Go back

Frosty Trails: Threat-Hunting for Identity Threats in Snowflake

Threat Hunting for Identity Threats in Snowflake

Contents

The Snowflake platform has revolutionized how organizations store, process, and analyze large volumes of data. It offers a fully-managed data warehouse-as-a-service solution, providing a scalable and flexible architecture allowing seamless data integration from multiple sources. 

As Snowflake rises in popularity as one of the top ten cloud vendors in the world, its attractiveness to organizations also draws the attention of malicious attackers. The platform’s widespread adoption and extensive use in storing valuable data make it a lucrative target for cyber threats. As a result, you must implement security measures, stay vigilant against emerging threats, and continuously update your defense mechanisms to safeguard Snowflake data sharing and infrastructure from potential attackers.

This post will help you grasp how to use Snowflake’s built-in logging features for your security operation routine. We will explore the relevant data Snowflake exposes for hunting and describe ten threat scenarios and how to detect them. We will also share a script to execute them and perform quick threat-hunting operations in your environment to stay secure and audit-ready.

What is Snowflake?

Snowflake is a cloud-based data platform that provides a fully managed and scalable solution for storing, processing, and analyzing large volumes of data. It is designed to work on top of popular cloud providers like Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). Snowflake is built with a unique architecture that separates storage and computing, allowing identities to scale resources independently based on their needs. 

This architecture, combined with its ability to process semi-structured and structured data, enables Snowflake to deliver high performance and cost-efficiency for data workloads of any size. As we’ll see in the next section, a Snowflake account can hold multiple databases without taking care of the infrastructure.

Key Snowflake Logging Features

Each Snowflake account has a default database called “SNOWFLAKE”. It is a shared read-only database that holds metadata and historical usage data related to the objects within your organization and accounts.  

The SNOWFLAKE database has a built-in schema called “ACCOUNT_USAGE“, which is a system-defined schema containing a set of views providing access to comprehensive and granular usage information for the Snowflake account. It is a valuable tool for monitoring and understanding how resources are utilized within your Snowflake environment. 

The schema includes views that cover 

  • user activity
  •  query history
  •  warehouse usage
  •  login history
  •  data transfer details, and more.  

There are more logging mechanisms in Snowflake, such as INFORMATION_SCHEMA and READER_ACCOUNT_USAGE. During this post, we will rely on the following ACCOUNT_USAGE views:

Exploring ACCOUNT_USAGE

By default, each Snowflake account has a database called SNOWFLAKE that is accessible to the ACCOUNTADMIN role. You can grant additional roles and have access through the following command:

GRANT imported privileges on database snowflake to role rezonate_integration; 

You can explore the available views by logging in as an ACCOUNTADMIN to your Snowflake account and performing the following steps:

  1. From the left pane, choose Data and then Databases.
  2. Select the SNOWFLAKE database and expand it.

Snowflake's ACCOUNT_USAGE schema

3. Expand ACCOUNT_USAGE and select any of the views within it.

Each available view in the schema has its own column structure. You can see the available columns for each view by clicking on the view name, choosing the Columns tab, and selecting “Explore available columns”.

Comprehensive documentation per view is available, including the retention period and logging latency.

Snowflake Data Governance – How to Access Snowflake Audit Logs

The Snowflake logs are accessible through a few methods, as you’ll see below.

1. Snowflake Console 

The most straightforward method of accessing the logs is logging in to a Snowflake account with a user that has read permissions to the  ACCOUNT_USAGE schema. Then, choose “Worksheets” from the left pane and ensure the worksheet is querying the correct data source. You should see something like the query browser below.

2. SnowSQL

SnowSQL is a command-line tool provided by Snowflake designed to interact with Snowflake’s data warehouse and execute SQL queries, manage data, and perform various administrative tasks. It acts as the official command-line client for Snowflake, allowing users to connect to their Snowflake accounts and work with data using SQL commands. Information about installing, configuring, and using it is available in Snowflake’s documentation.

3. Exporting to external storage

Snowflake facilitates data export to contemporary storage services like AWS S3 through  “Stage” functionality. The data exported from Snowflake can be saved in various file formats. You can find detailed information about Stages on Snowflake’s official documentation page

Once the Stage setup is complete and data is exported, you have the flexibility to utilize your preferred analysis tool to centralize the data in a location of your choice.

