Cyberattacks are on the rise, and a breach causes significant damage to an enterprise. Active Directory is a prime target for hackers, so how can enterprises protect AD against a breach? Learn more at skyportsystems.net.
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
The Cyber Attack Risk
1. skyportsystems.com
$158Average cost per compromised
record containing sensitive and
confidential information
2
$4 MillionAverage cost of a data breach
3
$400 BillionThe estimated cost of cybercrime
to businesses each year
4
The cybersecurity market
topped $75 billion in
2015 and is anticipated
to hit $101 billion in
2018
5
, despite the
increased focus in
security and counter
measures by enterprises.
Penetration Testers Breach
Active Directory Nearly
100% of the Time*
How Do You Mitigate Your
Active Directory Risk?
Your Active Directory
Controls Everything
The likelihood Active Directory
(AD) will be attacked is HIGH.
How do you determine where
you are most vulnerable?
95%
AD is a very high value target.
Basic risk calculation -
Risk = Likelihood x Impact –
will reveal that AD poses one
of the biggest risks to your
organization.
The tools used by penetration
testers are widely available on
places like GitHub and are also
being weaponized to automate
active directory attacks.
*Source: https://esj.com/articles/2010/06/15/active-directory-in-the-
enterprise.aspx
*Source: http://www.itworldcanada.com/article/it-not-doing-enough-
to-secure-active-directory-says-expert/380201
1. Implement best practices to reduce the attack surface of the AD9
.
2. Secure the admin environment to prevent compromise and misuse.
3. Protect the AD to prevent malware exploitation.
4. Create an admin forest enclave to isolate the domain environment and
contain attacks.
Likelihood
Impact
When Assessing Your Risk
Active Directory is the Key
AD
Basic risk calculation:
Risk = Likelihood x Impact
Lost or stolen
passwords are being
used all the time to
perpetrate attacks
63% of all the
confirmed
data breaches last year
leveraged compromised
credentials
6
.
Active Directory
Apps, Services,
Data
Acquired Entities
Partners, Contractors,
Third Parties
Users
VM
IT Systems
Computers
Single Sign-On
Enterprise Apps
Virtualization
Network
and Infrastructure
Enterprise
Active Directory
RADIUS/TACACS+
When an attacker unlocks
your AD and gets system-level
administrator access, they can
get anything they want . . .
Once in, attackers
often go undetected
for a long time
7
,
spreading throughout
your organization
75%
of attacks spread
from Victim O to
Victim 1 within
24 hours
8
making it
tough to contain
of Fortune 1000
companies use Microsoft
Active Directory*
Let us help you assess your risk now:
Sign up for a free Active Directory assessment
Do you want to investigate
further? Get the ebook:
Securing Your Biggest IT Risk:
Microsoft Active Directory
For 27 economies around the world,
cyber attacks rank among the
Top 5Biggest Threats1
.
The Cyber Attack Risk
1
https://www.weforum.org/reports/the-global-risks-report-2016/
2
https://securityintelligence.com/media/2016-cost-data-breach-study/
3
http://www.cyberinsurance.co.uk/cybernews/lloyds-ceo-cyber-crime-cost-
businesses-up-to-400-billion-a-year/;https://www.weforum.org/agenda/2016/06/
cybercrime-how-protected-are-you-at-work/
4
https://securityintelligence.com/media/2016-cost-data-breach-study/
5
http://www.gartner.com/newsroom/id/3135617
6
http://www.slideshare.net/VerizonEnterpriseSolutions/evolution-of-the-verizon-
data-breach-investigations-report-20082016
7
https://www.weforum.org/agenda/2016/06/cybercrime-how-protected-are-you-
at-work/
8
http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/
9
https://technet.microsoft.com/en-us/windows-server-docs/identity/ad-ds/plan/
security-best-practices/reducing-the-active-directory-attack-surface;
https://technet.microsoft.com/en-us/library/mt631194.aspx
https://technet.microsoft.com/en-US/library/mt631193.aspx#ESAE_BM
https://technet.microsoft.com/en-us/library/dn487446.aspx
Click Here to Download the ebook