The SolarWinds supply chain attack against the US Government was the largest and most sophisticated breach in history. But despite nation-state's efforts to conceal their tactics, they left some highly-valuable clues about their methods that could be leveraged to sharpen supply chain attack defenses.
Reinforcing Privileged Access Management security could prevent supply chain attacks and improve compliance with Joe Biden's Cybersecurity Executive Order.
Privileged Access Management (PAM) is the process of monitoring and controlling users that have the authority to access sensitive business resources.
The goal of a cyber attack is to access sensitive data. Because only privileged accounts have access to this data, they are notoriously targeted by cybercriminals.
Compromised privileged accounts make data breaches possible. When a threat actor exploits privileged credentials, they have unmitigated access to sensitive business data.
Privileged accounts are not only compromised by criminals, they're also abused by insider threats.
Privileged Access Management is different to Access Control and Identity Access Management (IAM) in that PAM only focuses on securing administrative access of privileged users rather than authenticating and authorizing all user access.
PAM is also known as Privileged Account Management, Privileged Identity Management, and Privileged Session Management. Despite the slight nuances of each framework, the end-goal is the same - to secure and protect all accounts that have access to sensitive data.
No cybersecurity method is guaranteed to prevent supply chain attacks, however, reinforcing Privileged Access security could mitigate the risk of a successful attack.
This is because all supply chain attack strategies tend to follow the same 3 stage attack pattern:
This attack trajectory is known as the Privileged Pathway, summarized in the below graphic:

Nation-state criminals followed this sequence to compromise the SolarWinds Orion software.
Armed with this intelligence, the solution to protecting your digital supply chain attacks becomes obvious - disarm attackers by disrupting this attack sequence.
By strategically applying security tools and tactics, this is possible. But defense tactics will only be effective if they're applied to a solid Privileged Access Management foundation
The design of an effective Privileged Access Management framework begins by focusing on processes before any security tools are applied. Only after all processes have been firmly established, should security tools be introduced.
Security solutions are designed to support processes, not replace them. This hierarchy will empower organizations to clearly outline their security requirements first. This information can then be used to create a set of qualifications for the right tools.
There are 4 primary pillars of a reliable PAM framework.
All privileged accounts within an organization need to be identified. Flexible workplaces with remote workers need to take greater care to ensure all dispersed endpoints are accounted for.
Privileges user access activity is highly volatile, new users are continuously being added and the access requirements of old users are always changing
The process discovery and monitoring should be ongoing to avoid the exploitation of overlooked privileged access accounts.

With all privilege accounts identified, they can now be secured. The best method of security is to assign each user the minimal access requirements they need, don't grant access to resources unless it's absolutely necessary
The just-in-time access framework helps enforce time-based limitations. JIT access places an expiry date on each account so that access is only granted when it is needed, for the length of time it is needed, NO LONGER.
The Principal of Least Privilege (POLP) is another effective limitation framework that ensures each user is assigned the minimum access levels they need.
Privileged accounts can only be effectively managed if they are meticulously tracked. A baseline for normal privileged activity should be established to contrast suspicious events.
All tracked privileged access activity should be recorded to assist investigations in the event of a data breach.
Like all cybersecurity efforts, a PAM framework needs to be scalable.
Automation will assist with the volatility of privilege access requirements and improve the reliability of the entire framework by removing the human errors that often result from repetitive tasks.
To mitigate supply chain attacks, defense mechanisms need to be placed along the Privilege Pathway commonly traversed by cybercriminals.
Two lines of defense should be established - one outside of the ecosystem and the other within.
This initial line of defense should be the primary cyber defense effort since cyber threats are much harder to intercept after they've been injected.
Such an outward focus is only possible if defense methodologies are proactive, as opposed to static and reactive.
Instead of waiting for external threats to test perimeter defenses, all vulnerabilities should be discovered and preemptively remediated before they're exploited by cybercriminals.
There are 5 proactive defense methods that could prevent supply chain attackers from infecting critical systems.
Staff are usually the first targets in the crosshairs of cyberattackers because they can be used as gateways into an ecosystem.
Every individual in an organization needs to be aware of the common tactics used by cybercriminals to avoid being compromised.
