Buy
Showing posts with label Paramount Defenses. Show all posts
Showing posts with label Paramount Defenses. Show all posts

Wednesday, May 20, 2026

Conquering Everest - Active Directory Privilege Escalation Path Identifier


Ladies and Gentlemen,

Two months ago, we announced the availability of Gold Finger 10.0 for Microsoft Active Directory, featuring the world's first and only accurate Active Directory Privilege Escalation Path Identifier -

Active Directory Privilege Escalation Path Identifier

We developed this unique tool to empower organizations worldwide to be able to trustworthily (accurately) identify and eliminate privilege escalation paths in their foundational Active Directory environments, enabling them to eliminate the #1 threat to organizational cyber security.  


Today, I will be sharing additional technical details on this paramount cyber security tool, which is the world's only tooling that can accurately identify privilege escalation paths in Active Directory.
(We trust the world understands the meaning of the English word - "only".)

 


Everest Beckons - Accurate Active Directory Privilege Escalation Path Identification

The cardinal tenet in the identification of privilege escalation paths in Active Directory is accuracy. 


The only way to achieve accuracy in escalation path identification involves identifying privilege escalation paths based on an accurate assessment of access entitlements in Active Directory, which in turn involves and requires the determination of effective permissions in Active Directory.


Specifically, in order to be able to accurately identify privilege escalation paths in Active Directory, one first needs to accurately determine access entitlements on possibly thousands of objects in Active Directory, which involves accurately determining effective permissions on thousands of objects in Active Directory, and that is extremely difficult to accomplish, let alone automate.

As such, we are the only company in the world that actually has a solution that can accurately determine effective permissions in Active Directory. We are also the only company in the world that can accurately determine effective permissions on thousands of objects in Active Directory and determine exactly who has what privileged access, where and how in Active Directory. Even then, being further able to identify privilege escalation paths based on all assessed access entitlements in Active Directory is no easy feat.

For years now, even we had not attempted it because we knew just how difficult it is to accomplish, let alone automate it, considering how diverse Active Directory environments can actually be.

You see, when you build an automated solution, it needs to be able to work in every possible environment, ranging from a small business' 100 user account single-domain environment to an enterprise's 100,000 user account multi-domain environment spread across multiple continents.  

Consequently, for years now, organizations had been using and relying on a particular amateur cyber security solution, that albeit substantially and dangerously inaccurate, seemed to have become the de-facto standard to identify privilege escalation paths in Active Directory.

In October of 2024, it came to our attention that even official guidance from the global intelligence community was recommending the use of this amateur cyber security solution, and we realized that something had to be urgently done, lest even government and intelligence agencies worldwide end up operating on dangerously inaccurate cyber security insights, reliance upon which could result in their swift and colossal compromise, a situation that could endanger U.S. national security as well as the national security of all countries that were relying on such (inaccurate) guidance.




Everest Conquered - Building an Accurate AD Privilege Escalation Path Identifier

With the above concern in mind, we decided to take on our biggest challenge yet, (and one may want to keep in mind that over the years, we have taken on and solved some of the biggest challenges in organizational cyber security,) and set out to architect and develop the world's first and only accurate privilege escalation path identification tooling for Microsoft Active Directory.



It took our entire development team, led by myself, almost a year to architect and develop this tool, and it undoubtedly has been the single biggest technical challenge that we have taken on to date. 

To appreciate the magnitude of this problem, you have to understand that what is involved here is building an automated solution that can not only accurately calculate effective permissions on thousands of objects, but then also take an ocean of determined resultant access entitlements, and determine (potentially hundreds of thousands) of privilege escalation paths leading to one or more targets in Active Directory, and do so with complete accuracy, in any Active Directory environment.

We also gave ourselves a difficult stretch goal of not just being able to accurately identify privilege escalation paths in Active Directory, but also, for each and every single identified path, be able to pinpoint the exact security permission in the ACL of the target Active Directory object, that was entitling a subject to a specific privilege escalation path.

None of this was easy. In fact, it was the most difficult technical challenge we have conquered (, which is also why you'll see a picture of a mountain climber in the Mission Accomplished section on this technical page,) and it was the equivalent of trying to scale Mount Everest in the real-world.

All said and done, we knew that failure was not an option (, and as such that word doesn't exist in our dictionary at Paramount Defenses,) and the entire team worked tirelessly, laser-focused on the mission, in dark rooms, completely cut off from the Internet, and by the end of November 2025, we had successfully built the world's only cyber security solution that can accurately identify privilege escalation paths in Active Directory, and also includes source-identification (, our stretch-goal).

We then spent well over a hundred days, thoroughly testing every aspect of the tooling, as we always do, and after a hundred days of thorough testing, we signed-off on the final release version, with March 10, 2026 decided as our release date, almost coinciding with our twentieth anniversary.