4. Snowflake SDKs

As well as the structured methods mentioned earlier, Snowflake supports native REST API accessible through different SDKs. It can be used by any script or tool for purposes like exporting data. An example is the Rezonate Threat-Hunting Tool, which takes advantage of Snowflake Python SDK to execute threat-hunting queries. We’ll find out more later in the blog. 

Besides the Python SDK, the Snowflake team has developed drivers for many popular languages, including .NET, NodeJS, and Go. The full list is available here.

10 Snowflake Threat-Hunting Techniques to Implement Now 

Now we’ve learned about Snowflake’s structure, basic permissions, and integrations, we can start threat-hunting. In this section, we will guide you through some critical threat-hunting scenarios to look out for and explain each. We will also mark the relevant Snowflake views, align them to the specific MITRE ATT&CK technique, and include our own query in Snowflake query syntax. Remember, you can copy and paste them directly to your worksheet.

It is important to highlight that some hunting queries may have false positives, depending on the environment and may need adjustments to reduce noisy results.

Scenario 1 – Brute Force on a Snowflake User

A brute force attack on a Snowflake user happens when an attacker uses trial-and-error to repeatedly submit different combinations of usernames and passwords and eventually gain unauthorized access. To hunt for this type of attack, you can search for an attacker that performed more than X failed login attempts on at least Y target users, failing or ending up with a successful login. In failure cases, the activity may result in a user’s lockout.

Relevant Snowflake View

Query

-- Get users who failed to login from the same IP address at least 5 times

select CLIENT_IP, USER_NAME, REPORTED_CLIENT_TYPE, count(*) as FAILED_ATTEMPTS, min(EVENT_TIMESTAMP) as FIRST_EVENT, max(EVENT_TIMESTAMP) as LAST_EVENT

from SNOWFLAKE.ACCOUNT_USAGE.LOGIN_HISTORY

where IS_SUCCESS = 'NO' and ERROR_MESSAGE in ('INCORRECT_USERNAME_PASSWORD', 'USER_LOCKED_TEMP') and FIRST_AUTHENTICATION_FACTOR='PASSWORD' and

      EVENT_TIMESTAMP >= DATEADD(HOUR, -24, CURRENT_TIMESTAMP());

group by 1,2,3

having FAILED_ATTEMPTS >= 5

order by 4 desc;

-- For Each result, check if the source IP address managed to login to the target user AFTER the "lastEvent" time

MITRE Technique

Scenario 2 – Password Spray on a Snowflake Account

A brute force attack on a Snowflake account involves an attacker repeatedly submitting different combinations of usernames and passwords to eventually manage to log in and gain unauthorized access. To hunt for any occurrence of this scenario, you can search for an attacker that performed more than 1 failed login attempt on at least Y unique target users, from the same IP address.

Relevant Snowflake View

Query

-- Get users who failed to login from the same IP address at least 5 times

select CLIENT_IP, REPORTED_CLIENT_TYPE, count(distinct USER_NAME) as UNIQUE_USER_COUNT, min(EVENT_TIMESTAMP) as FIRST_EVENT, max(EVENT_TIMESTAMP) as LAST_EVENT

from SNOWFLAKE.ACCOUNT_USAGE.LOGIN_HISTORY

where IS_SUCCESS = 'NO' and ERROR_MESSAGE in ('INCORRECT_USERNAME_PASSWORD', 'USER_LOCKED_TEMP') and FIRST_AUTHENTICATION_FACTOR='PASSWORD' and

      EVENT_TIMESTAMP >= DATEADD(HOUR, -24, CURRENT_TIMESTAMP());

group by 1,2

having UNIQUE_USER_COUNT >= 1

order by 3 desc;

-- For Each result, check if the source IP address managed to login to the target user AFTER the "lastEvent" time

MITRE Technique

Scenario 3 – Unauthorized Login Attempt to a Disabled/Inactive User

 In some cases, Snowflake user accounts might have been disabled due to security concerns or maybe even as part of employee off-boarding. Monitoring login attempts to disabled users can help you detect unauthorized activities.

