Equifax Rant #6 of 7 - Identity, Access, and Privilege

Equifax Rant #6 of 7 - Identity, Access, and Privilege

Where to start on these 3 topics? So much words and so little blog!

When a hacker is inside of your network snooping around, stealing things, destroying things, escalating things, doing anything they have 3 things. These are the same 3 things regular users have.

Users and hackers both have identities. Users typical identify themselves by logging into their workstations and, unless SSO is working brilliantly, also logging into various applications and systems throughout the day. Hackers have somehow commandeered a user's credentials and are playing around in your house acting like one of your children....

But if you look closely at their identity, they're really not your children. They may call themselves your children, but they came in from a different door, they've been there a different amount of time, they're not in the location that your child normally is. If you look at the behavior of this so called child, you could tell me right away they're not yours. Even though they may look like yours on the outside.

Identity verification and authentication are one of the cornerstones to information security. You can't prevent bad guys from getting your goodies if you don't even know who the good guys are.

Now that we have a handle of who are users are and what their behaviors are. We can begin to lock down access. Both users and hackers have access. Group, Department, and Individual access management is key to a successful layered security approach.

If my IT department is 1/100th the size of my entire company, I can narrow my attack surface by 99% with one department level policy. If IT is 100 people and only 5 developers need for this application need access to it, I can further limit my attack surface by an additional 95%. Now only 5 people in the company have access to this application.

This all goes out of the window if non-centralized accounts are used... Like root/admin. So... stop that right now! Bad kitty!

So now our 5 developers are the only people in the world with access to said application. Great. What kind of access do they have? Carte blanche nuclear capabilities? NO WAY JOSE! This is where we get into privileges.

Let's start by giving them the least amount of privileges possible. This is called the principle of least privilege.

Let them ask for more, let them justify needing more. And when they do get more, lets give it to them for a specified amount of time. Let's log/record everything they do while controlling the escalated privileges. After they're finished, let's make them check back in with us and permanently destroy their temporary privileges.

Even though my database administrator architected the database, built the database, maintains the database, and has created all of the fancy views and clustering, doesn't mean he/she should have the right to view payroll information. If they need to do work on a table/view with sensitive information, let them check out an escalated privilege and we'll watch them like a hawk while they have the whole company's Crown Jewels in their hands.

This is called privileged access management and is all part of an overarching strategy to secure information through identity, access, and privilege. And once we have that, we can get to the real meat of the Equifax hack. Who's responsible? Rant #7 incoming!


David Giambruno

Expert in delivering innovative AI-driven capabilities, products, cloud transformation, and cybersecurity solutions, with a proven track record of boosting revenue and EBIT across all functions and levels.

7 年

But I have to have root! Good article spot on. Stop stupid

要查看或添加评论,请登录

Ben Boyd的更多文章

  • Revolutionizing Blue Team Operations? The Disruption of XDR

    Revolutionizing Blue Team Operations? The Disruption of XDR

    In the ever-changing, new acronym generating landscape of cybersecurity, has the emergence of Extended Detection and…

    2 条评论
  • ???? Starting the Art of Prompt Engineering: A Thought Experiment for Cybersecurity Blue Teams ?????

    ???? Starting the Art of Prompt Engineering: A Thought Experiment for Cybersecurity Blue Teams ?????

    In the ever-evolving world of cybersecurity, staying ahead of threats is not just a goal; it's a necessity. That's…

    1 条评论
  • In Tech Sales? Look for jobs...

    In Tech Sales? Look for jobs...

    I hope I'm not saying anything revolutionary here, but you'd be surprised how many people don't use this one simple…

  • Who's Knocking At Your Door?

    Who's Knocking At Your Door?

    We have to present a public face to do business in this world. And soon we'll have to present a metaverse image as…

    1 条评论
  • Stop calling me agnostic...

    Stop calling me agnostic...

    “We are vendor agnostic” Ever hear your VAR say something like that? Since 2010, I’ve heard colleagues and co-workers…

    17 条评论
  • GoDaddy, Tribune and Questions About Phishing

    GoDaddy, Tribune and Questions About Phishing

    Bad guys don't care about your feelings, the pandemic, your job, or Christmas. In fact, bad guys hunt for prey and…

    6 条评论
  • Is this email working??

    Is this email working??

    I'm often asked to help “craft” the perfect e-mail for my sales team to help with thier unsolicited attempts at…

    3 条评论
  • Daily Goals

    Daily Goals

    One of the habits I picked up at a young age was learning from people who know more than me. A lot of people know more…

    1 条评论
  • Security Whack-a-Mole & Partnerships

    Security Whack-a-Mole & Partnerships

    Maybe I've been watching too many Sopranos reruns, but I've been using the term "whack" way too much in my…

    2 条评论
  • Equifax Rant #7 of 7 - Accountability and Responsibility

    Equifax Rant #7 of 7 - Accountability and Responsibility

    The median salary for a CISO is $215k base/$260k total. The top 25% make more than $250k/$315k.

社区洞察

其他会员也浏览了