On March 10, 2026, we released the world's first and only accurate privilege escalation path identification solution for Microsoft Active Directory, so that thousands of organizations worldwide, including thousands of $ Billion business organizations, and thousands of government and national security/intelligence agencies across a hundred countries, could finally trustworthily (i.e. accurately) identify and eliminate privilege escalation paths in their foundational Active Directory deployments.

If you can find a more important cyber security problem to solve than this one, do let me know.




A Glimpse into the Technicalities Involved 

The remainder of this post is focused on the technicals of this tooling, which may be of interest to experts in this field, and ideally should be understood by all IT personnel and CISOs in the field.


The field of Active Directory security is vast, and consequently, describing as well as understanding the technical innards of such a tool requires a certain level of subject matter expertise. That said, I'll do my best to describe the technical innards such that everyone in the field can get a sense of what is actually involved, and how difficult it is to accurately accomplish.


This topic is perhaps best understood with a real-world example, so let us consider the following -


Objective - Identify all privilege escalation paths leading to the CEO's domain user account.

 

Setup - A real-world organization's Active Directory, comprised of multiple domains, with say twenty thousand domain user accounts, twenty thousand domain computer accounts, ten thousand domain security groups, and MILLIONS of security permissions in Active Directory, including hundreds of thousands (due to inheritance) of Deny permissions.

 

Side-Note for Amateurs - We are not talking about trying to find privilege escalation paths on an Active Directory object based on a mere three permissions in the ACL, of which none is a Deny permission, in some novice/junior sys-admin's home lab setup.

 

Possibilities - Technically, the possibilities here are wide ranging. At best, in a highly secure environment, there might at most be a handful of Domain Admin equivalent accounts that can enact ops that could take-over the CEO's account, and the same set of individuals who could also do the same on each other's accounts (due to AdminSDHolder.) At worst, you could have a situation wherein a single mis-configured permission could grant Authenticated Users or Everyone modify access on the CEO's account, and now you're looking at a situation wherein forty thousand (plus one) accounts have a direct privilege escalation path to the CEO's account alone, and scores of accounts with both unrestricted and restricted (delegated) admin access in Active Directory, have several privilege escalation paths on to each one of these forty thousand accounts. That's the spectrum of possibilities we're talking about here, to be predominantly viewed from the perspective of trying to automate this identification process.

 

Side-note 2 for Amateurs - This is a production environment, wherein organizational IT/cyber security personnel have actually put in the effort to lockdown access in their Active Directory, including by employing Deny permissions, so you don't have a setup where there are no Deny permissions. Also, in each ACL, there could be multiple Deny permissions, explicit and inherited, denying access for some of the very groups that have also been allowed access to the same object in the same ACL. In other words, there's considerable real-world complexity to deal with, unlike in a simple lab setup.    

 

Specifics and Size - You can assume that over the years, a fair amount of administrative delegation has been done in this Active Directory. For instance, responsibilities for identity management, helpdesk functions and access for AD-integrated apps are all adequately provisioned via scores of inheritable permissions across the domain, in every domain. You can also assume that at least basic common-sense barriers have been put in place via Deny permissions, so you're looking at millions of security permissions in the Active Directory, including say 76 security permissions just in the ACL of the CEO's domain user account.    


Innards

With the above setup in place, the process of identifying privilege escalation paths to the CEO's domain user account begins by examining the ACL of the CEO's domain user account.

As mentioned above, there are 76 security permissions in this ACL, of which 60 are of type Allow and 16 are of type Deny, and of which, 24 are explicit in nature and 52 have been inherited.

They include several conflicting permissions. For example, the Help Desk Team group has been granted the Reset Password extended right via an inheritable Allow permission. This Help Desk Team group contains two nested groups, one of which, the IT Help Desk (Contractors) group, represents contractors. This group IT Help Desk (Contractors) is a member of the IT All Contractors group, which in turn is a member of the All Contractors group, and there is an inheritable Deny permission in the CEO's account's ACL denying the All Contractors group All Extended Rights. This is merely one example. There are many such conflicting permissions in the CEO's account's ACL.

The reason this simple example is so pertinent and important to consider is that whilst virtually all other tools that claim to analyze Active Directory security, and/or identify privilege escalation paths, will take into account the Allow permissions granting the Help Desk Team the Reset Password extended right, none of them will evaluate or consider the impact of the Deny permission granted to the All Contractors group, which as seen above, due to an indirect (nested) group membership, will not actually permit any contractor who is a member of the IT Help Desk Team (via the nested IT Help Desk (Contractors) group) to actually be able to reset the CEO's account's password.


In essence, the very first step in this process is to take into account the collective impact of all the security permissions (i.e. both Allow and Deny permissions) specified in the ACL protecting the target object to identify which security principals do in fact have sufficient effective access to actually be able to enact technical/administrative operations on this account and escalate privilege.

This simple yet paramount determination is what is known as calculating Active Directory Effective Permissions i.e. calculating the actual resultant access that is allowed on an Active Directory object.

