Showing posts with label Internet of Things. Show all posts
Showing posts with label Internet of Things. Show all posts

Friday, August 15, 2025

Privileged Access Management

Privileged Access Management 

Privileged access management (PAM) is defined as the provisioning of tools that help organizations manage and secure accounts that have access to critical data and operations. Any compromise in these ‘privileged’ accounts can lead to financial losses and reputational damage for the organization.

Every organization’s infrastructure is built with multiple levels of deployments, data stores, applications, and third-party services. Some of these components are critical for operations, while some may be as mundane as email.

But each of these is accessed by user accounts, which are of two types:

Human users: They are typically employee accounts, encompassing all departments, including HR, DevOps, and network administrators. 

Automated non-human users: These are third-party applications and services that require an account to integrate with the organization’s systems.

‘Privilege’ is defined as the authority that an account has to modify any part of the company’s technology architecture, starting from individual devices to the office network. This privilege allows the bypassing of security restraints that are normally applied across all accounts.

A standard account is a norm among employees, with the least privileges attached to it. These accounts are used to access and operate limited resources such as internet browsing, emails, and office suites. A privileged account possesses more capabilities than a standard account. This elevated access is gained using privileged credentials.

Despite the numerous headline-making incidents in recent years, cybercrime continues to rise with reported data breaches increasing by 75% over the past two years. For those that suffer a breach, the repercussions can be costly:

increased public scrutiny, costly fines, decreased customer loyalty and reduced revenues. It is no wonder that cybercrime has risen towards the top of the concern list for many organisations and the customers with whom they do business.

You’ve heard many of the stories. Equifax, Uber, Facebook, My Heritage, Under Armor, and Marriott. Personal data from millions of their customers was stolen. Even though the number of breaches went down in the first half of 2018, the number of records stolen increased by 133 percent to almost 4,5 billion records

worldwide. Unfortunately things are only likely to get worse. According to a 2018 study from Juniper Research, an estimated 33 billion records will be stolen in 2023 – this represents a 275 percent increase from the 12 billion records

that are estimated to have been stolen in 2018.

Are you ready for more bad news? Thanks to the demands of the application economy, the threat landscape has expanded and protecting against these threats has only gotten more challenging.

Victims of the future

Digital transformation is a necessity for organisations to not only survive, but thrive in the application economy. But these transformations are creating an expanding set of new attack surfaces that must be defended, in addition to the

existing infrastructure that you’ve been protecting for years. These new points of vulnerability include:

DevOps adoption: In more sophisticated IT shops, continuous delivery/ continuous testing practices have introduced automated processes that see no human intervention at all. In many cases, these scripts or tools are often using hard-coded administrative credentials that are ripe for theft and misuse.

Hybrid environments: As your IT environment has evolved to include

software-defined data centres and networks, and expanded outside of your four walls to incorporate public cloud resources and software-as-a-service (SaaS) applications, the traditional way of approaching administration and management quickly falls apart – mainly because it fails to protect new attack surfaces like management consoles and APIs.

Internet of Things: Smart devices are proliferating in our lives, from phones to watches, from refrigerators and cars to medical implants and industrial machinery. And because these devices have connectivity, not only can they be hacked, but they are already being compromised where security is inadequate or non-existent.

Third-party access: Outsourcing development or IT operations has become the

norm. In addition, many companies are sharing information with partners. However, many of these third-party employees are being granted ‘concentrated power’ via administrative access. Who is watching how they are using or potentially misusing that access?

Take hold of the flame

Stealing and exploiting privileged accounts is a critical success factor for types of attacks. This is not surprising when one considers that privileged identities have access to the most sensitive resources and data in your environment; they literally hold the keys to the kingdom.

Thankfully, there is a positive angle you can take on this fact. If privileged accounts are the common thread amongst the innumerable attack types and vulnerability points, then these accounts – and the credentials associated with them – are exactly where you should focus your protection efforts.

For many, focusing on ‘privileged users’ is difficult because its population can be so diverse. Privileged accounts and access are not just granted to employees with direct, hands-on responsibility for system administration, but also to contractors and business partners. You may even have privileged unknowns who are securing ‘shadow IT’ resources without your knowledge. And finally, in many cases, privileged accounts aren’t even people – they may be applications or configuration files empowered by hard-coded administrative credentials.

This begs the question, if you can’t even get a clear tally of who represents your privileged user population, how can you hope to protect these accounts?

By securing those accounts at each stop along the breach kill chain.

Breaking the chains

What is a kill chain? It’s the series of steps an attacker typically follows when carrying out a breach. While the chain can comprise numerous steps, there are four key ones in which privileged credentials represent the cornerstone of an attack. These include:

1. Gain access and expand: To access the network, insiders might exploit the credentials they already have, while outsiders will exploit a vulnerability in the system to steal the necessary credentials.

2. Elevate privileges: Once inside, attackers will often try to elevate their privileges, so they can issue commands and gain access to whatever resources they’re after.

3. Investigate and move laterally: Attackers rarely land in the exact spot where the data they’re seeking is located, so they’ll investigate and move around in the network to get closer to their ultimate goal.

4. Wreak havoc: Once they have the credentials they need and have found exactly what they’re looking for, the attackers are free to wreak havoc (e.g. theft, business disruption, etc.).

If you can prevent an unauthorised user – insider or outsider – from gaining access to the system in the first place, you can stop an attack before it even starts.

To prevent unauthorised access, you must:

• Store all privileged credentials in an encrypted vault and rotate these credentials on a periodic basis.

