CONFIDENTIAL INFORMATION
MULTIFACTOR ENABLEMENT FOR
CRITICAL BUSINESS USERS
1
CONFIDENTIAL INFORMATION
Phil Li – National Customer Success Manager
5 years w/ CYBR – 200+ enterprise customers
Andy Thompson – National Customer Success
Manager
SPEAKERS
2
CONFIDENTIAL INFORMATION
Organizations are multi factoring everything…
Breaches are still happening!!! Why?!?
CONTEXT
5
CONFIDENTIAL INFORMATION
SECURE SAAS ADMINS AND PRIVILEGED BUSINESS USERS
Systematically Address
Organization’s Top
Control Goals Manage *NIX SSH Keys
Control and Secure
Infrastructure Accounts
Eliminate Irreversible
Network Takeover Attacks
Limit Lateral Movement
Protect Credentials for
Third-Party Applications
Defend DevOps Secrets in the
Cloud and On-Premises
Secure SaaS Admins and
Privileged Business Users
CONFIDENTIAL INFORMATION 7
SHARED IDS FOR BUSINESS USERS
John
Sarah
Dave
Tom
Generic User
P@5w0rd
CONFIDENTIAL INFORMATION
User
Accounts
LOB
Accounts
CXOs
Social Media
Service/
App Accounts
Root
Accounts
Domain
Admin
Accounts
Database
Accounts
Local Admin
Accounts
Database
Admin
IT Help
Desk
Unix Admin.App
Admin
System
Admin
Service
Admin
3XMORE
Privileged accounts than employees
THE EXPANDING ATTACK SURFACE
CONFIDENTIAL INFORMATION
SIMPLIFIED WORKFLOW
10
CONFIDENTIAL INFORMATION
MAINTAIN SECURITY
11
CONFIDENTIAL INFORMATION
V10 – ENHANCED AND SIMPLIFIED UI
12
CONFIDENTIAL INFORMATION
V10 – ENHANCED AND SIMPLIFIED UI
13
CONFIDENTIAL INFORMATION
BUSINESS ACCOUNTS
14
CONFIDENTIAL INFORMATION
WHAT YOU NEED TO KNOW ABOUT
ATTACKERS
15
Source: MITRE’s Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™)
https://attack.mitre.org/wiki/Main_Page
CONFIDENTIAL INFORMATION
STARTS WITH INFECTION
17
CONFIDENTIAL INFORMATION
STARTS WITH INFECTION
18
CONFIDENTIAL INFORMATION
SOCIAL ENGINEERING TOOLKIT – CREDENTIAL HARVESTER
19
CONFIDENTIAL INFORMATION
CREDENTIAL HARVESTER
20
CONFIDENTIAL INFORMATION
CREDENTIAL DUMPING (AS SEEN WITH EPM)
21
CONFIDENTIAL INFORMATION
ATTACKER’S TECHNIQUES – CREDENTIAL STUFFING
22
CONFIDENTIAL INFORMATION
BEST PRACTICES FOR DEFENSE
23
CONFIDENTIAL INFORMATION 24
APPLY MFA VIA PRIVILEGED SESSION MANAGER
John
Sarah
Dave
Tom
Generic User
P@5w0rd
Vault
PSM
PVWA
BLOCK MALWARE FROM GETTING IN
BLOCK CREDENTIALS FROM GETTING OUT
CONFIDENTIAL INFORMATION
CREDENTIAL PROTECTION AND MANAGEMENT
25
BUSINESS
RESOURCES
CYBERARK WEB PORTAL
PASSWORD
ROTATION
SECURE
STORAGE
CONFIDENTIAL INFORMATION
CYBERARK MARKETPLACE
26
CONFIDENTIAL INFORMATION
Sprint
 Interview Business Users (in order)
 Finance
 Social Media
 Cloud Consoles
 HR
rename for success
 Multi Factor enable Business apps
through PSM using the Marketplace
Marathon
 Apply MFA to additional business units
 Rotate Credentials
 Create Programmatic system to onboard
HYGIENE FOR BUSINESS USERS
27
CONFIDENTIAL INFORMATION
QUESTIONS?
28
Proprietary and Confidential. Do Not Distribute. © 2018 Optiv Inc. All Rights Reserved.
CYBERARK IN
PRACTICE FROM THE EXPERTISE OF OPTIV
CONFIDENTIAL INFORMATION
Proprietary and Confidential. Do Not Distribute. © 2018 Optiv Inc. All Rights Reserved.
CONFIDENTIAL INFORMATION
IAM PROGRAM OVERVIEW – PLAN, BUILD, RUN
PLAN BUILD RUN
Implementation Phases (Multiple Iterations)
• Architecture and Design
• Product Installation and Configuration
• Implementation and Engineering
• Customization
Post Go-Live
Support
• Rollout Planning
• Staffing
Strategy
• Understand pain
• Gain consensus
• Prioritize
• Maturity
• Create
actionable
roadmap
The Details
• Detailed
Requirements
• Use Cases
• Detailed
Implementation
Roadmap
Start thinking
about product(s)
to solve problems
Acquire
product(s)
CONFIDENTIAL INFORMATION
FOCUS ON
IDENTITY-
DEFINED
SOLUTIONS
IAM
FOCUS ON
IDENTITY-
DEFINED
SOLUTIONS
SIEM
IAM
CONFIDENTIAL INFORMATION
Proprietary and Confidential. Do Not Distribute. © 2018 Optiv Inc. All Rights Reserved.
Leverage single sign-on and
MFA
Implement an access
governance program to review
access & accounts
PAM with
MFA and IGA
Technologies

CyberArk Cleveland Defend Multi-Factor