Vince Hardy, Security Consultant | Jun 22, 2023
The threat landscape of cybercriminals targeting critical systems and data is evolving rapidly, necessitating a proactive approach to combat their increasingly sophisticated attack methods. A glaring example of the consequences of inadequate security measures was the 2019 Capital One Bank data breach, where over 100 million customer accounts and credit card applications were exposed due to a misconfigured Web Application Firewall. One of the main configuration issues noted with the WAF utilized by Capital One to protect their AWS deployment was the inadequate implementation of least privilege. In this case, the WAF employed to protect the AWS deployment possessed the capability to list and read all files stored within the cloud buckets. These permissions granted to the WAF were beyond the requirements for its intended functions, enabling the attacker to exploit the WAF and retrieve sensitive data from AWS.
Another prime example of privilege escalation is that of the Marriott International cyber-attack that occurred in 2018 in which information belonging to 300 million customers was exposed. The attacker obtained physical access to a device within Starwood (part of Marriott) and installed a web-shell. The device had internet connectivity and administrative privileges as it ran a service enabling employees to modify the Starwood website. Leveraging the web shell, the intruder introduced a remote access trojan onto the system, thereby granting them root-level access to the compromised machine and other interconnected machines within the network. Subsequently, the attacker then utilized software to extract user credentials from memory. This enabled the attacker to elevate their privileges by exploiting higher-level user accounts.
These incidents serve as stark reminders of the pressing need to stay ahead of emerging threats and prioritize privileged access management within organizations. Threat actors consistently seek opportunities to exploit vulnerabilities and gain unauthorized privileged access to systems, highlighting the importance of robust privilege management strategies.
In many organizations, traditional processes inadvertently seep into project lifecycles, particularly when faced with tight deadlines. Consider the following scenario: a project acquires a solution that requires administrator-level permissions on an account. Although the access control standards dictate operating with the principle of least privilege, implementing this recommendation may be challenging, causing disruptions and delays. Frustrated by the obstacles, the project reluctantly resorts to granting excessive permissions to the account and manages it as if it were a regular user account, thus introducing a significant risk. Unfortunately, such risks often go unnoticed until regulatory audits occur, perpetuating an ongoing cycle of vulnerability. This oversight provides threat actors with a lucrative opportunity to compromise the application or system and allow unauthorized access to data.
This brings us to the crucial concept of Privileged Access Management (PAM). Organizations must proactively define privileged access to effectively understand the objectives of PAM. Privileged access refers to the specialized permissions granted to certain users, enabling them to administer systems, services, and manipulate critical data. These actions inherently pose a high risk, as they can result in data leaks, compromised security postures, regulatory violations, and significant financial implications that can tarnish an organization's reputation.
Privileged Access Management (PAM) encompasses a comprehensive set of processes, strategies, and tools designed to detect, secure, control, and monitor privileged access to an organization's critical data or infrastructure. Various types of privileged accounts exist, such as local administrators, root users, break-glass users, domain administrators, and service accounts with elevated access levels.
Implementing an effective privileged access management framework requires careful consideration of the following key points:
While certain controls may present challenges, it is crucial to establish mature processes for control exemptions and robust risk management procedures to identify and resolve any gaps.
Privilege abuse represents an emerging cybersecurity threat. Inadequate privileged access management practices can lead to data breaches, compromised system security, regulatory non-compliance, and reputational damage for organizations. To mitigate these risks, organizations must define well-structured policies and procedures that encompass detecting privileged credentials, streamlining governance of privileged credential management, monitoring and reporting on privileged access, and conducting consistent risk assessments of data and systems. By implementing a robust privileged access management framework, organizations can bolster their security posture and effectively safeguard critical assets.
GDPR Case Study: Mariott International
A Few Lessons from the Capital One Breach and Possible Countermeasures
Request a consultation with one of our security specialists today.
Get in touch