Microsoft Cybersecurity Reference Architectures (MCRA) : Capabilities Zero Trust User Access People
Microsoft Cybersecurity Reference Architectures (MCRA) : Capabilities Zero Trust User Access People
Build Slide
Zero Trust Overview Zero Trust Rapid Modernization Plan The Open Group Perspective
What is Zero Trust and why is it needed? What to do first for Zero Trust? How has The Jericho Forum™ evolved?
Security
Security
Operations
Operations
Key
Key
Initiatives
Initiatives
Securing Privileged Access Human Operated Ransomware Beyond VPN for User Access
How to mitigate common and How to mitigate business-impacting How to rapidly improve security and user
high-impact attack techniques? extortion attacks? experience for remote access?
Security Guidance May 2021 - https://aka.ms/MCRA
CEO
CEO
Securing Digital
Transformation
Endpoints & Devices Hybrid Infrastructure – IaaS, PaaS, On-Premises Information Protection Azure Active Directory
Classification Labels
Intune Configuration Manager On Premises Datacenter(s) 3rd party IaaS & PaaS Microsoft Azure Protection (MIP) Authenticator App
Discover
FIDO2 Keys
Azure Marketplace
Azure Firewall Monitor Classify
NGFW Identity Protection
Extranet
Protect
& Firewall Manager
Leaked cred protection
Edge DLP
Azure WAF File Scanner
Behavioral Analytics
(on-premises and cloud)
IPS/IDS
DDoS Protection
Microsoft Defender for Endpoint Azure ADProxy
App Proxy Azure AD PIM
Unified Endpoint Security Beyond User VPN Express Route Azure Key Vault S3
Identity Governance
Endpoint Detection & Response (EDR)
Private Link Azure Bastion Data Governance Azure AD B2B & B2C
Intranet
Securing Privileged Access – Secure Accounts, Devices, Intermediaries, and interfaces to enable and protect privileged users Privileged Access Workstations (PAWs) - Secure workstations for administrators, developers, and other sensitive users
Microsoft Compliance Score – Prioritize, measure, and plan improvement actions against controls
Microsoft Secure Score – Measure your security posture, and plan/prioritize rapid improvement with included guidance
Windows 10 Security IoT and Operational Technology (OT) Azure Defender – Cross-Platform, Cross-Cloud XDR
People Security
Network protection App control
Credential protection Exploit protection
Multi-asset detection and response for infrastructure and platform
Azure Defender for IoT as a service (IaaS & PaaS), Proactive Threat defenses Attack Simulator Insider Risk Management Communication Compliance
Full Disk Encryption Behavior monitoring
Attack surface Next-generation • ICS, SCADA, OT • Asset &
reduction protection • Internet of Things (IoT) Vulnerability
management
Azure Sphere • Industrial IoT (IIoT)
• Threat Detection
& Response
GitHub Advanced Security – Secure development and software supply chain
Threat Intelligence – 8+ Trillion signals per day of security context Service Trust Portal – How Microsoft secures cloud services Security Development Lifecycle (SDL)
Cross-cloud and cross-platform
Comprehensive Security, Compliance and Identity capabilities that integrate with your existing solutions May 2021 – https://aka.ms/MCRA
Industry Partnerships
NIST / CIS / The Open Group / Others Microsoft Intelligent Security Association Solution Integration and MDR/MSSP Partners CERTs / ISACs / Others Law Enforcement
S3
Endpoints & Devices Software as a Service (SaaS) Hybrid Infrastructure – IaaS, PaaS, On-Premises IoT Devices
S3 Information Protection
Identity & Access
GitHub Advanced Security – Secure development capabilities Securing components common most enterprise software supply chains
