Apply Mitigations 1-3 Upgrade hosts and domain Build full defenses (IPDRR) • Credential theft attacks • Review previous mitigations • Strategies: Identify, Protect, Detect,

Download Report

Transcript Apply Mitigations 1-3 Upgrade hosts and domain Build full defenses (IPDRR) • Credential theft attacks • Review previous mitigations • Strategies: Identify, Protect, Detect,

1
Apply Mitigations 1-3
2
Upgrade hosts and domain
3
Build full defenses (IPDRR)
• Credential theft attacks
• Review previous mitigations
• Strategies: Identify, Protect, Detect, Respond, Recover
• New features and platform updates
• Scenarios
4
1. http://bits.blogs.nytimes.com/2013/04/22/the-year-in-hacking-by-the-numbers
Get Credentials
• Social engineering and phishing schemes are used
to trick personnel and obtain credentials.
• Most organizations do not recognize when
attackers are already within the network and have
access to information such as emails, confidential
documents and other intellectual property.
Get Data
• The attack doesn’t stop there. Attackers look for
the next set of credentials with elevated
permissions to access servers.
• Once elevated credentials are obtained and
servers are compromised, organizations risk
losing revenue, brand reputation and business
continuity.
Get Control
• The ultimate goal of the attacker may be to gain
access to the domain controllers, the central
clearing hub for all credentials and identities.
• Once compromised, an attacker has complete
control over an entire organization. All assets,
intellectual property, physical property and
personal information are in jeopardy.
Objective
How
Outcome
This mitigation reduces
the risk of
administrators
from inadvertently
exposing privileged
credentials to higher
risk computers.
• Restrict DA/EA accounts from
authenticating to lower trust
computers
• Provide admins with accounts to
perform administrative duties
• Assign dedicated workstations for
administrative tasks.
• Mark privileged accounts as “sensitive
and cannot be delegated”
• Do not configure services or schedule
tasks to use privileged domain
accounts on lower trust computers
An attacker cannot steal
credentials for an
account if the credentials
are never used on the
compromised computer.
Addition of authentication policies
Mitigation 2 - Restrict and protect local accounts with administrative
privileges
Objective
How
Outcome
This mitigation restricts
the ability of attackers
to use local
administrator accounts
or their equivalents for
lateral movement PtH
attacks.
• Enforce the restrictions available in
Windows Vista and later versions,
preventing local accounts from being
used for remote administration.
• Explicitly deny network and Remote
Desktop logon rights for all
administrative local accounts.
• Create unique passwords for local
accounts with administrative
privileges.
An attacker who
successfully obtains local
account credentials from
a compromised
computer will not be
able to use those
credentials to perform
lateral movement on the
organization's network.
Built-in SIDs for local accounts and local administrators
Mitigation 3 - Restrict inbound traffic using the Windows Firewall
Objective
How
Outcome
This mitigation restricts
the ability of attackers
from initiating lateral
movement from a
compromised
workstation by blocking
inbound connections.
• Restrict all inbound connections to all
workstations except for those with
expected traffic originating from
trusted sources, such as helpdesk
workstations, security compliance
scanners and servers.
An attacker who
successfully obtains any
type of account
credentials will not be
able to connect to other
workstations.
No technical changes
1.
2.
3.
4.
5.
Current environment
Identify high-value assets
Consider attacker mindset
Baseline normal behavior
Against known and unknown threats
Admin
Password!
External
storage
Sign-on
Use/cache
on client
In transit
on network
Architect a complete credential theft defense
Consider usability a security feature
Authoritative
store
Production Forest
Tier 0
Create hardened and restricted
administrative hosts
Forest/Domain
Admins and
Groups
Admin
Workstations
Server Admins
and Groups
Admin
Workstations
Workstation
Admins
Admin
Workstations
Domain Controllers
Tier 1
Resources
Develop a containment
strategy
Tier 2
Workstations
Tier Logon
All Logons Blocked
Higher Tier Logon
Only as required by role
Lower Tier Logon
PtH and related attacks
Focus on
high-value
assets
Monitor
Event IDs
of interest
Collect and
correlate
events
To suspicious activity
Regularly update protection and detection mechanisms
Closely observe affected hosts
Ensure attack vectors are properly addressed
Follow up on lessons learned
Account compromise
Regain control over accounts
Change compromised account passwords or
Disable an account and remove group memberships
Considerations:
• Only effective against future authentication
• Offline attackers can still use cached logon pv
• Attacker may be able to re-obtain password
• Attacker may persist using malware in user context
Domain compromise
Tactical Recovery
Strategic Recovery
A short-term operation designed to disrupt a known
adversary operation
A long-term plan that consists of multiple operations
