Table of contents exchange of letters with the minister executive summary


Service accounts with high privileges must be managed and



Download 5.91 Mb.
View original pdf
Page251/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   247   248   249   250   251   252   253   254   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019
40.6 Service accounts with high privileges must be managed and
controlled
904. A service account is a nonhuman account that is used to run services or applications. A service account is not an administrative account, nor is it a human user account, used by administrators or other employees. These accounts are the target of many malicious actors because they are often implemented in such away that they have privileged access.
905. The SA. account is a key example of this in the Cyber Attack. The SA. account has full administrative privileges to login to the Citrix server, including



COI Report – Part VII
Page 310 of 425

logging in interactively, and logging in remotely via RDP. In the context of the attack, the attacker used this account to login to Citrix Server 2 on multiple occasions in June 2018.
906. As detailed in the HITSPS, this account, being an unused account, should have been identified and disabled in order to prevent usage in unauthorised activity. Moving forward, there must be a recognition that such accounts with such high privileges need to be managed and controlled.
40.6.1
Establish clear policies in relation to the use and management of
service accounts
907. The compromise and use of the SA. account in the Cyber Attack clearly illustrates the real risk that presents when service accounts with high privileges are not properly managed and controlled. We note however that HITSPS is silent on the specific policies and measures in relation to the management of service accounts.
908. Because service accounts are not tied directly to a human, they must be treated differently from other accounts. A specific policy should be formulated in respect of service accounts. Examples of such policies include a) Longer Password Length – A policy requiring very long and complex passwords for service accounts is appropriate, as there is no memory burden on the part of a human user to remember such passwords. b) Longer Password Expiration – It is hard to set password expiration policies that are short because resetting a service account password may break an application. However, a policy requiring the password to be changed, albeit at a longer interval, should still be imposed. This is necessary as, in the event a password is compromised by an attacker, he would otherwise have perpetual access to the service account.



Download 5.91 Mb.

Share with your friends:
1   ...   247   248   249   250   251   252   253   254   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page