data-breaches-due-to-poor-iam-strategy
data-breaches-due-to-poor-iam-strategy
data-breaches-due-to-poor-iam-strategy
Major identity
security failures
of the last decade.
www.manageengine.com/active-directory-360
Introduction
Digital transformation has made today's organizations more flexible and efficient, enabling
employees to work from anywhere, any time, using any device they own. With this
development, traditional methods of protecting on-premises IT networks are no longer
sufficient to safeguard users' identities. Employees, vendors, partners, and other
stakeholders must be given access to an organization's network only after verifying their
identity—and they should have access only to the resources they need.
Understanding every user's behavior within a network, i.e., who is accessing what
information, at what time, from which location, and using what device, is essential for
network security. Organizations should have advanced analytics capabilities to learn the
normal behavior of every user, and trigger alarms upon detecting anomalous behavior for
timely threat detection and response.
To achieve this, organizations must adopt a strong identity and access management (IAM)
framework that helps prevent privilege escalation and unauthorized access to sensitive
applications, comply with IT regulatory mandates, conduct in-depth security audits and
forensics, and much more. In this e-book, we'll discover how a few organizations with some
of the strongest cybersecurity systems fell prey to devastating data breaches due to poor
IAM practices.
2
Three cases of poor IAM
Deloitte, one of the "big four" accountancy firms in the world, fell prey to a cybersecurity
attack in 2017. As one of the largest consultancy firms in the US, the company provided
cybersecurity advice to powerful government agencies, financial institutions, and
multinational companies, and had access to a large amount of sensitive financial and
personal data.
With a revenue of $37 billion in 2017, Deloitte had all the resources it needed to implement
a robust security system. However, all it took the hackers to bypass it was a simple password
breach. So, how did the hackers do it?
The hackers breached Deloitte's global email server via an administrator account. This admin
account had unrestricted access to the entire network, and was only guarded by a single
password. By failing to implement multi-factor authentication (MFA), an important IAM best
practice, Deloitte left the account wide open for hackers to exploit it. According to reports[1],
the hackers had access to Deloitte's systems for about six months, from emails to a range of
sensitive information including passwords, business architectural diagrams, IP addresses,
and more.
Ironically, Deloitte was ranked number one in cybersecurity consulting for five years in a row
by Gartner before the incident.
eBay, a popular online shopping platform, suffered a breach in 2014. Between late February
and early March of that year, hackers compromised the login credentials of a small number of
eBay employees, and gained entry into its corporate network.
The hackers were successfully able to siphon gigabytes of data, including encrypted
passwords and personal information, and remained undetected inside eBay's corporate
network for over seven months. Though the stolen passwords were encrypted, eBay advised
its 145 million active customers to change their passwords as a precautionary measure.
Despite no financial information being exposed in the data breach, the information the
attackers obtained could potentially create much bigger problems. With the names, email
addresses, phone numbers, dates of birth, and registered addresses of 145 million people,
attackers could devise numerous attacks like spear phishing, social engineering, and more.
3
Home Depot, the largest home improvement retailer in the US, was a victim of a major data
breach in 2014. Initially, it was reported that the breach affected 56 million credit card
holders, but it was later revealed that the scope of the breach included 53 million emails as
well. So, how did such a huge data breach happen?
Home Depot's network was initially breached due to a compromised third-party vendor's
account, which could have been avoided using MFA. The hacked account then had its
privileges escalated and custom-built malware was injected into the system, all without
arousing any suspicion. On top of all this, the data was siphoned out of the system
effortlessly under the radar. Without the capability to capture event information and perform
analytics and reporting, Home Depot was unable to spot this malicious activity in time to
stop it.
Home Depot reported that the data breach would cost an estimated $62 million. Later, the
costs were found to be much higher, and included a lawsuit it settled for $25 million two
years later.
4
AD360 is an identity governance and administration
solution for managing user identities, governing
access to resources, enforcing security, and ensuring
compliance. From user provisioning, self-service
password management, and Active Directory (AD)
How AD360 change monitoring to single sign-on (SSO) for
helps implement
enterprise applications, AD360 helps perform all IAM
tasks with a simple, easy-to-use interface.
IAM best
AD360 provides all these functionalities for Windows
practices AD, Exchange Servers, and Office 365 platforms.
With AD360, you can choose the modules you need
and start addressing IAM challenges across
on-premises, cloud, and hybrid environments from a
single console.
5
2 Creating and Prevent employees from using weak passwords by
enforcing policies that increase password complexity.
enforcing complex Passwords with a healthy mix of special characters,
Ensure that users don't use compromised passwords during password change and reset
operations by leveraging the tool's integration with the Have I Been Pwned API service.
Set organizational unit (OU) and group-specific password policies, with the flexibility to set
stringent policies for privileged users.
6
AD360's MFA capability adds a second factor to
authenticate users on their Windows, Linux, or
macOS machines. It provides MFA during SSO for over
100 applications, and you can also configure any
Security Assertion Markup Language (SAML)-based
custom application for SSO. With this feature, users
can securely access all their enterprise applications
from a single dashboard.
5 Auditing user It's important to keep track of the who, when, what,
and where of logons and logon failures, privileged
activities accesses, changes to privileged access, etc.
Organizations are expected to document these details
in order to prove their adherence to regulatory audits.
7
6 Identifying and Inactive accounts, especially of senior-level employees
who leave the organization, can cause unauthorized
removing ghost access to critical resources like financial documents or
AD360 is an integrated identity and access management (IAM) solution for managing user identities, governing access
to resources, enforcing security, and ensuring compliance. From user provisioning, self-service password management,
and Active Directory change monitoring, to single sign-on (SSO) for enterprise applications, AD360 helps you perform
all your IAM tasks with a simple, easy-to-use interface. With AD360, you can just choose the components you need and
start addressing IAM challenges across on-premises, cloud, and hybrid environments from within a single console.