Table of contents exchange of letters with the minister executive summary



Download 5.91 Mb.
View original pdf
Page291/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   287   288   289   290   291   292   293   294   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019

COI Report – Part VII
Page 367 of 425

records in a database. As a priority, DAM must be implemented for those entries tagged as sensitive.
1069. Similarly, even if encryption and tokenisation cannot be applied to all databases wholesale for performance reasons, steps should nonetheless betaken to encrypt or tokenise sensitive data. This is because such data constitutes an obvious high-value target for attackers. All the measures we have proposed including encryption and tokenisation apply with particular urgency to such sensitive data.



COI Report – Part VII
Page 368 of 425

45 RECOMMENDATION #10: DOMAIN CONTROLLERS
MUST BE BETTER SECURED AGAINST ATTACK
#PREVENTION VIGILANCE
1070. Protecting CII in a Windows network environment necessarily requires protection of other components of the network. Domain controllers in particular must be secured, as compromise of a domain controller can lead to extremely serious consequences for the entire network.
1071. Windows domain controllers host the Active Directory Domain Services
(“AD DS”) database, in addition to providing the services and data that allow for effective management of servers, workstations, users, and applications. If privileged access to a domain controller is obtained by a malicious user, he has full control over the entire Windows domain and servers. The malicious actor can then modify, corrupt, or destroy the ADDS database and, by extension, all of the systems and accounts that are managed by active directory.
1072. An external consultant observed the following during the penetration test conducted on the H-Cloud in FY Domain Admin has full control on the servers in the network domain of the organization including creating administrator accounts in any local servers. By default, a Domain Admin account holder has complete unrestricted access to all resources in the entire network. By gaining Domain Admin access in an organisation, the following damages could happen Install ransomware to lock down the data. Access, tamper, destroy organizational IT resources. Create any number of accounts and grant them admin access in the Active Directory, such as OUs, admin accounts/Groups, etc. Place time-bombed malicious software on any domain-joined machine.



Download 5.91 Mb.

Share with your friends:
1   ...   287   288   289   290   291   292   293   294   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page