SBN

Endpoint Security Demands a Defense-in-depth Strategy

Endpoints, the devices people use to access company resources, are a weak spot in corporate security. Compromised endpoints are a primary access point that cyber criminals use to infiltrate a network.

Two-thirds of companies are compromised by exploits that originate with an endpoint. The volume of endpoint attacks is rising, as is the sophistication of attacks. There’s a marked spike in criminals using advanced persistent threat (APT) techniques, in which an attacker uses one compromised endpoint to move laterally throughout a network by taking advantage of known vulnerabilities, elevating privileges, and persistently hacking once they’ve managed to get inside.

There are many reasons cyber criminals love endpoints

Most endpoint users aren’t technically inclined, nor do they feel urgency or personal responsibility to prioritize endpoint security. The sheer variety of endpoints, including desktop computers, laptops and mobile devices, all with different operating systems, versions and browsers, adds complexity to security management and oversight.

Endpoints are typically compromised by either malware or non-malware attacks.

  • Malware includes viruses and other rogue programs installed on an endpoint, which may cripple the endpoint or grant an unauthorized user access to it.
  • Non-malware attacks exploit vulnerabilities in programs or applications that may already be installed on an endpoint, such as a word processing program or web browser.

The goal of an endpoint attack is often the same: wreak havoc by taking control or crippling a device, and then progressing from an individual endpoint to other network resources.

Imagine a world where you’re confident employees can access corporate resources without fear, uncertainty or doubt that they may compromise sensitive systems. Imagine your IT staff has ensured all endpoints attempting to access business resources are secure. Imagine your users don’t feel they need to circumvent security protocols on their endpoints to do their jobs.

Read on to learn about best practices for protecting endpoints and limiting the damage a compromised endpoint can cause. In this blog I’ll outline how you can manage endpoint security effectively and mitigate the risk of compromised endpoints.

Endpoint Security: Combating threats

What is endpoint security?

Endpoint security is the practice of protecting users’ devices from internal and external cyber threats. The goal of endpoint security is to protect the attack surface to minimize risk of network infiltration and compromise.

Endpoint security is a critical line of defense used to prevent criminal hackers from gaining access to a network, exfiltrating data, causing reputational or financial harm, destroying infrastructure, or even demanding a ransom.

Organizations can use a number of approaches to endpoint security to combat threats at different stages of an endpoint attack:

  • Prevent threats from accessing endpoints: Limit and disrupt known threats from accessing endpoints before they have the opportunity to penetrate an endpoint. Focus on quickly identifying previously unknown threats before they gain a foothold.
  • Detect threats before they cause damage: Identify known threats that successfully gain access to an endpoint and continually discover new threats.
  • Inoculate your organization from the spread of an endpoint attack: Limit the damage caused by infected endpoints. Contain it while you identify the root cause and apply those learnings to prevent and detect future attacks.

The proactive goal of endpoint security is to lock down entry points cyber criminals might use to access an enterprise network. In cases where locking down entry points is not feasible, minimizing damage becomes the fallback position.

What are some challenges of securing endpoints?

Infrastructure teams protect the most critical information and infrastructure. But this usually involves a known quantity of systems and software, which is actively managed by knowledgeable IT professionals. A central system needs upgrading, patching, or hardening? This is usually in their purview.

There are so many devices: desktops, laptops, tablets, phones

Endpoint security, on the other hand, is a more chaotic system with more moving parts. IT teams that manage endpoints generally have more volume and variables to address than teams that manage infrastructure security. There are So. Many. Devices. Desktops, laptops, tablets, phones. And with BYOD—bring your own device—becoming the norm and a significant percentage of users working from home, it’s even more complex.

Endpoint Security: Cost of insecure endpoints

According to The Cost of Insecure Endpoints, a study conducted by the Ponemon Institute, 63% of companies indicated that they can’t monitor off-network endpoints, which results in them spending more than $6 million annually to mitigate the resulting vulnerabilities. The same survey revealed that 80% of organizations had a disorganized endpoint security strategy.

