BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

APT Vehicle of Choice: The Accidental Insider

Post by Peter McCalister March 5, 2012

APT is the buzzword everyone is using. Companies are concerned about it, the government is being compromised by it, and consultants are using it in every presentation they give. But people fail to realize that the vulnerabilities these threats compromise are the insider — not the malicious insider, but the accidental insider who clicks on the wrong link.Dr. Eric Cole, Cyber Security Expert

One of most talked about topics at the recent RSA Conference in San Francisco was Advanced Persistent Threats (APT). While APT is the latest hot topic involving security, one aspect that has received little visibility is its relationship to privileged identity management.

Any weakness in your infrastructure that allows an attacker to access a system will give him or her opportunity to find another weakness and eventually get the keys to the kingdom – privileged access to a critical server or database with sensitive information.

Look no further than the RSA security breach that occurred early last year. Hackers gained network access through the HR department by sending bogus emails to RSA employees with the subject, “2011 Recruiting Plan.” Because RSA failed to implement a least privilege solution, accidental insiders at the company helped hackers hijack credentials to steal sensitive information.

Accidental insiders are unfortunately commonplace throughout many organizations. Why? Because human nature dictates that we will make mistakes. What’s needed is a comprehensive program to protect privileged access. The tradeoffs everyone has historically made to allow some level of risk no longer apply. Even something as simple as the accidental misconfiguration of a desktop PC can be the weakness a sophisticated attacker uses to gain the access they need to the privileged credentials of a systems or database admin.

Leave a Reply

Additional articles

Vulnerability Expert Forum Highlights: April 2014

We had a great turnout for last week’s April 2014 Vulnerability Expert Forum (VEF) webcast. BeyondTrust Research experts, Carter and DJ, provided in-depth knowledge about the latest vulnerabilities and their potential impacts on network environments. Below are highlights from the Forum, plus an on-demand video of the presentation. Latest critical vulnerabilities, vendor patches, and zero-day…

Post by Chris Burd April 16, 2014
Tags:
, , , , ,
BI-5.1-user-asset-visibility-img

Understanding Who Has Access to What with BeyondInsight v5.1

Today, it’s my pleasure to introduce you to BeyondInsight version 5.1, the latest release of our IT Risk Management platform, which unifies several of our solutions for Privileged Account Management and Vulnerability Management. BeyondInsight v5.1 embodies BeyondTrust’s mission to give our customers the visibility they need to make smart decisions and reduce risk to their…

Post by Morey Haber April 15, 2014
Tags:
, , , , , , , , , , , ,

PowerBroker for Unix & Linux Now Available via Web Services

This week BeyondTrust released a fully functional Web Services interface (REST API) for its PowerBroker for Unix & Linux product.  With this new feature users of the solution will now be able to remotely and securely configure and retrieve data via the API.  The Web Services interface implemented by BeyondTrust is an industry standard that…

Post by Paul Harper April 10, 2014
Tags:
, , , , ,