A federal official, speaking at the Splunk>Live! conference in Washington, described how he used sophisticated continuous monitoring software to protect his agency following the highly publicized breach of RSA’s SecurID system in March 2011.
Each SecurID token generates a pseudo-random code every 30 seconds which, along with a User Name and PIN, are used to authenticate logins to numerous federal and private networks. The apparently successful Advanced Persistent Threat (APT) attack may have compromised the security of the token codes, leaving systems at increased risk of attacks using SecureID codes with various random/guessed sets of user names and PINs. Since the system in question was extensively used by authorized personnel around the world, it was not practical to cut off all service or connections from selected geographic areas.