The Privileged Access Problem: GAO Report Points to Vulnerabilities in Pentagon’s Advanced Weapon

Share and earn Cybytes
Facebook Twitter LinkedIn Email

The Government Accountability Office (GAO) recently released a scathing report highlighting the critical vulnerabilities that malicious attackers could exploit to take complete control of Defense Department advanced weapon systems. Many of the findings point to poor privileged access security practices – a major underlying problem that has long existed throughout federal IT infrastructure.

The failure to secure privileged access is at the heart of the most damaging security breaches. It’s absolutely critical that agencies and the organizations they do business with lock down privileged access, which includes credentials and accounts.

I wrote a piece for GCN outlining three steps agencies should take to better protect their most sensitive credentials and strengthen their overall security posture. Following are some excerpts:

  • Admit there’s a problem. In the last three years, the GAO has issued multiple reports that indicated an agency or system had pervasive problems with privileged access security. The Office of Management and Budget (OMB) issued its own report in April in partnership with the Department of Homeland Security (DHS), revealing that only 55 percent of agencies limit access based on user attributes and roles – and only 57 percent review and track administrative privileges at all. The first step to better security is understanding – and admitting – there’s a problem. Then taking action.
  • Change default passwords. Default passwords are the factory-set passwords for the administrative accounts of a system. They exist so that developers and administrators can easily set up a technology ‘out of the box,’ and they exist everywhere – on home routers, networked printers and even advanced weapon systems. The Pentagon used off-the-shelf and open-source software with default passwords, but never changed them. As the GAO testers found out, default passwords are typically easy to find through a simple internet search – which mean that not changing them is a failure of basic security hygiene.
  • Secure near-siders. While the Pentagon was able to prevent exploitation of the weapon system from remote users, it struggled in stopping potential insiders and near-siders (contractors and third parties who function as an insider with the same privileged access as someone inside the organization). Attackers seek both insider and near-siders to steal their access credentials and then escalate privileges until they’re able to take control of a system.

Establishing a strong security posture starts with ensuring good cyber hygiene, and securing these known vulnerabilities is a must. The privileged access problem is a clear and present threat, and the government simply can’t afford to wait for disaster to strike before addressing it.

Editor’s Note: Read the full GCN piece to delve deeper into the GAO report’s findings and explore ways agencies and government organizations can address the privileged access problem.

The post The Privileged Access Problem: GAO Report Points to Vulnerabilities in Pentagon’s Advanced Weapon Systems appeared first on CyberArk.

Share this post and earn Cybytes
Facebook Twitter LinkedIn Email
About CyberArk
CyberArk is the only security company that proactively stops the most advanced cyber threats – those that exploit insider privileges to attack the heart of the enterprise. The company has pioneered a new category of targeted security solutions to lock down privileged accounts and protect against cyber threats before attacks can escalate and do irreparable business damage. CyberArk is trusted by the world’s leading companies – including more than 40 of the Fortune 100 – to protect their highest value information assets, infrastructure and applications, while ensuring tight regulatory compliance and audit requirements.
Promoted Content
Advanced cyber attacks involve compromised privileged accounts. Cyber attackers target them because they represent the keys to the IT kingdom. Effective enterprise security includes proactively protecting privileged accounts. Industry experts have identified practices that increase an organization’s vulnerability to a cyber attack. How many of these are common at your organization?

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?