Relevant Snowflake View

Query

-- Search for login attempts to disabled users

select *

from SNOWFLAKE.ACCOUNT_USAGE.LOGIN_HISTORY

where IS_SUCCESS = 'NO' and  ERROR_MESSAGE  = 'USER_ACCESS_DISABLED'

MITRE Technique

Scenario 4 – Login Attempt Blocked by Network Policy

Snowflake network policies are a set of rules that govern network communication and access control within the Snowflake data platform. A network policy can deny a connection based on the client’s characteristics, such as IP address, to enforce organization policy and reduce the chances of a compromised account in case of leaked credentials.
By searching for these failed logins we can identify violations of the organizational policies that may suggest compromised credentials.

Relevant Snowflake View

Query

-- Search for network policies blocked IP addresses

select *

from SNOWFLAKE.ACCOUNT_USAGE.LOGIN_HISTORY

where IS_SUCCESS = 'NO' and  ERROR_MESSAGE  = 'INCOMING_IP_BLOCKED' and EVENT_TIMESTAMP >= DATEADD(HOUR, -24, CURRENT_TIMESTAMP());

Scenario 5 – Exfiltration Through Snowflake Data Sharing

Snowflake administrators can share data stored in their accounts with other Snowflake accounts. An attacker might use shares to exfiltrate data from Snowflake resources stored on compromised accounts to external locations. Any unauthorized event of this nature is a big red flag.

Relevant Snowflake View

Query

-- Search for new data shares

select * 

from SNOWFLAKE.ACCOUNT_USAGE.QUERY_HISTORY 

where REGEXP_LIKE(QUERY_TEXT, 'create\\s+share\\s.*','i') or REGEXP_LIKE(QUERY_TEXT, '\\s+to\\s+share\\s.*','i')

and START_TIME>= DATEADD(HOUR, -24, CURRENT_TIMESTAMP());

MITRE Technique

  • Exfiltration | Transfer Data to Cloud Account| ATT&CK T1537 

Scenario 6 – Exfiltration Through Snowflake Stage

A Snowflake stage is an external storage location that serves as an intermediary for loading or unloading data into or from Snowflake, providing seamless integration with various cloud-based storage services. For example, an AWS S3 bucket can serve as a stage. You can use the following queries to search potential data exfiltration using this feature. 

Relevant Snowflake View

Query

-- Search for stage-related statements

select *

from SNOWFLAKE.ACCOUNT_USAGE.QUERY_HISTORY

where QUERY_TEXT ilike '%COPY INTO%'

and QUERY_TEXT ilike '%@%';

-- The following query will show the stages that were created in the last 24 hours
select * from SNOWFLAKE.ACCOUNT_USAGE.STAGES

where CREATED>= DATEADD(HOUR, -24, CURRENT_TIMESTAMP());

MITRE Technique

  • Exfiltration | Transfer Data to Cloud Account| ATT&CK T1537 

Scenario 7 – Persistency Through Snowflake Procedures & Tasks

Procedures and tasks are Snowflake features that automate and manage workflows.

  1. Snowflake Procedures: Procedures in Snowflake are user-defined scripts written in SQL or JavaScript that allow you to encapsulate a series of SQL or JavaScript statements as a reusable unit.
  2. Snowflake Tasks: Tasks are scheduled operations that automate repetitive tasks or workflows. They are defined using SQL or JavaScript and can include SQL queries, DML statements, or calls to procedures. Tasks are scheduled to run at specific intervals, such as hourly, daily, or weekly, making them ideal for automating data pipelines and regular data processing.

An attacker might utilize procedures and tasks to maintain persistently in the organization or exfiltrate data over time.

Relevant Snowflake View

Query

-- Search for new tasks

select *

from SNOWFLAKE.ACCOUNT_USAGE.QUERY_HISTORY 

where REGEXP_LIKE(QUERY_TEXT, '.*CREATE\\s+(OR\\s+REPLACE\\s+)?TASK.*', 'i')

and START_TIME >= DATEADD(HOUR, -24, CURRENT_TIMESTAMP());

-- Search for new procedures

select *

from SNOWFLAKE.ACCOUNT_USAGE.QUERY_HISTORY 

where REGEXP_LIKE(QUERY_TEXT, '.*CREATE\\s+(OR\\s+REPLACE\\s+)?PROCEDURE.*', 'i')

and START_TIME >= DATEADD(HOUR, -24, CURRENT_TIMESTAMP());

MITRE Technique

Scenario 8 – Defense Evasion Through Unset Masking Policy

A Snowflake masking policy is a security mechanism that protects sensitive data within a database. It allows you to define rules for obscuring or redacting specific data elements, such as Social Security Numbers (SSNs) or credit card numbers, to limit their visibility to unauthorized users. Attackers might bypass masking policies by unsetting them, given the right permission, and then exfiltrating sensitive information.