Endpoints & Devices Software as a Service (SaaS) Hybrid Infrastructure – IaaS, PaaS, On-Premises IoT Devices
Azure Sentinel – Cloud Native SIEM, SOAR, and UEBA for IT, OT, and IoT
Microsoft 365 Defender Extended Detection and Response (XDR) Azure Defender
Threat visibility and capabilities tailored to resources XDR for IaaS, PaaS, and On-Premises Azure Defender for IoT
Microsoft Defender for Endpoint
Microsoft Cloud App Security • Threat & Vulnerability Management • Advanced Detection & Remediation • VMs, Servers, App Environments • ICS, SCADA, OT • Asset &
Unified Endpoint Security Automated Investigation & Remediation Storage and Databases Internet of Things (IoT) Vulnerability management
• Integrated data classification • • •
• App Discovery & Risk Scoring (Shadow IT) Threat analytics on top attacks • Advanced Threat Hunting • Containers and Orchestration • Industrial IoT (IIoT) • Threat Detection & Response
• Endpoint Detection & Response (EDR) •
• Threat Detection & Response • and more
• Data Loss Protection (DLP) • Policy Audit & Enforcement
• Web Content Filtering • Session monitoring & control
• Threat & Vuln Management • Info Protection & Data Loss Prevention (DLP)
Azure Arc Threat Intelligence – 8+ Trillion
signals per day of security context
Key cross-platform and multi-cloud guidance
Microsoft Defender for Endpoint for Linux
Azure Arc
Security posture
& compliance
Secure score Asset management Policy
Server protection
(Azure Defender for VMs)
Threat detection VA (power by Qualys) Application control
Automation &
management at scale
Automation SIEM integration Export
Defend across attack chains
Insider and external threats May 2021 – https://aka.ms/MCRA
Browse
a website
Azure Defender Attacker attempts
lateral movement
Privileged account
compromised
Disgruntled or disenchanted
Potential
Subject to stressors Insider has access Anomalous
sabotage
to sensitive data activity detected
Operational Technology (OT) Security Reference Architecture May 2021 – https://aka.ms/MCRA
Azure Analytics
Cloud • Native plug-in for Azure Defender for IoT
Blended cybersecurity attacks are 3rd party 3rd party
driving convergence of IT, OT, and IoT Analytics IoT Hub, PowerBI, Azure Edge,
Digital Twins, and more
Environments Analytics Azure Sentinel
• Native OT investigation & remediation playbooks
• Correlation with other data sources and
Strategic Threat intelligence (attack groups & context)
security architectures and capabilities
IIoT
IIoT//OT
OTDigital
DigitalTransformation
Transformationdrivers
drivers Operational Technology Information Technology
• • Business
BusinessEfficiency
Efficiency--Data
Datato
toenable
enablebusiness
business agility
• • Governance
Governance&&Regulatory
RegulatoryCompliance
Compliancewith
agility
withsafety
safetyandandother
other
(OT) Environments (IT) Environments
standards TLS
TLSwith
withmutual
mutual
standards Safety/Integrity/Availability Confidentiality/Integrity/Availability authentication
• • Emerging
EmergingSecurity
SecurityStandards
Standardslike
likeCMMC
CMMC • Hardware Age: 50-100 years (mechanical + electronic overlay) • Hardware Age: 5-10 years authentication
• Warranty length: up to 30-50 years • Warranty length 3-5 years
• Protocols: Industry Specific (often bridged to IP networks) • Protocols: Native IP, HTTP(S), Others
• Security Hygiene: Isolation, threat monitoring, managing vendor • Security Hygiene: Multi-factor authentication (MFA), patching, threat monitoring, antimalware
Purdue Model access risk, (patching rarely)
Zero Trust Principles - Assume breach, verify explicitly, Use least privilege access (identity and network)
Why are we having a Zero Trust conversation?