• Authenticate all users, applications, and services before granting access to any

privileged credential.

• Employ automatic login and single sign-on so users never know the privileged credential.

Limiting privilege escalation

In many networks, it’s common for users to have access to more resources than they actually need – which means attackers can cause maximum damage quickly and even benign users can cause problems inadvertently. This is why granular access controls are so important.

To limit privilege escalation, you must:

• Adopt a ‘zero trust’ policy that only grants access to the systems people need for work.

• Implement filters and white/black lists to enable fine-grained access controls.

• Proactively shut down attempts to move laterally between unauthorised systems.

Monitoring privileged activity

Whether it’s a trusted insider who wandered into the wrong area or an attacker with malicious intent, there’s a very good chance that at some point users will gain access they shouldn’t have.

The challenge, then, is to improve visibility and forensics around user activity within sensitive systems. To deter violations at this late stage of the kill chain, you must:

• Ensure that all privileged access and activity is attributed to a specific user.

• Monitor all privileged activity to proactively detect unusual behaviour and trigger automatic mitigations.

• Record all user sessions so that all privileged activities can be played back in DVR-like fashion.

• Review and certify privileged access on a periodic basis to ensure that it is still required.


Thursday, December 15, 2022

Internet of Things and the Cloud Ecosystem

Internet of Things and the Cloud Ecosystem

Internet of Things or IoT refers to an ecosystem of devices/things that are connected to each other over a network enabling communication among them. These connected devices are equipped with UIDs (Unique Identifiers). Once a device or gadget is represented digitally, it can be controlled or managed from anywhere. This helps to capture and transfer data from different places with minimal human intervention, increasing efficiency and improving decision making.

Broadly, Internet of Things can be classified into Consumer IoT (CIOT)) and Industrial or Enterprise IoT (IIoT). The key difference between CIoT and IIoT mainly lies in the type of devices, application and the technologies that power them.

Consumer IoT

Home Security and Smart Homes is one of the major areas where Consumer IoT is becoming very important.  Monitoring intrusions, authorizing entries, controlling appliances remotely, all these are examples of Consumer IoT applications.  Personal Healthcare is another area, which has benefitted extensively from Consumer Internet of Things. Personal wearable healthcare devices like fitness bands, track and monitor performance over time, providing information on progress and improvement. Blood pressure and heart rate bands powered by IoT can connect us directly to the healthcare system and provide timely assistance and alerts when needed. Other areas in the healthcare industry wherein IoT can play a crucial role include patient surveillance, care of the elderly and the disabled.

Industrial IoT

Enterprise and Industrial IoT applications can automate business processes that depend on contextual information provided by embedded devices such as machines, vehicles and other equipment. In recent years, Internet of Things has been gaining wide applicability, notably in Industrial and Enterprise environment as it provides a convenient mechanism to connect devices, people and processes. Organizations are looking at upgrading their existing resources to bring all their legacy systems under the IoT ecosystem. The key here is to ensure seamless interoperability, connectivity, scalability, and stability among various components in the ecosystem.  Some of the areas where organizations can bring in easy, yet beneficial changes with IoT are,

o   Asset tracking

o   Resource Management

o   Inventory management

o   Job/Task distribution

Cloud Ecosystem

The cloud ecosystem offers a platform to connect, collaborate and innovate. While IoT generates data from various physical systems in the ecosystem, cloud enables a seamless data flow and quick communication among these devices. It’s a complex system of connected devices that work together to create an efficient platform. The resources that can be delivered through cloud ecosystem include computing power, computing infrastructure (servers and storage), applications, business processes and more. Cloud infrastructure has the following characteristics, which differentiate it from similar distributed computing technologies:

o   Scalability

o   Automatic provisioning and de-provisioning of resources

o   Cloud services accessible through APIs

o   Billing and metering in a pay-per-use model

o   Performance monitoring and measuring

o   Security to safeguard critical data

How do IoT and the Cloud go hand in hand?

Internet of Things and cloud computing are complementary in nature. IoT benefits from the scalability, performance and pay-per-use model of cloud infrastructure. The cloud reduces the computational power needed by organizations and makes data processing less energy-intensive. These facilitate business analytics and collaborative capabilities which help organizations in rapid development of new products and services. The benefits of combining IoT and the cloud are:

o   Quicker deployment of data and thus, quicker decision making

o   Easy navigation through data

o   Flexible payment options

o   Decreased costs on hardware and software

o   High degree of scalability

Conclusion

According to SoftBank, by 2025 about 1.0 trillion devices are expected to be connected over Internet of Things. The rapid development in the field of IoT technology and the fast-paced business environment has made IoT an inevitable choice for organizations. IoT is bridging the gap between physical systems and digital world, hence increasing productivity in both consumer and industrial environment.

IoT service providers assist organizations to transform their infrastructure by providing IoT sensor nodes and IoT Gateway Devices, integrating the communication Frameworks and protocols and providing the Applications [Web/Cloud Applications and Client Applications], to bridge the legacy systems to the IoT infrastructure. IoT Service Providers identify congestions in the enterprise functioning and help the organization to achieve increased efficiency by enabling systematic and intelligent tracking, monitoring, communication and decision-making system. Mistral, as a technology service provider can help you realize your IoT strategy by providing IoT Device Designs and IoT Gateway Designs based on powerful processors from Intel, Texas Instruments, Qualcomm, NXP/Freescale and open source platforms. We can help you through IoT Protocol Development, Web/Cloud/PC Applications integrating with the legacy system to provide a seamless IoT enabled solution for enterprise and industrial automation.

Ref: