Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Blog Directory  >  Technology Blogs  >  ABCs of UEBA: U is for User technology Blog  > 

Abcs Of Ueba: U Is For User Blog


gurucul.com/blog
If you ask penetration testers what the easiest path into a target is, the chances are very, very good that they’ll say “users.” If you ask malicious actors – if you could find one who was willing to answer, that is – chances are good they would say the same thing. With the exception of the occasional zero-day exploit, or old and unpatched exploit, attacks against an organization’s users are the most frequent vector. You need to be able to monitor user behavior to detect and stop advanced cyberattacks that target users continuously. The reality is that users are only Human. As such, users are subject to the usual Human failings and foibles. They get tired. They get distracted. They get lonely. They get careless. They are subject to flattery, threats, confusion, and a myriad of other things that come with being organic social beings. And all that boils down to Humans being the weakest link in almost every organization’s security chain. Scary Attack Surface or First Line of Defense? That said, users can also be an organization’s first line of defense. A security conscious user that recognizes a suspicious email, or even unusual activity at their office, and alerts security operations could be what stops an attacker from successfully breaching their target. That comes down to user education and, at least as important, a security conscious culture where they work. With the right training and attitude, user behavior can go from being part of the threat surface to a robust layer of defense. In an ideal world we’d have just that. All our colleagues would be adequately trained and could consistently identify and avoid the social engineering, spear phishing, and cast-netting attempts that came their way. Cast-netting, for those who may not have heard the term, refers to phishing attacks that are limited to a single organization. They don’t care who in the organization they get, much like throwing a net into a small pond. These are more focused than Spear phishing, which targets a single person, and can be very effective for an attacker. But, as we know, our users are Human. Fallible, deceivable, imperfect, Humans. Humans are Human What that means is that we will have threat actors abusing our users to get into our environments. It’s happened before, in some very high-profile cases, and it will happen again. Bad people do bad things, and our users take the brunt of it. And this doesn’t even go into the cases where the users are the malicious actors. Being able to monitor user behavior is key to identifying and stopping malicious insiders as well as cybercriminals who have compromised a user’s legitimate account. Intentionally, or not, the Insider Threat use case is still a major issue. Users who have chosen to do something bad have a leg up on the baddie who’s leveraged social engineering or phishing to grab a user’s identity. They’re already inside. They know at least some of the defenses and can try and work around them, and they know where at least some, if not all, of their targets are. No need for a sneaky search through the archives to find the Holocron. They know where it’s stored. They will only be caught if you can detect when their user behavior changes from normal to nefarious. Defend for the Worst Case This all boils down to our need to build defenses that can handle cases where the users, one of the assets we’re trying to protect, is the source of the threat. Fortunately, we have a number of tools that help protect us from user compromise. For example, multi-factor authentication can help prevent credential abuse if the user has their credentials phished, social engineered, or otherwise acquired by someone who shouldn’t have them. Identity and Access Management (IAM) systems work hand in hand with MFA to make sure users are really who they say they are. Data Loss Protection (DLP) systems or Digital Loss Prevention, if you prefer, can help keep malicious actors from absconding with the organization’s crown jewels, while deception technologies can keep an attacker from finding them in the first place by sending them on a wild goose chase. There’s malware and anti-virus prevention tools to go with Endpoint Detection and Response (EDR) to help protect the endpoints. And finally, where we tie them all together, in User and Entity Behavior Analytics. This is where we proactively monitor user behavior in real-time with advanced security analytics to detect when a user’s behavior changes – and potentially becomes a threat. Users Are Entities Too Users, and the systems, or “entities” they work with, all have distinct behaviors they exhibit day to day as they do what they do. Everything from when and where they log in from, to what systems they interact with, to the assets they normally access or create, form a baseline. And when we see deviations from that baseline, we recognize it, classify it, and assign a risk score to reflect just how much of a risk that unusual user behavior represents. It’s said you can steal a user’s credentials, but you can’t steal user behavior. Likewise, when an insider decides to do something nefarious, they’re going to act differently from how they normally act. In either case, they are doing something unusual and that’s what gives them away. User behavior can be identified as being anomalous by seeing how users and entities interact in context with an advanced security analytics tool. Our users can be our scariest attack surface or our first line of defense. Gurucul UEBA helps on either end, by recognizing when something’s gone wrong and helping see the subtle patterns when everything else is going right.
10 Questions To Ask SIEM Providers
2024-04-01 13:39
As organizations increasingly prioritize cybersecurity, finding the right Security Information and Event Management (SIEM) solution becomes crucial. SIEM providers play a v… Read More
Understanding Your SIEM Options
2024-01-30 08:58
SIEM solutions are a crucial cornerstone for organizations facing multifaceted challenges in safeguarding their critical digital assets. With a variety of deployment modes… Read More
2023-11-16 14:09
In today’s ever-evolving cybersecurity landscape, organizations face a myriad of threats that require advanced security measures to detect and mitigate external and i… Read More
2023-11-10 11:24
Insider Threat Solution Demo Overview Get the perspective of an analyst using the Gurucul platform to detect true insider threats, collaborate with cross-functional stakeho… Read More
How To Choose The Right SIEM Solution
2023-10-11 08:35
In the ever-evolving landscape of cybersecurity, selecting the right Security Information and Event Management (SIEM) solution is a critical decision for organizations seek… Read More
Famous Insider Threat Cases
2023-08-28 12:40
Insider threats are the biggest security risk for organizations because they can cause the most destruction. From taking advantage of privileged access to stealing company… Read More
2023-07-18 13:24
Insider threats are the biggest cyber security issue for companies and big organizations because they can cause the most damage. These types of cyber security threats are a… Read More
2023-04-23 16:09
Security analytics is a proactive approach to cybersecurity that correlates and analyzes data to detect anomalies and unusual user and entity behavior that may indicate cyber threats… Read More
2023-03-31 19:30
In this blog we talk about the future of XDR in Security Operations. What does Extended Detection and Response (XDR) mean in the context of all the different security operation solutions in… Read More
2023-03-10 15:58
User and Entity Behavior Analytics (UEBA) is a cybersecurity solution that analyzes the behavior of users and machine entities using machine learning and mathematical algorithms to detect an… Read More
2023-01-31 12:18
For most current SIEMs, their primary function is to collect and ingest data, primarily logs, across the entire network. While the core function and deployment of the SIEM has been for loggi… Read More
Gurucul Is A Top 3 SIEM
2022-12-07 00:57
2022 Gartner® Critical Capabilities for SIEM has Spoken While the Gartner Magic Quadrant for SIEM is critical in evaluating vendors, according to Gartner: “As an essential companio… Read More
Machine Learning 101
2022-11-29 15:14
Machine Learning is ingrained in our day-to-day life. It is part of our spam filters mechanism, voice command smartphone interpretation and any search on Google. Alexa, what time is it? Chan… Read More

Share the post

ABCs of UEBA: U is for User

×

Subscribe to Abcs Of Ueba: U Is For User

Get updates delivered right to your inbox!

Thank you for your subscription

×