This document discusses multifactor authentication for critical business users. It begins by providing context that organizations are multifactoring access but breaches are still occurring. It then outlines how a privileged session manager and multifactor authentication can be used to securely manage privileged accounts and shared credentials. The presentation concludes by discussing how to apply these techniques to business units and maintain credential hygiene.
2. CONFIDENTIAL INFORMATION
Phil Li – National Customer Success Manager
5 years w/ CYBR – 200+ enterprise customers
Andy Thompson – National Customer Success
Manager
SPEAKERS
2
4. CONFIDENTIAL INFORMATION
SECURE SAAS ADMINS AND PRIVILEGED BUSINESS USERS
Systematically Address
Organization’s Top
Control Goals Manage *NIX SSH Keys
Control and Secure
Infrastructure Accounts
Eliminate Irreversible
Network Takeover Attacks
Limit Lateral Movement
Protect Credentials for
Third-Party Applications
Defend DevOps Secrets in the
Cloud and On-Premises
Secure SaaS Admins and
Privileged Business Users
12. CONFIDENTIAL INFORMATION
WHAT YOU NEED TO KNOW ABOUT
ATTACKERS
15
Source: MITRE’s Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™)
https://attack.mitre.org/wiki/Main_Page
20. CONFIDENTIAL INFORMATION 24
APPLY MFA VIA PRIVILEGED SESSION MANAGER
John
Sarah
Dave
Tom
Generic User
P@5w0rd
Vault
PSM
PVWA
BLOCK MALWARE FROM GETTING IN
BLOCK CREDENTIALS FROM GETTING OUT
23. CONFIDENTIAL INFORMATION
Sprint
Interview Business Users (in order)
Finance
Social Media
Cloud Consoles
HR
rename for success
Multi Factor enable Business apps
through PSM using the Marketplace
Marathon
Apply MFA to additional business units
Rotate Credentials
Create Programmatic system to onboard
HYGIENE FOR BUSINESS USERS
27
27. CONFIDENTIAL INFORMATION
IAM PROGRAM OVERVIEW – PLAN, BUILD, RUN
PLAN BUILD RUN
Implementation Phases (Multiple Iterations)
• Architecture and Design
• Product Installation and Configuration
• Implementation and Engineering
• Customization
Post Go-Live
Support
• Rollout Planning
• Staffing
Strategy
• Understand pain
• Gain consensus
• Prioritize
• Maturity
• Create
actionable
roadmap
The Details
• Detailed
Requirements
• Use Cases
• Detailed
Implementation
Roadmap
Start thinking
about product(s)
to solve problems
Acquire
product(s)