COI Report – Part VII
Page
299 of
425 867. Examples of the compromise and abuse of privileged accounts include the use of local administrator accounts the SA. account and the LA. account to login to Citrix Servers 1 and 2. Furthermore, the DA.
account was compromised, since it was observed to have been used in an attempt to login to the SCM database, when it was not being used by its authorised user.
868. IHiS was aware that their systems were vulnerable to the risk of privileged passwords being compromised. The FY GIA Audit Report had, in fact, highlighted the vulnerability created by weak control of privileged accounts in the SingHealth network. The report stated that the penetration testers had successfully exploited the vulnerability and obtained full domain administrator control of the servers in the SingHealth network domain.
In the FY GIA Audit Report, GIA had highlighted the dire consequences when this vulnerability is exploited (see also paragraph 1072 (pg 368) below.
869. GIA had highlighted that the weak control of privileged accounts stemmed from bad password compliance policies – passwords being used were very simple the non-complex passwords used could be easily guessed or cracked with readily available password cracking tools. Recommendations were made to
IHiS for remediation, but unfortunately, these were inadequately complied with.
870. The following area series of measures to mitigate the risk of privileged account abuse.
Share with your friends: