Page 83 - Cyber Defense eMagazine forJune 2021
P. 83

Best Practices for Mitigating Insider Threat Risks

            Despite the challenge of these evolving risks, there are best practices that organizations can employ to
            fortify their security posture and mitigate insider threats.


            How should companies mitigate those risks?
                       1.  Visibility
                          a.  Mandiant recommends organizations invest in purpose-built insider threat data loss
                              prevention  solutions  which  can  detect,  alert,  and  block  (if  necessary)  malicious
                              behavior as well as work while both being connected and disconnected to the internet.

                       2.  Least Privilege
                          a.  In both production and development networks, Mandiant recommends organizations
                              implement user access controls across all environments on their networks to ensure
                              users, developers, and administrators only have the necessary access to perform their
                              assigned responsibilities.
                          b.  Limit  and  audit  users who  can  create  accounts  in  on-premise  networks  and  cloud
                              environments
                       3.  Logging
                          a.  Mandiant recommends logging and event aggregation sent to a Security Information
                              and  Event  Management  (SIEM)  system.  This  provides  a  level  of  mitigation  if  a
                              malicious insider attempts to clear logs, because separate, streamed logs to another
                              system would be available.
                       4.  Network Segmentation

                          a.  Mandiant recommends organizations investigate their network segmentation, and limit
                              unnecessary traffic to highly sensitive environments from lesser trusted environments.
                              This will help prevent an insider from moving laterally or connecting from an internal
                              network segment to a cloud environment. Additionally, all systems that do not need to
                              be publicly facing should be segmented from public access and restricted as much as
                              possible.
                       5.  Offboarding
                          a.  Mandiant  continues  to  remind  clients  who  may  have  to  terminate  employees  or
                              contractors to not give advance notice, limit communications, and remove network
                              access immediately. This is also true if an employee voluntarily resigns or retires.
                              Additionally,  all  SSH  keys,  PEM  files,  MFA,  service  passwords,  and  application
                              passwords the individual had access to should be rotated for all environments (e.g.,
                              developer and production), and unenrolled in the case of MFA services each time
                              when an employee or contractor with these accesses leaves the organization.
                       6.  Assess
                          a.  Mandiant  recommends  organizations  have  an  insider  threat  program  assessment
                              conducted  with  defined,  key  outcomes  of  actionable,  organization-specific  risk
                              mitigation  recommendations,  prioritized  intelligence  requirements  based  on  the
                              current and horizon intelligence landscape, and roadmaps for all maturity levels of
                              insider threat security programs. Assessing annually with different tools can reveal
                              varied areas of focus and identify gaps in capabilities that could be rectified.







            Cyber Defense eMagazine – June 2021 Edition                                                                                                                                                                                                83
            Copyright © 2021, Cyber Defense Magazine.  All rights reserved worldwide.
   78   79   80   81   82   83   84   85   86   87   88