Social Network For Security Executives: Help Make Right Cyber Security Decisions
Part 3 of 8: Restrict Administrative Privileges
What Is It? In nearly every environment, there are accounts that have elevated privileges beyond the everyday users to add, remove, and change elements of the information systems. These accounts, including dedicated service accounts for automatic execution, yield considerable power and the ability to cause untold sorrows if used inappropriately. Some may consider only the administrator accounts used directly on servers or in Active Directory, but administrative privileges can be local, domain, or enterprise level, and have varying degrees of control (such as power users, domain administrators, and enterprise administrators to say nothing of delegated privileges). Beyond that, they exist on workstations, network appliances, and just about every piece of IoT technology. Absolute power corrupts absolutely…. or words to that effect.
Where Do I Start? As you would have with Application Whitelisting, an inventory. A current inventory of administrator accounts is a great place to begin. It will take a while to get a thorough list of all your administrator accounts, but it needs to be done. Include accounts with elevated privileges and not just Local, Domain, and Enterprise administrator groups – consider power users and any users with delegated authority. While you’re at it, inventory your service accounts as well. Include the local administrator accounts on your workstations and whether users have this access. Finally, consider your network-capable devices such as routers, switches, firewalls, IoT, and so on. Any one of these can have many local administrator accounts. It may be a good time regarding these local accounts to evaluate your password strategy, but more on that in a future article. If it has administrator rights, it has power, and that power must be used wisely!
How I do I Make It Work? Technically, it’s easy, but I’ve yet to find someone willing to blindly start revoking administrator rights (or granting them for that matter) arbitrarily. You need a rock-solid policy to underpin this strategy and it must be supported and enforced by management. The roles of staff should dictate what they can and cannot have access to. Where possible, use security groups rather than assigning admin rights to individual accounts…. it’s easier to move users in and out of groups than worry about individual accounts. Always remember to ask “why” the administrator privileges are required in the first place as it should be backed up with a solid business case.
Take inventory and then review the roles that have administrator privileges. Review your policies, plan, run it through proper change management, and then just get moving with the clean-up. And take your time…. this won’t happen instantly or overnight.
Pitfalls? There are plenty of things that can go sideways when it comes to restricting administrative privileges. Service accounts can break, so be sure you maintain the level of access required by the services and vendors. Maintain a secure local account on your network equipment in the event it cannot reach the domain for authentication or else you may find yourself unable to fix a router or switch quickly. Failing to remove administrator access for employees that change roles or leave the company and are not deactivated can cause hours and hours of “fun”. There may be accounts with administrative access to the most obscure things but ultimately, restricting the ability of a hacker to run riot on your systems, having a degree of accountability when changes are made, and giving people pause-for-thought before “clicking OK” is a solid strategy. There are tools available to help and bringing in the pros to untangle the mess can be worth its weight in gold. A good password management application is a big plus, too.
Ghosts in the Machine? Politics, plain and simple. Administrative access is a powerful element of a user’s psyche and taking it away can open Pandora’s Box, but at the same time, also be the key to locking that very same box. Be ready for the battles that come with taking away admin rights, especially at the workstation level. Admittedly, Application Whitelisting can only help at an endpoint level so far by controlling installation and execution of programs. You can consider separate privileged accounts for those times when the user “must” have it and the service desk is swamped. Managers and Executives often demand administrator rights, so tread lightly and fully understand why before arbitrarily granting the power to the powers that be. Auditing and logging systems for privileged account activities should be thought of as well so when (not if) things get a little scary, you can follow the audit trail and make resolution a bit easier.
Anything Missing? If there is one thing you shouldn’t miss, it’s the presence of generic accounts that have administrator privileges – watch out for these! I advocate against generic accounts but if you *must* have them, restrict them as tightly as possible and log everything they can do. Also, wherever possible, try to leverage your directory services as the “source of truth” when logging onto network appliances. Changing the name of default administrator accounts doesn’t hurt either. Oh yes… remember good password practices lest you’ll end up with a hacker on the core switch using “admin” “admin”.
Disclaimer: The thoughts and opinions presented on this blog are my own and not those of any associated third party. The content is provided for general information, educational, and entertainment purposes and does not constitute legal advice or recommendations; it must not be relied upon as such. Appropriate legal advice should be obtained in actual situations. All images, unless otherwise credited, are licensed through ShutterStock