Consequently, the very first step involves being able to accurately calculate effective permissions on the CEO's domain user account, and this in itself is no easy feat. In fact, it is one of the most difficult challenges in all of Active Directory security and organizational cyber security, even though it is absolutely fundamental and paramount to the security of every single object in Active Directory.

Side-note - There is also only one tool in the world that can accurately calculate effective permissions in Active Directory, i.e. our Active Directory Effective Permissions Calculator


Thus, the very first step is to determine who actually has sufficient effective permissions on the CEO's domain user account to be able to enact admin tasks/ops that can be used to escalate privilege on to this account, and this being a domain user account, those tasks are as follows - 
  1. Reset the domain user account's password
  2. Change the security permission on the domain user account
  3. Change the ownership of the domain user account 

The first task is the primary avenue to escalating privilege on to a domain user account. The second task gives you the ability to grant oneself (or anyone) sufficient effective access to be able to enact the first task. The third task, gives you the ability to acquire ownership of the object, which in turn, gives you implicit Write DACL i.e. Modify Permissions on the object, which then can be used to grant oneself (or anyone) sufficient effective access to be able to enact the first task on the account.
 
Side-note - The list of admin tasks/operations that can be enacted to escalate privilege onto an Active Directory object are specific to the class of the object. For instance, on a domain security group, in lieu of #1 above, the two tasks would be 1) Change the membership of the group, and 2) Add/remove oneself as a member to the group. Similarly, akin to the above, tasks # 3 and #4 in the case of a security group would be Change the security permission on the domain security group and Change the ownership of the security group.  


Thus, the very first thing that Gold Finger does in the process of determining privilege escalation paths is correctly calculate Active Directory Effective Permissions on the target of the determination, to determine who can enact tasks/operations that can be used to escalate privilege to the target.
 
Side-note - To reiterate, that is merely the very first step in this vital determination, and there is not a tool in the world that can accomplish even this very first step accurately, so as you can imagine, any tool that claims to be able to identify privilege escalation paths in Active Directory is in actuality simply not even able to complete the very first step accurately.
 
 
Now, let us assume that having accurately determined effective permissions on the target object, we have determined that a total of 56 security principals, including 30 domain user accounts, 4 domain computer accounts, 21 domain security groups and 1 foreign security principal (FSP, e.g. Anonymous Logon) are actually able to escalate privilege to the CEO's domain user account.


The next step in the process is to then proceed to accurately calculate effective permissions on each one of these 55 security principals and identify exactly who can escalate privilege on to each one of them, considering the privilege escalation tasks/operations that are specific to their class. 

Side-note - Even though we have a total of 56 security principals that can escalate their privilege on to the CEO's domain user account, one of them is the FSP Anonymous Logon. We do not need to identify any escalation paths on to this FSP, because there are none to identify, in that one does not need any credentials to come across as Anonymous Logon.

To reiterate, having determined the identities of all security principals that have a direct privilege escalation path on to the target, the next step is to iteratively recurse this exact process on each* one of these security principals.

In other words, this elemental process, primarily involving the fundamental accurate determination of effective permissions on numerous Active Directory objects, needs to be recursed on each one of them until such point that there are no more security principals that have a privilege escalation path to the target under consideration, i.e. other than those that have already been identified as having a path to the target, or on/to whom we have already identified privilege escalation paths. It is at that point that the intricate process of accurately identifying privilege escalation paths to a specific object in Active Directory is considered complete.

At this point, what we have is an inverted privilege escalation path tree, wherein the root node is the target of the escalation, and every child node is a security principal that has one or more escalation paths to the parent node, and each edge in the tree represents one or more escalation paths representing the operations/tasks involved in the escalation(s), and there certainly can be more than one escalation path leading from one security principal to another.

Example - A user account, say John Smith, could have both sufficient Add/Remove Self as Member effective permissions as well as sufficient Modify Permissions effective permissions on a domain security group. In this case, there are two privilege escalation paths leading from John's account to this security group, so the edge would represent both these escalation paths, and be duly annotated as such.


In closing, based on what we have considered above, there could theoretically be anywhere from zero to thousands of privilege escalation paths leading to a specified target in Active Directory, and our unique Active Directory Privilege Escalation Path Identifier is the only tooling the world that can accurately identify such paths, based on the accurate determination of effective permissions on as many Active Directory objects as may be involved, whether it be one or it be fifty thousand objects.


That is what it takes to accurately determine privilege escalation paths in Active Directory, and that is what our Active Directory Privilege Escalation Path Identifier can uniquely do today.



In Closing

This unique capability too embodies industry-wide recognized innovative patented technology and our unique effective permissions calculationprivileged access assessment as well as privilege escalation path identification cyber security solutions for Active Directory remain unrivaled.


That's all for now. Thank you.

