New York Tech Media
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
New York Tech Media
No Result
View All Result
Home Cybersecurity

How to contain a privileged access breach and make sure it doesn’t happen again

New York Tech Editorial Team by New York Tech Editorial Team
March 14, 2022
in Cybersecurity
0
The most common cyber gaps threatening supply chain security
Share on FacebookShare on Twitter

When attackers pull off a privileged access breach, they have a beachhead into your network. Regardless of whether it’s software or users that are ill-protected, threat actors have a consistent playbook: establish a foothold on a vulnerable system, elevate privileges, then compromise additional privileged users to gain access to or hold at ransom what’s valuable.

privileged access breach

The more widespread the compromise is, the larger the incident response process that victims must deal with, leaving them with an expensive and time-consuming cleanup and recovery. This is all too common—74% of breached organizations have admitted the attack involved access to a privileged account—and organizations need a better way to combat privileged access attacks.

Despite established best practices and investment in privilege access management solutions, users are given more privileges across the systems and this privilege is available to them all the time, 24 hours a day, seven days a week. Attackers exploit this and pivot from just one point of entry to all others in the organization that have elevated access, executing a full takeover in a very short time.

With the right approach, companies can contain privileged access breaches or avoid them altogether. Here are three things to keep in mind.

Many incident response plans don’t fully lock down access

Containment and eradication require a multi-faceted approach and you should have a response plan in place that considers an attacker’s persistence and ability to hide and move around the network.

Many victims respond by identifying and blocking network activity, software, and system configurations that were compromised in the attack. Disabling compromised accounts – or at least forcing password resets and implementing multi-factor authentication (MFA) – is another best practice, but there’s a common mistake that many victims make: keeping standing privileged access in place.

Compromise typically comes from credentials that have 24/7, always-on standing access. If an attacker gains access to one of these credentials, the keys to unlock doors are always within reach. Thus, removing the standing privileged access that attackers require to maintain a presence and gain lateral movement is a quick way to contain a breach.

Eradicating an attack is never a certainty, especially as threat actors have grown increasingly sophisticated, but by implementing this approach, it more effectively addresses the root causes to stop and prevent further activity.

Just-in-Time access offers better security

Many organizations don’t understand the danger they put themselves in by having standing privileged access. Yes, it’s slightly more convenient for admins and users to access systems as and when they want to. But it also gives the same convenient access to attackers holding the compromised credentials, allowing them to unlock any door and move throughout the network. Even worse, it undermines other safeguards in place for detecting attackers.

When an attacker gains access to credentials with standing privileged access in place, they weaponize their elevated access to bypass traditional extended detection and response (XDR), endpoint detection and response (EDR), and next-generation antivirus (AV) solutions, all of which focus on files, network and process activity, but have no visibility into privileged identities. This is also true of vault-based, legacy privileged access management solutions, which can’t identify hidden or nested admin rights and the persistence of these rights on the target systems.

Instead of standing privileged access, a “Just-in-Time” approach allows administrators to protect systems by only permitting access to verified, trusted administrators for a finite period, with continuous enforcement of no privileged access otherwise. In turn, this cuts off lateral movement without any friction for legitimate users.

You should move toward true zero standing privilege

During an incident, organizations should start implementing Just-in-Time access for the riskiest groups and users first to reduce standing privileged access among those most likely to be compromised.

Most credential harvesting typically occurs after the user authenticates, even if MFA is in place. One way to avoid this is to force multi-factor authentication and re-authentication for each ensuing system and application a user wants to access, but few users would put up with that much friction. That’s why many organizations opt for single sign-on (SSO) authorization like Security Assertion Markup Language (SAML), Open Authorization (OAuth), or Kerberos.

In those situations, however, attackers can impersonate users, whether through credential harvesting or by running code in another user’s login session. An account proving trustworthiness once, even if it happens before access is granted, isn’t strong enough security.

By limiting both the number of accounts that get full access and how that access is granted, organizations can greatly reduce the risk of cyberattacks and the lateral movement that may occur after a breach. Turning standing privileged access into zero standing privilege is one of the most thorough security measures an organization can take today.

Credit: Source link

Previous Post

Women in cybersecurity: How far have they come?

