Thursday, March 30, 2023

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Container Journal
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About Us
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Hot Topics
  • Should You Choose Agentless or Agent-Based for CNAPP?
  • Do You Need an Enterprise Browser to Secure Your Organization?
  • Unpatched Vulnerabilities Hamper IT Security Efforts
  • Cybersecurity Tools For Nonprofits in 2023
  • 16 Ways Cloud WAFs are Better than On-Premise WAFs
Security Bloggers Network 

Home » Security Bloggers Network » Solving Unsecured Privileged Accounts with Identity Analytics

SBN

Solving Unsecured Privileged Accounts with Identity Analytics

by Kevin Franks on January 7, 2020

Making sure that the right people have the right access to systems and applications is one of the best ways to secure corporate data. That’s Identity and Access Management (IAM).  A lot of security budget dollars were poured into IAM solutions in recent years.  But, despite the increased spend, companies still struggle with securing access. They particularly struggle with managing privileged accounts – the most powerful accounts on the network. It’s a huge issue, because according to Forrester, 80% of security breaches involve compromised privileged credentials.

Privileged Account Security Threat

To understand the danger that unsecured privileged accounts pose, start by considering what usually occurs during a cyberattack. Hackers penetrate your network via a host of tactics – social engineering, phishing emails, malicious insiders, zero-days, and other methods. Most of these attack vectors can easily bypass conventional cybersecurity tools like firewalls, Intrusion Detection Systems, or traditional SIEMs that are defending mostly against known vulnerabilities. Or, in other words, yesterday’s threats.

TechStrong Con 2023Sponsorships Available

Once inside the network, the intruders start looking for ways to increase their access. To do so, they might install remote access kits or key loggers. During this stage of the attack, intruders seek out passwords, SSH keys, certificates, and domain admin hashes. Their objective is to compromise the credentials that will let them escalate their access, achieve lateral movement, and anonymously steal data.

Privileged access is the key element in this process. With access to an unsecured privileged account, an intruder can find and steal sensitive data, alter system configuration settings, and install and run programs.

In most large enterprises, there are so many privileged accounts that IT can’t keep track of all of them or who can access them. The rise of cloud computing and the influx of IoT devices has made the problem even more complex.

Unsecured privileged accounts are a serious security threat that can be abused by a malicious insider or an external cyberattack. In fact, according to Cybersecurity Insiders’ 2020 Insider Threat Report, 63% of organizations think that privileged IT users pose the biggest insider security risk. That’s not surprising considering that it only takes one hijacked privileged account to snowball into a data breach disaster.

Manually discovering and monitoring every privileged account in a large enterprise is practically impossible. And if you don’t know where something exists, you can’t defend it. But just because you may not know where all your privileged accounts reside, doesn’t mean your adversaries can’t locate them – and exploit them.

The Next Step Beyond IAM and PAM

A lot of people would assume that their organization’s IAM tool can solve the unsecured privileged accounts problem. They’d be wrong. IAM deals principally with user identities tied to a particular person.

But standard IAM systems don’t manage privileged identities. Unlike user identities, privileged identities are not mapped to an individual. They may be used by many different people. Sometimes humans don’t even use them, like privileged identities that run service accounts. So, essentially, the people using a privileged identity may be different from one moment to the next. Therefore, it’s imperative to understand who has privileged access, and audit what they do with their access.

Many organizations have turned to privileged access management (PAM) solutions to get a handle on the situation. PAM tools are great for managing and securing the credentials that grant access to privileged accounts. However, PAM falls short in one significant area – the ability to manage the increasing amount of privileged entitlements in the enterprise. In fact, through analysis of the data in some of our customer environments, we estimate that more than half of privileged access entitlements exist outside of IAM and PAM solutions (meaning they’re likely to be unknown).

Considering the scale and frequency of the unsecured privileged accounts problem, what can organizations realistically do to lock down their privileged accounts? They need a solution that can both identify vulnerable privileged accounts and the entitlements for these accounts. Despite the rise of IAM and PAM implementations over the past several years there is still a gap between access being granted and knowing what users are actually doing with that access.

Identity Analytics

Gurucul’s Identity Analytics addresses these gaps through the use of machine learning models that generate risk scores down to the entitlement level. Identity Analytics provides discovery – including privileged entitlements – and delivers visibility, analysis and risk scoring. All of this facilitates remediation of privileged access risks.

Gurucul Identity Analytics can enhance your existing IAM and PAM solutions by providing granularity down to entitlement risk scoring. That’s because its machine learning models can absorb vast sources of information and detect privileged access risks at the entitlement level. Identity Analytics finds your “access outliers” and applies risk scoring to them based on behavior, peers, access, activities and context. This solution facilitates the complete accounting of privileged accounts and entitlements.  That includes discovering normal accounts that have hidden privileged access entitlements.

Manual attempts to accomplish this enormous task are exhausting, futile, and leave many unknown access risks. The labeling of accounts as privileged through IAM and PAM is not enough. Organizations need Identity Analytics’ machine-learning models to find unknown privileged access and provide a risk-based approach for securing this access.

Learn more by downloading our whitepaper Identity Analytics Use Cases. Then, schedule a demo to learn how Gurucul can help you identify your identity-based security risks.

The post Solving Unsecured Privileged Accounts with Identity Analytics appeared first on Gurucul.


