain access to both local and network based data stores WHAT FAILED User awareness System lockdown Account monitoring REMEDIATION Utilize multi-factor authentication Enabled screen lockout Limit or monitor access when connected to public networks 5
  • 6. Scenario 3 – Uncontrolled Data SCENARIO Data is constantly copied and stored on multiple systems throughout the organization. No one has idea where the information is located except an adversary. From the DMZ the adversary is able to access and compromise sensitive information. WHAT FAILED Data classification No control of data access or permissions REMEDIATION Data discovery Segmentation Data flow analysis 6
  • 7. Scenario 4 – Advanced Phishing SCENARIO User receives an email believing it is from their boss who is on vacation will all content being valid and legitimate but attachment contains malicious code Since boss is away, email cannot be verified and system becomes compromised with no remediation WHAT FAILED Email filtering and monitoring Controlling and managing access Privilege escalation REMEDIATION Controlling access Limiting executable content 7
  • 8. Scenario 5 – Malicious External SCENARIO External adversary targets systems on the DMZ and compromises the server as a pivot point. From the DMZ they perform lateral movement and ultimately compromise sensitive information from the database WHAT FAILED Provision management Entitlements Timely detection REMEDIATION Access control Data classification Data monitoring 8
  • 10. Your Organization • Resources • Identities • Entitlements Interaction Between Assets and Users Can Represent Risk 10
  • 11. Enemy from Within… • Insider Threats • External Threats All Breaches and Exfiltration of Sensitive Data Need to Leverage Vulnerabilities and/or Privileges 11
  • 12. Critical Questions for Managing Risk Identity & Access Management (IAM) and Privileged Access Management (PAM) Who has access to what? Is that access appropriate? Is that access being used appropriately? PAMIAM 12 How is that access changing over time?
  • 13. How do IAM and PAM Fit Together? Deep Controls for Privileged AccountsBroad Governance for All Accounts CONTINUOUS MONITORING SESSION CONTROL ACCESS CONTROL DISCOVERY PROVISIONING ACCESS CERTIFICATION ACCESS REQUESTS CREDENTIAL LOCK DOWN IAM PAM 13
  • 14. Combining IAM and PAM for Comprehensive Control Broad Governance for All Accounts + Deep Controls for Privileged Accounts CONTINUOUS MONITORING SESSION CONTROL ACCESS CONTROL DISCOVERY PROVISIONING ACCESS CERTIFICATION ACCESS REQUESTS CREDENTIAL LOCK DOWN Mobile Devices Security AppliancesDatabase s Operating Systems SaaS & Cloud Network DevicesDirectoriesStorageSCADAMainfram e 14
  • 15. SailPoint Identity & Access Management 15 Compliance Manager Lifecycle Manager Password Manager Dashboards Reporting Analytics Policy Model Identity Warehouse Role Model Workflow Engine Risk Model 3rd Party Provisioning Mobile Device Management IT Service Management IT Security Identity Intelligence Unified Governance Platform Cloud Apps On-prem Apps Directory Services Structured Data Unstructured Data Scenario 1: Weak Password Scenario 3: Uncontrolled Data Scenario 4: Advanced Phishing Scenario 5: Malicious External
  • 16. Reduce user-based risk and mitigate threats to information assets 3 Address security exposures across large, diverse IT environments 3 Comply with internal, industry and government mandates 3 The BeyondInsight IT Risk Management Platform is an integrated suite of software solutions used by IT professionals and security experts to collaboratively: BeyondTrust Privilege Management Platform 16 Scenario 1: Weak Password Scenario 2: Compromised Credentials Scenario 4: Advanced Phishing Scenario 5: Malicious External
  • 17. Summary • Attacks are increasingly proactive, sophisticated and opportunistic • To minimize risk, enterprises must master the complexity of access • IAM and PAM can be combined to achieve comprehensive control 17
  • 18. Poll
  • 19. Thank you for attending today’s webinar! Dr. Eric Cole Author, SANS Top 20 Critical Controls Morey J. Haber VP of Technology, BeyondTrust Joe Gottlieb SVP Corporate Development, SailPoint