One of the biggest challenges to effective endpoint security is your users. Business users usually aren’t IT or security experts. They’re susceptible to phishing, social engineering, malware, ransomware, and various data extraction techniques. They often need to be protected from themselves—prevented from downloading a malicious app, clicking on a suspicious link, installing a suspect program, giving out personally identifiable information, or inadvertently revealing credentials.

Consider all the activities users engage in through their endpoints. They may change the time due to travel or daylight savings. They install drivers for new devices. They may change configurations and install and execute programs on the endpoints themselves. Additionally, they access many types of applications, including SaaS and browser-based web applications.

Endpoint security is not the primary concern for business users—they just want to do their jobs

Business users simply want to do their jobs and endpoint security isn’t their primary concern. They’re more focused on completing a presentation, answering an email, or performing market research for a new product. Many also use the same endpoint they use for work to perform non-work activities: check out a meme, play a game, buy something online, download an app.

When a user is working remotely, you have even less control over their devices and actions. Are they using public Wi-Fi, a secure VPN, a home network? This lack of control and huge variability makes implementing and enforcing security policies more complicated, especially if end users are given flexibility in the devices they use, the controls they have, and the places they visit on the Internet.

The wide range of user activities, coupled with less security awareness, results in higher incidence of endpoint-based attacks, including malware and ransomware.

Ransomware on the rise

Between 2018 and 2019, there was a 365% increase in the number of ransomware attacks, with 53% of those attacks occurring in the United States. These types of attacks are prevalent enough that all organizations—small local businesses, Fortune 500 companies, state and local governments—must be prepared to address them.

Cities may seem to be among the most common targets of ransomware attacks, since they’re required to publicly disclose when they have been victimized. Yet they represent only about 10% of estimated cases; public utilities, healthcare organizations, publishing houses, and financial institutions are also frequent attack targets.

One question many businesses and public sector groups will inevitably face is: should we pay the ransom? Nearly every organization insists they will never give in to ransomware demands. Yet quietly, many are being urged to prepare for such an attack. There’s growing demand for cyber security insurance, and some companies are stockpiling Bitcoin, the currency of choice for ransom payments. By some estimates, two out of three victims will eventually pay hoping for the safe (and unpublicized) return of their files or to regain access to key systems.

Good news: It’s possible to protect endpoints with a defense-in-depth strategy

The best approach to endpoint security is to implement defense-in-depth. Defense-in-depth is the strategy of layering different security controls to create a robust and redundant system. When there are multiple layers of defense for endpoints, each layer offers a different type of security, which will protect the endpoint even if one or more of the controls fails. This approach minimizes the risk of a single point of failure and is often used to address a variety of possible vulnerabilities across the range of physical, technical, and administrative layers.

Many organizations start and end their endpoint security program by installing antivirus software on every endpoint. That is an important step, but it should never be the only endpoint security solution you employ. One study of IT professionals found that only 27% believed antivirus alone would provide sufficient protection against known and unknown threats.

Where to start your endpoint security strategy

There are many different layers to an endpoint security strategy that could be put in place, yet there is only one that offers broad protection to prevent endpoint attacks from happening and limits the damage if an endpoint is breached.

Limit local administrator rights with a least privilege policy.

This is one of the most important endpoint security steps you can take, since it’s proactive, and when implemented thoughtfully and maintained over time, will protect and limit access to your most important assets. With a least privilege policy in place, even if an individual endpoint is compromised, cyber criminals won’t be able to capture and leverage administrative credentials to reach critical resources.

Implementing a least privilege model ensures that each user and each endpoint have only the minimum level of access needed to do their job. It’s an important part of establishing a zero-trust environment, in which a malicious hacker’s movement within a network can be contained since they won’t have access to other critical systems simply because they’ve managed to compromise one.

So users can continue doing their jobs with little to no disruption, you should also implement privilege elevation through policy-based management with whitelisting, greylisting, and blacklisting. That way you can remove local admin rights without impacting productivity.

By implementing a least privilege strategy, coupled with the ability to manage local admin rights and elevate applications, the State of Indiana ensured developers would be able to do their jobs without compromising overall network security, sacrificing endpoint security, or adding extra approval steps from IT. They describe their project in this video.