Sincerely,
Sanjay


PS: Pardon the delay - We have been meaning to pen this post for several weeks now, but have been extremely busy, apart from our immense responsibilities to our customers across the world, completing the development of one more product, to be unveiled when the time is right.

Monday, October 7, 2024

The American Defense Industrial Complex operates on Active Directory


Folks,

From the U.S. Department of Defense to the Israeli Defense Forces, Microsoft to Nvidia, and Lockheed Martin to Palantir, today virtually the entire American Defense Industrial Complex operates on Microsoft Active Directory.

In fact, the entire United States Government, as well as the Fortune 100 and Wall Street also operate on Active Directory.


For those who may not know, Active Directory is one of the most important and trustworthy foundational technologies ever built, and it provides two paramount imperatives that the Cloud cannot - operational autonomy and organizational privacy.

Consequently, Active Directory lies at the very foundation of national security, defense and corporate security worldwide.



The National Security Agency Agrees

The stated mission of NSA in cybersecurity is to prevent and eradicate threats to U.S. national security systems with a focus on the Defense Industrial Base and the improvement of its weapons’ security.


Active Directory Security is so important to global security, that just last fortnight, the National Security Agency (NSA) and the Australian Signals Directorate (ASD) issued joint guidance on how to mitigate Active Directory attacks, and I quote -


"Active Directory is the most widely used authentication and authorization solution in enterprise Information Technology (IT) networks globally.

"Like numerous other networks, Active Directory is used in many Department of Defense and Defense Industrial Base networks as a critical component for managing identities and access,” 

This makes it an attractive target for malicious actors to attempt to steal the proverbial ‘keys to the kingdom. Taking steps to properly defend AD from these common and advanced techniques will detect and prevent adversary activities and protect sensitive data from determined malicious cyber actors.


To state it as simply as one can, the National Security Agency (NSA) of the United States of America just confirmed not only what we've been saying for years, but also the paramount importance of what it is we do at Paramount Defenses

You see, the number one way to steal the proverbial Keys to the Kingdom that the NSA is referring to is Active Directory Privilege Escalation, and in fact we had released the underlying technical facts in The Paramount Brief way back (2014).

I wonder what took the NSA so long. We've been saying this for a decade - 2014, 2015, 2016, 2017, 2018, 2019, 2020.



This is Paramount

The accurate assessment of privileged access in Active Directory is absolutely paramount to organizational cyber security.

As every cyber security professional, Domain Admin and CISO worth his/her salt knows well, the most important (the #1) measure in all of organizational cyber security and in Active Directory security is the attainment of Least Privilege Access (LPA) in Active Directory, which involves accurately assessing and then locking-down privileged access in Active Directory, and one simply cannot do so without the ability to accurately assess privileged access in Active Directory




Decision Support (aka Proof)

At the heart of both the SolarWinds Breach and the Colonial Pipeline Hack lay privileged access in Active Directory.
Both these attacks could've been prevented if only organizations had attained and maintained LPA in Active Directory. 

Here's why / consider this - the Top-5 ways of escalating in privilege in Active Directory are i) DC Sync eff-perms / WD eff-perms on domain root, ii) WD eff-perms on AdminSDHolder, iii) CR-Reset Password eff-perms on any AD admin account, iv) WP-member eff-perms on any AD admin group, and v) WP - GP Link and GP Options eff-perms on the default DC OU.

Anyone who has any of these eff-perms in AD owns the organization, and can completely destroy it, should they so desire, so at an absolute minimum*, assessing and locking-down the above eff-perms domain-wide is absolutely paramount.

*Oh, and this is merely the tip of the iceberg. Consider the following - 
Anyone and everyone who has { CR-Reset Password or WD or WO } eff-perms on any AD user account in the domain can own that account in one second, anyone who has { WP-Member or WD or WO } eff-perms on any AD group in the domain can control that group in one second (and access everything it protects), anyone who has { WD or WO } eff-perms on an(y) OU in the domain can own every* object in that OU, easily escalate privilege and/or control and/or destroy everything in it.

Pro Tip for Amateurs - Count the number of times I've said eff perms above, because it is NOT perms, but eff-perms (aka Active Directory Effective Permissions) that control everything in AD. Permissions analysis is almost useless. 

Organizations that do not know who has what eff-perms in their AD are dangerously operating in the proverbial dark.




Extremely Difficult

The accurate determination of access entitlements, i.e. who has what privileged access where and how, in Active Directory is extremely difficult and error-prone, and likely one of the biggest challenges in organizational cyber security today.
It is extremely difficult because it involves analyzing millions of individual access control specifications that cumulatively impact resultant access, and thus is involves meticulously connecting millions of dots with absolutely zero room for error.

There is no room for error, because like performing heart surgery or screening baggage at airports, even a single error could result in an unmitigated privilege escalation path that could be used to completely destroy an entire organization.

The process is akin to finding a thousand unique needles in a haystack the size of One World Trade Center, New York, wherein in order to ensure security, it is paramount that each and every single needle in the entire haystack be found. 