focused on recovering integrity at a high assurance
level
• Useful intelligence on the adversary presence
• Stealth operation that the adversary is unaware of
• Properly scoped defender operation
•
•
•
Risk of migration
Risk of coexistence
Planned end state
Consider professional incident response services
Core platform changes (automatically on)
Features
Description
Remove LAN
Manager (LM)
hashes and
plaintext
credentials from
LSASS
LAN Manager legacy hashes and (reversibly
encrypted) plaintext passwords are no longer
stored in LSASS
Enforce credential
removal after logoff
New mechanisms have been implemented to
eliminate session leaks in LSASS, thereby preventing
credentials from remaining in memory
Logon restrictions
with new wellknown security
identifiers (SIDs)
Use the new SIDs to block network logon for local
users and groups by account type, regardless of what
the local accounts
are named
AVAILABLE ON
Windows 7 /
Windows Server
2008 R2
AVAILABLE ON
Windows 8 /
Windows Server
2012
AVAILABLE ON
Windows 8.1 /
Server 2012 R2
REQUIRES DOMAIN
UPGRADE
Windows Server 2012 R2
Domain Functional Level
Configurable Features
Features
Description
Restricted
Admin mode for
Remote Desktop
Connection
The Remote Desktop application and service have been
updated to support authentication without providing
credentials to the remote host
Protected Users
security group
The new Protected Users security group enables
administrators to restrict authentication to the Kerberos
protocol only for group members within a domain
Authentication
Policy and
Authentication
Policy Silos
New Authentication policies provide the ability to restrict
account authentication to specific hosts
and resources
AVAILABLE ON
Windows 7 /
Windows Server
2008 R2
AVAILABLE ON
Windows 8 /
Windows Server
2012
AVAILABLE ON
Windows 8.1 /
Server 2012 R2
REQUIRES DOMAIN
UPGRADE
Windows Server 2012 R2
Domain Functional Level
~ Only if installed
** Off by default on Windows 8.1
and
Windows Server
2012 R2
* Off by default
Adapted from: Benjamin Delpy LSASS security improvements #windows8.1
https://twitter.com/gentilkiwi/status/352557093640892416/photo/1
Helpdesk
Domain administration
Operations and service management
Service accounts
Business group isolation
Bring your own device (BYOD)
Recommendations
• Separate administrative accounts from user accounts
• Use hardened and restricted hosts
• Limit exposure of administrative credentials
• RDP /RestrictedAdmin
• Tools that only use network logon (Type 3)
• Add accounts to Protected Users security group
(if Kerberos only is feasible)
• Create authentication policies and silos
(if protected users is feasible)
Helpdesk
Domain administration
Operations and service management
Service accounts
Business group isolation
Bring your own device (BYOD)
Recommendations
• Reduce privileges and privilege use
• Only use DA/EA for DC Maintenance and Delegation
• Separate administrative accounts from user accounts
• Use hardened and restricted hosts
• Strengthen authentication assurance
• Implement security monitoring
• Add accounts to Protected Users security group
(if Kerberos only is feasible)
• Create authentication policies and silos
(if protected users is feasible)
Helpdesk
Domain administration
Operations and service management
Recommendations
Service accounts
Business group isolation
Bring your own device (BYOD)
• Grant the least privilege
• Never add to Domain Admins or Enterprise Admins
• Use managed service accounts
• Change passwords regularly
• Strengthen authentication assurance
• Monitor service account activity
• Contain credential exposure
Considerations
Helpdesk
Domain administration
Operations and service management
Service accounts
Business group isolation
Bring your own device (BYOD)
•
•
•
•
•
•
Define Use Cases
Use hardened and restricted hosts
Restrict account logons
Consider blocking Internet access
Do not share accounts or passwords
Ensure unique local administrative passwords on
workstations and servers
Helpdesk
Domain administration
Operations and service management
Service accounts
Business group isolation
Bring your own device (BYOD)
Considerations
•
•
•
•
•
•
•
•
•
Define use cases and policies
Ensure risks are understood and accepted
Do not use BYOD devices for administration
Ensure that high business impact (HBI) data is not being
stored on these devices
No shared password for corporate and personal accounts
No use of privileged service accounts on BYOD devices
Deploy available security policies
Isolate network access
Create response/recovery strategies
1 Implement strategies
2 Apply scenario guidance
3 Identify and implement quick wins
1)
2)
3)
26
http://www.microsoft.com/PtH
27
http://www.microsoft.com/PTH
http://www.nist.gov/cyberframework/upload/cybersecurity-framework-021214.pdf
http://channel9.msdn.com/Events/TechEd/NorthAmerica/2014/DCIM-B213
https://technet.microsoft.com/en-us/library/security/2871997.aspx
http://channel9.msdn.com/Events/TechEd
www.microsoft.com/learning
http://microsoft.com/technet
http://developer.microsoft.com
http://technet.microsoft.com/library/dn765472.aspx
http://technet.microsoft.com/en-us/library/hh546785.aspx
http://www.microsoft.com/en-us/server-cloud/products/
windows-azure-pack
http://azure.microsoft.com/en-us/