Why Active Directory is the Main Target of Insider Cyber-Attacks

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s.

Jason Coggins
| Read Time 4 min read| Updated On - June 17, 2020

Last Updated on June 17, 2020 by Ajit Singh

It’s no longer a surprise statistic when we say that nearly half of all data breaches occurred as a result of insiders. This is because more and more organizations are starting to understand the fundamental value of data and the potential implications of having large numbers of privileged users. In fact, according to a study conducted by the Ponemon Institute claims that the average cost of a data breach rose 30% over the last five years up to almost $4 million.

Internal security breaches are becoming increasingly popular to report on, and the resulting damages to company reputation can be just as catastrophic as the financial damages of the breach itself. It’s too early to truly know the damage that the insider attack at Tesla will have on the reputation and bottom line of the business. However, we did see a sharp decrease in the value of the stock price, costing key holders huge sums of money.

Insider threats can be very difficult to detect and are almost impossible to truly prevent. They can go unnoticed for large periods of time, or simply all come down to the careless behaviour of a privileged user. Insider threats range from calculated, efficient attacks to accidental misuse. However, how much damage an insider can inflict on your organization will rely entirely on the type and volume of data they can get their hands on. Malicious insiders will look to get access to systems that contain the most amounts of valuable data. This is why, often, Active Directory is the first port of call for an insider attack.

Active Directory Risks

90% of the world’s enterprise organizations use Active Directory (AD) as their primary method for authentication and authorization, so it makes sense that this would be the first place an attacker would look to compromise. Where else are they going to be able to get their hands on such a myriad of both sensitive company and employee information? If that isn’t enough proof for you that AD is a prime target, Microsoft tells us that 95 million AD accounts are the target of cyber-attacks every day.

As if securing on-premise AD wasn’t complex enough, with the wider adoption of Office 365, the potential attack surface has increased dramatically. Azure Active Directory is used by all Office 365 applications to help authenticate users. To do this, every Office 365 instance requires a separate Azure AD tenant. This piles on yet another complex and threat-prone environment for IT to try and secure. What this means from a security perspective is that any insider threat looking to compromise on-premise AD can have a wide-ranging effect throughout any web-based applications that are leveraging Azure AD.

How to Secure Active Directory from Insider Attacks

So, for starters, there is no piece of software or technology that will completely eradicate insider threats. Due to their very nature, you are likely to experience one at some point, if you haven’t already. Perhaps the only way you can start to secure your AD from insider threats is by following a list of best practices in conjunction with a good Active Directory auditing solution.

The first step to securing your AD is to minimize the potential attack surface that insiders would be able to take advantage of. This means cleaning up the number of forest and domains in your network. It also means limiting the number of privileged users and permissions to your network, as it is through these types of accounts that the most dangerous insider threats arise.

Administrative accounts are like gold dust to a potential attacker, as they have high levels of privileges and access to the most sensitive data. Not only should you limit the number of administrative accounts in your organization, those people that do hold them should be monitored closely.

You also need to be enforcing incredibly strong password rules and policies. Users should not be sharing their passwords, making physical copies, or using passwords that are personal to them. Passwords should be complex, contain numerous special characters, upper case letters and be regularly changed. That way, if the worst happens and an account is breached, changing the password regularly ensures the attack cannot continue indefinitely.

In addition to these best practices, you should also deploy a user behaviour analysis solution that monitors the activities of the privileged users in your Active Directory. Such solutions enable you to audit, monitor and alert on AD changes to help you spot anomalous behaviour and potential insider threats. Lepide Data Security Platform, for example, comes pre-packages with numerous reports that are geared towards giving you actionable information regarding your AD environment. These reports clearly show the “who, what, when and where” for every change made to AD, as well as a list of current permissions. Try Data Security Platform today.

Jason Coggins
Jason Coggins

Jason Coggins came to Lepide directly from the UK government security services, and now leads the UK & EU sales team at Lepide. Based in Lepide’s UK office, Jason has a practical and ‘hands-on’ approach to introducing Lepide to customers and channel partners globally.

Get Your Free Copy of the Ultimate Guide to Active Directory Auditing
Related Articles
The Complete Guide to Effective Data Access Governance

This whitepaper provides a comprehensive guide to implementing effective data access governance.

Download Whitepaper
Data Access Governance Solution.

Better govern access to sensitive unstructured data, enforce zero-trust, and demonstrate compliance with the Lepide Data Security Platform.

Learn more