39
1 Managing Privileged Account Security Chris Maroun Regional Sales Engineering Manager East Coast

Managing privileged account security

Embed Size (px)

DESCRIPTION

How to manage the security of privileged accounts.

Citation preview

Page 1: Managing privileged account security

1

Managing Privileged Account

Security

Chris Maroun

Regional Sales Engineering Manager – East Coast

Page 2: Managing privileged account security

2

Privileged Accounts Exist In Every Piece of

IT Technology

Page 3: Managing privileged account security

3

PRIVILEGE

Shared Admin Accounts

Application to Application

AccountsCloud

Accounts

Page 4: Managing privileged account security

4

Privileged Accounts are Targeted in All

Advanced Attacks

Mandiant, M-Trends and APT1 Report

“…100% of breaches

involved stolen

credentials.”

“APT intruders…prefer to

leverage privileged accounts

where possible, such as Domain

Administrators, service accounts

with Domain privileges, local

Administrator accounts, and

privileged user accounts.”

Page 5: Managing privileged account security

5

The Facts Speak for Themselves: You Will Be

Breached

There is no such thing as perfect security.

Attackers get smarter and change tactics all of the time.

Companies who have made responsible and sustained investments in IT continue to be compromised.

100% 94% 416 100%

Of victims have up-to-date

antivirus software

Of breaches are reported by third

parties

Median number of days advanced attackers are on the network before

being detected

Of breaches involved stolen

credentials

Mandiant, 2013

Page 6: Managing privileged account security

6

Systems Integration

Partners

Temporary Staff

Cloud Service

Providers

Off ShoreDevelopers

ContractorsInternal

Users

Page 7: Managing privileged account security

7

Systems Integration

Partners

External Attacker

Cloud Services

Off ShoreDevelopers

ContractorsInternal

UsersYou Need to Know!

Which One is the

Attacker?

Which One is

Authorized?

Page 8: Managing privileged account security

8

Four Critical Steps to Stopping Advanced Threats

Protect and manage privileged account credentials

Control, isolate and monitor privileged access and activity on servers and databases

Use real-time privileged account analytics to

detect and respond to in-progress attacks

Discover all of your privileged accounts

Page 9: Managing privileged account security

9

Privileged Account Security –

Now a Critical Security Layer

Page 10: Managing privileged account security

10

CyberArk’s Privileged Account Security Solution

Privileged

Threat

Analytics

Master Policy

Secure Digital Vault™

Enterprise

Password

Vault®

Privileged

Session

Manager®

Application

Identity

Manager™

On-Demand

Privileges

Manager™

Management Portal/Web Access

PROTECT DETECT RESPOND

Page 11: Managing privileged account security

11

Virtual

Servers

Unix/Linux

Servers

iSeries

MainframesWindows

Servers

zSeries

MainframeDatabases Applications

Network

Devices

Security

Appliances

Websites

& Web Apps

Unix AdminsWindows Admins DBAs VM Admins External

Vendors

Business

Applications

Auditor/

Security & Risk

I need the password to map a

drive

I need my service provider to connect remotely with root

I just need root to patch a database

I have this script that needs to run

as root every night

What are your root entitlements, who used it, when did

they use it and why?

Enterprise Account Usage today

What are your root entitlements, whoused it, when did

they use it and why?

Page 12: Managing privileged account security

12

Virtual

Servers

Unix/Linux

Servers

iSeries

MainframesWindows

Servers

zSeries

MainframeDatabases Applications

Network

Devices

Security

Appliances

Websites

& Web Apps

Unix AdminsWindows Admins DBAs VM Admins External

Vendors

Business

Applications

Auditor/

Security & Risk

I need the password to map a

drive

I need my service provider to connect remotely with root

I have this script that needs to run

as root every night

Great! Your access is approved and is

now controlled and monitored

I just need root to patch a database

EPV

Workflow

PSM

Workflow

AIM

Workflow

Monitoring &

Reporting Workflow

OPM

Workflow

Control the Access

Page 13: Managing privileged account security

13

How do we get there?

Page 14: Managing privileged account security

14

Map and Measure Privileged Account Risks with

CyberArk DNA™

Simple, three-step process Executive dashboard of results

Page 15: Managing privileged account security

15

CyberArk DNA Pass-the-Hash Vulnerability Map

Page 16: Managing privileged account security

16

System User Pass

Unix root

Oracle SYS

Windows Administrator

z/OS DB2ADMIN

Cisco enable

Vault

Enterprise IT Environment

Central Policy Manager

1. Master/exception policy definition

Security/

Risk Management

Enterprise Password Vault Infrastructure

EPV

Policy

tops3cr3t

tops3cr3t

tops3cr3t

tops3cr3t

tops3cr3t

tops3cr3t

tops3cr3t

tops3cr3t

tops3cr3t

tops3cr3t

Policy

Page 17: Managing privileged account security

17

Master Policy: “Native” language, simplified

management

Basic Policy rules-grouped by topic

Managing Exceptions andSeparating Basic and Advanced settings(including dependencies)

In-Line HelpFor quick answers

Page 18: Managing privileged account security

18

System User Pass

Unix root

Oracle SYS

Windows Administrator

z/OS DB2ADMIN

Cisco enable

Vault

Enterprise IT Environment

1. Master/exception policy definition

2. Initial load & resetAutomatic Detection, Bulk upload, Manual

Enterprise Password Vault Overview

EPV

tops3cr3t

tops3cr3t

tops3cr3t

tops3cr3t

tops3cr3t

tops3cr3t

tops3cr3t

tops3cr3t

tops3cr3t

tops3cr3t

lm7yT5wX5$aq+pTojsd$5fhy7qeF$1gviNa9%

Policy

Central Policy Manager

Page 19: Managing privileged account security

19

What happens next?

Page 20: Managing privileged account security

20

Page 21: Managing privileged account security

21

Page 22: Managing privileged account security

22

Page 23: Managing privileged account security

23

Page 24: Managing privileged account security

24

Page 25: Managing privileged account security

25

Page 26: Managing privileged account security

26

Page 27: Managing privileged account security

27

Page 28: Managing privileged account security

28

Page 29: Managing privileged account security

29

Page 30: Managing privileged account security

30

Page 31: Managing privileged account security

31

Page 32: Managing privileged account security

32

Page 33: Managing privileged account security

33

Integration with SIEM and PTA

Page 34: Managing privileged account security

34

Security Dashboards

Page 35: Managing privileged account security

35

Privileged Threat Analytics

Page 36: Managing privileged account security

36

Access to Privileged Accounts During Irregular Hours

December 28th, 2012

February 13th, 2013

Page 37: Managing privileged account security

37

Privileged Threat Analytics

Page 38: Managing privileged account security

38

Privileged Threat Incident Details

Page 39: Managing privileged account security

39

Managing Privileged Account

Security

Chris Maroun

Regional Sales Engineering Manager – East Coast

Thank you!