Mission Accomplished

For anyone who may not yet know, there is one and only cyber security solution in the entire world that can accurately assess privileged access in Active Directory - our unique, unrivaled, all-American, Microsoft-endorsed Gold Finger.

Gold Finger is the only cyber security solution in the world that can accurately assess access entitlements i.e. who has what privileged access in Active Directory, based on the accurate determination of effective permissions in Active Directory.

Let there be no ambiguity about that cardinal technical fact, none whatsoever. Although there are over twenty solutions that claim to be able to assess privileged access in Active Directory, not even one of them can do so accurately, because there is one and only correct way to accurately assess privileged access in Active Directory and that involves the accurate determination of Active Directory Effective Permissions, which is extremely difficult, and none of those solutions do so.

Not a single one of them.

As such, the method and system for the accurate determination of who has what access entitlements in Active Directory, including of course privileged access, and privilege escalation paths, is governed by our patent, U.S. Patent 8429708.




The Bible of Access Assessment

I should also mention this is no ordinary patent. It is the Bible of how to accurately assess access in an IT system, wherein access is controlled using ACLs, and today, over 75 patents from many of the world's top cyber security companies cite it, including Microsoft, Amazon, IBM, VMWare, McAfee, CyberArk, FireEye, Dell, VMWare, Palantir and others.


Our patented, Microsoft-endorsed accurate effective access assessment capabilities are embodied in our Gold Finger, Gold Finger Mini and Gold Finger 007G solutions, are unique in their ability to enable organizations to fulfill this paramount objective and over the last decade, from the U.S. DoD to the United Nations and from the U.S. Treasury to several Fortune 100 companies, they have been instrumental in helping so many important organizations attain and maintain LPA in AD.



Simply Unrivaled  (F-35)

To give the world an idea of just how capable and superlative our access assessment technology is, consider this -

Gold Finger can accurately assess exactly who has what privileged access, where and how, domain-wide in any Active Directory domain in the world, comprised of thousands of objects, within just minutes, and at the touch of a button. 

To put that in perspective, in less time than the Generals in the U.S Military can brief the U.S. Secretary of Defense as to the state of cyber security of their respective forces, or for that matter in less time than the CEO of Microsoft has an hourly meeting with his top cyber security experts, Gold Finger can find out exactly who has not just the Keys to the Kingdom, but also who has the keys to every single door in the kingdom, in every Active Directory domain in the U.S. Dept. of Defense.

In fact, we recently offered to give away up to one hundred million dollars in software to any and every organization or professional who could provably show us even one tool in the world that can do what Gold Finger's privileged access assessment capabilities can, and guess how many organizations/professionals have taken us up on the offer thus far? 

Zero! Need one say more?



In Closing

In closing, I will only add that at Paramount Defenses we continue to be laser-focused on Active Directory security because it is absolutely paramount to the national security of the United States of America, and that of 100+ countries worldwide. 

You see, there can be no national security without a government having operational autonomy and organizational privacy, and only Active Directory makes these two imperatives possible. Fortunately, today every organization in the world that wishes to do so can easily attain and maintain least privilege access (LPA) in their foundational Active Directory domains, thereby measurably eliminating 99% of avenues of privilege escalation to the "Keys to the Kingdom" in Active Directory.


That's all for now.

Best wishes,
Sanjay.

Wednesday, July 10, 2024

The World's Top Cyber Security Companies, including Microsoft (MSFT), Crowdstrike (CRWD), ZScaler (ZS), CyberArk (CYBR) etc. ALL Agree on ONE Fact


Folks,

There is 1 (ONE) simple paramount fact that impacts cyber security worldwide today that virtually ALL of the world's top cyber security companies, including Microsoft (MSFT), CrowdStrike (CRWD), Dell (DELL), Splunk (SPLK), ZScaler (ZS), CyberArk (CYBR) etc. etc. all agree on, and I quote -



"Microsoft Windows Server Active Directory is the foundation of an IT Infrastructure"

- Source: Splunk  Backup-Source (SPLK, acquired by Cisco  Market Cap: $28 Billion)




"Microsoft Active Directory is at the core of your business"

- Source: DellEMC (DELL,  Market Cap: $ 99 Billion)




"Active Directory and Entra ID are the lifeblood of your business"

- Source: Quest (Quest Software,  Valuation: ~ $ 5 Billion)




"When AD fails, either from ransomware, cyberattacks or catastrophes, the IT environment grinds to a halt"

- Source: Quest (Quest Software,  Valuation: ~ $ 5 Billion)



"Microsoft Active Directory is a collection of services that help you manage users and devices on a network."

- Source: Amazon AWS  (AMZN,  Market Cap: $ 2 Trillion.)



"Start with Active Directory, go everywhere"

- Source: Okta  (OKTA,  Market Cap: $ 15 Billion.)



