- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 303字
- 2021-06-30 19:15:45
The credentials – authentication and authorization
According to Verizon's 2017 Data Breach Investigations Report (9), the association between threat actor (or just actor), their motives and their modus operandi vary according to the industry. However, the report states that stolen credentials is the preferred attack vector for financial motivation or organized crime. This data is very important, because it shows that threat actors are going after user's credentials, which leads to the conclusion that companies must focus specifically on authentication and authorization of users and their access rights.
The industry agreed that a user's identity is the new perimeter. This requires security controls specifically designed to authenticate and authorize individuals based on their job and need for specific data within the network. Credential theft could be just the first step to enable cybercriminals to have access to your system. Having a valid user account in the network will enable them to move laterally (pivot), and at some point find the right opportunity to escalate privilege to a domain administrator account. For this reason, applying the old concept of defense in depth is still a good strategy to protect a user's identity, as shown in the following diagram:

Here, there are multiple layers of protection, starting with the regular security policy enforcement for accounts, which follow industry best practices such as strong password requirements, a policy requiring frequent password changes, and password strength. Another growing trend to protect user identities is to enforce MFA. One method that is having increased adoption is the callback feature, where the user initially authenticates using his/her credentials (username and password), and receives a call to enter their pin. If both authentication factors succeed, they are authorized to access the system or network. We are going to explore this topic in greater detail in Chapter 6, Chasing User's Identity.
- Kubernetes修煉手冊(cè)
- Windows Server 2012 Hyper-V:Deploying the Hyper-V Enterprise Server Virtualization Platform
- 從零開始寫Linux內(nèi)核:一書學(xué)透核心原理與實(shí)現(xiàn)
- 大學(xué)計(jì)算機(jī)應(yīng)用基礎(chǔ)實(shí)踐教程(Windows 7+Office 2013)
- Linux從零開始學(xué)(視頻教學(xué)版)
- 構(gòu)建可擴(kuò)展分布式系統(tǒng):方法與實(shí)踐
- STM32庫開發(fā)實(shí)戰(zhàn)指南:基于STM32F4
- 計(jì)算機(jī)系統(tǒng):基于x86+Linux平臺(tái)
- 深入淺出Node.js
- Fedora 12 Linux應(yīng)用基礎(chǔ)
- 計(jì)算機(jī)系統(tǒng)的自主設(shè)計(jì)
- 鴻蒙HarmonyOS應(yīng)用開發(fā)從入門到精通
- 電腦辦公(Windows 7 + Office 2013)入門與提高
- 樹莓派+傳感器:創(chuàng)建智能交互項(xiàng)目的實(shí)用方法、工具及最佳實(shí)踐
- Microsoft Azure Administrator:Exam Guide AZ-103