Relevant Snowflake View

Query

-- Search for unsetting of a masking policy

select *

from SNOWFLAKE.ACCOUNT_USAGE.QUERY_HISTORY

where QUERY_TEXT ilike '%UNSET MASKING POLICY%'

and START_TIME >= DATEADD(HOUR, -24, CURRENT_TIMESTAMP());

MITRE Technique

  • Data Manipulation| Stored Data Manipulation | ATT&CK T1565 

Scenario 9 – Data Exfiltration: Spikes in User Queries Volume

If an attacker manages to infiltrate a Snowflake account, they may attempt to extract data from the databases hosted in the compromised account. To detect this type of activity, you can identify users who exhibit significantly higher data querying rates than their typical usage patterns. The subsequent query lets us pinpoint users who have executed queries resulting in larger data volumes than their average daily activity over the previous week. 

Triage tip: The suspicion level increases as the difference between the calculated standard deviation of “total_bytes_written” and the sum of “stddev_daily_bytes” and “avg_daily_bytes” grows larger.

Relevant Snowflake View

Query

-- Spikes in user queries

WITH user_daily_bytes AS (

  SELECT

    USER_NAME AS user_name,

    DATE_TRUNC('DAY', END_TIME) AS query_date,

    SUM(BYTES_WRITTEN_TO_RESULT) AS total_bytes_written

  FROM ACCOUNT_USAGE.QUERY_HISTORY

  WHERE END_TIME >= CURRENT_TIMESTAMP() - INTERVAL '7 DAY'

  GROUP BY user_name, query_date

),

user_daily_average AS (

  SELECT

    user_name,

    AVG(total_bytes_written) AS avg_bytes_written,

    STDDEV_SAMP(total_bytes_written) AS stddev_bytes_written

  FROM user_daily_bytes

  GROUP BY user_name

)

SELECT

  u.user_name,

  ROUND(u.total_bytes_written, 2) AS today_bytes_written,

  ROUND(a.avg_bytes_written, 2) AS avg_daily_bytes,

  ROUND(a.stddev_bytes_written, 2) AS stddev_daily_bytes

FROM user_daily_bytes u

JOIN user_daily_average a 

  ON u.user_name = a.user_name

WHERE query_date = CURRENT_DATE()

  AND u.total_bytes_written > a.avg_bytes_written

  AND u.total_bytes_written > stddev_daily_bytes + avg_daily_bytes

ORDER BY u.user_name;

MITRE Technique

Scenario 10 – Anomaly in Client Application For User

If a user’s credentials are compromised or there is an insider threat, the attacker may attempt to use enumeration tools or client apps to perform massive data exfiltration. It’s likely that these tools haven’t been used by the legitimate user in the past. For this case, detecting any new client app used by the user could be a red flag that is worth investigating.

Relevant Snowflake View

Query

-- User uses a new client application

WITH user_previous_applications AS (

  SELECT

    USER_NAME AS user_name,

    ARRAY_AGG(DISTINCT CLIENT_APPLICATION_ID) AS previous_applications

  FROM ACCOUNT_USAGE.SESSIONS

  WHERE DATE_TRUNC('DAY', CREATED_ON) < CURRENT_DATE()

  GROUP BY user_name

),

latest_login_ips  AS (

  SELECT

    USER_NAME,

    EVENT_ID,

    CLIENT_IP

  FROM ACCOUNT_USAGE.LOGIN_HISTORY

) 

SELECT

  s.USER_NAME AS user_name,

  ARRAY_AGG(DISTINCT s.SESSION_ID),

  ARRAY_AGG(DISTINCT s.CLIENT_APPLICATION_ID) AS new_application_id,

  lh.CLIENT_IP as ip_address

FROM ACCOUNT_USAGE.SESSIONS s

JOIN user_previous_applications u

  ON s.USER_NAME = u.user_name

JOIN latest_login_ips lli

  ON s.USER_NAME = lli.USER_NAME

JOIN ACCOUNT_USAGE.LOGIN_HISTORY lh

  ON s.LOGIN_EVENT_ID = lli.EVENT_ID

WHERE DATE_TRUNC('DAY', s.CREATED_ON) = CURRENT_DATE()

  AND NOT ARRAY_CONTAINS(s.CLIENT_APPLICATION_ID::variant, u.previous_applications)

group by s.USER_NAME,lh.CLIENT_IP;

MITRE Technique

4 Additional Queries to Identify Snowflake Threats

On top of the scenarios mentioned above, there are more relevant queries you can use to hunt for threats in a Snowflake environment. However, the results of these queries are harder to rely on since they require a deeper context of the regular activities in the organization to differentiate the legitimate operations from those that may be part of a threat.

