Thycotic Denver Presentation
Thycotic Denver Presentation
PRIVILEGED ACCOUNTS
Greg Hanchin
Owner, TechVader
Insider threat: today’s risk
What does a security team have to deal with?
Auditors/compliance
External threats
Insider threats
NDA - CONFIDENTIAL
THE THREAT LANDSCAPE HAS CHANGED
Old Paradigm
Perimeter security
Firewall, AV,IDS,IPS, email gateways
Threat detection
SIEM, Big data analytics, IOC detection
Account and user provisioning
Role based access, layering, insider threat
What is the result of all of this security?
http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
HUMAN SECURITY
RISKS
% of people use
the same +500 Data Breaches
password for 500m Records
Data Source: Symantec ISTR 2015 social sites
Data Source: Verizon DBIR Report 2015 WWW.ESCGS.COM
SEVERAL HOSPITALS DECLARED
STATE OF EMERGANCY
THE THREAT LANDSCAPE HAS CHANGED
New Paradigm
No matter how much security you put in place you are
still going to be breached.
One example: Advanced Persistent Threats - Malware
Email phishing: 10 emails - 100% someone will open
an executable. BOOM! APT has control
If we know that we are going to be breached,
what can we do?
If we know we are going to get breached,
the questions we should ask are:
How do I mitigate risk?
What do hackers target?
What do hackers target?
“APT intruders…prefer to leverage
privileged accounts where possible, such
as Domain Administrators, service
accounts with Domain privileges, local
Administrator accounts, and privileged
user accounts.” Mandiant, mtrends report and APT1 report
12
Three common practices
that highlight need for
password management
1. Failure to update passwords
2. Passwords stored on
spreadsheets or sticky notes
“One of the things I love about Secret Server is the out of the
box integration with our existing technology tools. We
maintain a lot of different systems, and so it’s really nice to
have tools that work together as opposed to needing to figure
out how to build custom integrations.”
– Mathew Eshleman, Chief Technology Officer Community IT
Innovators
NDA - CONFIDENTIAL
Secret Server
Architecture
Remote Password Changing
Windows services
Unix/Linux accounts
NDA - CONFIDENTIAL
Closing the termination gap
NDA - CONFIDENTIAL
Solution:
IT ADMIN LEAVES
• Run Audit Report on Password Usage
• Automate Password Changes
• Coordinate with HR
Reducing exposure
NDA - CONFIDENTIAL
Solution:
REDUCING EXPOSURE
• Use passwords without knowing them
• Session Launching
• Change passwords automatically after use
• Check Out
Service accounts
NDA - CONFIDENTIAL
Solution:
MANAGING SERVICE ACCOUNTS
• Automatically find all your service accounts
• Discovery
• Windows Services, Scheduled Tasks, IIS AppPools
• COM+, File Regex, PowerShell extensions
• Automatically change password everywhere
• Full automation
NDA - CONFIDENTIAL
Solution:
WORKFLOW APPROVAL
• Request access to sensitive Secrets
• Dual Approval if necessary
• Approve for limited period of time
• Capture service request/ticket number
• Complete audit trail for compliance
Who’s watching IT?
NDA - CONFIDENTIAL
Solution:
WHO’S WATCHING IT?
• SIEM integration
• Get shared/privileged account activity to your SIEM and
correlate with AD identity for true accountability
• Session Monitoring
• Launch SSH, RDP, MSSQL, etc. sessions
• Record all activity
• SSH proxy to capture all keystroke activity
• Live monitoring and session termination
SIEM TOOL INTEGRATION
Monitor Account Usage
Syslog format
CEF format
• API integrations
• .NET/Java/Perl/PHP/PowerShell/etc.
• Push
• Update embedded passwords directly from
vault
• Pull
• Use API from custom and 3rd party applications
to retrieve passwords at runtime
BEFORE @echo off
echo —————————————-
echo Uploading changes…
echo —————————————-
ftpsync-1.3.04\ftpsync.pl documents
ftp://jsmith:passJgH47523@10.0.10.100/stage/mydocuments
Request a Trial:
https://thycotic.com/products/secret-server/start-a-trial/
JUNE 20th & 21st
Washington D.C.