We can monitor and safeguard what’s visible above ground, but our knowledge is limited. Below the surface lies an unseen world of misconfigurations, forgotten accounts, and vulnerabilities—Identity Threat Exposures (ITEs). Attackers exploit these for credential theft and more, posing significant risks to security. This report delves into these underground threats and their implications.
The prevailing approach among organizations is the adoption of a hybrid identity infrastructure, combining Active Directory (AD) for on-premises resources and a cloud Identity Provider (IdP) for Software as a Service (SaaS) solutions. Typically, AD synchronizes user hashes with the cloud IdP, allowing users to utilize the same credentials for both on-premises and cloud-based applications. However, this practice significantly expands the potential attack surface of the SaaS environment.
Any vulnerability that leads to the exposure of cleartext passwords grants attackers direct access to cloud assets. Therefore, Identity Threat Exposures (ITEs) facilitating access to cleartext passwords pose a grave risk, including weaknesses in password encryption (such as NTLM, NTLMv1, and admins with SPN) or enabling password resets (like shadow admins), which are frequently exploited by adversaries.
Crucial segments of your identity’s vulnerability landscape remain obscured, undefended, and concealed underground. This report marks the initial endeavor to chart the most vital weaknesses in identity security within the hybrid enterprise setup. These Identity Threat Exposures (ITEs), compiled from extensive observations across numerous live production environments, represent the pivotal vulnerabilities exploited by attackers to obtain credentials, elevate privileges, and traverse networks, both on-premises and in the cloud. They persist as formidable challenges to mitigate, arising from misconfigurations, legacy systems, or inherent platform features.
Misconfigurations are an inherent aspect of large-scale production environments, while legacy systems are often indispensable for applications and systems resistant to migration or modernization. Additionally, inherent platform features remain immutable realities. The ITEs delineated herein underpin the marked surge in lateral movement, now an inherent characteristic of nearly every cyberattack.
Despite this, a comprehensive understanding of the resilience of the identity vulnerability landscape has yet to be integrated into the security team’s protocols. It is our aspiration that armed with the insights from this report, security teams can now illuminate critical weaknesses and undertake proactive measures to address them.
What exactly constitutes Identity Threat Exposures (ITEs)?
ITEs represent security vulnerabilities that expose an environment to identity-related threats such as credential theft, privilege escalation, or lateral movement. These vulnerabilities can stem from misconfigurations, malpractices, outdated identity infrastructure, or inherent system features.
In this report, we focus on ITEs that are widespread, impactful, and readily exploitable by attackers. To ensure relevance across organizations, we’ve applied specific inclusion criteria:
Each ITE is detailed with the following attributes:
We categorize ITEs into four distinct groups, depending on the outcomes attackers can accomplish when exploiting them:
These ITEs facilitate adversaries in accessing a user account’s cleartext password.
These ITEs empower adversaries to escalate the access privileges they already hold.
These ITEs enable adversaries to execute undetected lateral movement using compromised accounts.
These ITEs diminish the effectiveness of security controls in monitoring and safeguarding user accounts.
Continue your journey into identity security. Download the full report now for comprehensive insights and actionable strategies to safeguard your organization against identity threats.
COPYRIGHTS DIGITAL MARKETING COMMUNITY 2019