Table of contents exchange of letters with the minister executive summary


All administrators must use two-factor authentication when



Download 5.91 Mb.
View original pdf
Page244/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   240   241   242   243   244   245   246   247   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019
40.2 All administrators must use two-factor authentication when
performing administrative tasks
875. The risk of active directory (“AD”) administrator accounts being compromised must be mitigated. Windows server administrators need to use domain administrator accounts to perform standard administrative tasks but, ideally, domain administrator accounts should only be used when privilege is required. Administrators should not be granted domain administrator privileges for their regular AD accounts, which they use for carrying out day-to-day tasks, The principle of least privilege is the idea that at any user, program, or process should have only the bare minimum privileges necessary to perform its function. Following the principle of least privilege is considered a best practice in information security.



COI Report – Part VII
Page 301 of 425

such as accessing email, and they should only be used by a single administrator
(i.e. not shared) for accountability.
876. AD accounts are susceptible to being compromised by an attacker who has already gained a foothold within the network. Further, AD administrator accounts are susceptible because their passwords are not frequently changed.
877. The attacker gained unauthorised access to numerous SingHealth servers by stealing the passwords for privileged accounts. These servers used single- factor authentication, in the form of a password. Relying solely on the strength of passwords is insufficient to protect critical servers against the risk of compromise.
878. Given these vulnerabilities, a system of Privileged Access Management
76
(“PAM”) using FA must be put in place, and enforced for administrator access to servers. Experts Dr Lim, Gen. Alexander, Vivek and Richard all concur with this recommendation. With FA, users must input two distinct identification methods — such as a password and a one-time-use PIN — to verify their permission to access a restricted system. A second factor of authentication would significantly secure access to privileged accounts, and the risk of unauthorised access to mission-critical servers would be reduced. An attacker who obtains compromised credentials would not be able to access a server, as it would not be in a position to provide the second form of identification, to complete the authentication process.
879. The Committee notes that the use of multi-factor authentication for all administrative account access is recommended in the CIS Controls.
77
We also PAM is a solution that helps organisations restrict privileged access within an existing Active Directory environment.
77
CIS Controls Version 7 at sub-control 4.5.



Download 5.91 Mb.

Share with your friends:
1   ...   240   241   242   243   244   245   246   247   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page