Page 48 - Cyber Defense eMagazine Annual RSA Edition for 2024
P. 48

IT admins move between tiers on a regular basis, as this is part of their job. So how do we ensure that
            such  actions are  legitimate  and not  part  of  a  compromise?  The  answer  is  to  enforce  MFA on such
            privileged accounts. This ensures that these account credentials have not been leaked and misused
            during an attack.




            Summary

            Addressing the risks posed by the complex reality of identities is not a trivial task. All the more reason for
            why it should be done in the simplest and most effective way possible. Identity segmentation, as opposed
            to  identity  access  management,  visibility  or  privileged  access  management,  is  a  radically  simpler
            approach that adds resilience across any organization.



            About the Author

            Sagie Dulce is a defensive security researcher, leading the Zero-Labs
            team as VP of Research @ Zero Networks.

            With a bachelor's in Electrical-Engineer, Sagie started out designing
            and breaking-up communication schemas in the Intelligence unit of
            the military. After his service, Sagie went on to perform research on
            diverse topics, introducing new attacks techniques such as the "man-
            in-the-cloud" attacks and supply chain compromises against container
            developers.  In  recent  years,  Sagie  is  focused  on  research  that
            delivers practical solutions to security teams, mainly in the form of
            open-source  security  tools.   Sagie  can  be  reached  via  email  at
            [email protected] and on Twitter: @SagieDulce

































                                                                                                              48
   43   44   45   46   47   48   49   50   51   52   53