case study: privileged access in a world on time

23
Case Study: Privileged Access in a World on Time Trey Ray SCT17S SECURITY IT Manager FedEx Cyber Security Advisor FedEx Laxmi Potana Sr. Cyber Security Analyst FedEx Michael Scudiero

Upload: ca-technologies

Post on 21-Jan-2018

27 views

Category:

Technology


4 download

TRANSCRIPT

Page 1: Case Study: Privileged Access in a World on Time

Case  Study:  Privileged  Access  in  a  World  on  Time

Trey  Ray

SCT17S

SECURITY

IT  Manager  FedEx

Cyber  Security  AdvisorFedEx

Laxmi PotanaSr.  Cyber  Security  AnalystFedEx

Michael  Scudiero

Page 2: Case Study: Privileged Access in a World on Time

2 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS

©  2017  CA.  All  rights  reserved.  All  trademarks  referenced  herein  belong  to  their  respective  companies.

The  content  provided  in  this CA  World  2017  presentation  is  intended  for  informational  purposes  only  and  does  not  form  any  type  of  warranty. The information  provided  by  a  CA  partner  and/or  CA  customer  has  not  been  reviewed  for  accuracy  by  CA.  

For  Informational  Purposes  Only  Terms  of  This  Presentation

Page 3: Case Study: Privileged Access in a World on Time

3 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS

Abstract

Today  there  are  more  privileged  users  than  ever  before.  Providing  access  is  not  optional  it  is  a  business  necessity.  But  how  do  you  avoid  excessive  access?  Providing  the  right  access  at  the  right  time  with  CA  Privileged  Access  Manager  is  the  formula  for  reducing  your  risk  and  securing  a  world  of  data.  At  FedEx  empowering  the  right  people  at  the  right  time  is  not  only  good  business  it's  also  good  security.

Trey  RayFedExIT  Manager

Laxmi PotanaFedExCyber  Security  Advisor

Michael  ScudieroFedExSr.  Cyber  Security  Analyst

Page 4: Case Study: Privileged Access in a World on Time

A GLOBAL SHIPPING NETWORK TO TAKE ON THE FUTURE

HOW TO BUILD

Page 5: Case Study: Privileged Access in a World on Time

VIDEO:“FEDEX”TRT:  1:31

Page 6: Case Study: Privileged Access in a World on Time

Privileged Access in a World on TimeTrey Ray, Laxmi Potana, and Michael

Scudiero

Page 7: Case Study: Privileged Access in a World on Time

Privileged Access in a World of Cyber Risk

Page 8: Case Study: Privileged Access in a World on Time

PCI DSS 3.2 Created The Urgency

Page 9: Case Study: Privileged Access in a World on Time

2 Factor Authentication

Automated Password Rotation & Vaulting

Command Filtering

Leapfrog Prevention

PREVENT

DVR & Command Line Session Recording Available

Logging of All PAM User Activity

SIEM Integration & Alerting

DETECT

Built-in Reports on All Integrated Accounts and Passwords

Metrics Displayed in Admin Dashboard

REPORT

Privileged Access is Preventive & Detective

Page 10: Case Study: Privileged Access in a World on Time

Active Directory domain adminWindows Server AdminUnix rootDatabase admin (DBA) and developer break-fixApp service accountsWeb PortalsVMware Hypervisor adminTACACSCorporate social media accountsAny shared privileged account in the environment

If privileged accounts are the “Keys to the Kingdom,” then PAM is the lockbox for

the keys.

Managing the Keys to Running the World on Time

Page 11: Case Study: Privileged Access in a World on Time

Unix RootAdmin

Active DirectoryDomain Admin

Windows LocalAdmin Accounts

Developer AccessTo Privileged Data

USE CASESTO CONTROL PRIVILEGED ACCESS

Page 12: Case Study: Privileged Access in a World on Time

Use Case: Active Directory Domain Admin

Domain Admin launches an RDP session from their own PC/Laptop or from other Windows server in the domainusing a personal admin account.

This practice is subject to the “Pass the Hash” vulnerability whereby the domain administrator’s credentials can be harvested by an attacker and used to gain privileged access to the domain.

Before PAM Integration

Page 13: Case Study: Privileged Access in a World on Time

Use Case: Active Directory Domain Admin

Domain Admin logs into CA PAM client w/2FA and checks out a Domain Admin credential.

RDP session to a Domain Controller is launched using CA PAM transparent login with PAM managed credentials.

The Domain Admin credentials are never exposed to the administrator endpoint which eliminates the "Pass the Hash" vulnerability.

Session is optionally recorded for audit purposes.

After PAM Integration

Page 14: Case Study: Privileged Access in a World on Time

Use Case: Unix Root

No consistent method for managing Unix root passwords by the SysAdmin teams.

The Unix root passwords had to be rotated manually on a regularly scheduled interval.

No attribution for Unix root account usage

Before PAM Integration

Page 15: Case Study: Privileged Access in a World on Time

Use Case: Unix Root

Unix SysAdmin logs into CA PAM client w/2FA to check out the root password for a server when required.

SSH session to Unix server is launched using CA PAM transparent login with PAM managed credentials.

The root password is never displayed to the SysAdmin.

Command filtering prevents accidents (rm –rf *.*)

Session is optionally recorded for audit purposes.

After PAM Integration

Page 16: Case Study: Privileged Access in a World on Time

Use Case: Developer DB Break-Fix

Developer escalates his database privileges temporarily(24 hours) using an IDM pre-approved break/fix workflow.

Since the developer uses his own personal user account for the escalated database access, the window of opportunity for an attacker to gain access using compromised credentials is lengthy.

Before PAM Integration

Page 17: Case Study: Privileged Access in a World on Time

Use Case: Developer DB Break-Fix

Developer logs into CA PAM client w/2FA and checks out a privileged database account.

Secure SQL session to database is launched using CA PAM transparent login with PAM managed credentials.

The database password is never displayed to the developer.

Session is optionally recorded for audit purposes.

After PAM Integration

Page 18: Case Study: Privileged Access in a World on Time

Use Case: Microsoft LAPS Console

Administrator launches the LAPS console from their local machine.

LAPS privileges are granted directly to the human admins via an AD group.

An adversary utilizing a compromised human admin account would be able to view local Windows admin credentials for many devices in LAPS.

Before PAM Integration

Page 19: Case Study: Privileged Access in a World on Time

Use Case: Microsoft LAPS Console

Administrator logs into CA PAM client w/2FA and checks out a LAPS enabled credential.

CA PAM launches the LAPS console via RDP published application.

The LAPS enabled credential is rotated at the end of the session and once a day.

LAPS session is optionally recorded for audit purposes.

After PAM Integration

Page 20: Case Study: Privileged Access in a World on Time

WHAT WE LEARNEDWILL HELP US SCALE

| | |DESIGN FOR HIGH AVAILABILITY

EMPOWERADMINISTRATORS

PHASEDAPPROACH

AWARENESS PLANNING

Page 21: Case Study: Privileged Access in a World on Time

21 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS

Questions?

Page 22: Case Study: Privileged Access in a World on Time

22 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS

Stay  connected  at  communities.ca.com

Thank  you.

Page 23: Case Study: Privileged Access in a World on Time

23 COPYRIGHT  ©  2017  CA.  ALL  RIGHTS  RESERVED#CAWORLD #NOBARRIERS

Security

For  more  information  on  Security,please  visit:  http://cainc.to/CAW17-­Security