User Behavior Monitoring

advertisement
USER BEHAVIOR MONITORING:
KNOW WHEN USERS PUT YOUR
BUSINESS AT RISK
Presented by Matt Zanderigo
WHO IS OBSERVEIT?
The leading provider of User
Behavior Monitoring for Application
Users, Admins and External Vendors
 HQ Boston, MA / R&D Tel Aviv, Israel
 Founded 2006
 1,200+ Customers Worldwide
 $20M Invested by Bain Capital
APPLICATION ACCESS
App Users
App Admins
PRIVILEGED ACCESS
Shared Accounts
Named Accounts
(Windows Admins, root,
DBAs, System Admins,…)
(Developers, IT Contractors,
Network Admin,…)
APPLICATION ACCESS: THE WINDOW
TO OUR MOST SENSITIVE DATA
AT&T will pay $25
million after callcenter workers sold
customer data
Ex-JPMorgan
Employee Charged
With Stealing
Customer Data
Morgan Stanley
insider exposes rich
clients' info online
APP BLIND SPOTS = DATA EXPOSURE
SHIFT FOCUS FROM POSSIBLE
ACTIONS TO ACTUAL USAGE
App Entitlement
changes
Logging App
Utilization
_____________________________________________________
_____________________________________________________
 Adding Users
 Deleting Accounts
 Modifying Access
 Customer data
 Financial records
 Account Information
Get deep insight within applications
Challenge:
Get visibility within 20
financial apps
 Needed to comply with FDIC requirements surrounding the audit and
logging of privileged access to applications.
 Ongoing challenge for over two years, because some of the legacy and
web based applications do not have their own internal logging and audit
reports that meet FDIC regulations.
Solution:
 Holistic view of application utilization by administrator level users
 Real-time alerts for creation, modification, or deletion of users
 Reports centered around application access as a whole
PRIVILEGED ACCESS: THE ROOT
OF TODAY’S BIGGEST BREACHES
56M affected –by
Home Depot Breach,
Privilege Escalation
to Blame
78.8M affected by
Anthem breach, DBA
account
compromised
Sony Attackers Used
Stolen Admin
Credentials
SUPER USER OR SUPER THREAT?
SHIFT FOCUS FROM SESSION
RECORDING TO USER ANALYTICS
Configuration
changes
_____________________________________________________




Embedded Scripts
Unsecure ‘shell’
Unauthorized access
Unapproved ‘setuid’
Escalated
privileges
_____________________________________________________




Lateral Movement
‘rm’ ‘cp’ with ‘sudo’
Creating “backdoors”
‘leapfrog’ logins
Get deep insight within sessions
Get visibility within sessions
on 160 PCI/SOX Systems
Challenge:
 The Board of Directors of Ally Bank established a Privileged User
Access (PUA) project for all sessions that are accessing data on
servers in-scope for PCI and SOX compliance.
 Their 5,000 privileged users represented a significant risk in their
organization, so they are rolling out Password vaulting (Lieberman)
and needed to implement a monitoring program in parallel
Solution:
 Needed a monitoring system to collect, alert, and report on the
specific use of applications, functions, or access to specific
information
WHAT YOU NEED TO MONITOR
Privileged Users
Application Users
__________________________________________
__________________________________________







External Vendors
__________________________________________
Healthcare (PHI) data
Customer (PII) data
Employee data
Company data
Financial data
Intellectual property
Sales & marketing data
Audit and Compliance
EU Data
Protection Reform
SOX
HIPAA
PRIVILEGED USER
MONITORING
PRIVILEGED IDENTITY MANAGEMENT
Provisioning &
Governance
_____________________________________________________
User
Monitoring
_____________________________________________________
 Visual Audit Trail of all
privileged user sessions
 App & Access usage
Reporting
 Detailed session analysis:
sudo, privileged escalation,
backdoors…
Password
Vaults
_____________________________________________________
CUSTOMER EXAMPLES
PCI Vendor Privileged Access
Privileged User Monitoring for HIPAA

Monitoring internal and credit card
vendors with access to PCI systems

Monitoring privileged users with access
to over 1,350 servers to protect PHI

Detect unauthorized configuration
changes


Meeting internal and external audit
Auditing 1,700 business users who
access applications including
PeopleSoft, Microsoft Lync and home
grown tools

Real-time monitoring of unauthorized
account creation and firewall changes
RD
3 PARTY VENDOR
MONITORING
3RD PARTY VENDOR COMPLIANCE
Controlled
Access
_____________________________________________________
User
Monitoring
_____________________________________________________
 Identify and Monitor thirdparty access
 Remote access user activity
monitoring
 Alert on unauthorized access
to Sensitive systems
 Incident response including
session replay from log
events
HIPAA, PCI, NERC, FFIEC, SOX,
FISMA, FERPA
Change
Management
_____________________________________________________
CUSTOMER EXAMPLES
Remove Vendor Access to ERP

Audit third-party ERP solution provider

Monitor internal IT administrators
activities

Deter negligent third-party activities
Monitoring Private Cloud Contractors




Global project to consolidate 140 data
center to 6; provide private cloud to all
Allianz subsidiaries
Needed to meet strict German data
protection laws to keep project on track
Monitors over 300 IBM contractors
Expanding coverage to all contractors
and privileged users
APPLICATION USER
MONITORING
INSIDER THREATS
Critical
Applications
At Risk
Employees
_____________________________________________________
_____________________________________________________
 Remote Workers
 Employee Turnover
 Layoffs
 Two weeks notice
 HR watch list
Shadow IT
_____________________________________________________
CUSTOMER EXAMPLES
EHR System (EPIC) & PHI Servers

If an employee views the patient record
of another hospital employee

If a doctor, nurse, pharmacist, etc. views
the record of a patient not under their
care

If a doctor, nurse, pharmacist, etc. views
the record of a high profile patient (VIP)

Privileged users with access to PHI data
storage infrastructure
Policy Quoting & Claims Handling
 App data extraction (exporting
reports, large copy operations)
 Unnecessarily accessing sensitive
files (view/open/save/export)
 Business claims employees viewing
personal claims information
THANK YOU
Download