AGIX Discussion All HowTo's CISM & CRISC

Protecting your SIEM, Virtual Infrastructure, and Backups

This article discussed key vital infrastructure components, the threats they face, and the measures that can be taken to remediate the risk.

The three components are: SIEM, Virtual Infrastructure, and Backups. All three are targets for Hackers and Ransomware. Consider the scenario where an administrative domain account has been compromised and (the hacker or ransomware) targets the three key systems. The only lines of defence at that point are a) network segmentation (perhaps a jump box is required to reach the target system), and b) the credentials don’t work on the target system. The jump box is a layer of defence but it’s also just another step that the attacker likely has permission to use once they identify the requirement.

SIEM

If the SIEM is compromised, the impact is potentially a) the SIEM can no longer be trusted in an investigation, b) the SIEM contents could be removed, and c) the information contained within the SIEM could be (likely) sensitive and increases risk in the wrong hands.

Virtual Infrastructure

If the Virtual Infrastructure is compromised, the impact is potentially a) no virtual servers, b) deleted VMDK files, and c) exfiltrated VMDK files.

Backups

If the backups are compromised, the impact is potentially a) inaccessible/deleted backups, and b) exfiltrated files.

The following table shows that they share very similar mitigation methods for the hacker and Ransomware threats.

Item Mitigation
SIEM Backup. Use local auth.
Virtual Infrastructure Backup. Use local auth.
Backups Backup. Store off-line/off-site. Use local auth.

The mitigations listed in the table above are not absolute. For example, it might be that staff can retrieve their own backups for self-service restores. For this, they’d sensibly use their own SSO credentials. For risk management, the administrative accounts would be disconnected from SSO and be local only.

The rule is: Accounts with administrative or elevated privileges authenticate locally.

 

Leave a Reply

Your email address will not be published. Required fields are marked *