"Configure GlobalProtect to use Active Directory Authentication profile"

- Source: Palo Alto Networks  (PANW,  Market Cap: $ 106 Billion.)



"A secure Active Directory environment can mitigate most attacks."

- Source: CrowdStrike  (CRWD,  Market Cap: $ 90 Billion.)




"At the heart of every network there are the Domain Controllers and the Active Directory instances that run on them."

- Source: CyberArk  (CYBR,  Market Cap: $ 7 Billion)




"Microsoft Active Directory is used extensively across global enterprises. Even with the migration to Azure Active Directory, companies continue to utilise Active Directory in a Hybrid environment where workstations may be joined solely to AD, or both AD joined and WorkPlace joined to AAD."

- Source: ZScaler  (ZS,  Market Cap: $ 30 Billion)




"Manually maintaining Google identities for each employee can add unnecessary management overhead when all employees already have an account in Active Directory. By federating user identities between Google Cloud and your existing identity management system, you can automate the maintenance of Google identities and tie their lifecycle to existing users in Active Directory."

- Source: Google  (GOOG,  Market Cap: $ 2 Trillion)





"Active Directory provides mission-critical authentication, authorization and configuration capabilities to manage users, computers, servers and applications throughout an organization’s IT infrastructure...

…[it] is critical to secure an organization’s systems and applications."

- Source: Microsoft  (MSFT,  Market Cap: $ 3 Trillion)



"From the White House to the entire U.S. Government, and from the $3T Microsoft (MSFT) to the global Fortune 1000, at the very foundation of cyber security of 85% of all organizations worldwide lies a single technology - Active Directory."

- Source: Paramount Defenses (Privately held)





A  $ 20 Trillion  Fact

Here are just a few corporations on the Standard & Poors 500 (S&P 500) at whose very foundation lies Active Directory   -


Alphabet (GOOGL), Amazon (AMZN), Advanced Micro Devices (AMD), American Airlines (AAL), American Express (AXP), AmerisourceBergen (ABC), AT&T (T),  Baker Hughes (BKR), Bank of America (BAC), Berkshire Hathaway (BRK.B) BlackRock (BLK), Capital One Financial (COF), Caterpillar (CAT), CBRE Group (CBRE), Cisco (CSCO), Citibank (C), Clorox (CLX), Coca-Cola Company (KO), Chevron (CVX), Cisco (CSCO), Comcast (CMCSA), CVS Health (CVS), Costco (COST), Delta Airlines (DAL), Dow Inc (DOW), Dupont de Nemours (DD), Equifax (EFX), Exxon Mobil (XOM), Facebook (FB), Ford Motor (F), Fortinet (FTNT), Fox Corporation (FOX), Gartner (IT), General Electric (GE), General Motors (GM), Gilead Sciences (GILD), Goldman Sachs (GS), Google (GOOG), Hewlett Packard Enterprise (HPE), Hilton Worldwide (HLT), Humana (HUM), IBM (IBM), Intel (INTC), JP Morgan Chase (JPM), Johnson and Johnson (JNJ), Kellogg Co (K), Kroger Co (KR), Lockheed Martin (LMT), Mastercard (MA), McDonalds (MCD), Merck (MRK), MetLife (MET), Microsoft (MSFT), Morgan Stanley (MS), Nasdaq (NASD), Netflix (NFLX), NewsCorp (NWS), Nike (NIKE), Northrop Grumman (NOC), Norwegian Cruise Line Holdings (NCLH), Nvidia (NVDA), Occidental Petroleum (OXY), Okta (OKTA) Oracle Corp (ORCL), PayPal (PYPL), PepsiCo Inc (PEP), Phillip Morris International (PM), Procter and Gamble (PG), Qualcomm (QCOM), Quest Diagnostics (DGX), Raytheon (RTX), Robert Half International (RHI), Royal Caribbean Cruises (RCL), S&P Global (SPG), Salesforce.com (CRM), Schlumberger (SLB), Southwest Airlines (LUV), Sysco Corp (SYY), Target Corp (TGT), Tesla (TSLA), Tyson Foods (TSN), Twitter (TWTR) United Airlines (UAL), UPS (UPS), Verizon (VZ), Walmart (WMT), Walt Disney (DIS), Wells Fargo (WFC), Yum! Brands (YUM) etc. etc.





This Sounds Very Important

If $ 20+ Trillion are riding on Active Directory today, one would have to assume that the security of these foundational Active Directory deployments ought to be one of the highest organizational cyber security priorities worldwide. It is.


In fact, it is paramount. However, there's just one small Trillion $ problem...




Microsoft's #1 Recommendation

As evidenced in the quote above, Microsoft has always highly and sufficiently recommended that every organization operating on Active Directory consider it mission-critical to business and adequately secure and defend it at all times.


