3 speakers
May 20, 2021 2:00 p.m. ET
Duration: 1 hour
Cost: No Fee
Description
The least-privilege model is limiting how much damage hackers can do in federal networks
When it comes to hacking into an organization, accessing a privileged account can be the Holy Grail.
Privileged accounts offer the keys to large parts of networks, software and other information that can expose a company and its employees.
Government agencies are now being extra cautious with the way they dole out privileges, but it’s not always easy to clamp down on who can access certain parts of an enterprise.
Paul Morris, the chief information officer for the Centers for Disease Control and Prevention says his agency uses the least-privilege model, which gives everyone a basic account where email and internet can be accessed.
Users who need more privileges are given separate accounts for higher administration roles.
“What we also do is we put specific technical controls on those accounts,” he said during the discussion Protecting Government Data in a Post-Solar Winds World, sponsored by CyberArk. “We don’t want admins to able to access the internet or check their email while they’re in that account. That keeps the threat vector of a bad person coming in, taking over the account and then getting access to that function that they’re doing low.”
Techniques like that keep an organization’s attack surface low. That’s something that Bryan Murphy, senior director of consulting services and incident response at CyberArk, says is important to protecting privileged accounts.
“One of the struggles that we see customers go through, especially the federal agencies, is they only know about certain accounts they have, they don’t have the whole scope or breadth of coverage,” he said. “We want to use tools and automation to discover, but also put in processes and procedures to make sure, that there’s not accounts being created without our knowledge within the organization.”
If a hacker can be stopped at the ground floor and only have access to the least-privileged accounts then they will not be able to do as much damage.
Morris said there are a handful of ways CDC is enforcing least privilege.
“As a user, I want to make sure I can’t install anything I want,” he said. “I don’t want to download and install things that that may be talking back home to another organization, providing a threat into the enterprise online. We are keeping track of what’s allowed, and then keeping control of applications that can be installed by user.”
For admin accounts, CDC builds accounts with purpose to ensure people who will only use the privileges given will get them.
“We define those groups and through those we have specific permissions and specific policies that allow them to be able to do the job that they’re doing,” Morris said. “The key there is we can apply those policies across the group or the role for that base access, and it doesn’t affect the general user, you are me. The average user is happy because they’re not being affected. We can quickly change those permissions. Another layer down from that is that local permissions, say in a different campus, are supported by approvals by supervisors and IT security officers. We put some technical constraints around it so that privileged user can only do those functions within that building. They couldn’t do that in any CDC facility.”
Murphy said those partitions are important because they limit the “blast radius” of what can happen if a hacker does get into one of the accounts.
“A lot of customers don’t have that granularity set up within their organization internally, which is what allows these attackers to move where they need to go,” he said.
Join moderator Scott Maucione, Morris and Murphy as they discuss:
Complimentary Registration
Please register using the form on this page or call (202) 274-4830.
This program is sponsored by
Please register using the form on this page.
Have questions or need help? Visit our Q&A page for answers to common questions or to reach a member of our team.