October 2018 AST 'ASTORS' Finalist Edition Oct 2018 AST Magazine Final (10.16.18) | Page 70
Eliminate
Volume 27 irreversible
network takeover at-
tacks
• Irreversible network at
tacks are not only hard to
identify, they’re also so in-
trusive that agencies are
forced to rebuild to remove
the attacker.
• To eliminate such attacks,
make sure all privileged
access to tier0 and tier1 is
isolated and that it requires
multi-factor authentication.
• Also, ensure there are no
hash residuals by design.
September 2018 Edition
mins group on any IT Windows workstations.
Protect third-party application cre-
Control and secure infrastructure ac- dentials
counts
• Default on-premises or cloud infrastructure • By compromising third-party applications,
attackers can steal embedded, privileged cre-
accounts that are seldom used in day-to-day
dentials all while completely circumventing
operations can provide attackers with excel-
an agency’s defenses.
lent access opportunities, so it’s important
to get to 100 percent managed accounts by • Vault all privileged accounts used by third
determining how many local
admins are vaulted on var-
ious servers and how your
cloud infrastructure accounts
are being secured.
Limit lateral movement
• To prevent attackers from
leveraging
Pass-the-Hash
techniques and stealing cre-
dentials by moving laterally
across your infrastructure,
completely remove all end-
point users from the local ad-
68