Table of contents exchange of letters with the minister executive summary


Inventory of administrative accounts should be created to



Download 5.91 Mb.
View original pdf
Page243/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   239   240   241   242   243   244   245   246   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019
40.1 Inventory of administrative accounts should be created to
facilitate rationalisation of such accounts
871. The CIS Controls require that an inventory of administrative accounts be maintained, including domain and local accounts, to ensure that only authorised individuals have elevated privileges.
872. Overtime, privilege creep may have occurred where too many users, and too many accounts have undocumented privileges. The LA. account is an example of a dormant local administrator account. Although not used for day-



COI Report – Part VII
Page 300 of 425

to-day operations, it remained in the system with full administrator privileges, and was eventually exploited in the Cyber Attack. The SA. account is yet another example – it was an inactive service account, that had full administrator privileges although there was no real reason for its existence. This too was exploited in the Cyber Attack. Although the SMD was responsible for the periodic review of user-IDs to identify and disable dormant accounts, this was not done.
873. Policies in relation to the management of accounts are laid out in the
HITSPS. HITSPS policy requires that user-IDs in the IT system be reviewed periodically to identify unused or dormant accounts. Unused user-IDs should be disabled to prevent them from being used for unauthorised activities. This was not done, as evidenced by the eventual abuse of the LA. and SA. accounts, dormant and unused accounts, respectively, which had not been identified.
874. It is recommended that the number of IT staff who have administrator privileges, and the number and nature of privileged accounts on the network should be reviewed as there maybe scope for rationalisation to adhere to the principle of least privilege,
75
maintain system integrity and reduce the attack surface for privileged accounts to be compromised.

Download 5.91 Mb.

Share with your friends:
1   ...   239   240   241   242   243   244   245   246   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page