For example, imagine that MFA has been disabled for an administrator. This activity could be either part of a malicious operation or just an operational benign activity. To answer this question, you would need additional context:

  • Who disabled the MFA device?
  • Is it part of any task associated with an active project or duty? And If not,
    was it really the user, or is it a persistent action caused by an attacker?

Query 1 – New Administrative Role Assignment 

In the post-exploitation phase of a Snowflake attack, the attacker might create a new administrative user as a persistence mechanism.

Relevant Snowflake View

Query

-- Search for new admin role assignments

select *

from SNOWFLAKE.ACCOUNT_USAGE.GRANTS_TO_USERS

where ROLE in ('ORGADMIN', 'ACCOUNTADMIN') 

and CREATED_ON>= DATEADD(HOUR, -24, CURRENT_TIMESTAMP());

MITRE Technique

Query 2 – New Permissions Assigned to a Role

In the post-exploitation phase of a Snowflake attack, an attacker may add permissions to a non-privileged role in an effort to achieve persistence using a low-privileged user.

Relevant Snowflake View

Query

-- Search for new admin role assignments

select *

from SNOWFLAKE.ACCOUNT_USAGE.GRANTS_TO_ROLES

where ROLE NOT in ('ORGADMIN', 'ACCOUNTADMIN') 

and CREATED_ON>= DATEADD(HOUR, -24, CURRENT_TIMESTAMP());

MITRE Technique

Query 3 – Changes to Users Security Settings

An attacker might change user security settings like passwords, MFA settings, or other authentication methods to ensure persistence, or as a post-exploitation step. 

Relevant Snowflake View

Query

-- Search for user security settings changes

select *

from SNOWFLAKE.ACCOUNT_USAGE.QUERY_HISTORY

where QUERY_TEXT ilike '%ALTER%USER%' 

      and QUERY_TYPE = 'ALTER_USER' 

      and REGEXP_LIKE(QUERY_TEXT, '.*(PASSWORD|ROLE|DISABLED|EXPIRY|UNLOCK|MFA|RSA|POLICY).*', 'i')

      and START_TIME>= DATEADD(HOUR, -24, CURRENT_TIMESTAMP());

MITRE Technique

Query 4 – Changes to Network Policies

An attacker might alter network policies to allow traffic from a specific IP address.   

Relevant Snowflake View

Query

-- Search for network policies settings changes

select *

from SNOWFLAKE.ACCOUNT_USAGE.QUERY_HISTORY

where (QUERY_TYPE in ('CREATE_NETWORK_POLICY', 'ALTER_NETWORK_POLICY', 'DROP_NETWORK_POLICY') or

       QUERY_TEXT ilike any ('% set network_policy%', '% unset network_policy%') )

      and START_TIME>= DATEADD(HOUR, -24, CURRENT_TIMESTAMP());

MITRE Technique

Choose a Reliable, Fast, and Simple Snowflake Threat-Hunting Tool

In our pursuit to empower organizations with proactive cybersecurity measures, Rezonate is excited to introduce our open-source tool designed specifically for threat-hunting in Snowflake.

This tool leverages Snowflake SDK to run the different threat models mentioned in this post and allows you to easily start your own hunting journey in your own environment. Feel free to suggest expansions and improvements – we’d love to hear from you 🙂

You can find a link to our repository here.