Recent Articles By Author
  • Cybersecurity Professionals Exhibit Risky Behavior – RSA Conference Survey
  • Applying Behavior Analytics to the MITRE ATT&CK Framework
  • The Identity Management Blind Spot
More from Kevin Franks

*** This is a Security Bloggers Network syndicated blog from Gurucul Blog | Security Analytics | Machine Learning Models on Big Data authored by Kevin Franks. Read the original post at: https://gurucul.com/blog/solving-unsecured-privileged-accounts-with-identity-analytics

January 7, 2020April 26, 2022 Kevin Franks Account Compromise, Blog, Identity Analytics, insider threat
  • ← Hold My Beer Mirai – Spinoff Named ‘LiquorBot’ Incorporates Cryptomining
  • Hacking the Hackers: Adversarial AI and How to Fight It →

Techstrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows
TSTV Podcast

Subscribe to our Newsletters

Most Read on the Boulevard

ChatGPT Less Convincing Than Human Social Engineers in Phishing Attacks
Business Email Compromise Threats Soar Past Phishing Risks
AI/ML’s Role in Software Supply Chain Security
Survey Surfaces Need to Change SecOps Priorities
Zoom Taps Okta to Bring Zero-Trust Cybersecurity to Videoconferences
USENIX Security ’22 – ‘QuORAM: A Quorum-Replicated Fault Tolerant ORAM Datastore’
🧪 Lit + WebR + Observable Plot: Linking Lit’s Lightweight Web Components And WebR For Vanilla JS Reactivity & JS DataVis
Privacy Compliance In 2023
Linking Lit’s Lightweight Web Components And WebR For Vanilla JS Reactivity
SWG versus CASB: What’s the Difference?

Upcoming Webinars

Apr 04

Key Strategies for a Secure and Productive Hybrid Workforce

April 4 @ 1:00 pm - 2:00 pm
Apr 05

Securing Kubernetes With SentinelOne and AWS

April 5 @ 1:00 pm - 2:00 pm
Apr 05

From Vulnerable to Invincible: The Five-Step Journey to Complete Cloud Security

April 5 @ 3:00 pm - 4:00 pm
Apr 12

The State of Cloud-Native Security 2023

April 12 @ 1:00 pm - 2:00 pm
Apr 13

Case Study: Improving Code Security With Continuous Software Modernization

April 13 @ 11:00 am - 12:00 pm
Apr 20

Lessons From a Live Hack: Secure Your Cloud From the Inside

April 20 @ 3:00 pm - 4:00 pm
Apr 24

Securing Open Source

April 24 @ 1:00 pm - 2:00 pm
May 03

https://webinars.securityboulevard.com/ciso-panel-tips-for-optimizing-cloud-native-security-stack-in-2023?utm_campaign=2023.05.03_Aqua_Webinar_SB&utm_source=BMRegister

May 3 @ 3:00 pm - 4:00 pm
May 22

Ransomware

May 22 @ 1:00 pm - 2:00 pm

More Webinars

Download Free eBook

The State of Cloud Native Security 2020

Industry Spotlight

FINALLY! FCC Acts on SMS Scam-Spam — But Will It Work?
Analytics & Intelligence API Security Application Security Cloud Security Cyberlaw Cybersecurity Editorial Calendar Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Identity and Access Management Incident Response Industry Spotlight IoT & ICS Security Malware Mobile Security Most Read This Week Network Security News Popular Post Security Boulevard (Original) Security Operations Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities Zero-Trust 

FINALLY! FCC Acts on SMS Scam-Spam — But Will It Work?

March 17, 2023 Richi Jennings | Mar 17 0
White House to Regulate Cloud Security: Good Luck With That
Analytics & Intelligence Application Security Cloud Security Cloud Security Cyberlaw Cybersecurity Data Security DevOps Editorial Calendar Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight Malware Most Read This Week Network Security News Popular Post Ransomware Securing Open Source Security Awareness Security Boulevard (Original) Security Operations Software Supply Chain Security Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

White House to Regulate Cloud Security: Good Luck With That

March 13, 2023 Richi Jennings | Mar 13 0
‘Extraordinary, Egregious’ Data Breach at House and Senate
Analytics & Intelligence API Security Application Security CISO Suite Cloud Security Cloud Security Cyberlaw Cybersecurity Data Security Editorial Calendar Featured Governance, Risk & Compliance Humor Identity & Access Identity and Access Management Incident Response Industry Spotlight Most Read This Week Network Security News Popular Post Ransomware Securing Open Source Security Awareness Security Boulevard (Original) Security Operations Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

‘Extraordinary, Egregious’ Data Breach at House and Senate

March 10, 2023 Richi Jennings | Mar 10 0

Top Stories

Spera Unveils Platform for Finding and Tracking Identities
Cybersecurity Featured Identity & Access Network Security News Security Boulevard (Original) Spotlight 

Spera Unveils Platform for Finding and Tracking Identities

March 29, 2023 Michael Vizard | Yesterday 0
Skyhawk Security Taps ChatGPT to Augment Threat Detection
Cloud Security Cybersecurity Featured Network Security News Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Skyhawk Security Taps ChatGPT to Augment Threat Detection

March 29, 2023 Michael Vizard | Yesterday 0
The Chasm Between Cybersecurity Confidence and Actual Ability
Cloud Security Cybersecurity Data Security Featured Network Security News Security Awareness Security Boulevard (Original) Spotlight Threat Intelligence Vulnerabilities 

The Chasm Between Cybersecurity Confidence and Actual Ability

March 28, 2023 Michael Vizard | 1 day ago 0

Security Humor

Randall Munroe’s XKCD ‘Effect Size’

Randall Munroe’s XKCD ‘Effect Size’

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Container Journal
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2023 Techstrong Group Inc. All rights reserved.