In fact, Microsoft recommends that the 1st and most important (paramount) cyber security measure that organizations take to secure (defend) Active Directory is to correctly identify and reduce users who have privileged access in Active Directory:


 "Privileged accounts like administrators of Active Directory have direct or indirect access to most or all assets
in an IT organization, making a compromise of these accounts a significant business risk."


"Cyber-attackers focus on privileged access in Active Directory 
to rapidly gain access to all of an organizations data."


"Securing privileged access is (thus) a critical first step
to establishing security for business in a modern organization."



"Because it can be difficult or even impossible to properly secure every aspect of an organization's IT infrastructure,
you should focus efforts first on the accounts whose privilege create the greatest risk,
which are privileged accounts and groups in Active Directory."


"Implement least privilege. Limit the count of administrators
or members of privileged groups in Active Directory."



"Review administrative privileges each quarter to determine which personnel
still have a legitimate business need for administrative access (in Active Directory)"




"An ounce of prevention is worth a pound of detection"





There's Just A Small Trillion $ Problem

Shockingly, the means to implement Microsoft's number #1 recommendation to thousands of its organizational customers, i.e. the means to correctly (accurately) identify who has what privileged access in/across Active Directory just don't exist*.


That's right. The capability that organizations require to correctly identify who has what privileged access in their Active Directory, so they can limit the number of privileged users and review this number every quarter, doesn't exist* today.

As a result, thousands of organizations worldwide do not even have the means to be able to correctly identify, control, minimize or review exactly who has the "Keys to the Kingdom" in their foundational Active Directory deployments.



Here's evidence, from none other than Microsoft  (Source) -

"In assessing Active Directory installations, we (Microsoft) invariably find excessive numbers of accounts that have been granted rights and permissions far beyond those required to perform day-to-day work. Mid-sized directories may have dozens of accounts in the most highly privileged groups, while large installations may have hundreds or even thousands."



Simply stated, it means that in most large organizations, today there very likely are hundreds or even thousands of users who possess sufficient privileged access so as to be able to control, compromise or blow up the entire organization!

To put this context, consider the fact that almost all major recent cyber security breaches including JP Morgan, Sony Hack, Target, Snowden, OPM Breach, Anthem, Avast, the U.N. breach, SolarWinds Breach, Colonial Pipeline Hack, Microsoft Hack, Okta Hack etc. ALL involved the compromise and misuse of just ONE Active Directory Privileged User account!

(Recently, it cost shipping giant Maersk a staggering $ 250 Million to recover from a breach involving its Active Directory.)



In short, as it concerns having visibility into exactly who has the all-powerful "Keys to the Kingdom" in an organization, today most organizations are operating in the proverbial dark, and neither their IT groups nor their C-Suite have a clue.

(In fairness to all IT admins, IT managers and CISOs at thousands of organizations, this is a massive problem and a very sophisticated technical subject, so they alone should not be blamed for not sufficiently understanding its vast complexity.)

Unfortunately, with the advent of freely available hacking tools be specifically designed to identify and exploit exactly such excessive access related vulnerabilities in Active Directory, urgently addressing this problem has become paramount.


This should be a serious cause of concern for all stakeholders, including their employees, customers and shareholders.





*All of One

Note the use of  * when referring to the non-existence of the paramount capability that organizations require to adequately defend Active Directory i.e. the ability to correctly (accurately) identify who has what privileged access in Active Directory.


It so happens that there's all of ONE company on planet Earth that possesses this capability today, and its patented, Microsoft-endorsed capability can uniquely enable and empower every organization operating on Active Directory to be able to correctly, instantly and automatically identify exactly who has what privileged access in Active Directory.

Actually, there's a little more to it than "it so happens." Eighteen years ago, Microsoft's top cyber security expert on Active Directory Security established this company and for the last eighteen years, it has been laser-focused on solving just this one single $ 28 Trillion problem for the world, (oh, and $ 28 Trillion only accounts for companies in the United States.)

You've likely never heard of this company, but over the last decade, from the United States Treasury to the United States Department of Defense, many of the world's most important and valuable government and business organizations have used and depended on its solutions to correctly identify and minimize privileged access in their Active Directory.

Today, not a single cyber security or IT company on Earth, let alone those listed on the Nasdaq, can compete with it.

Today this company can uniquely enable and empower the entire world to instantly, effortlessly, and most importantly, accurately identify, minimize and lock-down all privileged access, i.e. the "Keys to the Kingdom", in foundational Active Directory deployments worldwide, thereby helping thousands of organizations worldwide trustworthily attain and maintain Least Privileged Access (LPA), which is not only a cyber security necessity but also a cardinal tenet of Zero Trust.

That ONE company is Paramount Defenses, and perhaps the simplest introduction to it can be found here.


We will be making a small announcement tomorrow or day after, that is likely to impact a Trillion+ $.

That's all for now.

Best wishes,
Sanjay Tandon

Formerly
Program Manager,
Active Directory Security,
Microsoft Corporation.