Continue Reading

More Articles
8 Okta Security Best Practices to Implement Now

8 Okta Security Best Practices to Implement Now

Cyber attackers are continuously upping their game. They make it their mission to constantly search for user, system, and infrastructure vulnerabilities and gain unauthorized access to sensitive data.  With 61% of all data breaches involving compromised credentials. An IAM breach's consequences can vary from immediate financial losses to irreparable long-term reputational damage. Organizations must take proactive measures with specialized tools like Okta to identify and prevent IAM breaches. Okta is a leading identity and access management provider with excellent features to safeguard your digital identities against cyber attacks. In this article, we will discuss eight security best practices to get the most out of Okta. What is Okta Security? Okta Security is a robust identity management service designed for businesses and developers. It offers two leading solutions: Customer Identity Cloud and Workforce Identity Cloud. The Customer Identity Cloud is designed to secure consumer and Software as a Service (SaaS) applications across various industries, handling authentication, authorization, and secure access. On the other hand, the Workforce Identity Cloud aims to secure employees, contractors, and business partners, covering every part of the identity lifecycle. Regardless of Okta's reputation and capabilities, even they couldn't stop the most recent security breach. This highlights the importance of continuously monitoring your systems and being prepared to take action if something goes wrong. It doesn't matter how trusted a tool is; you should always be vigilant and prioritize security. Why Do You Need an Identity Provider Like Okta Security? Imagine your organization is a fort, holding your most valuable hidden digital treasures. In this context, identity provider Okta emerges as the watchful protector, improving the castle's defenses against IAM threats and safeguarding sensitive data. But the story doesn't end there. As your organization scales, the benefits of having such an identity provider will multiply. Enhanced security - Like the guardian at the castle gates, Okta centralizes access controls, authentication, and user management, ensuring that only those with the right keys gain entry to your digital assets. Increased productivity - If you have users who constantly access your resource, you can use single sign-on to allow them access resources without repeatedly re-entering credentials. Reduced IT workload - Okta can also act as the magician of your castle by automating various identity and access management tasks like user provisioning and freeing up IT resources. Regulatory compliance - Okta helps organizations meet compliance requirements around data security, access controls, and auditing. What Types of IAM Threats Might You Face? IAM attacks constantly change, and attackers keep trying different methods to find weaknesses in users or systems. Here are a few common types of IAM threats and how Okta protects your organization against them: Brute force attacks - Attackers try to guess user passwords through repeated login attempts. Okta prevents brute force attacks by locking accounts after several failed attempts. MFA push notification fatigue - Attackers flood users with MFA push notifications, hoping they accidentally approve one. Okta lets you set policies to limit the number of MFA verification messages sent within a period. Session hijacking - Attackers steal a user's valid browser session cookie and take over their account. Okta's device trust feature helps detect compromised sessions. Phishing - Attackers try to steal credentials via spoofed login pages. Okta's domain-bound certificates and email authentication features help block phishing attempts. 8 Okta Security Best Practices DevOps 1. Use Okta SDKs and Libraries Okta provides various SDKs and libraries for different programming languages and platforms. These pre-built code components and features are highly recommended when integrating Okta into your applications. In addition to smooth integrations, this approach provides several significant advantages: Saves time Ensure secure communication Standardize the IAM implementations Reduces the likelihood of coding errors Tips for selecting the best SDKs: Choose the SDK that matches your application's programming language. Regularly update the SDKs. Look for security vulnerabilities in the libraries. 2. Secure API Tokens API tokens are the keys to your digital fortress, providing access to stored digital assets. Therefore, securing API tokens is crucial to prevent unauthorized access to sensitive information and resources. Tips to secure API tokens: Store API tokens in a secure secret management solution rather than code or config files. When creating tokens, grant only the minimum scopes needed for that application. Set tokens to expire automatically after a shortened 30-90 days. Audit and revoke tokens that are no longer needed. Ensure tokens are transmitted only over secure channels like SSL/TLS. CISOs (Chief Information Security Officer) 3. Integrate with ITDR Solutions Identity Threat Detection and Response (ITDR) is a security solution category designed to detect, investigate, and respond to potential security threats that target an organization's identities, credentials, and cloud entitlements. It entails detecting unusual activities, identifying compromised credentials, integrating with identity and access management (IAM) policy enforcement, and more. It's important to note that integrating Okta with ITDR is a continuous process. While it helps to enhance an organization's security posture, it does require regular updates and reviews to ensure it evolves with the changing threat landscape and effectively mitigates identity threats. Here are a few tips to follow when integrating Okta