Secure Your Remote Workforce
What is Secure Your Remote Workforce?
In order to contain the spread of COVID-19, employees are being asked to work remotely when possible. This sudden and immediate shift of employees who would normally work in an office to a remote location in those organizations that normally are not already fully remote will naturally create a shift in the internal movement of network traffic, which directly impacts the behavioral detections identified from the Cognito platform. Vectra is making the following recommendations for users of the Cognito platform to identify and manage the expected increase in behavioral detections related to certain remote worker conditions.
How Command & Control?
- Hidden HTTPS Tunnel – Depending of the amount of noise generated by such detections, writing a rule as narrow as possible, based upon the destination IPs and source IP(s) is suggested.
- External Remote Access – Depending of the amount of noise generated by such detections, writing a rule as narrow as possible, based upon the destination IPs and source IP(s) is suggested.
- Suspicious Relay – This detection can be triggered when a user uses a jump server or a relay for remote desktop access on a specific host. Vectra recommends an analyst tag the source host as authorized for this action and use a one-time mark as custom, assuming a low volume of noise. If these types of behaviors are prevalent from a system, consider writing a custom filter based upon the destination’s IPs and ports.
Network
Data
Applications
Endpoint
Attack Simulation Based Assessments
Banking Security Assessments
Infrastructure Security Assessments
Security Consulting Services
Security Testing Services
SLA
Compliance Services
Cloud Security Assessment