Each of the following common attack methods links to a post that can be used for cybercrime awareness training:
As an additional safety net, Multi-Factor authentication should be implemented, This will both stall and surface security breach attempts when staff members fall victim to criminal trickery.
Perimeter penetration is the first stop of the Privilege Pathway. By preventing staff from being used as attack vectors, a significant percentage of supply chain attacks will be avoided.
A Zero Trust Architecture (ZTA) assumes all network traffic is malicious. This pessimistic mindset forces internal systems and staff to remain focused on surfacing and remediating potential threats.
A Zero Trust Architecture is deployed in 7 stages:
Read this post to learn how to deploy a Zero Trust Architecture.
In a supply chain attack, organizations are breached through compromised vendors. To mitigate the risk of such incidents, third-party security efforts should be continuously monitored and scrutinized.
Third-party attack surface monitoring solutions, such as Vendor risk, help organizations remain aware of all vulnerabilities within their vendor network.
By surfacing and remediating these vulnerabilities before they are discovered by cyberattackers, the risk of supply chain attackers is reduced.
Organizations with a substantial vendor network can entrust the complete scope of Third-Party Risk Management to expert analysts to scale their Privileged Access Management security most efficiently.
A data leak is an unintentional exposure of sensitive data, if these leaks are discovered by cybercriminals, that could be used to launch a successful supply chain attack.
Most organizations are unaware of the dangerous data leaks placing them at a heightened risk of a data breach. They are even less aware of the data leaks placing their vendors at risk of a breach.
If a data leak is detected and remediated before it's discovered by cybercriminals, it will not have a chance to develop into a data breach.
The early discovery of a leak could, therefore, prevent a supply chain attack.
Conventional solutions only monitor for data leaks internally. By overlooking the third-party network, the vulnerabilities that are exploited in supply chain attacks aren't being remediated.
UpGuard rectifies this displaced focus by monitoring for data leaks both internally, and throughout the vendor network.
This monitoring and remediation effort can also be entrusted to a team of expert analysts to scale Privileged Access Management security most efficiently.
Cyberattack awareness training, coupled with least privilege policies for all user accounts, will dramatically reduce the chances of threat injection.
If a staff member unintentionally introduces a threat into the ecosystem, it could be blocked from accessing sensitive resources if least privileged policies are in place.
An Identity and Access Management (IAM) protocol will help you efficiently deploy, track and maintain all endpoint policies.
To overcome the logistical difficulties of endpoint security management across a variety of operating systems, Active Directory Bridging solutions should be implemented.
Active Directory (AD) Bridging solutions centralize the management of all endpoint security policies into a single solution.
Microsoft Kerberos is an example of an AD bridging solution that can extend its authentication policies across Unix, Linux, and Mac devices.
Should a threat penetrate the first line of defense, sensitive data resources can still be protected if the right internal defense mechanisms are in place.
Here are 3 internal cyber defense options. To maximize potency, all of these mechanisms should operate in parallel.
The integration of a PAM and IAM solution creates a multi-layered access security framework that could prevent threats from penetrative sensitive resources.
There are multiple security and administrative benefits of an IAM solution.
An IAM empowers organizations to:
Administrative account activity should be continuously monitored to surface and report anomalies as quickly as possible.
Such obsessive monitoring habits are a natural result of implementing a Zero Trust architecture.
A baseline of admin account activity needs to be established first to accurately surface suspicious movements.
All internal data should be encrypted, not just critical asset data. When a threat is injected into an ecosystem, it moves laterally throughout the network seeking privileged accounts to target.
The pathway to these accounts could be obfuscated with encryption efforts.
Encryption at rest is a commonly adopted encryption method, preferenced for its affordability. This method only encrypts sensitive information when it is at rest or being transferred.
Encryption at rest is not a safe encryption method. Cyberattackers have developed multiple methods of circumventing static encryption methods. These include cryptographic attacks, stolen ciphertext attacks, and cryptanalysis.
Advanced Encryption Standard (AES) is a highly secure encryption algorithm developed by the National Institute of Standards and Technology (NIST). The United States Government uses this algorithm to protect its sensitive data.
Most attacks (with the exception of brute force attacks) could be obstructed if an AES is in place.
The less privileged accounts there are, the less likely a privileged breach will occur. In the spirit of least privileges, only non-privileged accounts should be used to conduct routine administrative tasks.