Keep Assets away from Attackers
1. IT Security is Complex
• Many Devices, Users, & Connections
Increases
Increases security
security
Increases
Increases productivity
productivity
Microsoft Zero Trust Principles
Guidance for technical architecture
Network
User Access
and Productivity Identity
Network
Operational Technology
(OT) and Industrial IoT Identity
Network
Datacenter
Security Identity
1. Explicitly validate trust for all access requests (via Azure AD Conditional Access)
a. User Accounts - Require Passwordless or MFA for all users + measure risk with threat intelligence & behavior analytics
b. Devices - Require device integrity for access (configuration compliance first, then XDR signals)
User Access 2. Increase security for accessing key resources
and Productivity a. Apps – Enable Azure AD for all SaaS, for VPN authentication, and publish legacy on-premises/IaaS via App Proxy
b. Data - Discover and protect sensitive data (via Cloud App Security, CA App Control, Microsoft Info Protection)
3. Governance to continuously monitor security posture and reduce risk (via Secure Score)
4. Streamline response to common attacks with XDR for Endpoint/Email/Identity + Cloud (via M365 & Azure Defender)
Modernize
5. Unify Visibility with modern Security Information and Event Management (SIEM via Azure Sentinel)
Security Operations
6. Reduce manual effort - using automated investigation/remediation, enforcing alert quality, & proactive threat hunting
Security Hygiene – Rigorously monitor + remediate security configurations, security updates, MFA, and more
ZT
ZTbuilds
buildsonon
Datacenter & Reduce Legacy Risk – Retire or isolate legacy technology (Unsupported OS/Applications, legacy protocols) classic
classicsecurity
security
DevOps Security DevOps Integration – Integrate infrastructure + development security practices into DevOps with minimal friction Align
Alignto
tocloud
cloud
migration
migrationschedule
schedule
Microsegmentation – Additional identity and network restrictions (dynamic trust-based and/or static rules)
Protect assets anywhere with Zero Trust
Verify explicitly | Use least-privileged access | Assume breach
User
Groups/Role
Microsoft Microsoft Cloud
Location Azure AD
Privileges
Session risk Microsoft
User Risk 365 Defender Microsoft
Information
Protection Cloud SaaS
Security & apps
Compliance
Device Policy Engine
Microsoft
Managed or BYOD Defender for
Endpoint Microsoft
Health & compliance Cloud App
Device risk Microsoft Security
Endpoint
Type and OS version Manager
Encryption status On-premises
& web apps
Remediate
Remediate Leaked
Leaked Credential
Credential
Device risk
(Requires
(Requires MFA)
MFA) Microsoft
MicrosoftInformation
Information
Microsoft Defender Protection Documents
Documents
3rdrdparty VPN Protection(MIP)
(MIP)
for Endpoint Device Threat/ 3 party VPN
Risk Signals and Remote
and Remote
Azure AD Self Access Devices
Access Devices
Service Password
Microsoft
MicrosoftIntune
Intune
Reset (SSPR) Mobile
Mobile Apps
Apps
(MAM
(MAMfunctionality)
functionality)
Active IsManaged
Directory Approved
ApprovedApps
Apps
Zero
Zero Trust
Trust Resources
Resources
aka.ms/zerotrust
aka.ms/zerotrust
Maturity
Maturity Model
Model Business
Business Plan
Plan Deployment
Deployment Guidance
Guidance
aka.ms/zerotrust
aka.ms/zerotrust aka.ms/ZTbizplan
aka.ms/ZTbizplan aka.ms/ztguide
aka.ms/ztguide
1. VPN
VPN typically
typically allows
allows access
access to
to
1. Configure
Configure Azure
Azure AD
AD for
for VPN
VPN authentication
authentication
all
all ports
ports on
on the
the entire
entire network
network
Explicit
Explicit User
User and
and Device
Device
Trust Validation
Trust Validation
Provides
Provides full
full network
network access
access
(sometimes
(sometimes segmented)
segmented)
Application
Azure AD
App Proxy
2.
2. Publish
Publish Apps
Apps with
with Azure
Azure AD
AD App
App Proxy
Proxy
Explicit
Explicit User
User and
and Device
Device
Trust
Trust Validation
Validation
Provides
Provides access
access to
to only
only aa single
single app
app
(with seamless user experience) SES
SESSSION
ION SECURI
SECURITTYY AP
APPP CO
COVVERAGE
ERAGE
(with seamless user experience)
Secure assets where they are with Zero Trust
Simplify security and make it more effective
Classic
Classic Approach
Approach Zero
Zero Trust
Trust
Restrict
Restrict everything
everything to
to aa ‘secure’
‘secure’ network
network Protect
Protect assets
assets anywhere
anywhere with
with central
central policy
policy
The digitized world is interconnected and dynamic
Modern
Modern Work
Work Use
Use Cases
Cases
•• Normalization
Normalizationofofremote
remotework
work
•• Rapidly
Rapidlyevolving
evolvingpartnerships
partnershipsand
andcompetitors
competitors
•• Rapidly
Rapidlychanging
changingcommunication
communicationpatterns
patterns
•• Evolving
Evolvingnational
nationalinterests
interestsand
andregulations
regulations
</>
</>
</> Security
Security Modernization
Modernization Imperatives
Imperatives
</>
•• Automated
AutomatedPolicy
PolicyEnforcement
Enforcement --to toaddress
address
changing
changingprocesses
processesandandmodels
modelsininananagile
agilemanner
manner
Customer
Vendor/
at minimum cost
at minimum cost
Unverified Supplier
Trading Partner •• Adaptive
Adaptiveidentity
identitymanagement
management --to torespond
respondtoto
</> rapidly changing roles, responsibilities and
rapidly changing roles, responsibilities and
Contracted/ </>
</>
</> Temporary relationships
relationships
Influencer Full Time Staff
employee •• Data-centric
Data-centricand
andasset-centric
asset-centricapproaches
approaches–– to to
Trusted & </></>
</> </>
APIs
Verified
APIs
oo Better
Betterfocus
focussecurity
securityresources
resourcesby bylimiting
limitingthe
the
Trading Partner
scope
scopeof
ofwhat
whattotoprotect
protect(via
(viatrusted
trustedzones,
zones,
IT/Business tokenization, or similar approaches)
Outsourcer tokenization, or similar approaches)
oo Better
Bettermonitor
monitorassets
assetsandandrespond
respondto tothreats
threats
</>
</> regardless
regardlessof
ofnetwork
networklocation.
