active authentication to protect it assets

19
ACTIVE AUTHENTICATION FOR INFRASTRUCTURE

Upload: plesk

Post on 11-Feb-2017

294 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Active authentication to protect IT assets

ACTIVE AUTHENTICATION FOR INFRASTRUCTURE

Page 2: Active authentication to protect IT assets

HELLO!I am Anirban Banerjee.I am the Founder and CEO of Onion ID. https://calendly.com/anirban/enterprise-demo/

Page 3: Active authentication to protect IT assets

THE STATUS QUO

CHALLENGES AND THREATS

GOING FORWARD

Page 4: Active authentication to protect IT assets

THE STATUS QUO

4

Page 5: Active authentication to protect IT assets

IT INFRASTRUCTURE

TODAY

LaptopsIn house servers

Cloud serversMobile devices

ContainersNetwork equipment

Page 6: Active authentication to protect IT assets

WHO IS ACCESSING

DevopsIT

DevelopersShadow ITBloggersMarketing

Automated SoftwareDeploy and Build softwareVendors and 3rd parties

Page 7: Active authentication to protect IT assets

THE STATUS QUO

Usernames/passwords

SSH Keys

▹ Helps login automatically

IP filters

▹ Only talk to certain computers

VPNs

▹ Some Security

▹ Encrypted traffic

Page 8: Active authentication to protect IT assets

CHALLENGES AND THREATS

Page 9: Active authentication to protect IT assets

CHALLENGES

▸ IT Outsourcing

Page 10: Active authentication to protect IT assets

CHALLENGES

▸ Inflexible – Multiple dev teams▹ Geographically distributed▹ Shadow IT

▸ High Velocity Changes – IaaS/Paas via APIs

▹ AWS, Rackspace, Docker▹ All types of web apps

▸ Employee churn

▸ Compliance and Audits

▸ Attack surface has changed▸ Horizontal attacker movement▸ Vertical privilege escalation

Page 11: Active authentication to protect IT assets

THE THREAT LANDSCAPE

Horizontal and Vertical Attacker Movement

Page 12: Active authentication to protect IT assets

GOING FORWARD

Page 13: Active authentication to protect IT assets

ACTIVE AUTHENTICATIO

N CAN HELP

▸ Concept of least privilege

▸ Risk score everything▸ Every command is

analyzed▸ Learn, Match, Act,

Update

Page 14: Active authentication to protect IT assets

WHAT TO LOOK FOR

AND WHAT TO DO

Usually never runs visudo /etc/shadow – high risk

COMMANDS BEING RUN

Where are you connecting from, time, # of connections

CONNECTION STATISTICS

Risk score every command: White, Grey, Black

EVERY COMMAND IS ANALYZED

Invisible 2FA for Grey, Physical 2FA for Black

TAKE ACTION

Apache Spark, Pykit Sci, SSH proxiesTOOLS

Page 15: Active authentication to protect IT assets

COMPLIANCE

▸ PCI DSS, HIPAA, FedRamp, FFIEC, SOX, SOC I,II

▸ Legal consequences▸ Provide proof of controls▸ Keep the board informed▸ Use tools for reporting, automate

Page 16: Active authentication to protect IT assets

BEST PRACTICES

▸ SSH Key rotations▸ Device fingerprinting▸ Credential rotations

for VPN▸ MAC address pinning▸ Review logs regularly▸ Audit user accounts

Page 17: Active authentication to protect IT assets

CONTINUOUS IMPROVEMEN

T

Your system needs to keep “learning”

Think about rule based approach, don’t obsess

Follow good login hygiene

Use DNS instead of nailed IPs

Audit shadow IT accounts

Page 18: Active authentication to protect IT assets

Connect with us

18 ▸ calendly.com/anirban/enterprise-demo/

▸ Free Trial on OnionID.com▸ [email protected]▸ 1-888-315-4745▸ Twitter - @onion_id▸ Connect with us on FB or Linkedin

▸ We will be posting these slides

▸ Feedback is very welcome

https://calendly.com/anirban/enterprise-demo/

Page 19: Active authentication to protect IT assets

THANK YOU!Any questions?You can find more about us at:Onion ID – Privilege Management in 60 Secondswww.onionid.com , [email protected]: +1-888 315 4745