PS: Please Understand -
 
It is a LITTLE difficult to be humble when your work single-handedly impacts Trillions of $ worldwide, and you're trying to help thousands of organizations understand why they remain substantially vulnerable.

This isn't about petty stuff like money i.e. it isn't about a Million or a Billion or a 100B or a T. It's about doing what's right.

Four years ago, I personally demonstrated how hackers could unleash ransomware onto 1000s of organizational computers using Active Directory. For almost ten years now, I have also been personally warning about the use of Active Directory Privilege Escalation as a top attack vector, and sure enough, in almost every major breach, including the SolarWinds Breach, the Colonial Pipeline Hack and recently the Okta and Microsoft breaches, the defining/cardinal step employed by the perpetrators to gain unrestricted privilege was Active Directory Privilege Escalation. I have also been extensively warning about the use of DCSync, and sure enough, as observed and reported by Microsoft, it is DCSync that LAPSUS$ (DEV-0537) employed to obtain unrestricted access and inflict damage. Need I say more?

It remains my professional opinion as former Microsoft Program Manager for Active Directory Security that attaining and maintaining LPA in Active Directory is the single-most important and effective measure that organizations can take to substantially improve their cyber security posture, and technically, we can help the entire world do so, oh and we can technically do so in less than one day. (To appreciate that, consider that even Microsoft couldn't do so in one decade.)

It is also imperative that the world and Microsoft realize that Microsoft making the entire world signup for and rely on its (now twice hacked) Azure (, renamed to Entra after two hacks) Cloud is NOT the answer to solving such problems, because, simply put, the day that an organization transitions over its primary identity to a third-party Identity Provider (IDP) is the day that it relinquishes its operational autonomy, organizational privacy and dignity to a third-party, forever.

Cyber security isn't that difficult, but it does require basic common-sense. If you don't even know how many users have the "Keys to your Kingdomhow can you even begin to protect your organization? This isn't rocket science, its common sense.

Thursday, July 23, 2020

Question Zero - Who can reset the CISO's password?

Folks,

Today, I'm going to ask possibly the most simple and fundamental question one could possibly ask in all of cyber security.

Who can reset the CISO's password today?


From the Fortune 100 to every government agency in every country in the world, and at 85% of organizations worldwide that operate on Active Directory today, this is the #1 question that investors, customers and employees should be asking.


Here's why - Today cyber security undoubtedly plays a paramount role in corporate and national security, and even though organizations are collectively spending billions of dollars on cyber security, the truth is that most organizations still don't even have answers to the simplest and most fundamental of cyber security questions, and remain vastly vulnerable.

Just think - If $ Billion organizations don't even know who can reset the password of their CISO, how could they possibly know who can reset the passwords of the accounts of thousands of their employees, contractors and privileged users?


Oh, and if you don't know just how powerful a password reset is, just look at what happened in the massive Twitter breach.


You may get this response - "We don't worry about password resets because we have multi-factor authentication (MFA)."

No problem. Just ask - "Wonderful, do you know who can disable the use of MFA on your Active Directory account(s)?"
After all, all it takes is the flip of a bit on the user account, after which authentication falls back to being password based.


I ain't kidding you - Today, most CISOs most likely will NOT be able to tell you EXACTLY who can reset their passwords, or disable the use of multi-factor authentication on their accounts, or for that matter, on any of their internal user accounts, or for that matter exactly who can create, delete and manage domain accounts, computers, groups etc. in their organization.


Let me repeat that - Today, the CISO's of most organizations in the world cannot answer this question with exactness.


Here's proof - Let alone their production foundational Active Directory deployments, here is a simple lab Active Directory deployment of a fictional organization with a 1000 accounts, a 100 IT personnel, an executive team, and a CISO account.

All you have to do is ask them if their IT teams even possess the capability to correctly determine and tell you exactly how many users can reset the password of the CISO in this lab Active Directory. If they can, great, insist that they determine and tell you so, but if they can't, be very concerned, because know you too now just how little these organizations know.


Finally, ask yourself - would you invest in or trust an organization whose CISO cannot even answer such a basic question?


We're all in this together.

Best wishes,
Sanjay

Chairman and CEO,
Paramount Defenses

[Also a customer of and an investor in some of the world's largest financial institutions,
cloud computing companies, cyber security companies, airlines and other companies.]


PS: If you want to know the answer to that question, feel free to ask. i.e. feel free to first follow and then DM me on Twitter.

PS2: If you don't think exactness matters, ask yourself this - would you board a plane if I told you that the metal detector at the security checkpoint was not entirely accurate, so there's a good chance that someone onboard may have an explosive.

Corporate Headquarters

620 Newport Center Drive, Suite 1100
Newport Beach, CA. 92660. USA.


Telephone: 001-949-468-5770

© 2006 - 2026 Paramount Defenses. All Rights Reserved.

Your Privacy

We use cookies to give you the best online experience. Please let us know if you accept these cookies.