location.
Applications
Zero Trust Components
Enable flexible business workflows for the digitized world
</>
</> APIs
Apps & Systems
Threat
Intelligence Secured Zones
Modern Security
Operations
Technology
5.
5. Risk
Risk &
& Complexity
Complexity Reduction
Reduction
8.
8. Asset-centric
Asset-centric security
security 9.
9. Least
Least privilege
privilege
Security Controls 6.
6. Alignment
Alignment &
& Automation
Automation
10.
10. Simple
Simple and
and Pervasive
Pervasive
7.
7. Security
Security for
for the
the Full
Full Lifecycle
Lifecycle
11.
11. Explicit
Explicit trust
trust validation
validation
Zero Trust
Core Principles
2. Goal Alignment – Security must align with and enable organization goals within the risk 2. Security mechanisms must be pervasive, simple, scalable,
tolerance and threshold. and easy to manage.
3. Risk Alignment – Security risk must be managed and measured using a consistent risk
framework and considering organizational risk tolerance and thresholds. 3. Assume context at your peril.
Least Privilege – Access to systems and data must be granted only as required and removed when no 10. Data privacy (and security of any asset of sufficiently high
longer required. value) requires a segregation of duties/privileges.
10. Simple and Pervasive Security – Security mechanisms must be simple, scalable, and easy to implement and 11. By default, data must be appropriately secured when
manage throughout the organizational ecosystem (whether internal or external). stored, in transit, and in use.
11. Explicit Trust Validation – Assumptions of integrity and trust level must be explicitly validated against
organization risk threshold and tolerance.
Compromised endpoint
Risk: Devices can be infected by personal email, USB, and other vectors
Mitigation: Rapidly detect and clean all managed devices, email, and other resources across environment and customers
Open attachment
from personal email
Share intelligence
User
Microsoft Threat
Intelligence
Insert USB
User
Threat Detected
Computer Remediated
Access
Access Restricted
Restored
User
On-premises
Apps
Security Operations
Legend
Legend Outsourcing
Event Log Based Monitoring Consulting and Escalation
Investigation & Proactive Hunting Native Resource Monitoring May 2021 – https://aka.ms/MCRA
Microsoft Reference Architecture
(Classic SIEM
Infrastructure & Apps PaaS OT & IoT Identity & Access Endpoint Modern & SaaS Applications Information
Raw Data Management & Mobile
Office 365
Security &
{LDAP}
Activity Logs
Security Operations Model – Functions and Tools
Threat Intelligence External Partner Teams
Intelligence Sources IT Operations,
Strategic and Business Threat Insights/Trends DevOps, & Insider
Threat, and more
Hunt
Hunt(TIER
(TIER3)
3) Incident
Proactive
IncidentManagement
Management
ProactiveHunting,
Hunting,Advanced
AdvancedForensics,
Forensics, Business Major Incident
and BusinessCoordination
Coordination
andDetection
DetectionTuning
Tuning Assess
Any/All
Any/Alltools,
tools,data,
data,intelligence
intelligencesources
sources AssessImpact
Impact&&Manage
ManageStakeholders
Stakeholders
Triage
Triage(TIER
(TIER1)
1) High Volume Incidents CDOC Example Alert Ratio :
• XDR Alerts (~65%)
Rapid
RapidRemediation
Remediationor
orEscalation
Escalation • High true positive rate • User Reporting (~10%)
Primary • Consistent/predictable
PrimaryTools:
Tools:XDR
XDR(Microsoft
(Microsoft365
365Defender
Defender&&Azure
AzureDefender)
Defender) • Log/Event/Other (~25%)
AUTOMATION
AUTOMATION Well known attacks
Automated
AutomatedInvestigation
Investigation&&Remediation
Remediation • XDR (Microsoft 365 Defender and Azure Defender) Alerts
Email
& Collab
Identity Others
Endpoint Applications
…
MAPPING
MAPPING CHALLENGES
CHALLENGES STRONG
STRONG BIASES/TENDENCIES
BIASES/TENDENCIES
Tools
Tools Pivot
Pivot on
on Different
Different Attributes
Attributes Identity Endpoint
• Network IP address Reports only high-quality alerts because Verbose alert reporting
• Computer Name • Analysts have alert fatigue, resist new tools • AV testing focuses on “not
MAPPING CHALLENGES
• Documents • Analysts have network background and missing” malware
• Device ID value of Identity isn’t self evident • Reporting more improves
• Email showing in AV Testing reports
• Etc.
