logo

How to Contain a Privileged Access Breach Quickly and Effectively

If an adversary manages to gain control of a privileged account in your network, you may face serious consequences, including costly data loss, prolonged downtime, customer churn, and legal and compliance penalties.

This blog explains how to build an effective incident response plan that can help you minimize the damage from a breach. 

The playbook of an attack involves multiple steps.

Attackers seldom accomplish their goal by accessing a single system. Instead, attacks typically involve multiple steps:

  1. Establish a beachhead on one system in the network. For example, adversaries can exploit vulnerabilities in enterprise software or compromise a user account through phishing or password-guessing attacks.
  2. Elevate privilege on that system. All too often, regular users have administrative rights on their own computers to provide a better user experience, giving adversaries a leg up immediately.
  3. Compromise additional user accounts, especially accounts with elevated privileges.
  4. Use the access rights to move laterally through the network while avoiding detection in order to achieve persistence and achieve objectives such as exfiltrating sensitive data or bringing down vital systems.

Containment and eradication require a multi-faceted approach.

An incident response plan has to consider the tactics that the attacker may be using during all of these steps and be prepared to respond quickly. For example, effective responses can include:

  • Terminating the user or application session
  • Forcing password resets and multifactor authentication
  • Disabling the account
  • Blocking network connectivity to command-and-control (C&C) servers
  • Blocking script execution

Thwart attackers by removing standing privileges.

However, an effective incident response strategy must focus not only on the software, systems and data involved, but also on the 24x7x365 privileged access that enabled the attackers to move from their initial beachhead to a full-on security breach.

With effective privileged access management (PAM), you can dramatically reduce the risk of adversaries gaining the elevated rights they need to complete their attack. Netwrix Privilege Secure empowers you to replace standing privileged accounts with ephemeral accounts that provide just enough access for the task at hand and that are removed immediately afterward, so adversaries cannot exploit them.

With this solution, you can:

  • Get dynamic and continuous visibility into privileged accounts across all endpoints.
  • Replace risky privileged accounts with just-in-time privileged access — without hurting administrator productivity.
  • Get a single control point for all privileged access, including the ability to require multifactor authentication (MFA).
  • Monitor and record privileged user sessions to enable investigations, satisfy auditors and ensure accountability.
  • Visualize, analyze and manage your attack surface with dashboards tailored to executives and IT pros.
Martin is Vice President of Product Strategy at Netwrix. Martin is an experienced technologist, with over 30 years in the Privileged Access Management and security space. Prior to Netwrix, Martin led the privileged access team at BeyondTrust where he took their password management solution from unknown to a recognized leader in the industry within 3 years. At BeyondTrust he also drove the development of their first SaaS PAM product as well as a new micro service-based platform for DevOps security. Prior to BeyondTrust, Martin held key management positions at Quest/Dell, Novell, Fortefi and Symantec. He is a recognized expert and a regular speaker for security events and webinars.