Detecting Abuse of Authentication Mechanisms – Abridged

5Mind. The Meme Platform

Summary

Malicious cyber actors are abusing trust in federated authentication environments to access protected data. An “on premises” federated identity provider or single sign-on (SSO) system lets an organization use the authentication systems they already own (e.g. tokens, authentication apps, one-time passwords, etc.) to grant access to resources, including resources in “off premises” cloud services. These systems often use cryptographically signed automated messages called “assertions” shared via Security Assertion Markup Language (SAML) to show that users have been authenticated. When an actor can subvert authentication mechanisms, they can gain illicit access to a wide range of an organizations assets.

In some cases, actors have stolen keys from the SSO system that allow them to sign assertions and impersonate any legitimate user who could be authenticated by the system. On 7 December, NSA reported on an example where a zeroday vulnerability was being used to compromise VMware Access®1 and VMware Identity Manager®2 servers, allowing actors to forge authentication assertions and thus gain access to the victim’s protected data. In other cases, actors have gained enough privileges to create their own keys and identities such as “service principals” (cloud applications that act on behalf of a user) or even their own fake SSO system. According to public reporting, in some cases, the SolarWinds Orion®3 code compromise provided actors initial access to an on-premises network which led to access within the cloud.

Note that these techniques alone do not constitute vulnerabilities in the design principles of federated identity management, the SAML protocol, or on-premises and cloud identity services. The security of identity federation in any cloud environment directly depends on trust in the on-premises components that perform authentication, assign privileges, and sign SAML tokens. If any of these components is compromised, then the trust in the federated identity system can be
abused for unauthorized access.

To defend against these techniques, organizations should pay careful attention to locking down SSO configuration and service principal usage, as well as hardening the systems that run on-premises identity and federation services. Monitoring the use of SSO tokens and the use of service principals in the cloud can help detect the compromise of identity services. While these techniques apply to all cloud environments that support on-premises federated authentication, the following specific mitigations are focused on Microsoft Azure®4 federation. Many of the techniques can be generalized to other environments as well.

Disclaimer of Endorsement

The information and opinions contained in this document are provided “as is” and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.

Purpose

This document was developed in furtherance of NSA’s cybersecurity missions, including its responsibilities to identify and disseminate threats to National Security Systems, Department of Defense, and Defense Industrial Base information systems, and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders.

Contact

Client Requirements / General Cybersecurity Inquiries: Cybersecurity Requirements Center, 410-854-4200, Cybersecurity_Requests@nsa.gov

Media inquiries / Press Desk: Media Relations, 443-634-0721, MediaRelations@nsa.gov

Detecting Abuse of Authentication Mechanisms – Abridged

AUTHENTICATION_MECHANISMS_CSA_EXEC_U_OO_198854_20

Detecting Abuse of Authentication Mechanisms

AUTHENTICATION_MECHANISMS_CSA_U_OO_198854_20

Contact Your Elected Officials
The Thinking Conservative
The Thinking Conservativehttps://www.thethinkingconservative.com/
The goal of THE THINKING CONSERVATIVE is to help us educate ourselves on conservative topics of importance to our freedom and our pursuit of happiness. We do this by sharing conservative opinions on all kinds of subjects, from all types of people, and all kinds of media, in a way that will challenge our perceptions and help us to make educated choices.

New Book Warns Failure of Congress to Defend Separation of Powers Fuels Rise of Authoritarianism

The Book Congress: An Irrelevant Institution or Guardian of the Republic argues that Congress's decline threatens the Constitution’s separation of powers.

What Happens to State Sovereignty When Federal Money Stops?

What happens to state sovereignty when the federal government can no longer afford to subsidize 36% of state budgets, on average?

Japanese Nationalists vs. the Replacement Migration Machine

Japan has begun to falter in its resolute refusal to embrace the mass migration regime that international governments and NGOs had demanded it do.

CIA is On Tucker Carlson for Talking to Iran

“They read my text messages” and the Central Intelligence Agency is trying to “frame me as a foreign agent,” alleged Tucker Carlson.

The EU Poses A Much More Credible Threat To Russia Than The Inverse

Unlike back in June 1941, Russia is now a nuclear superpower, and that might be the only factor that deters the EU from invading Russia.

Virginia Democrats Pass Sweeping Agenda in First Trifecta Session but Adjourn Without a Budget

Virginia Democrats ended their first trifecta session, passing bills raising the minimum wage, banning assault firearms, limiting ICE cooperation, and expanding paid leave.

Judge Blocks RFK Jr.’s Appointees to Vaccine Panel

A federal judge in Massachusetts ruled that Health Sec. Robert F. Kennedy Jr. illegally appointed 13 new members to an influential vaccine panel.

US Coast Guard Intercepts Semi-Submersible in Pacific Carrying 17,600 Pounds of Cocaine

17,600 pounds of cocaine were seized from a smuggling vessel—enough to produce more than 6 million potentially lethal doses, officials said.

MAHA Movement Emphasizes Shift Away From Glyphosate to Regenerative Farming, Eating Real Food

Weeks after Trump’s glyphosate executive order, many MAHA proponents believe that awareness about chemicals and regenerative farming is on the rise.

Trump Puts China Visit on Hold Amid Iran War

As the Iran war continues, President Donald Trump said he would delay his long-awaited trip to Beijing, originally set for the end of this month.

White House Outlines Vision for Underground Visitor Screening Facility

The 33,000-square-foot facility proposed beneath Sherman Park would process visitors entering the White House and could open by mid-2028 if approved.

Trump Signs Order Assigning Vance to Head Anti-Fraud Task Force

President Donald Trump signed an executive order on March 16, officially creating an anti-fraud task force headed by Vice President JD Vance.

US Opens New Trade Probes Targeting 60 Countries Over Alleged Forced Labor Practices

The U.S. has launched trade probes into 60 economies to investigate whether their trade practices allow imports produced with forced labor.
spot_img

Related Articles

Popular Categories

MAGA Business Central