M EN U
Microsoft
Microsoft 365
365 Defender
Defender Azure
Single Portal Experience Portal Integration
Incidents,
Incidents, investigations,
investigations, threat
threat hunting,
hunting, threat
threat analytics
analytics Sentinel
#.#.#.#
Unified entity definitions
Reputation for Users, machines,
email, IPs, etc.
Signal sharing
Identity Endpoint Email Applications Others
Intelligent Capabilities & Collab
High Quality Detection and Data
Impact
The user clicks on an Before the attachment In parallel, the file Utilizing signals and Mail deletes the This all occurred
email attachment he can open, the Mail app is ‘detonated’ in the outcomes from trillions attachment from the in fewer than 400
receives, sent to his
Gmail account, using
queries the attachment
meta-data against 80-
cloud and an AI
system ‘watches’ to
of historical email
transactions, both
PC, flags the file for
review by (human)
milliseconds—the
the built-in Windows plus cloud-based see what happens services determine the analysts, blink of an eye
Mail app machine learning when he opens file is malicious and the AI systems
models attachment automatically update
To protect customers and make the internet
safer, our global security teams use machine
learning to process:
• Trillions of raw security signals, which
generates
• Billions of complex predictions and
• Millions of automated actions
Microsoft Threat Intelligence
Built on diverse signal sources and AI
Meeting
URLs scanned minutes delivered
18M+ 4.1B+
1.8PBs
Other clouds
1.2B+ and network logs
PCs, servers, Trillions of signals
and IoT
Billions of predictions
iOS, macOS,
1B+
Apps and
Android, Linux
service users
and IoT devices Documents scanned Threats blocked
600B+ 5B+
Inside View of Microsoft Threat Intelligence
Azure
AzureCloud
CloudAdoption
AdoptionFramework
Framework(CAF)
(CAF)
Azure Security Center Azure Lighthouse Resource Locks Azure Backup & Site Recovery
Governance & Azure
AzureAD
ADIdentity
IdentityGovernance
Governance
Policy Enforcement • Automated User Provisioning
• Entitlement Management Data Plane Security Enable Zero Trust Networking & Secure Access Service Edge (SASE)
• Access Reviews Per-Application/Workload Controls
• Privileged Identity Management (PIM) Internal Communications (East/West) External Communications (North/South)
Microsoft
Endpoint Manager • Terms of Use
Zero Trust Access Control
Control Intune Explicit trust validation for users and devices before allowing access
Azure
AzureWell
WellArchitected
Framework
Architected
Framework(WAF)
(WAF)
Network/App Security Groups API Management Gateway
‘Internal’ Access Workstations Accounts Identity Access and Privileges Interface Infrastructure Resource Network & ‘External’ Access
Threat Detection Azure Defender - Detections across assets and tenants Azure WAF Alerts
Azure Sentinel Microsoft Cloud App Security (MCAS) VMs & Tenants (Azure, On-prem, 3 rd party clouds)
•
Azure Firewall Alerts
Threat detection, investigation, remediation, and hunting • Containers and Kubernetes
• Unified Entity Behavioral Analytics (UEBA) Network Watcher – IP Flow logs, Packet Capture, Virtual TAP
Machinelogs
Learning (ML) & ArtificialAzure
Intelligence (AI)
Raw Logs and Signal for • Endpoint AD logs, access logs, alerts, risk scoring PIM Logs
• Security Data Lake Azure activity log Azure Service Diagnostic Logs & Metrics
Investigation & Hunting
Attackers have options
to compromise privileged access
Privileged Access
Devices/Workstations Account Interface
Intermediaries Identity Systems
ed
s
ath
riz
Cloud Service Admin
nP
tho
Identity Systems
tio
Au
Intermediaries
va
Ele
User Access Business Critical Systems
Devices/Workstations Account Interface
Privileged Access
Devices/Workstations Account Interface
Intermediaries Identity Systems
ed
s
ath
riz
Cloud Service Admin
nP
tho
Identity Systems
tio
Au
Intermediaries
va
Ele
User Access Business Critical Systems
Devices/Workstations Account Interface
