Likewise, knowing which people hold a certain security level is not necessarily sen-
sitive, particularly if many people hold the same level. However, if combined, then a
very specific set of people can be identified - those in a particular department holding
a higher security level. That information could be used to specifically target those indi-
viduals for context-aware, or spear phishing [1] attacks, where individuals are targeted
and the attack appears to come from a legitimate sender, such as a colleague.
Another potential hazard when consolidating multiple directory services into a sin-
gle EDS is the inclusion of certain information not meant to be shared among larger sets
of users. Such tightly controlled information could include attributes considered to be
personally identifiable information (PII) such as identification numbers, or other con-
fidential information such as bank account numbers. In these cases, the intended users
are a small subset, such as the human resources or payroll offices only.
Protecting this information is critical, and most directory services solutions provide
methods for limiting access. However, such measures can usually be circumvented by
system administrators, or those with elevated privileges. These users may obtain ac-
cess to sensitive directory information in more than one way. For instance, they might
override existing access control methods, or they may impersonate an authorized user
to gain access to the information. Another method would be to simply copy the entire
directory information store to attempt extraction of sensitive information.
We propose a method for protecting sensitive directory services information from
all users, including system administrators, using encryption. Furthermore, we base our
solution on existing infrastructure commonly used in enterprise systems. Our main con-
tributions are the introduction of a new type of virtual directory service, called a per-
sonal virtual directory service (PVDS), which interfaces with a key management sys-
tem (KMS) and handles encryption and decryption of sensitive information at the client
level. Additionally, we show how our solution’s impact to existing directory services
is minimal, in terms of directory size and performance. Finally, we demonstrate how
our solution mitigates an insider attack, where the attacker uses domain administrator
privileges to attack a directory service.
The remainder of this paper is organized as follows. Section 2 presents related work
and previous approaches, followed by Section 3, which details our approach. In Section
4, we discuss the advantages of our solution, list various attack models, and show im-
plementation results. Section 5 concludes the paper with suggestions for future work.
2 Background
The threat of unauthorized access of sensitive data by employees or other authorized
users, known as “dedicated insiders”, is well documented [2–4]. In January 2008, the
U.S. Secret Service and CERT issued a report titled “Insider Threat Study: Illicit Cyber
Activity in the Government Sector” [2]. This study outlines a multi-year project, started
in 2002, that explores the activity and threats posed by insiders. Among the key findings
of this study are the following:
– Most of the insiders had authorized access at the time of their malicious activities
– Access control gaps facilitated most of the insider incidents, including:
37