The Case for Strong Foundational Practices
Innovation and Managing Risk
If you have followed along with technology innovation over the past year, it should be clear that Artificial Intelligence (AI) and Large Language Models (LLM) continually capture headlines. Some press on the topic is what some would consider good in terms of highlighting the technological advancements AI organizations achieve with each release of their respective models. On the other hand, the remaining articles paint a more grim picture, revealing glaring information security flaws that challenge data privacy, confidentiality, integrity, and at times availability. Regardless of the type of articles one prefers to read, there is a very important trend to capture from all of this. Change is not only coming, it’s already here and placing additional pressure on organizations to adapt quickly. Organizations implementing AI in their daily workflow, whether intentional or not (e.g. employees doing so without the organization’s consent), absolutely must tackle foundational information security practices and implement them well before the risk from not doing so becomes too much for the organization to absorb.
Over the course of our careers, we’ve seen numerous organizations try to innovate using newer technology, while simultaneously lacking in foundational information security practices and each time, following a penetration assessment, we discovered risk the organization didn’t even consider or know they had. The move from on-premise infrastructure to cloud-native services highlighted this too over the past several years. User identity became the new perimeter, and arguably the primary attack path, yet organizations were slow to implement stronger password guidance and phish-resistant Multi-Factor Authentication (MFA) as industry best practices matured. Organizations believed cloud service providers absorbed most of the risk and at times, didn’t fully understand the Shared Responsibility Model in terms of risk responsibility until it was too late. Business leaders with whom we’ve engaged were stunned to learn just how much a data breach truly costs an organization and still believed cybersecurity insurance policies would cover the costs. Meanwhile, cybersecurity insurance providers have matured their own requirements over the years and most now require evidence that the organization at least tried to implement foundational information security practices before issuing payments.
So, as to not give the appearance of doom and gloom, we wanted to take a moment to highlight some of the foundational information security practices that really help reduce risk at an organization. The biggest challenge to the following list has rarely been due to a lack of tool, product, or security technology and more due to the need for organizations to adjust their approach to risk management. Many times, simply helping users adjust their workflow or habits helps tremendously and this is a challenge that a product or tool just cannot solve by itself. Likewise, helping business leaders and technology leaders shift their perspective of information security practices from being a “cost center” to “this is a necessary part of managing business risk”, goes a long way towards reducing risk to an acceptable level. We will order these in order of importance based on what we have observed at organizations over the course of our careers. This list is designed to be as succinct and condensed as possible. How each organization implements the following items will be different and heavily based on current practices. Regardless, whatever an organization implements, we recommend implementation aligns with the intent of each foundational practice. Where applicable, we will do our best to provide additional context pertaining implementation.
Attack Path 1 - User Identity
Security controls around user identity are often a touchy topic with most organizations because the challenges with implementing best practices often falls on altering user behavior which no amount of technology will fully address. So, with that in mind, we encourage organizations to make it as easy as possible for users to employ good password hygiene and the best way we’ve found to do that is to take the chore of generating credentials out of the hands of the users as much as possible. Technologies such as password managers, passkeys, or FIDO2 compliant hardware tokens can help, but end-user training is absolutely required to ensure successful adoption and implementation. The list below includes some foundational practices and recommendations for organizations to implement. Where applicable, additional cost estimates are provided and we recommend implementing these items as a group of controls because of the synergistic nature of each individual part of the control. Ultimately, the goal is to achieve defense-in-dept at a micro and macro level.
Protecting User Identities - Relatively Low Cost, High Gain
Minimum Password Length
15-characters for general users
16-characters (or more) for administrators
Maximum Password Length Allowance
128-characters (or more if supported)
Multi-Factor Authentication
Enforce for all users
Prioritize phish resistant authenticators
FIDO2 compliant authenticators
Physical USB security tokens (per-user cost)
Ensure backup option implemented in case of lost/damaged device
Biometric versions available
Biometrics capable
Passkeys
Hardware via laptop/desktop Trusted Platform Module (TPM)
Hardware via USB security token device (limited storage capabilities)
Ensure backup option in case of lost/damaged device
Mobile authenticator app protected by biometrics authentication and MDM security policies
Back up authenticator option
One-Time Passcodes generated by a trusted mobile authenticator app protected by biometrics authentication and MDM security policies
Authenticators to avoid (clear text, non-phish resistant, considered weak authenticators)
One-Time Passcodes (OTP) delivered via Simple Message System (SMS) / Text Message
One-Time Passcodes (OTP) delivered via Email
One-Time Passcodes (OTP) delivered via Public switched telephone network
Password complexity/composition requirements
Implement ONLY if required for regulatory compliance (e.g. PCI DSS, HIPAA, NYDFS, etc.)
Password / Credential manager (per user cost/licensing)
Offline password manager is preferred
Ensure viable vault backup and recovery
Often does not synchronize across devices
Online password manager is OK with the following considerations
Desktop version only (avoid browser extension due to browser attack vectors if feasible)
Ensure vendor supports private storage options (no shared storage across their clients)
Ensure vendor cannot access credential vault(s), or vault backups, and cannot decrypt vault(s)
Ensure the organization has recovery procedures in place
Breached or weak password pattern detection and prevention
Cloud-based Identity Services support utilizing a deny list by default
On-premise Identity Services (e.g. Active Directory) may require 3rd party integration
Helps defend against credential stuffing and password reuse
End user training
How to fully utilize a credential/password manager
Train users on how to have the credential manager generate the LONGEST credential accepted by the authentication service (remove the need for them to remember every credential)
Train users on how to use phish-resistant MFA option(s) to verify identity to credential/password manager (take the password generation for accessing the protected credential vault out of the user’s hands - great candidate for hardware passkeys)
How to fully utilize phish-resistant MFA option(s)
Anti-phishing/social engineering training (ensure it actually works and measure success metrics)
Some of the greatest attack vectors we see on engagements come from misconfigured identity services (e.g. on-premise Active Directory / cloud-based IAM). Hardening these services often yields the greatest results in terms of managing risk associated with attacks against user identities.