Endpoint Security: Technology

A comprehensive strategy for endpoint security should include at least three of the following techniques and technologies, and will provide you with defense-in-depth endpoint security:

    • Privilege Management: Privilege management solutions cover endpoint privilege discovery, least privilege implementation, and ongoing, policy-based application control. Privilege management tools give you granular control over what users can do via their endpoints, including installing programs and changing configurations, as well as accessing and interacting with web applications. You can set granular policies that provide fine-grained control, for example, allowing a user access to only some functionality in a program or only certain sections of a web page.
    • Antivirus (AV): Antivirus solutions are typically installed directly on an endpoint, continually scanning the system for known virus or malware signatures. The best AV solutions continually update their list of known viruses, and quarantine suspect files and apps, while preventing users from accessing malicious sites. AV solutions don’t tend to be predictive, so they are only as good as their list of known threats. Traditional AV solutions provide inadequate protection against emerging threats and trigger a high number of false positives and security alerts. 4 out of 5 successful breaches are due to zero day exploits, and on average, antivirus products miss 60% of attacks.
    • Endpoint Protection Platforms (EPP): Some antivirus solutions have evolved into endpoint protection platforms. Similar to AV, they’re designed to prevent malware attacks and other malicious activity.
    • Endpoint Detection and Response (EDR): By continuously collecting and analyzing data from all endpoints managed by an organization, EDR systems are an analytical surveillance tool. The data they collect can be used to conduct forensic analysis after a breach has occurred, and the more sophisticated ones include predictive analytics, hunting for patterns and possible new exploits in the data. They have the added benefit of being able to assist with remediation and attack forensics in nearly real time.
    • Endpoint Management: This class of software assists with endpoint inventory, keeping track of devices while also ensuring that software is patched and up to date. A good endpoint management system can help keep approved devices secure and can update them in a timely fashion to minimize damage from a zero-day exploit. These systems are prescriptive: they can protect against known vulnerabilities assuming they’re functioning properly, but they’re of little use when it comes to unknown.
    • Penetration Testing/Scorecards: Often conducted by an outside vendor, the idea of penetration testing is to expose your organization’s vulnerabilities, so you have time to address them before a malicious actor tries to exploit them. This is a stealthy way to identify and rectify the strengths and weaknesses of your network.

The bottom line is begin your endpoint security strategy with fundamental hygiene. Proactive endpoint protection based on a least privilege policy means less time and resources spent detecting an infection, chasing down criminal hackers once they’ve already entered your network, and remediating the damage.

Your endpoint security is only as strong as it is usable

People don’t usually object to the need for additional security. They object to an extra burden.

Most organizations recognize the risks of lax security, so why don’t they do something about it? One of the major trade-offs in endpoint security is making it seamless and simple for a user to access needed resources. This means little to no learning curve for users, relative ease of implementation from an IT point of view, and a minimum of additional overhead to monitor that it’s being used effectively.

In other words, any endpoint security system you choose must balance being comprehensive with being usable. As you implement a defense-in-depth strategy, focus first on the most important and high-value endpoint security tools that have the least impact on your users. Implement and continually enforce least privilege access, restrict or remove local admin rights, then layer in antivirus solutions, EDR, or EPP solutions.

Learn more about Thycotic’s privilege management solutions for endpoint security

Thycotic’s least privilege and application controls are an extremely effective line of defense and fill the gaps left by other endpoint security products. If an endpoint is compromised, that should be the end of the incident, rather than a foothold into a larger breach.

Privilege Manager is an all-in-one least privilege and application control solution. You can identify and remove local admin rights as well as set whitelisting, greylisting and blacklisting policies for effective application controls.

Cloud Access Controller provides granular Role-Based Access Control to define what each user can click, read, or modify within any web application. You can separate roles and duties on standard and shared accounts, record web sessions, and detect unusual behavior to block unauthorized access.

Subscribe to Thycotic's YouTube Channel

Subscribe to Thycotic’s YouTube Channel

Check out our new PAM products, demos and more.


*** This is a Security Bloggers Network syndicated blog from Thycotic authored by Steve Goldberg. Read the original post at: https://thycotic.com/company/blog/2020/06/16/endpoint-security-demands-a-defense-in-depth-strategy/

Secure Guardrails