Detecting Abuse of Authentication Mechanisms – Abridged

Summary

Malicious cyber actors are abusing trust in federated authentication environments to access protected data. An ā€œon premisesā€ federated identity provider or single sign-on (SSO) system lets an organization use the authentication systems they already own (e.g. tokens, authentication apps, one-time passwords, etc.) to grant access to resources, including resources in ā€œoff premisesā€ cloud services. These systems often use cryptographically signed automated messages called ā€œassertionsā€ shared via Security Assertion Markup Language (SAML) to show that users have been authenticated. When an actor can subvert authentication mechanisms, they can gain illicit access to a wide range of an organizations assets.

In some cases, actors have stolen keys from the SSO system that allow them to sign assertions and impersonate any legitimate user who could be authenticated by the system. On 7 December, NSA reported on an example where a zeroday vulnerability was being used to compromise VMware AccessĀ®1 and VMware Identity ManagerĀ®2 servers, allowing actors to forge authentication assertions and thus gain access to the victimā€™s protected data. In other cases, actors have gained enough privileges to create their own keys and identities such as ā€œservice principalsā€ (cloud applications that act on behalf of a user) or even their own fake SSO system. According to public reporting, in some cases, the SolarWinds OrionĀ®3 code compromise provided actors initial access to an on-premises network which led to access within the cloud.

Note that these techniques alone do not constitute vulnerabilities in the design principles of federated identity management, the SAML protocol, or on-premises and cloud identity services. The security of identity federation in any cloud environment directly depends on trust in the on-premises components that perform authentication, assign privileges, and sign SAML tokens. If any of these components is compromised, then the trust in the federated identity system can be
abused for unauthorized access.

To defend against these techniques, organizations should pay careful attention to locking down SSO configuration and service principal usage, as well as hardening the systems that run on-premises identity and federation services. Monitoring the use of SSO tokens and the use of service principals in the cloud can help detect the compromise of identity services. While these techniques apply to all cloud environments that support on-premises federated authentication, the following specific mitigations are focused on Microsoft AzureĀ®4 federation. Many of the techniques can be generalized to other environments as well.

Disclaimer of Endorsement

The information and opinions contained in this document are provided “as is” and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.

Purpose

This document was developed in furtherance of NSAā€™s cybersecurity missions, including its responsibilities to identify and disseminate threats to National Security Systems, Department of Defense, and Defense Industrial Base information systems, and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders.

Contact

Client Requirements / General Cybersecurity Inquiries: Cybersecurity Requirements Center, 410-854-4200, Cybersecurity_Requests@nsa.gov

Media inquiries / Press Desk: Media Relations, 443-634-0721, MediaRelations@nsa.gov

Detecting Abuse of Authentication Mechanisms – Abridged

AUTHENTICATION_MECHANISMS_CSA_EXEC_U_OO_198854_20

Detecting Abuse of Authentication Mechanisms

AUTHENTICATION_MECHANISMS_CSA_U_OO_198854_20

Hot this week

Incoming Trump Team Influences Huge Slash In Mega-Pork Bill

This may come as a shock to you, but the government has shut down over 20 times in the last few decades, and... that's right, nobody noticed.

IRS Sending $2.4 Billion in Payments to 1 Million Taxpayers Who Missed Out on Stimulus Checks

$2.4 billion worth of automatic payments will be sent out in Dec by the IRS to taxpayers eligible for a pandemic-era tax break but didnā€™t claim the COVID cash.
00:00:24

Kari Lake Shares Her Vision for Voice of America

Kari Lake described how she intends to reshape Voice of America, committing to unbiased, editorially independent coverage while reiterating her loyalty to Trump.

Elon Musk Says He Plans to Fund Moderate Democratic Primary Challengers

Elon Musk to fund moderate challengers in Democratic primary races, responding to Democrat lawmaker saying Musk has outsized influence on American politics.

US Military Bases, Sensitive Sites Targeted by Drones for Years

US military bases are sensitive sites targeted by adversarial drones, most likely coming from the Peopleā€™s Republic of China,ā€™ Rep. Michael McCaul said.

Topics

Incoming Trump Team Influences Huge Slash In Mega-Pork Bill

This may come as a shock to you, but the government has shut down over 20 times in the last few decades, and... that's right, nobody noticed.

IRS Sending $2.4 Billion in Payments to 1 Million Taxpayers Who Missed Out on Stimulus Checks

$2.4 billion worth of automatic payments will be sent out in Dec by the IRS to taxpayers eligible for a pandemic-era tax break but didnā€™t claim the COVID cash.
00:00:24

Kari Lake Shares Her Vision for Voice of America

Kari Lake described how she intends to reshape Voice of America, committing to unbiased, editorially independent coverage while reiterating her loyalty to Trump.

Elon Musk Says He Plans to Fund Moderate Democratic Primary Challengers

Elon Musk to fund moderate challengers in Democratic primary races, responding to Democrat lawmaker saying Musk has outsized influence on American politics.

US Military Bases, Sensitive Sites Targeted by Drones for Years

US military bases are sensitive sites targeted by adversarial drones, most likely coming from the Peopleā€™s Republic of China,ā€™ Rep. Michael McCaul said.
00:01:31

Pandemic 2.0 Unleashed? California Declares State of Emergency Amid Bird Flu Propaganda Blitz

A couple of weeks ago Dr. Peter Hotez forecasted ā€œbig picture stuff coming down the pike starting on January 21stā€Ā the day Donald Trump assumes office.
00:03:13

Saving Sgt. Penny

Daniel Penny joined dignitaries at the Army-Navy football game invited by J.D. Vance.Ā  If it was up to the left, Penny would be in jail for the rest of his life.
00:02:39

White House Signals Support for House-Passed Funding Bill

Biden won't stand in way of funding government until mid-March. Included is $110 billion for disaster relief, $30 billion in farm aid, and year extension to farm bill.
spot_img

Related Articles

Popular Categories

spot_imgspot_img