Privileged Access Management · privileged credentials • Authenticates and links users to...

22
Privileged Access Management August 2018 Breaking the Kill Chain

Transcript of Privileged Access Management · privileged credentials • Authenticates and links users to...

Page 1: Privileged Access Management · privileged credentials • Authenticates and links users to privileged activity • Adopts zero-trust posture – permit by exception Provides foundation

Privileged AccessManagement

August 2018

Breaking the Kill Chain

Page 2: Privileged Access Management · privileged credentials • Authenticates and links users to privileged activity • Adopts zero-trust posture – permit by exception Provides foundation

Copyright © 2018 CA, Inc. All rights reserved.

Copyright © 2018 CA, Inc. All rights reserved. All marks used herein may belong to their respective companies. This documentdoes not contain any warranties and is provided for informational purposes only. Any functionality descriptions may be unique tothe customers depicted herein and actual product performance may vary.

The views expressed in this presentation are those of the author(s) and do not necessarily reflect the official policy or position of the Air Force, the Department of Defense, or the U.S. Government.

For Informational Purposes Only Terms of this Presentation

Page 3: Privileged Access Management · privileged credentials • Authenticates and links users to privileged activity • Adopts zero-trust posture – permit by exception Provides foundation

Copyright © 2018 CA, Inc. All rights reserved.

AgendaKEY FINDINGS OF INSIDER THREATS REPORT

NATURE OF INSIDER THREAT

THE IMPACT OF INSIDER THREAT

THE SOLUTION: PRIVILEGED ACCESS MANAGEMENT

5 WAYS PAM BREAKS THE KILL CHAIN

1

2

3

4

5

WHY CA TECHNOLOGIES6

Page 4: Privileged Access Management · privileged credentials • Authenticates and links users to privileged activity • Adopts zero-trust posture – permit by exception Provides foundation

Copyright © 2018 CA, Inc. All rights reserved.

THE INSIDER THREAT REPORTKey Finding: Most feel vulnerable to insider threats

Page 5: Privileged Access Management · privileged credentials • Authenticates and links users to privileged activity • Adopts zero-trust posture – permit by exception Provides foundation

Copyright © 2018 CA, Inc. All rights reserved.

THE INSIDER THREAT REPORTKey Finding: How effective are your controls?

Page 6: Privileged Access Management · privileged credentials • Authenticates and links users to privileged activity • Adopts zero-trust posture – permit by exception Provides foundation

Copyright © 2018 CA, Inc. All rights reserved. 1. 2017 Verizon Breach Report

increase in reported data breaches from 2016 to 2017144%

THE INSIDER THREAT REPORTNature of Threat: Who poses the biggest threat?

Page 7: Privileged Access Management · privileged credentials • Authenticates and links users to privileged activity • Adopts zero-trust posture – permit by exception Provides foundation

Copyright © 2018 CA, Inc. All rights reserved.

THE INSIDER THREAT REPORTNature of Threat: Which users are riskiest?

Page 8: Privileged Access Management · privileged credentials • Authenticates and links users to privileged activity • Adopts zero-trust posture – permit by exception Provides foundation

Copyright © 2018 CA, Inc. All rights reserved. 1. 2017 Verizon Breach Report

THE INSIDER THREAT REPORTNature of Threat: What data are they trying to steal?

Page 9: Privileged Access Management · privileged credentials • Authenticates and links users to privileged activity • Adopts zero-trust posture – permit by exception Provides foundation

Copyright © 2018 CA, Inc. All rights reserved. 1. 2017 Verizon Breach Report

THE INSIDER THREAT REPORTNature of Threat: Which systems are most vulnerable?

Page 10: Privileged Access Management · privileged credentials • Authenticates and links users to privileged activity • Adopts zero-trust posture – permit by exception Provides foundation

Copyright © 2018 CA, Inc. All rights reserved.

THE INSIDER THREAT REPORTImpact of Threat: Is the threat real or not?

Page 11: Privileged Access Management · privileged credentials • Authenticates and links users to privileged activity • Adopts zero-trust posture – permit by exception Provides foundation

Copyright © 2018 CA, Inc. All rights reserved.

of all insider breaches are financially motivated160%

1. 2017 Verizon Breach Report

THE INSIDER THREAT REPORTImpact of Threat: What is the cost of the attack?

Page 12: Privileged Access Management · privileged credentials • Authenticates and links users to privileged activity • Adopts zero-trust posture – permit by exception Provides foundation

Copyright © 2018 CA, Inc. All rights reserved.

THE INSIDER THREAT REPORTImpact of Threat: How long to detect an attack?

Page 13: Privileged Access Management · privileged credentials • Authenticates and links users to privileged activity • Adopts zero-trust posture – permit by exception Provides foundation

Copyright © 2018 CA, Inc. All rights reserved.

THE SOLUTIONPrivileged Access Management

Stops Targeted Attacks

What PAM does for you

Mitigates Insider Threats

Achieves & Sustains Compliance

Improves Efficiencies

Secures the Hybrid Enterprise

Page 14: Privileged Access Management · privileged credentials • Authenticates and links users to privileged activity • Adopts zero-trust posture – permit by exception Provides foundation

Copyright © 2018 CA, Inc. All rights reserved.