$$ Specialized Security
Identity Systems
$ Enterprise Security
See
See https://aka.ms/deploySPA
https://aka.ms/deploySPA for
for implementation
implementation guidance
guidance
Security level drill down
Enterprise Security Specialized Security Privileged Security
End-to-end Protection
For Privileged Sessions Baseline security for assets + Enhanced security profile for Strongest security for highest
starting point for higher security higher value assets impact assets and accounts
Standard users
Role Recommendation High impact users / developers
For privileged access role
IT Operations
Cloud Considerations
• Protect cloud (and other) resources - Guidelines apply to Microsoft clouds, 3 rd party clouds, and on-premises
• Cloud is the security provider - Cloud management and security services are used for all (when technically feasible)
Enterprise Access Model
Secure and productive access to your resources
Admin
AdminRemote
RemoteAccess,
Access,Jumpservers,
Jumpservers,
Session
SessionManagement,
Management,Proxies,
Proxies,etc.
etc.
Control Plane •
•
Consistent – Single strategy and fewest possible policy engines
Comprehensive – Enforcement with identity, network, apps, data, etc.
Access Control for Assets
(zero trust policy enforcement)
• Identity Centric – Prefer identity controls when available because of
rich context into access requests and granular coverage across
Control and Management Planes
scenarios Provide unified access and management for
Management Plane workloads and assets (and provide attackers
Asset Management, monitoring and Security shortcut for illicit objectives)
Data/Workload Plane
Data/Workloads
Machine Learning
(ML) Applications API Create and store business value in
Data & Websites
• Business processes (in apps/workloads)
App Access (Internal)
• Intellectual property (in data and apps)
Remote
RemoteAccess,
Access,Proxies,
Proxies,
Virtual
VirtualDesktop,
Desktop,etc.
etc.
Wannacrypt
Cryptolocker
2013
2013 -- New
New Business
Business Model
Model 2019
2019 -- Vastly
Vastly Expands
Expands Extortion
Extortion Scope
Scope
Monetizes
Monetizes byby extorting
extorting need
need to
to to
to enterprise
enterprise scale
scaleattacks
attacks (all
(all data
data &
& systems),
systems),
access
access data
data (single
(single device)
device) monetizing
monetizing major
major business
business disruption
disruption and/or
and/or
disclosure of confidential data
disclosure of confidential data
Human Operated Ransomware - high impact & growing
Not another background security risk
What’s different?
High Business impact Stop
Extortion must disrupt business operations
to motivate payment Business
Operations
Ransomware
Commodity
Profitable
Profitable for
for Attackers
Attackers
Economic
Economic incentive
incentive to
to continue
continue growing
growing
Human Operated
Ransomware
Room
Room to
to Grow
Grow
Attackers
Attackers can
can monetize
monetize security
security maintenance
maintenancegaps gaps at
at most
most
enterprises:
enterprises:
•• Apply
Apply security
security updates
updates consistently
consistentlyto to all
all computers
computers Limited
•• Securely configure all resources using manufacturer
Securely configure all resources using manufacturer Immediate Commodity Targeted Data Theft
best
best practices
practices
•• Mitigate
Impact
Mitigate credential
credential theft
theft attacks
attacks for
for privileged
privileged users
users
Per Computer Enterprise wide
Pattern – Human Operated Ransomware
Encryption
Client Attacks Lock up Data
Email, Credential, Browser, etc.
Credential Theft
Logon with legit creds Exfiltration Extortion
Steal Data Demand Money
Datacenter Attacks Malware Installation
RDP, SSH, Server, App, etc.
• Sabotage Backup/Recovery
• Establish persistence
Ransomware actors sometimes buy
access to target organizations from
other attackers in dark markets
Human Attack Operator(s)
Assisted by scripts and malware
Key Takeaways