One Article Review

Accueil - L'article:
Source ProofPoint.webp ProofPoint
Identifiant 8447703
Date de publication 2024-02-07 05:00:33 (vue: 2024-02-07 16:08:09)
Titre Protéger vos chemins, partie 2: Comprendre votre rayon de souffle d'identité
Protecting Your Paths, Part 2: Understanding Your Identity Blast Radius
Texte Welcome to the second part of our blog series on using attack path management (APM) to secure your network. In our first post, we examined the importance of using APM to identify and remediate identity-centric attack paths before attackers exploit them. We also emphasized that the compromise of tier-zero assets -aka the “IT crown jewels”-is a top objective for attackers.   Attack path management (APM) is a process by which you discover all the existing paths that an attacker can exploit to reach tier-zero assets within your environment. APM plays a pivotal role in helping security teams pinpoint vulnerable identities. It provides a holistic view of the available attack paths that an attacker could use to move laterally in the quest to reach your IT crown jewels.  In this blog, we introduce a crucial APM concept known as the identity blast radius. We explore the use cases for this view. And we highlight how it is similar but distinct from the attack path view.  What you can learn from identity blast radius analysis  An identity blast radius represents the potential impact of an attacker who is moving laterally using a compromised identity. It presents how the compromise of one particular identity can help an attacker reach other identities or assets in the network. Discovering the identity blast radius before attackers do is essential to prevent a minor compromise from turning into a major security incident.   To see how this works, it\'s helpful to visualize it. Below is an illustration of the vulnerabilities related to a user named Brian Rivera. It\'s just one example of how attackers can abuse Active Directory ACLs.  Example view of an identity blast radius.  In the blast radius view above the subject identity for Brian Riviera serves as the “tree root” of the view. Branching off the tree root are all the assets and privileges that that specific user can invoke. These include:  Stored credentials. If an attacker compromises hosts where Brian\'s Remote Desktop Protocol (RDP) credentials are stored, they can use those credentials to move laterally to the indicated hosts.  Active Directory ACL assignments. An attacker that compromises Brian\'s identity can use his GenericWrite permission in Active Directory to:  Gain code execution with elevated privileges on a remote computer  Delete files and data  Introduce malicious files or code on the flagged targets   Identity blast radius use cases  The identity blast radius view supports powerful use cases that support attack path analysis, including:  Post-compromise analysis. After an attacker gets control of an identity, the blast radius view can help you identify other identities and assets that are vulnerable to lateral movement or other malicious actions.  What-if analysis. Your security teams can use the identity blast radius view to assess the potential impact of an attack on high-value targets like your chief financial officer or a senior IT administrator. With that insight, they can apply other compensating controls.  Changes in access privileges. It can also help you identify the potential impact of changes in access privileges. These often occur when employees move between roles. You can use this insight to ensure that an employee\'s access is properly managed. This can prevent an excessive accumulation of privileges.  Assets vs. identities: Differences between tier-zero asset views and identity blast radius views  The figure below shows how the tier-zero asset view illustrates paths that ascend from different entities to the tier-zero asset root.   In contrast, the identity blast radius view positions the subject identity as the tree root. Paths extend downward to various entities that are reachable through diverse relations like Active Directory ACL assignments or stored credentials.   Comparison of the tier-zero assets view versus the identity blast radius view.  These two views offer different perspectives. But both are powerful tools to help you visualize identity-related vulnerabilities. These i
Envoyé Oui
Condensat above abuse access account accumulation acl acls actions active administrator after against aligned all also analysis analysis  apm apply are ascend assess asset assets assignments attack attacker attackers audit available away been before below between blast blog both branching brian but can capabilities cases cases  centric changes chief code combine company comparison compensating compromise compromised compromises computer  concept consider continue contrast control controls could create credentials crown crucial cyberthreats data  deep defense delete demo desktop did differences different directory discover discovering distinct diverse downward efforts elevated emphasized employee employees enable endpoints ensure entities environment escalating essential examined example excessive execution existing exploit exploitable explore extend fast figure files financial find first fix flagged free from ftp gain genericwrite gets happen have help helpful helping high highlight his holistic hosts how identify identities identities: identity illustrates illustration imagine impact implemented importance incident include:  including:  indicated insight insights introduce invoke jewels jewels” just known lateral laterally learn let like lists look major make malicious managed management meanwhile minor more  move movement moving multiple named network next objective occur off offer officer often one oriented other part particular path paths permission permissions perspectives pinpoint pivotal plays policies popped positions post potential powerful presents prevent privileges process proofpoint properly protecting protocol provide provides quest radius rdp reach reachable reduce related relations remediate remediations remote removed represents risks rivera riviera robust role roles root root” second secure security see senior series serves shows sign significantly similar similarly specific ssh stay stop stored strategic strategy subject support supports sure targets targets   teams that them these those threat threats through tier to:  tool tools top tree tuned turning two understanding use user using value various versus view views views  visualize vital vulnerabilities vulnerable web welcome what when where which who will within works would your zero “it “tree
Tags Tool Vulnerability Threat
Stories
Notes ★★★
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: