LATEST INTELLIGENCE
Defending Against Identity-Based Attacks
PRESENTED BY
Granting the right user secure access to an enterprise asset goes beyond assigning the correct privileges or authenticating identities. As threat actors pivot to identify-focused attacks, they are targeting services like Active Directory, which organizations overwhelmingly utilize to manage account access. With almost 95 % of Fortune 1000 companies globally use Active Directory, it has become the most widespread directory service in use today. Because of its ubiquity modern attackers use AD attacks more than any other tactic to steal credentials, escalate privileges, and find targets. In fact the most recent Verizon DBIR study found that over 80 % of breaches were attributed to stolen credentials. When attackers steal and misuse credentials, they can masquerade as legitimate users, access sensitive information, and make it difficult for enterprise security professionals to discern legitimate activity from malicious activity. These scenarios can lead to attackers gaining greater access and causing more damage to an enterprise’ s cyber estate.
While organizations have deployed Multi-Factor Authentication( MFA) and Privileged Acess Management( PAM) solutions to mitigate the risk of credential-based attacks, they still leave visibility gaps and challenges that attackers can exploit. Alone, they are not enough to fully secure identities
and the infrastructure that supports them.
Circumventing MFA and PAM
Although the principles of MFA( prevent unauthorized access by adding another layer of verification to an asset) and PAM( properly secure and control access to privileged accounts) allow enterprises to reduce their cyber risk, advanced attackers have methods that can bypass their protections. �
22 INTELLIGENT GOV. TECH www. intelligentgov. tech.