FIELD: providing security of a corporate network.
SUBSTANCE: technical result is achieved by a method for preventing compromise of network infrastructure objects (NIO) in the FreeIPA directory service, in which: obtaining data from the FreeIPA domain controller storage, which characterize the control NIO and their attributes, the access rights granted to them, as well as reference books of links between said NIO; determining FreeIPA highly privileged objects (HVA); determining types of NIO relations between themselves; forming a graph based on the obtained data; HVA attack path is simulated using the generated graph, at which determining at least one subgraph with NIO, allowing to obtain control over HVA, or related NIO; HVA is monitored based on the simulated attack path; and in case of determination of change of access rights of NIO, detected on subgraph, performing isolation of links of at least one detected NIO from other objects and/or reduction of its privileges by removal of rights.
EFFECT: high efficiency of protecting a corporate network from compromising facilities and gaining access to highly privileged assets.
11 cl, 3 dwg, 2 tbl
Title | Year | Author | Number |
---|---|---|---|
METHOD AND SYSTEM FOR PREVENTING UNAUTHORIZED ACCESS TO CORPORATE NETWORK OBJECTS | 2022 |
|
RU2799117C1 |
TECHNOLOGIES FOR PROVIDING NETWORK SECURITY THROUGH DYNAMICALLY ALLOCATED ACCOUNTS | 2015 |
|
RU2691211C2 |
STRATEGIES TO STUDY VULNERABILITIES AND TO SUPPRESS VULNERABILITIES CAUSED BY CAPTURING ACCOUNT DATA | 2007 |
|
RU2462753C2 |
EXPERT ANALYSIS OF SYSTEM AND GRAPHIC DISPLAY OF PRIVILEGES ESCALATION ROUTES IN COMPUTING ENVIRONMENT | 2006 |
|
RU2421792C2 |
MEANS OF CONTROLLING ACCESS TO ONLINE SERVICE USING CONVENTIONAL CATALOGUE FEATURES | 2011 |
|
RU2598324C2 |
CONTAINER-CONTROLLING AND DISPATCHING SYSTEM | 2019 |
|
RU2751576C2 |
CONTROL AND CONTAINERS DISPATCHING SYSTEM | 2015 |
|
RU2666475C1 |
CONTAINER CONTROL AND DISPATCHING SYSTEM | 2015 |
|
RU2704734C2 |
INTERACTING MODULE FACILITIES FOR COLLECTION OF AUTHENTICATORS AND ACCESS | 2004 |
|
RU2369025C2 |
SYSTEM AND METHOD FOR TARGET INSTALLATION OF CONFIGURED SOFTWARE | 2012 |
|
RU2523113C1 |
Authors
Dates
2024-09-10—Published
2023-12-20—Filed