Attack Path 2 - Authorization and Access Management
Much like user identity and credential protections, user access and authorization controls go hand in hand with protecting organization resources and assets. Yet, the principle of least privilege practice escapes many organizations as the business grows, systems and infrastructure increase in complexity, and the number of employees and job roles increases. However, getting this practice right early can help set an organization up for success in the long-run and goes a long way to reducing or eliminating risk in terms of minimizing business impact in the event of a breach. Like identity protection, the following list was designed as a group to be implemented together to achieve maximum protection and risk reduction.
Administrator Users
Separate accounts
Low level user account used for every day work-related activities
Follows the identity protection guidance for all employees above
2nd account provisioned with no, or minimal, licenses
Provisioned with just the minimal administrator privileges necessary
Follows identity protection guidance above for administrator users
Longer password minimum
Phish-resistant MFA
Every activity is logged and user must prove identity/authorization for each task
Used only for administrative tasks (must not be used as a service account)
General Guidelines - All users
Separate duties
Request
Approve
Implement
Audit
Minimal permissions
Do general users really need Local Administrator access on their systems?
Is it really necessary for general users to grant guest users access to the organization file share?
Does every administrator really require Domain Administrator/Global Administrator permissions?
Does that file share folder containing sensitive data really need to be accessed by everyone?
Do general users really need to be able to authenticate to organization resources from outside the country/state/city?
Does that service [for vendor product] really need Domain Administrator/Global Administrator permissions?
Network access controls
Do general users (and their systems) really need to access administrative services or systems?
Do general users (and their systems) really need to allow all incoming connections?
Does the administrator network really need to allow all outbound connections, services, and protocols?
Do general users (and their systems) really need to access resources in other countries?
Do general users (and their systems) really need to access all services and protocols on Internet resources (e.g. Telnet, SSH, SMB, CIFS, Remote Desktop, etc.)?
Does the organization really need default services running on every system across the environment?
Are multicast name resolution protocols really necessary on the network in case DNS fails?
Service Accounts
Minimize service account privileges
Enable built-in service account protections where available
Avoid using highly privileged user accounts for services
Generally speaking, applying the principle of least privilege for user accounts, service accounts, and network access can result in minimizing the impact from an initial compromise. During our penetration assessments, we often see that a compromise of a low-level user allows our team to increase the foothold and expand the initial attack through misconfigured access and authorization controls. This can mean the difference between obtaining limited data access or a full domain compromise. Something as simple as preventing normal users from having local administrator permissions for their general-use account, or preventing them from having more permissions than they really need on other assets can thwart attempts to expand an initial foothold. As an added layer of defense on top of foundational identity security controls, hardened access and authorization controls, even at a basic level, make a significant difference.
Attack Path 3 - Technical Debt
Of the three primary attack paths that we see on penetration assessments, and that are additionally threatened by adversaries that employ AI into the attack chain, technical debt appears to be a difficult challenge for some organizations to solve. These are systems that have reached, or exceeded, their life span and support cycles. There are specific industries where this appears to be a more significant challenge than others as there are minimal viable products available that fulfill specific requirements at these organizations. Additionally, the number of vendors that make these products appear to be limited. This means that organizations generally either face the dilemma of keeping the unsupported versions of these products in use, or migrate to the newer versions, which often come with a shift from on-premise to cloud-services and introduce additional risk and data privacy considerations. Either way, technical debt opens the doors for organizations to maintain more risk than they realistically can absorb. Here are some pathways to minimize the attack surface associated with technical debt.
Additional Protection Measures - Upgrade or Replacement Not Feasible
Network isolation
Completely isolated network
Minimal egress and ingress traffic allowance (source/destination IP filtering)
Special access requirements for administrator users (e.g. via hardened jump host)
Consider virtualization or containerization to minimize long-term costs if supported
Monitor ingress and egress traffic, and system service interaction
Implement host-based firewalls in addition to network security controls
Conclusion
We want to communicate clearly that this list is non-exhaustive, but implementing these foundational practices, and continuing to adapt to changing industry best practices, will go a long way in reducing organizational risk. Furthermore, the above items will help any organization prepare for integrating AI into their operations while simultaneously helping the business recognize and address the risk of doing so. Like any new and innovative technology, early adoption often coincides with higher risk as the technology itself hasn’t fully matured or addressed all of the threats against it just yet. Maturing an organization’s foundational information security practices will help set a strong foundation for innovating and incorporating new technological advancements that enhance business outcomes. We firmly believe that managing risk is possible provided the organization has implemented mature foundational information security practices.
If your organization is considering implementing, or is already in the midst of implementing, AI tools or technologies into operational practices, we would love to help your team assess the organization’s alignment with foundational information security practices. Often times penetration testing is a good place to start for an organization that wants assistance identifying or confirming known or unknown attack vectors and associated business risk. This is where we thrive and, more often than not, reveal valuable insights into business risk associated with the organization’s current technology stack, processes, and overall information security program maturity.