Read to learn about methods to help you securely use remote access.
This post contains the text from the White Paper: Securing Your Remote Desktop Connection. Download the PDF below.
Remote computer access is now part of everyday work, allowing employees to access work files from home, airplane terminals, customer service centers, abroad, or anywhere there’s an Internet connection.
Some remote access applications include:
While remote computer access is a convenient and important technology, it’s unfortunately also one of the most hacked business resources in recent years.
Recently, SecurityMetrics PCI forensic investigators again confirmed that remote access was the top avenue attackers utilized to gain access into merchant systems. 50% of investigated merchants were attacked through insecure remote access applications.
It’s not the remote access application itself that’s inherently insecure; it’s the manner in which remote access is configured. If not properly secured, remote access puts merchants at risk.
It allows attackers to bypass the firewall and most other system security measures to gain access to all systems within that network segment, which often includes the payment environment.
This is just one of the many examples of how an attacker could infiltrate
a vulnerable remote access application:
Attackers will routinely scan large ranges of IP addresses looking for open ports that typically relate to the use of remote access tools (i.e., if attackers see that an IP address has ports 5800 and 5900 open, they assume that Virtual Network Computing (VNC) is installed. If they see that ports 5631 and 5632 are open, they assume the system is configured for pcAnywhere).
The attacker then tries a number of typical usernames that are commonly found on most systems, such as “admin” or “administrator,” and then runs password-cracking tools in order to obtain the system administrator’s or other user’s password. Once attackers have obtained remote access credentials, they have system access and the ability to attack an environment, perhaps by uploading malware or copying sensitive data.
Remote access, and other applications, are often installed and used without changing the application’s default password. Using default passwords to access these applications increases the likelihood of compromise.
Often, merchants are unaware that default settings continue to be used after installation. Data security weaknesses introduced to a merchant’s system by third-party providers/vendors, such as IT Support and point of sale (POS) vendors is a growing concern.
Merchants trust that the third-party provider will configure their systems securely. But if the third-party provider fails to change default passwords and implement multi-factor remote access authentication and there is a data breach, the merchant is at fault. Implementing these changes will later be discussed.
In one SecurityMetrics forensic investigation, it was discovered that a third party IT vendor purposely left POS system default passwords in place to facilitate easier future system maintenance. Default passwords might make it easier for IT vendors to support a system without having to learn a new password each time; but convenience is never a valid reason to forego security, nor will it defray liability.
Most default passwords and settings are well known throughout hacker communities and are easily found via a simple Internet search. When defaults aren’t changed, it provides attackers an easy gateway into a system. Disabling vendor defaults on every system with exposure to a cardholder data environment protects against unauthorized users.
If a username and password aren’t sufficiently complex, it will be that much easier for an attacker to gain access to an environment. They may try to brute-force attack a system by entering multiple passwords (usually via an automated mechanism that allows them to enter thousands of password options within a matter of seconds) until one works.
Secure passwords should have a minimum of eight characters, and must contain numeric and alphabetic, and special characters. In practice, the more character formats used, the more difficult a password will be to guess. This also applies to attackers trying to use an algorithm to obtain a password: the longer, more complex the password, the longer it will take to discover.
Consider using a passphrase as your password. Passphrases are groups of words that might include spaces and punctuation (e.g., “We Never Drove Toward Vancouver?”). A passphrase can contain symbols, upper and lower-case letters, and doesn’t have to make sense grammatically. Passphrases are generally easier to remember, but harder to crack than passwords.
Instead of common usernames such as “admin,” administrator, company name, or a combination of the two, merchants should utilize fictitious names or a combination of characters, symbols, and numbers that don’t fit the standard username.
Multi-factor authentication is the most effective solution to secure remote access applications and is a requirement under PCI DSS. Unfortunately, merchants often fail to implement multi-factor authentication.
Configuring multi-factor authentication requires at least two of the following three factors:
A few examples of effective multi-factor authentication remote access authentication include:
It’s critical to look at how to effectively govern company use of remote access technologies. When implemented and managed properly, remote access can be secure.
Here are a number of additional best practices recommended to protect your organization against hackers:
Merchants should also keep third-party vendors’ access to a minimum and monitor it regularly. This can be accomplished by a second authentication factor that requires the third-party to telephone the site and speak with an authorized manager who knows the vendor. The on-site manager may then authorize a temporary remote session for the vendor. When the vendor’s work is complete, the on-site manager will then terminate the remote access.
Insecure remote access continues as the top vulnerability, but can be prevented through a few additional security measures.
Because of the prevalence of high-quality password-cracking tools, creative usernames and complex passwords are essential, but not enough. Strong multi-factor authentication must also be implemented to ensure a safer remote access atmosphere.
Change default or insecure usernames and passwords for necessary services enabled on firewalls in order to make it more difficult for an attacker to gain access to your systems.
If a third party IT company is accessing the cardholder environment, it’s still the responsibility of the merchant to ensure compliance. Check with third party companies to verify that any remote access applications have been securely configured.
We help customers close security and compliance gaps to avoid data breaches. Our forensic, penetration testing, and audit teams identify best security practices and simplify compliance mandates (PCI DSS, HIPAA, HITRUST, GDPR). As an Approved Scanning Vendor, Qualified Security Assessor, Certified Forensic Investigator, we have tested over 1 million systems for security.