with ITDR: Conduct a thorough analysis to understand the gaps in your current ITDR strategy and see if the ITDR vendor has good coverage for Okta related threats and behavioral analysis. Ensure you understand your organization's compliance requirements and see how Okta's features can help meet those requirements. Before full-scale implementation, conduct pilot testing to understand any potential issues and fix them. Conduct simulation exercises to help users understand how to respond to alerts and notifications generated through the Okta-ITDR integration. Set up real-time monitoring of identity threats leveraging Okta's analytics and reporting features. Ensure the ITDR solution integrates, streamlines, and prioritizes Okta's threat insights according to your business's threat models. Leverage Okta's API capabilities to integrate it with other systems in the organization's IT ecosystem. Implement Single Sign-On (SSO) functionalities to streamline access management and enhance security. 4. Develop an IAM Strategy When organizations scale, they face issues managing user identities and access across multiple systems. But, if you have a well-defined IAM strategy, you can easily tackle such situations. A typical IAM strategy consists of objectives, identity inventory, IAM solution selection, access control policies, and more. With Rezonate's IAM intuitive and collaborative IAM solution, you can gain real-time visibility over accounts, assets, and identity levels. It automatically uncovers and removes risky permissions. Rezonate integrates with Okta, so you'll be up and running within 15 minutes with just one-click, fast deployment.  Tips to follow when developing an IAM strategy: Clearly define the objectives and goals. Create workflows for user onboarding, offboarding, and role changes. Take stock of all user identities within your organization. Choose a robust IAM solution. Use RBAC to assign and manage permissions based on user roles. SecOps 5. Automate Account Lifecycles Automating account lifecycles involves creating processes to manage user accounts from creation to deactivation or removal automatically. This simplifies tasks related to onboarding, offboarding, and role changes. For example, when a new employee joins a company, automation will create an account, assign role-specific permissions, and provide access to the necessary resources. This ensures employees can access the tools and resources they need from day one. Tips to automate account lifecycles: Set up policies to provision and de-provision accounts immediately when employees join and leave. Set alerts to detect if users gain additional application access or privileged roles over time to curb privilege creep. Ensure automation is integrated with identity management, HR, and other relevant tools. 6. Regularly Audit Access and Privileges Regular access and privilege audits help organizations ensure users have appropriate access levels to perform assigned tasks. In addition, they help to identify security gaps, reduce the risk of unauthorized access, and ensure compliance with policies and regulatory requirements. Tips to follow when performing audits: Establish a routine audit schedule. Maintain precise records of user accounts, their roles, and their permissions. Identify and pay special attention to high-privileged accounts like administrators. Revoke access and privileges that are no longer needed. Implement RBAC. IAM Engineers 7. Leverage Multi-Factor Authentication (MFA) Multi-factor authentication (MFA) is a security measure that requires two or more verification methods to grant access to a system. MFA combines something you know (password) with something you have (mobile device) or something you are (fingerprint or face recognition). For example, consider a scenario where an employee's password gets somehow leaked. If you enabled MFA, the hacker couldn't access the account because they didn't have the second authentication factor. Here are a few tips to follow when enabling MFA: Enable MFA for all users. Select robust authentication methods such as one-time passwords (OTP), biometrics, or hardware tokens. Consider adaptive authentication, which assesses risk factors and adjusts the level of MFA required. Ensure there are backup authentication methods in case users lose their primary MFA device. 8. Configure Strong Password Policies Password policies are rules and requirements defined to strengthen the passwords users create. These policies typically include password complexity, length, and expiration time guidelines. Even without specialized tools, a strong password protects against brute-force attacks. Here are a few tips to consider when defining a password policy: Require passwords to include a combination of uppercase and lowercase letters, numbers, and special characters. Require a minimum length for passwords. Enforces regular password changes every 90 days. Prevent using common passwords like 'abcd1234'. Set rules to lock user accounts temporarily after a certain number of failed login attempts. How to Protect Your Okta Environment from Threats Okta is one of the leading identity providers around the globe. However, as organizations move their resources towards the cloud, we can see a significant increase in threats to cloud identities and access management. This highlights the importance of using specialized tools like Rezonate to detect and mitigate risks before they become critical. Rezonate is a modern identity and access management tool that integrates with Okta to help detect risks and threats across your Okta infrastructure. Moreover, it brings continuous risk monitoring, least privilege, real-time threat detection, and automated remediation to supercharge your IAM solution. Book a free demo of Rezonate today and witness firsthand how it can revolutionize your organization's access security.
Read More
Roy Akerman - 20 Minute Podcast on Identity Security