14

Network Perimeter

THE SOLUTIONPAM | Disrupts the attack sequence

Disrupting the attack sequence at any point can “kill” the attack

RECON WEAPONIZE DELIVER EXPLOIT INSTALL COMMAND | CONTROL ACTIONS ON OBJECTIVE

NETWORK PERIMETER

External Threat

Insider Threats

Elevate Privileges Wreaks HavocGain/Expand Access

Lateral Movement

Page 15: Privileged Access Management · privileged credentials • Authenticates and links users to privileged activity • Adopts zero-trust posture – permit by exception Provides foundation

Privilege Vaultbuilds the foundationWhat challenges does it solve:

• Protects and manages privileged credentials

• Authenticates and links users to privileged activity

• Adopts zero-trust posture –permit by exception

Provides foundation for combatting insider threats and targeted breaches Centrally manages and protects access and usage of privileged accounts

VALUE STATEMENT

1THE SOLUTION5 Ways PAM Breaks the Chain

Privileged Credential Vault

Page 16: Privileged Access Management · privileged credentials • Authenticates and links users to privileged activity • Adopts zero-trust posture – permit by exception Provides foundation

Session Recordingis CriticalA “must have” capability that provides:

• Video coverage of all privileged user activity

• Individual accountability• Forensic evidence of

accidental or malicious actions

Session recording is out of the box, highly scalable, and delivered with no additional infrastructure requirements

VALUE STATEMENT

2THE SOLUTION5 Ways PAM Breaks the Chain

SessionRecording

Privileged Credential Vault

Page 17: Privileged Access Management · privileged credentials • Authenticates and links users to privileged activity • Adopts zero-trust posture – permit by exception Provides foundation

User Behavior Analyticssuperchargesstatic controlsA “must have” emergingcapability because it:

• Can quickly identify abnormal behavior

• Assess the risk associated with this activity

• Trigger automated migration to the risk

CA Threat Analytics for PAM continuously assesses risk to quickly detect malicious activity so you become

VALUE STATEMENT

3THE SOLUTION5 Ways PAM Breaks the Chain

SessionRecording

User Behavior Analytics

Privileged Credential Vault

Page 18: Privileged Access Management · privileged credentials • Authenticates and links users to privileged activity • Adopts zero-trust posture – permit by exception Provides foundation

Host-Based Access ControlcomplementsPrivilege VaultA “value add” security capability that provides:

• Fine-grained access control for critical servers

• Command and socket filtering

• Monitoring and alerts when changes made

• Secure task delegation

CA PAM Server Control provides an extra layer of security for your most mission critical servers

VALUE STATEMENT

4THE SOLUTION5 Ways PAM Breaks the Chain

SessionRecording

Host-BasedAccess Control

User Behavior Analytics

Privileged Credential Vault

Page 19: Privileged Access Management · privileged credentials • Authenticates and links users to privileged activity • Adopts zero-trust posture – permit by exception Provides foundation

The Modern Software Factory is ComplexA “value add” security capability that provides:

• Cloud-based• Mainframe • On-premise• Virtual

No limitations solutions goes wherever your apps go… either physical, virtual or cloud.

VALUE STATEMENT

5THE SOLUTION5 Ways PAM Breaks the Chain

SessionRecording

Host-BasedAccess Control

Hybrid Environments

User Behavior Analytics

Privileged Credential Vault

Page 20: Privileged Access Management · privileged credentials • Authenticates and links users to privileged activity • Adopts zero-trust posture – permit by exception Provides foundation

Copyright © 2018 CA, Inc. All rights reserved.

WHY CA Privileged Access ManagementComprehensive privileged access security

Single appliance protecting thousands of resources

Session recording runs in appliance, no additional hardware required

Supports a large number of concurrent sessions – at no additional costs

Installs in hours not weeks or months

Easy to install, configure, maintain, upgrade and manage

Enhanced features in base software license costs

Less infrastructure reduces overall total cost of ownership Comprehensive PAM solution in network and host

based form factors

Supports physical, virtual and cloud environments

Threat Analytics help reduce the threat of breach

1 Quick Time toValue Protection

2 Enterprise-Class Scalability

Defense-In-Depth Protection 3

Page 21: Privileged Access Management · privileged credentials • Authenticates and links users to privileged activity • Adopts zero-trust posture – permit by exception Provides foundation

Copyright © 2018 CA, Inc. All rights reserved.

Thank You

To learn more about Insider Threat, visit us at:

https://www.ca.com/us/products/insider-threat.html

To learn more about CA PAM, visit us at:

ca.com/pam

Page 22: Privileged Access Management · privileged credentials • Authenticates and links users to privileged activity • Adopts zero-trust posture – permit by exception Provides foundation

Product Marketing Director, [email protected]

Robert Marti

@casecurity

Slideshare/CAinc

Linkedin.com/company/ca-technologies