One Microsoft Security Pitchwtstreaming.blob.core.windows.net/...Presentation... · • Steal any...

Preview:

Citation preview

Securing

Privileged

Access

Information

Protection

Datacenter

Security

Securing High

Value AssetsInformation Worker

and

Device Protection

Admin Environment

On-Premises

Datacenters

3rd Party SaaS

Customer and

Partner AccessBranch Office Intranet and Remote PCs

High Value Assets

3rd Party IaaS

Mobile Devices

Microsoft AzureOffice 365

Azure Active

Directory

Rights Management

Services Key Management

ServicesIaaSPaaS

More than 200 days (varies by industry)

First Host Compromised Domain Admin Compromised Attack Discovered

Research & Preparation Attacker Undetected (Data Exfiltration)

24-48 Hours

Active Directory and Administrators control all the assets

under attack

One small mistake can

lead to attacker control

Attackers Can

• Steal any data

• Modify

documents

• Impersonate users

• Disrupt business

operations

Active Directory and Administrators control all the assets

Tier 2 Workstation &

Device Admins

Tier 0Domain &

Enterprise Admins

Tier 1Server Admins

1. Beachhead (Phishing Attack, etc.)

2. Lateral Movementa. Steal Credentials

b. Compromise more hosts &

credentials

3. Privilege Escalationa. Compromise unpatched servers

b. Get Domain Admin credentials

4. Execute Attacker Missiona. Steal data, destroy systems, etc.

b. Persist Presence

24-48 Hours

http://aka.ms/pthdemo

How to protect your privileges against these attacks

2-4 weeks 1-3 months 6+ months

Attack Defense

Three Stage Mitigation Plan

http://aka.ms/SPAroadmap

1. Separate Admin account for admin tasks

3. Unique Local Admin Passwords

for Workstationshttp://Aka.ms/LAPS

2. Privileged Access Workstations (PAWs) Phase 1 - Active Directory adminshttp://Aka.ms/CyberPAW

4. Unique Local Admin

Passwords for Servershttp://Aka.ms/LAPS

2-4 weeks 1-3 months 6+ months

First response to the most frequently used attack techniques

First response to the most frequently used attack techniques2-4 weeks 1-3 months 6+ months

Top Priority Mitigations

Attack Defense

2. Time-bound privileges (no permanent admins)http://aka.ms/PAM http://aka.ms/AzurePIM

1. Privileged Access Workstations (PAWs) Phases 2 and 3 –All Admins and additional hardening

(Credential Guard, RDP Restricted Admin, etc.)http://aka.ms/CyberPAW

4. Just Enough Admin (JEA)

for DC Maintenancehttp://aka.ms/JEA

9872521

6. Attack Detectionhttp://aka.ms/ata

5. Lower attack surface

of Domain and DCs http://aka.ms/HardenAD

2-4 weeks 1-3 months 6+ months

Build visibility and control of administrator activity, increase protection against typical follow-up attacks

3. Multi-factor for elevation

2-4 weeks 1-3 months 6+ monthsAttack Defense

2. Smartcard or Passport

Authentication for all adminshttp://aka.ms/Passport

1. Modernize Roles and

Delegation Model

3. Admin Forest for Active

Directory administratorshttp://aka.ms/ESAE

5. Shielded VMs for

virtual DCs (Server 2016

Hyper-V Fabric)http://aka.ms/shieldedvms

4. Code Integrity

Policy for DCs

(Server 2016)

2-4 weeks 1-3 months 6+ months

Move to proactive security posture

2-4 weeks 1-3 months 6+ monthsAttack Defense

How Can Microsoft Services Help?

Assess your current risk level and build a plan

Prioritized

Tailored to your needs

Rapid deployment of proven solutions

Support and operationalize new technologies

Accelerate deployment to maximize your defenses!

ASSUME BREACH

Service

Delivery Management

Proactive

Services

Problem Resolution Services

Premier Support

Cyber Incident Response

Respond - Incident Response via PremierBased on proven response practices

Response ScenarioNon-malicious or Internal

Response ScenarioMalicious - External

What Every Customer Needs to Do Roadmap to improve your cybersecurity position

Recommended