Podcast: A New Approach To Cybersecurity – An Identity-Centric Security One

In this riveting new episode of 20 Minute Leaders, Rezonate's CEO, Roy Akerman, the visionary mind behind Rezonate, a groundbreaking cybersecurity firm aimed at securing identities and protecting businesses. With 85% of today's attacks stemming from compromised identities, machines, or users, the need for a cybersecurity revolution is louder than ever. Roy enlighteningly delves into how Rezonate was born out of this urgent demand, Rezonate's innovative approach that disrupts traditional systems, and the future of cybersecurity. Don't miss out on this deep dive into the world of tech security, where old paradigms are challenged and revolutionary solutions are birthed. To listen to the full episode: https://youtu.be/F0xvRBrvS_M Spotify: https://open.spotify.com/episode/6dzJlrSrmVshYOGh4j6Jli?si=IG7SZiKNQOSBb4SXKlAEwA For more information, contact us or request a free demo. Like this article? Follow us on LinkedIn.
Read More
Breaking the Identity Cycle

Breaking The Vicious Cycle of Compromised Identities

As we at Rezonate  analyze the 2023 Verizon Data Breach Investigations Report, an unmistakable deja vu moment grips us: A staggering 74% of all breaches are still exploiting the human factor — be it through errors, misuse of privileges, stolen credentials, or social engineering. This recurring theme serves as a clear call for businesses to switch gears and move away from static security approaches towards a more dynamic, identity-centric model. An Unyielding Threat Landscape Year after year, our IT landscape and attack surface continue to expand. Cloud adoption has soared, hybrid work becoming the norm, and our infrastructure continues to evolve. Yet, the threat statistics remain frustratingly consistent. This consistency points to a key issue: our security measures aren’t keeping up. Traditional security approaches, designed for a static operational model, distributed across tools and teams, are only increasing complexity and not meeting the demands of an ever-changing, dynamic infrastructure. In turn, this provides ample opportunities for attackers. The commonplace of Shadow access, increased attack surface, and greater reliance on third-parties all present identity access risks, making it harder see, understand and secure the enterprise critical data and systems. How Are Attackers Winning? Attackers are using simple yet effective methods to gain access to valuable data without the need of any complex malware attacks. A variety of account takeover tactics, bypassing stronger controls such as MFA, compromising identities, access, credentials and keys, brute forcing email accounts, and easily laterally expanding as access is permitted between SaaS applications and cloud infrastructure. Stolen credentials continue to be the top access method for attackers as they account for 44.7% of breaches (up from ~41% in 2022). Threat actors will continue to mine where there’s gold: identity attacks across email, SaaS & IaaS, and directly across identity providers. Where We Fall Short Security teams are challenged by their lack of visibility and understanding of the entire access journey, both across human & machine identities, from when access is federated to every change to data and resource. We're also seeing gaps in real-time detection and response, whether it be limiting user privileges or accurately identifying compromised identities. These shortcomings are largely due to our reliance on threat detection and cloud security posture management technologies that fail to deliver an immediate, accurate response required to successfully contain and stop identity-based threats. What Should You Do Different? We’re observing that businesses adopting an identity-centric approach:  Gain a comprehensive understanding of their identity and access risks, further breaking data silos, Are able to better prioritize their most critical risks and remediation strategies, Can more rapidly adapt access and privileges in response to every infrastructure change , Automatically mitigate posture risks before damage is inflicted, and Confidently respond and stop active attacks. Identities and access, across your cloud, SaaS, and IAM infrastructure, is constantly changing. Your security measures must evolve in tandem. The identity-centric operating model enables businesses to proactively harden potential attack paths and detect and stop identity threats in real-time. Breaking the cycle in Verizon DBIR 2024 Now is the time to make a change. Let’s change our old set-and-forget habits and know that security needs to be as dynamic and adaptive as the infrastructure it is protecting.  For more information about how can Rezonate help you build or further mature your identity security, contact us and speak with an identity security professional today.  This post was written by Roy Akerman, CEO and Co-Founder at Rezonate, and former head of the Israeli Cyber Defense Operations.
Read More
See Rezonate in Action

Eliminate Attacker’s Opportunity To Breach Your Cloud today

Organizations worldwide use Rezonate to protect their most precious assets. Contact us now, and join them.