In today’s threat landscape, multiple defense-in-depth layers are one of the only ways security teams can achieve peace of mind. Why? Two reasons stand out:
The rise of targeted and evasive threats means that no single layer of security at any level, from endpoints to critical servers, can be relied upon to stop attacks by itself. Instead, just like layers of identity checks and bodyguards protecting a VIP, security teams need to put a multi-layered security obstacle course between critical assets and potential threats.
Defense-in-depth is about more than just deploying multiple security products. It's a process where organizations harden their people, processes, and technology to produce a highly resilient security outcome and effective ransomware prevention.
This statistic shows the importance of hardening the "human layer" in any defense-in-depth strategy. But although many organizations train individuals annually to prove compliance or meet insurance requirements, research proves that only a few do so often enough to turn the dial on their security posture. At best, the human resources are the last line of defense.
More training is needed. However, security should rely on something other than adherence to policy. It's essential to make sure that proper controls like multi-factor authentication (MFA) are in place as a backup.
The default policy in flat network environments is to allow all devices and applications to share information. Although this makes networks easy to manage, the security downside is that once a single network-connected asset in a flat network is compromised, it is relatively easy for threat actors to establish lateral movement into other parts of the network.
'To stop this from happening, security teams should use some form of network segmentation and subnetting to protect vulnerable network assets and slow down lateral movement.
Network segmentations also enables security teams to response and isolate threats without disrupting the entire organization.
Against advanced attacks like ransomware, one-size fits all tools or tool sets can leave gaps and create administrative burdens incompatible with business needs.
A better alternative is to tailor defense-in-depth tool stacks to each environment and business situation as needed. Security teams must look at how users and systems function within these layers and pick the best solutions.
To stop known threats, endpoints and servers must, at a minimum, have an effective antivirus (AV) in place. Ideally, endpoint protection (EPP) and endpoint detection and response (EDR) will also be present. It's important to also have internal-facing solutions like a security information and event management (SIEM) or security orchestration, automation, and response (SOAR) platform that can centralize security logs, and enable security teams to identify, investigate and mitigate risks.
Around the network perimeter, firewalls are essential, and internet-facing assets need to be protected by Web Application Firewalls (WAFs).
For example, In 2021, the ProxyLogon vulnerabilities on Microsoft Exchange impacted thousands of organizations worldwide. While Microsoft issued instructions on corrective actions, variants such as ProxyShellMiner, are still currently active.
Deploying Automated Moving Target Defense to protect against evasive and in-memory cyber attacks
Alongside these best practices, the reality is that even with fully deployed security AI and automation, the average time to identify and contain data breaches is 249 days.
It is therefore important to protect endpoints, servers and workloads against attacks capable of evading the protection mechanisms provided by detection-based technologies.
Automated Moving Target Defense (AMTD) is an essential defense-in-depth layer because it stops threats in a vulnerable and often unprotected space—device memory during run time.
Code and memory exploitation techniques like process injection and PowerShell compromise are among the top ten most commonly seen MITRE ATT&CK techniques. AMTD mitigates this risk by morphing memory and making it essentially invisible to the threats that target it. This means that memory assets and vulnerabilities like hash passwords and bugs are inaccessible to threat actors.
As a layer in a defense-in-depth security posture, AMTD stops zero-day, fileless, and in-memory attacks that bypass controls at other levels. AMTD also serves as a highly effective anti-ransomware tactic, and has been showcased preventing attacks like LockBit.
Morphisec offers a range of AMTD solutions for endpoints and Windows and Linux servers. To learn more about this new technology why Gartner calls AMTD “the future of cyber”, read our whitepaper Zero Trust + Moving Target Defense: The Ultimate Ransomware Strategy.