Legacy Protocol Banner

Case Study – Legacy Authentication and Encryption Protocols

Despite the efforts large Enterprises put into protecting their infrastructure, one critical area that is frequently overlooked is the phasing out of legacy protocols. Failure to remove legacy protocols could leave systems exposed and vulnerable to attack.

As a leader in the financial industry, security is top priority for our client. Quorum have been instrumental in a multi-year cyber security programme of work with the client.

One of these projects is responsible for improving and maintaining the security posture of the on-premises Active Directory Domain Services environment and the client sought to identify and remediate ‘legacy protocols’ from the environment.

Most legacy protocols were designed and built before modern enterprise security requirements were clear (or even existed!) – legacy protocol exposure can quickly lead to vulnerable access points.

The project scope was to highlight the use of legacy authentication and encryption protocols within the client’s environment which had been identified by an audit. These instances were then traced back to the originating application and a risk assigned to the appropriate owner where relevant protocols were identified.

Our previous work with the client provided us with a unique understanding of their environment, issues, options, and, most importantly, how to integrate with the current client team.

Legacy Protocol v2

*No email address or sign up required.

“[We were] extremely impressed with the team…[we] worked against very tight milestones, shifting workloads around to ensure all deliverables were met.”

Senior Stakeholder - Client

The benefits of using Quorum for this project included:

Strong relationship with the client & knowledge of their environment.

Microsoft security

and identity experts.

Vast experience in

highly regulated industries.

Scenario – and the team Quorum deployed to address it:

The project scope was to identify occurrences of 12 legacy authentication and encryption protocols within the client’s environment and trace them back to the originating application to assign a risk to the appropriate owner whenever relevant protocols were identified.

Splunk and Stealthwatch Netflow were among the ‘individual’ technology-based solutions previously presented to the client, but these could not fully address the issue. The client chose Quorum because of our expertise. Our proposed solution took a tailored approach to each protocol and used the most appropriate tooling to capture and analyse the data.

The team comprised of:

MAM Cloud Adoption Icon
Project Manager:

Oversaw the project and reported to stakeholders.

MAM Security Icon
Technical lead:

Investigated and defined the capture process and was responsible for leading the engineering and determining the testing process.

MAM Productivity Icon
Technical Engineer:

Responsible for the capture process, including scripts and configurations and performing testing and production implementation.

MAM Modern-Desktop Icon
Data Analyst:

Produced a summary report for protocols, source devices and technology and/or business mapping reports.

It’s vital that we work well with the internal teams of our clients to make these projects a success and in this situation, we got on fantastically well, becoming an extension of each other’s teams, which was greatly appreciated by all. The client commented that:

“[We] had fantastic team ethic and camaraderie – working well together as a distinct unit and with the Project Team.”

Solution – 12 diverse issues to be addressed in 1 project:

Each of the 12 Legacy Protocols, as specified by the client, was investigated, and then categorised into protocol types:

  • Authentication
  • Networking/Communication
  • Encryption

This allowed the team to formalise a data collection strategy while grouping comparable protocols for faster processing.

Internal stakeholders and the Active Directory Services team discussed all infrastructure needs as well as data gathering tooling. A large volume of authentication and encryption traffic must be recorded and analysed to do this.

Quorum provided a cost-effective, customised data recovery solution using only standard Native Tooling, such as Event Log Forwarding, decreasing the resourcing footprint necessary when engaging teams other than the internal support team.

Thoughts and Outcomes:

This project was carried out in response to an audit point, which made it crucial to our client. Rather than engage contractors to augment their internal team and run it as a BAU task, our client chose to onboard Quorum as a team to manage this delivery. We made this an easy choice for them based on our previous successful work within their Active Directory system.

Quorum has discovered all relevant occurrences of the 12-legacy authentication and encryption protocols within the client’s environment, and the project is now complete. Here are key statistics from the project:

The client can move on with an aggressive remediation plan to eliminate the protocols from the estate. Quorum’s runbooks can be used on a regular basis to ensure that these protocols have been successfully removed.

Quorum continues to collaborate closely with the client and, through our current knowledge and close working relationship with them, is effectively positioned to quickly mobilise specialist resources as the business requires them to ensure they stay current, secure, and efficient.

If legacy protocols are an issue in your company, get in touch and we can discuss your options!

 

AWARDS & RECOGNITION

FOLLOW US

CONTACT INFO

Quorum Network Resources Ltd

18 Greenside Lane Edinburgh

UK EH1 3AH

Phone: +44 131 652 3954

Email: marketing@quorum.co.uk

© 2024 Quorum Network Resources Ltd All Rights Reserved. | Environmental Policy | Sitemap | Privacy Policy

CONTACT INFO

Quorum Network Resources Ltd
18 Greenside Lane Edinburgh
UK EH1 3AH
Phone: +44 131 652 3954
Email: marketing@quorum.co.uk

FOLLOW US

AWARDS & RECOGNITION

© 2024 Quorum Network Resources Ltd All Rights Reserved. | Environmental Policy | Sitemap | Privacy Policy