The Role of Deception in Cloud ID Access Management - Attivo Networks
Attivo Networks Blogs

Access Denied: The Role of Deception in Cloud ID Access Management

Authored by: Carolyn Crandall, Chief Deception Officer – Cloud security is garnering quite a bit of attention these days, demonstrating now more than ever the need for tighter controls and visibility to when they fail. Identity and Access Management (IAM) is a topic focus for every organization as it controls the rights and privileges for specific accounts. Given the sheer volume of security responsibilities held by both the cloud provider and the owner of the data stored in the cloud, failure to correctly set these permissions leads to misconfigurations, overlapping privileges, shared account access, and other issues that can put the entire network at risk of a breach. Unfortunately, we are seeing these issues arise all too often, creating opportunities that threat actors are readily waiting to exploit.

In addition to typical IAM solutions that provide account rights and privileges to the cloud environment, organizations are actively using deception technology to identify intruders using stolen or shared credentials or exploiting misconfigurations to gain unauthorized access. By laying traps and lures, deception technology attracts attackers away from user information and production assets and into a deception environment for intelligence gathering and quick remediation.

More specifically, deception technology:

  • Works by placing fake user and admin credentials on endpoints that appear authentic and attractive. These breadcrumb the adversary into the deception environment and raise an immediate alert of intrusion.
  • Sets decoy landmines throughout the cloud network so threat actors attempting to use real employee credentials to access decoy applications, buckets, databases, or documents will trigger an alert substantiated with the attempted actions.
  • Creates cloud-specific deceptions such as decoy storage buckets, containerized applications, cloud-based applications, and serverless functions to detect attacker activity targeting these objects.
  • Provides Active Directory (AD) deceptions that include fake AD environments, as well as the ability to intercept advanced (APT) and automated attackers to contain them automatically at the endpoint. When attackers query AD, a deception module alters the response and adds deceptive content, creating an altered reality for the attacker. Organizations can now hide valuable enterprise resource information and reduce attack surfaces.
  • Redirects malicious activities and policy violations into the deception environment so that the organization can safely study the attack and gather Tactics, Techniques, and Procedures (TTPs), along with company-specific threat intelligence.
  • Facilitates third-party integrations so that security teams can accelerate incident response with automated blocking, isolation, and threat hunting. Findings can also feed into standard SOC tools.

By adding in deception technology to existing IAM defenses, organizations gain a more comprehensive cloud security solution, making it harder for attackers to gain access, remain undetected, and exploit vulnerabilities within cloud networks. It also provides an additional layer of defense with eyes-inside-the-network visibility to policy violation and malicious activities of employees, suppliers, and external threat actors.

Resources

The Truth About Privileged Access Security On AWS and Other Public Clouds (Forbes)

Another AWS Leakage Due to Misconfiguration (TechTarget)

Cloud application monitoring takes a multipronged approach (TechTarget)

Share on:

Free Active Directory Assessment

Get Visibility Into Privilege And Service Account Exposure

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Try Our Endpoint Detection Net (EDN) for Free

FAST AND EASY

Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.

Newsletter Signup

    Yes, please opt me in to receive your quarterly newsletter, event invitations, and product updates.

    I understand that I can opt out at any time, and can refer to Attivo Networks Privacy Policy for more information.
  • This field is for validation purposes and should be left unchanged.

ADSecure 90-Day Free Trial

GET PROTECTION AGAINST UNAUTHORIZED ACCESS TO ACTIVE DIRECTORY

  • Hide and deny access to AD objects
  • Get alerted on unauthorized queries
  • Attack details easily viewable in dashboard
  • Your data remains on-premise

RSS

Leave a Comment

Your email address will not be published. Required fields are marked *

2 × five =

Ready to find out what’s lurking in your network?

Scroll to Top