Next Post

US digital bank Bankjoy hires André Jones as VP of operations

New York Tech Editorial Team

New York Tech Editorial Team

New York Tech Media is a leading news publication that aims to provide the latest tech news, fintech, AI & robotics, cybersecurity, startups & leaders, venture capital, and much more!

Next Post
US digital bank Bankjoy hires André Jones as VP of operations

US digital bank Bankjoy hires André Jones as VP of operations

  • Trending
  • Comments
  • Latest
Meet the Top 10 K-Pop Artists Taking Over 2024

Meet the Top 10 K-Pop Artists Taking Over 2024

March 17, 2024
Panther for AWS allows security teams to monitor their AWS infrastructure in real-time

Many businesses lack a formal ransomware plan

March 29, 2022
Zach Mulcahey, 25 | Cover Story | Style Weekly

Zach Mulcahey, 25 | Cover Story | Style Weekly

March 29, 2022
10 Raunchy Movies on Netflix You Won’t Regret Watching

10 Raunchy Movies on Netflix You Won’t Regret Watching

May 20, 2024
How To Pitch The Investor: Ronen Menipaz, Founder of M51

How To Pitch The Investor: Ronen Menipaz, Founder of M51

March 29, 2022
Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

March 29, 2022
Startups On Demand: renovai is the Netflix of Online Shopping

Startups On Demand: renovai is the Netflix of Online Shopping

2
Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

1
Menashe Shani Accessibility High Tech on the low

Revolutionizing Accessibility: The Story of Purple Lens

1

Netgear announces a $1,500 Wi-Fi 6E mesh router

0
These apps let you customize Windows 11 to bring the taskbar back to life

These apps let you customize Windows 11 to bring the taskbar back to life

0
This bipedal robot uses propeller arms to slackline and skateboard

This bipedal robot uses propeller arms to slackline and skateboard

0
laptop on glass table

Automat-it Cuts Deployment Friction as Monce Scales AI Order Processing on AWS

April 13, 2026
Lee's Famous Recipe Chicken

Why Lee’s Famous Recipe Chicken Is Betting on Hi Auto to Quietly Rewire the Drive-Thru

April 9, 2026
computer generated image of letters

San Francisco Tribune Lists 11 HumanX Startups Moving AI Closer to the Operating Core

April 8, 2026
Impala CEO and Highrise AI CEO

The Industrialization of AI Infrastructure: What Impala and Highrise AI Reveal About the Next Scaling Frontier

April 7, 2026
Employee Time Tracking

What is an Employee Time Tracking Solution? A Definite Guide for 2026

March 31, 2026
Voltify founders

Voltify Raises $30 Million Seed Round as It Challenges $1 Trillion Rail Electrification Model

March 31, 2026

Recommended

laptop on glass table

Automat-it Cuts Deployment Friction as Monce Scales AI Order Processing on AWS

April 13, 2026
Lee's Famous Recipe Chicken

Why Lee’s Famous Recipe Chicken Is Betting on Hi Auto to Quietly Rewire the Drive-Thru

April 9, 2026
computer generated image of letters

San Francisco Tribune Lists 11 HumanX Startups Moving AI Closer to the Operating Core

April 8, 2026
Impala CEO and Highrise AI CEO

The Industrialization of AI Infrastructure: What Impala and Highrise AI Reveal About the Next Scaling Frontier

April 7, 2026

Categories

  • AI & Robotics
  • Benzinga
  • Cybersecurity
  • FinTech
  • New York Tech
  • News
  • Startups & Leaders
  • Venture Capital

Tags

AI AI QSRs Allseated Automat-it AWS B2B marketing Business CISO CISO Whisperer Collaborations Companies To Watch cryptocurrency Cybersecurity Entrepreneur Fetcherr Finance FINQ Fintech Funding Announcement hi-tech Hi Auto Impala Investing Investors investorsummit Israel israelitech Leaders LinkedIn Leaders Metaverse Mindset Minnesota omri hurwitz PointFive PR QSR Real Estate start- up startupnation Startups Startups On Demand Tech Tech leaders Unlimited Robotics VC
  • Contact Us
  • Privacy Policy
  • Terms and conditions

© 2024 All Rights Reserved - New York Tech Media

No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital

© 2024 All Rights Reserved - New York Tech Media