Author Archives: Daniel W.

About Daniel W.

My name is Daniel and I live in California. I work in the Cybersecurity industry. I'm constantly learning and growing and this site is a place for me to give back what I can to the community.

3-Tiered Privilege Access Management: Who Cares?

Intro

Imagine a castle where every door, vault, or passageway is behind a lock and key. As you move down the hallways, you can see the doors, which are locked. There is only one way in if you have the key. This idea is essentially privileged access management. In this essay, we’ll cover what is a tiered approach to privileged access management, why anyone would use this, and what kinds of cyber threats this can help prevent.

What is tiered access management?

Privileged Access Management is a set of concepts, protocols, and tools for controlling and limiting asset access. These assets are segmented into three tiers, from most critical to most common. Critical assets might be servers holding the company’s crown jewels or a domain controller. The mid-tier might be every other server, web server, application server, and the broader scope of assets. The low tier might be workstations used by employees and printers. The idea is to limit and control a user’s ability to either log onto an asset they shouldn’t or move laterally to another asset they shouldn’t.

Why use tiered access management?

This multi-tiered approach is crucial because it limits what privileged accounts can access each tier. In the event of a compromise, you don’t want the adversary to compromise a workstation with a user logged in as an administrator. The adversary can dump hashes and potentially crack them offline. A hash is a one-way algorithm that will turn input into a string of alphanumeric characters and has the benefit of not being reversible, hence a way one algorithm. If the compromised asset is domain-joined, the adversary could launch Responder, a protocol poisoner, and potentially collect more hashes. In a research paper by  André Koot entitled “An Introduction to Privilege Access Management,” Koot explains further, “Cybercriminals often target privileged accounts due to the extensive access they provide. Malicious actors can gain unauthorized access to critical systems and data if these credentials are compromised. 1)” Implementing a multi-tiered privileged access framework can significantly limit and even entirely contain the damage.

How do you prevent lateral movement?

One of the many benefits of deploying a privileged access management framework is helping to prevent and controlling lateral movement. The framework is necessary because if an asset is compromised, the damage can be contained. In cybersecurity there is a concept called the principle of least privilege. The idea here is that all users should receive just the right amount of access to the resources they need to do their jobs and no more. In 2014, Sony found this out the hard way when North Korean hackers compromised them. Siddhesh Bhargude explains further in his research paper, “after the attack, Sony Pictures Entertainment implemented Privileged Access Management to strengthen their security protocols. PAM systems were used to implement the least privilege principle, manage and monitor privileged accounts, and enable multi-factor authentication.” It is not a matter of if a company will get compromised but when. Knowing this, we can be proactive and start deploying frameworks and tools to be prepared for when a compromise does occur.

Conclusion

In conclusion, implementing a private access management framework can have tremendous benefits in helping reduce malicious lateral movements. By breaking down administrative accounts by tiers and allowing only specific individuals to use these accounts, we can begin to control the flow and access to these resources. It’s better to be safe and prepared than sorry.

References:

  1. Koot A. Introduction to Privileged Access Management. IDPro. 2024;1(13). doi:10.55621/idpro.101
  2. Bhargude NMrS. Privileged Access Management: ensuring security and accountability. International Journal of Advanced Research in Science Communication and Technology. July 2023:647-651. doi:10.48175/ijarsct-12098

Thinking About Computer Networks

The point is to understand the purpose of a network

What’s the Purpose?

To begin protecting anything, one needs to know what to protect. One way to think about a network is to consider its purpose first. Understanding the network at a conceptual level is the first task.

What kind of business are we dealing with? A bank will have different types of data flowing between machines than a real estate company. Knowing the business, its purpose, and, ultimately, its requirements will help us understand the purpose of the network.

In the world of computer networking, anything of value starts with data. Computer data is anything digitally stored. Networks exist to transmit or transfer data between computers and, ultimately, between people.

How is Data Flowing?

Knowing the network’s purpose, we can then begin to draft an idea of what critical data is likely to be moving on the network. This might be bank transactions, PII, internal communications between the C-Suite, etc. From here, we can begin to think about what kind of servers, operating systems, segmentation of the networks, etc. might be needed to help facilitate the flow of data.

If the network is already deployed, thinking about the business functions can help guide us in determining criticality and how data should be protected.

As we consider the business needs and purpose of the network and the kinds of data flowing between users/machines/the Internet, we can now consider protections.

How to Protect Data?

Two main tools/ideas that can directly impact protecting network data are understanding Baselines and Data Loss Prevention (DLP). Baselines are used to identify normal behavior and activity on the network. Anything that deviates from this baseline is abnormal and should be investigated. Data Loss Prevention is a gigantic undertaking that requires classifying all the data on the network. However, done with patience and care, this can significantly boost critical data protection.

This is by no means exhaustive, but at the very least, I hope it gets you thinking in the right direction.