A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Cybersecurity: Lost Your Keys? Breadcrumb Home Insights Blog Cybersecurity: Lost Your Keys? September 03, 2019 Cybersecurity: Lost Your Keys? From time to time we all lose our keys. The solution for physical keys is simple – find the spare set and head down to your local hardware store so they can make you a new set. The only time you have to worry about re-keying is when there isn’t a spare set. None of this is a huge deal, because what are the chances that whoever finds your lost key will try it in enough locks to miraculously find your door? But what if your keys are stolen? And what if they were stolen from a third party with whom you’d shared them? Then things get a little more complicated as you may have to change the locks. It’s an inconvenience for sure, but not a catastrophe. In the cyber world these scenarios differ in one important way: in the case of theft the culprit may well know what door – or in the digital space, what services – can be accessed with those keys. Your risk increases further when the stolen keys came from a trusted third party that offers the very services the keys are used to access. When this happens you must re-key. In some situations, re-keying might be as simple as changing a user’s password or re-generating an API secret key. Then you update the places where those authentication items are used. In other cases, though, there may be hundreds of users or services utilizing the stolen API key, making the update process a far more tedious one. In these complicated situations, where there’s a time delay involved in re-keying, you should consider these additional monitoring steps: Place extra scrutiny on all successful authentication events: Who is the user or service? Does this user or service typically access the third-party service? Where is this user or service located? Is the user or service operating during standard working hours? Enforce multi-factor authentication for password-based access Turn off all unused API endpoints Restrict access to used API endpoints by known sources Subscribe to monitoring services that identify if batches of stolen credentials are for sale When the inevitable happens It’s a given that from time-to-time service providers will lose our keys, so what can we do to pre-empt and limit the impact? Consider: Require multi-factor authentication for password-based access Enforce additional authentication challenges for any suspicious access Automate key rotation Enforce privilege access management for privileged accounts These sorts of breaches are annoying under the best of circumstances (and catastrophic in the worst), but the good news is there are tried and true ways of mitigating the damage. If you have questions, give us a call. By: Optiv Share: Threat
Would you like to speak to an advisor? How can we help you today? Image E-Book Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation Download Now Image Events Register for an Upcoming OptivCon Learn More Ready to speak to an Optiv expert to discuss your security needs?