October 2018 AST 'ASTORS' Finalist Edition Oct 2018 AST Magazine Final (10.16.18) | Page 70

Eliminate Volume 27 irreversible network takeover at- tacks • Irreversible network at tacks are not only hard to identify, they’re also so in- trusive that agencies are forced to rebuild to remove the attacker. • To eliminate such attacks, make sure all privileged access to tier0 and tier1 is isolated and that it requires multi-factor authentication. • Also, ensure there are no hash residuals by design. September 2018 Edition mins group on any IT Windows workstations. Protect third-party application cre- Control and secure infrastructure ac- dentials counts • Default on-premises or cloud infrastructure • By compromising third-party applications, attackers can steal embedded, privileged cre- accounts that are seldom used in day-to-day dentials all while completely circumventing operations can provide attackers with excel- an agency’s defenses. lent access opportunities, so it’s important to get to 100 percent managed accounts by • Vault all privileged accounts used by third determining how many local admins are vaulted on var- ious servers and how your cloud infrastructure accounts are being secured. Limit lateral movement • To prevent attackers from leveraging Pass-the-Hash techniques and stealing cre- dentials by moving laterally across your infrastructure, completely remove all end- point users from the local ad- 68