A popular target of attackers, Microsoft Active Directory will receive an extra measure of protection under a new offering announced Thursday by Attivo Networks. The company’s ADSecure-DC solution expands its Active Directory protection to non-Windows endpoints.
About a year ago Attivo introduced an endpoint product that could detect suspicious attempts to query Active Directory, intercept the queries, and steer them off course. “That was done on every Windows machine on the endpoint,” says Attivo Chief Security Advocate and CMO Carolyn Crandall, “but there are situations where you have Linux, Mac devices, or IoT devices that you can’t load the Windows agent onto, or where you don’t want to load an agent on a Windows endpoint. Now, with AD Secure Domain Controller, attacks can be detected from unmanaged devices.”
The following CIS Benchmarks have been updated or released for March 2022. We’ve highlighted the major updates below. Each Benchmark includes a full changelog that can be referenced to see all changes made.
Role-based access control, or RBAC, is an approach for restricting access to digital resources based on a user’s role in an organization. For instance, under RBAC, a company’s accountant should be able to access corporate financial records but not the content management system used to update the company’s website, while those permissions would be reversed for that company’s web development team.
Just about every organization enforces some kind of access controls on its digital assets—indeed, every operating system in use today has access controls built in. Access controls generally grant specific permissions to (and impose restrictions on) individual users or groups that those users might belong to. What distinguishes the RBAC model from other forms of access control is that the users are grouped together based on the roles they play, and permissions are determined primarily by those roles, rather than being tailored for each individual user. In this article, you’ll learn how RBAC works, and see the advantages and disadvantages of this approach.
Multiple security issues were discovered in Chromium, which could result
in the execution of arbitrary code, denial of service or information
disclosure.
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.